Methods and apparatus for accessing secured physcial assets

ABSTRACT

Asset access systems in accordance with various embodiments of the invention utilize a two-dimensional (2D) code that allows a user to gain physical access to and take possession of a key fob, where key fob is understood to represent any wireless device that interacts with a vehicle control system to access, manage, and operate the asset. Users of the system will present the 2D code to a transaction client that grants the user access to the key fob. Transaction clients can reside at various facilities that do not employ humans as part of the asset transfer to the user. Upon completion of the return of the asset to the facility, the user will present a new 2D code to the human-less access system that allows the user to return the key fob or other physical asset to a designated location at the transaction client.

TECHNICAL FIELD

Embodiments relate generally to users of physical assets gaining accessto said assets for the desired use without the need for dedicatedhardware or software. More particularly, embodiments relate to a systemfor allowing users to gain access to physical assets with the use of amobile communication device.

BACKGROUND OF THE INVENTION

User access to physical assets is a growing need in commerce. Themobility economy is being shaped by lower levels of ownership ofphysical assets. Personal transportation is being shaped and willcontinue to evolve into lower levels of vehicle ownership, withpassengers gaining access to ride sharing or mobility assets byutilizing their mobile devices to schedule and dispatch mobility assets.Users of mobility services still require physical exchange ofinformation between the human driver and passenger in order for thepassenger to access the mobility service. The advent of SAE level 5autonomous vehicles will drive further advancements in personaltransportation when mobility providers utilize driverless vehicles onprivate and public roadways. Advancements in personal access to thesedriverless mobility services will be needed.

Transformations in the delivery of goods will drive the need forinnovation in access. Presently, the package delivery industry relies onphysical or electronic signatures to validate the delivery of certainparcels. Companies like Federal Express and United Parcel Service havemade innovations in the dedicated hardware and software needed tocollect signatures from parcel recipients and rapidly track the transferof goods through their logistics systems. The physical transfer ofgoods, however, still requires the human parcel deliverer and therecipient to interact via the use of the dedicated hardware platform forcollecting and routing signature information and the subsequent transferof possession. Federal Express, UPS, and Amazon are making rapidadvances in the automated delivery of packages. The use of short-rangeUnmanned Aerial Vehicles (UAVs) is being utilized for package deliverywith rapidly-growing success. These companies are likely heading towardutilizing driverless over-the-road vehicles for package delivery in thenot-too-distant future. One of these weaknesses of these driverless andpilotless systems is their inability to replicate thedeliverer-to-receiver interface for collecting and processing signaturesto validate the receipt of the package and the transfer of possession.Advancements in logistics are required when the human is eliminated fromthe delivery side of the transaction.

Real estate owners will gain access to their homes or commercialproperties via physical interfaces like keys and locks or access cardsand cards readers, typically in concert with password-required access toa security system for the enablement and disablement of the securityfeatures. Temporary users of real estate, in order to gain access to theasset, will need to acquire the key or access card from the owner via aphysical interaction or through a lockbox. Both of these methods requirea dedicated physical component and a means to gain access to thephysical component. Advancements in access protocol are needed to allowbroader access to physical real estate assets without human interactionand without the need for application-specific hardware.

Vehicle owners will gain access to their possessions via interfaces likekeys and locks or key fobs and fob readers. Temporary users of vehicles,in order to gain access to the asset, will need to acquire the key orfob from the owner via a physical interaction or through a lockbox. Bothof these methods require a dedicated physical component and a means togain access to the physical component. Advancements in access protocolare needed to allow broader access to physical vehicle assets withouthuman interaction and without the need for application-specifichardware.

According to several sources in the access and authentication market,there is a trend moving away from authentication schemes relying on‘what is known’, such as a password, to ‘what is present’, such as a keyfob or fingerprint. With passwords being such a major culprit in hackingschemes, ‘what is present’ authentication factors are fast becoming muchmore relevant. Due to their features, mobile communication devices canprovide a useful ‘what is present’ authentication factor. They can beused for second-factor authentication, or can replace ‘what is known’factors (passwords) completely as a single-factor authentication device.

Several methods and systems are available in the art that attempt toprovide access to systems or data with the use of mobile communicationdevices. U.S. Pat. No. 9,576,255 provides controlled access to events,premises, transportation, and the like by providing a ticket to a ticketholder by defining rights associated with the ticket, determining thedevice to be associated with the ticket, creating a link that representsthe ticket, providing the link to the ticket holder, and providing acharge to the ticket based on the geographic location of the associateddevice. U.S. Pat. No. 9,565,530 teaches techniques for allowing a mobiledevice to obtain access to location services from one or more computingdevices that have been authorized for use.

U.S. Pat. No. 9,563,908 teaches a system that utilizes a circuit toreceive transaction data and produce transaction summary files for thepurchase of software applications. U.S. Pat. No. 9,554,279 teaches asystem of one or more mobile devices for accessing secure data where thedevices include circuitry for a passcode scanner that scans for the usercurrently using each mobile device connected to a secure network wherethe mobile device contains an access requestor and the server validatesan authorized area of authentication.

U.S. Pat. No. 9,554,279 teaches a system of one or more mobile devicesfor accessing secure data where the devices include circuitry for apasscode scanner that scans for the user currently using each mobiledevice connected to a secure network where the mobile device contains anaccess requestor and the server validates an authorized area ofauthentication. U.S. Pat. No. 9,554,277 teaches a method for managingaccess rights by receiving, via a mobile device, information from apassive tag located at an entrance to an area, wherein the informationincludes identification information for the entrance.

U.S. Pat. No. 9,554,267 teaches a processor circuit on a serverconfigured to receive a data packet request from an entity that providesan online service to a mobile device, the data packet request comprisinga network identifier for the mobile device. U.S. Pat. No. 9,552,466teaches a physical access control system protecting a secure asset thatuses wireless communication between a reader of the physical accesscontrol system and a mobile device to establish the proximity of themobile device to the reader and establishes a credential at the mobiledevice for operating the physical access point. In a subsequenttransaction, the system generates a second credential at the mobiledevice that is different from the first credential.

U.S. Pat. No. 9,548,982 describes a memory and processor system thatutilizes a mobile device to authenticate access to a service byperforming authentication via a proxy server. U.S. Pat. No. 9,544,853teaches a vehicle communication and access system with a previouslypaired mobile device and a vehicle near field communication (NFC) devicecoupled to the control unit. The system utilizes wireless communicationsto establish if the mobile device is at or below the threshold batterypower level.

U.S. Pat. No. 9,524,502 describes an apparatus that manages mobilecoupons with wireless communication between a mobile coupon applicationon a mobile device and a coupon management module configured to providean indication of an impending change at the user interface. U.S. Pat.No. 9,520,939 teaches an access authorization device used to controlaccess to an area by utilizing a sequence of hash values and a means fordetermining if the first hashed value was generated from a mobilewireless communications device authorized to control the access device.The access device then sends an access command to the mobile device toauthorize control of the system by the mobile device.

U.S. Pat. No. 9,514,589 describes a secure short-distance-basedcommunication and access control system to a restricted area whereby thesub-locations of the access control area have physical barriers and atleast one beacon for each sub-location. The system authenticates mobiledevices that are approved for access and validates, via the locationbeacons, whether the approved device is in the sub-location. Havingvalidated the device and the location, the system energizes an actuatordriver circuit to invoke the opening or closing of the physical barrierfor the sub-location. U.S. Pat. No. 9,508,207 teaches a method ofproviding access to a premises by creating a credential to be used tounlock an access control device, identifying a device to be used topresent the credential to the access control device, defining a dynamiclink to provide the credential to the device, enabling the dynamic linkby activating the link so that it is a valid link, presenting thecredential to the access control device and to the identified device viathe dynamic link, and unlocking the access control device when thecredential is presented by the identified device.

U.S. Pat. No. 9,503,260 teaches a security token configured tofacilitate access to a remote computing service via a mobile deviceexternal to the security token by use of a Near Field Communication(NFC) interface, a smart card integrated circuit, and a smart cardapplet stored in and executable by the smart card integrated circuit,wherein the smart card applet is configured to support a cryptographicchallenge-response protocol executable by the mobile device, wherein aplurality of credentials for the cryptographic challenge-responseprotocol are maintained inside a single security token. U.S. Pat. No.9,483,631 describes a reader of a physical access control systemassociated with a physical access point of a secure asset, wherein thereader is configured to perform operations of transmitting aninterrogating radio frequency (RF) signal to a mobile device comprisinga first credential that is unique to the reader. Furthermore, the systemreceives, from the mobile device, an RF response to the interrogating RFsignal with a second credential that is unique to the mobile device, andcontrols the physical access point to permit or deny a holder of themobile device access to the secure asset based on the RF response to theinterrogating RF signal.

U.S. Pat. No. 9,479,339 teaches a method performed by a host server ofinstructing a mobile communication device to obtain a digitalcertificate from a certificate authority. The method further instructsreceiving a signed certificate request message that contains a publickey generated by the mobile communication device, the certificaterequest message having been signed with a private key generated by themobile communication device, with the public key and the private keyforming a public-private key pair. Lastly, the method concludes byobtaining a digital certificate signed by the certificate authority andpushing the digital certificate to the mobile communication device. U.S.Pat. No. 9,443,365 teaches a method for utilizing Bluetoothcommunication between a mobile device and a reader device in response tothe mobile device being in a connection zone relative to the readerdevice. The method includes the capability of the mobile device to sensevelocity, acceleration and GPS location information for the device todetermine if the mobile device is in the activation zone of the readerdevice.

U.S. Pat. No. 8,924,712 teaches a method for authenticating atransaction by reading an image comprising a matrix barcode encoded withtransaction information that is displayed on a display of an externaldevice using a mobile device associated with a user authorized to accessa secure resource. The transaction method includes recovering a firstseed key from two or more seed keys stored on a memory of the mobiledevice and establishing the identity of the merchant associated with thetransaction. Lastly, the method transmits a password generated with therecovered seed key from the mobile device to an authentication system.U.S. Pat. No. 6,170,058 describes an apparatus for managing access to acryptographically secured access-controlled datum and acomputer-implemented output logic means for providing said processedaccess-controlled datum to a user of said apparatus.

U.S. Pat. No. 8,627,438 teaches a computer-implemented method ofauthenticating a customer using a trusted device by registering a mobiledevice as a trusted device associated with a customer account for anonline resource and providing a graphical code for display by theelectronic device. The identification of the mobile device as thetrusted device associated with the customer account occurs via markingthe security token included in the graphical code and authenticating thedata indicating that the graphical code was captured from a mobiledevice. Lastly the mobile device is automatically signed in through themeans of a hardware processor.

Asset access systems have the potential to be utilized extensively insystems where the owner of the asset does not have a human involved inthe transaction. However, the need for dedicated hardware on the part ofthe user of the service or system will limit the widespread deploymentof these asset access systems. A need exists for a non-hardware-specificsystem that allows users to gain access to physical assets and completetransactions for these human-less asset management and access systems.

SUMMARY OF THE INVENTION

Asset access systems in accordance with various embodiments of theinvention utilize a two-dimensional (2D) code that allows a user to gainphysical access to and take possession of a key fob, where key fob isunderstood to represent any wireless device that interacts with avehicle control system to access, manage and operate the asset. Users ofthe system will present the 2D code to a transaction client that grantsthe user access to the key fob. Transaction clients can reside atvarious facilities that do not employ humans as part of the assettransfer to the user. Automated transaction clients can reside atfacilities that include, but are not limited to, automobile rentalfacilities, new and used vehicle acquisition facilities, vehicle parkingfacilities, aircraft storage and rental facilities, spacecraft storageand rental facilities, Unmanned Aerial Vehicle (UAV) storage or rentalfacilities, Unmanned Underwater Vessel (UUV) storage or rentalfacilities, bank ATMs, vending machines, school, hospital or gymlockers, social media login sites, hotel room doors, and governmentvehicle, weapon or facility access. Upon completion of the return of theasset to the facility, the user will present a new 2D code to thehuman-less access system that allows the user to return the key fob orother physical asset to a designated location at the transaction client.

Asset access systems in accordance with various embodiments of theinvention utilize a 2D code that allows a user to gain physical accessto and take possession of a key for accessing real estate. Users of thesystem will present the 2D code to a transaction client that grants theuser access to the key. Transaction clients can replace traditional lockboxes that have historically been used to allow potential real estatebuyers or renters to tour target properties without the presence of alisting agent. Upon completion of the tour of the property by thepotential buyer or renter, the user will present a new 2D code to thehuman-less access system that allows the user to return the key to adesignated location at the transaction client.

Asset access systems in accordance with various embodiments of theinvention utilize a 2D code that allows a user to gain physical accessto and take possession of a package that is delivered by a drone orother UAV. Many packages delivered by popular delivery services do notrequire recipient signatures for the completion of the transfer ofpossession. Other packages, however, do require signatures or otherauthentication by the package recipient in order to complete thedelivery transaction. For these authenticated deliveries via UAV inaccordance with various embodiments, the delivery UAV will have atransaction client that will process the 2D code and deliver theappropriate payload to the transacted user. The presence of thetransaction client on the UAV allows the delivery service to broaden thescope of their deliveries by including all packages that meet thepayload and range requirements. Systems without a transaction clientwill be relegated to delivering only packages that do not require asignature or other delivery authentication.

Asset access systems in accordance with various embodiments of theinvention utilize a 2D code that allows a user to gain physical accessto and take possession of a package that is delivered by a driverlessover-the-road vehicle. Many packages delivered by popular deliveryservices do not require recipient signatures for the completion of thetransfer of possession. Other packages, however, do require signaturesor other authentication by the package recipient in order to completethe delivery transaction. For these authenticated deliveries viadriverless over-the-road vehicles in accordance with variousembodiments, the delivery vehicle will have a transaction client thatwill process the 2D code and allow the user to gain physical access tothe area or compartment that contains the to-be-delivered package. Thepresence of the transaction client on the driverless over-the-roadvehicle allows the delivery service to broaden the scope of theirdeliveries by including all packages that meet the payload and rangerequirements. Systems without a transaction client will be relegated todelivering only packages that do not require a signature or otherdelivery authentication.

Asset access systems in accordance with various embodiments of theinvention utilize a 2D code that allows a user to gain access to amobility service that is delivered by a driverless over-the-roadvehicle. Driver-based mobility services today may include the use ofvehicles supplied by, but are not limited to, taxis, chauffeurs,limousines, ride-sharing services, and popular mobility providers likeUber and Lyft. User access to these driver-based services requires sometype of physical interaction between the vehicle operator and the userin order to authenticate the transaction and/or allow user access to themobility service. For this authenticated access to mobility viadriverless over-the-road vehicles in accordance with variousembodiments, the mobility vehicle will have a transaction client thatwill process the 2D code and allow the user to gain physical access tothe vehicle. The presence of the transaction client on the driverlessover-the-road vehicle allows the mobility service to deploy trulyhuman-less mobility. Systems without a transaction client will berelegated to requiring some type of human interaction on the part of theservice in order to authenticate the access to the service.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates access to real estate by a property owner.

FIG. 2 illustrates access to real estate by a non-owner through the useof a remote access system.

FIG. 3 illustrates a transaction for transferring possession of adelivered package.

FIG. 4 illustrates access to a vehicle by an owner.

FIG. 5 illustrates access to a vehicle by a non-owner through the use ofa remote access system.

FIG. 6 illustrates a remote key fob access system transacted with amobile communication device.

FIG. 7 illustrates access client communications for the remote key fobaccess system.

FIG. 8 illustrates a data structure for a remote asset access system.

FIG. 9 illustrates a functional flowchart for a transaction with aremote asset access system.

FIG. 10 illustrates remote access to a driverless vehicle using a mobiledevice.

FIG. 11 illustrates remote access to real estate using a mobile device.

FIG. 12 illustrates a package delivery transaction using a mobiledevice.

DETAILED DESCRIPTION OF THE DRAWINGS

Non-human-controlled access to physical assets occurs in many formstoday. These access systems typically rely on little or no technology.FIG. 1 shows a typical application of a simple asset access system. Anowner 10 of a property 12 locks the entrance to the structure whennobody is residing in the structure. In order to gain access to theproperty 12, the owner 10 utilizes a mechanical tool like a key 14 as adevice to unlock the entrance to the property. Only inhabitants of theproperty will typically possess keys 14, thus limiting access to theproperty 12.

FIG. 2 shows a property 22 that is enabled to grant access to users 20by way of a lock box 26 connected to the structure entrance. Properties22 with lock boxes 26 are typically made available to potential rentersof listed rental properties 22 or to potential buyers of properties 22that are for sale. Lock box 26 access systems are utilized in scenarioswhen a listing agent or other representative is not present at theproperty 22 in order to grant access to the would-be renter 20 or buyer20. Lock box 26 access is typically granted by having the user 20 enteran access code at the device 26, thus unlocking the compartment thatcontains the key to be utilized to unlock the entrance to the property22. User's 20 will typically write the access code on a piece of paper24 or locate the access information in another less-than-secure manner.When properties 22 have multiple viewers 20 of a single property 22, allentrants will typically utilize the same access code. The utilization oflock box 26 systems like that shown make the property 22 vulnerable totheft or vandalism should the access code fall into the wrong hands. Byutilizing a single access code for multiple users 20, the lock box 26system makes it difficult to track which possessors of the code actuallyaccessed the property and render any damages to the propertyuntraceable.

FIG. 3 shows a scenario that is rapidly gaining popularity in thelogistics business. A drone 30 or other UAV delivers a package 32 to aresidence 34 by placing the package 32 at a designated area 36 near theresidence 34. This delivery method will gain significant popularity forlight-payload, short-range deliveries that don't require a humaninterface on the receiver side of the transaction. Unfortunately, manydeliveries still require a signature by the recipient or some othervalidation produced by the acceptor of the package 32 that a validtransfer of possession has occurred.

FIG. 4 shows a typical application of a simple asset access system. Anowner 40 of a vehicle 44 locks the access points to the vehicle 44 whenit is not in use. In order to gain access to the vehicle 44, the owner40 utilizes a mechanical tool like a key 42 or an electronic device likea key fob as a means to unlock the access point to the vehicle 44. Onlyowners 40 of the vehicle 44 will typically possess keys 14 or key fobs,thus limiting access to the vehicle 44.

FIG. 5 shows a vehicle 54 that is enabled to grant access to users 50 byway of a lock box 56 connected to a vehicle 54 entrance. Vehicles 54with lock boxes 56 are typically made available to potential buyers ofvehicles 54 that are for sale. Lock box 56 access systems are utilizedin scenarios when a sales agent or other representative is not presentat the vehicle 54 in order to grant access to the would-be buyer 50.Lock box 56 access is typically granted by having the user 50 enter anaccess code at the device 56, thus unlocking the compartment thatcontains the key or key fob to be utilized to unlock and operate thevehicle 54. User's 50 will typically write the access code on a piece ofpaper 52 or locate the access information in another less-than-securemanner. When vehicles 54 have multiple potential buyers 50, all entrantswill typically utilize the same access code. The utilization of lock box56 systems like that shown make the vehicle 54 vulnerable to theft orvandalism should the access code fall into the wrong hands. By utilizinga single access code for multiple users 50, the lock box 56 system makesit difficult to track which possessors of the code actually accessed thevehicle 54 and render any damages to the vehicle 54 untraceable.

FIG. 6 shows a user 100 performing an on-site transaction with a system102 in order to gain physical access to a key fob 104 that will be usedto take possession of a physical asset 106. The user 100 presents a 2Dcode 108 to the system 102 by showing the screen of a mobile device 110to the optical unit input 112 to the system 102. In various embodimentsthe asset access system 102 will contain multiple zones 114 that havecovers or other actuated features to allow access to transacted assets.A screen 116 or other passive feedback device displays messages thatcommunicate transaction details to the user 100. The facility shown maycontain a physical structure 118 that houses logistics equipment and/orpersonnel utilized for the maintenance and management of the physicalassets on site. The transaction of the user 100 with the asset system102 does not require the presence of any personnel from the physicalstructure 118.

Upon completion of the presentation by the user 100 of the 2D code 108on the screen of the mobile communication device 110 to the opticalinput unit 112, and upon the subsequent validation of the 2D code 108,the system 102 will actuate the appropriate entry to the access zone 114that contains the asset 104 associated with the transaction. Upon thesensed removal of the asset 104 the system 102 will display theappropriate status message at the display 116 and complete thetransaction by closing the access zone 114 that contained the asset.

The system 102 of FIG. 6 also facilitates the return of a physical asset106 at the end of a term ownership, lease, rental or other temporary useor access. The return of an asset can occur at the same physicallocation where the transaction commenced or can occur at a separatelocation. In a return or transfer embodiment the asset 106 is placed ina pre-determined location at the facility or is returned to anyavailable asset location at the facility. The user 100, with key fob 104in hand, will present the appropriate 2D code 108 displayed on a mobiledevice 110 to the optical input unit 112 as a means to initiate thereturn transaction. Upon validation of the 2D code 108, the system 102will actuate the appropriate access zone 114 to enable the user's 100placement of the returned key fob 104 in the proper return location 114in the system 102. The return system 102 will display 116 the successfulcompletion of the return transaction and close the actuator for theaccess zone 114.

FIG. 7 shows the system 102 of FIG. 6 with the addition of communicationchannels. The mobile device 110 is typically connected via a wirelessinterface 122 whereby a transaction for the access to an asset 106 thathas been negotiated previously or on-site has been completed. Atransaction server 128 or other cloud-based or data center-residentcomputing platform negotiates the initial transaction and prepares theappropriate transaction data structure that will be used by the system102 for the physical transfer of the asset 106. The transaction server128 is connected to the Internet 124 or other communication protocolnetwork via a two-way communication link 126. The on-site transactionsystem 102 communicates with the Internet 124 or other communicationprotocol network via a two-way communication link 120 that can be awired, electrical, optical, or wireless connection.

FIG. 8 shows an embodiment of a transaction server data structure 130for managing transactions in an asset access system. Data elements arestored and tracked according to Asset_IDs 132, which are uniqueidentifiers for all of the assets available in the system. As Asset_IDcan remain in effect for the life of an asset or new asset IDs can beestablished in order to have a unique asset ID for each asset for eachtransaction. The Asset_Description 134 field is an alphanumericdescription of the asset and may contain many sub-fields for informationthat may include, but not be limited to, vehicle make, model, VIN, StockNumber, GVWR Manufacturer, Class, Drive, Invoice Price, MSRP, Body Type,Stock Image, Doors, Drivetrain, Engine Type, Fuel Type, Horsepower,NetTorque, Cylinders, Height, MPG (City), MPG (Highway), color,fuel-level, mileage, used, Base Curb Weight, Length, Overall, ServiceTag. The Location_ID 136 field specifies information about where theasset presently resides. The Location_ID 136 may be a code for thelocation that references a look-up-table in the system, or theLocation_ID may contain many sub-fields for information that mayinclude, but not be limited to, city, state, address, stall number, GPSlocation, radius, companyID, tagID, reservedDate, kioskDate, onUserID,onKioskID, assetID, drawerTier, stockNumber, lastchange, lastKioskID,lastUserID, position_drawer, position_board, position_slot, gpsCounter,containerID, area, size. The Asset_Access_Code 138 field is used tostore information that will be used to validate the 2D code used forsystem access.

The Asset_Status_Code 140 is a multi-state field that reflects thepresent status of the asset. When an asset is available for access, theAsset_Status_Code 140 state is set to “available” 142. The “available”142 state is the initial status of the Asset_Status_Code 140 when a newAsset_ID 132 is established in the system. When a user of the assetsystem negotiates access to a particular asset, the status change of theasset is reflected by updating the Asset_Status_Code 140 state to“transacted” 144. This change in status signifies that a user for theasset has been identified, the transaction has occurred, and the user isin possession of the 2D code that will be utilized to ultimately gainaccess to the asset. When a user of the asset system gains access to thedesignated asset, the status change of the asset is reflected byupdating the Asset_Status_Code 140 state to “transferred” 146. Thischange in status signifies that a user is in possession of the physicalasset.

FIG. 9 shows a functional flow chart for an embodiment of the assetaccess system. Upon Power Up 160 the system will Initiate a Connectionto the Asset Database 162. The asset database may be resident on theclient system or may be located on a system that includes, but is notlimited to datacenters, server clusters, application servers, mainframecomputers, laptop computers, notebook computers, tablet computers, cellphones, mobile hard drives, portable hard drives, USB jump drives,portable storage devices such as SD cards, micro SD cards, compact flashcards, cameras, security cameras, routers, switches, door locks, assetservers, i/o control panels, security control panels, device controlpanels, terminator boards, bank boards, key tags, key fobs, vehiclecontrol systems, vehicle i/o systems, plane control boards, flight datarecorders, spacecraft control systems, bank control systems. Failure bythe system to properly connect to the asset database will prompt thesystem to display an Out of Service message 180. Upon establishment of aconnection to the asset database 164, the system display may show aReady for Service message 166 which signals to potential users that thesystem is ready to scan for valid codes. While in the Ready for Servicestate, the system will periodically collect an image from the scanner168 and perform image analysis 170 on the scanned image. The imageanalysis 170 may be specific to the type of code utilized by the system.Type of information used by the scanner and analysis software mayinclude, but is not limited to, QR code, Aztec Code, Code 1, Color Code,Color Construct Code, CrontoSign, CyberCode, DataGlyphs, Data Matrix,Datastrip Code, digital paper, EZcode, High Capacity Color Barcode, HanXin Barcode, HueCode, InterCode, MaxiCode, MMCC, NexCode, PDF417, Qode,Shot Code, Snap Code, SparQ Code, Voice Eye. If the analysis softwaredoes not locate a properly formatted code 172, the system will return tothe processing step following Power Up 160.

Upon detecting a properly formatted code 172, the system will parse theinformation within the code and will extract the Asset ID 176. If theAsset ID is not valid the system will return to start up. If the AssetID is valid the system will check to see if the asset is present in thelocal system 178. Having verified that the asset is local, the systemwill extract an access code from the 2D code 182 as a means of furthervalidating the transaction. When a valid access code is detected 184 thesystem will check to see if the access code matches the access code thatis in the database for this particular asset ID 186.

The processing system of an embodiment, having validated the codes forthe transaction, will next validate the status of the asset to ensureits worthiness for transaction. The system retrieves the status codefrom the Asset_ID field 188 and ensures that the status is “transacted”190. The system will make the asset available to the user by activating192 a mechanical or electrical actuator to enable access to the assetand change the status code to “transferred”. The system will wait a timeto validate the asset was transferred. The wait period will commencewhen the system starts a timer 195 that will be used to define the waitperiod. If the asset is extracted 196, the actuator is deactivated 198and the system returns to initiate another possible transaction. If thewait timer expires 197 the transaction is aborted 199 without the assetchanging possession.

The flowchart of FIG. 9 shows essential elements of an embodiment.Persons skilled in the art can construe versions of embodiments that donot contain all of the features of FIG. 9 . Alternate embodiments areachieved while remaining within the scope of inventions by includingonly the necessary steps to achieve the results disclosed within.

FIG. 10 shows an embodiment for a mobility service user 200 accessing ascheduled ride in a driverless vehicle 204. Upon arrival the vehicle 204will present its scanner 206 to the environment at the designatedlocation. The user 200 will show the screen of a mobile device 202 tothe vehicle 204 scanner 206. The screen of the mobile device 202 willdisplay the previously-distributed code that was sent to the user 200 bythe transaction system. Having validated the transaction, the vehicle204 will grant internal access to the user 200 and transport the user200 to the pre-determined destination.

FIG. 11 shows an embodiment for a temporary user 210 of a property 214.The user 210 may be a temporary renter, a viewer of for-sale property, acustomer of a time-share arrangement, or any other human that haspre-negotiated access credentials to the property 214. The user 210 willshow a code displayed on the screen of a mobile device 212 to thescanner 218 portion of the access control module 216. The module 216will grant access to the property or will grant access to a key or keycode that will enable access to the property.

FIG. 12 shows an embodiment that facilitates the receipt of a package228 delivered by a UAV 226, whereby the UAV 226 must validate thetransfer of possession of the package 228 as an alternative to gatheringa signature of receipt directly from a human. As the UAV 226 nears thedesignated drop zone it enables it scanner 232 on the asset accessmodule 230 to locate and validate a proper code. The UAV 326 will leavethe package 228 at the designated location and return to its port. Ahuman-less embodiment of FIG. 12 would remove the need for user 220presence by having the user 220 print the transaction code on, forexample, a sheet of paper. The user 220 could place the sheet of paperat the designated delivery location. The UAV 226, upon reaching thedesignated delivery zone, would validate the information on the paper,leave the package 226, and return to port.

Persons of ordinary skill in the relevant arts will recognize that theinvention may comprise fewer features than illustrated in any individualembodiment described above. The embodiments described herein are notmeant to be an exhaustive presentation of the ways in which the variousfeatures of the invention may be combined. Accordingly, the embodimentsare not mutually exclusive combinations of features; rather, theinvention can comprise a combination of different individual featuresselected from different individual embodiments, as understood by personsof ordinary skill in the art. Moreover, elements described with respectto one embodiment can be implemented in other embodiments even when notdescribed in such embodiments unless otherwise noted. Although adependent claim may refer in the claims to a specific combination withone or more other claims, other embodiments can also include acombination of the dependent claim with the subject matter of each otherdependent claim or a combination of one or more features with otherdependent or independent claims. Such combinations are proposed hereinunless it is stated that a specific combination is not intended.Furthermore, it is intended also to include features of a claim in anyother independent claim even if this claim is not directly madedependent to the independent claim.

Any incorporation by reference of documents above is limited such thatno subject matter is incorporated that is contrary to the explicitdisclosure herein. Any incorporation by reference of documents above isfurther limited such that no claims included in the documents areincorporated by reference herein. Any incorporation by reference ofdocuments above is yet further limited such that any definitionsprovided in the documents are not incorporated by reference hereinunless expressly included herein.

For purposes of interpreting the claims for the present invention, it isexpressly intended that the provisions of Section 112, sixth paragraphof 35 U.S.C. are not to be invoked unless the specific terms “means for”or “step for” are recited in a claim.

1. The inventions as shown and described.