Vehicle Activity Module

ABSTRACT

Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.”

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.11/703,829, filed 8 Feb. 2007, now allowed, which is acontinuation-in-part of U.S. application Ser. No. 10/734,513, filed 12Dec. 2003, now U.S. Pat. No. 7,340,400, which claims the benefit of U.S.provisional application No. 60/319,773, filed 12 Dec. 2002. Each of theforegoing is hereby incorporated by reference as though fully set forthherein.

BACKGROUND OF THE INVENTION

a. Field of the Invention

The present invention relates generally to a system and apparatus formonitoring activity in a fleet of vehicles for purposes of security,inventory control and management analysis.

b. Background Art

Car dealerships and other agencies that deal with large groups ofvehicles must have a system for tracking and maintaining security intheir vehicles, as well as being able to make projections of theinterest by the public in varying types and models. This type ofinformation is important for sales planning and ordering, and includesnot only the sales of certain models, but information on how many testdrives are taken, etc.

There are also problems that dealerships have in controlling the keys totheir vehicles. It can be inconvenient for sales personnel to return toa central office and locate the keys to a certain vehicle when acustomer is interested in driving it or perhaps merely viewing theinterior and its accessories. There are thus obvious advantages tohaving the keys to vehicles kept with them so they may be easilyaccessed by sales personnel whenever they are needed. There are ofcourse also the obvious dangers of keeping the keys with the car interms of possible theft and vandalism.

In response to this need, there have been several attempts in the priorart to provide secure key boxes on the vehicles. U.S. Pat. No. 5,563,579to Carter discloses a key storage device mounted to each vehicle window,which has a compartment for storing access keys. The storage device alsohas a sensing device which provides a signal to indicate whether anevent is routine or hostile. A second device may be permanently attachedto the vehicle for regularly transmitting identifying information as tothat vehicle. Both devices report the information by radio through anintermediate transmitter network to a computer inside the dealershipwhich records the information along with the time of the event. Theinformation is stored for subsequent retrieval for the purpose ofgenerating reports useful to the dealership management. If an event ishostile, appropriate action may be taken including suitable securityalert signaling.

U.S. Pat. No. 6,611,232 to Wunderlich discloses a lock box unit mountedon a vehicle which includes a key box for storing a vehicle key and alocator unit. The locator unit receives a polling signal from a centralbase station which includes an address for the particular locator unitto be located. The location of the locator unit and the vehicle isdetermined based upon time arrival data generated by the receivingantennas. The lock box unit may also include an identification device,which records who accesses the key box to retrieve the vehicle key. Thisinformation is stored in a memory device.

Despite these advances, problems remain with the security of vehiclesand the necessity for frequent replacement of batteries. Prior artsystems such as Carter have used a pulse generator connected to theantenna doing a roll call to ask their boxes if they have a request or aproblem to report. In this mode of operation, the boxes would alwayshave to be “listening” and would render the idea of battery-poweredmodules useless, as the drain on the batteries would require them to befrequently serviced. As an alternative, they could be configured topower the box from the car battery, but this is also problematic inlocating the box on the drivers' window and being able to remove itquickly with no wires.

In addition, it has been found that these earlier systems may be easilydisabled by a moderate blows to the modules, and due to the nature ofthe alarm reporting, the damage may not be noticed immediately.

Another problem noted with existing systems is the lack of an ability toquickly and reliably locate particular automobiles on the lots. Existingsystems have failed in this regard for a number of reasons. For example,existing products do not continually (1 to 5 minutes) receive signalsfrom each vehicle to maintain its location position. Vehicles are movedregularly for cleaning, lot freshening, detail work, maintenance, salesdemonstrations, employee use and so on. This creates issues for buyerstoday that commonly identify specific vehicles they are interested inseeing through online sites. Currently, it has been reported that 30% ofthe time in this situation, the desired vehicle can not be located.Additionally, systems that might use GPS or multiple radio antennas totriangulate the location of a vehicle are too expensive and requiremanagement that is additive to the burden of a VAM access control systemwhich must be used continually for sales staff to access and sellvehicles.

Further complicating the use of earlier systems is the increasingpresence of “smart keys” in the automobile industry. Many automobilemanufacturers now offer vehicles with these “smart keys” that allow foroperation of various vehicle functions so long as the key is within theproper proximity. These “smart keys” often interfere with the operationof earlier systems.

Thus, there is a need for a system which has effective and proactivesecurity features, provides for reliable and accurate identification andlocation of the cars, and allows the use of battery powered devices thatdo not require frequent servicing.

BRIEF SUMMARY OF THE INVENTION

Accordingly, it is an object of the present invention to provideincreased security for vehicles in a vehicle fleet system which includesthe bright flashing of a very visible red LED on all vehicles at regularintervals and any time the VAM module is disturbed when not temporarilysuspended by valid access event.

Another object of the invention is to enable automatic alerting ofdesignated individuals by internet/email/cell phone when there is asecurity violation.

And another object of the invention is to provide and integrated andself sustaining power system in each module which requires lessservicing than prior systems.

A further object of the invention is to provide VAM's which exist in alight sleep mode with the ability to react in milliseconds to anyinterrupt (disturbance/request for access).

An additional object of the present invention is to provide a securitysystem in which each VAM asks for attention when needed including wakingup at programmed (and controllable) intervals such as every 30 minutesduring business hours and every 5 minutes at night so that there is anAWOL/MIA default to generate an alert.

A further object of the present invention is to provide a plurality ofVAMs, in which each VAM is capable of autonomous operation for extendedperiods of time, including storage of event information relating toaccess, employees, location, and the like within the VAM itself suchthat any network interruption or down-time of the system as a whole doesnot affect the operation or security of the individual VAM units.

A yet further object of the present invention is to provide a systemwhere information such as frequency of VAM access, customer information,and the like can be entered directly into the VAM itself and are furtherused to generate reports, which can be used for inventory planning,sales strategies, and management decisions.

An additional object of the present invention is to provide for “smartkeys” to be managed by the VAM in addition to traditional and basicremote entry keys.

A further object of the present invention is to allow users to accessany VAM equipped vehicle at any location, which can be remote to thedealer site. Each VAM is updated daily and wirelessly so that allauthorized individuals are known to the VAM at any time and in anylocation. Accesses are tracked and reported automatically to the centralsystem once the vehicle is returned to the dealer's Wireless equippedlot. This allows the VAM to be used in any location according to dealerpolicy.

An additional object of this invention is to wirelessly locate any VAMequipped vehicle while on the dealer's lot for customer showings,real-time inventory tracking, and vehicle inventory security. Vehiclesthat are VAM equipped and are temporarily located away from thedealership, will be prompted, and required to be signed out by managerfor security and tracking Any authorized person can locate a specificvehicle by inputting the stock number or other description into anyinternet attached PC independent of location.

A further object of this invention is to provide daily reporting of allvehicles that are in being re-conditioned and/or certified which are notyet available for sale.

An additional object of this invention is to provide the option foradditional security of each vehicle by installing a wireless vehicleidentification device in said vehicle which continually identifies saidvehicle to each VAM. This device would be a miniature, battery powereddevice, which continuously signals the identity of said vehicle to itspaired VAM. Each time the VAM communicates with the wireless radio onthe lot, it would also communicate with the identification device toinsure that said VAM is located proximal to said vehicle. This wirelessidentification device further may prevent the vehicle from starting bydisabling said vehicle, e.g., by using a starter relay unless VAM isproperly accessed by an authorized person.

An advantage of the present invention is that access to keys granted ordenied in real time.

Another advantage of the present invention is that access is locked outafter hours except for master cards.

And another advantage of the present invention is that all users areidentified and tracked.

A further advantage of the present invention is that the access key iselectronic (RFID) and encrypted to avoid copying.

A yet further advantage is that each key set also has an RFID tagattached for completely unique identity tracking with each access andreturn

Another advantage is that the power source is always available andindependent, and provides regulated power to keep the electronicsoperational.

A further advantage is that rechargeable batteries provide a renewableenergy source with daily solar re-charge of the battery pack, andbattery strength is reported periodically for advanced notice if abattery is failing. Battery packs are easily replaceable by the dealer.

Another advantage is that the present system provides wireless tamperingalerts in real time.

And another advantage is that the present system sends a vehiclespecific alert (by vehicle description & VIN) immediately to a dealerdesignated security surveillance center. The same information can bealso be sent immediately to cell phone(s) as an urgent message or bye-mail.

A yet further advantage is that VAM units which are still checked in butnot reporting in at regular (5 minute) time interval will generate animmediate alarm as a fail safe.

Briefly, one preferred embodiment of the present invention is a systemfor maintaining security and data gathering for a number of vehicles.The system includes a vehicle activity module for each of the vehicles,the vehicle activity module including a wireless transmitter, at leastone ID reader, activity sensors, and a central computer having adatabase for data storage, the central computer being in wirelesscommunication with each of the vehicle activity modules. The system alsoincludes key ID tags, which are attached to vehicle keys, and personalID cards which are issued to sales, maintenance and service personnel.Information is read from personal ID cards and key ID tags attached tokeys by the activity sensors and is transmitted to the central computerfor authorization of access and recording of access activity, and forstorage and analysis.

Also disclosed are VAMs, and methods for collecting and analyzing dataon vehicle access, and for maintaining security for a plurality ofvehicles.

The present invention further provides a key management device forstoring at least one key proximate a vehicle, maintaining security, andgathering data for the vehicle having a housing having a releasable keycompartment; and a signal attenuating device being capable ofattenuating a wireless signal emitted from the at least one key. Thesignal attenuating device may include a conductive container configuredto fit within the releasable key compartment that attenuates a wirelesssignal from the key when it is disposed within the conductive container.In another embodiment, the conductive container may be integral to thedevice.

The key management device may also include an identification tag, e.g.,a RFID tag, containing vehicle information attached to and associatedwith the at least one key or the conductive container. In addition, thekey management device may further include at least one informationreader, or sensor, by which event information can be input into thedevice, and a storage device operably connected to the informationreader for receipt and storage of event information. The eventinformation may include any, or all, of the following: identificationinformation (such as employee name, user ID), access information (suchas a pin number), key information, customer information (such as atelephone number), location information, sales information, andintrusion information. The information reader may include a magneticcard reader, a RFID reader, a keypad, a biometric reader, orcombinations thereof.

The key management device may be operably connected to the computer viaa wireless transmitter (which may be configured to communicate via acellular communications facility or through a Zigbee wireless networkprotocol. The information reader may be integral, or removablyconnected, to the device.

The key management device may further include an event action mechanism,such as a release mechanism for the releasable key compartment, anintrusion alarm, an LED display, a digital display, or a data transfermechanism capable of transmitting information to the computer via thewireless transmitter. Upon verification of reference information withcorresponding event information, an event action mechanism may beactivated.

The present invention also includes a system for maintaining securityand gathering data for a plurality of vehicles. The system includes aplurality of VAMs. Each VAM may be assigned to one of a plurality ofvehicles. The VAMs further include a storage device, a wirelesstransmitter, at least one sensor, a releasable key container configuredto receive at least one key, and a processor operably coupled to one ormore of the wireless transmitter, at least one sensor, or releasable keycontainer. The VAMs are operably connected to a computer having adatabase for storage of data, the computer being in wirelesscommunication with the at least one vehicle activity module. The systemfurther includes at least one key identification device for attachmentto the at least one key of at least one of the plurality of vehicles,and at least one identification card containing information relating toan individual authorized to access at least one of the VAMs. The systemmay further include a clock within the VAM, allowing for transmission ofinformation from the VAM to the computer related to the clock.

The processor is capable of receiving and transmitting event informationto the storage device or the computer from at least one of the sensors,and is programmed to access and analyze the event information andcompare it to reference information stored in the VAM for initiation ofan event action within the VAM.

The computer periodically transmits reference information to the VAMsindependent of the event information and the reference information maybe used by at least one of the VAMs to analyze event information.

In accordance with another embodiment of the invention, at least onesensor senses the presence or absence of at least one key identificationdevice within the releasable key container and the VAM transmitsinformation relating to the presence or absence of a key identificationdevice. The sensors may be one, or a combination of a magnetic cardreader, an RFID reader, a programmable key pad, a biometric reader, or amotion sensing mechanism.

In accordance with another embodiment, the event action may be any ofthe following actions: triggering an alarm, releasing the releasable keycontainer, transmitting the event information to the computer, orcombinations thereof

The VAM of the systems in accordance with the present invention furtherinclude a rechargeable battery, which preferably is a solar poweredrechargeable battery.

The wireless transmitter of the systems is configured to communicatewith the computer through a cellular communications facility, or througha Zigbee wireless network protocol.

The systems of the present invention further provide for transmission ofthe event information from the VAM to the computer for storage in thedatabase and for generation of reports relating to the eventinformation. The computer is configurable to generate reports relatingto inventory based on the event information, such as reports forlocating at least one of the plurality of vehicles based on the eventinformation, reports relating to the presence or absence of at least oneof the keys of the plurality of vehicles based on the event information,reports relating to access to at least one of the plurality of vehiclesbased on the event information, and reports relating to attempts toaccess at least one of the plurality of vehicles.

In accordance with yet another embodiment of the present invention, amethod for managing and recording event information pertaining to accessto a plurality of vehicles is provided including the steps of: (i)assigning one of a plurality of VAMs to one of a plurality of vehicles;(ii) assigning a key identification number to a key for the assignedvehicle, the key identification number containing information thatpermits a cross-reference to the assigned vehicle; (iii) providing atleast one identification card containing information relating to anindividual authorized to access at least one VAM; (iv) connecting acomputer having a database for data storage in wireless communicationwith the at least one VAM, the computer being configured to send andreceive information to and from the at least one VAM; (v) sensing anevent from at least one of the plurality of VAMs; (vi) processinginformation relating to the sensed event with information containedwithin the VAM; and (vii) establishing a wireless communication linkbetween the plurality of vehicle activity modules and a computer, suchthat the activated vehicle activity module is capable of transmittingthe processed information to the computer relating to the sensed event.The step of assigning a key identification number may include attachinga key identification device to the key.

These and other objects and advantages of the present invention willbecome clear to those skilled in the art in view of the description ofthe best presently known mode of carrying out the invention and theindustrial applicability of the preferred embodiment as described hereinand as illustrated in the several figures of the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a diagram of the basic functional elements of the systemand apparatus of the present invention;

FIG. 2 shows a diagram of the basic physical architecture of the systemand apparatus of the present invention;

FIG. 3 shows a diagram of the basic electronic components of the vehicleactivity module of the present invention;

FIGS. 4A and B show side plan views and end plan views of the vehicleactivity module of the present invention in an open position;

FIG. 5 shows a perspective view of a vehicle activity module of thepresent invention in open position;

FIG. 6 shows a perspective view of a vehicle activity module of thepresent invention in open position;

FIG. 7 illustrates a flow chart showing the overall functional view ofthe operation of the system and apparatus of the present invention;

FIG. 8 illustrates a flow chart showing the operation of the system andapparatus of the present invention during a non-sales event;

FIG. 9 illustrates a flow chart showing the operation of the system andapparatus of the present invention during a sales event; and

FIG. 10 illustrates a flow chart showing the operation of the system andapparatus of the present invention during an intrusion event.

FIG. 11 is a schematic diagram of the configuration of the system andapparatus in accordance with one embodiment of the present invention.

FIG. 12 illustrates a flow chart showing the operation of the vehicleactivity module in accordance with one embodiment of the presentinvention.

FIG. 13 is a schematic diagram of a vehicle activity module having aconductive container for housing a “smart key” that may interfere withoperation of the system and/or the vehicle activity module.

FIG. 14 is a flow chart showing the sequence of steps for accessing andreturning a smart key in accordance with one embodiment of the presentinvention.

DETAILED DESCRIPTION OF THE INVENTION

FIGS. 1 and 2 shows the functional embodiment, and physicalinterrelations of the vehicle activity monitoring system 10 as appliedto optimizing vehicle sales. In basic terms, this system 10 includesvehicle activity modules (VAM) 12, mounted on vehicles 2, which acceptdata from or indicating various types of events, such as sales events 4,non-sales events 6 and intrusion events 8. The VAM 12 includes a lockbox or key container 14 including keys sets 16 and a transmitter orwireless link 18 which relays various information to one or moreantennae 20 connected to a central computer 22 containing a database 24.The data in this database 24 is then capable of being sorted and queriedto produce various reports 26 or to initiate alarms 28 or to provideinformation for manufacturing orders 30.

FIG. 2 shows the physical embodiment of the invention 10 as applied to adealer location. Every vehicle 2 in on the dealer lot will have auniquely identified VAM

Every VAM 12 is assigned by vehicle VIN number and stock number, whenfirst introduced into sales inventory. The assigned VAM 12 will staywith the assigned vehicle 2 until the vehicle 2 is sold or otherwiseremoved from inventory. The VAM 12 will communicate to the database 24on a PC 22 inside the dealer facility through standard wireless highgain antennas 20 located typically on the roof of the dealership. Theseantennas 20 will be installed in sufficient locations so that the VAMs12 will be able to connect from any open space on the dealer lot. Theantennas 20 will typically be wired directly to the central PC 22 exceptwhere a remote lot is part of the dealer system. In this mode ofoperation, some relay technology will be added to get the signal to thecentral PC 22. This PC 22 will serve as the collector of the event dataand deposit this into a database 24 residing on the PC 22. The PC system22 will also be the processing center for all VAM data collection andfor outputs that include but are not restricted to, event reports 26, IDissue 60, authorization control and VAM assignments 36 to each vehicle2.

In addition to standard high gain antennas, the present inventionpreferably contemplates use of the Zigbee wireless network protocol, andalternatively a cellular connection such as those offered by DigiInternational or MultiTech Systems. The Zigbee protocol is particularlypreferred because it is a highly energy efficient protocol that utilizeslow data rates so as not to interfere with other wireless technologieslike Bluetooth and 802.11 wi-fi. Use of this protocol savessignificantly on costs and energy expenditures. The cellular protocol isalso a preferable connection because it enables monitoring, transfer ofinformation, storage of information and similar benefits to be conductednot through a central PC at the site, but rather from any remotelocation. This remote capability provides for the further benefit ofprompt transfer of data from a number of different sites to a singlelocation for storage, analysis, reporting and the like.

VAM status reporting is also provided for along with the daily inventoryof all vehicles so that rechargeable battery packs 38 (see FIG. 5 below)does not drop below a minimum threshold before being recharged. Thisreporting is called the VAM health check 40 (FIG. 1) and in addition tothe battery status, will also signal any error problems detected by theVAM self contained diagnosis software 42. Web access 25 is also providedthrough which individuals can check status, access reports or be alertedto alarms or key events.

FIGS. 3 and 4A and B show a first embodiment of the present invention,in which the key container 46 is configured as a sliding drawer with amagnetic card reader for reading ID cards. FIGS. 5 and 6 shows a secondembodiment in which the key container 46 is configured as a box with ahinged top, which has been equipped with an RFID reader which can readboth a personal ID card 60 and the ID tag 74 which is attached to thevehicle key at any time in which the key container 46 is opened orclosed. Where elements are configured similarly, or perform the samefunction, they will be designated by the same element number in bothembodiments, so that for instance, a card reader 50 will refer to both amagnetic card reader and an RFID reader.

FIGS. 3-6 show the physical internals of the VAM 12. The VAM 12 consistsof three major components; the VAM housing 44, the key container module46, and the systems board electronics module 58. Included in the VAMhousing 44 is an ID reader 50, which could be a magnetic strip reader orpreferably an RFID reader, a release solenoid 52 and a release springsystem 54, and the stainless steel window straps 56, which will berecessed into the back and under the body of the VAM housing 44. The VAMhousing 44 material is preferably high impact injection molded PVC withan metal or synthetic key chamber. The use of a non-metal material forthe VAM top cover of the housing 44 allows the wireless signal to reachthe antenna 20 in either direction, through the car or away from thevehicle, making the VAM 12 more difficult to defeat. The weight andshape of each VAM makes it easy to open and to physically handle.

The third component of the VAM 12 is the electronics module 48containing the electronics circuit board 58 which is mounted in a panelthat can be removed for repair by a VAM repair depot. This circuit board58 is custom manufactured to high quality standards using all standardoff the shelf cost effective components.

Referring now also to FIGS. 1 and 2, with the reading of a valid ID card60, the ID 60 is validated in the PC database 24 in the dealership,through the wireless link 18. This validation process typically wouldtake a few seconds. Once the validation is received, the key container46 is released so that the sales consultant or other users can removethe key 16 for access to the vehicle 2. In a sales event 4, theinterested customer will be given immediate access to the vehicle 2. Ifthe customer decides to test drive the vehicle 2, the sales consultantwould simply check the customers drivers license and then take customeroff of the lot in the vehicle. When the vehicle 2 exits the lot, thewireless system 18 records that this vehicle is now absent but is stillin an open sales event. The VAM 12 then records this as a demo driveattributed to the respective sales consultant, and records the elapsedtime the vehicle 2 is out off the lot Upon completion of any sales event4, the key 16 will be replaced in the VAM 12 and the key container 46closed. All the relevant data is added to the sales event for subsequentmanagement follow-up and sales reporting.

Any open event must be terminated by the key replacement as verified bya key presence sensor 62 and container closure sensor 64.

FIG. 4A shows the VAM key container 46 in the fully open position andalso a view of the VAM 12 from the right side when closed in FIG. 4B.

FIGS. 5 and 6 show the VAM 12, with the key container 46 in openposition and closed positions, respectively. The VAM 44 housing consistsof a top cover 82 which also houses the electronic system board 58 andthe housing bottom 84 which includes the key container 46. The latchmechanism 66 is visible in FIG. 5, along with a set of LEDs 68 whichindicate status. The wireless transmitter 18 is located on the circuitboard and is generally in the top front left area just under the cover82. The circuit board 58 is shown in dashed lines. An intrusion sensor70 is also located on the circuit board 58 as shown. The battery pack 38is located below the circuit board 58 in the left end of the key chamber46. In order to help keep the rechargeable battery pack 38 fullycharged, a high efficiency solar panel 72 is permanently installed inthe top 82 which provides the batteries 38 with a trickle charge duringdaylight hours.

The electronic system board 58 is a single circuit board locatedhorizontally inside the top 82 of the VAM 12. In FIG. 5, the systemboard 58 is directly behind the LEDs 68, and extends almost the fulllength and width of the top cover 82. The key presence sensor 62 and IDsensor 50 antenna consists of 2 loops of wire that run around theoutside edge of the system board 58.

An important feature of the system is the Key Tag function. Each vehiclekey set 16 has a small RFID key ID tag 74 attached by a metal wire loop.This key ID tag 74 is a “smart tag” that transmits a unique ID code inthe presence the correct sensor. These key ID tags 74 will be “read”electronically each time the VAM 12 is accessed and again when closed bythe key presence sensor 62. The purpose of this key ID tag 74 is toidentify that upon each access there is a key set 16 in the VAM 12 andthat it is the correct key set 16.

The key ID tag 74 is typically assigned to a key set 16 (often includinga smart key and a signal attenuating container) and a VAM 12 by anadministrative person at the time a vehicle 2 is placed in inventory.This is accomplished quickly since the vehicle descriptions such asmodel, color and VIN number are automatically loaded into the server 22each night from the dealer management system. The key tag ID 74 issensed or read by a key presence sensor 62 on the main system board 58in each VAM 12, so long as the tag 74 is in the VAM key container 46.The key presence sensor 62 is a custom designed circuit that is built toread the key tag 74 and also the user ID card 60, with one commoncircuit, and to recognize and read both the key tag 74 and the ID card60 at the same time, thus it is appropriate to refer to the key tag/IDsensor 86. The sensor circuit 62 is built into and encircles theelectronics on the single systems board 58. It sits over and only a fewinches above the key tag 74 when in place in the VAM 12.

Another important feature is the key chamber position switches 76function. There are two micro switches 78 mounted on the system board 58to detect whether the key chamber 46 is now open or shut, and whetherthere is an immediate request to access the VAM 12 or to close an eventsince the keys 16 have just returned. The two key chamber positionswitches 78 are located inside the VAM 12 and at the back of the VAM 12.The system board 58 is mounted horizontally inside an injection moldedtop section 80. When viewing a VAM 12 on a drivers side window, theswitches 78 are mounted underneath and at the back of the system board58 such that when the key chamber 46 is closed, it contacts these twoswitches 78 at the point at which the solenoid latch 66 engages. Oneswitch serves as a ‘key chamber closed’ indicator and the second servesas a request to wake-up and/or open indicator.

The VAM 12 is also equipped with an intrusion sensor 70. The function ofthe intrusion sensor 70 is to send an alert to dealership security thatis based on the level and type of disturbance. This sensor 70 or“disturbance switch” is designed for automotive and military defenseapplications. The intrusion sensor 70 is a small inconspicuous devicelocated on the system board 58 alongside other electronic components.This intrusion sensor 70 is calibrated to detect random disturbances ina horizontal plane and also detects abnormal tilt motion. Eachdealership will be able to choose the level of sensitivity that theywant from their VAM 12 units. This is important since some geographicareas have more theft and vandalism problems and lack of detection is adriving problem. The alerts are disabled when there is a valid eventunderway. Also, the RED LED's 68 would typically be used as a visualwarning by blinking brightly from time to time and also will react whendisturbed during the times the dealership is open. After hours, theLED's also acts as a deterrent by all VAM's randomly flashing their REDLED's every few minutes. Any detected intrusion would send a watch alertor a full alert to the dealer's security service depending on theseverity of the disturbance. In this way, some heavy weather causeddisturbances can be differentiated from an actual intrusion or attemptedintrusion.

In addition to security alarms activated by disturbances, each VAM 12asks for attention when needed including waking up at programmed (andcontrollable) intervals such as every 30 minutes during business hoursand every 5 minutes at night so we have an AWOL/MIA fall back togenerate an alert.

By applying the information deposited in the database 24 from the VAMs12 along with the dealer's experience, an objective of continuouslyincreasing inventory turns and profitability is supported by theextension recorded and organized event data.

As mentioned above, there will be at least three types of events enabledby the present system 10. Flow charts are shown for each of these threeevent types in FIGS. 8-10, as well as for a general functional view 100of event detection in FIG. 7. FIGS. 1-6 are also referenced for somephysical elements discussed in conjunction with the flowcharts.

Generally, the three events 4, 6, and 8 are detected by any of the VAMunits 12 which are included in up to 2,000 vehicles 102. Thisinformation is relayed to the VAM PC server 104, which is equipped withon-line access 106. On-line requests can be used to generate on-linereports 108 such as sales assistant reports, intrusion actions andreports, VAM status and health checks, vehicle inventories, sales anduser ID assignment reports, noted as a group as 110.

The database 24 has been designed for maximum flexibility with thesupplied screens and for any custom reports the dealer wants to use.Reports can be sent on a scheduled basis by email, and can also beaccesses on-line by authorized individuals. Reports are delivered in MSExcel format.

Reports such as the “missing vehicle” report will quickly find allvehicles not properly checked out, missing or not available for sale.Any detected disturbance of the lockbox will send out an alert/alarm toa security company/dealer general manager. This feature will likely beused as a visual disturbance warning (RED LED) in the day and sendalerts by internet and/or cell phone message. By example: Intrusionalert: HIGH for Red Corvette, north lot VIN123456789, and ON STARequipped.

FIG. 8 shows a flow chart 112 for a sales event 4. A sales event 4 isinitiated when a customer requests a viewing 114. The Sales Assistant isassumed to have been issued an appropriate ID card 60. He finds thevehicle 2 and requests access by scanning his ID card 60 through thereader 116. Red and green LEDs 68 indicate each step of the process 118,and the electronic key tag ID 74 is read and recorded in the centralcomputer 120, along with the Sales Assistant's ID 122. A sales event 4is opened in the server 124, and access is granted to the vehicle 2 asthe key 16 is removed for the key container 126. The vehicle is opened128 for inspection and the customer is asked whether she wants a testdrive 130. If the answer is no, the key is returned to the key container132 and the sales event is closed 142. If the answer is yes, the demodrive time is automatically recorded in the server 134. A determinationwhether the drive time limit exceeds a permitted limit 136. If not, thekey is returned to the key container 132 and the sales event is closed142. If the limit is exceeded, an alert is sent to management 138, whichmust be cleared 140 before the sales event is closed 142. If the alertis not cleared, an alarm may be sounded or security or police agenciesnotified.

The VAM 12 is programmed to periodically wake-up and check in 144 atprogrammed (and controllable) intervals such as every 30 minutes duringbusiness hours and every 5 minutes at night so there is an AWOL/MIA fallback to generate an alert. The VAM is then ready for the next access146.

FIG. 9 shows a flow chart 147 for non-sales events 6. ID cards 60 areissued to porters, service personnel, administrators, and vendors 148who might have need for access to the vehicles. Access is requested byone of these personnel by pressing on the VAM 150 key container 46chamber with a slight upward motion on the right side. This activatesthe ‘request for wake-up’ and service switch. LEDs 68 again indicatesteps 152. The key ID tag 74 is read by the VAM 12 and validated by theserver 154. The user ID 60 is read and validated by the server 156. Ifthe ID is valid 158, the key chamber 46 is now available to open with asecond slight upward motion again on the right end. This will nowactivate the unlocking solenoid 52 and the key chamber 46 will swingdown and expose the vehicle key set 160 The server records Key and UserID information 162, the key 16 is removed 164 from the key container 46,and the vehicle 2 is opened 166. The time that the vehicle is opened isrecorded and later it is determined if the key is not returned withinthe time limit designated by the dealer as the ‘maximum demo/key missingtime’ 168. If “yes”, the key is returned to the key container, and thenon-sales event is recorded and closed 170. If the limit is exceeded, analert is sent to management 172, which must be cleared 174 before thenon-sales event is recorded and closed 170. The VAM is then ready forthe next access 176. If the alert is not cleared, an alarm may besounded or security or police agencies notified.

FIG. 10 shows a flow chart 178 for an intrusion event 8. Vehicle key 16and key tags 74 are electronically assigned to the vehicle 2 and VAM180. The key tag 74 is checked when the VAM 12 is opened 182, and it isdetermined whether it is the correct key 184. If “yes”, a seconddetermination is made by the server 22 whether the event takes placesduring normal operating hours 186. If “yes” again, the time that thevehicle 2 is opened is recorded and determined if returned within themaximum demo drive time limit 188. If “yes”, the VAM 12 is ready for thenext access 208. If the limit is exceeded, then a missing key alert issent to the management 190, which must be cleared 192 before the VAM isthen ready for the next access 208. If the alert is not cleared, analarm may be sounded or security or police agencies notified.

If the key is not correct, then a missing key alert is sent to themanagement 190, which must then be cleared 192 before the VAM is readyfor the next access 208.

If the key is correct 184, but it is after hours for the dealership 186,the VAM 12 checks in every 5 minutes 194. If the check in is completed196, the VAM 12 is ready for the next access 208. If the check-in is notcompleted 196, a missing vehicle alert is sent to management andsecurity 198.

The VAM 12 is equipped with an intrusion sensor 70 which detectsdisturbance of the module. If an intrusion is detected 200, there is adetermination whether it takes place during normal operating hours 202.If yes, a visual alert from the Red LED flashes as a warning 206 and theVAM 12 is ready for the next access 208. Optionally, a Dealer candesignate that an alarm be sent even during the day but it is unlikelyto be used, since most thefts occur at night. If it is after normaldealer operating hours 202, an Intrusion High Alert is sent to securityand management 204, which must be cleared 192 before the VAM is thenready for the next access 208.

FIG. 11 shows a schematic diagram of a system and method furtherexemplifying embodiments of the present invention. As shown in FIG. 11,at least one VAM 200 is provided for removable attachment to at leastone vehicle 202 and preferably for a plurality of vehicles on a lot.

The VAM 200 is typically connected to a computer system 204 having adatabase for storage of the information received from the various VAMs200 during operation through any number of known wireless networks. Thecomputer system 204 further includes systems 214 for creation andmanagement of the identification devices, such as key tags and/or IDcards.

The term computer is used broadly in the context of the presentinvention and includes any individual computer that is operablyconnected to the VAMs, whether it be an on-site computer, or any networkof computers operably connected to the VAMs. The computer may be astandard desktop or laptop computer, or may also be a server connectedto any number of remote computers. The computer system preferablyincludes a user interface and software that allows for administration ofthe systems and methods remotely, either on site, or at a remote site tothe vehicle lot.

The VAMs 200 are connected wirelessly 203 via at least one wirelessrouter 206 strategically positioned on the lot, although other devicessuch as repeaters and/or transponders may be employed. The placement andnumber of routers 206 are typically site-specific and can be modified inany number variations. The routers 206 may be directly connected to thecomputer system 204, or alternatively may be operably connected to agateway (or router) 205 that serves to condition the information fordistribution to the computer system 204. The computer system 204includes a host computer 208, such as a server, connected to a network210, such as the Internet. Any number of remote computers 212 aretherefore connectable to the host computer 208 through a web-basedbrowser program.

Suitable wireless networks include Wi-Fi networks, Bluetooth networks,Zigbee networks, cellular networks, and the like. Preferably, thewireless networks employed by the present invention utilize either aZigbee based wireless network or a cellular network, or both, because oftheir advantages in power consumption and flexibility in communicationwith the computer. In the case of Zigbee wireless networks, asignificant benefit is provided because this protocol is extremelyenergy efficient, which provides for significant advantages in designingthe VAMs.

The wireless connection to the host computer 208 can be made eitherthrough a remote computer 212 on-site that is operably connected to theserver, e.g., via the Internet 210. Alternatively, the connection 216 tothe host computer 208 is advantageously accomplished via a cellularmodem connection 218. The cellular connection 218 is particularlyadvantageous because it allows for the VAMs 200 to remain in connectionwith the host computer 208 without regard to the computer systemson-site. Thus, if the computer systems on-site are down, overloaded, ornot properly maintained the VAMs remain functional and operational.

The systems and methods according to the present invention furtherinclude the use of key identification devices and user identificationdevices, such as key ID tags, individual ID cards, and the like, thatserve to provide secure access to the VAMs and further provide theability to monitor the keys and locations of the vehicles. These devicesfurther facilitate the logging and monitoring of event informationrelating to the vehicles, such as whether the vehicle has been accessedand whether the key is present in the VAM. These devices include RFID,magnetic, or biometric cards, tags, or other devices. Systems forcreating and coding these devices are preferably placed on site forprompt and easy creation and management of the identification devices.These systems are commercially available and known to those of skill inthe art. Examples of these systems include: commercially availablefingerprint readers, access cards with magnetic strips and/or bar codesand RFID cards or fobs.

The key identification device is attached to the key of each vehicle andcontains information identifying the particular key with the appropriatevehicle (including for example, VIN numbers, make, color, and the like).The user identification device is typically unique to an individual thatis authorized to access the vehicles and includes information as to theparticular user (including for example, name, position, level of access,or an employee identification number). The information pertaining to thevehicles and the users is also stored on the computer so that it can beupdated to the machines to actively promote management of access,security to the vehicles, and monitoring of inventory.

The VAM includes a storage device capable of receiving and storing data,a wireless transmitter, at least one sensor, a releasable key containerconfigured to receive at least one key, and a processor. The VAM furtherincludes an efficient rechargeable battery, preferably a solar chargedbattery.

The storage device may be any known storage device known to those in theart. Suitable storage devices include internal RAM storage devices, andmay also include other forms of memory storage, including flash memorydevices.

Wireless transmitters suitable for use in the present invention are alsoknown to those of ordinary skill in the art. Suitable wirelesstransmitters include those used in connection with wireless homeautomation systems that connect appliances, heating and airconditioning, lights, with hand held control panels.

The sensors can be any number of sensors depending on the particularapplication. Suitable sensors for reading information from theidentification devices include an RFID readers, magnetic strip readers,biometric readers, and keypads. The sensors may also include intrusionsensors that detect disturbances with the VAM or the vehicle, such asattempts to tamper with the VAM or to break into the vehicle. Thesensors are capable of receiving and transmitting information receivedfrom the identification devices or from disturbances to the storagedevice. The sensors are advantageous because they allow, not only forthe monitoring of authorized access to the VAMs but further provide forthe ability to capture valuable event information, such as customerphone numbers, names, addresses, and the like, that is in turn utilizedin generating reports, marketing effectiveness information, salescampaign information, sales follow-up information, and alarms.

The VAM further includes a processor that is programmed to access andanalyze the event information and compare the event information toreference information stored in the storage device for initiation ofactions dictated by the identification devices. These events include,for example, triggering an alarm, releasing the releasable keycontainer, and transmitting the event information to the computer.

The releasable key container includes a solenoid that activates to openthe container upon receipt of verified access of the identificationdevices. Preferably, the key container opens only a portion upon thetriggering event and is opened the rest of the way by the user. The VAMis capable of transmitting information pertaining to the status of thereleasable key container to the storage device for furtheridentification of the status of the vehicle key. If the containerremains open, or the key is missing, for a predetermined period of time,the VAM may transmit a warning signal to the computer. Upon closure ofthe container, information may again be transmitted thereby storing aperiod of time the key was removed from the VAM. Alternatively, thesensors are capable of sensing when, and for how long, the key wasremoved from the VAM.

The VAM is preferably configured to allow for autonomous operation forextended periods of time, without requiring access to the computer forverifying event information such as whether the user is authorized toaccess the vehicle.

FIG. 12 identifies a flow diagram exemplifying the operation 300 of oneembodiment of the VAM operably connected to a computer system.Initially, the VAM receives event information 302 from the sensors. Thisevent information is often provided, at least in part, by the key oruser identification devices. Event information may also beadvantageously provided through other devices, such as user interactionwith a keypad. The event information is then stored 304 in a storagedevice within the VAM. Information in addition to key or useridentification information, such time of access may also be associatedwith the event information.

Once the event information is stored 304 in the storage device, aprogrammed processor accesses and analyzes the event information. Theprocessor then initiates either: an action based on the eventinformation 308; or communication 310 with the computer system 312 via,for example, a wireless router. For example, in the instance where theevent information is related to access to the VAM, the processorinitiates the opening of the releasable key container. The processor maybe programmed to initiate any number of actions in response to eventinformation and may preferably compare event information to referenceinformation stored in the storage device 314. The information relatingto the action initiated may further be transferred 314 to the computersystem 314 for storage and analysis.

The VAM processor also initiates communication 310 with the computersystem via the wireless connection. This communication may be programmedto occur at periodic intervals, e.g., once a day, or may be programmedto occur based on event information. The communication 310 with thecomputer system 314 serves to allow the VAM to obtain and maintainupdated reference information relating to event information and furtherto provide the stored information, for example, information relating tosales events, non-sales events and intrusion events, without queryingthe computer each time event information is received. In this instance,the reference information used to verify information received by the VAMfrom the sensors is downloaded 316 onto the VAMs from the computer 312independent of any event information being sensed. This autonomousoperation provides the significant advantages of decreased powerconsumption and the ability to operate in the event the on-site computersystems are down or to be used remotely at a paint shop, tire shop, orat a shopping center sale, or tent sale.

FIGS. 13 and 14 show a VAM 400 in which at least one of the sensors is akeypad system 402 for information entry and access. The keypad system402 may be used in addition to, or in place of, a magnetic card reader402 or RFID reader (not shown). The keypad system 402 provides furtheradditional benefits for the VAM 400 and related systems. The keypadsystem 402 allows for the entry and capture of important customerinformation, including contact information such as a telephone number,to be entered by the employee at the time the key is accessed. Thisinformation can then be sent to the computer system for use byemployees, sales personnel, management, and the like. This informationcan be sorted, stored, and accessed by the system for further analysisand reporting. In addition, the keypad 402 provides redundancy andadditional security. One example of the added security includes themanagement of access to the VAM 400 by use of employee pin numbers, oraccess numbers. These access numbers may be numbers assigned to aparticular employee, or may be a predetermined number used by any or allgiven VAMs 400 at a particular time, e.g., a daily access number or arevolving access number similar to those used in connection with RSASecurID™ systems. Inclusion of both a magnetic 404, RFID (not shown), orother entry device, and pin or access numbers thereby provides anadditional level of security should an unauthorized individual obtainaccess to a card. Suitable keypads 402 include commercially availableprogrammable keypads. Preferably, the keypads, as well as the VAMhousing, are manufactured to withstand the harsher environmentalconditions they will be subjected to during use in automobile lots,including, for example, moisture, and excessive hot or cold weather.

In another embodiment, the VAM 400 is configured to require two forms ofidentification prior to granting access. For example, in the instancewhere the VAM 400 includes a keypad sensor 402 and an RFID sensor (notshown), the VAM 400 can be configured to require both recognition of theuser's RFID identification card as well as entry of information into thekeypad 402. Alternatively, the user may be required to enter thepotential customer's telephone number into the key pad 402, or anotherpredetermined code. This provides additional security advantages in theinstance where an unauthorized user may attempt to use someone's RFIDcard. Additionally, the requirement of entering the customer's phonenumber captures vital information enabling dealers to follow up withcustomers interested in purchasing cars.

As shown in FIG. 13, the VAM 400 may also include a conductive, orsignal attenuating, container 406, which serves to accommodate “smartkeys” 408 into the VAMs 400. Generally, smart keys 408 include use of awireless RFID to signal the appropriate vehicle to unlock when the doorhandles are pulled, and the smart key 408 is within a few feet of thevehicle 410. In addition, the smart key 408 allows the vehicle 410 to bestarted and operated by having the key 408 in the proximity of a sensorin the area of the vehicle front seat. Smart keys provide new obstaclesand issues for the management of keys. Attenuating the smart key signalmay be necessary in order for the VAM 400 to store the smart key 408while simultaneously preventing access to the vehicle 410. Attenuating,or blocking, means impeding or inhibiting the wireless signalsufficiently such that the wireless signal does not achieve its intendedfunction.

Attenuating the smart key 408 signal is preferably accomplished throughuse of a conductive housing, e.g., a Faraday cage. The conductivehousing is an enclosure formed by conducting material, or by a mesh ofsuch material. Such an enclosure blocks out external static electricalfields. In operation, the electrical charges in the conductive housingrepel each other and will therefore always reside on the outside surfaceof the conductive housing. Any external electrical field will cause thecharges to rearrange so as to completely cancel the field's effects inthe housing's interior. Faraday cages also shield the interior fromexternal electromagnetic radiation if the conductor is thick enough andits meshes, if present, are significantly smaller than the radiation'swavelength. A Faraday cage generally includes a metallic housing, orenclosure, that prevents the entry or escape of an electromagnetic (EM)field. Exemplary Faraday cages include a solid tubular, rectangular, orother appropriately shaped container with one open end. The material ofthe cage is preferably metallic, but could be any other similarconductive material that prevents entry or escape of an EM field. It mayalso be made of a mesh of a conducting material. The signal attenuatinghousing may be a separate component of the VAM or integral to the VAMhousing, provided the structure is sufficient in composition and shapeto prevent the “smart key” from communicating with the automobile whileit is within the VAM or the signal attenuating housing. Alternatively,the signal may be attenuated through temporary disablement of the smartkey signal, as is possible with a number of smart keys, or through otherknown devices or methods.

FIG. 13 shows a smart key 408 having a dealership vehicle ID tag 412attached thereto. A conductive container 406 is also provided to preventcommunication between the smart key 408 and the automobile 410 while thekey 408 is present within the conductive housing 406. This conductivecontainer 406 is preferably semi-permanently attached to the key 408 sothat it is not inadvertently separated from the key 408. A RFID tag 414is appended to the outside of the conductive container 406, which thenallows for verification of the presence and location of the conductivecontainer 406, and accordingly the key 408. In use, the smart key 408 isstored within the conductive container 406, which is then stored withinthe key storage portion 418 of the VAM housing. Access to the VAM 400 isthen achieved through one of the keypad 402, ID reader 404, or RFIDreader (not shown). The presence of the key 406 within the conductivecontainer 406 thus does not interfere with access to the VAM 400 andstorage of related data, nor does the key 408 affect access to thevehicle 410 until it is removed from the container 406.

FIG. 14 shows an example of sequential steps for accessing a smart keyin accordance with this embodiment of the present invention. At step 502the user provides identification information (e.g., via a RFID card,and/or a pin or access number). The VAM 500, upon validation of theinformation provided, at step 504, grants access to the releasable keycontainer 506. Preferably, the releasable key container opens only partway, requiring the user to manually assist the full opening of thereleasable key container, as shown in step 508. Next, at step 510, theconductive housing 512, which contains the key 514, is removed. Once theparticular event is completed, the key 514 is returned to the conductivehousing 512 at step 516. The conductive housing and key are thenreturned to the VAM at step 518.

Other features and embodiments include an inventory management systemfor a plurality of vehicles having a plurality of vehicle activitymodules, each including an identification number to uniquely identifythe vehicle activity module, a wireless transmitter, an activity sensor,a key container to receive a key, and a key sensor to monitor thepresence of a key in the key container. The inventory management systemfurther includes a host computer, or central computer in communicationwith each of the transmitters of said plurality of vehicle activitymodules; and a plurality of access ID cards having unique identificationnumbers for accessing a key contained in a vehicle activity module. Theactivity sensor reads a unique identification number of one of theplurality of access ID, verifies that the access ID card is authorizedto have access to the key in the key container, and then permits accessto the key container so that the key may be removed to operate avehicle. The inventory management system further includes a device, suchas a keypad, to allow a user to enter a personal identification numberwhich is then cross-referenced against, or stored in, a database withinthe VAM.

The inventory management system may further provide confirmation whenthe access ID card has been activated. The confirmation may be a visiblelight, a bell sound, a beeping sound, a flashing light, a green light, arecording of the words “thank you,” and combinations thereof. Theinventory management system may required a confirmation signal from atleast one of the following: a bio-informatics sensor that confirms thatthe person attempting to activate the access ID card is a person who isauthorized to possess the access ID card; and a speech recognitionsensor that confirms that the person attempting to activate the accessID card is a person who is authorized to possess the access ID card.

The inventory management system may also include a second key sensorthat determines whether a key that is placed in the key container of thepredetermined vehicle activity module is a key that is designed tooperate the vehicle to which the predetermined vehicle activity moduleis attached, and wherein the system computer utilizes the database totrack the identity of keys that are placed in at least one vehicleactivity module. Thus, for keys that include their own signalingability, these keys may be used in place of requiring a separate keytag.

The inventory management system may also include a plurality of keytags, each of which is configured to attach to a vehicle key. The keytag has a unique key tag identification number which is used to identifythe key to which it is attached; and the second key sensor detects aunique key tag identification number to determine whether the key towhich one of the plurality of key tags is attached is a key that isdesigned to operate the vehicle. The inventory management system.

In another embodiment, the system computer of the inventory managementsystem sets a flag when the activity sensor permits access to the keycontainer containing a key, and if the key sensor does not detect thereturn of the key within a predetermined time period, the systemcomputer activates the alarm to indicate that the key has not beenreturned, wherein the alarm is selected from the group consisting of: anaudio alarm on the vehicle whose key has not been returned; anelectronic mail notification to a predetermined email address; anelectronic notification delivered via a cell phone; and combinationsthereof.

In another embodiment, the inventory management includes a userinterface program that permits an authorized user to run queries oninformation contained in the database. The user interface program may belocated either within the VAM or at the central, or system, computer.The user interface may be configured to be accessed from a locationremote from the system computer by either a local area network or theInternet. The user interface program may further be configured toreceive input from a user, e.g. a vehicle description, and the interfaceprogram will generate a report to the user which identifies a locationwhere a vehicle matching the input description may be found.Alternatively, the user interface program may allow for receipt of otherinput from users, such as queries relating to access ID cards, orauthorized users. In such an example, the activity sensor compares theunique identification number of one of the plurality of access ID cardsto a downloaded list of authorized users to determine that the access IDcard is authorized to have access to the key in the key container, andthen permits access to the key container so that the key may be removed.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

All directional references (e.g., upper, lower, upward, downward, left,right, leftward, rightward, top, bottom, above, below, vertical,horizontal, clockwise, and counterclockwise) are only used foridentification purposes to aid the reader's understanding of the presentinvention, and do not create limitations, particularly as to theposition, orientation, or use of the invention. Joinder references(e.g., attached, coupled, connected, and the like) are to be construedbroadly and may include intermediate members between a connection ofelements and relative movement between elements.

As such, joinder references do not necessarily infer that two elementsare directly connected and in fixed relation to each other. It isintended that all matter contained in the above description or shown inthe accompanying drawings shall be interpreted as illustrative only andnot limiting. Changes in detail or structure may be made withoutdeparting from the spirit of the invention as defined in the appendedclaims.

INDUSTRIAL APPLICABILITY

The present Vehicle Activity Module system 10 is well suited forapplication in providing security, tracking and managerial information.

Car dealers were consulted as to what features were desirable to improvesecurity and inventory control and their responses were used as a basisfor this invention. These features included the need for use on bothused and new vehicles to provide information on whom, when, how long andwhy they were accessed. They wanted the key available on the car, wantedthe system to be intuitive, react in real time, have tamper controls,and able to provide the status on demand for inventory, key and theftcontrol by providing basic reports. A sensor for the key container wasdesired, and the system should require low maintenance.

Due to the recent advancements in products for wireless communications,all weather RFID card readers, and solar assisted battery technology,the components are available from off the shelf making this inventionpossible at a reasonable cost. Each time a sales consultant opens avehicle for customer showing, a sales event will be launched when thesales consultant's ID is validated after passed through the VAM reader.If the ID is approved the key container will immediately be accessible.This event will continue to be open until terminated by replacing thekey and closing the VAM key container. A system alert will be generatedif closure is not achieved in a reasonable period of time (as fixed bydealer policy).

The second event will be a non-sales and non intrusion event such asvehicle cleaning, moving the vehicle to a different location, and thevehicle being taken out of inventory by sale, trade, auction, or otherassignment.

Third, will be any event that is interpreted by the internal VAM sensorsand tampering, referred to here as an intrusion event. Sensitivity tonormal events will not generate an alarm. However, the shock sensor inthe VAM can be turned up in off hours by the central system, to attackany minor tampering in off hours. Web access will be provided forauthorized persons to remotely access reports, inventory data, systemstatus, VAM status, software support, software enhancements, andauthorized third party access. Intrusion detection and alerting will beintegrated with each VAM. If there in an unauthorized attempt to removeor tamper with the VAM when the dealership is closed, the VAM sensorswill detect this tampering and signal, brightly flash the red led and atthe same time an alarm will be sent immediately go to a dealerdesignated security service and/or to dealer management If for anyreason the VAM is unable to communicate the alarm to the VAM System, amissing vehicle alarm will be sent out 5 minutes later when the VAMfails to check-in.

In addition, and with dealer consent, demand and fulfillment informationmay be aggregated and made available to the vehicle manufacturers. Thisdata could be used to improve the production planning and possiblyreturn on assets by the manufacturers by improving the accuracy ofmatching vehicle production to the most current demand, with thepossibility of benefiting all parties while protecting the best interestof the dealers.

This invention is the first real-time data authorization process tocapture the all inventoried dealer vehicle access events “on the spot”and to therefore insure access accountability. Key elements of thisinvention are as follows:

1. Wireless device that is hooked over the window of each vehicle ininventory. This device is termed the “Vehicle Activity Module” or VAM.The VAM will utilize a personalized magnetic card and a reader similarto a bankcard and each authorized cardholder will have a uniqueidentifier.

2. Antennas typically will be located on the dealership roof or lightpoles and provide a clear path to communicate with all Vehicle ActivityModules. Multiple VAM's can communicate with a single antennasimultaneously. VAM access to the antennas does not have to be line ofsite as wireless is designed to be used in buildings as well and willpenetrate walls and windows. Each antenna will relay the information toa central computer typically located in the dealership phone and networkequipment room.

3. The dealer VAM database will preferably consist of a standard PC witha Microsoft relational database, which will provide validation inreal-time, prior to any authorized vehicle access. With a validated cardthe VAM will present the vehicle key and record this event.

4. When the vehicle activity is completed (within a reasonable period oftime), the key will be returned to the VAM and the event terminated byclosure of the VAM with the vehicle key replaced in the speciallydesigned releasable key container. Each step will be recorded in thedata base and the VAM is ready for the next access. If the vehicle keyis a “smart key” then it is inserted into the “smart key” signalattenuating container before placing in the VAM and closing the chamber.The electronically assigned RFID key tag is attached to the top ofsleeve and both are tethered to the “Smart Key” as in FIG. 11.

5. When each Authorized Access cardholder arrives for the day they willquickly “activate” their ID at a station near the showroom. This willhelp insure that the individual is present at that time and inpossession of their assigned ID card. This notification event isrequired to allow any specific card to be a valid for that day or untilthat specific card is suspended.

6. From time to time during the day and in between sales events eachSales Consultants can easily add comments and customer contact detailsto the activity report at any dealership.

7. New or emergency cards can be issued as required by the appropriateperson with access to the authorization application.

8. There will be three standard reports generated by the VAM System thatcan get scheduled or generated as required:

Sales Activity Report summary by Sales Consultant;

Vehicle Activity Report with alerts for action based on individualdealer policy; and

VAM Status report for maintenance actions.

9. There will be one or more additional applications available to eachdealer, which will provide a managerial, user friendly “dash board” forpast vehicle sales analysis and future inventory planning The activityinformation history contained in the data base (actual sales by vehiclegroup, by margin, by feature group, by price, by color, promotions,competitive moves, and other factors, as defined by each dealer), willbe used for projecting inventory replenishment requirements.

Pre-Installation Planning Required

-   -   Detailed Site Survey to create a commercial level custom        wireless infrastructure blueprint    -   Installation approved, directed, and tested.    -   Installation includes computer system/access points and antennas        (typical installation will have 4 to 10 antennas connected to        one server).

Installation and Vehicle Data Loading

-   -   Detailed Vehicle Data is automatically loaded nightly on the VAM        server from the dealers DMS (dealer management system—typically        ADP or Reynolds& Reynolds).    -   Installation of the VAM System is a few administrative set up        screens.

ID Cards Created at the Dealership

-   -   Individual ID cards are issued to sales, management, service,        lot porters, and special vendors.    -   The system provides tracks a daily pass ID when needed so that        there is no need to borrow.    -   The general manager will keep some master ID cards in event an        emergency. A master card gives immediately opens any VAM        lockbox.

Sales Event

-   -   Sales person activates VAM and obtains the vehicle key.    -   Sales person optionally enters customer information, such as a        phone number.    -   Shows vehicle to customer.    -   Demo Drive is captured if applicable.    -   Key is replaced and event is closed.    -   Daily comments into any and every sales event can easily be        quickly (pre-defined check boxes plus comment block) be        captured.

Non Sales Event

-   -   Vehicles are accessed constantly for non-sales reasons.    -   There are 2× daily accesses for non-sales events.    -   Vehicles can get stuck in vendor locations where there are        service/repair needs. The system highlights vehicles that are in        inventory and have no/few sales events

The core of the VAM System is the lockbox integrated with a customdesigned wireless infrastructure (every dealership is different) and themanagement software to make key access and accountability dealershipsuper simple.

The present invention uses a system where the VAM is in a light sleepmode with the ability to react in milliseconds to any interrupt(disturbance/request for access). There is no concept of a roll call buteach VAM asks for attention when needed, including waking up atprogrammed (and controllable) intervals such as every 30 minutes duringbusiness hours and every 5 minutes at night so that there is an AWOL/MIAfall back to generate an alert. This avoids the problems involved inusing a pulse generator, which must constantly listen for a “roll call”and thus expends battery power quickly.

VAM Access Control to Keys Sets

-   -   Access to keys granted or denied in real time.    -   Access locked out after hours except for master cards.    -   All users identified and tracked.    -   Access key is electronic (RFID) and encrypted to avoid copying.    -   Each key set also has an RFID tag for tracking with each access        and return.    -   Power Source—always available and independent power sources are        required to secure the car.    -   Regulated power to keep the electronics operational    -   Renewable energy source with daily solar re-charge of the        battery pack    -   Battery strength reported every few minutes for advanced notice        if a failing battery.    -   Battery packs are easily replaceable by the dealer.

Real Time Wireless Tampering Alerts

Vehicle specific (by vehicle description & VIN) immediately reported tosecurity surveillance center.

Same information can be also be sent immediately to cell phone(s) as anurgent message.

Same information is also sent by email.

VAM units not reporting in at regular (5-minute) time interval willgenerate an immediate alarm as a fail safe.

For the above, and other, reasons, it is expected that the vehicleactivity module system of the present invention will have widespreadindustrial applicability. Therefore, it is expected that the commercialutility of the present invention will be extensive and long lasting.

1. A device for storing at least one key proximate a remote location,maintaining security, and gathering data for the remote location, thedevice comprising: a housing having a releasable key compartment; and aconductive container configured to fit within the releasable keycompartment and further configured to receive at least one remotelocation key; the conductive container being capable of attenuating awireless signal emitted from the at least one key when disposed withinthe conductive container.
 2. The device of claim 1 wherein saidconductive container is integral to the device.
 3. (canceled)
 4. Thedevice of claim 3 wherein the identification tag is an RFID tag. 5.(canceled)
 6. (canceled)
 7. The device of claim 6 further comprising: awireless transmitter by which the event information and referenceinformation can be transmitted to a computer for storage and analysis.8. The device of claim 7 wherein the wireless transmitter is configuredto communicate with the computer through a cellular communicationsfacility.
 9. (canceled)
 10. The device of claim 1 wherein the conductivecontainer is a Faraday cage.
 11. (canceled)
 12. The device of claim 1wherein the conductive container comprises metal.
 13. The device ofclaim 12 further comprising a connector by which the conductivecontainer may be coupled to a ground reference.
 14. (canceled)
 15. Thedevice of claim 14 wherein the keypad is integral to the device.
 16. Thedevice of claim 14 wherein the keypad is removably connected to thedevice.
 17. (canceled)
 18. (canceled)
 19. (canceled)
 20. (canceled) 21.(canceled)
 22. (canceled)
 23. (canceled)
 24. A system for maintainingsecurity and gathering data involving a plurality of remote locationscomprising: a plurality of activity modules, each of which may beassigned to one of a plurality of remote locations, at least one of theplurality of activity modules including a storage device capable ofreceiving and storing data, a wireless transmitter, at least one sensor,a releasable key container configured to receive at least one key, and aprocessor operably coupled to one or more of the wireless transmitter,at least one sensor, or releasable key container; a computer having adatabase for storage of data, the computer being in wirelesscommunication with the at least one activity module; at least one keyidentification device for attachment to the at least one key of at leastone of the plurality of remote locations; and at least oneidentification card containing information relating to an individualauthorized to access the at least one activity module; wherein theprocessor is capable of receiving and transmitting event information tothe storage device or the computer from at least one of the sensors; andwherein the processor is programmed to access and analyze the eventinformation and compare the event information to reference informationstored in the storage device for initiation of an event action withinthe at least one activity module.
 25. (canceled)
 26. (canceled) 27.(canceled)
 28. (canceled)
 29. The system of claim 24 wherein the atleast one sensor senses the presence of absence of the at least one keyidentification device within the releasable key container and whereinthe at least one activity module transmits information relating to thepresence or absence of a key identification device.
 30. The system ofclaim 24 wherein the event action is selected from the group consistingof: triggering an alarm, releasing the releasable key container, andtransmitting the event information to the computer, or combinationsthereof.
 31. (canceled)
 32. (canceled)
 33. The system of claim 24wherein the at least one sensor is an intrusion sensor.
 34. (canceled)35. The system of claim 24 wherein the at least one sensor comprises anRFID reader.
 36. The system of claim 24 wherein the at least one sensorcomprises a programmable key pad.
 37. The system of claim 24 wherein theat least one sensor comprises a biometric reader.
 38. The system ofclaim 24 wherein the wireless transmitter is configured to communicatewith the computer through a cellular communications facility.
 39. Thesystem of claim 24 wherein the wireless transmitter is configured tocommunicate with the computer through a Zigbee wireless networkprotocol.
 40. The system of claim 24 wherein the at least one activitymodule further comprises a clock and the at least one activity moduletransmits information related to the clock.
 41. The system of claim 24wherein the event information is transmitted to the computer for storagein the database and for generation of reports relating to the eventinformation.
 42. (canceled)
 43. The system of claim 41 wherein thecomputer generates reports relating to the presence or absence of atleast one of the keys based on the event information.
 44. (canceled) 45.The system of claim 41 wherein the computer generates reports relatingto attempts to access at least one of the plurality of key compartments.46. (canceled)
 47. (canceled)
 48. (canceled)
 49. (canceled)
 50. A systemfor maintaining security, comprising: an electronic lock box apparatushaving a control circuit, a memory circuit, an identifier sensingdevice, and a releasable key chamber with a key chamber positionelement, wherein said control circuit is configured to exchange datasignals with said identifier sensing device; and a key identificationdevice; wherein: said identifier sensing device detects a presence ofthe key identification device, if said key identification device ispositioned within said releasable key chamber.
 51. The system of claim50, wherein said key chamber position element comprises a latch.
 52. Anelectronic lock box, comprising: an electronic lock box apparatus havinga control circuit, a memory circuit, and a releasable key chamber with akey chamber position element; and a key chamber position element sensingcircuit that detects whether said releasable key chamber is in one of:(a) an open state; and (b) a closed state; wherein said control circuitis configured to exchange data signals with said key chamber positionelement sensing circuit.
 53. The electronic lock box of claim 52,further comprising: an identifier sensing device; wherein said controlcircuit is further configured to exchange data signals with saididentifier sensing device.
 54. The electronic lock box of claim 53,wherein said identifier sensing device comprises one of: (a) a wirelesstransceiver; and (b) a bar code reader.
 55. The electronic lock box ofclaim 52, wherein said key chamber position element comprises a latch.56. A method for operating a system for maintaining security, saidmethod comprising: providing an electronic lock box apparatus having acontrol circuit, a memory circuit, an identifier sensing device, and areleasable key chamber with a key chamber position element; providing akey with a key identification device; and using said identifier sensingdevice, detecting a presence of the key identification device, if saidkey identification device is positioned within said releasable keychamber.
 57. The method of claim 56, further comprising the step of:determining an absence of the key identification device, if saididentifier sensing device does not detect its presence.
 58. The methodof claim 56, further comprising the steps of: allowing access to saidreleasable key chamber, by way of said key chamber position element, andallowing said key with the key identification device to be removed fromsaid releasable key chamber; and thereafter, sensing an absence of thekey identification device, in response to said key with the keyidentification device being removed from said releasable key chamber.59. The method of claim 56, wherein said key identification devicecomprises one of: (a) a radio frequency identification (RFID) chip, (b)an RFID transceiver, and (c) a bar code.
 60. A method for operating asystem for maintaining security, said method comprising: providing anelectronic lock box apparatus having a control circuit, a memorycircuit, an identifier sensing device, a releasable key chamber with akey chamber position element, and a key chamber position element statusdetection device; installing a key within said releasable key chamber,said key having a key identification device attached thereto; detectingan access attempt of said releasable key chamber by an authorized user;and before opening said key chamber position element, detecting, by useof said identifier sensing device, a presence of said key identificationdevice, if said key identification device is positioned within saidreleasable key chamber.
 61. The method of claim 60, further comprisingthe step of storing in said memory circuit a “presence status” eventmessage of said key identification device, if said key identificationdevice was positioned within said releasable key chamber before saidaccess member was opened.
 62. The method of claim 60, further comprisingthe steps of: allowing access to said releasable key chamber, by way ofsaid key chamber position element, and allowing said key with the keyidentification device to be removed from said releasable key chamber;and thereafter, sensing an absence of the key identification device, inresponse to said key with the key identification device being removedfrom said releasable key chamber.