Key safe and key access system

文档序号:1821264 发布日期:2021-11-09 浏览:13次 中文

阅读说明:本技术 钥匙保险箱和钥匙访问系统 (Key safe and key access system ) 是由 康斯坦丁·米特里斯 于 2020-03-26 设计创作,主要内容包括:一种用于帮助提供需要通过物理钥匙进行访问的服务的方法和设备,包含为用于接收所述物理钥匙的多个隔室提供数字锁的步骤,并且包含向提供所述服务的用户传输数字键码、时间访问密钥以及标识标签中的一个或多个的步骤,并且其中可通过经由传感器接收数字键码及时间访问密钥以及比较所述时间访问密钥与时钟来激活所述数字锁以打开所识别隔室。(A method and apparatus for facilitating the provision of services requiring access by a physical key, comprising the steps of providing a digital lock for a plurality of compartments for receiving the physical key, and transmitting one or more of a digital key code, a time access key and an identification tag to a user providing the service, and wherein the digital lock may be activated to open an identified compartment by receiving the digital key code and the time access key via a sensor and comparing the time access key to a clock.)

1. A key access system for selectively providing access to first and second keys or key sets, the system comprising:

a. a key safe comprising:

i. a key safe door that enables access to the safe when opened;

an electronic lock for locking or unlocking the key safe door;

at least first and second key compartments for housing said first and second keys or key sets, and each said at least first and second key compartments including a lockable compartment cover for selectively providing access to said compartments;

b. a telecommunications module for transmitting and receiving data from a remote location over a telecommunications system, the telecommunications system including a start access clock register for recording a defined start time of access;

c. a local communication module for transmitting and receiving data to and from the external proximity wireless communication apparatus;

d. a request clock register for recording a time at which the external proximity wireless communication device requests access to the local communication module;

e. a determiner for evaluating or receiving data, the determiner selectively determining that one or more predetermined access criteria are met, the predetermined access criteria including:

i. a compartment selected from the at least first and second key compartments; and

within an allowed time of the request clock register, the allowed time coming from the start access clock register;

f. wherein a first user may provide first and second keys or key sets and provide separate controlled access to different secondary users at controlled times using the same key access system.

2. The key access system of claim 1, wherein the proximate wireless communication device includes a key fob.

3. The key access system of claim 1, wherein the proximate wireless communication device includes an RFID.

4. The key access system of claim 1, wherein the lockable compartment covers each comprise a closable interior door within the key safe.

5. The key access system of claim 1, wherein the lockable compartment cover of the key safe further comprises a secondary lock separate from a primary lock of the key safe door.

6. The key access system of claim 1, wherein the secondary lock is associated with an access code of the primary lock.

7. The key access system of claim 1, wherein a primary lock contains a plurality of available access codes and the plurality of secondary locks are each associated with only one of the access codes of the primary lock, wherein a local communication module for transmitting and receiving data to and from an external proximate wireless communication device will unlock the primary lock and, thus, only one of the key safe door and the secondary lock, and, thus, only one of the at least first and second key compartments.

8. The key access system of claim 1, wherein the local communication module comprises a sensor for receiving data from an external proximity wireless communication device of a first user, whereby the predetermined access criteria determines that it is a first user and provides access to each of the key safe and the at least first and second key compartments.

9. The key access system of claim 1, wherein the local communication module comprises a sensor for receiving data to and from an external proximate wireless communication device of a secondary user, whereby the predetermined access criteria determines that it is a secondary user and provides access to only one of the key safe and the at least first and second key compartments if within the allowed time.

10. The key access system of claim 1, wherein the telecommunications system includes the internet.

11. A method of controlling access to a compartment, comprising the steps of:

a. providing a plurality of compartments

b. Providing a digital lock associated with each of the plurality of compartments;

c. creating a digital key for each digital lock, the digital key being associated with one of the digital locks for one of the plurality of compartments;

d. capturing the digital key;

e. creating a time access key for the operation of the digital lock associated with the one of the plurality of compartments for a limited allowed time of the digital lock;

f. capturing the temporal access key;

g. providing a connection of the digital lock to a clock;

h. wherein operable receipt of said digital key and said time access key within said allowed time referenced to said clock permits opening of said one of said plurality of compartments;

12. the method of claim 11, including wherein the digital lock is associated with all of the plurality of compartments.

13. The method of claim 11, including wherein the digital lock is operatively individually associated with each of the plurality of compartments.

14. The method of claim 11, comprising a plurality of digital locks, wherein the digital lock is associated with one of the plurality of digital locks.

15. A method as claimed in claims 11 to 10, wherein an apartment building has a secure repository for storing keys to enable a booked individual to leave a key for accessing his apartment or car, and wherein a service person other than the aforementioned person has means to access the secure repository to retrieve the stored key to enable the apartment or car in the apartment building to be moved by the service person to a service area.

16. The method of claim 11, wherein the subscription by the individual includes information related to when the service needs to be provided.

17. A method of controlling access to a key, comprising the steps of:

a. providing a plurality of physical keys for different access requirements;

b. providing a plurality of compartments for housing one or more physical keys;

c. providing a digital lock on each of the plurality of compartments;

d. creating a digital key for each digital lock, the digital key being associated with one of the digital locks for one of the plurality of compartments;

e. capturing the digital key;

f. creating an identification tag for identifying a physical key in an assigned one of the plurality of compartments housing one or more physical keys;

g. capturing the identification tag;

h. creating, for the digital lock associated with one of the plurality of compartments, a time access key for the digital lock that is limited to allowable time of operation;

i. capturing the temporal access key;

j. providing a connection of the digital lock to a clock;

k. wherein upon operatively receiving the identification tag of one of the physical keys and a determination requirement at a time required to form a desired physical key, providing the digital key and the time access key associated with an associated compartment of the plurality of compartments; and

wherein upon operably receiving said digital key and said time access key within said allowed time referenced to said clock, allowing said one of said plurality of compartments to be opened to access said one of said physical keys.

18. The method of claim 17, comprising the step of transmitting an identification tag generator for generating an identification tag associated with at least one compartment of the plurality of compartments, the identification tag having one or more of:

a. identification of the associated compartment

b. Identification of physical key content of compartment

c. Identification of related assets related to the physical key content of a compartment

d. Details of the numeric key code for the compartment

e. Details of the temporal access key for the compartment

f. Detailed information of open/locked state of compartment

19. The method of claim 18, comprising the step of transmitting to a user a request providing one or more of:

a. a numeric key code;

b. a time access key; and

c. identification tag

Wherein the user has access to the identified compartment;

and wherein the digital lock is activatable to open the identified compartment by,

i. reception via the following sensors

1. A numeric key code; and

2. time access key

And comparing the time access key to the clock.

20. A method as claimed in any one of claims 17 to 19, wherein an apartment building has a secure repository for storing keys to enable a subscribed person to leave a key for accessing his apartment or car, and wherein a service person other than the person has means to access the secure repository to retrieve the stored key to enable the apartment or car in the apartment building to be moved to a service area by the service person.

21. A method of providing a service requiring access, the method comprising the steps of:

a. providing a plurality of compartments with a digital lock on each of the plurality of compartments to be opened using a digital key and connecting the digital key and/or the digital lock to a clock;

b. receiving a request for a service within a predefined time and providing an associated physical key in one of the plurality of compartments for providing the service;

c. creating

i. The physical key and an identification tag of an associated compartment of the plurality of compartments into which the physical key is inserted

A digital key for unlocking the digital lock of the associated compartment into which the physical key is inserted

A time access key for the digital lock associated with the one of the plurality of compartments,

a time-limited operation for the digital lock;

d. providing the digital key and the time access key to a service provider for use at the plurality of compartments

e. Wherein the plurality of compartments are capable of receiving the digital key and the time access key from the service provider to allow the one of the plurality of compartments to be opened to access the one of the physical keys during a time-limited operation of the digital lock for the digital lock associated with the one of the plurality of compartments.

22. The method of claim 21, comprising the step of transmitting a user a offer of one or more of the following

a. A numeric key code;

b. a time access key; and

c. identification tag

Wherein the user may access the identified compartment;

and wherein the digital lock is activatable to open the identified compartment by:

i. receiving the following via a sensor

1. A numeric key code; and

2. time access key

And comparing the time access key to the clock.

23. A method as claimed in claim 21 or 22, wherein an apartment building has a secure store for storing keys to enable a booked individual to leave a key for accessing his apartment or car, and wherein a service person, other than said individual, has means to access said secure store to retrieve the stored key to enable the apartment or car in said apartment building to be moved by said service person to a service area.

24. A system for providing a service to one or more individuals associated with an entity, the system comprising:

a. one or more terminals for receiving service subscription and payment information from a user;

b. a service database for receiving service subscription and payment information; one or more service terminals for receiving service subscription information from a server, enabling completion of the service and sending a confirmation of completion of the service back to the server and the person.

25. The system of claim 24, wherein the server is arranged to periodically calculate payments to be paid to the entity within a predetermined time period based on one or more predetermined criteria and to transmit the payments to the entity.

26. A multi-compartment apparatus for positioning at a multi-compartment apparatus having:

a. multiple compartments

b. At least one digital lock controlling access to each compartment

c. Sensor with a sensor element

d. Connection to a clock

e. Wherein the digital lock for each compartment is selectable and resettable

f. Wherein the digital lock is activatable to open by:

i. receiving via the sensor described below

1. A numeric key code; and

2. time access key

And comparing the time access key to the clock.

27. A multi-compartment apparatus as claimed in claim 26 comprising an identification tag generator for generating an identification tag associated with at least one of the plurality of compartments, the identification tag having one or more of:

a. identification of the associated compartment

b. Identification of physical key content of compartment

c. Identification of related assets related to the physical key content of a compartment

d. Details of the numeric key code for the compartment

e. Details of the temporal access key for the compartment

f. Detailed information of open/locked state of compartment

28. A multi-compartment apparatus as claimed in claim 26 including a receiver and transmitter for allowing communication with a remote administrator.

Technical Field

The present invention relates to key access systems, and in particular, to key safes and key access systems including key safes.

The invention has been developed primarily for use in multi-tenant apartment buildings, and will be described hereinafter with reference to this application. It will be appreciated, however, that the invention is not limited to this particular field of use.

The present invention relates to a method and system for providing services to one or more individuals associated with an entity. The service may be any type of service. The entity may be a building company or a corporate body. In an example, the service is a car wash and/or related car cleaning service. An individual is a tenant of an apartment building. Thus, the entity is the owner of the apartment building or a corporate community on behalf of the apartment building. The present invention is not limited to use in this particular environment.

Background

It is known to have key safes that contain mechanical or electronic locks. However, such safes are often limited in use. This is usually overcome by using a master key. However, this only provides unrestricted access to more people, and does not control them. The problem with this system can be seen in the problems raised by hotels or motels that the cleaner can freely enter using a master key.

Obviously, in a complex location such as a private apartment in an apartment complex, it is not acceptable to use a master key to enter any apartment at any time. There is a problem in that even if a person having access authority is a serviceman of the entire apartment building, individual control of access is required.

If an individual were to have a separate control system, multiple systems would be created in multiple apartment buildings, which would result in wasted space and confusion in finding and accessing the correct system using the correct code or key.

It can be seen that a particular range of problems can arise with known systems, including one or more of the following:

a) multiple keys require multiple safes if access to only one set of keys is to be controlled

b) There is no mechanism for controlling multiple accesses by multiple people;

c) there is no control over when access is allowed;

d) generally, an authorized user must personally attend to the safe to insert a key and provide access

e) Generally, an authorized user must personally attend to the safe to remove the key to stop access; and

f) in the case where there are no different systems per user and per group, there is no way to coordinate different users who need different keys.

Accordingly, it would be advantageous to provide a system, apparatus and/or method that reduces, limits, overcomes or ameliorates one or more of the problems, disadvantages or disadvantages associated with the prior art, or at least provides an effective alternative.

Any discussion of documents, devices, acts or knowledge in this specification is included to explain the context of the invention. At or before the priority date of the disclosure and of the claims herein before they are set forth in this broad general description, it should not be taken as an admission that any of the material forms part of the prior art base or the common general knowledge in the relevant art in australia or elsewhere.

Disclosure of Invention

The present invention provides, in one form, a key access system for selectively providing access to first and second keys or key sets, the system comprising:

a) a key safe comprising:

b) a key safe door that enables access to the safe when opened;

c) the electronic lock is used for locking or unlocking the key safe door;

d) at least first and second key compartments for housing said first and second keys or key sets, and each said at least first and second key compartments including a lockable compartment cover for selectively providing access to said compartments;

e) a telecommunications module for transmitting and receiving data from a remote location over a telecommunications system, the telecommunications system including a start access clock register for recording a defined start time of access;

f) a local communication module for transmitting and receiving data to and from the external proximity wireless communication apparatus;

g) a request clock register for recording a time at which the external proximity wireless communication device requests access to the local communication module;

h) a determiner for evaluating or receiving data, the determiner selectively determining that one or more predetermined access criteria are met, the predetermined access criteria including:

i) a compartment selected from the at least first and second key compartments; and

j) within an allowed time of the request clock register, the allowed time being from the start access clock register;

k) wherein a first user is able to provide first and second keys or key sets and provide separate controlled access to different secondary users at controlled times using the same key access system.

According to the present invention, there is provided a method of controlling access to a compartment, comprising the steps of:

a) providing a plurality of compartments

b) Providing a digital lock associated with each of the plurality of compartments;

c) creating a digital key for each digital lock, the digital key being associated with one of the digital locks for one of the plurality of compartments;

d) capturing the digital key;

e) creating a time access key for the operation of the digital lock associated with the one of the plurality of compartments for a limited allowed time of the digital lock;

f) capturing a time access key;

g) providing a connection of a digital lock to a clock;

h) wherein operable receipt of said digital key and said time access key within said allowed time referenced to said clock permits opening of one of said plurality of compartments;

furthermore, the present invention provides a method of controlling access to a key, the method comprising the steps of:

a) providing a plurality of physical keys for different access requirements;

b) providing a plurality of compartments for housing one or more physical keys;

c) providing a digital lock on each of a plurality of compartments;

d) creating a digital key for each digital lock, the digital key being associated with one of the digital locks for one of the plurality of compartments;

e) capturing a digital key;

f) creating an identification tag for identifying a physical key in an assigned one of the plurality of compartments housing one or more physical keys;

g) capturing an identification tag;

h) creating, for the digital lock associated with one of the plurality of compartments, a time access key for the digital lock that is limited to allowable time of operation;

i) capturing a time access key;

j) providing a connection of a digital lock to a clock;

k) wherein upon operatively receiving the identification tag of one of the physical keys and a determination requirement at a time required to form a desired physical key, providing the digital key and the time access key associated with an associated compartment of the plurality of compartments; and

l) wherein opening said one of said plurality of compartments to access said one of said physical keys is permitted upon operatively receiving said digital key and said time access key within said permitted time with reference to said clock.

In one form, the present invention provides a method of providing a service requiring access, comprising the steps of:

a) providing a plurality of compartments having a digital lock on each of the plurality of compartments to be opened using a digital key and connecting the digital key and/or the digital lock to a clock;

b) receiving a request for service within a predefined time and providing an associated physical key in one of the plurality of compartments for providing the service;

c) creating an identification tag for a physical key and an associated compartment of a plurality of compartments into which the physical key is inserted

d) Digital key for unlocking a digital lock of an associated compartment in which a physical key is inserted

e) For a digital lock associated with one of the plurality of compartments, a time access key for operation of the digital lock that is limited to an allowed time;

f) providing a digital key and a time access key to a service provider for use at multiple compartments

g) Wherein the plurality of compartments are capable of receiving a digital key and a time access key from a service provider to allow one of the plurality of compartments to be opened to access one of the physical keys during an allowed time limited operation of the digital lock for a digital lock associated with the one of the plurality of compartments.

In one aspect, the present invention provides a key access system for selectively providing access to first and second keys or key sets, the system comprising: a key safe including a key safe door that enables access to the safe when opened; the electronic lock is used for locking or unlocking the key safe door; and at least first and second key compartments for housing first and second keys or key sets, and wherein each of the at least first and second key compartments contains a lockable compartment cover for selectively providing access to the compartment.

The system further includes a remote communication module for transmitting and receiving data from a remote location through a telecommunications system including a start access clock register for registering a defined access start time; a local communication module for transmitting and receiving data to and from the external proximity wireless communication apparatus; a request clock register for registering a time at which the external proximity wireless communication device requests access to the local communication module; and a determiner for evaluating or receiving data, the determiner selectively determining that one or more predetermined access criteria are met, comprising: a compartment selected from at least first and second key compartments; and within the allowed time for the request clock register to access the clock register from the beginning.

In this way, a first user may provide first and second keys or key sets and provide separate controlled access to different secondary users at controlled times using the same key access system.

The present invention may provide a method for providing services to one or more individuals associated with an entity using the key access system of the present invention, the method comprising the steps of:

(a) receiving service subscription and payment information from an individual accessing one or more terminals;

(b) transmitting the subscription and payment information to a server for storage on a database;

(c) transmitting the subscription information from the database on the server to the one or more service terminals so that the service can be validated;

(d) a service person arrives at a location associated with an entity and performs a subscription service, the service person having been provided with service subscription information from one or more service terminals from a server;

(e) transmitting an acknowledgement from the one or more service terminals to the server to indicate that the service has been completed;

(f) storing the confirmation of the database on the server; and

(g) the personal service is notified that it is complete.

In an example, there are the following additional steps:

(h) the server calculating a payment to be paid to the entity within a predetermined time period based on one or more predetermined criteria; and

(i) the payment is transmitted to the entity.

In the example, the entity is an owner company or corporate group of an apartment complex.

According to another aspect of the present invention there is provided a system for providing a service to one or more individuals associated with an entity, the system comprising:

one or more terminals for receiving service subscription and payment information from a user;

a service database for receiving service subscription and payment information; one or more service terminals for receiving service subscription information from the server so that the service can be completed and sending a confirmation of the completion of the service back to the server and the person.

Drawings

In order that the present invention may be more clearly understood and put into practical effect, embodiments according to the present invention will be described herein in detail. The following description is given by way of non-limiting example only and with reference to the accompanying drawings, in which:

FIG. 1 is a block diagram of an example networked system that may be used to embody or implement aspects of the present invention;

FIG. 2 is a block diagram illustrating components of the example system of FIG. 1;

FIG. 3 is a block diagram illustrating various example forms of server and customer devices of the system of FIG. 1;

FIG. 4 is a block diagram illustrating elements of an example server and customer key fob of the system of FIG. 1;

FIG. 5 is a block diagram illustrating elements of an example key safe of the system of FIG. 1; and

fig. 6A, 6B and 6C are connection flow diagrams of an embodiment of the present invention illustrating a process for operating a key safe.

FIG. 7 is a schematic diagram illustrating a system for providing car wash and/or related car cleaning services;

FIGS. 8 and 9 are block diagrams of a set of multiple compartments according to aspects of the present invention;

FIGS. 10 and 11 are diagrammatic views of the operation of the use of the system according to aspects of the present invention;

fig. 12 and 13 are diagrammatic views of the set of multiple compartments of fig. 8 and 9 in use, according to aspects of the present invention of fig. 10 and 11;

FIG. 14 is a simplified illustration of operational control of a digital lock including time codes and key codes for use on the plurality of compartments of FIGS. 8 and 9;

FIG. 15 is a diagrammatic view of operational control of time code operation for the digital lock on the multiple compartments of FIGS. 8 and 9;

FIG. 16 is a diagrammatic view of operational control of key code delivery for the numeric lock on the multiple compartments of FIGS. 8 and 9;

FIG. 17 is a diagrammatic view of the application of a digital lock to the operational control of a selected one or next of the plurality of compartments of FIGS. 8 and 9;

FIG. 18 is a simplified illustration of operational control of a digital lock including time codes and key codes for use on the plurality of compartments of FIGS. 8 and 9;

FIG. 19 is a diagrammatic block diagram of a method of controlling access to compartments in accordance with an embodiment of the invention;

FIG. 20 is a diagrammatic block diagram of a method of controlling access to a key in accordance with an embodiment of the present invention;

FIG. 21 is a diagrammatic block diagram of providing a service requiring access in accordance with an embodiment of the present invention;

FIG. 22 is a functional flow diagram illustrating process steps in an example of a system according to the present invention, such as that shown in FIG. 7;

FIG. 23 illustrates a user login screen for an individual;

fig. 24 shows a registration screen of a user;

FIG. 25 shows a control panel screen of a user;

FIG. 26 shows a user's profile screen;

FIG. 27 shows a user's schedule screen;

FIG. 28 illustrates a schedule service type screen for a user;

FIG. 29 is a view showing a user's reservation schedule screen;

FIG. 30 illustrates a user's subscription schedule screen;

FIG. 31 shows a user schedule summary page for billing;

FIG. 32 shows a payment options screen for a user;

FIG. 33 shows a user's reservation schedule screen after payment, an

FIG. 34 shows an overview of a user subscription schedule in a different format than FIG. 33, an

FIG. 35 shows a My Payment History screen.

Detailed Description

Referring to fig. 1, an exemplary networked infrastructure key access system 10 is shown. The system 10 includes a plurality of hardware devices connected by a telecommunications network.

In the illustrated embodiment, the hardware devices comprise various electronic, processing and/or computing devices, including: a first device or linking device comprising a manager server 12; a second device or linking device comprising a server device 14, such as a mobile telephone; a third device or linking device comprising a customer device 16, such as a mobile phone; a fourth device or linking device that includes a server key fob 18; a fifth device or linking device comprising a customer key fob 20; and a sixth device or linking device that includes a key safe 68.

Manager server 12, server device 14, customer device 16, and key safe 68 are each connectable to one another via internet 22.

In addition, the server key fob 18 and the customer key fob 20 are each configured to communicate directly with the key safe 68 in the key access system shown.

The network of the key access system 10 includes the internet 22 and may further include other networks, such as a WAN, ethernet, token ring, satellite communications network, telecommunications network, mobile telephone network including, for example, a GSM or 3G network, or any combination thereof, through which hardware devices may communicate. This enables, for example, input and output data to be transferred between hardware devices via a network. In the illustrated embodiment, the server key fob 18 and the customer key fob 20 are configured to communicate directly with the key safe 68 via RFID-compliant radio waves.

The interconnection between devices that facilitate the transfer of data and/or information over a network may be wholly or partially wired, such as by fiber optics, and/or wireless, such as by using a Wi-Fi, bluetooth, cellular, or satellite communication network. In this case, the connection between the hardware devices via the internet relies on wired and wireless technology, including fiber optics and Wi-Fi, and the direct connection between the key fobs 18, 20 and the key safe 68 may be wireless via the RFID network.

It should be appreciated that system 10 may additionally or alternatively include other electronic or computing devices, such as one or more desktop computers, laptop computers, tablet computers, implanted devices, smart phones, and/or wearable devices such as smart watches and headsets.

It should be appreciated that the networked infrastructure system 10 represents only a single instance of an infrastructure that may be suitable for implementing aspects of the present invention. Other suitable networked systems for implementing the invention may involve various alternative devices, configurations, networks, or architectures without departing from the scope of the invention.

Referring now to fig. 2, a block diagram of computing hardware, generally designated 30, associated with the key access system 10 is shown. Some or all of hardware 30 may be associated with any one or each of electronic devices 12, 14, 16, 18, 20, and 68. Hardware 30 includes memory 32, including ROM 34 and RAM 36, as well as stored data 38, sets of instructions forming programs and applications 40, and an operating system 42. The bus 44 links the memory 32 to the processor 46, the display 48, and the input means 50. The hardware is powered by a power supply 52. The communication interface 54 enables the device to communicate with other devices.

Referring to FIG. 3, the server device 14 and the customer device 16 may each be a personal computing device including any one or more of a mobile phone 60, a desktop computer 62, a laptop computer 64, and a tablet computer 66, depending on user preferences and accessibility. Each of these devices (as well as the server 12 and key safe 68) includes some or all of the various formed hardware 30. For example, in an embodiment where attendant device 14 and/or customer device 16 are in the form of a desktop computer 62, they may include memory 32, a processor 46, a display 48 in the form of a monitor, an input 50 in the form of a mouse and keyboard, a power supply 52 in the form of a power supply unit that converts mains AC to low voltage regulated DC power, and a communication interface 54 including an ethernet port for wired network connectivity. As another example, in this embodiment where the attendant device 14 and the customer device 16 comprise mobile phones 60, the mobile phones 60 may include memory 32, processor 46, display 48 and input 50, together in the form of a touch screen, a power source 52 in the form of an internal DC rechargeable battery, a communication interface 54 including a Wi-Fi adapter for wireless network connectivity, and a GSM module for communicating over a GSM network.

Referring to fig. 4, each of the server key fob 18 and the customer key fob 20 respectively includes an RFID tag having a microchip 88 containing a microprocessor 90, an antenna 92, a battery 94, and a memory 96.

Referring to FIG. 5, a key safe 68 is shown having a wall 70 and a door 72 and including a first compartment 94, a second compartment 96, a third compartment 98 and a fourth compartment 99, respectively, each defining a slot 11 that is manually accessible when the key safe door 72 is opened. The safe includes some or all of the various forms of hardware 30 described above, including: a power supply module 52 in the form of a power supply unit; a processor 46; a memory 32; a wireless communication module 80 adapted to communicate with an RFID tag 86 of the key fob 18, 20, including a Wi-Fi module 84 and an RFID module 82; a user input 50 in the form of a keypad; a display screen 48; and an additional electronic lock 78 including a magnetic latch 77, the electronic lock 78 being configured to lock or unlock the key safe door 72.

User' s

The primary user is a person who wishes to use a service provided by a service provider. The primary user is considered a customer and connects to the key access system by using a downloadable application on the customer device 16. The customer device allows the customer to set and control access to the key.

The customer also has the right to set the access time.

In essence, the customer may be the owner of an apartment in an apartment building, and various merchants can be easily controlled independently to enter their apartment at the customer's will. In addition, the customer may control the order of access without having to provide only a single access to all merchants. Alternatively, multiple systems allow coordinated individual control of different merchants.

Unlike what may allow a merchant coordinated and controlled access, such as delivery, etc.

The following description outlines examples of systems and methods for using a key access system for individuals, such as residents of entities (building complexes) controlled by a corporate body or similar facility. The system and method utilize a plurality of user terminals connected to a network (which may be a LAN, WAN or the internet), all operating via a website, and one or more attendant terminals. The system may be configured to operate over a 3G or 4G or similar mobile telephone network.

The system includes a plurality of individual users corresponding to owners of automobiles or apartments residing in one or more apartments or buildings that provide services. Thus, the building is associated with an entity that may be, for example, a corporate community. A user may interact with the system directly via one or more terminals or a user may interact with the system indirectly via one or more terminals.

In this case, a user person who is a tenant or owner of a particular apartment in a building will request a service through the system or through the network. This may be accessing a website from a personal computer device. A network such as the internet may be accessed via a terminal such as a PC laptop or the like, or a mobile communication device. A subscription and payment service is also connected to the network, said subscription and payment service comprising a database for storing information received from the user's person.

The stored information may contain personal data information and other details. The stored information may also contain subscription data information for services that have been performed and services to be performed. Many people who will provide the service may access the network to obtain information about future subscriptions and provide the information when the service has been performed. Each terminal may comprise one or more of a mobile telephone, a computer terminal, a laptop computer or a portable digital assistant, etc. The database is connected with the booking and payment server and is configured to store information received from the car wash terminal about performed services, for example when the services have been completed.

The reservation and payment server is also connected to a bank server which may be associated with a banking institution for transferring payment funds, as will be described below. One or more accounts are connected to the bank server, the accounts corresponding to bank accounts associated with entities such as business owners companies, corporate bodies, and also to individual accounts.

The basic functional flow diagram of process steps in the system has a client front-end block, a client area, a server personnel area and an administration area, and a banking interface. A client of the system, being a person, will access the system by a user accessing a subscription procedure or via a phone, mobile communication device, computer terminal or the like. Alternatively, the individual may have a card that can be swiped, the card containing all the information identifying the individual.

Thus, the process begins when a user personally accesses the client front-end. If the individual is registered in the system, the individual logs in and enters the customer area. Alternatively, if the individual is not a registered user, the user is transferred to a registration process, which includes a registration activation portion in which data about the individual is entered. When registration has been completed, an identification number is issued to the individual. The process in the client front-end may contain other detailed steps in order to check the validity of the individual, the missing password, etc.

Once the individual completes the process through the customer front end, the individual is transferred to the customer area and a control panel is presented to the individual. The individual then proceeds to set up the schedule. The schedule step requires identifying the location, the type of service required, and the time and date of the service.

Once the initial setup has been completed, the individual enters a payment step. Here, there is a banking interface in which a person's bank account credit card or the like can be debited.

Once payment is complete, the banking interface then provides confirmation to the administrative area in the database. When the individual has completed the schedule, data is sent to the administrative domain so that when payment is approved at the banking interface, the reservation payment can be matched.

Upon completion of the payment, the user is provided with the receipt number of the reservation. The system then passes the data to the attendant area. Thus, when the attendant logs into the system, the individual's subscription will be displayed. The service person may then check the customer/individual appointment and then assign the actual service to the service person.

Once the service task is complete, the service person enters completion and then dispatches a message to the individual confirming that the service has been completed. At the completion step, an indication may be assigned to the management area such that the completion of the service is recorded in the database. Returning now to the process steps in the customer area, it should be noted that when the customer/person is provided with a confirmation receipt number, they will be required to place their key in the secure repository. This repository may be located at a desk or in an area designated for services to be performed, such as a public area of a building complex. The secure storage library includes the key lock system of the present invention. Other forms of secure storage library may be provided and the lock box is just one example, if desired.

The service person accesses the secure store to retrieve the relevant key, for example by using the key identified by the order. When an individual is registered in the system and provided with an identification number, the individual may be issued a key ring and a label printed with the identification number. The individual may use the key ring for keys so that when keys are placed in the primary and secondary containers of the secure storage library, service personnel can determine which keys match which car or apartment. In this way, service personnel may identify a particular key from a large number of such keys that may be in a secure storage repository.

When the service person has taken the key, they can locate the car or apartment and can perform the reserved service. When the service has been completed, the service person may then return the key to the key locker of the individual in the apartment building. In this way, individuals can take their keys out of another secure repository dedicated only for their use. This is identified in detail below.

In a banking interface, there are many possible process steps. When payment is to be made, the bank interface block may attribute a portion of the fee to be charged to, for example, a construction fund and or a percentage to a corporate principal or group of legal persons and/or a charity fund.

In addition, the component of the service fee may include a component for paying a fee related to a rental fee of a necessary service area required for performing the service in the apartment building.

Thus, process steps of this nature may be incorporated into a banking interface. The banking interface may also contain details of the system coordinator's bank account so that the system coordinator (the system owner and controls the entire system) can receive payments. Payment can be transacted and confirmed online and provided to the management area.

Method of operation

Referring to fig. 6A, 6B, and 6C, an example process 100 for storing and accessing keys in key safe 68 is shown. In an example embodiment, the server operating server device 14 is an individual providing a service such as apartment cleaning or car washing, and the customer operating customer device 16 is a customer of a home such as a high-rise apartment or a low-rise apartment building. Manager server 12 is operated by a system manager that, in addition to managing the software of the system, may sell or lease key safes 68 to the managers of an apartment building or other dwelling.

Thus, at step 102, the customer uses a previously downloaded key safe application on their customer device 14 (a smartphone or tablet computer in an example embodiment) to order services such as apartment cleaning, grocery distribution, car washing, and/or dry cleaning. The subscription of the service causes the customer device 14 to wirelessly signal the manager server 12 to record the service subscription.

At step 104, the manager server 12 sends a signal to the server device 14 (smartphone, tablet in an example embodiment) of the server providing the subscription service, notifying the server of the subscription.

At step 106, the customer holds or slides their customer key fob 20 (which may be in the form of an item on a key fob or key ring, for example) near the key safe 68. When close enough, antenna 92 receives the radio frequency signal transmitted from the RFID module 82 of the key safe.

Upon receiving the RF signal, the customer key fob 20 sends a signal back to the RFID module 82 to unlock the key safe 68 at step 108.

At step 110, the key safe 68 transmits information about the customer key fob 20 to the manager server 12 via its Wi-Fi module 84.

At step 112, the manager server 12 checks whether the customer key fob 20 attempted to unlock the safe within a predetermined time period prior to the customer's subscription (e.g., up to 7.5 hours prior to the service day).

If within the predetermined time period, then at step 114, the manager server 12 sends a signal to the key safe 68 to unlock the electronic lock 78.

At step 116, processor 46 of key safe 68 causes electronic lock 78 of the safe to open as a result of the signal received from manager server 12 via the Wi-Fi 84 module of the safe.

With electronic lock 78 unlocked, the customer is then able to open the key safe door or may automatically open the key safe door at step 118.

At step 120, the light 7 on the key compartment 94, 96, 98 or 99 associated with the customer's subscription is illuminated, as identified by the indicia 9 on the key compartment. For example, a first key compartment 94 may be reserved for apartment keys for accessing a customer's apartment to provide apartment services, a second key compartment 96 may be reserved for car keys for accessing a customer's car to provide car services, a third key compartment 98 may be reserved for apartment keys for accessing a customer's apartment for delivery, and a fourth key compartment 99 may be reserved for apartment keys for accessing a customer's apartment to obtain clothing for dry cleaning/ironing and/or delivering clothing after dry cleaning/ironing. The sign 9 on the key compartment will indicate the particular service provided, for example an apartment key for dry cleaning.

At step 122, the customer places their key in the slot 11 of the compartment with the light 7 on and the flag 9 indicating that service has been reserved. The key passes through the slot 11 and along the angled slot 13 into the compartment where it cannot be accessed by hand when the compartment door 1 is locked.

At step 124, the server holds or swipes its server key fob 18 (which may be in the form of an item on a key fob or key ring, for example) in the vicinity of the key safe 68. When close enough, antenna 92 receives the radio frequency signal transmitted from the RFID module 82 of the key safe.

Upon receiving the RF signal, the server key fob 18 sends a signal back to the RFID module 82 to unlock the key safe 68 at step 126.

At step 128, the key safe 68 transmits information about the server key fob 18 to the manager server 12 via its Wi-Fi module 84.

At step 130, the manager server 12 checks whether the server key fob 20 is attempting to unlock the safe within a predetermined period of time (e.g., on a service day, up to 4 hours before or after) of the customer's subscription.

If within the predetermined time period, then at step 132, manager server 12 sends a signal to key safe 68 to unlock both electronic lock 78 of key safe 68 (step 132a) and electronic lock 3 of key compartment 94, 96, 98 or 99 associated with the customer's reservation (step 132 b).

At step 134, processor 46 of key safe 68 causes electronic lock 78 of the safe to open as a result of the signal received from manager server 12 via the Wi-Fi 84 module of the safe.

Additionally, at step 136, the processor 46 of the key safe 68 causes the electronic lock 3 of the associated compartment to be unlocked further as a result of the signal received from the manager server 12 via the Wi-Fi 84 module of the safe.

At step 138, the attendant is then able to open the key safe door or may automatically open the key safe door with the electronic lock 78 of the key safe unlocked.

At step 140, the light 7 on the key compartment 94, 96, 98 or 99 associated with the customer's subscription is illuminated, as identified by the logo 9 on the key compartment.

With the electronic lock 3 of the associated compartment unlocked, the attendant can then open the associated compartment door (or may automatically open the compartment door) and reach to grasp the customer's key for service at step 142.

Once the service has been performed, the server signals to the manager server that the service is complete using its server device at step 144.

At step 146, the manager server 12 sends a signal to the payment gateway to transfer payment from the customer account to the server account depending on the service being performed.

At step 146, the manager server 12 sends a signal to the customer device 16 informing the customer that his reservation has been completed.

If this is the last service performed with a particular key for the day, the server will return the key to, for example, the customer's apartment or mailbox.

The server then uses its server device 14 to signal to the manager server 12 that the key has been placed back or where the key has been placed back at step 168.

At step 170, the manager server 12 signals to the customer device 16 that the key has been placed back or where the key has been placed back.

However, if this is not the last service performed with a particular key on the day, the server has not yet returned the key to the customer, and steps 168 and 170 have not yet been completed.

For example, in the case where a customer subscribes to a number of different services that require the same key on the same day, such as in the case where the customer subscribes to both apartment cleaning and dry cleaning, each requiring a different attendant to use the customer's apartment key to enter their apartment, the attendant who completes the first subscription should replace the key in the key safe (rather than the customer), but place it in a different compartment that the next attendant can access. This may occur as follows:

at step 148, the manager server 12 signals to the server device 14 that the key is to be placed back into the key safe 68 for another service.

At step 150, the server holds or swipes its server key fob 18 near the key safe 68. When close enough, antenna 92 receives the radio frequency signal transmitted from the RFID module 82 of the key safe.

Upon receiving the RF signal, the server key fob 18 sends a signal back to the RFID module 82 to unlock the key safe 68 at step 152.

At step 154, the key safe 68 transmits information about the server key fob 18 to the manager server 12 via its Wi-Fi module 84.

At step 156, manager server 12 verifies that the safe is to be reopened for the server to allow the key to be stored for another server to take.

At step 158, the manager server 12 sends a signal to the key safe 68 to unlock the electronic lock 78 of the key safe 68.

With the electronic lock 78 of the key safe unlocked, the attendant can then open the key safe door or can automatically open the key safe door at step 160.

At step 162, the light 7 on the key compartment 94, 96, 98 or 99 associated with the customer's next booking illuminates as identified by the logo 9 on the key compartment.

At step 164, the server places the customer's key into the slot 11 of the compartment with the light 7 on and the sign 9 matching another service subscribed. The key passes through the slot 11 and along the angled slot 13 into the associated compartment where it cannot be accessed by hand when the compartment door 1 is locked.

At step 166, the manager server signals to another server device 14 that the key is ready for acquisition by another server.

At this point, another server required to perform the next subscription of the customer accesses the key in the same manner as the previous server, with steps 124 through 144 being completed. If this is the last service performed using the same key for the current day, steps 168 and 170 are completed.

In another example system, the server device 14 also functions as the server key fob 18 and the customer device 16 also functions as the customer key fob 20.

Example 2

Referring to fig. 8 through 13, the user may select different types of services from the web page 160 or through the native handset application. In a particular service, e.g. cleaning, there may be multiple possible providers 152, 153, 154, and one provider may be selected by the user 150 and notified to the administrator/agent 151.

The provided information is saved to a secure server and the credit card information is securely sent to the magnetic stripe in exchange for a secure token which is then used to provide payment.

However, user 150 must then be able to provide the service provider with the key for access. A user can use the access control system of the present invention without having to perform the service on site. After completing the required fields/information, user 150 needs to prepare a key to place into the locker (one of the compartments 161, 162, 163 …). The server will send a message containing the stored key QR code. This forms an identification tag 173.

The user must place the device 152 (cell phone) displaying the received QR code in front of the QR reader 167 located in the key box 160. The next available slot 161, 162, 163 … on the stowage bin 160 will open.

The user 150 must then place the key 155 in the locker 161 and close it to complete the process. The locker 160 will send information to the server regarding the location of the key, the key type (apartment/vehicle) and the key owner (identification tag 173).

The administrator/agent will see any completed key deposits and any service schedules. The administrator/agent will select the next cleaner available for work

The selected cleaner 152 will receive the next schedule and a pair of QR code keys 181, 182 for retrieving and replacing keys. The QR code key may be used only on a schedule specified by the user and may be used only once.

The cleaner must place a device 166 (cell phone) displaying the received removal key QR code 181 in front of the QR reader 167 located in the key box 160. The correct slot 161 on the stowage bin 160 will open.

The cleaner 152 obtains the key 155 and proceeds to the location to perform the cleaning service based on the received message. The server is updated by the location of the key/status of the handler. After cleaning service, the cleaner 152 will replace the key with the stored key QR code 182 received from the message. The cleaner 152 must place a device 166 (cell phone) displaying the received stored QR code 182 in front of the QR reader 167 located in the key box. The next available slot 161, 162, 163 … on the locker will be opened for the cleaner to store the key. This locker need not be the same locker as originally used. The cleaner must close the locker to complete the transaction and the locker will update the server, which will then collect payment from the user's magnetic stripe token for collection of payment and send messages to the user and administrator/agent.

The user may request that the key be retrieved by the cleaner or left in the locker for the next desired service. That is, the deposited key QR code 182 may be adapted to form a new identification tag 173 for the next service.

Referring to fig. 14 to 18, the components of the system can be seen.

Referring to fig. 14, access to compartments 161, 162, 163. However, for flexibility of use and to be able to be freed from the limitation that each compartment is used only for a single user, a digital lock is created each time it is used. Thus, generator 185 is provided to create digital lock 190.

However, the digital lock cannot be opened by a simple key code. Alternatively, there are multiple requirements for the key code 171 and the time code 172, which may be independently and individually generated in response to the same or different persons. In particular, the time code may be defined by the user to provide a specific access time. Thus, the combination lock 190 cannot be opened by the key code 171 alone, and must also receive a time code. Without these two digital locks, it is not possible to open, but without reference to the clock 168 connected thereto, to see if the defined period of time of the timecode 172 is met. Only upon completion of all of these actions will the digital lock 190 open and provide access to the designated compartment. Another important element is that these key codes 171 and time codes 172 are digital and therefore can be digitally transmitted to the desired user and digitally read by a reader on the compartment. The preferred mode of delivery is a QR code system, but other digital systems may be used.

In FIG. 15, the creation of various elements of a timecode 172 is shown. The user 160 may define a desired time 173 for the service to be provided, thereby providing a time range. An organizer 161 of a provider 162 (e.g., a cleaner 152) that is distributing services may define available times 174 at which the provider may provide services and modify or limit the timecodes 172. This timecode may only be used when the timecode checking portion 175 looks at the actual time in the connected clock 168 and only so is the timecode 172 providing an output 180 which may open the digital lock 190 using the key code 171.

As shown in fig. 16, the key code may start with the request input 184 so that the generator 185 may create the key code. This key code is created in digital form, for example in the form of a QR code, so that the key code can be wirelessly transmitted by the transmitter 186 to the receiver 187. Such a receiver may be a service provider's device 166 having a screen that may visually display a QR code that may be placed in front of a QR reader 167 on the compartment 160.

Referring to fig. 17, a mechanism for controlling the opening of the compartments 161, 162, 163 without limitation to a predefined use or user is shown. Thus, the receiver 167 on the compartment 160 initially receives the QR code for the compartment, for example, initially requested by the user 150, thereby creating a deposit key QR code and an identification label 173. Upon receiving the code, the control system 166 of the compartment interrogates the first compartment 161 and determines whether the first compartment is available or has been assigned and locked while waiting for the key code and time code to operate. If available, first, the first compartment will open and may be configured to receive a physical key 155 or other element and an appropriate identification tag 173 that is wirelessly 181 formed and transmitted by control 166 via digital transmission 115 (e.g., the system of FIG. 7).

If the compartment 161 is already occupied and therefore the query is no if not available, the system moves linearly to the next compartment 162 and moves forward until the compartment is located.

The main improvement of this linear system is that compartments 161 and 163 can be in use, but compartment 162 was in use before, but is now available. Thus, the system is able to maximize the use of a limited number of compartments by advancing linearly and reusing compartments 162, rather than just checking the last number used and moving to the next number. Furthermore, the advantage of safety holds true, since it is not possible to predict the next compartment, so natural people will not know which compartment will be used by which users.

In fig. 18, the user is shown as being able to provide a physical key 155 into a designated compartment 164 and digitally create and transmit an identification tag 173 for transmission by a transmitter 188. Thus, the physical locks are controlled by the digital lock system and produce a digitally transmittable control system that coordinates with the physical system to provide a coordinated and adaptable system.

Referring to FIG. 19, a method of controlling access to a compartment is shown. This involves a number of steps.

A set of multiple compartments 160 is initially provided, including individual compartments 161, 162, 163. Each compartment is equipped with a digital lock 190, whether independently or independently controlled by controls 166 associated with the plurality of compartments 160.

In operation, a digital key 171 is created for each digital locker 190, the digital key being associated with one digital locker of one of the plurality of compartments 161, 162, 163, and the digital key is captured;

to restrict access in a temporal sense, a time access key for operations of the digital lock that are restricted to an allowed time is created for the digital lock associated with one of the plurality of compartments, and the time access key is captured.

The system must have a keyed lock of the compartment to connect the digital lock to the clock.

Thus, when the digital key and the time access key are operatively received within the allowed time of the reference clock, opening of one of the plurality of compartments is allowed.

Referring to fig. 20, a method of controlling access to a physical key using a system is provided. This involves the following steps of the physical system: providing a plurality of physical keys for different access requirements; providing a plurality of compartments for housing one or more physical keys; and providing a digital lock on each of the plurality of compartments.

There are the following steps: creating a digital key for each digital lock, the digital key being associated with one digital lock of one of the plurality of compartments, and capturing the digital key;

furthermore, the following steps are required: creating an identification tag for identifying a physical key in an assigned compartment of a plurality of compartments for housing one or more physical keys; and capturing the identification tag.

Still further, there is a need to create a time access key for a digital lock associated with one of a plurality of compartments that is limited to operations of an allowed time, and to capture the time access key.

However, it is necessary to connect the digital lock to a clock in order to provide the digital key and the time access key associated with the relevant one of the compartments after operatively receiving the identification tag of one of the physical keys and the determination requirements at the time required to form the required physical key.

Operatively receiving the digital key and the time access key within the allowed time of the reference clock allows opening one of the plurality of compartments to access one of the physical keys.

Referring to fig. 21, a method of providing a service requiring access is shown. To perform these services, a service provider (e.g., cleaner 152) needs a key 155 in order to access an apartment, vehicle, or other lockable asset. To enable a cleaner to enter and remotely control the access while still allowing another service provider to use the same key at another time, a time-controlled access is provided.

This is achieved by the following steps: a plurality of compartments are provided with a digital lock on each of the plurality of compartments to be opened using the digital key and connecting the digital key and/or the digital lock to the clock.

A request for service is received within a predefined time and an associated physical key is provided in one of the plurality of compartments for providing the service.

An identification tag of a physical key and an associated compartment of a plurality of compartments into which the physical key is inserted is created. In this way, the content, location and use of the physical key are defined and can be transmitted digitally.

A digital key is created for unlocking a digital lock inserted into an associated compartment of the physical key. In this way, it is possible to define the compartment at the time of use and create an appropriate digital lock so that it is transmitted digitally.

A time access key is created for a digital lock associated with one of the plurality of compartments to define a time code for an operation of the digital lock that is limited to an allowed time. In this way, the compartment is not in permanent use and does not rely on physical controls, but rather provides security for the user so that the physical key is only accessible for a defined period of time and the replacement of the physical key is identified and controlled. Thus, not only the start of the access is defined, but also the end of the access is confirmed.

Providing a digital key and a time access key to a service provider for use at multiple compartments

Wherein the plurality of compartments are capable of receiving a digital key and a time access key from a service provider to allow one of the plurality of compartments to be opened to access one of the physical keys during an allowed time limited operation of the digital lock for a digital lock associated with the one of the plurality of compartments.

Variants

It can be seen that the system of the present invention is variable in its configuration and how access is coordinated under the control of individual customers. However, multiple customers may use the same hardware and be able to work in parallel or interleave with each other in operation.

For example, when a single user

However, and when sequential access is required, such as first painter, then plumber or furniture shipper, access may be controlled using only one set of keys, but access may be controlled from the key safe and the first and second departments within the key safe.

Capability of

It can be seen that the key access system of the present invention provides a number of capabilities not previously available, including:

a) safety;

b) time control of access;

c) multiple users can use the system without multiple safes;

d) multiple users can use the system of a single apartment without multiple keys;

e) scheduling by controlling primary access and secondary access;

f) indicating which key and which access; and

g) rolling scheduling

The provider may have a controllable time access due to the request clock register and the start access clock register, and the allowed time of the request clock register from the start access clock register.

Since the key safe has a main lock on the key safe door, anyone cannot normally access it except for the authorized user. Controlled access is available to a single user due to secondary access of at least first and second key compartments for housing first and second keys or key sets, wherein each of the at least first and second key compartments contains a lockable compartment cover for selectively providing access to the compartment.

Example 3

The following description outlines examples of systems and methods for providing car wash or related car cleaning services to individuals, such as residents of entities (building complexes) controlled by a corporate body or similar facility.

In particular, the method relates to an apartment building having a secure repository for storing car keys to enable individuals who have made reservations to leave car keys for accessing their cars, wherein service personnel, but not the individuals, have means to access the secure repository to retrieve stored car keys to enable cars in the apartment building to be moved by the service personnel to a service area.

The subscription made by the individual contains information about when the service needs to be provided.

A system for providing a service to one or more individuals associated with an entity, the system comprising:

one or more terminals for receiving service subscription and payment information from a user;

a service database for receiving service subscription and payment information; one or more service terminals for receiving service subscription information from the server so that the service can be completed and sending a confirmation of the completion of the service back to the server and the person.

The server is arranged to periodically calculate payments to be paid to the entity within a predetermined time period based on one or more predetermined criteria and to transmit the payments to the entity.

The system and method utilize a plurality of user terminals connected to a network (which may be a LAN, WAN or the internet), all operating via a website, and one or more attendant terminals. The system may be configured to operate over a 3G or similar mobile telephone network.

System 100 includes a plurality of individual users corresponding to car owners residing in one or more apartments or buildings providing services. Thus, the building is associated with an entity that may be, for example, a corporate community. The system shown comprises one or more room terminals 110. A user may interact with system 100 directly via one or more room terminals 110, or a user may interact with the system indirectly via one or more room terminals 110.

In this case, the user person who is a tenant or owner of a particular apartment in the building will request car services through the doorways 110. If there is no room, or a room is not available, the individual can make the request itself over the network. This may be accessing a website from a personal computer device. The network 115, e.g., the internet, may be accessed via a terminal, e.g., a PC laptop, etc., or a mobile communication device. Also connected to the network 115 is a subscription and payment service 120 that contains a database 125 for storing information received from the user's person. The stored information may contain personal data information and other details. The stored information may also contain subscription data information for services that have been performed and services to be performed.

As a terminal of a person who will provide service, many car wash terminals 130 may access the network 115 to obtain information about future reservations and provide information when the service has been performed. Each terminal 130 may comprise one or more of a mobile telephone, a computer terminal, a laptop computer, a portable digital assistant, or the like. The database 125 is connected with the subscription and payment server 120 and is configured to store information received from the car wash terminal 130 about performed services, for example when the services have been completed.

The reservation and payment server 120 is also connected to a bank server 135, which may be associated with a banking institution for transferring payment funds, as will be described below. One or more accounts 140 are connected to the bank server 135, the accounts corresponding to bank accounts associated with entities such as business owners companies, corporate bodies, and also to individual accounts.

FIG. 22 shows a basic functional flow diagram of process steps in the system. The system has a customer front-end block 201, a customer zone block 202, a service personnel zone block 203 and a management zone block 204, and a bank interface block 205. A customer of the system, being a person, will access the booking process by the user or the door 1, thereby accessing the system via a phone, a mobile communication device, a computer terminal or the like. Alternatively, the individual may have a card that can be swiped, the card containing all the information identifying the individual. The card may be a loyalty card that offers discounts based on one or more conditions.

Thus, the process begins at step 206 when a user personally accesses the client front end 201. The individual, if registered in the system, logs in and enters the client area 202.

Alternatively, if the individual is not a registered user, the user is transferred to a registration process, which includes registering activation portion 207, wherein data about the individual is entered at step 208. When registration has been completed, an identification number is issued to the individual at step 209. The process in the client front end 201 may contain further detailed steps in order to check the validity of the individual, the missing password, etc. These inspection features have not been shown because they are considered to be standard procedures for online databases and would be considered to be common sense of the art.

Once the individual completes processing through the client front end 201, the individual is transferred to the client area 202 and the individual is presented with a control panel 210. The person then proceeds to step 211 to set a carwash schedule. The carwash schedule step 211 entails identifying the vehicle location at step 212, the type of service required at step 213, and the service time and date at step 214.

Once the initial setup at steps 211, 212, 213 and 214 has been completed, the person is taken to a payment step 215. Here, there is a banking interface 205 in which a person's bank account credit card or the like can be debited. The details of the debit process have not been shown, as these are considered known in the banking field. Banking interface 205 has other process steps that will be mentioned at appropriate times.

Once payment is complete, the banking interface then provides confirmation to the administration area 204 in the database 125. When the person has completed the carwash schedule through steps 211, 212, 213 and 214, data is sent to the management area 204 so that when payment is approved by the banking interface 205, the payment of the reservation made can be matched.

After payment, the system proceeds to step 216, where the user is provided with the receipt number of the reservation. The system then passes the data to the attendant area 203. Thus, when the attendant logs into the system, the individual's subscription will be displayed at step 217. The service person may then check the customer/person appointment at step 218 and then distribute the actual service to the service person employee at step 219.

Once the service task is complete, the service person enters completion at step 220 and then dispatches a message to the individual confirming that the service has been completed at step 221. At a completion step 220, an indication may be dispatched to the management area 204 such that the completion of the service is recorded in the database 125.

Returning now to the process steps within the customer area 202, it should be noted that when the customer/person is provided with a confirmation receipt number at step 216, they will be required to place their car key into a secure repository at step 222. This repository may be located at a lobby reception or designated area for services to be performed, such as a garage area of a building complex. Typically, the secure storage library may include a lock box with an aperture through which the key may fall.

Other forms of secure storage library may be provided and the lock box is just one example, if desired. The service person accesses the secure store to retrieve the relevant key, for example by using a key identified by the door. When an individual is registered in the system and provided with an identification number at step 209, the individual may be issued a key ring and a label printed with the identification number.

The individual can use the key ring for his car keys so that when the car keys are placed in a secure storage repository, service personnel can determine which car keys match which car. In this manner, service personnel may identify a particular key from a large number of such keys that may be in a secure storage repository. The identification number may also be used by an individual as a login username or password so that the individual's details can be extracted from the database 125.

When the service person has reached the key at step 223, they may find the car and drive the car to the designated area where the reservation service is performed. When the service has been completed, the service person may return the car to its original location and then place the key back in the letter box of the individual in the apartment building. In this way, individuals can take their keys out of another secure repository (their mailbox) dedicated only for their use. This is identified at step 224 where the attendant places the key in the person's mailbox. In the bank interface block 205, there are many possible process steps. The process steps shown are given as examples, and any one or more of the process steps shown may be used, and in addition other process steps may also be substituted.

When payment is to be made, the bank interface block 205 may attribute a portion of the fee to be charged to, for example, the construction fund 225 and or a percentage to the business principal or corporate group 226 and/or charity fund. In addition, the component of the service fee may include a component for paying a fee related to a rental fee of a necessary service area required for performing the service in the apartment building.

The components may also include components for paying for consumables (e.g., water, automotive polishes, and waste disposal) costs. Accordingly, process steps of this nature may be incorporated into the bank interface block 205. The banking interface 205 may also contain details of the system coordinator's bank account so that the system coordinator (the system owner and controls the entire system) can receive payments. At step 228, payment is complete and confirmation is provided to the management area 204.

It should be understood that attributing a portion of the cost to a building fund or a corporate entity is a feature of one embodiment and not a feature of the broader invention itself.

FIG. 23 shows a page that an individual can view when logging into the system at step 206. The screen display is self-explanatory in nature. There is a portion 301 for a service establishment mark or trademark. There is another portion 302 of the telephone number for the serving entity. A general menu section 303 is also provided. The user login area 304 also has requirements for a username and password. The username may include an email address or other data and may actually contain the customer personal identification number previously mentioned in step 209. A login button 305 and a forgotten password area 306 are provided. A registration button 307 is provided to allow the individual to register with the system. Areas 308 and 309 are provided for content that the system owner may need to add, such as photos or marketing material.

Fig. 24 shows a screen display when an individual needs to register in the system. Here, the screen display is basically self-explanatory. There is a label area 401 where a label or trademark of the system owner may be provided. The telephone number of the system owner is shown in area 402. The general menu title area is shown at 403.

A user login area 404 is provided to prevent accidental invocation of the registration application and the need for a quick return to the subscription process. This eliminates the need to return to the screen shown in fig. 9. An area 405 is provided to allow an individual to insert data into the system.

The examples of data shown are exemplary and not exhaustive. Part of the data contains billing account information where the system can collect payment funds for the services provided. This information may be a direct debit card, credit card, or other payment instrument. It may contain an account number and password and, in the case of a credit card, a CCV number. A register button 406 is provided to enable publishing of data into the system database. Footer area 407 is provided to allow the system owner to display any desired data, such as advertising material.

Fig. 25 shows a control panel presented to a user person to enable the person to negotiate into the customer area 202. Here, there is an area 501 where the system owner mark or trademark is displayed and an area 502 for the system owner telephone number. As with the previous screen display, there is another area 503 for menu titles. An area 504 is provided for displaying account information of the individual. This includes a clickable button for each identified item, where clicking will provide information about each item. An exit button is also included in area 504. A notification area 505 is provided to present information to an individual regarding the location of their car in a building, as well as their car information, i.e., car brand and registration number or other information. Another region 506 is provided, which shows anything

And (5) planning car washing. A footer area 507 is also provided to allow the owner of the system to display the desired content.

FIG. 26 shows a profile information page for an individual in which data may be entered. As in the previous screen display, the screen display contains a branding area 601, a service owner telephone number 602, and a menu area 603. The screen display also includes an account area 604 for the individual corresponding to the account area 504 for the individual in the previous example. The screen display contains my contacts information area 605, my location area 606, my cars information area 607 and our billing

Information 608. Each of these areas 605-608 has various fields for entering personal data information. The examples shown are not exhaustive and not all are necessary as there may be variations to these specific fields in some embodiments. A "save" button 609 is provided so that the entered data can be saved in the database 225. A footer area 610 is provided as in the previous screen display.

Fig. 27 shows a screen display for setting a schedule. There are screen regions 701, 702, and 703 that correspond to the same regions in the previous screen display. My accounts area 704 is also provided as in the previous screen display, and footer area 705 for the same purpose as in the previous screen display. An area 706 is provided that shows a monthly calendar 706. Monthly calendars have been displayed, but this does not preclude providing displays for other periods, such as daily, biweekly, three months, six months, and yearly. The screen display shows an example of year 2011, month 10, but also shows clickable areas 707 and 708 to advance or retract the period. A subscription button 709 is provided so that a subscription will be published to the database 225 once a particular date is selected for the service.

Fig. 28 shows the next screen display. Here, the area 805 is shown overlaid on the screen display shown in fig. 27, however such an overlay arrangement may be omitted and the display shown in the area 805 may instead be provided for the entire screen. Area 805 allows for the display of a location of a service or an alternate location, such as a person's work place. The service types are shown, where the service classes bronze, silver, gold and platinum have been shown. These are merely examples and other types of services may be provided. Each of these types represents a different level of car wash service provided. A service description is also provided in which a detailed list of services provided according to each service selected under the service type is shown.

The entries shown in terms of service descriptions are exemplary only and not exhaustive. For bronze services, the services may include hand washing, suede drying, and tire glazing. The silver service may add additional services. The gold service may add even other services. Platinum services may add even other services. Additional services may also be provided, such as leather cleaning and conditioning, carpet steam cleaning, seat steam cleaning, paint protection, interior protection, cutting and polishing, interior steam cleaning. These are examples and are not exhaustive.

A button 806 is provided to cancel any incorrect entries. A next button 807 is provided to advance the person to the next stage, which displays an overview of the requested service. This is shown in fig. 29. As in the previous example, a footer area 808 is provided. The screen display shown in fig. 29 is very similar to the screen display shown in fig. 27 and the common area has not been mentioned again. In the display in fig. 15, there are an area 901 showing the location of a service to be performed and a selected service type, and a calendar area 902 showing the date of a desired service.

The screen display of fig. 16 shows an overlay area 1001 overlaid on the screen display of fig. 23. Here, the location and service type have been repeated. A date and time adjustment field 1003 is provided so that an individual can subscribe to the date and time of the service. Area 1004 is shown to indicate that an individual will place a key in a secure storage, in this case, a box, such as an area in a hall reception or building where service will be performed, as some convenient secure location.

An "other" option is provided to enter data regarding alternate locations where the key will remain. The person may enter text in area 1005 to illustrate the location. A cancel button 1006 is provided to allow the schedule appointment to be cancelled. A next button 1007 is provided to advance the user to the next screen. Here, there is an overlay area 1101 overlaying the screen display of fig. 29. Here, other information confirming the specific subscription is provided; and the user has personally agreed to place the key in the required repository. The total price for performing the service is also shown. A "back" button 1102 is provided to allow the user to return to make adjustments to the subscription, e.g., date and or time of service. A confirm button 1103 is provided to enable the user person to confirm the actual service subscription reservation.

FIG. 32 illustrates another screen display overlaid on the screen display of FIG. 27, wherein area 1201 illustrates that the payment type is a bank account or credit card. These are not exhaustive and other payment means may be shown. A return button 1202 is provided to return the user to the screen display shown in fig. 31. A confirm button 1203 is provided to allow the user person to actually confirm the reservation and payment, and to record the data with bank server 135 and database 125.

The screen display in fig. 33 shows regions 1301, 1302, 1303, and 1304 according to the previous screen display. In addition, a footer area 1305 is provided as in the previous screen display. An area 1306 is provided showing a calendar for actual booking in the individual's home at 8 am, 10/11/2011. An add appointment button 1307 is also provided to allow additional appointments/bookings to be added.

FIG. 34 illustrates a screen display with an overview of the latest subscriptions. Here, the display has regions 1401, 1402, 1403, 1404, and 1405 according to the previous screen display. There are other areas 1406 and 1407 showing subscription conditions. In the case of the present invention, the display in regions 1406 and 1407 is the same because there are no multiple subscriptions for the period. If the user has made multiple subscriptions personally, these subscriptions will appear in the respective regions 1406 and 1407 in chronological order. Other areas similar to areas 1406 and 1407 may exist to accommodate multiple car wash services, particularly when the user has multiple cars.

The screen display shown in fig. 35 has regions 1501, 1502, 1503, 1504, and 1505 according to the previous screen display. The screen display has another area 1506 showing the payment history. Only one payment item is shown, but multiple items may be presented. A scroll button (not shown) may be provided to enable the user person to negotiate through a number of previous payments. It should be noted that the user ID is also displayed, confirming that the subscription is for that particular individual.

It will thus be appreciated that the above-described system enables a user's individual who is an owner or tenant in a residential apartment complex to subscribe to services, such as car and/or car cleaning services and related services, at a convenient time. The system enables a user person to specify the type of cleaning or other service desired. The system allows a user to personally select a time at which a service is to be performed. This may be a rush hour or off-peak hour, which may be appropriately specified by the service providing entity and may include, for example, a rush hour from 9 am to 5 pm and an off-peak hour from 5 pm to 12 am.

The system enables a service person to notify the user that the requested service is complete through a telephone service (e.g., SMS service). The car may have returned to the normal carport location of the building parking lot or other location, so the user need only remove the car key from the user's mailbox or other secure location (e.g., door room).

The system also allows payment to an entity, such as a legal entity, based on predetermined conditions. These may include payment for renting space for performing services, payment for personal use of the system, payment for charities, and the like. Payment may be calculated based on a plurality of service subscriptions associated with the entity. The system may also pay a premium to an entity for the person using the method for the first or two or more times within a predetermined period of time. The predetermined condition may also include payment that takes into account a reduction in consumables used to perform the service. Services performed during off-peak hours also reduce payment, while services performed during peak hours increase payment. The payment may be made to the entity at the time of payment by the individual user or at some later time period (e.g., daily, weekly, monthly, quarterly, etc.). Payments are also made based on predetermined criteria, which may include a number of services performed personally for the entity user over a predetermined period of time, and then the total payment to the entity is calculated as a percentage of the payment received by each service provider. The predetermined criteria for payment may include a fixed payment in addition to the percentage of payment received for each service provided. The flat fee may include a lease payment for the physical premise space.

The above system is implemented for the case where there is one service organization providing services. In this case, the service providing entity will employ the necessary cleaners and train them to the required standards. In a variation, the system may be designed such that many independent car cleaning organizations may interact with the system. In this case, there may be a shared system to allow each cleaning entity to work in different apartment blocks on different days. The system may be set up in a privileged manner by a service provider.

In addition, the above-described system does not allow for the display of specific subscription conflicts that may arise due to the need for subscriptions simultaneously by other individuals in an apartment complex. The software functionality may be altered to allow all subscriptions for a particular date to be displayed so that the user person attempting to make the subscription may view the available time periods and select a particular time of the day or alternatively a different date.

The car wash service may provide additional services. These services may include scratch removal services, paint services, bumper refurbishment services, and alloy wheel refurbishment services. The examples are not intended to be exhaustive. In addition, other disparate services may be provided.

For example, apartment cleaning services may be provided. The dry cleaning service can be provided if the user puts the laundry to be cleaned in the laundry pocket of the apartment by himself. Rather than storing car keys in a secure repository, the user may store the apartment keys personally. In this way, the service person can enter the individual's apartment and collect the clothes and then replace the apartment key in a manner similar to that disclosed for car wash services.

Possible other services include take-out food ordering, grocery ordering, luxury car renting/ordering, massage ordering, blowing ordering, flowers, step-by-step instructions for certain activities, such as tax returns. All such non-exhaustive possible services are considered to be within the scope of the present invention.

Modifications may be made to the invention as will be apparent to those skilled in the art of providing services. In addition, the function of the screen display can be changed according to the requirements of related software and bank detailed information. The described example is only one of many possible alternatives. These and other modifications can be made to the invention, the nature of which will be determined from the foregoing description.

Explanation of the invention

In the context of this document, the term "bus" and its derivatives should be interpreted broadly as a system for transferring data.

As described herein, a method involving the performance of one or more steps by a device or computing device is not necessarily to be inferred as being performed by a single device, such that one or more steps of the method may be performed by more than one cooperating device.

An object such as a "web server," "device," "computing device," "computer readable medium," etc. is not necessarily to be construed as a single object and may be cooperatively embodied as two or more objects, e.g., a web server is construed as two or more web servers in a server farm cooperating to achieve a desired goal, or a computer readable medium is distributed in a compound manner, e.g., program code disposed on an optical disc activatable by a license key downloadable from a computer network.

In the context of this document, the term "database" and derivatives thereof may be used to describe a single database, a group of databases, a database system, and the like. A database system may include a set of databases, where the set of databases may be stored on a single implementation or across multiple implementations. The term "database" is also not limited to reference to a particular database format, but may refer to any database format. For example, the database format may include MySQL, MySQLi, XML, and the like.

The present invention may be embodied using devices conforming to other network standards and for other applications, including, for example, other WLAN standards and other wireless standards. Applications that may be suitable include IEEE 802.11 wireless LANs and links, and wireless ethernet.

In the context of this document, the term "wireless" and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of electromagnetic radiation modulated by a non-solid medium. The term does not imply that the associated device does not contain any wires, but in some embodiments the device may not. In the context of this document, the term "wired" and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of electromagnetic radiation modulated by a solid-state medium. The term does not imply that the associated devices are coupled by conductive lines.

Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as "processing," "computing," "calculating," "determining," "analyzing," or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical (e.g., electronic) quantities into other data similarly represented as physical quantities.

In a similar manner, the term "processor" may refer to any device or portion of a device that processes electronic data, e.g., from registers and/or memory, to transform that electronic data into other electronic data that may be stored, e.g., in registers and/or memory. The register may be considered part of the memory. A "computer" or "computing device" or "computing machine" or "computing platform" may contain one or more processors.

One or more processors operate as a standalone device or may be connected (e.g., networked) to other processors in a networked deployment, one or more processors may operate in the capacity of a server or a client in a server-client network environment, or as peers in a peer-to-peer or distributed network environment. The one or more processors may form a network device, network router, switch, or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.

Note that while the figures may show only a single processor and a single memory carrying computer readable code, those skilled in the art will appreciate that many of the components described above are included, but not explicitly output or described so as not to obscure aspects of the present invention. For example, while only a single machine is illustrated, the term "machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

It will be understood that the steps of the discussed methods may be performed by an appropriate processor (or processors) of a processing (i.e., computer) system executing instructions (computer-readable code) stored in a storage device. It should also be understood that the present invention is not limited to any particular implementation or programming technique, and that the present invention can be implemented using any suitable technique for implementing the functionality described herein. The present invention is not limited to any particular programming language or operating system.

Some elements of the methods described herein may be implemented by a processor or processor device, a computer system, or by other means for performing a function. A processor having the necessary instructions for carrying out such a method or elements of a method thus forms a means for carrying out the method or elements of the method.

It is to be noticed that the term 'coupled', when used in the claims, should not be interpreted as being restricted to direct connections only. Thus, the scope of expression of device a as connected to device B should not be limited to devices or systems in which the output of device a is directly connected to the input of device B. This means that there exists a path between the output of a and the input of B, which may be a path containing other devices or components. "connected" may mean that two or more elements are in direct physical or electrical contact, or that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.

The particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments/arrangements, as will be apparent to those skilled in the art from this disclosure.

It should be appreciated that in the foregoing description of example embodiments/arrangements of the invention, various features of the invention are sometimes grouped together in a single embodiment/arrangement, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment/arrangement. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment/arrangement of the invention.

Furthermore, although some embodiments/arrangements described herein may include some but not other features included in other embodiments/arrangements, combinations of features of different embodiments/arrangements are intended to be within the scope of the invention and form different embodiments/arrangements, as will be understood by those skilled in the art. For example, in the following claims, any of the claimed embodiments/arrangements may be used in any combination.

In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.

In describing the preferred embodiments of the present invention illustrated in the drawings, specific terminology will be resorted to for the sake of clarity. However, the invention is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific terminology includes all technical equivalents that operate in a similar manner to accomplish a similar technical purpose. Terms such as "forward", "rearward", "radial", "peripheral", "upward", "downward", and the like are used as convenient words of reference and are not to be construed as limiting terms.

Unless otherwise specified, the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.

In the claims which follow and in the preceding description of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprise" or variations such as "comprises" or "comprising" is used in an inclusive sense, i.e. to specify the presence of the stated features but not to preclude the presence or addition of further features, in various embodiments of the invention.

As used herein, any of the terms "comprising" or "comprises" or "comprising" are also open-ended terms that also mean "including at least" the elements/features that follow the term, but not excluding other elements/features. Thus, including is synonymous with and means including.

While a suitable arrangement of the invention has been described, those skilled in the art will recognize that other and further modifications may be made thereto without departing from the spirit of the invention, and it is intended to claim all such changes and modifications as fall within the scope of the invention. Functionality may be added or deleted from the block diagrams and operations may be interchanged among functional blocks. Steps may be added or deleted to the methods described within the scope of the invention.

Although the invention has been described with reference to specific examples, it will be appreciated by those skilled in the art that the invention may be embodied in many other forms.

62页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:滑动和转动翼扇系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!