ELECTRONIC KEY CONTROL AND MANAGEMENT SYSTEM FOR VENDING MACHINES AND THE LIKE
First Claim
1. A key management system for management of electronic keys used to access electronic locks, comprising:
- an electronic key including operation limit parameters for determining if the key shall be rendered disabled in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key;
a computer employing an operating system for operating a plurality of tasks, wherein at least one task being a software program for key management functionality;
a database containing key management data; and
a cradle communicating with the computer for interfacing the computer with an electronic key;
the software program having computer-executable instructions for performing a key refreshing operation, said operation consisting of one of the plurality of tasks operating with the steps of;
receiving a transmission from a key through the cradle and receiving a key identification number from the key through the cradle;
receiving the audit trails from the key and storing the received audit trails data into the database;
retrieving from the database operation limit parameters based on the key identification number; and
sending the operation limit parameters through the cradle to the key.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, etc. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing.
136 Citations
78 Claims
-
1. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including operation limit parameters for determining if the key shall be rendered disabled in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key; a computer employing an operating system for operating a plurality of tasks, wherein at least one task being a software program for key management functionality; a database containing key management data; and a cradle communicating with the computer for interfacing the computer with an electronic key; the software program having computer-executable instructions for performing a key refreshing operation, said operation consisting of one of the plurality of tasks operating with the steps of; receiving a transmission from a key through the cradle and receiving a key identification number from the key through the cradle; receiving the audit trails from the key and storing the received audit trails data into the database; retrieving from the database operation limit parameters based on the key identification number; and sending the operation limit parameters through the cradle to the key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including operation limit parameters for determining if the shall be rendered disabled in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key; a computer having a software program for key management functionality; a database containing key management data; and a cradle communicating with the computer for interfacing the computer with an electronic key; the software program having computer-executable instructions for allowing a user to modify key operation limit parameters and store key operation limit parameters in the database during a first operation mode, and for restricting a user from modifying key operation limit parameters and storing key operation limit parameters during a second operation mode, and for performing a key refresh operation with the steps of; receiving a transmission from a key through the cradle and receiving a key identification number from the key through the cradle; receiving the audit trails from the key, and storing the received audit trails data into the database; retrieving from the database operation limit parameters based on the key identification number; and sending the operation limit parameters through the cradle to the key. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including operation limit parameters for determining if the key shall be rendered disabled in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key; a plurality of key management stations including at least first and second key management stations, each key management station having a computer with a software program for key management functionality and a cradle communicating with the computer for interfacing the computer with an electronic key, the first and second key management stations both having access to a shared database containing the key management data, the first key management station having a first database address pointer and the second key management stations having a second database address pointer that is the same as the first database address pointer; the software program on the computer of either key management station having computer-executable instructions for; receiving the audit trails from the key, and storing the received audit trails data into the shared database; receiving operation limit parameters designated to a key identification number from the shared database, sending the operation limit parameters to the electronic key. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including a plurality of unique lock identification numbers for determining if the key shall be authorized in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key; a plurality of key management stations including at least first and second key management stations, each key management station having a computer with a software program for key management functionality and a cradle communicating with the computer for interfacing the computer with an electronic key, the first and second key management stations both having access to a shared database containing the key management data, the first key management station having a first database address pointer and the second key management stations having a second database address pointer that is the same as the first database address pointer; the software program on the computer of either key management station having computer-executable instructions for; receiving the audit trails from the key, and storing the received audit trails data into the shared database; obtaining a plurality of lock identification numbers from the shared database; send the lock identification numbers to the electronic key, whereby the lock identification numbers are stored in a memory of the electronic key. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including a plurality of unique lock identification numbers for determining if the key shall be authorized in accessing the electronic locks, and a memory for storing audit trails data collected from electronic locks accessed using said key; a computer employing an operating system for operating a plurality of tasks, wherein at least one task being a software program for key management functionality; a database containing key management data; and a cradle communicating with the computer for interfacing the computer with an electronic key; the software program having computer-executable instructions for performing a key refreshing operation, said operation consisting of one of the plurality of tasks operating with the steps of; receiving a transmission from a key through the cradle and receiving a key identification number from the key through the cradle; receiving the audit trails from the key and storing the received audit trails data into the shared database; obtaining from the database, a plurality of lock identification numbers, sending the lock identification numbers to the electronic key, whereby the lock identification numbers are stored in a memory of the electronic key. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A key management system for management of electronic keys used to access electronic locks, comprising:
-
an electronic key including a plurality of unique lock identification numbers determining if the key shall be authorized in accessing the electronic locks, operation limit parameters for determining if the key shall be rendered disabled in accessing the electronic locks, and audit trails data collected from vending-machines accessed using said key, and; a computer having a software program for key management functionality; a database containing key management data; and a cradle communicating with the computer for interfacing the computer with an electronic key; the software program having computer-executable instructions for performing a key refresh operation with the steps of; receiving a transmission from a key through the cradle and receiving a key identification number from the key through the cradle; receiving the audit trails from the key, and storing the received audit trails data into the database, obtaining from the database, a plurality of lock identification numbers, sending the lock identification numbers to the electronic key, whereby the lock identification numbers are stored in a memory of the electronic key; retrieving from the database operation limit parameters based on the key identification number, and sending the operation limit parameters through the cradle to the key. - View Dependent Claims (66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
Specification