Electronic access control and location tracking system

ABSTRACT

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest&#39;s electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest&#39;s smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.

This application is a continuation of U.S. application Ser. No.15/818,020, filed Nov. 20, 2017, which is a continuation of U.S.application Ser. No. 15/627,820, filed Jun. 20, 2017, now U.S. Pat. No.9,858,741 issued Jan. 2, 2018, which is a continuation of U.S.application Ser. No. 15/286,753, filed Oct. 6, 2016, now U.S. Pat. No.9,691,206 issued Jun. 27, 2017, which is a continuation of U.S.application Ser. No. 15/055,477, filed Feb. 26, 2016, now U.S. Pat. No.9,466,163 issued Oct. 11, 2016, which is a continuation-in-part of U.S.application Ser. No. 14/827,222, filed Aug. 14, 2015, now U.S. Pat. No.9,424,699 issued Aug. 23, 2016, which claims priority to and the benefitof U.S. Application Ser. No. 62/037,684, filed Aug. 15, 2014. Allapplications are incorporated by reference in their entireties for allpurposes.

BACKGROUND

Controlled access areas have become increasingly commonplace in modernsociety. From hospitals to gated communities, sensitive industries toprison complexes, there is a need to control the flow of human capital.Systems for doing so are often rudimentary, such as those that utilize aguard who checks an individual's identification and access rights. Othersystems involve physical keycards and passes, which allow access paststatic checkpoints.

These systems are often insufficient for controlling and tracking themovement of guests who have access for a particular, limited purpose.Once past a static checkpoint, control systems have limited means fortracking a guest's movements. Furthermore, guests may become lost orenter into areas beyond the scope of their invitation.

It is to addressing or reducing these problems that the currentdisclosure is directed.

SUMMARY OF THE DISCLOSURE

A method and system are described that allows members (as definedbelow), system administrators or other authorized individuals accessinto to controlled access locations; as well as the ability for membersand administrators to grant temporary and limited access to guests intothese locations. Additionally, the method and system allows fornavigational services to be provided to members and guests, andreal-time tracking and confirmation to members and administrators thatguests have arrived at their destination and did not enter anyunauthorized areas.

The disclosed method preferably can work through a system of wirelessradio, sound and/or light-based beacons communicating with member andguest's smartphones, computer systems, or other electronic devices.Members and administrators can send one or more temporary electronicaccess keys to a guest's smartphone or other electronic device. Wirelessradio, sound and/or light-based beacons provide an access control &location tracking system with real-time data about the member and guestwhereabouts, allowing for the confirmation and tracking described aboveand below. Depending on the type of location using the system, incertain circumstances one or more members, in addition to guests, alsomay not have access to all restricted areas at the given location. As anon-limiting example, where the system is used by a condominium(“condo”) building and a particular condo owner is delinquent on theirCondo Association fees, access to community areas (i.e. exercise rooms,club house, etc.) for the particular condo owner could be restricted,but not the entrance, elevators or garage. As another non-limitingexample, commercial buildings may allow a tenant to access the buildingentrance, elevator for their particular floor and garage, but not otherfloors of the building.

The following definitions are provided for a better understanding of thedisclosure:

Access Control & The electronic database where permissions and locationsof guests Location Tracking and members are managed and stored. DatabaseAccess Control & The specially programmed computer/electronic systemwhich Location Tracking monitors guest and member authorizations andlocations based on System information received from and being incommunication with wireless Radio, Sound and/or Light-based Beacons tomonitor activity in controlled access areas. Member/Guest A speciallyprogrammed computer system or electronic device Electronic Computerincluding, but not limited to, cell phone, smartphone, key card, Systemor Device tablet, laptop or other computer system belonging to a member,guest, administrator or public service personnel. Access Control & Anelectronic database that stores digital access keys sent to a LocationTracking specific member, guest, administrator or public servicepersonnel's Keychain Database device. The keychain database can storedigital keys from one or more different access control & locationtracking systems and is preferably stored on the member/guest'selectronic device which stores the particular member's or guest's keys.This allows the system to be used at multiple locations via a singleelectronic device app. The other above defined database (Access Control& Location Tracking Database) is preferably provided at each location ofinstallation for the system and stores the keys, member/guestinformation and access rights for the particular installation of thesystem. Administrator A person responsible for the determining who isauthorized to enter into a controlled access area. Authorized PersonsPersons who have permission to enter a controlled access area. WirelessRadio, A small receiver/transmitter capable of operating on short and/orSound and/or long range wireless communication between electronicdevices. Light-based Beacon Capabilities include but are not limited topinpointing its own location, utilizing the software in a smart phone,cellular phone or other electronic device to determine that device'slocation and bi- directional data transmission. Wireless radio, soundand/or light-based beacons can utilize technologies including, but notlimited to, Near Field Communication (NFC), Bluetooth, WiFi,Light-Fidelity (LiFi), Ultrasound, InfraRed (IR), and Radio Frequency(RF). All of these technologies and similar current or similar laterdeveloped communication technologies are included in the term “wirelessradio” wherever that term appears in this disclosure. Checkpoint Apre-determined location within a controlled access area where the AccessControl & Location Tracking system is programmed to determine whether amember or guest has the necessary credentials to proceed further.Controlled Access Locations where the general public may not enterwithout Area Or Controlled permission from a member or administrator.(e.g. sensitive areas Access Location in hospitals, gated communities,prisons, private areas of businesses, apartment buildings). Device Asmartphone, cellular phone, computer, tablet, laptop or any electronicdevice with wireless radio, sound and/or Light-based Beacon capabilityand specifically programmed with the below defined “PermissionsApplication”. Guest An individual with temporary, limited access intoall or part of a controlled access area. Key An electronic or digitalcode, which is stored in the permissions application. This code ischecked against the access control & location tracking database todetermine whether a member or guest has permission to be in a controlledaccess area at a given date and time. Member An individual withpermission to be in a controlled access location, and authority to grantguests access to a controlled access location. Permissions A softwarebased application which retains the permissions for Application entryinto controlled access locations. This application can be run on asmartphone, computer, tablet, or other electronic device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of certain non-limiting components of thedisclosed access control and location tracking system and alsoillustrating the steps/communications generally involved in theregistration of a member device;

FIG. 2 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in sending an access key to aguest device;

FIG. 3 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining access rights;

FIG. 4 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining authorizedlocations;

FIG. 5 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining arrival atauthorized locations;

FIG. 6 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining location andnavigational support;

FIG. 7 is a block diagram and process flow for access control and thenotification rules engines for the disclosed access control and locationtracking system;

FIG. 8 is block diagram and process flow for the storage of electronickeys in the keychain database in connection with the disclosed accesscontrol and location tracking system;

FIG. 9 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in sending electronic keys froman electronic device to the access control and location tracking system;

FIG. 10 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in auto-prompting for selectingan electronic key for sending from an electronic device to the accesscontrol and location tracking system;

FIG. 11 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in auto-prompting and electronickey selection for sending from an electronic device to the accesscontrol and location tracking system;

FIG. 12 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in a guest requesting anelectronic key from a member in connection with the access control andlocation tracking system;

FIG. 13 is a block diagram of certain non-limiting components fordetermining presence at a specific location and also illustrating thesteps/communications generally involved in selecting the appropriatedigital key for the specific location; and

FIG. 14 is a block diagram of certain non-limiting components fordetermining presence at a specific location and also illustratinganother embodiment of the steps/communications generally involved inselecting the appropriate digital key for the specific location.

DETAILED DESCRIPTION

FIG. 1 shows one method for allowing a member to register their computersystem or electronic device with the disclosed access control & locationtracking system. This initial registration process preferably allows amember to electronically receive digital/electronic access keys as wellas grant a guest access to a controlled access location, andsubsequently track the guest's location within that area.

At step F1 a, a member registers their electronic computer system orelectronic device with the disclosed access control & location trackingsystem. This enables the member to use their computer system orelectronic device to access restricted locations and provide theirguests with temporary access to controlled access areas. It also allowsthe member to use their electronic device to track their guest'slocation within the controlled access area, and confirm their guest'sarrival and departure at a given permitted location. Registration can beaccomplished in a number of non-limiting ways. As one non-limitingexample, the system administrator can register the members directlythrough the programmed software using a form and then have the memberscredentials sent to the member via SMS, MMS, Email, Voice, Mail or otherdelivery methods. Alternatively, the member can download the softwareapplication (app) to their electronic device, register through a form onthe app and then the system administrator can approve or deny theregistration request. Once the software app is installed on theelectronic device and registration is accepted by the systemadministrator the members digital/electronic keys can be downloaded bythe member to the electronic device and stored in their electronickeychain database on their electronic device. The application/databasestoring the digital/electronic keys then transmits the key to the AccessControl & Location Tracking System via any of the wireless radio, lightor sound based technologies (wifi, Bluetooth, lifi, rfid, etc.)

At step F1 b, the access control & location tracking system isprogrammed to record permissions afforded to and requested by membersand retains and electronically stores those permissions in the AccessControl and Tracking Location database. The system utilizes thisdatabase's record of members, guests, access rights, locations, andpermissions to determine and then grant the level of access to a member,a guest requested by a member, and to provide the real time tracking andconfirmation of member and guest movements.

At step F1 c, the access control system administrator oversees theaccess control & location tracking system. Through the system, theadministrator can track all member and guest movements, rights, andaccess. This allows the administrator to employ the necessary level ofsecurity or emergency response to protect the safety of members andguests, should a member or guest go beyond the scope of their access.The administrator is notified of the device registration request and cangrant or revoke permission to use the registered device. Though notlimiting, in the preferred embodiment, the system can be programmed suchthat the administrator receives device registration requests from amember. The system can also be programmed such that guest registrationrequests go directly to the member they are requesting access from(though the system can also be programmed to permit the administrator tooverride, approve and/or cancel decisions made by the member concerningthe guest's request).

At step F1 d, the access control & location tracking systemelectronically sends the member's electronic computer system orelectronic device the digital access key assigned to them. It alsoprovides the member's electronic computer system or electronic devicewith real time information on their guest's or otherassociated/authorized member's whereabouts. This allows the member toconfirm that the guest reached their destination.

At step F1 e, the digital access key is stored in the electronickeychain database on the member's electronic computer system/device. Asimilar keychain database on a guest's electronic device is created tostore any digital access key(s) granted to a guest through the system.

FIG. 2 illustrates how a member provides a guest access to thecontrolled access location. The member electronically sends the guest adigital electronic key, which provides the guest with access to acontrolled access area limited by the parameters set by the member.

At step F2 a, a member electronically sends a request to the accesscontrol computer system that a digital key be generated andelectronically sent to a guest. The member enters any limitations to beplaced on the guest's access to the controlled area in the request. Anadministrator can also be permitted to enter additional accessrestrictions for the guest. In one non-limiting embodiment, the systemcan be programmed to provide a form containing a series of checkboxesfor each location controlled by the system that the member can selectfrom. A date and time module can also be provided for allowing themember to indicate the starting date and time and ending date and timefor the guest's digital key. Further detail on the permissions andlimitations a member can place on a key for a guest is discussed inconnection with FIG. 7.

At step F2 b, the access control and location computer system recordsthe member's request and automatically enters it into the access controldatabase. This information is electronically stored and later used bythe Access Control & Location Tracking system when the guest receivestheir access key and enters the secured access location.

At step F2 c, the access control and location computer system candirectly send the guest an electronic key to their smartphone or otherelectronic device via electronic communication methods including but notlimited to direct data connection, SMS, Email, MMS and voice. Aconfirmation electronic message can be sent to the member to inform themthat their guest's key was approved and sent to the guest.Alternatively, the system can be programmed that the guest key is firstsent to the member, and the member forwards it to the guest. The key isimported to a software application, which is stored locally on theguest's device. This application acts as an electronic keychain ofaccess keys. In one non-limiting embodiment, the digital key can be anelectronic file, which is preferably encrypted. The key can beauto-imported where it is sent to person's electronic device through anapp directly that is downloaded on the electronic device or manuallyadded if the key is sent through SMS or email. For the manual method,the guest can click on the file and than have an app import the key tothe local device database. Once the guest receives the key, the guesthas all access rights, which have been granted to them by a member, asseen/discussed in step F2 a and FIG. 7. The guest can have a keyprovided by multiple members within the same Access Control & LocationTracking System location or keys for multiple locations (with separateinstances of the Access Control & Location Tracking System). As anon-limiting example, if the guest is a service provider (i.e. plumber,electrician, personal trainer, delivery person, etc.) the guest may needto have keys from multiple members at any given time. Also in someinstances a person can be a member at one location and a guest at otherlocations and may have member key(s) and guest(s) keys on his or herelectronic keychain database stored on his or her electronic device.

At step F2 d, the electronic key is electronically stored in the accesscontrol & location tracking keychain database on the guest's device.

FIG. 3 illustrates how the system grants or denies access to a member orguest based on the electronic key on their device.

At step F3 a, the member or guest attempting to enter a controlledaccess location will have an electronic key on their device, such as theelectronic key the guest receives from the steps described in FIG. 2.Through a wireless radio, sound and/or light enabled application, theirdevice will retrieve all electronic keys stored in the device's keychaindatabase and transmit them to any wireless radio, sound and/orlight-based beacons in an immediate proximity to the controlled accessarea entrance. FIG. 9 shows one non-limiting embodiment where theelectronic device can be configured for its owner to manually select thedigital key to transmit (i.e. virtual clicker), while FIG. 10 showsanother non-limiting embodiment where the electronic device can beconfigured to auto-sense that it is at a beacon and then have the usermanually select the digital key to transmit to the beacon and FIG. 11shows a further non-limiting embodiment where the electronic device canbe configured to automatically sense that it is at a beacon and thenautomatically send the digital key(s) to the beacon. The member or guestcan also choose which specific key to transmit if so configured anddesired. The key can be manually chosen via a user interface provided bythe software installed on the member's or guest's electronic device orit can also just send all keys available on the users keychain to thesystem and it will continue to check each key on the keychain to see ifone grants them access for the location, date and time. The system canbe programmed such that access denial is only given after all availablekeys are checked. Preferably, the built in capabilities of conventionalsmartphones/electronic devices can be used, as they currently come withWifi, Bluetooth and sometimes NFC radios or InfraRed sensors, and somealso have ultrasonic capable microphones or lifi built in. If notprovided, these technologies can be provided or later acquired by theelectronic device. The Access Control and Location Tracking system,through instructions provided by the programmed software, accesses theradios and other communication hardware available on the electronicdevice and uses them as needed.

At step F3 b, the member or guest's device will communicate throughwireless radio, sound and/or light-based beacons with the access controland location tracking system. The system will then recognize that adevice with the application is in proximity to a controlled access areaand retrieve the key(s) stored on said device. As mentioned above, thesoftware can be configured to automatically send the keys or themember/guest can choose which key to send. When the software on themember/guest's electronic device is in range of a beacon, it can receivea signal triggering it to send the keys in its keychain database to theaccess control & location tracking database.

At step F3 c, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F3 d, when a member or guest wishes to enter into a controlledaccess area, the system will determine whether the member or guest has avalid key allowing entry. If a valid key is presented, access is grantedand an electronic signal is sent to open the access barrier such as aGate, Door, Elevator or other Entryway. Additionally, notification iselectronically sent to Security Staff through a computer screen or otherelectronic device. The access control & location tracking database isupdated with details pertaining to the access event such as the keycode, date, time and location.

At step F3 e, if a valid key is not presented, then access will bedenied and notification is sent to Security Staff through a computerscreen or other electronic device. The access control & locationtracking database is updated with details pertaining to attempted accessevent including the key code, date, time and location. Optionally, theAccess Control and Location Tracking system can be programmed that wherea guest or member attempts to enter an area where they are not approved(i.e. when access denied by the system), all of some of the accesspermissions that they have been granted are suspended or terminated, topermit the administrator or other proper personnel (i.e. security) toinvestigate the denial (i.e. determine whether it was an accident orthat the member/guest has bad motives). The results of the investigationcan determine whether the previous permissions are granted again orunsuspended by the system.

FIG. 4 demonstrates how the system determines whether a member or guestis in an authorized or unauthorized location on a continuous basis.

At step F4 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area. These are arranged sothat when a member or guest with a wireless radio, sound and/or lightenabled device and the permissions application running enters the area,they are preferably constantly within range of a beacon. The member orguests access key can be automatically electronically retrieved from thekeychain database stored in their electronic device and transmitted bythe wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system preferably in continuous intervals.

At step F4 b, the access control & location tracking system receives theaccess key(s) and compares the key(s) to the access control & locationtracking database to determine the permissions afforded to each specifickey that is received.

At step F4 c, if the member or guest is in an authorized location basedon the permissions retrieved in F4 b, then the system will update thedatabase to reflect the current location of the member or guest.

At step F4 d. If the member or guest is in an unauthorized location,then the system administrator and/or security staff is notified. In thecase of a guest, the member who granted the guest access can be notifiedas well that the guest has gone beyond the parameters of theirauthorization. The alert is generated by the access control & locationtracking system and can be sent through computer, voice, email, IM, SMS,MMS, pager or other communication method. The access control & locationtracking database can also be updated with the member or guests currentlocation. Additionally, the termination or suspension of all or some ofthe guest/member's access permissions as described above can also beperformed by the Access Control & Location Tracking system.

FIG. 5 demonstrates how the system determines whether a member or guesthas arrived at their authorized location after being granted access intothe controlled access area as described in FIG. 3.

At step F5 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running enters the area, they arepreferably constantly within range of a beacon. The member or guestsaccess key can be automatically electronically retrieved from thekeychain database stored in their electronic device and transmitted bythe wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system preferably in continuous intervals.

At step F5 b, the access control & location tracking system receives theaccess key(s) as well as location of the device based on which wirelessradio, sound and/or light-based beacons received the key and comparesthe key(s)/location to the access control & location tracking database.

At step F5 c, if the access control & location tracking systemdetermines that the location of the member or guest is at the finalauthorized location based on the permissions retrieved in F5 b, then thesystem will update the database.

At step F5 d, if the access control & location tracking systemdetermines that the location of the member or guest is not at the finalauthorized location within the time allotted based on the permissionsretrieved in F5 b, then the system administrator and/or security staffis notified. In the case of a guest, the member who granted the guestaccess can be notified as well that the guest has not arrived at theirauthorized location within the time period allotted. The alert isgenerated by the access control & location tracking system and can besent through computer, voice, email, IM, SMS, MMS, pager or othercommunication method. The access control & location tracking database isalso updated with the member or guests current location.

FIG. 6 demonstrates how the system provides navigational assistance tomembers and/or guests after being granted access into the controlledaccess area as described in FIG. 3.

At step F6 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running enters the area, they arepreferably constantly within range of a beacon. The member or guestsaccess key can be automatically electronically retrieved from thekeychain database stored in their electronic device and then transmittedby the wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system in preferably continuous intervals.

At step F6 b, the access control & location tracking system receives theaccess key(s) as well as location of the device based on which wirelessradio, sound and/or light-based beacons received the key and comparesthe key(s)/location to the access control & location tracking database.

At step F6 c, if the access control & location tracking systemdetermines that the location of the member or guest is at the finalauthorized location based on the permissions retrieved in F6 b, then thesystem will update the database.

At step F6 d, if the access control & location tracking systemdetermines that the location of the member or guest is not at the finalauthorized location based on the permissions retrieved in F5 b, then itupdates the access control & location tracking database with the memberor guests current location. The system then calculates the possibleroutes to the final authorized location from the current location of themember or guest. The route information is electronically sent to themember or guests device through computer, voice, email, IM, SMS, MMS,pager or other communication method. Visual interpretation andpresentation of the route may also be provided, such as, but not limitedto through the electronic device's screen or display. Additionally, thetermination or suspension of all or some of the guest/member's accesspermissions as described above can also be performed by the AccessControl & Location Tracking system where the guest/member does not reacha specific location in the allotted or predetermined amount of time.

FIG. 7 demonstrates how a member or system administrator can create anew digital key and assign the specific permissions and notificationsfor the new digital key. This process can also be utilized to editpermissions and notifications for existing keys.

At step F7 a, the “Create New Key” function is selected within theaccess control & location tracking system by a user with key creationprivileges such as a system administrator or member. Preferably, thesystem administrator or member will have previously signed on or loggedin to the system so that their key creation privileges are recognized bythe system. Guests are preferably not allowed to create new keys, thoughsuch is not considered limiting, and the system can be programmed wherea guest could create a key or transfer his or her key to anotherkeychain in certain or limited situations (i.e. husband to wife or viceversa, etc.).

At step F7 b, the access control & location tracking systemelectronically queries the system database to determine existing keyrecipients as well as available locations, access points, and the ruleset assigned to the system administrator or member creating the new key.The user can only create new keys that they themselves have been grantedpermissions for. As a non-limiting example, if a given user is notallowed access to a specific location, said user would not be able tocreate a key granting access to that specific location. The screens andoptions available for creating a key in F7 c through F7 l are customizedbased on the granted permissions for the user creating the key.Therefore, another user who has more permissions than the user presentedwith the options in F7 c through F7 l could be presented with additionaloptions and screens not shown in F7 c through F7 l. Similarly, anotheruser who has less permissions may be presented with less than all of theoptions and screens shown in F7 c through F7 l. Additionally, the systemcan be programmed such that the options specified in F7 c through F7 lwork in conjunction with each other, so for example, if a single date isspecified along with a specific time span, the key can only be valid forthat time span on the specified date.

At step F7 c, the user enters or selects the recipient's name andcontact information from the list of available recipients retrieved inF7 b. The specific data elements entered will depend on the electronicmethod desired to send the digital key to the recipient. For example ifemail delivery is selected, then a name and email address is requiredfor the recipient but if an SMS or voice call is selected, a name andphone number for the recipient is required.

At step F7 d, the user selects the type of key recipient for this newkey. Keys can be created for Members, Guests, Administrators and/orPublic Service personnel such as Police, Fire, Utility and GovernmentAgency workers, though such is not considered limiting, and other typesof individuals based on status, employment, etc. can also be digital keyrecipients.

At step F7 e, the user specifies the number of times this digital keycan be used. Keys can be created for one-time use only, for a specificnumber of times or for an unlimited number of times.

At step F7 f, the user specifies the permissible access dates for thedigital key. Keys can be created for a single time span, multiple timespans, or without a time restriction.

At step F7 g, the user specifies the permissible access times ofday/night for the digital key. Keys can be created for a single timespan, multiple time spans, or without a time restriction.

At step F7 h, the user specifies the permissible access locations andentry points for the digital key. Keys can be created for a singlelocation/entry point, multiple locations/entry points, or all locationsand entry points.

At step F7 i, next the user can select if notifications are to be sentrelated to the usage of this digital key. This function would typicallyapply to keys generated for guests or public service personnel. If theuser does not wish to configure any notifications related to the use ofthis key, the data and entries for the specific digital key created aresaved in the electronic database and steps F7 j through F7 m areskipped. If they user wishes to create notifications related to the useof this key, then the user can preferably proceed to F7 j.

At step F7 j, the user selects the type(s) of notifications to be sent.As non-limiting examples, notifications can be sent based on the usageof the key to gain entry to a restricted location, upon arrival at apermitted location, when the key recipient does not arrive at a specificlocation or if the key recipient has navigated off course from the pointof entry to the final authorized location.

At step F7 k, the user selects the method(s) of notifications to besent. Notifications can be sent via SMS/MMS, Email, Voice, or on-screenat the access control & location tracking system or directly through theaccess control & location tracking system software on the administratoror member's electronic computer system/device.

At step F7 l, the user selects or enters the notification recipient(s).Notification recipient(s) can be selected from a list of existingadministrators and members or entered with the recipient(s) name andcontact information. For example if an email notification is selected,then a name and email address is preferably provided for the recipientbut if an SMS or voice call is selected, a name and phone number for therecipient is preferably provided.

At step F7 m, the digital key with all permission and notificationsettings is electronically saved in the system database.

At step F7 n, the access control & location tracking systemelectronically delivers the newly created (or modified) key to therecipient according to the contact information obtained in F7 c.

FIG. 8 demonstrates how a member, guest, system administrator or publicservice personnel can receive digital keys from multiple access control& location tracking systems and store those keys in an electronickeychain database on their electronic computer system or device. Themultiple systems can be associated with multiple locations. In onenon-limiting example, one location can be residential community 1, thenext location condo building 2, the next location a commercial officebuilding. In some instances, the beacons can be used in multiple systems(i.e. lobby of a commercial office building where multiple systems areinstalled in the building for different companies that have office spacein the building, etc.)

At step F8 a, one or more access control & location tracking systemsgenerates digital key(s) for a member, guest, administrator or publicservice personnel as described above. The digital keys areelectronically sent to a computer system or device belonging to themember, guest, administrator or public service personnel.

At step F8 b, the digital keys sent to the member/guest's electroniccomputer system or device are electronically stored in the keychaindatabase also stored on the device.

The system can operate similar for members as it does for guests, withthe exception that a member can be permitted to create and provideelectronic guest keys to others, granting no more than the member's ownlevel of privileges and/or access. Guest can preferably only use theelectronic key provided by a member or another authorized user of thesystem, but preferably cannot create electronic guest keys for otherguests or permit another electronic device to use the electronic guestkey they were provided with (i.e. cannot forward the electronic guestkey to another guest). However, the system can also be programmed topermit a guest to transfer their electronic guest key to anotherauthorized guest already listed in the system (i.e. husband to wife orvice versa, parent to child, etc.), such as where only one guest key iscreated.

FIG. 9 illustrates how a member or guest would manually choose a keyfrom their device's keychain database to transmit to an access control &location tracking system.

At step F9 a, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe member's/guest's electronic device. The member or guest opens theAccess Control & Location Tracking system application on theirelectronic device and selects the option to manually transmit a key. Theapplication on the device queries the keychain database on said deviceto determine which keys are stored and available for transmission.

At step F9 b, if no access key has been selected for transmission, theapplication on the member or guests electronic device will continue towait for authorization to transmit a selected key.

At step F9 c, f the member or guest selects a key and authorizes itstransmission, the device will retrieve the selected electronic keysstored in the device's keychain database and transmit it to any wirelessradio, sound and/or light-based beacons in an immediate proximity to thecontrolled access area entrance. Preferably, the built in capabilitiesof conventional smartphones/electronic devices can be used, as theycurrently come with Wifi, Bluetooth and sometimes NFC radios or InfraRedsensors, and some also have ultrasonic capable microphones or lifi builtin. If not provided, these technologies can be provided to, downloadedor later acquired by the electronic device. The Access Control andLocation Tracking system, through instructions provided by theprogrammed software, accesses the radios and other communicationhardware available on the electronic device and uses them as needed. Thesoftware can use any communication hardware (i.e. WiFi radios, Bluetoothradios, NFC radios, LiFi, IR, etc.) that is installed on the electronicdevice and can use the various hardware as needed to perform thefunctions of the software.

At step F9 d, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F9 e, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F9 f, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F9 g, the application on the member or guest's electronic deviceupdates the access control & location tracking keychain databaseindicating the usage of the key.

At step F9 h, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and asking the member or guest to select a newkey to transmit.

At step F9 i, the application on the member or guests' electronic devicequeries the access control & location tracking system keychain databasefor any other available keys and the process begins again at F9(b). Ifno other keys are available, the member or guest can then take steps torequest a key as described in FIG. 1 or 12.

FIG. 10 illustrates how a member or guest would manually choose a keyfrom their device's keychain database to transmit to an access control &location tracking system after prompting by a wireless radio, soundand/or light based beacon.

At step F10 a, wireless radio, sound and/or light based beacon(s)transmit a signal that is received by the member or guests electronicdevice. The application installed and running on the member or guests'electronic device will receive the signal from the beacon(s) and prompt,preferably automatically, the member or guest that they are in theproximity of the beacon(s) and to select a key for transmission to thebeacon(s).

At step F10 b, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe device. The member or guest opens the Access Control & LocationTracking system application on their electronic device and selects theoption to manually transmit a key. The application on the device queriesthe keychain database on the device to determine which keys are storedand available for transmission.

At step F10 c, if no access key has been selected for transmission, theapplication on the member or guests electronic device will continue towait for authorization to transmit a selected key.

At step F10 d, if the member or guest selects a key and authorizes itstransmission, the device will retrieve the selected electronic keysstored in the device's keychain database and transmit it to any wirelessradio, sound and/or light-based beacons in an immediate proximity to thecontrolled access area entrance. Preferably, the built in capabilitiesof conventional smartphones/electronic devices can be used, as theycurrently come with Wifi, Bluetooth and sometimes NFC radios or InfraRedsensors, and some also have ultrasonic capable microphones or lifi builtin. If not provided, these technologies can be provided or lateracquired by the electronic device. The Access Control and LocationTracking system, through instructions provided by the programmedsoftware that can be similar to those instructions referenced for FIG.9, accesses the radios and other communication hardware available on theelectronic device and uses them as needed. The software can use anycommunication hardware (i.e. WiFi radios, Bluetooth radios, NFC radios,LiFi, IR, etc.) that is installed on the electronic device and can usethe various hardware as needed to perform the functions of the software.

At step F10 e, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F10 f, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F10 g, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F10 h, the application on the member or guest's electronicdevice updates the access control & location tracking keychain databaseindicating the usage of the key.

At step F10 i, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and asking the member or guest to select a newkey.

At step F10 j, the application on the member or guests' electronicdevice queries the access control & location tracking system keychaindatabase for any other available keys as in F10(b) and the processrepeats from that point. If no other keys are available, the member orguest can then take steps to request a key as described in FIG. 1 or 12.

FIG. 11 illustrates how a key from a member or guests' electronic devicekeychain database is automatically transmitted to an access control &location tracking system after prompting by a wireless radio, soundand/or light based beacon.

At step F11 a, wireless radio, sound and/or light based beacon(s)transmit a signal that is received by the member or guests electronicdevice. The application installed and running on the member or guests'electronic device will receive the signal from the beacon(s) and beginto search for a key to transmit. Each beacon in the system can send outa signal that the application on the electronic device can read. Thatsignal can contain information such as, but not limited to, the name ofthe beacon, the organization it belongs to and location of the beacon.This same location information can be stored in the keys that aregenerated.

At step F11 b, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe device. The member or guest opens or has running, the Access Control& Location Tracking system application on their electronic device andsaid application is or has previously been configured to automaticallytransmit a key(s). The application on the device queries the keychaindatabase on said device to determine which keys are stored and availablefor transmission.

At step F11 c, if no access key exists in the database for thislocation, the member or guest is notified through the access control &location tracking application installed and running on their electronicdevice. The member or guest can then take steps to request a key asdescribed in FIG. 1 or 12.

At step F11 d, if the access control & location tracking systemapplication on the member or guests' electronic device locates a key forthe location, it will retrieve the selected electronic key stored in thedevice's keychain database and transmit it to any wireless radio, soundand/or light-based beacons in an immediate proximity to the controlledaccess area entrance. In one embodiment for locating the key, thesoftware can compare the location and other information it received fromthe beacon to search the keychain database. Preferably, the built incapabilities of conventional smartphones/electronic devices can be used,as they currently come with Wifi, Bluetooth and sometimes NFC radios orInfraRed sensors, and some also have ultrasonic capable microphones orlifi built in. If not provided, these technologies can be provided orlater acquired by the electronic device. The Access Control and LocationTracking system, through instructions provided by the programmedsoftware that can be similar to the those instructions referenced forFIG. 9, accesses the radios and other communication hardware availableon the electronic device and uses them as needed. The software can useany communication hardware (i.e. WiFi radios, Bluetooth radios, NFCradios, LiFi, IR, etc.) that is installed on the electronic device andcan use the various hardware as needed to perform the functions of thesoftware.

At step F11 e, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F11 f, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F11 g, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F11 h, the application on the member or guest's electronicdevice updates the access control & location tracking keychain databaseindicating the usage of the key.

At step F11 i, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and prompting the access control & locationtracking system application to select a new key to transmit.

At step F11 j, the application on the member or guests' electronicdevice queries the access control & location tracking system keychaindatabase for any other available keys as in F11(b) and the processrepeats from that point.

FIG. 12 shows one method for allowing a guest to request a key from amember.

At step F12 a, a guest opens the access control & location trackingsystem application on their electronic device. Preferably the softwareapp is previously downloaded electronic device and can be used atvarious different locations where the system is installed. Furthermore,if the person has used the app in the past for access, the app willalready be on their electronic device for subsequent uses whether at theprevious location or other locations where the system is installed.Through the application, the guest selects or enters the memberinformation for which the guest would like to request a key from. Theguest then selects a button to request a key and a key request istransmitted to the access control & location tracking system through anyavailable form of electronic communication and data transfer includingbut not limited to through a wireless radio, sound or light enabledbeacon, wired or wireless internet connection, voice call, SMS, Email orMMS. Furthermore, other non-limiting examples of ways a guest canrequest a key from a member include, but are not limited to, through amember name directory similar to a call box a community allows a personto scroll through the names of the residents and a method to contactthem. The members' address, phone numbers, email addresses and otherinformation does not need to be shown to the guests in order for theguests to use the system to facilitate communication. The system canalso be configured so that the directory can be turned off if desired,or the directed limited to those who are at the same location as theguest. Also, the software can be provided with an address bookfunctionality to store member and guests names for future use, which canbe useful for a member who needs to frequently issues keys to the sameperson or a guest who frequently requests access from specific people.

At step F12 b, the access control and location computer system recordsthe guest's request and automatically enters it into the access control& location tracking system database. The Access Control & LocationTracking system also retrieves the member's information so that it mayforward the request to the member's electronic device.

At step F12 c, the Access Control & Location Tracking system transmitsthe guest key request to the member's electronic device through anyavailable form of electronic communication and data transfer includingbut not limited to through a wireless radio, sound or light enabledbeacon, wired or wireless internet connection, voice call, SMS, Email orMMS.

At step F12 d, a member receives the guest key request and proceeds toenter any limitations to be placed on guest's access to the controlledarea in the request. An administrator can also be permitted to enteradditional access restrictions for the guest. In one non-limitingembodiment, the system can be programmed to provide a form containing aseries of checkboxes for each location controlled by the system that themember can select from. A date and time module can also be provided forallowing the member to indicate the starting date and time and endingdate and time for the guest's digital key. Further detail on thepermissions and limitations a member can place on a key for a guest isdiscussed in FIG. 7.

At step F12 e, the member transmits the newly created guest key fromtheir electronic device to the Access Control & Location Tracking systemthrough any available form of electronic communication and data transferincluding but not limited to through a wireless radio, sound or lightenabled beacon, wired or wireless internet connection, voice call, SMS,Email or MMS.

At step F12 f, the Access Control & Location Tracking system receivesthe guest key and stores it in the Access Control & Location TrackingSystem Database.

At step F12 g, the access control and location computer system candirectly send the guest an electronic key to their smartphone or otherelectronic device via electronic communication methods including but notlimited to direct data connection, SMS, Email, MMS and voice. Aconfirmation electronic message can be sent to the member to inform themthat their guest's key was approved and sent to the guest.Alternatively, the system can be programmed that the guest key is firstsent to the member, and the member forwards it to the guest. The key isimported to a software application, which can be the same softwareapplication referenced in Step 12(a), which is stored locally on theguest's device. This application acts as an electronic keychain ofaccess keys. Once the guest receives the key, the guest has all accessrights, which have been granted to them by a member, as seen in F2 a,F12 d and FIG. 7. The guest can have a key provided by multiple memberswithin the same Access Control & Location Tracking System location orkeys for multiple locations (with separate instances of the AccessControl & Location Tracking System). As a non-limiting example, if theguest is a service provider (i.e. plumber, electrician, personaltrainer, delivery person, etc.) the guest may need to have keys frommultiple members at any given time. Also in some instances a person canbe a member at one location and a guest at other locations and may havemember key(s) and guest(s) keys on his or her electronic keychaindatabase stored on his or her electronic device.

At step F12 h, the electronic key is electronically stored in the accesscontrol & location tracking keychain database on the guest's device.

FIG. 13 demonstrates how the system determines presence at a location todetermine the proper digital key to utilize at a specific location andtime.

At step F13 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running on their device enters the area,they are preferably constantly within range of a beacon.

At step F13 b, the member or guests wireless radio, sound and/or lightenabled device queries the keychain database stored in their electronicdevice to determine what location the device is currently located at.This query is done based on the identification information received bythe device from the beacon. Preferably, the beacon, at a minimum,transmits a unique identifier to the device. This allows for thebeacon's specific location to be determined or known by the device suchthat the device determines the proper digital key to retrieve from thekeychain database for the specific location. Preferably, the device willalso learn or determine what the power and duration configurationsettings are for the specific location from the signal transmitted bythe beacon for the location and/or from information stored in thekeychain database associated with the specific location.

At step F13 c, the member or guests wireless radio, sound and/or lightenabled device determines what the signal strength is from the receivedsignal transmitted by the wireless radio, sound and/or light-basedbeacon(s). If the received signal strength, which can be measured inDecibels, Signal Strength Percentage or other non-limiting value, is notabove the minimum specified or preprogrammed/preconfigured threshold fora given location as determined in F13 b, the member or guests wirelessradio, sound and/or light enabled device will continue to scan forsignals or transmissions from the wireless radio, sound and/orlight-based beacon(s) and will make similar signal strengthdeterminations for subsequent signals/transmissions it receives. If thereceived signal strength is above the minimum threshold for a givenlocation, the system continues to the next step.

At step F13 d, the member or guests wireless radio, sound and/or lightenabled device begins a timer to determine the length of time that awireless radio, sound and/or light-based beacon's signal is receivedabove the minimum signal strength threshold. If the received signalstrength falls below the minimum threshold before the minimum durationhas elapsed, the member or guests wireless radio, sound and/or lightenabled device will continue to scan for signals or transmissions fromthe wireless radio, sound and/or light-based beacon(s) and will makesimilar signal strength and/or duration determinations for subsequentsignals/transmissions it receives. If the received signal strengthremains above the minimum threshold as determined in F13 b, for longerthan the minimum duration then the member or guests wireless radio,sound and/or light enabled device will transmit the key retrieved n F13b to the access control & location tracking system.

At step F13 e, the access control & location tracking system will updatethe access control & location tracking database regarding valid and/orinvalid signal determinations from steps 13 c and/or 13 d. It can thengrant or deny access based upon the configured permissions for theparticular member or guest.

FIG. 14 demonstrates another method for how the system determinespresence at a location to determine the proper digital key to utilize ata specific location and time.

At step F14 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running on their device enters the area,they are preferably constantly within range of a beacon.

At step F14 b, the member or guests wireless radio, sound and/or lightenabled device queries the keychain database stored in their electronicdevice to determine what location the device is currently located at.This query is done based on the identification information received bythe device from the beacon. Preferably, the beacon, at a minimum,transmits a unique identifier to the device. This allows for thebeacon's specific location to be determined or known by the device suchthat the device determines the proper digital key to retrieve from thekeychain database for the specific location. Preferably, the device willalso learn or determine date and time information.

At step F14 c, the member or guests wireless radio, sound and/or lightenabled device transmits its identification, location and what thesignal strength is from the signal/transmission it received from thewireless radio, sound and/or light-based beacon(s) to the Access Control& Location Tracking System.

At step F14 d, The Access Control & Location Tracking System determineswhat the power and duration configuration settings are for the specificlocation.

At step F14 e, the Access Control & Location Tracking System comparesthe configured settings retrieved in F14 d to the received signalstrength being reported by the member or guests wireless radio, soundand/or light enabled device. If the received signal strength, which canbe measured in Decibels, Signal Strength Percentage or othernon-limiting value, is not above the minimum specified threshold for agiven location as determined above, the Access Control & LocationTracking System will continue to scan for signals or transmissions fromthe member or guests wireless radio, sound and/or light enabled deviceand will make similar signal strength determinations for subsequentsignals/transmissions it receives. If the received signal strength isabove the minimum threshold for a given location, the system continuesto the next step.

At step F14 f, the Access Control & Location Tracking System begins atimer to determine the length of time that a member or guests wirelessradio, sound and/or light enabled device is transmitting a receivedsignal strength from the wireless radio, sound and/or light-basedbeacon(s) above the minimum signal strength threshold. If the receivedsignal strength falls below the minimum threshold before the minimumduration has elapsed, the Access Control & Location Tracking System willcontinue to scan for signals or transmissions from the member or guestswireless radio, sound and/or light enabled device and will make similarsignal strength and/or duration determinations for subsequentsignals/transmissions it receives. If the received signal strength isabove the minimum threshold for a given location, the system willrequest that the digital key be sent by the member or guests wirelessradio, sound and/or light enabled device to the access control &location tracking system.

At F14 g, the member or guests wireless radio, sound and/or lightenabled device transmits the digital key to the Access Control &Location Tracking System. It can then grant or deny access based uponthe configured permissions for the particular member or guest. Theaccess control & location tracking database can also be updated by theaccess control & location tracking system regarding valid and/or invalidsignal determinations made by the access control & location trackingsystem

The system that performs the above described functions and steps caninclude several components including, but not necessarily limited to:

-   -   1. One or more Wireless Radio, Sound and/or Light-based        Beacon(s)    -   2. One or more member/guest electronic computer system or        device(s)    -   3. Access Control & Location Tracking System    -   4. Access Control & Location Tracking System Database    -   5. Access Control & Location Tracking Keychain Database    -   6. A public or private computer network to connect or        communicate the beacons and Access Control & Location tracking        system and database with each other.

The various components can be in electrical and wireless communicationwith each other.

The ability to electronically monitor guest and member access tocontrolled areas will provide significant administrative and financialbenefits incident to operators of controlled access locations. Withoutlimitation, these include the following benefits:

1. Provide members with the ability to remotely allow guests entry,rather than necessitating the transfer of a physical object such as akeycard or conventional mechanical key.

2. Provide guests with real-time mapping and navigation in buildings andneighborhoods.

3. Allow members to confirm their guests have arrived and departed.

4. Reduce security costs by allowing increased automation of securitysystems.

5. Increase safety in controlled access locations by providing real-timedata on the presence of unauthorized persons.

6. Provide public safety personnel with access to controlled locationsin emergency or other necessary situations.

It should be understood that the exemplary embodiments described hereinshould be considered in a descriptive sense only and not for purposes oflimitation. Descriptions of features or aspects within each embodimentshould typically be considered as available for other similar featuresor aspects in other embodiments. While one or more embodiments have beendescribed with reference to the figures, it will be understood by thoseof ordinary skill in the art that various changes in form and detailsmay be made therein without departing from their spirit and scope.

All components of the described system and their locations, electroniccommunication methods between the system components, electronic storagemechanisms, etc. discussed above or shown in the drawings, if any, aremerely by way of example and are not considered limiting and othercomponent(s) and their locations, electronic communication methods,electronic storage mechanisms, etc. can be chosen and used and all areconsidered within the scope of the disclosure.

Unless feature(s), part(s), component(s), characteristic(s) orfunction(s) described in the specification or shown in the drawings fora claim element, claim step or claim term specifically appear in theclaim with the claim element, claim step or claim term, then theinventor does not consider such feature(s), part(s), component(s),characteristic(s) or function(s) to be included for the claim element,claim step or claim term in the claim when and if the claim element,claim step or claim term is interpreted or construed. Similarly, withrespect to any “means for” elements in the claims, the inventorconsiders such language to require only the minimal amount of features,components, steps, or parts from the specification to achieve thefunction of the “means for” language and not all of the features,components, steps or parts describe in the specification that arerelated to the function of the “means for” language.

While the system and method has been described and disclosed in certainterms and has disclosed certain embodiments or modifications, personsskilled in the art who have acquainted themselves with the disclosure,will appreciate that it is not necessarily limited by such terms, nor tothe specific embodiments and modification disclosed herein. Thus, a widevariety of alternatives, suggested by the teachings herein, can bepracticed without departing from the spirit of the disclosure, andrights to such alternatives are particularly reserved and consideredwithin the scope of the disclosure.

What is claimed is:
 1. An electronic system for granting access to anindividual requiring access to a controlled access area with a closedentrance, comprising: a permissions application (“App”) running on aportable electronic device on the person of the individual, the Apphaving instructions to allow the portable electronic device to receiveone or more digital keys with each digital key of the one or moredigital keys providing access to an associated point of the controlledaccess area; an electronic keychain database containing and storing thereceived one or more digital keys; wherein the App containinginstructions to allow the App to electronically determine which digitalkey from the received one or more digital keys is needed for accessing aparticular access point of the controlled access area; and an accesscontrol computer system in communication with the portable electronicdevice, the access control computer system programmed to receive thedigital key determined by the App for accessing the particular accesspoint and electronically granting access to the individual at theparticular access point after receiving the digital key.
 2. Theelectronic system for granting access to an individual of claim 1wherein the access control computer system is programmed toelectronically determine whether the received key is a correct digitalkey for the particular access point prior to electronically grantingaccess to the individual at the particular access point.
 3. Theelectronic system for granting access to an individual of claim 1further comprising an access control database in communication with theaccess control computer for storing electronic information regardinggranting or denial of access by the access control computer system forthe controlled access area.
 4. The electronic system for granting accessto an individual of claim 1 wherein the access control computer systemis programmed to automatically grant access to the individual at theparticular access point upon the access control computer systemreceiving the digital key from the portable electronic device.
 5. Theelectronic system for granting access to an individual of claim 2wherein the access control computer system is programmed toautomatically grant access to the individual at the particular accesspoint upon the access control computer system electronically determiningthat the correct digital key was received from the portable electronicdevice.
 6. The electronic system for granting access to an individual ofclaim 1 further comprising one or more beacons located within thecontrolled access area, each of the one or more beacons programs totransmit received digital keys from the portable electronic device tothe access control computer system for use by the access controlcomputer system in granting or denying access to the individual.
 7. Theelectronic system for granting access to an individual of claim 1wherein the electronic keychain database is located within the portableelectronic device.
 8. An electronic system for granting access to anindividual requiring access to a controlled access area with a closedentrance, comprising: a first permissions application (“first App”)running on a first portable electronic device on the person of a firstindividual, the first App having instructions to allow the firstportable electronic device to receive one or more digital keys with eachdigital key of the one or more digital keys providing access to anassociated point of the controlled access area; a first electronickeychain database containing and storing the received one or moredigital keys; an access control computer system in communication withthe portable electronic device, the access control computer systemprogrammed to receive one or more digital keys transmitted by the firstportable device, a second permissions application (“second App”) runningon a second portable electronic device on the person of a secondindividual; wherein the access control computer system programmed totransmit duplicative digital keys of at least some of the one or moredigital keys to the second App running on the second portable electronicdevice for use by the second individual obtain access to at least aparticular location within the controlled access area.
 9. The electronicsystem for granting access to an individual of claim 8 furthercomprising a second electronic keychain database containing and storingthe duplicative digital keys.
 10. The electronic system for grantingaccess to an individual of claim 8 wherein the first electronic keychaindatabase is located within the first portable electronic device.
 11. Theelectronic system for granting access to an individual of claim 8wherein the first electronic keychain database is located within thefirst portable electronic device and the second electronic keychaindatabase is located within the second portable electronic device. 12.The electronic system for granting access to an individual of claim 8wherein the first App having instructions to allow the first App toselect the second portable electronic device from a plurality ofportable electronic device choices and to forward information regardingthe second portable electronic device to the access control computersystem.
 13. The electronic system for granting access to an individualof claim 12 wherein the access control computer system is programmed toreceive the information concerning the second portable electronic deviceand is programmed to use such information to transmit the duplicativedigital keys to the second portable electronic device.
 14. Theelectronic system for granting access to an individual of claim 8further comprising an access control database in communication with theaccess control computer for storing electronic information regardinggranting or denial of access by the access control computer system forthe controlled access area.
 15. The electronic system for grantingaccess to an individual of claim 8 wherein the access control computersystem is programmed to automatically grant access to the secondindividual at a particular access point upon the access control computersystem receiving a correct digital key of the plurality of duplicativedigital keys from the second portable electronic device.
 16. Theelectronic system for granting access to an individual of claim 8wherein the access control computer system is programmed toautomatically grant access to the second individual at a particularaccess point upon the access control computer system electronicallydetermining that a correct digital key of the plurality of duplicativedigital keys was received from the second portable electronic device.17. The electronic system for granting access to an individual of claim8 further comprising one or more beacons located within the controlledaccess area, each of the one or more beacons programs to transmitreceived digital keys from the first portable electronic device to theaccess control computer system for use by the access control computersystem.
 18. The electronic system for granting access to an individualof claim 8 further comprising one or more beacons located within thecontrolled access area, each of the one or more beacons programs totransmit received duplicative digital keys from the first portableelectronic device to the access control computer system for use by theaccess control computer system.
 19. The electronic system for grantingaccess to an individual of claim 8 wherein the first App havinginstructions to allow the first App to place access restrictions on oneor more of the duplicative digital keys.
 20. The electronic system forgranting access to an individual of claim 8 wherein the access controlcomputer system is programmed to place access restrictions on one ormore of the duplicative digital keys.