Electronic lockbox with interface to other electronic locks

ABSTRACT

An electronic lock system that uses an intermediary controller (“IMC”), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (“WPC”), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC&#39;s memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC&#39;s memory.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of application Ser. No.16/424,880, titled “ELECTRONIC LOCKBOX WITH INTERFACE TO OTHERELECTRONIC LOCKS,” filed on May 29, 2019, now to become U.S. Pat. No.10,846,964, issuing on Nov. 24, 2020; and claims priority to provisionalpatent application Ser. No. 62/679,132, titled “ELECTRONIC LOCKBOX WITHINTERFACE TO OTHER ELECTRONIC LOCKS,” filed on Jun. 1, 2018.

TECHNICAL FIELD

The technology disclosed herein relates generally to electronic locksand electronic lockbox systems and is particularly directed to a systemof the type that includes a wireless portable computer (such as a smartphone, or a tablet computer; electronic products that are sometimesreferred to “smart devices”) that communicates with an electroniclockbox using a low power radio link. Embodiments are specificallydisclosed as using a wireless portable computer (a “WPC”) that includesboth a low power radio to communicate to the lockbox and a wide areanetwork (WAN) radio to communicate to a central computer, and optionallyincludes a Global Positioning System (GPS) receiver to determineapproximate physical location of the lockbox when in communication withthe lockbox. (The central computer in some systems is often referred toas a “central clearinghouse computer” or “CCC”.)

A further embodiment is disclosed involving the wireless portablecomputer that communicates to an electronic lockbox using a low powerradio and that communicates to a central computer using a wide areanetwork radio. In the more advanced functions of this technology, theWPC can comprise a smart phone, which can run application softwareprograms (called “APPS”), to customize the functions executed by thesmart phone, and to allow certain information (including informationresiding on the central computer) to be displayed on the smart phone.

Embodiments are also disclosed as a system having an electronic lockbox(or other type of secure electronic product) that sends identifying datato the WPC via a low power radio, and the WPC relays that data to thecentral computer. Examples of such data include attempted accesses ofthe electronic lock system, including successful attempts; theelectronic equipment typically keeps an “event log” and an “access log”of such access attempts, successful or otherwise.

In many “newer” dwellings or other types of buildings, the access pointsare securely controlled by some type of electronic lock, rather than bya mechanical lock. Such electronic security products will be generallyreferred to herein as “EL”, which reflects their characteristics asbeing electronic locks. Such dwellings/buildings may also contain analarm system in addition to having an electronic lock (an EL).Alternatively, some dwellings/buildings can have a mechanical lock, butstill have an alarm system.

In some situations, such as in real estate sales, a real estate salesagent (such as a REALTOR®) will arrive at a dwelling that is for saleand then “show” that dwelling to a potential buyer (which is typicallyreferred to as a “showing”). To conduct that showing, the real estatesales agent obviously needs to obtain access to the interior spaces ofthat dwelling. In the past, the sales agent (commonly known as the“showing agent”) would obtain access to an electronic lockbox thatcontained a mechanical key to the dwelling door, and then enter thatdwelling. However, if the dwelling is protected by an electronic lock,then a mechanical key would not typically be available, and instead, thesales agent would need an appropriate “App” installed on their WPC andhave the correct credentials for the dwelling owner's electronic lock.The technology disclosed herein will automate that rather bulkyprocedure and provide a seamless interface for both mechanical locks andtheir keys, plus electronic door locks that are increasingly found onproperties.

In some applications for this technology, a different kind of electronic“lock” could be used in lieu of an electronic “lockbox”; andfurthermore, in many applications for this technology, an electroniccontroller (also known as a “system on a chip”) alternatively could beused in lieu of an electronic lockbox. In the new system disclosedherein, the three types of electronic products just described (i.e., thelockbox, the different kind of electronic lock, and the system on achip) can act as an “intermediary controller” (sometimes referred toherein as an “IMC”), which will operate as described below.

In a real estate sales situation using this new system, the showingagent would use his or her WPC to communicate to the IMC, which is anelectronic product that is typically installed by another real estatesales agent (commonly known as the “listing agent”). The IMC would firstauthenticate the showing agent's WPC and any other information that theshowing agent is required to provide; if everything is in order, thenthe IMC (or the WPC) will communicate with the dwelling's electroniclock (the EL), to establish a communications session between the IMC andthe EL. During that session, the IMC (or the WPC) will send theappropriate information to the EL that will authenticate the IMC to theEL, and the EL will respond by allowing the showing agent to obtainaccess to the dwelling.

In the above example using this new system, there would need to be aprevious “setup” procedure performed between the IMC and the EL. In atypical real estate sales situation, for example, the listing agent (whotypically owns the IMC) would install the IMC (e.g., an electroniclockbox or a system on a chip) at the site of the specific dwelling thatis being protected by the EL. During a “setup” session, the IMC would beloaded with the necessary data that will later allow the IMC (or theWPC) to communicate with the EL, and also to send the appropriateprotocol and security code information to the EL so that the EL willopen for a later showing agent who has the appropriate authorization.

The types of buildings and human personnel that can use this system isnot limited to real estate sales. Dwellings could be accessed by medicalcaregivers, for example, to visit human occupants of those dwellings;the dwelling is not “on sale” in that situation. Dwellings and otherbuilding could be accessed by government inspectors or utility companypersonnel, for example, particularly in large housing projects, orperhaps in relatively remote areas where infrequent visits are needed tobuildings that are either unmanned or are manned only at certain timesor certain days of the week.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

None.

BACKGROUND

Traditionally, lockboxes have stored a physical key for use by a thirdparty (a showing agent, for example) to enter a dwelling or a building.Newer electronic locks may not necessarily use a physical key, butrather a digital key (e.g., a numeric code) that is relayed wirelesslyto the electronic lock. In order to access a dwelling or buildingprotected by such an electronic lock, a traditional lockbox may be oflimited value, because there may be no physical key available.

Even the “newer” conventional lockboxes that have wirelesscommunications ability may be of limited utility, although some suchlockboxes may at least be able to send a message to an electronic key,in which that message might provide unlocking codes that could bedisplayed to a human user, for use in disarming the electronic lock onthat dwelling or building. In that scenario, the human user would stillbe required to enter the “code” information at the building's electroniclock, which is an additional step that could be prone to human error.

SUMMARY

Accordingly, it is an advantage to provide an electronic locking systemin which an electronic intermediary controller is used to communicate toa wireless portable computer (a “WPC”) such as a smart phone, and theelectronic intermediary controller (or the WPC) is used to communicateto an electronic lock that protects a dwelling or other type ofbuilding, in which the human USER only needs to have authorization toaccess the electronic intermediary controller, and the system willautomatically obtain access to the electronic lock that protects thedwelling/building.

It is another advantage to provide an electronic locking system in whichan electronic lockbox (acting as an intermediary controller) is used tocommunicate to a wireless portable computer such as a smart phone, andthe electronic lockbox (or the WPC) is used to communicate to anelectronic lock that protects a dwelling or other type of building, inwhich the human USER only needs to have authorization to access theelectronic lockbox, and the system will automatically obtain access tothe electronic lock that protects the dwelling/building.

Additional advantages and other novel features will be set forth in partin the description that follows and in part will become apparent tothose skilled in the art upon examination of the following or may belearned with the practice of the technology disclosed herein.

To achieve the foregoing and other advantages, and in accordance withone aspect, an electronic lockbox system is provided, which comprises:(a) an electronic lockbox, the electronic lockbox comprising a firstprocessing circuit, a first memory circuit including instructionsexecutable by the first processing circuit, a first short range wirelesscommunications circuit, and a secure compartment at least a portion ofwhich is movable and is under the control of the first processingcircuit, wherein the electronic lockbox is assigned to a specificproperty; (b) a portable computer, the portable computer comprising asecond processing circuit, a second memory circuit includinginstructions executable by the second processing circuit, a display, auser operated input circuit, and a second short range wirelesscommunications circuit; and (c) an electronic lock used to protect thespecific property, the electronic lock comprising a third processingcircuit, a third memory circuit including instructions executable by thethird processing circuit, a third short range wireless communicationscircuit, and a physical lock that is under the control of the thirdprocessing circuit; (d) wherein the first, second, and third processingcircuits are configured: (i) to connect between the portable computerand the electronic lockbox, by communicating first data messages betweenthe first and second short range wireless communications circuits, thefirst data messages including first security information; (ii) at theelectronic lockbox, to perform a credentials authorization routine usingthe first processing circuit to analyze the first security informationreceived from the portable computer; (iii) if the portable computer hassent valid credentials, then to connect between the electronic lockboxand the electronic lock, by communicating second data messages betweenthe first and third short range wireless communications circuits, thesecond data messages including second security information that waspreviously stored in the first memory circuit; (iv) at the electroniclock, to perform a security authorization routine using the thirdprocessing circuit to analyze the second security information receivedfrom the electronic lockbox; and (v) if the electronic lockbox has sentvalid security information, then at the electronic lock, to authorizethe electronic lockbox to send predetermined commands that will beobeyed by the electronic lock.

In accordance with another aspect, a wireless controller remote lockingsystem is provided, which comprises: (a) wireless controller, thewireless controller comprising a first processing circuit, a firstmemory circuit including instructions executable by the first processingcircuit, and a first short range wireless communications circuit,wherein the wireless controller is assigned to a specific property; (b)a portable computer, the portable computer comprising a secondprocessing circuit, a second memory circuit including instructionsexecutable by the second processing circuit, a display, a user operatedinput circuit, and a second short range wireless communications circuit;and (c) an electronic lock used to protect the specific property, theelectronic lock comprising a third processing circuit, a third memorycircuit including instructions executable by the third processingcircuit, a third short range wireless communications circuit, and aphysical lock that is under the control of the third processing circuit;(d) wherein the first, second, and third processing circuits areconfigured: (i) to connect between the portable computer and thewireless controller, by communicating first data messages between thefirst and second short range wireless communications circuits, the firstdata messages including first security information; (ii) at the wirelesscontroller, to perform a credentials authorization routine using thefirst processing circuit to analyze the first security informationreceived from the portable computer; (iii) if the portable computer hassent valid credentials, then to connect between the wireless controllerand the electronic lock, by communicating second data messages betweenthe first and third short range wireless communications circuits, thesecond data messages including second security information that waspreviously stored in the first memory circuit; (iv) at the electroniclock, to perform a security authorization routine using the thirdprocessing circuit to analyze the second security information receivedfrom the wireless controller; and (v) if the wireless controller hassent valid security information, then at the electronic lock, toauthorize the wireless controller to send predetermined commands thatwill be obeyed by the electronic lock.

In accordance with yet another aspect, a method for setting up anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) connecting the portable computer to the intermediary controller bycommunicating first data messages between the first and second shortrange wireless communications circuits, the first data messagesincluding first security information; (ii) performing a credentialsauthorization routine using the first processing circuit of theintermediary controller, to analyze the first security informationreceived from the portable computer; (iii) if the portable computer hassent valid credentials, then identifying a specific type of theelectronic lock, including lock protocol information; (iv) afteractivating the electronic lock, sending second security information fromthe portable computer to the electronic lock, first by communicatingsecond data messages between the first and second short range wirelesscommunications circuits, then by communicating third data messagesbetween the second and third short range wireless communicationscircuits, the second security information including at least a securitycode and lock protocol information pertaining to the electronic lock;(v) if the electronic lock validates the second security information,then sending a notification of the successful validation to the portablecomputer from the electronic lock, using the first, second, and thirdshort range wireless communications circuits; and (vi) storing secondsecurity information in the first memory circuit, for later use by otherauthorized visitors at the specific property.

In accordance with still another aspect, an electronic lockbox system isprovided, which comprises: (a) an electronic lockbox, the electroniclockbox comprising a first processing circuit, a first memory circuitincluding instructions executable by the first processing circuit, afirst short range wireless communications circuit, and a securecompartment at least a portion of which is movable and is under thecontrol of the first processing circuit, wherein the electronic lockboxis assigned to a specific property; (b) a portable computer, theportable computer comprising a second processing circuit, a secondmemory circuit including instructions executable by the secondprocessing circuit, a display, a user operated input circuit, and asecond short range wireless communications circuit; and (c) an alarmcontrol panel used to protect the specific property, the alarm controlpanel comprising a third processing circuit, a third memory circuitincluding instructions executable by the third processing circuit, and athird short range wireless communications circuit; (d) wherein thefirst, second, and third processing circuits are configured: (i) toconnect between the portable computer and the electronic lockbox, bycommunicating first data messages between the first and second shortrange wireless communications circuits, the first data messagesincluding first security information; (ii) at the electronic lockbox, toperform a credentials authorization routine using the first processingcircuit to analyze the first security information received from theportable computer; (iii) if the portable computer has sent validcredentials, then to connect between the electronic lockbox and thealarm control panel, by communicating second data messages between thefirst and third short range wireless communications circuits, the seconddata messages including second security information that was previouslystored in the first memory circuit; (iv) at the alarm control panel, toperform a security authorization routine using the third processingcircuit to analyze the second security information received from theelectronic lockbox; and (v) if the electronic lockbox has sent validsecurity information, then at the alarm control panel, to authorize theelectronic lockbox to send a predetermined command that will disarm thealarm control panel.

In accordance with a further aspect, a method for operating anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) storing, at the intermediary controller, an electronic lockauthorization credential pertaining to the electronic lock; (ii)communicating data messages between the portable computer and theintermediary controller, and performing an authentication routinebetween the intermediary controller and the portable computer; (iii) ifthere is a successful authentication between the intermediary controllerand the portable computer, then communicating the electronic lockauthorization credential from the intermediary controller to theelectronic lock; and (iv) after the electronic lock has received validelectronic lock authorization credential from the intermediarycontroller, then sending at least one predetermined command that will beobeyed by the electronic lock.

In accordance with a yet further aspect, a method for operating anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) pairing the intermediary controller with the electronic lock; (ii)sending pairing information and protocol information relating to theoperation of the electronic lock from the portable computer, undercontrol of an ADMIN, to the intermediary controller; and (iii) storingthe pairing information and protocol information in the first memorycircuit for later use by a USER who will attempt to open the electroniclock.

In accordance with still a further aspect, an electronic lockbox systemis provided, which comprises: (a) an electronic lockbox, the electroniclockbox comprising a first processing circuit, a first memory circuitincluding instructions executable by the first processing circuit, afirst short range wireless communications circuit, and a securecompartment at least a portion of which is movable and is under thecontrol of the first processing circuit, wherein the electronic lockboxis assigned to a specific property; (b) a portable computer, theportable computer comprising a second processing circuit, a secondmemory circuit including instructions executable by the secondprocessing circuit, a display, a user operated input circuit, and asecond short range wireless communications circuit; and (c) anelectronic lock used to protect the specific property, the electroniclock comprising a third processing circuit, a third memory circuitincluding instructions executable by the third processing circuit, athird short range wireless communications circuit, and a physical lockthat is under the control of the third processing circuit; (d) whereinthe first, second, and third processing circuits are configured: (i) toconnect between the portable computer and the electronic lockbox, bycommunicating first data messages between the first and second shortrange wireless communications circuits, the first data messagesincluding first security information; (ii) at the electronic lockbox, toperform a credentials authorization routine using the first processingcircuit to analyze the first security information received from theportable computer; (iii) if the portable computer has sent validcredentials, then to connect between the electronic lock and at leastone of the electronic lockbox and the portable computer, bycommunicating second data messages between at least two of the first,second, and third short range wireless communications circuits, thesecond data messages including second security information that waspreviously stored in the first memory circuit; (iv) at the electroniclock, to perform a security authorization routine using the thirdprocessing circuit to analyze the second security information; and (v)if at least one of the electronic lockbox and the portable computer hassent valid security information, then at the electronic lock, toauthorize at least one of the electronic lockbox and the portablecomputer to send predetermined commands that will be obeyed by theelectronic lock.

In accordance with another aspect, a wireless controller remote lockingsystem is provided, which comprises: (a) a wireless controller, thewireless controller comprising a first processing circuit, a firstmemory circuit including instructions executable by the first processingcircuit, and a first short range wireless communications circuit,wherein the wireless controller is assigned to a specific property; (b)a portable computer, the portable computer comprising a secondprocessing circuit, a second memory circuit including instructionsexecutable by the second processing circuit, a display, a user operatedinput circuit, and a second short range wireless communications circuit;and (c) an electronic lock used to protect the specific property, theelectronic lock comprising a third processing circuit, a third memorycircuit including instructions executable by the third processingcircuit, a third short range wireless communications circuit, and aphysical lock that is under the control of the third processing circuit;(d) wherein the first, second, and third processing circuits areconfigured: (i) to connect between the portable computer and thewireless controller, by communicating first data messages between thefirst and second short range wireless communications circuits, the firstdata messages including first security information; (ii) at the wirelesscontroller, to perform a credentials authorization routine using thefirst processing circuit to analyze the first security informationreceived from the portable computer; (iii) if the portable computer hassent valid credentials, then to connect between the electronic lock andat least one of the wireless controller and the portable computer, bycommunicating second data messages between at least two of the first,second, and third short range wireless communications circuits, thesecond data messages including second security information that waspreviously stored in the first memory circuit; (iv) at the electroniclock, to perform a security authorization routine using the thirdprocessing circuit to analyze the second security information; and (v)if at least one of the wireless controller and the portable computer hassent valid security information, then at the electronic lock, toauthorize at least one of the wireless controller and the portablecomputer to send predetermined commands that will be obeyed by theelectronic lock.

In accordance with yet another aspect, a method for operating anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) connecting the portable computer to the intermediary controller bycommunicating first data messages between the first and second shortrange wireless communications circuits, the first data messagesincluding first security information; (ii) performing a credentialsauthorization routine using the first processing circuit of theintermediary controller, to analyze the first security informationreceived from the portable computer; (iii) if the portable computer hassent valid credentials, then identifying a specific type of theelectronic lock, including lock protocol information; (iv) afteractivating the electronic lock, sending second security information tothe electronic lock, first by communicating second data messages betweenthe first and second short range wireless communications circuits, thenby communicating third data messages between the third short rangewireless communications circuit, and at least one of the first andsecond short range wireless communications circuits, the second securityinformation including at least a security code using appropriate lockprotocol information pertaining to the electronic lock; (v) if theelectronic lock validates the second security information, then sendinga notification of the successful validation to at least one of theintermediary controller and the portable computer, using at least two ofthe first, second, and third short range wireless communicationscircuits; and (vi) storing the second security information in the firstmemory circuit, for later use by other authorized visitors at thespecific property.

In accordance with still another aspect, an electronic lockbox system isprovided, which comprises: (a) an electronic lockbox, the electroniclockbox comprising a first processing circuit, a first memory circuitincluding instructions executable by the first processing circuit, afirst short range wireless communications circuit, and a securecompartment at least a portion of which is movable and is under thecontrol of the first processing circuit, wherein the electronic lockboxis assigned to a specific property; (b) a portable computer, theportable computer comprising a second processing circuit, a secondmemory circuit including instructions executable by the secondprocessing circuit, a display, a user operated input circuit, and asecond short range wireless communications circuit; and (c) an alarmcontrol panel used to protect the specific property, the alarm controlpanel comprising a third processing circuit, a third memory circuitincluding instructions executable by the third processing circuit, and athird short range wireless communications circuit; (d) wherein thefirst, second, and third processing circuits are configured: (i) toconnect between the portable computer and the electronic lockbox, bycommunicating first data messages between the first and second shortrange wireless communications circuits, the first data messagesincluding first security information; (ii) at the electronic lockbox, toperform a credentials authorization routine using the first processingcircuit to analyze the first security information received from theportable computer; (iii) if the portable computer has sent validcredentials, then to connect between the alarm control panel and atleast one of the electronic lockbox and the portable computer, bycommunicating second data messages between at least two of the first,second, and third short range wireless communications circuits, thesecond data messages including second security information that waspreviously stored in the first memory circuit; (iv) at the alarm controlpanel, to perform a security authorization routine using the thirdprocessing circuit to analyze the second security information; and (v)if at least one of the electronic lockbox and the portable computer hassent valid security information, then at the alarm control panel, toauthorize at least one of the electronic lockbox and the portablecomputer to send a predetermined command that will be obeyed by thealarm control panel.

In accordance with a further aspect, a method for operating anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) storing, at the intermediary controller, an electronic lockauthorization credential pertaining to the electronic lock; (ii)communicating data messages between the portable computer and theintermediary controller, and performing an authentication routinebetween the intermediary controller and the portable computer; (iii) ifthere is a successful authentication between the intermediary controllerand the portable computer, then communicating the electronic lockauthorization credential to the electronic lock; and (iv) after theelectronic lock has received valid electronic lock authorizationcredential, then sending at least one predetermined command that will beobeyed by the electronic lock.

In accordance with a yet further aspect, a method for operating anelectronic lock security system is provided, in which the methodcomprises the following steps: (a) providing an intermediary controller,the intermediary controller comprising a first processing circuit, afirst memory circuit including instructions executable by the firstprocessing circuit, and a first short range wireless communicationscircuit, wherein the intermediary controller is assigned to a specificproperty; (b) providing a portable computer, the portable computercomprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, and a second short rangewireless communications circuit; and (c) providing an electronic lockused to protect the specific property, the electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofthe third processing circuit; (d) wherein the first, second, and thirdprocessing circuits are configured to perform the following functions:(i) sending pairing information and protocol information relating to theoperation of the electronic lock, under control of an ADMIN, to theintermediary controller; and (ii) pairing the electronic lock with atleast one of the intermediary controller and the portable computer;(iii) storing the pairing information and protocol information in thefirst memory circuit for later use by a USER who will attempt to openthe electronic lock.

Still other advantages will become apparent to those skilled in this artfrom the following description and drawings wherein there is describedand shown a preferred embodiment in one of the best modes contemplatedfor carrying out the technology. As will be realized, the technologydisclosed herein is capable of other different embodiments, and itsseveral details are capable of modification in various, obvious aspectsall without departing from its principles. Accordingly, the drawings anddescriptions will be regarded as illustrative in nature and not asrestrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings incorporated in and forming a part of thespecification illustrate several aspects of the technology disclosedherein, and together with the description and claims serve to explainthe principles of the technology. In the drawings:

FIG. 1 is a schematic block diagram of the electrical components of anelectronic lockbox, as constructed according to the principles of thetechnology disclosed herein.

FIG. 2 is a diagrammatic view of the major components of a firstembodiment of an electronic lockbox security system, including a centralcomputer station, a wireless portable computer, and a portableelectronic lockbox apparatus such as that depicted in FIG. 1.

FIG. 3 is a diagrammatic view of the major components of a wirelesscontroller that is also known as a “system on a chip” that can be usedin some embodiments instead of using an electronic lockbox.

FIG. 4 is a block diagram showing some of the major hardware componentsof an electronic lockbox that communicates with a wireless portableelectronic key, such as a “smart phone,” and that also is able tocommunicate with an identification device, such as an RFID transceivercircuit, as constructed according to the principles of the technologydisclosed herein.

FIG. 5 is a block diagram showing some of the major hardware componentsof a portable electronic key that is capable of wireless communicationwith one of the electronic lockboxes of FIG. 1 or FIG. 4, for example,and that is capable of wireless communication with a wide area network,such as a cellular telephone system.

FIG. 6 is a perspective view of a stationary electronic lockbox, whichincludes the hardware components that are depicted in FIG. 1 or FIG. 4,for example.

FIG. 7 is a block diagram of an overview of a system that includes acentral computer, a wireless portable computer, and at least oneelectronic lock, as used in a system according to the principles of thetechnology disclosed herein.

FIG. 8 is a diagrammatic view showing a typical installation of alockbox or other type of electronic lock which uses two concentricgeofences, and used in the system of FIG. 7.

FIG. 9 is a diagrammatic view showing a typical installation of alockbox or other type of electronic lock which uses one concentricgeofence, and used in the system of FIG. 7.

FIG. 10 is a flow chart of some of the steps executed during a setupprocedure, as part of the control logic for the technology disclosedherein.

FIG. 11 is a flow chart of some of the steps executed during accessingan electronic lock, as part of the control logic for the technologydisclosed herein, in which an automatic relock command is sent to one ofthe electronic locks based on geofence parameters.

FIG. 12 is a flow chart of some of the steps executed during accessingan electronic lock, as part of the control logic for the technologydisclosed herein, in which an automatic relock command is sent to one ofthe electronic locks based on velocity of the wireless portablecomputer.

DETAILED DESCRIPTION

Reference will now be made in detail to the present preferredembodiment, an example of which is illustrated in the accompanyingdrawings, wherein like numerals indicate the same elements throughoutthe views.

It is to be understood that the technology disclosed herein is notlimited in its application to the details of construction and thearrangement of components set forth in the following description orillustrated in the drawings. The technology disclosed herein is capableof other embodiments and of being practiced or of being carried out invarious ways. Also, it is to be understood that the phraseology andterminology used herein is for the purpose of description and should notbe regarded as limiting. The use of “including,” “comprising,” or“having” and variations thereof herein is meant to encompass the itemslisted thereafter and equivalents thereof as well as additional items.Unless limited otherwise, the terms “connected,” “coupled,” and“mounted,” and variations thereof herein are used broadly and encompassdirect and indirect connections, couplings, and mountings. In addition,the terms “connected” and “coupled” and variations thereof are notrestricted to physical or mechanical connections or couplings.

The terms “first” and “second” preceding an element name, e.g., firstinlet, second inlet, etc., are used for identification purposes todistinguish between similar or related elements, results or concepts,and are not intended to necessarily imply order, nor are the terms“first” and “second” intended to preclude the inclusion of additionalsimilar or related elements, results or concepts, unless otherwiseindicated.

In addition, it should be understood that embodiments disclosed hereininclude both hardware and electronic components or modules that, forpurposes of discussion, may be illustrated and described as if themajority of the components were implemented solely in hardware.

However, one of ordinary skill in the art, and based on a reading ofthis detailed description, would recognize that, in at least oneembodiment, the electronic based aspects of the technology disclosedherein may be implemented in software. As such, it should be noted thata plurality of hardware and software-based devices, as well as aplurality of different structural components, may be utilized toimplement the technology disclosed herein.

It will be understood that the term “circuit” as used herein canrepresent an actual electronic circuit, such as an integrated circuitchip (or a portion thereof), or it can represent a function that isperformed by a processing device, such as a microprocessor or an ASICthat includes a logic state machine or another form of processingelement (including a sequential processing device). A specific type ofcircuit could be an analog circuit or a digital circuit of some type,although such a circuit possibly could be implemented in software by alogic state machine or a sequential processor. In other words, if aprocessing circuit is used to perform a desired function used in thetechnology disclosed herein (such as a demodulation function), thenthere might not be a specific “circuit” that could be called a“demodulation circuit;” however, there would be a demodulation“function” that is performed by the software. All of these possibilitiesare contemplated by the inventor, and are within the principles of thetechnology when discussing a “circuit.”

Setup of Main System

Each user in the system installs application software (known as an“APP”) on their wireless portable computer (e.g., a wireless portablecomputer, electronic key, or a smart phone that may include a GPSreceiver, or other type of mobile device) that communicates with thecentral clearinghouse computer (CCC) over the wide area network (WAN).The application (APP) identifies itself to the CCC via user logincredentials and can remain active on the user's portable communicationcircuit to receive notifications and data from the CCC in near real time(assuming the portable device is in communication range with a cellulartower, or other type of communications node).

In one embodiment, the application on the portable communication devicerelies on GPS information to determine when it is appropriate to senddata to the user's device based on the activity of the user's agent orrepresentative. Most real estate agents have multiple clients, andtherefore the CCC must be able to track which client the agent isworking with at the time to send the proper data to various users of thesystem. In the case of seller's agents being matched with sellers, thesystem utilizes the location of the lockbox, whether pre-assigned by theseller's agent in the CCC database or by GPS information collectedthrough accesses of one or more buyer's agents. For buyer's agents, theCCC identifies both the buyer's agent and the prospective buyer bymatching their respective GPS locations and times corresponding toaccess events at the lockbox. That is, the buyer would obviously bepresent at the physical location with the buyer's agent during theprocess of a home showing; therefore, both would have GPS locations thatare proximally close to one another.

The method of relationship identification discussed above requireslittle if any user intervention. It should be noted that one or morebuyers or sellers can be automatically associated with their respectiverepresentative, e.g., a husband and wife desiring data notificationsresponsive to events at the lockbox. Once the relationship is determinedby the CCC, future data can be pushed to multiple portable communicationdevices even if only one participant is present at the showing.

Central Computer

Terminology herein relating to the central computer (CCC) should beunderstood to encompass one or more physical computers, either togetherat a single location, or computers that are geographically diverse butthat work in concert with one another, to store, retrieve, and otherwiseprocess information relevant to operation of the “system.” In today'scomputing parlance, “the cloud” is one possible representation of acomputing platform equivalent to that carried out by the CCC in thisdisclosure. In the real estate sales technical field, the CCC issometimes referred to herein as a “central computer” or a “clearinghousecomputer.”

The CCC will include memory storage products that can hold one or moredatabases of information; usually one of the databases is updated withnew information almost every time a sales agent or a sales prospectcommunicates with the CCC, under the control of the operating softwareof the CCC itself. In some applications, as described below, a newdatabase is “started” in the memory of the CCC by certain types ofcommunications and transactions that are initiated by a sales agent orprospect. In many descriptions of this type of equipment, the “database”of the CCC actually represents multiple individual database structures,when viewed from a computer science standpoint—and these are often“relational databases” at that. However, the existence of severaldatabase structures is still referred to as a singular tense “database”at times, even though it is understood that a single huge databasereally comprises more than one type of store of information at the CCC.

Electronic Lockboxes

Referring now to the drawings, FIG. 1 illustrates an exemplaryembodiment of an electronic lockbox generally designated by thereference numeral 10, which is suitable for use with the technologydisclosed herein. Lockbox 10 has an outer housing, which includes akeypad 14 (see FIG. 2), and the housing includes a movable keycompartment door 32 (see FIG. 2). The upper housing of lockbox 10includes two receptacles (not shown) that receive a shackle 40 (see FIG.2). The shackle 40 has an upper portion 46, and two shackle extensions(not visible in FIG. 2) that fit through the receptacles. It should benoted that the keypad 14 may also be referred to as a “data inputcircuit,” in which a human user may press one or more of the keys toenter data, such as numeric information.

The electronic circuitry of electronic lockbox 10 is illustrated inblock diagram form in FIG. 1. In this illustrated embodiment, electroniclockbox 10 includes a microprocessor (CPU) 16, FLASH memory 21, randomaccess memory (RAM) 22, EEPROM (electrically erasable programmable readonly memory) 23, a battery (or other electrical power supply) 18, amemory backup capacitor 26, an ISO-7816 smart card connector 17,indicator LED lamps 19, a piezo buzzer 20, a crystal oscillator 15, adigital temperature sensor 11 (these last two devices can be combinedinto a single chip), a shackle drive circuit 24, a shackle releasemechanism 13, a key compartment mechanism drive circuit 25, a keycompartment lock/release mechanism 12, and a membrane style keypad 14for user data entry. An impact sensor 56 can also be included inelectronic lockbox 10, to detect abnormal mechanical forces that mightbe applied to the device.

An input/output (I/O) interface circuit 30 is included to provide signalconditioning as needed between the CPU 16 and other components thattypically use voltage and/or current levels that are not typically ableto hook up directly to a processing device, such as sensors and outputdevice driver circuits. Each appropriate I/O signal is directed througha separate channel of the I/O interface circuit 30, unless perhaps morethan one signal of a particular voltage and current rating can bemultiplexed, in which case a multiplexer circuit can be included in theI/O interface circuit 30. The data signals between I/O circuit 30 andthe CPU 16 run through a low voltage signal bus 31.

A data interface in the form of a low power radio 27 is included in thisembodiment so that the CPU 16 is able to communicate with other externaldevices, such as a separate wireless portable computer 100 (see FIG. 2)that uses a compatible wireless data link. (The wireless portablecomputer can also be referred to as a “mobile device,” a “WPC”, an“electronic key,” or a “smart phone” in some embodiments of thistechnology.) The wireless portable computer 100 also includes a lowpower radio 127, which communicates with radio 27 using a protocol thatcould be proprietary, if desired. However, the radios 27 and 127 coulduse any number of various communications protocols, such as Bluetooth,although the data structure in the messages between radios 27 and 127certainly could be encrypted, or otherwise formatted in a proprietarymanner Radios 27 and 127 further could comprise other types of wirelesscommunications devices that may not operate on a strictly radioprinciple, including types of wireless communications devices that havenot been invented as of yet. In this description, such wirelesscommunications devices will typically be referred to as “radios;”however, in this patent document they may also be referred to as a“short range wireless communications device,” or a “low power wirelesscommunications device.”

Microprocessor 16 controls the operation of the electronic lockbox 10according to programmed instructions (electronic lockbox controlsoftware) stored in a memory circuit, such as in FLASH memory 21. RAMmemory 22 is typically used to store various data elements such ascounters, software variables and other informational data. EEPROM memory23 is typically used to store more permanent electronic lockbox datasuch as serial number, configuration information, and other importantdata. It will be understood that many different types of microprocessorsor microcontrollers could be used in the electronic lockbox system 10,and that many different types of memory circuits could be used to storedata in both volatile and non-volatile form, without departing from theprinciples disclosed herein. In one mode of an exemplary embodiment, theelectronic lockbox CPU 16 is an 8-bit Atmel Mega8 microcontroller thatincorporates RAM 22, FLASH memory 21 and EEPROM memory 23 internally (ason-board memory).

Battery 18 provides the operating electrical power for the electroniclockbox. Capacitor 26 is used to provide temporary memory retentionpower during replacement of battery 18. It will be understood that analternative electrical power supply could be used if desired, such as asolar panel with the memory backup capacitor.

As noted above, electronic lockbox 10 includes a shackle 40 that istypically used to attach the box 10 to a door handle or other fixedobject. Electronic lockbox 10 also includes a key compartment whichtypically holds a dwelling key (not shown), and which can be accessedvia the key access door 32 (which is also referred to herein as a“controlled access member”).

The key compartment lock and release mechanism 12 uses a gear motormechanism (not shown) that is controlled by drive circuit 25 that inturn is controlled by CPU 16. Shackle release mechanism 13 also uses agear motor, which is controlled by drive circuit 24 that in turn iscontrolled by CPU 16. It will be understood that the release or lockingmechanisms used for the shackle 40 and key compartment 32 can beconstructed of many different types of mechanical or electromechanicaldevices without departing from the principles disclosed herein.

The crystal oscillator 15 provides a steady or near-constant frequency(e.g., at 32.768 kHz) clock signal to CPU 16's asynchronous timer logiccircuit. The ISO-7816 smart card connector 17 connects to electricalcontacts on a “smart card” 70 to allow the exchange of data between theelectronic lockbox's CPU 26 and memory devices 71 in the smart card 70(discussed below in greater detail). The smart card 70 itself typicallywill include some control logic circuits 72, to prevent “easy” orunauthorized access to the memory elements 71 on-board the card 70. Notethat such a smart card is not required in some more advanced versions ofelectronic lockboxes.

It should be noted that an electronic key (such as that described above)could be used as a type of secure memory device for the element atreference numeral 70, rather than a classic “smart card.” Such anelectronic key would also contain memory elements 71, and perhaps wouldcontain some control logic circuits 72, although the control logiccircuits might be optional, depending on the type of electronic keydevice that is used. With regard to FIG. 1, if an electronic key isused, it could be interfaced to the CPU circuit 16 of the electroniclockbox 10 is many different ways, including via an electrical circuitthat makes contact between the lockbox 10 and the electronic key 70(similar to that depicted on FIG. 1), or perhaps via an electromagneticsignal such as a short range radio wave, or an optical signal. As usedherein, the term “electronic key” can have a meaning to include arelatively simple device, such as a secure memory card (or a “smartcard”), and it can have a meaning to include a sophisticated device,such as a laptop computer or a smart phone that has a wirelesscommunications circuit to send and receive messages from other devices,including an electronic lockbox and/or a central computer. A “typical”electronic key will generally be a more sophisticated device.

In one embodiment, the digital temperature sensor 11 is read at regularintervals by the electronic lockbox CPU 16 to determine the ambienttemperature. Crystal oscillator 15 may exhibit a small change inoscillating characteristics as its ambient temperature changes. In onetype of crystal oscillator device, the oscillation frequency driftfollows a known parabolic curve around a 25 degrees C. center. Thetemperature measurements are used by CPU 16 in calculating the drift ofcrystal 15 and thus compensating for the drift and allowing precisetiming measurement regardless of electronic lockbox operatingenvironment temperature. As noted above, a single chip can be used toreplace the combination of crystal oscillator 15 and temperature sensor11, such as a part number DS32KHZ manufactured by Dallas Semiconductor.

The LED indicator lamps 19 and piezo buzzer 20 are included to provideboth an audible and a visual feedback of operational status of theelectronic lockbox 10. Their specific uses are described in detail inother patent documents by the same inventor, as noted below.

The impact sensor 56 can be used to notify an external device, in caseof an attempted removal or other type of damage being done to thelockbox 10, including intentional damage. Such an external device couldcomprise a “base station” as described in detail in other patentdocuments by the same inventor, or it could comprise the wirelessportable computer 100 that is described herein.

Backup capacitor 26 is charged by battery 18 (or perhaps by anotherpower source) during normal operation. Capacitor 26 serves twofunctions, the first of which is to maintain adequate voltage to CPU 16during either shackle drive circuit activation, or lock drive circuitactivation. In an exemplary embodiment, capacitor 26 is charged from theregulated side of voltage regulator in power supply 18, whereas allelectromechanical drive current is derived from the unregulated side ofpower supply 18. Capacitor 26 also maintains a stable voltage to CPU 16during periods of high current drain on power supply 18. The secondfunction of capacitor 26 is to maintain CPU 16 operation and RAM memory22 during a period when the battery 18 is replaced.

Referring now to FIG. 2, a first embodiment electronic lockbox system,generally designated by the reference numeral 250, is depicted. Thesystem 250 includes one or more electronic lockboxes 10, perhaps one ormore secure memory cards (not shown on FIG. 2), wireless portablecomputer devices 100, a central computer system 260 (also sometimesreferred to herein as a “CCC”), and a wireless data communicationssystem, represented by Internet® connections 269 and 282, and a mobilephone provider 281. The central computer 260 typically will include adatabase 262 which contains a repository of electronic lockboxidentification and attribute information, and also contains a repositoryof information about real estate agents. A computer 261 controls thedatabase 262, and includes a processing circuit and a memory circuit (inaddition to any bulk memory storage devices that contain the database262).

Referring again to FIG. 2, an electronic lockbox system of a firstembodiment is depicted in a diagrammatic view. An electronic lockbox 10is depicted in the lower-right corner of FIG. 2, and is showncommunicating to a wireless portable computer 100. As discussed above,wireless portable computer 100 includes a low power radio 127 that cancommunicate data to and from the low power radio 27 of the electroniclockbox 10. Some of the other components of the wireless portablecomputer 100 are depicted on FIG. 2.

In this embodiment, wireless portable computer 100 includes amicroprocessor (CPU) 116, random access memory (RAM) 122, read onlymemory (ROM) 123, and an input/output interface circuit 130. There areseveral devices that are in communication with the input/output (I/O)circuit 130, as discussed immediately below.

The low power radio 127 communicates data to and from the CPU 116, viathe I/O circuit 130. A wide area network (WAN) radio 111 is provided,and it also communicates data to and from the CPU 116, via the I/Ointerface circuit 130. Wireless portable computer 100 also includes asmart card connector 117, which is essentially identical to the smartcard connector 17 that is provided on the electronic lockbox 10.Wireless portable computer 100 also includes a display 119, a keypad114, a power supply 118 (typically a battery), and a motion sensor 156.The motion sensor 156 provides additional capability for the wirelessportable computer 100, as discussed in greater detail below.

Because of its wide area network radio 111, wireless portable computer100 is able to communicate to the clearinghouse computer 260 over a widearea network (WAN), which is generally designated by the referencenumeral 110. Assuming that the mobile communications service provider281 is a cellular telephone system, the wireless portable computer 100will have the capability of essentially immediate communications withthe clearinghouse computer 260 from many, many locations, including mostlocations where an electronic lockbox 10 has been situated. On the otherhand, if a particular electronic lockbox 10 is located in a very remotearea, where there is no cellular telephone connection coverage, then thewide area network 110 therefore would not reach that location, and thewireless portable computer 100 would not be in immediate communicationwith the clearinghouse computer 260.

The wide area network radio 111 further could comprise other types ofwireless communications devices that may not operate on a strictly radioprinciple, including types of wireless communications devices that havenot been invented as of yet. In this description, such wirelesscommunications devices are sometimes referred to as “radios;” however,in this patent document they may also be referred to as a “wide areanetwork wireless communications circuit,” or as a “medium range wirelesscommunications circuit.”

In a preferred mode of the first embodiment depicted on FIG. 2, thewireless portable computer 100 includes a connector 117 that is capableof accepting a secure memory card (such as a “smart card”), so that auser who typically connects his or her secure memory card directly to anelectronic lockbox 10 will also be able to connect the same securememory card to the wireless portable computer 100, and have much thesame results. This will be described in greater detail below. Note thatthe smart card connector can also be referred to as a “data interface”that communicates with a “secure memory device”—a “smart card” is anexample of a secure memory device.

The first radio circuit of the wireless portable computer is the lowpower radio 127 such as Atmel's AT86RF23x series that uses a low powerradio frequency signal. The wireless portable computer also includes asecond radio circuit which is capable of longer range communications forwide area network connectivity, such as Wavecom's WISMO22x series. In apreferred embodiment, the CPU 116 will comprise a low powermicrocontroller, and a relatively low power visual display 119 will beprovided to allow indication of operating status. The motion sensor 156is to be included as an internal motion sensor that is coupled to themicrocontroller (CPU 116). Its capability and use are described below.

The low power communications circuit in the lockbox (e.g. low powerradio 27) provides sufficient range to enable proximal communicationswith a wireless portable computer 100 that is carried by the lockboxsystem user. The built-in wide area communication radio of thetransponder (e.g., WAN radio 111), such as radios used by a cellularcarrier, enables a host of other system features. One desirable featureof this arrangement is for individuals who access an electronic lockboxto be unencumbered with other devices. For example, real estate agentsoften have their hands full when approaching a lockbox, and such anagent that is equipped with a wireless portable computer 100 can enter apersonal identification code on the keypad 114 of the wireless portablecomputer 100. It should be noted that the keypad 114 may also bereferred to as a “data input circuit,” in which a user (e.g., a sales“agent”) may press one or more of the keys to enter data, such asnumeric information.

Such an agent could initially use the wireless portable computer and itskeypad while remaining in a vehicle, for example, and inserting theirsecure memory card into the connector 117 of the wireless portablecomputer 100. In this mode, the agent can prepare his or her wirelessportable computer to be ready to communicate his or her personalidentification code from the transponder 100 to the lockbox 10 over thelow power radio link (between radios 127 and 27), and the electroniclockbox will interpret that radio signal to allow access to the keycompartment door 32. In this manner, the lockbox radio system retrievesdata from the wireless portable computer 100 to facilitate access to thedwelling key that is contained within the secure compartment of theelectronic lockbox 10.

In another operating mode, a secure memory card that is connected tosmart card connector 117 of the wireless portable computer 100 can havedata read from the memory elements of the secure memory card 70 that isconnected to the wireless portable computer 100, and have that data sentto the electronic lockbox over the low power radio link, thereby havingthe secure memory card's data “read” by the electronic lockbox CPU 16.Furthermore, if it is desirable to write data onto the memory elements71 of a secure memory card 70, that function can occur while the securememory card is connected to the smart card connector 117 of the wirelessportable computer 100, by having the low power radio 27 of theelectronic lockbox 10 transfer data to the wireless portable computer100, and the CPU 116 can then write data onto the secure memory card,via the smart card connector 117. This could be accomplished to writethe same types of data that would otherwise be written directly by thelockbox 10 to the secure memory card 70 as it is connected into thesmart card connector 17 of the lockbox itself.

The use of secure memory cards offers many advantages with theelectronic lockbox system for access to the lockbox, which is welldocumented in previous patents and patent applications filed by the sameinventor of this patent document. To further enhance security, thelockbox can use data that the wireless portable computer 100 hasretrieved over its wide area radio system (i.e., the WAN 110), such asthe current (real time) decryption key for use with the secure memorycard. If the wireless portable computer loses contact with the centralcomputer system 260, or if the secure memory card is either lost orstolen, the decryption key update credentials of the wireless portablecomputer can be revoked at the central computer, thereby disablingfurther access to lockboxes by that secure memory card.

The electronic lockbox (either 10 or 800) will have the ability to storea software application program in its memory circuit 21, 23, 23 (or 821,822, 823), and its processing circuit 16 (or 816) can execute theinstructions of that software application program. The flow charts ofFIGS. 10-12 describe some of the important features of such anapplication program.

Lockbox with Wireless Communications

An alternative lockbox design is provided in FIG. 4, which shows many ofthe major electronic components, generally designated by the referencenumeral 800, in a block diagram. Most of the components listed in thisblock diagram are also found in the earlier versions of an electroniclockbox sold by SentriLock, LLC of Cincinnati, Ohio. A brief descriptionof these components follows:

Electronic lockbox 800 includes a microprocessor (CPU) 816, FLASH memory821, random access memory (RAM) 822, EEPROM (electrically erasableprogrammable read only memory) 823, a battery (or other electrical powersupply) 818, a memory backup capacitor 826, an ISO-7816 smart cardconnector 817, indicator LED lamps 819, a piezo buzzer 820, a crystaloscillator 815, a digital temperature sensor 811 (these last two devicescan be combined into a single chip) a shackle drive circuit 824, ashackle release mechanism 813, a key compartment mechanism drive circuit825, a key compartment lock/release mechanism 812, and a membrane stylekeypad 814 for user data entry.

A serial interface 827 is also included so that the CPU 16 is able tocommunicate with other external devices, such as a separate portablecomputer in the form of a PDA (personal digital assistant) or other typeof portable computing device that uses a serial data link. For example,serial interface 827 can comprise in infrared (IR) port thatcommunicates with a standard IR port found on many PDA's; or it coulduse a different communications protocol, such as Bluetooth. A low powerradio 804 is included for communications with a portable electronic key(not shown on FIG. 4). This radio 804 could have any number of types ofcommunications protocols, including one that allows the lockbox 800 toexchange data with an electronic key in the form of a smart phone. Aspecial software application program (an “APP”) would run on the smartphone, to allow it to communicate with lockbox 800.

Microprocessor 816 controls the operation of the electronic lockbox 800according to programmed instructions (electronic lockbox controlsoftware) stored in a memory device, such as in FLASH memory 821. RAMmemory 822 is typically used to store various data elements such ascounters, software variables and other informational data. EEPROM memory823 is typically used to store more permanent electronic lockbox datasuch as serial number, configuration information, and other importantdata. It will be understood that many different types of microprocessorsor microcontrollers could be used in the electronic lockbox 800, andthat many different types of memory devices could be used to store datain both volatile and non-volatile form, without departing from theprinciples of this technology. In one mode of an exemplary embodiment,the electronic lockbox CPU 816 is an 8-bit Atmel Mega8 microcontrollerthat incorporates RAM 822, FLASH memory 821 and EEPROM memory 823internally (as on-board memory).

Battery 818 provides the operating electrical power for the electroniclockbox. Capacitor 826 is used to provide temporary memory retentionpower during replacement of battery 818. It will be understood that analternative electrical power supply could be used if desired, such as asolar panel with the memory backup capacitor.

An input/output (I/O) interface circuit 802 is provided so themicroprocessor 816 can exchange data and operational signals withexternal devices, or with integral devices to the lockbox that requiregreater power than can be directly supplied by the microprocessor'spinouts. This puts the I/O circuit 802 in the pathway for virtually allsignals that are used in the controlling of lockbox 800, including thedata signals that are involved with the serial interface 827, the smartcard connector 817, and the low power radio 804.

Electronic lockbox 800 generally includes a shackle (see item 946 onFIG. 5) that is typically used to attach the lockbox 800 to a doorhandle or other fixed object. However, it should be noted thatstationary versions of these electronic lockboxes are now available thatare permanently affixed to buildings, or other large object, and suchstationary versions do not require shackles. One such stationary lockboxis illustrated in FIG. 6—see description below.

Electronic lockbox 800 also includes a key compartment which typicallyholds a dwelling key (not shown), and which can be accessed via a keyaccess door 32 (see FIG. 2), or a key access door 944 (see FIG. 5). Notethat the structure called a “key access door” is also sometimes referredto herein as a “controlled access member.” The key compartment's lockand release mechanism 812 uses a motor mechanism (not shown) that iscontrolled by drive circuit 825 that in turn is controlled by CPU 816.Shackle release mechanism 813 also uses a motor, which is controlled bydrive circuit 824 that in turn is controlled by CPU 816. It will beunderstood that the release or locking mechanisms used for the shackleand key compartment can be constructed of many different types ofmechanical or electromechanical devices without departing from theprinciples of the technology disclosed herein. It will also beunderstood that, in some physical locations, the lockbox may not requirecertain components that have been described above; for example, in somecircumstances, a lockbox may not require a shackle, or it may notrequire a smart card reader.

The crystal oscillator 815 provides a steady or near-constant frequency(e.g., at 32.768 kHz) clock signal to CPU 816's asynchronous timer logiccircuit. The ISO-7816 smart card connector 817 connects to smart cardcontacts to allow the exchange of data between the electronic lockbox'sCPU 816 and the memory devices in the smart card. Note that, in today'smore advanced lockboxes that are capable of wireless communications withan electronic key or a smart phone, the smart card connector 817 canbecome an optional feature, since it would be rarely used, if ever bymost human users.

In one embodiment, the digital temperature sensor 811 is read at regularintervals by the electronic lockbox CPU 816 to determine the ambienttemperature. Crystal oscillator 815 may exhibit a small change inoscillating characteristics as its ambient temperature changes. In onetype of crystal oscillator device, the oscillation frequency driftfollows a known parabolic curve around a 25 degrees C. center. Thetemperature measurements are used by CPU 16 in calculating the drift ofcrystal oscillator 815 and thus compensating for the drift and allowingprecise timing measurement regardless of electronic lockbox operatingenvironment temperature. As noted above, a single chip can be used toreplace the combination of crystal oscillator 815 and temperature sensor811, such as a part number DS32KHZ manufactured by Dallas Semiconductor.

LED indicator lamps 819 and a piezo buzzer 820 are included to provideboth an audible and a visual feedback of operational status of theelectronic lockbox 800. Their specific uses are described in detail inother patent documents by the same inventor. Backup capacitor 826 ischarged by battery 818 (or perhaps by another power source) duringnormal operation.

The lockbox 800 can also be optionally equipped with a transceiver 828that works with near field communications (“NFC”) equipment, and perhapscould be used to detect RFID chips, for example. In addition, such NFCcircuits may be used for communicating with many other electronicproducts that have become common at many commercial establishments; somuch so that most new smart phones are equipped with such an NFCtransceiver (which typically includes a low-power microcontrollercircuit).

Electronic Key

Referring now to FIG. 5, a block diagram is provided for showing many ofthe major electronic components of an electronic key, generallydesignated by the reference numeral 900. Part of FIG. 5 alsodiagrammatically shows certain other system components, such as a widearea network 910 and an electronic lockbox 940. This particular lockboxincludes a housing 942, a movable door 944 that covers a securecompartment beneath its surface, a shackle 946, and a keypad 948 forentering data via a human user. It should be noted that alternativelockbox designs are available that have no shackle whatsoever, and thathave a different type of secure compartment in which at least a portionof the entire secure compartment is movable.

The electronic key 900 includes a microprocessor 916, which typicallyhas on-board memory and interface components. On FIG. 5, the on-boardmemory circuit includes some RAM at 922, and ROM (or EEPROM) at 923. Aninput/output (I/O) interface circuit is depicted at 930. These on-boardhardware components can be similar to those of the electronic lockbox,if desired. However, they are more likely to be part of a smart phone,which typically has very highly capable processing power and relativelylarge memory capacity.

Other hardware components of electronic key 900 include a power supply918 (typically a battery), a display 919, a keypad 914 (which typicallyis part of a touch screen display, particularly if the electronic key isa smart phone and the display viewing area is large), a wide areanetwork (WAN) radio circuit 911, and a low power radio circuit 927. Thetwo radio circuits each have their own built-in antennas, as requiredfor their broadcast and receive frequencies. The WAN radio 911 isdesigned to communicate with a wide area network, generally designatedby the reference numeral 910; if electronic key 900 is a smart phone,for example, then the wide area network would generally be a cellulartelephone network.

The low power radio circuit 927 is designed to communicate with one ofthe lockboxes of the overall security system. More specifically, thelower power radio 927 will exchange data messages with the low powerradio circuit 804 of an electronic lockbox 800, as depicted on FIG. 4,or perhaps with the low power radio circuit 27 of an electronic lockbox10, as depicted on FIG. 1. In the present technology disclosed herein,these low power radio circuits 927, 804, and perhaps 27, could compriseWiFi or Bluetooth technology, particularly if the electronic key 900 isa smart phone. Of course, other communication protocols could beutilized without departing from the principles of the technologydisclosed herein. As noted above, a special APP would run on the smartphone (as the electronic key 900), to allow it to communicate with alockbox 800. The electronic key can be in the form of a smart phone, asnoted above, and it also is sometime referred herein to as a “wirelessportable computer” (or “WPC”).

It should be noted that the electronic lockbox 940 illustrated in FIG. 5can also be accessed by use of a standard SentriLock smart card, such asthe secure memory card depicted at 905 on FIG. 5. However, many of thefeatures of the technology disclosed herein use the “instant”communications capabilities of an electronic key, including those in theform of a smart phone, for communicating both with a lockbox and withthe central computer, in real time, or near-real time. Again, suchdevices can also be referred to as “wireless portable computers” (WPCs).

Another form of electronic lockbox is illustrated in FIG. 6. Astationary electronic lockbox is generally depicted at the referencenumeral 950. Lockbox 950 has no shackle, and instead is designed to bepermanently mounted to a building or other durable fixed structure, forlockbox security systems that can involve dwellings or other types ofbuildings used for human habitat, or for housing other items in which aprotective secure access is desired. In this disclosure, lockboxes 940and 950 will be said to contain a “dwelling key” in their securecompartments, whether the protected structure or physical area actuallycontains human occupants or not.

Lockbox 950 has similar structural elements as compared to lockbox 940.There is a housing 952, a movable door 954 that covers a securecompartment beneath its surface, and a keypad 958 for entering data viaa human user. Lockbox 950 will include the same electronic componentsand control software as lockbox 940, sans the shackle latch members andthe shackle itself. Lockbox 950 is designed to securely communicate withan electronic key 900 or with a smart card 905, just like lockbox 940.

Wireless Controller

FIG. 3 illustrates another embodiment of an electronic locking system1800 that includes the central computer 260, at least one wirelessportable computer 1840, and at least one electronic wireless controller1810 that act as an IMC.

The clearinghouse computer 260 includes a computer 261 with a processorand memory, and also includes a database 262 to hold access event dataas well as a myriad of other types of information used by the electroniclockbox system. The wireless portable computer (WPC) 1840 includes a lowpower radio 1854 and a wide area network radio 1852. The IMC includes alow power radio 1827, which communicates with the WPC's low power radio1854.

In FIG. 3, the wireless controller, generally referred to by thereference numeral 1810, is illustrated in block diagram form, for use ina security access control system. The wireless controller 1810 wouldtypically contain a processing circuit 1816, a memory circuit 1822, acalendar-type clock circuit 1815, and some type of input/outputinterface circuit 1830. An interface or data bus 1812 would be used tocommunicate from the I/O interface circuit 1830 to the variousinput/output devices that are mounted on or included with the wirelesscontroller 1810. A power supply 1818 would be included (which typicallywould be a battery), and a backup capacitor could be provided, ifdesired. The wireless controller 1810 also includes a low power radio1827 (which could be a different type of wireless device than a radio,for example, an optical wireless communications device).

The wireless controller 1810 will have the ability to store a softwareapplication program in its memory circuit 1822, and its processingcircuit 1816 can execute the instructions of that software applicationprogram. The flow charts of FIGS. 10-12 describe some of the importantfeatures of such an application program.

The wireless controller 1810 (as an IMC) would have many of the“controller” attributes of an electronic lockbox, but it would not, byitself, contain a physical key in a secure compartment, nor would ithave a shackle for attachment to a doorknob on the remote site property.Instead, the wireless controller 1810 would mainly comprise anintelligent low power radio for communicating with a smart device, suchas a smart phone, or other type of wireless portable computer (a WPC).Indeed, the wireless controller 1810 could be mounted inside a building,such as a dwelling, on the remote site property, where it would not besubject to tampering by illegal activities, and it would not be exposedto the weather.

Most, or all, of the electronic circuitry for the wireless controller1810 can be implemented in a commercially-available device known as a“system-on-chip.” Texas Instruments sells such a device under the modelnumber CC2541, for example. As noted above, the wireless controller 1810contains circuits such as the processing circuit 1816, memory circuit1822, calendar-type clock circuit 1815, and input/output interfacecircuit 1830. In addition, the exemplary wireless controller 1810contains a memory arbitrator (or “arbiter”) circuit 1832, a powermanagement controller circuit 1834, and a low power radio circuit 1827,as well as numerous other circuits provided by Texas Instruments toprovide the processing and interface capabilities of a device referredto by many as a “system on a chip.” Specifically, the radio circuit 1827can work with the low energy 2.4 GHz Bluetooth protocol.

The Texas Instruments CC2541 device uses three different power modes:(1) 4-microsecond Wake-up, (2) Sleep Timer On, and (3) ExternalInterrupts. As portions of its memory circuit 1822, it includesIn-System-Programmable Flash memory, 128-KB or 256-KB, and 8-KB RAM withretention in all power modes. For use with input/output signals (for theI/O interface circuit 1830), it includes a multiplexed 12-Bit ADC,multiple timer circuits, and multiple serial interfaces (USARTcircuits). TI also makes other similar “system-on-chip” devices (e.g.,the CC2540) that could be used, as an alternative, as the heart of thewireless controller 1810.

In addition to the TI device, the wireless controller 1810 canoptionally be provided with certain input or output devices to make thewireless controller more user-friendly, or to make it easier totroubleshoot. For example, a manual reset switch 1836 could be included,and/or some type of indicator light (e.g., using an LED) could beincluded to provide status information, if desired by the systemsdesigner. A motion sensor could be included, to provide an indication oftampering, for example.

It should be noted that the overall physical package for the wirelesscontroller 1810 could be quite small, such as a flat-pack plastic casethat might be only about two inches square, or smaller. The smaller theunit packaging, then perhaps the less optional features that might beincluded. But even with such a small two-inch by two-inch package (orsmaller), the battery would be able to support the TI device for overone year, at a wake-up cycle rate of one second to send a pollingsignal, such as a Bluetooth advertising packet as a short signal burst,for example.

If some of the optional features, such as a manual reset switch 1836 orstatus indicating lights 1824, are included in the wireless controllerpackage, then the overall package size could be increased, if necessary.However, such optional features are themselves available in quite smalldevices, so the overall package size might not need to increase at all.

The WPC 1840 would include a processing circuit 1842, a memory circuit1844, and an input/output interface circuit 1846, as well as a display1848. One typical WPC that could be used would be a smart phone, andmost smart phones have a touch screen display, which can act as avirtual keypad. Some type of user input device will be necessary, so ifa virtual keypad is not part of the display 1848, then some other typeof input keypad or at least a numeric keypad (such as a telephonekeypad) would be needed. The WPC 1840 will also have a signal or databus 1850 that transfers signals from the I/O interface 1846 to a widearea network radio 1852, and a low power radio 1854. The WPC would alsocontain some type of electrical power supply 1856, such as a battery. Aswith most modern smart phones, the WPC 1840 will have the ability toreceive and store an application program (an APP) in its memory circuit1844, and its processing circuit 1842 can execute the instructions ofthat APP. The flow charts of FIGS. 10-12 describe some of the importantfeatures of such an APP.

The WPC can communicate with the wireless controller 1810, using acommunication pathway 1880. This “pathway” is not a hardware pathway,but comprises some type of wireless communication protocol, such asBluetooth or Zigbee.

When using a wireless controller such as that depicted on FIG. 3, a“regular” electronic lockbox would not be needed to protect the remoteproperty. Instead, some other locking device could be used, as discussedbelow.

The wireless controller 1810 (as an IMC) is able to work as anintelligent wireless transceiver, and it could be programmed to send aperiodic polling message that would be received by a user's WPC when theWPC came within range of the low power radio signal being transmitted bylow power radio 1827. This reception would occur naturally, as the userapproaches the property at the remote site, where the wirelesscontroller 1810 had been pre-positioned (much like an electronic lockboxthat has been previously shackled to a doorknob of a building at aremote property site). Once the user's WPC receives the polling message(e.g., a Bluetooth advertisement packet), the WPC would send anappropriate response message using its lower power radio, under thecontrol of an APP that was previously installed on the WPC. The wirelesscontroller 1810 (the IMC) will analyze the response message content, andif correct for that interval of epoch time (for that particular realestate board, for example), the wireless controller would then transmitan encrypted message back to the WPC.

Referring now to FIG. 7, a “standard” system for use with the presenttechnology is illustrated in block diagram form. The wireless portablecomputer 900 is normally carried by a person having administrativeprivileges with respect to an intermediary controller, such as a lockboxor a first electronic lock (which is generally designated by thereference numeral 10 or 800) or a wireless controller 1810. That personwith administrative privileges will often be referred to herein as the“the ADMIN.” As discussed above, the wireless portable computer (or“WPC”) is typically a smart phone, and it has a low power radio to talkto an intermediary controller (e.g., an electronic lockbox 10 or 800, ora wireless controller 1810), and the WPC will typically also have a highpower or long range radio that can talk to a cellular tower, andeventually communicate with a central computer 260.

The central computer 260 will be a relatively large computing centerthat can handle dozens if not hundreds of communications with varioususers simultaneously, and which will contain a CPU (a computer orprocessor unit), a memory circuit, and other equipment that allows it tocommunicate over the Internet and eventually through cellularcommunications equipment. The memory circuit of the central computer 260will include a database of lockboxes and other types of electroniclocks, as well as dwelling or other building installations. The types ofdata that can be stored in the database of the central computer isalmost infinite.

The intermediary controller (also known as “the IMC”) is able tocommunicate with an electronic lock (the “the EL”) that is generallydesignated by the reference numeral 270. The IMC is also able tocommunicate to an alarm panel generally designated by the referencenumeral 280, which is an optional piece of equipment often found inbuildings or dwellings.

As noted above, the person designated as the ADMIN is a person that hasadministrative privileges for the IMC, and that person typically wouldbe either a human owner of that controller, or an organization that ownsmultiple such controllers, and places them at various installations in acomputerized system. Another person that has privileges to access theIMC will be referred to herein as the “the USER,” and the USER is quiteoften a different human being than the ADMIN (if the ADMIN is a humanbeing rather than an organization). This is a common situation,particularly in real estate sales situations, in which the ADMIN couldbe the “listing agent” who owns a lockbox or other type of electroniclock (i.e., the IMC), and the USER is known as the “showing agent” whocomes to the site to show a dwelling (or other type of building) to asales prospect.

Another important person or organization will be referred to herein asthe “MANAGER,” and it is this person or organization who controls theelectronic lock (the EL) 270 and/or the alarm panel 280. An example of aMANAGER is a home owner or a human occupant of a home. Of course, othertypes of buildings can be used in this overall security system, and infact the MANAGER can be an organization that owns multiple electroniclocks and multiple buildings or dwellings, and these buildings may notbe for sale or be involved in any kind of sales transaction at all. Forexample, the buildings could be dwellings for persons who are retired orlive in a retirement community that has some type of health careconcerns for the occupants, and the USER may not be any type of salesagent, but may be a medical caregiver, for example. Such a caregiver maybe involved with either acquiring or providing medical care informationfor one of the human occupants within the dwelling, for example, or maybe there to actually dispense some medicines, for example.

The MANAGER may be a human being who happens to be the home owner of adwelling, instead of being someone that is part of a large organization.In any event, the MANAGER is either a person or an organization that hasinformation that is necessary for accessing the electronic lock (the EL)270. For typical electronic locks used in homes, there will be accesscodes, which could be described as “security codes.” Each brand ofelectronic lock and each model number of such a brand will have certaincommunications protocols that need to be observed, or the electroniclock 270 will not be able to communicate with some other external device(such as the IMC). Therefore, the MANAGER must be able to provide thosenecessary codes and protocols to a person that will be installing thecontroller (the IMC) 10 or 800 (if it is a lockbox). Those securitycodes and protocols of the equipment for the EL are necessary so thesystem can be initially set up when the controller (the IMC) isinstalled and first made to communicate with the electronic lock 270.Furthermore, if the building (such as a dwelling) does indeed have analarm system, then the alarm panel 280 must also be communicated with,either by the EL or by the IMC. If it is desired for the lockbox (theIMC) to communicate directly with the alarm panel 280, then again therewill be some type of security codes and communications protocols thatneed to be observed, and the MANAGER will need to provide thatinformation to the ADMIN, so that the ADMIN can install and setup thelockbox or the IMC during initial installation.

Once the security codes and protocols for a given installation have beenprovided from the MANAGER to the ADMIN, the ADMIN will see to it thatthis important information is provided to the central computer 260. Thedatabase of that central computer will then store those protocols andaccess codes relating to the EL, and also for an alarm panel if one willbe on that site. That information will be made available to a USER wholater comes to the site of the building or dwelling so as to obtainaccess to that building or dwelling that is protected by the electroniclock (the EL) 270 and/or the alarm panel 280.

On-Site Setup

Referring now to FIG. 10, a flow chart is provided showing some of theimportant steps to set up a controller (the IMC) 10 or 800, or someother type of electronic device that will act as the IMC. In this flowchart, which is generally designated by the reference numeral 400, it isassumed that the ADMIN has already obtained the important informationsuch as the access codes and communications protocols of the EL, and/oran alarm panel 280 that is on the site of a particular building ordwelling; that information would have come from the MANAGER of thatbuilding or dwelling. Those codes and protocols should have already beenstored in the central computer database, as noted above; furthermore,that information will be downloaded from the central computer 260 to thewireless portable computer 900 that is being carried by this particularthe ADMIN human being.

In flow chart 400, the first step at 410 is for the ADMIN WPC to connectto the IMC, which could be a lockbox, or some other type of electroniclock that does not necessarily contain a mechanical key, or perhaps sometype of wireless controller that is also a “system on a chip.” Thedetailed procedure for making this connection between the WPC and theIMC as a lockbox is well-known, and has been disclosed in earlier patentapplications owned by SentriLock, LLC, which have been incorporated byreference herein. More specifically, the IMC will require theappropriate credentials from the ADMIN WPC before allowing further stepsin this routine to take place. If, for example, the ADMIN WPCcredentials that are presented to the IMC are not deemed to be valid,then an error condition will arise, and that error condition will bereported to the central computer (the CCC), and then stored in an eventlog of that CCC's database.

On the other hand, if the ADMIN WPC credentials that are presented tothe IMC are deemed to be valid, then the WPC and the IMC will begin anappropriate communications session (also sometimes referred to as“pairing”). Once the WPC and the IMC have been paired (using terminologyfrom Bluetooth communications protocols, for example), a decision step412 determines whether the IMC (or the WPC) detects the electronic lockat this site (referred to as the EL). In addition, this decision step412 also determines whether or not the IMC (or the WPC) canautomatically identify the EL. If the answer is NO, then a step 414 isperformed in which the ADMIN must select the correct manufacturer andmodel number of this specific EL from a list of model numbers that areavailable in the system. Once that has been accomplished, the logic flowis directed to a step 420.

If the pairing and identification has been made automatically atdecision step 412, then the logic flow is directed to step 420automatically, and at that step, the EL becomes activated (if it wassleeping). Once the EL is activated, the ADMIN enters securityinformation into his or her WPC at a step 422. This information is partof the pairing procedure between the EL and either the IMC or the WPC,and must be entered “live” in many, if not most, communications pairingprocedures between electronic locks. Perhaps that procedure could beautomated, in which the data is already stored in the memory of the WPC,but still the application program would have to find a way of findingthe correct memory cell to get access to those codes.

The pairing of credentials between the IMC and the EL will create atrusted relationship between those two electronic devices. Theinformation necessary to create this trusted relationship will typicallyinclude permissions and passcodes that are required by thedwelling/building protective electronic lock, known as the EL in thisdescription. In essence, the EL validates the security information thatis contained in the credentials being provided by the IMC and the WPC.The communications protocols can be low power radio communications, suchas those used by the Bluetooth or Zigbee protocols. Once the trustedrelationship between the IMC and the EL comes into existence, those twodevices will be able to continue exchanging data communications withouta further pairing procedure, until this data exchange session has beencompleted.

The WPC will need to be provided with a special computer program,typically known as an APP, so that it can communicate with the IMCdevice. The IMC device (such as a lockbox) will also need to run anemulation program that enables it to communicate with the EL. The APPrunning on the wireless portable computer will need to be able to acceptthe user code and to store and use the exact communications protocolsthat will work with each model number and brand of the electronic lock(the EL) that is protecting the dwelling or building. If a new style ofelectronic lock is encountered at time of setup, then thosecommunications protocols and/or security codes (such as a password) willneed to be provided by the MANAGER to the ADMIN (or to a web portalusable by the central computer and/or accessible by the ADMIN), and thatinformation will need to be entered properly into the applicationsoftware for the IMC device (such as a lockbox). It should be noted thatwhen most electronic locks used in dwellings are installed, if they usea protocol such as Bluetooth, that electronic lock (the EL) typicallywill advertise and provide that brand's model number and the brand nameitself as part of that advertisement. In some models and brands of suchelectronic locks, even the lock's serial number might be communicated asthe electronic lock advertises. This information can be then used by theother end of the pairing, and in this case, it would be used by the IMCor by the WPC.

The WPC now sends that security information (e.g., the EL protocolinformation and perhaps also the user code, or codes) to the IMC at astep 424. The IMC now establishes a connection to the EL at a step 426.Two of these devices (one being the EL, and the other being either theIMS or the WPC) now initiate pairing at a step 428. If the securityinformation is validated by the EL during the pairing, that means theuser code and communications protocol information was correct at the EL.Both the IMC and the WPC are notified of the successful pairing and ELvalidation at a step 430, by at least one message originating at the EL.In addition, at step 430 the IMC stores the specific securityinformation in its first memory circuit 822 (or 1822), for later use byanother authorized user (such as a real estate “showing agent”) whoarrive at this property and desire to obtain access via the EL. An eventlog is now updated on the central computer at step 432, based on amessage sent by the WPC. Note that, of course, there must be some typeof cell phone communications between the WPC of the ADMIN and thatcentral computer, either in real time, or a delayed communication thatwill occur later once the WPC enters an active cell. This setupprocedure is now finished, and the application now returns to otherfunctions at a step 440.

Now that the setup procedure has been accomplished as per the flowchart400, the two electronic devices the IMC and the EL for a given site arenow ready for access by a valid USER. Before describing that access, aphysical description of this type of site will be described in referenceto FIG. 8. In FIG. 8, an IMC (such as a lockbox 10 or 800, or a wirelesscontroller 1810) has been installed at the center of a geofence, or inthis instance, at the center of two different geofences that areconcentric. The first geofence is generally designated by the referencenumeral 310, and the second, larger geofence is generally designated bythe reference numeral 312.

If the wireless portable computer is currently located at a firstposition near the IMC, as depicted at the reference numeral 320, thenthat typically means the USER (who is carrying that WPC) is within bothgeofences 310 and 312. On FIG. 8, a USER who has moved to a secondposition at reference numeral 322 is considered outside the firstgeofence 310, but still inside the second geofence 312. This means thatthe wireless portable computer is now “outside” the first geofence 310,which can be strictly a GPS coordinate-generated geofence. When the WPCis located at the position 320, diagrammatically the WPC is right at theIMC (e.g., an electronic lockbox). Those GPS coordinates can bedetermined by the GPS receiver on the WPC (which can be a smart phonethat, in today's technology, typically has a GPS receiver). As the WPCis moved around the site of the dwelling or building being visited bythe USER, then the WPC will eventually travel to a location outside thefirst geofence 310. The GPS coordinates at position two (at thereference numeral 322) will be determined by the WPC itself, and it willfigure out that it is outside that geofence 310.

If the WPC is then moved farther away from the lockbox (the IMC), andgoes outside the second geofence 312, that could be considered a thirdposition, such as that indicated by the reference numeral 324. In thisexample, the second geofence 312 is the outer limit of communicationsrange between the low power radios carried by the WPC and used by thelockbox (the IMC). This is a physical parameter that cannotrealistically be changed by any type of data or other circuit changingcomponents, unless such changes of circuits would be done to both thelockbox (the IMC) and the wireless portable computer (WPC) itself.Realistically, there is no point in trying to extend the range for thesecond geofence 312, because there is typically plenty of rangecapability when using Bluetooth or other type of WiFi types ofcommunications techniques. What is important is that the distance fromthe center of geofence 312 is greater than the distance from the centerof geofence 310. Otherwise, the WPC would run out of communicationscapabilities to and from the IMC before knowing it had passed beyond theGPS geofence. That would create an ambiguous situation, and the logicthat will be discussed below would not work properly.

Referring now to FIG. 9, there is only a single geofence 312 in thisexample. Once again, geofence 312 is a physical parameter that isdetermined by the actual communications range capabilities between theBluetooth or other type of WiFi communications circuits being used bythe IMC and the low power communications radio of the WPC. In FIG. 9,the WPC begins at a first position that is generally designated by thereference numeral 330. The human USER can move to a second positionwhile carrying the WPC, and that second position is generally designatedby the reference numeral 332. Later, the human USER can move the WPC toa third position at the reference numeral 334. Since time is beingmeasured by the WPC (real time is always tracked on a typical smartphone), the velocity can be determined between the second and thirdpoints at 332 and 334, respectively. If the velocity is greater than acertain threshold value, it can be assumed that the USER and the WPC arenow travelling in some type of vehicle, which means that the showing (ina real estate situation) is now over. This will be discussed in greaterdetail below.

It will be understood that the electronic lock 270 (the “EL”) istypically used to protect a specific property. Such an electronic lockinherently includes several electronic components, such as a processingcircuit and a memory circuit that including instructions which areexecutable by the EL's processing circuit. Those individual circuits arenot shown on the drawings, but they must exist for the EL to actuallyperform as an electronic lock. In addition, for the purposes of thetechnology disclosed herein, the EL 270 also includes a short rangewireless communications circuit so as to be able to exchange data withthe IMC 10, 800, or 1810 (or perhaps with the WPC), and further includesa physical lock that is under the control of its processing circuit.

It will also be understood that the alarm panel 280 is typically anoptional piece of equipment for a given property, and it can beinstalled with, or without, a corresponding electronic lock at the sameproperty. Such an alarm panel inherently includes several electroniccomponents, such as a processing circuit and a memory circuit thatincluding instructions which are executable by the alarm panel'sprocessing circuit. Those individual circuits are not shown on thedrawings, but they must exist for the alarm panel to actually be able toperform its functions. In addition, for the purposes of the technologydisclosed herein, the alarm panel 280 also includes a short rangewireless communications circuit so as to be able to exchange data withthe IMC 10, 800, or 1810 (or perhaps with the WPC). Further, most alarmpanels include a user-operated keypad, either in the form of a hardwarekeypad or as a virtual keypad that is part of a touchscreen display.

Operation/Access

Referring now to FIG. 11, a flow chart is provided showing some of theimportant operational steps used when a USER arrives at a site to obtainaccess to a building or dwelling. The flow chart is generally designatedby the reference numeral 500, and begins at a step 510 with the USER WPCconnecting to the IMC, which can be a lockbox or other type ofelectronic lock or (wireless) electronic controller. The IMC now mustauthorize the credentials of the WPC, and that is carried out in a step512. A decision step 520 now determines whether or not the USERcredentials are valid. If not, then the logic flow is directed to a step522 which reports an error condition, and that error event is stored inthe central computer's database event log at a step 524. That eventsequence would be the end of this flow chart, and the applicationreturns to other computer operations at a step 526.

On the other hand, if a USER's credentials have been properly validatedat decision step 520, then the logic flow is directed to a step 530where the IMC (or the WPC) connects to the electronic lock (the EL).After that occurs the IMC (or the WPC) sends stored security informationto the EL at a step 532. That security information is then analyzed andauthorized by the EL at a step 534; in general, the result of this isthat the IMC (or the WPC) now becomes “trusted” by the EL.

It should be noted that, so long as there has been no component failureand no garbled communications messages, the above security authorizationof the IMC by the EL in step 534 should always succeed, since the IMCwas previously set up with the proper “lock security code” and theproper “lock protocol” information (i.e., the appropriate format of datathat is expected by the EL) for that exact EL, as per the flow chart400. This is one of the chief advantages of this access control system:the USER need not know anything about how to operate the EL of thisparticular dwelling/building. The USER only needs to know how toauthenticate himself/herself to the IMC, and access to thedwelling/building is virtually guaranteed, so long as that setupprocedure was correctly done. Of course, if the MANAGER (a homeowner,for example) manually changes the correct security code on the EL, theneverything derails, and a new setup procedure would have to beperformed.

The next step at 536 allows the IMC (or the WPC) to send commands to theEL, using stored protocol information. (Such commands will be obeyed bythe EL, since the IMC (or the WPC) has now become a “trusted” device.)This activity is now stored in both an event log and an access log ofthe IMC, at a step 538. At this point, the EL has been unlocked, and theUSER will now be allowed to obtain access to the building or dwelling,and may enter the interior spaces of such building/dwelling. As notedabove regarding step 536, the IMC (or the WPC) is allowed to sendcommands to the EL, and typically the first command will be to unlockthe EL electronic lock. Later, after the purposes of the visit have beenaccomplished, the USER can manually send another command from the IMC(or the WPC) to the EL, and that second command could be to relock theelectronic lock EL. However, the USER is a human being, and may forgetto send that second command, which means that the electronic lock ELwould have been left in its unlocked state. This can be handled invarious ways, as discussed below.

One fairly straightforward way of solving the problem described in theprevious paragraph is to start a timer and, after a predetermined timedelay, the IMC will automatically send a “relock” command to the EL atthe end of that time delay interval. The actual amount of time for thatto occur can be set either by the USER, or probably more likely by theADMIN. Depending on what type of transaction is normally to be expected,the time delay could be in the order of 20 or 30 minutes, or perhapsmore like two hours before the relock command is automatically sent. Fora real estate showing in a potential real estate sales transaction, thetypical “showing time” might be approximately one hour. But, of course,such a showing can last longer, and a real estate board might want touse a “safer” time delay, such as two hours, before the relock commandis automatically sent. On the other hand, if the transaction is amedical caregiver arriving at a dwelling to provide some medicines to ahuman occupant, that may typically take only five or ten minutes, andthe “automatic relock command” time interval might be set to a “safer”time interval, such as 20 or 30 minutes.

On the other hand, the ADMIN, and perhaps most USERs, may not desire thetime delay option that is described above. Therefore, other types oflogical approaches can be used. For example, on FIG. 11, once the step538 has been performed, the logic is directed to a step 540 in which theIMC monitors the presence of the WPC within the geofences. This isreferring to the dual geofence situation that is diagramed in FIG. 8,discussed above. A decision step 550 now determines if a WPC is withinrange of the first geofence 310. If so, then the logic flow is directedback to step 540 where the IMC continues to monitor the presence of theWPC within that geofence. On the other hand, if the WPC is now outsidegeofence number one (at 310), then a step 552 now sends a relock commandfrom the IMC to the EL. This automatically will solve the problem byrelocking the second electronic lock that protects the building (ordwelling) of interest at that site. This application logic of FIG. 11 isnow finished, at a return step 560.

Referring now to FIG. 12, a flow chart 600 is provided to show some ofthe important operational steps that can be used for accessing a lockthat protects a dwelling or building. The flow chart 600 begins at astep 610 with the USER WPC connecting to the IMC, which can be a lockboxor other type of electronic lock or electronic controller. The IMC nowmust authorize the credentials of the WPC, and that is carried out in astep 612. A decision step 620 now determines whether or not the USERcredentials are valid. If not, then the logic flow is directed to a step622 which reports an error condition, and that error event is stored inthe central computer's database event log at a step 624. That eventsequence would be the end of this flow chart, and the applicationreturns to other computer operations at a step 626.

On the other hand, if a USER's credentials have been properly validatedat decision step 620, then the logic flow is directed to a step 630where the IMC (or the WPC) connects to the electronic lock EL. Afterthat occurs the IMC (or the WPC) sends stored security information tothe EL at a step 532. That security information is then analyzed andauthorized by the EL at a step 634; in general, the result of this isthat the IMC (or the WPC) now becomes “trusted” by the EL.

It should be noted that, as before, so long as there has been nocomponent failure and no garbled communications messages, the abovesecurity authorization of the IMC by the EL in step 634 should alwayssucceed, since the IMC was previously set up with the proper securitycode and the proper protocol information for that exact EL, as per theflow chart 400. This is one of the chief advantages of this accesscontrol system: the USER need not know anything about how to operate theEL of this particular dwelling/building. The USER only needs to know howto authenticate himself/herself to the IMC, and access to thedwelling/building is virtually guaranteed, so long as that setupprocedure was correctly done. However, if the MANAGER (a homeowner, forexample) manually changes the correct security code on the EL, theneverything will of course derail, and a new setup procedure would haveto be performed.

The next step at 636 allows the IMC (or the WPC) to send commands to theEL, using stored protocol information. (Such commands will be obeyed bythe EL, since the IMC (or the WPC) has now become a “trusted” device.)This activity is now stored in both an event log and an access log ofthe IMC, at a step 638. At this point, the EL has been unlocked, and theUSER will now be allowed to obtain access to the building or dwelling,and may enter the interior spaces of such building/dwelling. As notedabove regarding step 636, the IMC (or the WPC) is allowed to sendcommands to the EL, and typically the first command will be to unlockthe EL electronic lock. Later, after the purposes of the visit have beenaccomplished, the USER can manually send another command from the IMC(or the WPC) to the EL, and that second command could be to relock theelectronic lock EL. As noted above, the USER is a human being, and mayforget to send that second command, which means that the electronic lockEL would have been left in its unlocked state. Another way that could behandled is discussed below.

Another optional way of automatically relocking the EL is described onthe next portion of FIG. 12. Beginning at a step 640, the velocity ofthe WPC is monitored between two different time marks. This is referringto the situation illustrated on FIG. 9, in which the WPC is at a secondposition at 332, and then moves to a third position at 334. If those twopositions are 10 seconds apart, for example, then the velocity can bequickly and easily determined from the GPS coordinates of those twopositions 332 and 334. If the velocity is greater than a certainthreshold (such as 15 MPH or 20 MPH), then it can be presumed that theUSER is now travelling in a vehicle.

On FIG. 12, this velocity comparison is performed by decision step 650.In the decision step 650 the velocity comparison is with regard to athreshold that is defined as “X MPH.” The value for X can be determinedby the ADMIN, or perhaps by the USER or some combination of the ADMINand the USER. Whatever the threshold is, if the answer is NO from thedecision step, then the logic flow travels back to step 640 where thevelocity continues to be monitored.

Once the velocity of the WPC has exceeded the threshold of X MPH, thenthe logic flow is directed to a step 652 in which the IMC sends a relockcommand to the EL. This now automatically relocks the electronic lockthat is protecting the building or dwelling. The application logic ofFIG. 12 is now finished, and the logic flow is directed to a return stepat 660.

It will be understood that most or all of the references to manipulatingan electronic lock known as “the EL,” and depicted at 270 on FIG. 7 canalso be related to an alarm panel 280 that is also found on FIG. 7. Inother words, instead of unlocking an electronic lock known as the EL, acommand could be sent to the alarm panel 280 to put it in a disarmedcondition. This can be true for a first situation where there is analarm panel 280 but there is no electronic lock at 270, and for a secondsituation where there are both an alarm panel 280 and an electronic lock270. In the second situation, the unlock command for the EL can also beduplicated by a second message from the IMC sent to the alarm panel,with the necessary codes and protocols to place that alarm panel 280into a disarmed state. Later, the EL and IMC could be used to send a“re-arm” command to the alarm panel 280 at the end of a visit to thatproperty, thereby placing the alarm control system back into its armedstate.

At the end of a visit, or upon a determination that the visit hasessentially been accomplished by the WPC exiting one of the geofences,the system at the IMC is allowed to send a relock command to the EL. Asnoted above, it will be understood that this could also result in an“arming” command to be sent an alarm panel 280 at the same time, inwhich that command would be sent by the IMC. It will be understood thatwhatever pairing is necessary between the IMC and the alarm panel willtake place using the same types of logic steps that have been describedin the flow charts of FIGS. 10, 11, and 12. Naturally, thecommunications protocols will be different for an alarm panel than foran electronic lock, so all of that information has to be learned by theADMIN from the MANAGER at the time of setup (referring to FIG. 10).Furthermore, all the communications protocol information that is used bythe alarm panel must also be provided to the ADMIN, and that informationeither has to be supplied by the MANAGER, or perhaps that informationcan be learned from knowing the model number and manufacture of thealarm panel. That information must be made available to the wirelessportable computer (WPC) 900 or to the IMC 10 (or 800 or 1810), that isprovided by the ADMIN. All this information can also be stored at thecentral computer database at 260, if desired.

In a situation involving a dwelling or other building containing a humanoccupant, the person arriving at the lock site could be an emergencyresponding agent (such as a police department officer or a firedepartment official), and in that situation that person's WPC (e.g., asmart device) could be provided with up-to-date contextual informationabout a human occupant, and perhaps other information pertaining toconditions on the building site itself that may not necessarily pertaindirectly to the human occupant. Such emergency personnel would likelyhave the capability of opening the lock in an emergency situation, sothat person (a USER) could be authorized to both receive the contextualdata and to open the lock. Other non-emergency personnel may also havereason to require contextual information about a human occupant of alock-protected property, including repair service persons oradministrative service persons, and the like. Moreover, it is possiblethat the wireless controller and lock “site” could be a moving devicesuch as a vehicle, particularly where the “site” could be an ambulance,or perhaps a mobile home.

In any event, there are several classifications of personnel who mightbe authorized to obtain access to a site's electronic lock (the EL), byusing a WPC (such as a smart phone) to communicate with an IMC (such asa lockbox or a wireless controller), which then communicates with the EL(or helps to enable the WPC to communicate with the EL). Examples ofsuch classifications of personnel include: (a) an emergency medicaltechnician, (b) a routine medical caregiver; (c) a police departmentofficer; (d) a fire department official; (e) an administrative servicingperson; (f) a repair servicing person; and (g) a real estate salesagent. Moreover, examples of classifications of objects that mightcontain an electronic lock could include: (a) a dwelling; (b) a medicalcare facility; and (c) a vehicle.

As is known in the electronic lockbox technical field, a typical realestate sales electronic lockbox can only be accessed by an authorizeduser who can provide the correct digital information to that lockbox. Intoday's modern lockbox systems, the typical real estate sales agent(e.g., a “showing agent”) must not only provide a correct credential (or“code”) to the lockbox, but also must present that credential during anappropriate time interval, in real time. More specifically, a typicalmodern lockbox system requires the “electronic key” that is carried bysuch real estate sales agents to be “rejuvenated” within a specific timeinterval (such as once per calendar day), and then that electronic keycan only be used for the remainder of that same calendar day. If thatelectronic key was not rejuvenated earlier that same day, then anyaccess attempt would fail—even if all the other access credentials werecorrect. (In this example, the electronic lockbox acts as an IMC, andthe electronic key acts as a WPC.) Therefore, it is clear that thetechnology systems disclosed herein are quite secure, and theirimplementation in a real estate board, or in a housing area withdwellers who require periodic medical care visitations, for example,will not degrade the overall level of security of electronic locks (ELs)alone, when used to protect such buildings.

Another way of describing some of the functions described above can besummarized as follows: in a system for operating an electronic lock,there will be an intermediary controller (an IMC) that is assigned to aspecific property, a portable computer (a WPC) carried by a human USER,and an electronic lock (an EL) used to protect that specific property.The processing circuits of all three of those electronic products willoperate in a coordinated fashion to perform special functions,including: (1) storing, at the IMC, an electronic lock authorizationcredential pertaining to the EL, (2) communicating data messages betweenthe WPC and the IMC, and performing an authentication routine betweenthe IMC and the WPC, (3) and if there is a successful authenticationbetween the IMC and the WPC, then communicating the electronic lockauthorization credential from the IMC (or the WPC) to the EL, and (4)after the EL has received the valid electronic lock authorizationcredential from the IMC (or the WPC), then sending at least onepredetermined command (e.g., to “unlock” or to “re-lock”) that will beobeyed by the EL.

Yet another way of describing some of the functions described above canbe summarized as follows: in a system for operating an intermediarycontroller, there will be an intermediary controller (an IMC) that isassigned to a specific property, a portable computer (a WPC) carried bya human USER, and an electronic lock (an EL) used to protect thatspecific property. The processing circuits of all three of thoseelectronic products will operate in a coordinated fashion to performspecial functions, including: (1) pairing the IMC (or the WPC) with theEL; (2) sending pairing information and protocol information relating tothe operation of the EL, under control of a human ADMIN (such as a realestate “listing agent”), from the WPC (or the WPC) to the IMC; and (3)storing the pairing information and protocol information in the memorycircuit of the IMC for later use by a human USER (such as a real estate“showing agent”) who will attempt to open the EL.

It is to be understood that the technology disclosed herein is notlimited in its application to the details of construction and thearrangement of components set forth in the following description orillustrated in the drawings. The technology disclosed herein is capableof other embodiments and of being practiced or of being carried out invarious ways. Also, it is to be understood that the phraseology andterminology used herein is for the purpose of description and should notbe regarded as limiting. The use of “including,” “comprising,” or“having” and variations thereof herein is meant to encompass the itemslisted thereafter and equivalents thereof as well as additional items.Unless limited otherwise, the terms “connected,” “coupled,” and“mounted,” and variations thereof herein are used broadly and encompassdirect and indirect connections, couplings, and mountings. In addition,the terms “connected” and “coupled” and variations thereof are notrestricted to physical or mechanical connections or couplings.

In addition, it should be understood that embodiments disclosed hereininclude both hardware and electronic components or modules that, forpurposes of discussion, may be illustrated and described as if themajority of the components were implemented solely in hardware.

However, one of ordinary skill in the art, and based on a reading ofthis detailed description, would recognize that, in at least oneembodiment, the electronic based aspects of the technology disclosedherein may be implemented in software. As such, it should be noted thata plurality of hardware and software-based devices, as well as aplurality of different structural components may be utilized toimplement the technology disclosed herein.

Some additional information about “basic” lockbox embodiments, includingadvanced features, are more fully described in earlier patent documentsby the same inventor, and assigned to SentriLock, Inc. or SentriLockLLC, including: U.S. Pat. No. 7,009,489, issued Mar. 7, 2006, forELECTRONIC LOCK SYSTEM AND METHOD FOR ITS USE; U.S. Pat. No. 6,989,732,issued Jan. 24, 2006, for ELECTRONIC LOCK SYSTEM AND METHOD FOR ITS USEWITH CARD ONLY MODE; U.S. Pat. No. 7,086,258, issued Aug. 8, 2006, forELECTRONIC LOCK BOX WITH SINGLE LINEAR ACTUATOR OPERATING TWO DIFFERENTLATCHING MECHANISMS; U.S. Pat. No. 7,420,456, issued Sep. 2, 2008, forELECTRONIC LOCK BOX WITH MULTIPLE MODES AND SECURITY STATES; U.S. Pat.No. 7,193,503, issued Mar. 20, 2007, for ELECTRONIC LOCK SYSTEM ANDMETHOD FOR ITS USE WITH A SECURE MEMORY CARD; U.S. Pat. No. 7,999,656,issued Aug. 16, 2011, for ELECTRONIC LOCK BOX WITH KEY PRESENCE SENSING;U.S. Pat. No. 7,734,068, issued Jun. 8, 2010, for ELECTRONIC LOCK BOXUSING A BIOMETRIC IDENTIFICATION DEVICE; U.S. Pat. No. 8,451,088, issuedMay 28, 2013, for ELECTRONIC LOCK BOX WITH TRANSPONDER BASEDCOMMUNICATIONS; U.S. Pat. No. 8,164,419, issued Apr. 24, 2012, forELECTRONIC LOCK BOX WITH TIME-RELATED DATA ENCRYPTION BASED ONUSER-SELECTED PIN; U.S. Pat. No. 8,151,608, issued Apr. 10, 2012, forELECTRONIC LOCK BOX WITH MECHANISM IMMOBILIZER FEATURES; U.S. patentapplication Ser. No. 12/756,741, filed on Apr. 8, 2010 (Publication No.US 2011/0251876), for ELECTRONIC LOCK BOX SYSTEM WITH INCENTIVIZEDFEEDBACK; U.S. Pat. No. 8,593,252, issued Nov. 26, 2013, for ELECTRONICLOCK BOX PROXIMITY ACCESS CONTROL; U.S. Pat. No. 8,912,884, issued Dec.16, 2014, for ELECTRONIC KEY LOCKOUT CONTROL IN LOCKBOX SYSTEM; U.S.patent application Ser. No. 13/830,024, filed on Mar. 14, 2013(Publication No. US 2014/0266586), for CONTEXTUAL DATA DELIVERY TOMOBILE USERS RESPONSIVE TO ACCESS OF AN ELECTRONIC LOCKBOX; U.S. Pat.No. 9,704,315, issued Jul. 11, 2017, for CONTEXTUAL DATA DELIVERY TOOTHER USERS AT AN ELECTRONIC LOCKBOX; and U.S. Pat. No. 9,830,760,issued Nov. 28, 2017, for CONTEXTUAL DATA DELIVERY TO USERS AT A LOCKEDPROPERTY. These patent documents are incorporated by reference herein,in their entirety.

It will be understood that the logical operations described in relationto the flow charts of FIGS. 10-12 can be implemented using sequentiallogic (such as by using microprocessor technology), or using a logicstate machine, or perhaps by discrete logic; it even could beimplemented using parallel processors. One preferred embodiment may usea microprocessor or microcontroller (e.g., the processor 16) to executesoftware instructions that are stored in memory cells within an ASIC. Infact, an entire microprocessor (or microcontroller, for that matter),along with RAM and executable ROM, may be contained within a singleASIC, in one mode of the technology disclosed herein. Of course, othertypes of circuitry could be used to implement these logical operationsdepicted in the drawings without departing from the principles of thetechnology disclosed herein. In any event, some type of processingcircuit will be provided, whether it is based on a microprocessor, alogic state machine, by using discrete logic elements to accomplishthese tasks, or perhaps by a type of computation device not yetinvented; moreover, some type of memory circuit will be provided,whether it is based on typical RAM chips, EEROM chips (including Flashmemory), by using discrete logic elements to store data and otheroperating information, or perhaps by a type of memory device not yetinvented.

It will also be understood that the precise logical operations depictedin the flow charts of FIGS. 10-12, and discussed above, could besomewhat modified to perform similar, although not exact, functionswithout departing from the principles of the technology disclosedherein. The exact nature of some of the decision steps and othercommands in these flow charts are directed toward specific future modelsof lockbox systems (those involving lockboxes sold by SentriLock, LLC,for example) and certainly similar, but somewhat different, steps wouldbe taken for use with other models or brands of lockbox systems in manyinstances, with the overall inventive results being the same.

It will further be understood that the term “wireless portablecomputer,” as used herein, typically refers to electronic communicationsequipment that can communicate with an electronic lockbox using a lowpower radio or optical communication circuit, under the control of aproper APP computer program. In some cases, such a wireless portablecomputer refers to electronic communications equipment that also is ableto use a cellular telephone link to communicate with a wide areanetwork. A typical wireless portable computer is also sometimes known asa “smart device.” A smart device that is to be used by a sales agent (asopposed to a sales prospect) could perhaps be replaced by an “electronickey” used with electronic lockboxes, so long as that electronic keyincludes the necessary cellular telephone link and low powercommunication circuit, and it has a computer program installed to allowit to function in the manner as described above. In other words, bothtypes of devices (“electronic key” and “smart device”) require softwareto function properly; in the case of a smart device (or “smart phone”),that software is typically called an “APP” whereas in the case of anelectronic key, that software can be referred to simply as executablecode, or as an executable computer program (for example, a “*.exe” fileused in a Windows-based operating system).

It should be noted that several of the communications functions thatinvolve the electronic lock (the “EL”) can pass to or from either theIMC (the “intermediary controller”) or the WPC (the “wireless portablecomputer”), and still achieve the overall same results. In other words,for a situation in which the user's “code” is to be sent to the EL, thatcode (or some form of that type of coded message, encrypted orotherwise) could be sent by the WPC—after the person handling that WPChas entered the proper authorization information—or that code couldinstead be sent by the IMC. But of course, if that code is going to besent by the IMC, then the WPC would first need to send the appropriateauthorization information to that IMC. The point being made here isthis: the software used to perform these functions could be designedeither way, as desired by the overall system designer, because many ofthe messages to the EL could originate either at the IMC or the WPC, andfurther, many of the messages from the EL could be directed to eitherthe IMC or the WPC, without impeding the system's functionality orsecurity.

It will be understood, from reading the above disclosure information,that the system designer may decide that, for most messages to and fromthe EL, it is perhaps better to communicate with the WPC, mainly becausethe WPC is a computer device that is usually kept up to charge withrespect to its battery. Most users of wireless portable computers, suchas smart phones or real estate electronic keys, typically charge thebatteries of such wireless devices every day, so they can attend to thenormal business at hand on a daily basis. On the other hand, if the IMCis a typical electronic lockbox that is positioned outdoors, then thatlockbox runs on a battery that must be replaced on a periodicbasis—perhaps every few years—but nevertheless, any “extra” wirelesscommunications between that lockbox and another wireless device will, ofnecessity, additionally drain the battery to some extent. On the otherhand, again, if the IMC is a “wireless controller” rather than alockbox, then that wireless controller (a “WC”) will likely be mountedindoors, and may well be supplied with line voltage, and therefore, willnot necessarily need to worry about its power drain as it performs itswireless communications. Of course, the WC may include a battery, as abackup if for no other reason. But so long as the WC has line voltageavailable to it, then the system designer will have one less thing toworry about with regard to “how” the three wireless computerized devicesshould communicate with one another. However, if the WC is to be (moreor less) interchangeable with an electronic lockbox in this type ofsystem, then the power requirements of the lockbox (being equipped witha battery, without line voltage) will always be an importantconsideration for the overall system designer.

Finally, with regard to communications with the EL in the systemdisclosed herein, there are certain features that should involvecommunications with the IMC. For example, the IMC is the “on-site”device that makes this entire system possible. In other words, asdescribed above, the user who arrives at a secured property (e.g., alocked building that includes an electronic lock—the “EL”) and who iscarrying a WPC that is able to communicate with the IMC (and, initially,not directly with the EL), then it is that IMC which contains thecommunications protocol information and the access code informationneeded to open that EL. (In other words, it is the IMC that containsthat necessary access information, not the WPC.) Therefore, the userwith the WPC (such as a real estate “showing agent”) must firstcommunicate with the IMC and provide the correct credentials to the IMC,before any attempt is made to open the EL. This allows such users whohave no idea “how” to unlock the EL to actually be able to unlock thatEL anyway, because those users are authorized to access the IMC, byhaving the ability to provide proper credentials to the IMC, and oncethat authorized relationship is established, the user can then open theEL. As noted above, after the user has become known to the IMC as beingan “authorized” user, then it is up to the system designer to decidewhich device (either the IMC or the WPC) will now communicate with theEL, so as to open that electronic lock.

In the example discussed in the previous paragraph, it is clear that theIMC is the on-site repository of information that allows a user with aWPC to open the EL at that same property, without the user having anyknowledge about the protocols or access codes that actually need to besupplied to that EL. This situation requires a “setup procedure” to beperformed in advance, at the property site where the EL and IMC arelocated, as discussed above. Again, the IMC must be included in thissetup procedure, because the required information that will be neededlater by a USER (such as a “showing agent”) must be stored on-site, andnot on the EL. As described above, an ADMIN performs this setupprocedure; in a real estate sales situation, that ADMIN is referred toas the “listing agent.” Since the main purpose of having real estatelockboxes in the first place is to make it possible for a differenthuman being to arrive at this property and obtain access so as to showit to a potential buyer, that different human being (the “showingagent”) will typically not be the same person as the “listing agent,”and therefore, that showing agent cannot open the EL without some help.That help is in the form of the IMC, which is already set-up on thatsame property site, and which therefore contains the necessary data toopen the EL, once the showing agent provides the proper credentials tothe IMC from his or her WPC. Although the setup procedure could useeither the IMC or the WPC to talk with the EL, and to perform avalidation routine to verify that the EL will truly accept the data thatwill be stored on the IMC, the final result must be to store thatimportant data on the IMC, and not only on the WPC. In fact, forsecurity reasons, the system could be designed so that the “unlockingdata” for that EL never goes though the WPC, and is only directed to theIMC. (This is another possible choice to be made by the systemdesigner.)

As used herein, the term “proximal” can have a meaning of closelypositioning one physical object with a second physical object, such thatthe two objects are perhaps adjacent to one another, although it is notnecessarily required that there be no third object positionedtherebetween. In the technology disclosed herein, there may be instancesin which a “male locating structure” is to be positioned “proximal” to a“female locating structure.” In general, this could mean that the twomale and female structures are to be physically abutting one another, orthis could mean that they are “mated” to one another by way of aparticular size and shape that essentially keeps one structure orientedin a predetermined direction and at an X-Y (e.g., horizontal andvertical) position with respect to one another, regardless as to whetherthe two male and female structures actually touch one another along acontinuous surface. Or, two structures of any size and shape (whethermale, female, or otherwise in shape) may be located somewhat near oneanother, regardless if they physically abut one another or not; such arelationship could still be termed “proximal” Or, two or more possiblelocations for a particular point can be specified in relation to aprecise attribute of a physical object, such as being “near” or “at” theend of a stick; all of those possible near/at locations could be deemed“proximal” to the end of that stick. Moreover, the term “proximal” canalso have a meaning that relates strictly to a single object, in whichthe single object may have two ends, and the “distal end” is the endthat is positioned somewhat farther away from a subject point (or area)of reference, and the “proximal end” is the other end, which would bepositioned somewhat closer to that same subject point (or area) ofreference.

It will be further understood that any type of product described hereinthat has moving parts, or that performs functions (such as computerswith processing circuits and memory circuits), should be considered a“machine,” and not merely as some inanimate apparatus. Such “machine”devices should automatically include power tools, printers, electroniclocks, and the like, as those example devices each have certain movingparts. Moreover, a computerized device that performs useful functionsshould also be considered a machine, and such terminology is often usedto describe many such devices; for example, a solid-state telephoneanswering machine may have no moving parts, yet it is commonly called a“machine” because it performs well-known useful functions.

It will be understood that the various components that are describedand/or illustrated herein can be fabricated in various ways, includingin multiple parts or as a unitary part for each of these components,without departing from the principles of the technology disclosedherein. For example, a component that is included as a recited elementof a claim hereinbelow may be fabricated as a unitary part; or thatcomponent may be fabricated as a combined structure of severalindividual parts that are assembled together. But that “multi-partcomponent” will still fall within the scope of the claimed, recitedelement for infringement purposes of claim interpretation, even if itappears that the claimed, recited element is described and illustratedherein only as a unitary structure.

Additionally, it will be understood that a computing product thatincludes a display to show information to a human user, and that alsoincludes a “user operated input circuit” so the human user is able toenter commands or data, can be provided with a single device that isknown as a “touchscreen display.” In other words, if a patent claimrecites a “display” and a “user operated input circuit” as two separateelements, then a single touchscreen display, in actually, is exactly thesame thing. It should be noted that a touchscreen display usuallyincludes a virtual keypad, and therefore, a “user operated inputcircuit” typically comprises a virtual keypad, particularly on smartphones and on tablet computers. Moreover, in this situation, the word“virtual” means that it is not a hardware keypad; more specifically,“virtual” means that it is formed (i.e., “created”) on the displayscreen because of software being executed by a processing circuit.

All documents cited in the Background and in the Detailed Descriptionare, in relevant part, incorporated herein by reference; the citation ofany document is not to be construed as an admission that it is prior artwith respect to the technology disclosed herein.

The foregoing description of a preferred embodiment has been presentedfor purposes of illustration and description. It is not intended to beexhaustive or to limit the technology disclosed herein to the preciseform disclosed, and the technology disclosed herein may be furthermodified within the spirit and scope of this disclosure. Any examplesdescribed or illustrated herein are intended as non-limiting examples,and many modifications or variations of the examples, or of thepreferred embodiment(s), are possible in light of the above teachings,without departing from the spirit and scope of the technology disclosedherein. The embodiment(s) was chosen and described in order toillustrate the principles of the technology disclosed herein and itspractical application to thereby enable one of ordinary skill in the artto utilize the technology disclosed herein in various embodiments andwith various modifications as are suited to particular usescontemplated. This application is therefore intended to cover anyvariations, uses, or adaptations of the technology disclosed hereinusing its general principles. Further, this application is intended tocover such departures from the present disclosure as come within knownor customary practice in the art to which this technology disclosedherein pertains and which fall within the limits of the appended claims.

What is claimed is:
 1. A wireless controller remote locking system, saidsystem comprising: (a) a wireless controller, said wireless controllercomprising a first processing circuit, a first memory circuit includinginstructions executable by the first processing circuit, and a firstshort range wireless communications circuit, wherein said wirelesscontroller is assigned to a specific property; (b) a portable computer,said portable computer comprising a second processing circuit, a secondmemory circuit including instructions executable by the secondprocessing circuit, a display, a user operated input circuit, and asecond short range wireless communications circuit; and (c) an alarmcontrol panel used to protect said specific property, said alarm controlpanel comprising a third processing circuit, a third memory circuitincluding instructions executable by the third processing circuit, and athird short range wireless communications circuit; (d) wherein saidfirst, second, and third processing circuits are configured: (i) toconnect between said portable computer and said wireless controller, bycommunicating first data messages between the first and second shortrange wireless communications circuits, said first data messagesincluding first security information; (ii) at said wireless controller,to perform a credentials authorization routine using said firstprocessing circuit to analyze said first security information receivedfrom said portable computer; (iii) if said portable computer has sentvalid credentials, then to connect between said alarm control panel andat least one of said wireless controller and said portable computer, bycommunicating second data messages between at least two of the first,second, and third short range wireless communications circuits, saidsecond data messages including second security information that waspreviously stored in said first memory circuit; (iv) at said alarmcontrol panel, to perform a security authorization routine using saidthird processing circuit to analyze said second security information;and (v) if at least one of said wireless controller and said portablecomputer has sent valid security information, then at said alarm controlpanel, to authorize at least one of said wireless controller and saidportable computer to send predetermined commands that will be obeyed bysaid alarm control panel.
 2. The system of claim 1, wherein: one of saidpredetermined commands comprises a disarm command will be obeyed by saidalarm control panel.
 3. The system of claim 1, wherein: a human usermust manually enter a security code as part of said credentialsauthorization routine that is performed by said wireless controller, butsaid human user does not need to enter any further information as partof said security authorization routine that is performed by said alarmcontrol panel.
 4. The system of claim 1, further comprising: (e) a GPSreceiver that is included with said portable computer; (f) a firstgeofence that is based upon GPS coordinates; and (g) a second geofencethat is based upon a maximum communications range between said first andsecond short range wireless communications circuits of said wirelesscontroller and said portable computer, wherein said second geofence islarger in diameter than said first geofence; (h) wherein said first,second, and third processing circuits are configured: (i) at said GPSreceiver, to determine a GPS position of said portable computer, and toprovide said GPS position to said second processing circuit in near realtime; (ii) at said portable computer, to periodically send said GPSposition to said wireless controller using said first and second shortrange wireless communications circuits; (iii) at said wirelesscontroller, to monitor said GPS position and determines whether or notsaid portable computer is within said first geofence; (iv) if said GPSposition is within said first geofence, then at said wirelesscontroller, to continue monitoring said GPS position with respect tosaid first geofence; (v) if said GPS position is not within said firstgeofence, then at said wireless controller, to send a message to saidalarm control panel to command the alarm control panel to re-arm, usingsaid first and third short range wireless communications circuits; and(vi) at said alarm control panel, to obey said command to re-arm.
 5. Thesystem of claim 1, further comprising: (e) a GPS receiver that isincluded with said portable computer; and (f) a geofence that is basedupon a maximum communications range between said first and second shortrange wireless communications circuits of said wireless controller andsaid portable computer; (g) wherein said first, second, and thirdprocessing circuits are configured: (i) at said GPS receiver, todetermine a GPS position of said portable computer, and to provide saidGPS position to said second processing circuit in near real time; (ii)at said portable computer, to periodically send said GPS position tosaid wireless controller using said first and second short rangewireless communications circuits; (iii) at said wireless controller, tomonitor said GPS position at a first time mark, and to monitor said GPSposition at a second, later time mark; (iv) at said wireless controller,to determine a velocity of said portable computer during an interval ofreal time between said first and second time marks, using said GPSpositions at said first and second time marks; (v) if said velocity isless than a predetermined quantity, then at said wireless controller, tocontinue monitoring said velocity of the portable computer; (vi) if saidvelocity is greater than a predetermined quantity, then at said wirelesscontroller, to send a message to said alarm control panel to command thealarm control panel to re-arm, using said first and third short rangewireless communications circuits; and (vii) at said alarm control panel,to obey said command to re-arm.
 6. An electronic lock security system,said system comprising: (a) an intermediary controller, saidintermediary controller comprising a first processing circuit, a firstmemory circuit including instructions executable by the first processingcircuit, and a first short range wireless communications circuit,wherein said intermediary controller is assigned to a specific property;(b) a portable computer, said portable computer comprising a secondprocessing circuit, a second memory circuit including instructionsexecutable by the second processing circuit, a display, a user operatedinput circuit, a second short range wireless communications circuit, anda GPS receiver; (c) an electronic lock used to protect said specificproperty, said electronic lock comprising a third processing circuit, athird memory circuit including instructions executable by the thirdprocessing circuit, a third short range wireless communications circuit,and a physical lock that is under the control of said third processingcircuit; (d) a first geofence that is based upon GPS coordinates; and(e) a second geofence that is based upon a maximum communications rangebetween said first and second short range wireless communicationscircuits of said intermediary controller and said portable computer,wherein said second geofence is larger in diameter than said firstgeofence; (f) wherein said first, second, and third processing circuitsare configured: (i) at said intermediary controller, to perform acredentials authorization routine using said first processing circuit toanalyze first security information received from said portable computer;(ii) if said portable computer has sent valid credentials, then toconnect between said electronic lock and at least one of saidintermediary controller and said portable computer, by communicatingsecond security information between at least two of the first, second,and third short range wireless communications circuits; (iii) at saidelectronic lock, to perform a security authorization routine using saidthird processing circuit to analyze said second security information;and (iv) if at least one of said intermediary controller and saidportable computer has sent valid security information, then at saidelectronic lock, to authorize at least one of said intermediarycontroller and said portable computer to send an “unlock” command thatwill be obeyed by said electronic lock.
 7. The system of claim 6,wherein: (g) said first, second, and third processing circuits arefurther configured: (i) at said GPS receiver, to determine a GPSposition of said portable computer, and to provide said GPS position tosaid second processing circuit in near real time; (ii) at said portablecomputer, to periodically send said GPS position to said intermediarycontroller using said first and second short range wirelesscommunications circuits; (iii) at said intermediary controller, tomonitor said GPS position and determines whether or not said portablecomputer is within said first geofence; (iv) if said GPS position iswithin said first geofence, then at said intermediary controller, tocontinue monitoring said GPS position with respect to said firstgeofence; (v) if said GPS position is not within said first geofence,then at said intermediary controller, to send a message to saidelectronic lock to command the electronic lock to relock, using saidfirst and third short range wireless communications circuits; and (vi)at said electronic lock, to obey said command to relock.
 8. The systemof claim 6, wherein a human user of said portable computer comprises atleast one of: (a) an emergency medical technician; (b) a routine medicalcaregiver; (c) a police department officer; (d) a fire departmentofficial; (e) an administrative servicing person; (f) a repair servicingperson; and (g) a real estate sales agent.
 9. The system of claim 6,wherein, said specific property comprises at least one of: (a) adwelling; (b) a medical care facility; and (c) a vehicle.
 10. The systemof claim 6, wherein said intermediary controller comprises one of: (a) awireless controller; and (b) an electronic lockbox that furthercomprises a secure compartment at least a portion of which is movableand is under the control of said first processing circuit.
 11. Anelectronic lock security system, said system comprising: (a) anintermediary controller, said intermediary controller comprising a firstprocessing circuit, a first memory circuit including instructionsexecutable by the first processing circuit, and a first short rangewireless communications circuit, wherein said intermediary controller isassigned to a specific property; (b) a portable computer, said portablecomputer comprising a second processing circuit, a second memory circuitincluding instructions executable by the second processing circuit, adisplay, a user operated input circuit, a second short range wirelesscommunications circuit, and a GPS receiver; (c) an electronic lock usedto protect said specific property, said electronic lock comprising athird processing circuit, a third memory circuit including instructionsexecutable by the third processing circuit, a third short range wirelesscommunications circuit, and a physical lock that is under the control ofsaid third processing circuit; and (d) a geofence that is based upon amaximum communications range between said first and second short rangewireless communications circuits of said electronic lockbox and saidportable computer; (e) wherein said first, second, and third processingcircuits are configured: (i) at said intermediary controller, to performa credentials authorization routine using said first processing circuitto analyze first security information received from said portablecomputer; (ii) if said portable computer has sent valid credentials,then to connect between said electronic lock and at least one of saidintermediary controller and said portable computer, by communicatingsecond security information between at least two of the first, second,and third short range wireless communications circuits; (iii) at saidelectronic lock, to perform a security authorization routine using saidthird processing circuit to analyze said second security information;and (iv) if at least one of said intermediary controller and saidportable computer has sent valid security information, then at saidelectronic lock, to authorize at least one of said intermediarycontroller and said portable computer to send an “unlock” command thatwill be obeyed by said electronic lock.
 12. The system of claim 11,wherein: (f) said first, second, and third processing circuits arefurther configured: (i) at said GPS receiver, to determine a GPSposition of said portable computer, and to provide said GPS position tosaid second processing circuit in near real time; (ii) at said portablecomputer, to periodically send said GPS position to said intermediarycontroller using said first and second short range wirelesscommunications circuits; (iii) at said intermediary controller, tomonitor said GPS position at a first time mark, and to monitor said GPSposition at a second, later time mark; (iv) at said intermediarycontroller, to determine a velocity of said portable computer during aninterval of real time between said first and second time marks, usingsaid GPS positions at said first and second time marks; (v) if saidvelocity is less than a predetermined quantity, then at saidintermediary controller, to continue monitoring said velocity of theportable computer; (vi) if said velocity is greater than a predeterminedquantity, then at said intermediary controller, to send a message tosaid electronic lock to command the electronic lock to relock, usingsaid first and third short range wireless communications circuits; and(vii) at said electronic lock, to obey said command to relock.
 13. Thesystem of claim 11, wherein a human user of said portable computercomprises at least one of: (a) an emergency medical technician; (b) aroutine medical caregiver; (c) a police department officer; (d) a firedepartment official; (e) an administrative servicing person; (f) arepair servicing person; and (g) a real estate sales agent.
 14. Thesystem of claim 11, wherein, said specific property comprises at leastone of: (a) a dwelling; (b) a medical care facility; and (c) a vehicle.15. The system of claim 11, wherein said intermediary controllercomprises one of: (a) a wireless controller; and (b) an electroniclockbox that further comprises a secure compartment at least a portionof which is movable and is under the control of said first processingcircuit.