Secure Key Lock Box System
First Claim
1. A lock box system adapted for secure access to a stored key comprising:
- one or more key devices;
one or more lock boxes in which a selected key device requests access to a selected lock box; and
a key fob controller that authorizes access to the selected lock box using the selected key device by communication between the key fob controller and the selected lock box.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure lock box system for secure storage and retrieval of a stored key includes a key fob device that requests access to a lock box by inductive or optical communication. The individual key fob is authorized for access to the lock box by prior radio communication with a key fob controller that validates the key fob. A lock box controller in combination with applied pressure to a latch hook conserves power and controls access to the key by operation of a low power solenoid and a latch mechanism. Tampering with the lock box is detected by a piezo film motion sensor that provides a signal to a microprocessor, which is awakened from a low power condition by the signal. Upon access grant or an unauthorized attempt at access to the lock box, a message is transmitted from the lock box to an annunciator. The annunciator relays a message concerning the attempted access to a server where a log is created and stored. The server and key fob controller maintain data concerning one or more key fob devices and provide separate authentication data for each. The annunciator warns of any unauthorized access attempt or tampering with the lock box.
85 Citations
26 Claims
-
1. A lock box system adapted for secure access to a stored key comprising:
-
one or more key devices;
one or more lock boxes in which a selected key device requests access to a selected lock box; and
a key fob controller that authorizes access to the selected lock box using the selected key device by communication between the key fob controller and the selected lock box. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for secure access to a stored key comprising the steps of:
-
communicating authentication data from a server to one or more lock boxes;
providing a registration controller;
individually registering one or more key devices on the server using the registration controller;
communicating registration of the individual key devices to the lock boxes;
requesting access to a particular lock box using a particular key device;
determining validity of the access request by the key device; and
granting or denying access by the key device to the lock box. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification