×

Electronic lock box with multiple modes and security states

  • US 20050206499A1
  • Filed: 03/19/2004
  • Published: 09/22/2005
  • Est. Priority Date: 03/19/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating an electronic lock box system, said method comprising:

  • (a) providing at least one electronic lock box having a secure compartment therein, a first computer circuit, a first memory circuit, a first device reader port, and a first data entry apparatus;

    (b) providing a processing apparatus having a second computer circuit, a second memory circuit, a second device reader port, and a second data entry apparatus;

    (c) providing a portable memory device having a third memory circuit, and at least one electrical conductor for communicating with a device reader port;

    (d) at said second computer circuit;

    (i) determining a first present epoch time, determining a predetermined epoch time window for which a portable memory device will be valid, determining a first cryptographic seed value for use with a data encryption function, and determining a user'"'"'s first identification code;

    (ii) using said data encryption function, calculating a diversified value based upon both said first cryptographic seed value and said user'"'"'s first identification code;

    (iii) coupling said portable memory device to said second device reader port, and communicating said diversified value to said portable memory device;

    (e) at said at least one electronic lock box;

    (i) coupling said portable memory device to said first device reader port, and communicating said diversified value from said portable memory device to at least one of said first computer circuit and said first memory circuit;

    (ii) determining a second present epoch time, determining a second cryptographic seed value; and

    determining a user'"'"'s second identification code from a manual entry at said first data entry apparatus;

    (iii) using said data encryption function, decrypting said first diversified value based upon said second cryptographic seed value, resulting in a third identification code; and

    (iv) comparing said user'"'"'s second identification code and said third identification code, and if they match, permitting access to said secure compartment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×