System and method for monitoring an access key from a key-box

ABSTRACT

Disclosed is a system for monitoring a location of a key relative to a key-box, configured to perform: (i) providing access to the key by: communicating over a personal area network with a first mobile-device for the first user as the first user approaches the key-box in an attempt to obtain the key, obtaining first credentials from the first mobile-device, determining whether the first credentials are valid or invalid, when the first credentials are valid: putting the key-box in an unlocked configuration, (ii) tracking a location of the key by: communicating over the personal area network with: the key and/or mobile-device to determine whether the key is being returned to the key-box, wherein upon a determination by the key-box or the mobile-device that the key is not being returned, an alert is provided by the mobile-device to the first user.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. application Ser. No.16/146,245, filed Sep. 28, 2018, which claims the benefit of an earlierfiling date from Indian Provisional Application Serial No. 201811011031filed Mar. 26, 2018, the entire disclosure of which is incorporatedherein by reference.

BACKGROUND

The disclosed embodiments relate to key tracking and more specificallyto monitoring an access from a key-box.

A real estate agent may show an available property to a potential buyerby opening a lock box or a key container, removing an access key chainor an access key card, and accessing the available property. The accesskey may be small and the agent may forget to replace the access keys inthe key-box, or the access key may become misplaced before leaving theproperty.

BRIEF DESCRIPTION

Disclosed is a system for monitoring a location of an access keyrelative to a key-box, the key-box including an electronic controller,wherein the controller is configured to perform steps comprising: afirst step of providing access to the key within the key-box while thekey-box is in a locked configuration, the first step including:communicating over a personal area network with a first mobile-devicefor the first user as the first user approaches the key-box in anattempt to obtain the key, obtaining first credentials from the firstmobile-device, determining whether the first credentials are valid orinvalid, when the first credentials are valid: putting the key-box in anunlocked configuration, a second step of tracking a location of the keyto determine whether the key is being returned to the key-box, thesecond step including: communicating over the personal area networkwith: the key and/or mobile-device to determine whether the key is beingreturned to the key-box, wherein upon a determination by the key-box orthe mobile-device that the key is not being returned, an alert isprovided by the mobile-device to the first user.

In addition to one or more of the above features and steps, or as analternative, in the first step: when the first credentials are valid thecontroller performs the step of securing the key-box in the unlockedconfiguration, and the second step comprises tracking a proximatelocation of the key and further comprises: communicating over thepersonal area network with the first mobile-device as the first userapproaches the key-box in an attempt to replace the key, wherein whencommunicating with the first mobile-device, the second step includes:transmitting first instructions the first mobile-device to query thefirst user whether the key is being returned to the key-box, andreceiving from mobile-device a response to the query, determiningwhether the response obtained in the second process indicates that thekey is being returned to the key-box, and when the response indicatesthe key is not being returned to the key-box: instructing themobile-device to provide a first alert to the first user, and when theresponse indicates the key is being returned to the key-box thecontroller performs the step of releasing the key-box from the unlockedconfiguration, so that the key-box may be locked by the first user.

In addition to one or more of the above features and steps, or as analternative, the controller performs a third step of tracking a distallocation of the key relative to the key-box, the third step including:communicating with mobile-device after the first process; determining atravel distance from the key-box to the mobile-device; comparing thetravel distance to a threshold distance; determining if the traveldistance is greater than the threshold distance, wherein when the traveldistance is greater than the threshold distance: instructing themobile-device to provide a second alert to the first user.

In addition to one or more of the above features and steps, or as analternative, the first step includes recording in a first data-log afirst log entry indicative of the first user being provided with accessto the key, the second step includes recording in the data-log a secondlog entry indicative of the response to the query from the first user,and transmitting to the mobile-device the data-log, for transferring thedata-log over to a central server.

In addition to one or more of the above features and steps, or as analternative, the controller performs a fourth step of tracking aduration the key-box is opened to identify a potentially a misplacedkey, the fourth step including: tracking a time that the key is removedfrom the key-box after the first step, comparing the tracked timeagainst a threshold time, wherein when the tracked time is greater thanthe threshold time: recording in the first data-log a third log entryindicative of the first user being having the key for a time greaterthan the threshold time, communicating over the personal area networkwith a second mobile-device for a second user as the second userapproaches the key-box in an attempt to obtain the key, obtaining secondcredentials from the second mobile-device, determining whether thesecond credentials are valid, transmitting to the second mobile-devicethe data-log, for transferring the data-log over the cellular network tothe central server.

In addition to one or more of the above features and steps, or as analternative, the personal area network applies Bluetooth Low Energyprotocols and/or radio frequency identification protocols.

In addition to one or more of the above features and steps, or as analternative, the mobile-device is a mobile phone and in the secondprocess the mobile phone transfers the data-log to the central serverover a cellular network.

In addition to one or more of the above features and steps, or as analternative, in the first step, responsive to receiving the firstinstructions, the mobile phone presents on a screen for the mobile phone(i) a query of whether the first user is returning the key to thekey-box, and (ii) a plurality of engagable radial buttons to receive asinput from the first user an indication of whether or not the key isbeing replaced in the key-box.

In addition to one or more of the above features and steps, or as analternative, in the first step the first alert is one or more of a firstemail, a first Short Message Service text, a first audio alert, a firstvideo alert and a first vibratory alert.

In addition to one or more of the above features and steps, or as analternative, in the third step the second alert is one or more of asecond email, a second Short Message Service text, a second audio alert,a second video alert and a second vibratory alert.

Further disclosed is a method for monitoring a location of an access keyrelative to a key-box, including one or more of the above features andor steps.

Further disclosed is a system for monitoring a location of an access keyrelative to a key-box, wherein the key-box includes a controller thattransmits over a personal area network periodic advertisements ofwhether the key is in the key-box, the system including a mobile-deviceconfigured to perform steps comprising: a first step of monitoring overthe personal area network for advertisements, a second step of receivingover the personal area network the periodic advertisements from thekey-box, a third step of determining whether the periodic advertisementsare indicative of the key being within the key-box or removed from thekey-box; wherein when the periodic advertisements are indicative of thekey being within the key-box, the mobile-device is configured to returnto the first step, and when the periodic advertisements are indicativeof the key being removed the key-box, the mobile-device is configured toperform steps comprising: a fourth step of monitoring elapsed timeagainst a predetermined time period, a fifth step of monitoring adistance from the key-box against a predetermined distance, a sixth stepof continuing to monitor for transmitted periodic advertisements overthe personal area network from the key-box and determining whether theperiodic advertisements are indicative of the key being within thekey-box or removed from the key-box, wherein when the periodicadvertisements are indicative of the key being within the key-box, themobile-device is configured to discontinue monitoring elapsed time andmonitoring the distance to the key-box and to return to the first step,and when either of the elapsed time becomes greater than thepredetermined time period or the distance from the key-box becomesgreater than the predetermined distance the mobile-device is configuredto provide an alert.

In addition to one or more of the above features and steps, or as analternative, following providing the alert, the mobile-device isconfigured to: monitor for transmitted periodic advertisements over thepersonal area network from the key-box and determine whether theperiodic advertisements are indicative of the key being within thekey-box or removed from the key-box, wherein when the periodicadvertisements are indicative of the key being within the key-box,discontinuing the alert and returning to the first step.

BRIEF DESCRIPTION OF THE DRAWINGS

The following descriptions should not be considered limiting in any way.With reference to the accompanying drawings, like elements are numberedalike:

FIG. 1 illustrates features of an embodiment of the disclosure;

FIG. 2 illustrates features of an embodiment of the disclosure;

FIG. 3 illustrates a process according to embodiment of the disclosure;

FIG. 4 illustrates a process according to an embodiment of thedisclosure;

FIG. 5 illustrates a process according to an embodiment of thedisclosure;

FIGS. 6 and 6A illustrate a process according to an embodiment of thedisclosure; and

FIG. 7 illustrates a process according to an embodiment of thedisclosure.

DETAILED DESCRIPTION

A detailed description of one or more embodiments of the disclosedapparatus and method are presented herein by way of exemplification andnot limitation with reference to the Figures.

FIGS. 1 and 2 illustrate environments in which the disclosed embodimentsmay be practiced. A user in the embodiments may be real estate agent 100who may intend to access an available property 104 to display to acustomer, that is, a potential buyer 108. A key-box 112 may be disposedproximate the property in which an access key 116 is maintained. Thekey-box may include an electronic controller 118 to controlelectro-mechanical functions of the key-box and to provide the key-boxwith telecommunication capabilities. Access to the key may be through akey container 120 in the key-box. The key container may be capable ofbeing secured in an opened state by electro-mechanical control from thecontroller, during which time a key 116 may be removed and replaced inthe key-box. In a locked or closed state the key 116 in the keycontainer 120 may be locked within the key-box 112.

The key-box may be a first smart device that may communicate over apersonal area network (PAN) 122 with a mobile-device 124, which may be amobile phone that may be a second smart device and which may be inpossession of the agent 100. PAN protocols may include, for example, NFC(near field communication), BlueTooth Low Energy (BLTE) or ZIGBEE. Themobile-device 124 may be equipped with an App 128, available from an AppStore, providing program level communications between the key-box 112and the mobile-device 124. The agent 100 may interact with the App 128via a screen 130 on the mobile-device 124. In addition, using the APP128, the mobile-device 124 may communicate over the Internet 132 with acentral server 136. Moreover, the mobile-device may use a cellularnetwork 140 for access to the Internet or the mobile-device may accessthe Internet by, for example, a connection over Wi-Fi 144 (trademark ofthe Wi-Fi Alliance).

Referring to FIG. 3, at step S50 the controller 118 may monitor alocation of the access key 116. Under this step, the controller mayperform a first step S54 of providing access to the key 116 within thekey-box 112 while the key-box 112 is in the locked configuration, whichis illustrated in greater detail in FIGS. 1 and 4. The controller mayalso perform a second step S58 of tracking a proximate, or near field,location of the key 116 to determine if the key is being returned to thekey-box 112 by the agent, which is discussed in greater detail in FIGS.1 and 5. The controller may also perform a third step S62 of tracking adistal, or far field, location of the key 116 relative to the key-box toprevent the agent 100 from potentially leaving with the key, which isillustrated in greater detail in FIGS. 2 and 6. The controller may alsoperform a fourth step S66 of tracking a duration the key-box is openedto identify if the key 116 is potentially lost by the agent, which isillustrated in greater detail in FIGS. 2 and 7.

Referring to FIGS. 1 and 4, as indicated, at step S54 the controller mayexecute the first step of providing access to the key 116 within thekey-box 112 while the key-box 112 is in the locked configuration.Initially the key 116 may be in the key-box 112, the key-box 112 may bein a closed state. At step S104 the key-box controller 118 maycommunicate with the mobile-device 124 of the agent (using the App 128)when the agent seeks to obtain the access key 116. These communicationsoccur, for example, using BTLE. At step S108 the controller 118 mayobtain credentials from the mobile-device 124 which may represent theagent 100 credentials for accessing the key.

At step S112 the controller 118 may determine whether the credentialsare valid. If the credentials are not valid then at step S116 thecontroller may not grant access to the key 116 by, for example, notunlocking the key-box 112. If the credentials are valid then at stepS120 the controller 118 may record a first audit log entry in an auditlog stored on the controller 118, where the first entry may include thecredentials or at least an identifier of the agent 100 and may indicatethat access to the key 116 is being provided. At step S124 thecontroller 118 using electromechanical controls may configure thekey-box 112 to the unlocked or opened state to provide access to the keycontainer 120 and hence the key 116. At step S126 the controller maysecure the key-box in the unlocked state.

Referring to FIGS. 1 and 5, as indicated, at step S58 the controller mayexecute the second step of tracking a proximate, or near field, locationof the key 116 to determine if the key is being returned to the key-box112 by the agent 100. After showing the property to the customer 108, atstep S128 the controller 118 may again communicate with themobile-device 124 of the agent 100 as the agent attempts to return orreplace the key 116. At step S132 the controller may instruct themobile-device 124 to interactively engage the agent to determine whetherthe key 116 has been replaced in the key-box. For example themobile-device may provide a visual query on the screen 130, responsiveto which the mobile-device may receive a “YES” or “NO” using respectivefirst and second radio buttons 150, 154.

At step S136 the controller 118 may receive data from the mobile-device124 indicative of the response from the agent 100. At step S140 thecontroller 118 may record a second audit log entry indicator of theresponse of the agent 100. At step S144 the controller may transfer theaudit log data to the mobile-device 124, which may transfer the auditdata to the central server 136. The audit data may serve as a digitalcheck to ensure that the agent 100 left the key 116 in the key-box. Atstep S148 the controller may determine whether the response from theagent indicated that the key 116 was being replaced in the box.

If the response was “YES” then at step S152 the controller may enableclosing of the key-box by the agent, for example, by releasing thekey-box from the unlocked state and allowing the key container 120 tolatch into the key-box 112. If the response was “NO” then at step S156the controller may again communicate with the mobile-device and causethe mobile-device to interactively engage the agent with an alertindicating that the key must be replaced.

On one embodiment, in addition to or instead of asking the agent at stepS132 and S136 whether the key is being returned, the key-box 112 maydirectly detect whether the key 116 is being returned. For example, thekey 116 could have a Bluetooth chip 115 on a key ring 117 (FIG. 1) thatadvertises periodically. Based on proximity, for example, whether thekey 116 is inside the key-box 112, outside the key-box 112 but close inproximity to the key-box 112, or relatively far away from the key-box112, the key-box 112 may determine whether and which key 116 is in thekey-box 112. If other keys have similar technology implements, thekey-box 112 could determine when a key belonging in another key-box isaccidently placed in the key-box 112. When a key belonging in adifferent key-box is placed in the key-box 112, an alert may be sent tothe agent which requests that the agent confirm the correct keys arebeing positioned in the key-box.

Alternatively, the key 116 could have a radio frequency identification(RFID) chip that may be on the same board as the Bluetooth chip 115 andthat may be read by an RFID reader upon insertion of the key 116 intothe key-box 112. The RFID reader may be part of the controller 118within the key-box 112. Yet alternatively the key could have a chemicalsignature, a visual identifier (barcode, QR code, etc. that is scannedby the box when it is returned). Moreover, the sensor in the key-boxcould be a mechanical tamper spring, or a magnetic sensor such as amagnetic reed proximity switch. In one embodiment the presence orabsence of the key container 120 can be determined by the key-box 112 todetermine if the key 116 is present or absent respectively.

In one embodiment the key-box 112 determines at any time from one ormore above disclosed features and/or steps that the key 116 has beenreturned. In such an instance, procedures disclosed herein which maysubsequently create an alert may be aborted. This may avoid thecontroller 118 or mobile-device 124 from creating undue alerts.

Turning to FIGS. 1, 3 and 6, and as indicated, at step S62 thecontroller may execute a third step of tracking a distal, or far field,location of the key 116 relative to the key-box 112 to prevent the agentfrom potentially leaving with the key. At step S200 the controller 118may periodically communicate 204 (FIG. 2) with the mobile-device 124 todetermine a proximity 208 of the mobile-device to the key-box. At stepS204 the controller may determine whether the mobile-device has movedbeyond a predetermined distance threshold while the key-box is in theopened state. While the determination at step S204 is “NO” thecontroller may keep monitoring proximity to the mobile-device. If thedetermination is “YES” at step S204, then at step S206 the controllermay cause the mobile-device to interactively communicate with the agent.This interaction may be in the form of an alert which may be a visual,audible and/or vibratory alert. The controller may then perform stepS208 of determining whether the mobile-device has returned to a positionthat is within the threshold distance. So long as the determination atS208 is “NO” the alert may stay active on the mobile-device of theagent. If the determination is “YES” then at step S212 the controllermay cause the mobile-device to turn off the alert.

In one embodiment, the key 116 may be equipped with BTLE communicationimplements 115 as indicated above. In addition to or as an alternate tothe features and steps performed in FIG. 6, tracking of proximity of thekey 116 may be performed by communications between the key-box 112 andthe key 116. Such tracking may be based on periodic BTLE advertisementsfrom the key 116. The lock controller 118 may track the distance to thekey 116 as compared with tracking the distance to the mobile-device 124.Alternatively, the mobile-device 124 may determine when it is proximatethe key 116 using periodic BTLE advertisements from the key 116. If thekey 116 is not in the key-box 112 and the key 116 is not proximate themobile-device 124, the mobile-device 124, may be disposed to provide theagent with an alert to indicate that the key 116 has been left in anunsecure location. A determination to provide the alert, in thisembodiment and in each embodiment provided herein, may be based oninstructions from the controller or may be automatically created basedon protocols in the App 128 on the mobile-device.

In one embodiment illustrated in FIG. 6A, in addition to or as analternative of the features and steps disclosed under step S62 in FIG.6, the mobile-device 124 may perform step S62A in FIG. 6A to determinewhether the key 116 is accidentally being removed from the property bythe agent 100. At step S200A the mobile-device 124 may listen to a BLTEadvertisements from the key-box BTLE transceiver 118 so that themobile-device may determine a distance to the key-box 112. As long asthe mobile-device 124 is within a predetermined range of the key-box112, and the mobile-device 124 receives the BTLE advertisement from thekey-box 112, and the determination is “yes” at step S204A. As a result,no alert may be created by the mobile-device 124.

When the agent with the mobile-device 124 moves outside the range, thedetermination is “no” at step S204A. At step S205A, a timer may betriggered on the mobile-device 124 for allowing the agent to returnwithin range. When the timer elapses, or if the agent leaves a geofencerange around the key-box 112 or property 104, at step S206A themobile-device 124 may remind the agent with an alert to return to thekey-box 112 and return the key 116. If the key-box 112 advertisementindicates the key 116 has been returned or if the agent returns to thethreshold zone at step S208A, then the mobile-device 124 may abort thisreminder procedure at step S212A.

It is to be appreciated that in such embodiment the APP 128 on themobile-device 124 may autonomously monitor a distance from itself to thekey-box 112. In addition, then the mobile-device 124 may autonomouslyalert the agent if the agent has been out of range for too long or ifthe mobile-device 124 has moved too far away. That is, the mobile-device124 may not need instructions from the key-box 112 in order to create analert for the agent.

Referring to FIGS. 2 and 7, as indicated, at step S66 the controller mayexecute a fourth step of tracking a duration the key-box is opened toidentify if the key is potentially lost by the agent. At step S250 thecontroller may monitor the duration of time, illustrated schematicallyas an hour glass 212, that the key-box has been in the opened state. Atstep S254 the controller may determine whether the duration is greaterthan a predetermined threshold. While the determination is “NO” at stepS254, the controller may continue to track the duration of time thekey-box is opened. If the determination becomes “YES” then at step S258the controller may record a third audit log entry indicating that thekey-box has been opened for a duration that is greater than thepredetermined threshold, indicating the key may be lost by the agent.

At step S262 the controller may communicate with a second mobile-devicefor a second agent seeking to obtain the key from the key-box. At stepS266 the controller may obtain second credentials from the second agentand at step S270 the controller may determine whether the secondcredentials are valid. If the determination is “YES” then at step S274the controller may transfer the audit log to the second mobile-devicefor transferring to the audit log to the central server. If thedetermination is “NO” then the controller may wait to communicate withanother mobile-device for another agent and cycle back to step S262.

The above disclosed embodiments may prompt the agent with a message suchas an alert to determine whether a key is inside a key-box before thekey-box is closed as the agent leaves the property. The disclosedembodiments may electronically transmit a message, an auditory,vibratory or other typical alert to the agent via the mobile-device forthe agent, indicating whether the key is in the key-box. The disclosedembodiments may ensure that the key is replaced in the key-box. Inaddition, creation of the audit logs may enable tracking of the locationof the key and who last used the key.

The term “about” is intended to include the degree of error associatedwith measurement of the particular quantity based upon the equipmentavailable at the time of filing the application. The terminology usedherein is for the purpose of describing particular embodiments only andis not intended to be limiting of the present disclosure. As usedherein, the singular forms “a”, “an” and “the” are intended to includethe plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, element components,and/or groups thereof.

While the present disclosure has been described with reference to anexemplary embodiment or embodiments, it will be understood by thoseskilled in the art that various changes may be made and equivalents maybe substituted for elements thereof without departing from the scope ofthe present disclosure. In addition, many modifications may be made toadapt a particular situation or material to the teachings of the presentdisclosure without departing from the essential scope thereof.Therefore, it is intended that the present disclosure not be limited tothe particular embodiment disclosed as the best mode contemplated forcarrying out this present disclosure, but that the present disclosurewill include all embodiments falling within the scope of the claims.

What is claimed is:
 1. A system for monitoring a location of an accesskey relative to a key box, wherein the key box includes a controllerthat transmits over a personal area network periodic advertisements ofwhether the key is in the key box, the system including a mobile deviceconfigured to perform steps comprising: a first step of monitoring overthe personal area network for advertisements, a second step of receivingover the personal area network the periodic advertisements from the keybox, a third step of determining whether the periodic advertisements areindicative of the key being within the key box or removed from the keybox; wherein when the periodic advertisements are indicative of the keybeing within the key box, the mobile device is configured to return tothe first step, and when the periodic advertisements are indicative ofthe key being removed the key box, the mobile device is configured toperform further steps comprising: one of a fourth step and a fifth step,wherein: the fourth step includes monitoring elapsed time against apredetermined time period and the mobile device is configured to providean alert when the elapsed time becomes greater than the predeterminedtime period; the fifth step includes monitoring a distance from the keybox against a predetermined distance and the mobile device is configuredto provide the alert when the distance becomes greater than thepredetermined distance; and a sixth step of continuing to monitor fortransmitted periodic advertisements over the personal area network fromthe key box and determining whether the periodic advertisements areindicative of the key being within the key box or removed from the keybox, wherein when the periodic advertisements are indicative of the keybeing within the key box, the mobile device is configured to discontinuemonitoring and to return to the first step.
 2. The system of claim 1,wherein following providing the alert, the mobile device is configuredto: monitor for transmitted periodic advertisements over the personalarea network from the key box and determine whether the periodicadvertisements are indicative of the key being within the key box orremoved from the key box, wherein when the periodic advertisements areindicative of the key being within the key box, discontinuing the alertand returning to the first step.
 3. The system of claim 1, wherein thepersonal area network on which the controller transmits theadvertisement is Bluetooth.
 4. The system of claim 1, wherein thecontroller is configured to directly detect whether the key is in thekey box when advertising whether the key is in the key box.
 5. Thesystem of claim 4, wherein the directly detecting is done by thecontroller in the key box receiving a periodic second advertisement froma chip attached to the access key that transmits over the personal areanetwork the periodic second advertisements.
 6. The system of claim 1,wherein the mobile device performs the fifth step of monitoring thedistance from the key box against the predetermined distance, whereinthe distance monitoring is based on a geofence range.
 7. The system ofclaim 1, wherein prior to advertising that the key is removed from thekey box, the controller obtains credentials from the mobile device foraccessing the key, and the controller unlocks the key box upondetermining that the credentials are valid, thereby providing access tothe key.
 8. A system for monitoring a location of an access key relativeto a key box, wherein the key box includes a controller that transmitsover a personal area network periodic first advertisements, the systemincluding a chip attached to the access key that transmits over apersonal area network periodic second advertisements, a mobile deviceconfigured to perform steps comprising: a first step of monitoring overthe personal area network for advertisements, a second step of receivingover the personal area network the first and second periodicadvertisements, a third step of determining whether the first and secondperiodic advertisements are indicative of the key being within the keybox or removed from the key box; wherein when the determining isindicative of the key being within the key box, the mobile device isconfigured to return to the first step, and when the determining isindicative of the key being removed from the key box, the mobile deviceis configured to perform further steps comprising: one of a fourth stepand a fifth step, wherein: the fourth step includes monitoring elapsedtime against a predetermined time period and the mobile device isconfigured to provide an alert when the elapsed time becomes greaterthan the predetermined time period; the fifth step includes monitoring adistance from the key box against a predetermined distance and themobile device is configured to provide the alert when the distancebecomes greater than the predetermined distance; and a sixth step ofmonitoring for transmitted first and second periodic advertisements overthe personal area network and determining whether the first and secondperiodic advertisements are indicative of the key being within the keybox or removed from the key box; wherein when the monitoring isindicative of the key being within the key box, the mobile device isconfigured to discontinue monitoring and to return to the first step. 9.The system of claim 8, wherein following providing the alert, the mobiledevice is configured to: monitor for transmitted first and secondperiodic advertisements over the personal area network from the key boxand determine again whether the first and second periodic advertisementsare indicative of the key being within the key box or removed from thekey box, wherein when the determine again is indicative of the key beingwithin the key box, discontinuing the alert and returning to the firststep.
 10. The system of claim 9, wherein when the determine again isindicative of the key being within a different key box, requesting thatthe agent confirm that the different key box is correct.
 11. The systemof claim 8, wherein the personal area network on which the controllertransmits the advertisement is Bluetooth.
 12. The system of claim 8,wherein determining whether the first and second periodic advertisementsare indicative of the key being within the key box or removed from thekey box is based on proximity.
 13. The system of claim 8, wherein themobile device performs the fifth step of monitoring the distance fromthe key box against the predetermined distance, wherein the distancemonitoring is based on a geofence range.
 14. The system of claim 13,wherein prior to a third step of determining whether the first andsecond periodic advertisements are indicative of the key being withinthe key box or removed from the key box, the mobile device is configuredto: sending credentials to the controller for accessing the key, whereinthe controller unlocks the key box upon determining that the credentialsare valid, thereby providing access to the key.
 15. The system of claim14, wherein following the sending credentials, the mobile device isconfigured to: determine the geofence range starting from a currentlocation of the mobile device.
 16. The system of claim 8, wherein thealert is indicative of the key box.
 17. The system of claim 8, whereinthe providing an alert includes sending alerts to multiple mobiledevices of different agents.