[go: up one dir, main page]

HK1217799B - Methods and systems for management of key exchanges - Google Patents

Methods and systems for management of key exchanges Download PDF

Info

Publication number
HK1217799B
HK1217799B HK16105543.3A HK16105543A HK1217799B HK 1217799 B HK1217799 B HK 1217799B HK 16105543 A HK16105543 A HK 16105543A HK 1217799 B HK1217799 B HK 1217799B
Authority
HK
Hong Kong
Prior art keywords
key
access
location
authorized
authorized party
Prior art date
Application number
HK16105543.3A
Other languages
Chinese (zh)
Other versions
HK1217799A1 (en
Inventor
克莱顿.卡特.布朗
詹森.罗伯特.克拉布
Original Assignee
钥匙咖啡馆公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 钥匙咖啡馆公司 filed Critical 钥匙咖啡馆公司
Priority claimed from PCT/CA2014/050022 external-priority patent/WO2014124529A1/en
Publication of HK1217799A1 publication Critical patent/HK1217799A1/en
Publication of HK1217799B publication Critical patent/HK1217799B/en

Links

Description

用于管理钥匙交换的方法和系统Method and system for managing key exchanges

相关申请的引用Citation of Related Applications

本申请要求于2013年2月15日递交的、题目为“METHODS AND SYSTEMS FORMANAGEMENT OF KEY EXCHANGES(用于管理钥匙交换的方法和系统)”的美国申请第61/765,618号的优先权。出于美国的目的,根据《美国法典》第35条119款,本申请要求于2013年2月15日递交的、题目为“METHODS AND SYSTEMS FOR MANAGEMENT OF KEY EXCHANGES(用于管理钥匙交换的方法和系统)”的美国申请第61/765,618号的权益,出于所有目的,该美国申请第61/765,618号在此通过引用被并入本文。This application claims priority to U.S. Application No. 61/765,618, filed on February 15, 2013, entitled “METHODS AND SYSTEMS FOR MANAGEMENT OF KEY EXCHANGES.” For United States purposes, this application claims the benefit of U.S. Application No. 61/765,618, filed on February 15, 2013, entitled “METHODS AND SYSTEMS FOR MANAGEMENT OF KEY EXCHANGES,” which is hereby incorporated by reference for all purposes.

技术领域Technical Field

本文描述的技术涉及用于处理钥匙交换的方法和系统。The technology described herein relates to methods and systems for processing key exchanges.

背景技术Background Art

通常需要使一个或更多个个体访问上锁的住宅(property)。例如,已经安排在住宅内住宿的访客可能需要访问。家庭、朋友、物业经理、导游、快递人员或者服务提供者(例如,举例来说,清洁人员、遛狗人员、承包商、房地产经纪人、花匠等)也可能需要访问。人们还可能需要访问上锁的车辆、仓库单元或者其他类型的资产(property)。如果持有资产钥匙的人员无法和个体碰面以使该个体访问资产,则该个体可能难以访问资产。It is often necessary to provide one or more individuals with access to a locked property. For example, a visitor who has arranged to stay at the property may need access. Family, friends, property managers, tour guides, couriers, or service providers (e.g., cleaners, dog walkers, contractors, real estate agents, gardeners, etc.) may also need access. People may also need access to locked vehicles, storage units, or other types of properties. If the person holding the keys to the property cannot meet with the individual to provide access to the property, the individual may have difficulty accessing the property.

有时,钥匙被隐藏在资产外部并且向需要访问的个体提供用于找到钥匙的指示。在某些情况下,钥匙被储存在大楼外部的密码箱里。通常,锁箱具有键盘锁。密码箱受制于安全问题,因为具有密码箱的PIN码的任何个体可以在任何时间打开所述密码箱以获得钥匙。此外,对多单元资产(例如公寓)来说密码箱可能是不可行的,该多单元资产一般需要单独的钥匙链坠(key fob)、门禁卡或者大楼钥匙来访问该大楼。Sometimes, keys are hidden outside the property, and instructions for finding the keys are provided to individuals requiring access. In some cases, keys are stored in a lockbox outside the building. Typically, the lockbox has a keypad lock. Lockboxes are subject to security issues because any individual with the lockbox's PIN code can open the lockbox at any time to obtain the keys. Furthermore, lockboxes may not be feasible for multi-unit properties (e.g., apartments), which typically require individual key fobs, access cards, or building keys to access the building.

有时,可能会把钥匙拿给邻居或其他第三方,所述邻居或其他第三方能够与个体碰面以使他或她访问资产。这一解决方案依赖于存在能够在特定时间、在特定位置与个体碰面的人员。协调这样的事件的后勤工作可能是烦累的,特别是由于个体到达的时间可能并不总是合乎预期的。Sometimes, the keys may be given to a neighbor or other third party who can meet the individual to give him or her access to the asset. This solution relies on the presence of someone who can meet the individual at a specific location at a specific time. The logistics of coordinating such an event can be tedious, especially since the individual's arrival time may not always be as expected.

普遍期望有用于解决上述问题的方法和系统。尤其,期望有用于使个体获取钥匙或钥匙组的方法和系统。期望有便于用于访问市区中的资产(包括多单元结构、车辆、仓库单元和需要钥匙的其他资产)的方法和系统。Methods and systems for addressing the aforementioned problems are generally desired. In particular, methods and systems for enabling individuals to obtain keys or sets of keys are desired. Methods and systems for facilitating access to assets in urban areas, including multi-unit structures, vehicles, warehouse units, and other assets requiring keys are desired.

相关技术的前述示例和与其相关的限定意图是示例性的而不是排他性的。在阅读说明书并且研究附图的基础上,相关技术的其他限定对本领域的技术人员来说将变得明显。The foregoing examples of the related art and limitations related thereto are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those skilled in the art upon reading the specification and studying the drawings.

发明内容Summary of the Invention

本文描述的技术具有多个方面。这些方面包括,但不限于:用于交换钥匙以访问资产的方法,用于对将钥匙提供至个体进行协调的计算机系统,用于储存和制造可用钥匙的设备以及便于向个体提供钥匙的系统。The technology described herein has various aspects including, but not limited to, methods for exchanging keys for accessing assets, computer systems for coordinating the provision of keys to individuals, devices for storing and making available keys, and systems for facilitating the provision of keys to individuals.

一个方面提供了便于在钥匙存取位置交换钥匙的方法。该方法可以是“异步的”,这意味着使个体在钥匙存取位置处能够获得钥匙的准备步骤不需要与个体获得对钥匙的存取同时发生。所述方法包括进行扫描以获得在钥匙或者附接至钥匙的装置上进行编码的唯一钥匙标识符;识别钥匙存取位置;在钥匙存取位置处为钥匙分配储藏箱;以及使储藏箱和钥匙存取位置与所述标识符相关联。从管理用户接收针对钥匙的存取规则,其中存取规则识别被授权方和被授权存取期。向被授权方发布钥匙存取位置。通过客户端装置从被授权方接收针对钥匙的存取请求,所述存取请求提供用户凭证。通过对照与被授权方相关联的一组凭证而验证在存取请求中提供的用户凭证、将存取请求的时间与被授权存取期相比较来认证所述存取请求。认证可以附加地包括将所识别的个体位置与和标识符相关联的钥匙存取位置相比较。如果存取请求通过认证,则发送用于提交钥匙的存取指令。One aspect provides a method for facilitating the exchange of keys at a key access location. The method can be "asynchronous," meaning that preparatory steps for enabling an individual to obtain a key at a key access location do not need to occur simultaneously with the individual gaining access to the key. The method includes scanning to obtain a unique key identifier encoded on a key or a device attached to the key; identifying a key access location; assigning a storage bin to the key at the key access location; and associating the storage bin and the key access location with the identifier. Access rules for the key are received from an administrative user, wherein the access rules identify an authorized party and an authorized access period. The key access location is issued to the authorized party. An access request for the key is received from the authorized party via a client device, the access request providing user credentials. The access request is authenticated by verifying the user credentials provided in the access request against a set of credentials associated with the authorized party and comparing the time of the access request with the authorized access period. Authentication can additionally include comparing the identified individual location with the key access location associated with the identifier. If the access request is authenticated, an access instruction for submitting the key is sent.

另一方面,通过从扫描在钥匙存取位置处的钥匙的扫描仪(在客户端装置上或者在钥匙储存装置中)接收标识符来提供对正要提交的钥匙的验证。In another aspect, verification of the key being presented is provided by receiving an identifier from a scanner (either on a client device or in a key storage device) that scans the key at a key access location.

其他方面提供了用于实现上述方法的系统。Other aspects provide systems for implementing the above methods.

除了上述示例性方面和实施例之外,通过参考附图并且通过研究下面的详细描述,其他方面和实施例将变得明显。In addition to the exemplary aspects and embodiments described above, further aspects and embodiments will become apparent by reference to the drawings and by study of the following detailed description.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

在附图的参考图中图示了示例性实施例。意图在于,本文公开的实施例和附图应被认为是示例性的而不是限制性的。Example embodiments are illustrated in the reference figures of the accompanying drawings. It is intended that the embodiments and figures disclosed herein be considered illustrative rather than restrictive.

图1示意性地描绘了根据一个实施例的用于处理在个体之间的钥匙交换的系统的部件。FIG1 schematically depicts components of a system for handling key exchanges between individuals, according to one embodiment.

图2是图示根据一个实施例的用于管理用户(administrative user)分配对钥匙的存取权的方法的流程图。FIG. 2 is a flow chart illustrating a method for an administrative user to assign access rights to a key according to one embodiment.

图3是图示根据一个实施例的可以在钥匙交出时执行的方法的流程图。FIG3 is a flow chart illustrating a method that may be performed at a key handover according to one embodiment.

图4是图示根据一个实施例的用于为个体提供对钥匙的存取的可以在钥匙领取时执行的方法的流程图。4 is a flow chart illustrating a method that may be performed at key pickup for providing an individual with access to keys, according to one embodiment.

图5是图示根据另一实施例的用于为个体提供对钥匙的存取的可以在钥匙领取时执行的方法的流程图。5 is a flow chart illustrating a method that may be performed at key pickup for providing an individual with access to keys according to another embodiment.

图6A、图6B和图6C是根据一个实施例的钥匙交换应用的图形用户界面的示例性截屏。6A , 6B, and 6C are exemplary screenshots of a graphical user interface of a key exchange application, according to one embodiment.

图7A-图7D图示包括可以在某些实施例中使用的钥匙标记的钥匙链。7A-7D illustrate a key fob including a key tag that may be used in certain embodiments.

图8示出用于储存钥匙组的示例性柜。FIG. 8 illustrates an exemplary cabinet for storing sets of keys.

图9示出用于通知用户的示例性方法。FIG9 illustrates an exemplary method for notifying a user.

具体实施方式DETAILED DESCRIPTION

在下面的整个描述中,阐述细节,从而为本领域的技术人员提供更深入的理解。然而,为避免不必要地混淆本公开,可能不会详细地示出或描述已知的部件。因此,说明书和附图以示例性的而不是限制性的意义来理解。Throughout the following description, details are set forth to provide a deeper understanding for those skilled in the art. However, to avoid unnecessarily obscuring the present disclosure, well-known components may not be shown or described in detail. Accordingly, the specification and drawings are to be understood in an illustrative rather than a restrictive sense.

在本文描述的实施例中,提供了钥匙交换系统和方法,以便于在钥匙交换网络中在多个位置的个体之间交换钥匙。如本文使用的,“资产”是指任何上锁的不动产、仓库,人们可能希望准许或获准访问的商业的、车辆的或其他的资产。如本文使用的,“钥匙(key)”或“多个钥匙(keys)”是指可以用于对一个或更多个锁进行操作以访问资产的任何工具或装置或者它们的组。钥匙包括,例如,房屋钥匙、钥匙链坠、钥匙卡、车钥匙,可以用来对一个或更多个锁进行解锁或锁定的数字装置或移动装置等。“钥匙组”是与钥匙标识符直接地或间接地相关联的一个或更多个钥匙的组。单个钥匙是钥匙组的实例。钥匙标识符理想地是唯一的。钥匙组可以包括针对一个或更多个资产的钥匙(例如,一组钥匙可以包括访问大楼的钥匙,访问大楼中的公寓的钥匙和车钥匙)。In the embodiments described herein, a key exchange system and method are provided to facilitate the exchange of keys between individuals in multiple locations in a key exchange network. As used herein, an "asset" refers to any locked real estate, warehouse, business, vehicle, or other asset that a person may wish to grant or obtain access to. As used herein, a "key" or "keys" refers to any tool or device or group thereof that can be used to operate one or more locks to access an asset. Keys include, for example, house keys, key fobs, key cards, car keys, digital devices or mobile devices that can be used to unlock or lock one or more locks, etc. A "key set" is a group of one or more keys that are directly or indirectly associated with a key identifier. A single key is an example of a key set. A key identifier is ideally unique. A key set can include keys for one or more assets (for example, a set of keys can include a key to access a building, a key to access an apartment in the building, and a car key).

钥匙交换系统包括钥匙交换位置,一个或更多个钥匙组被保持在所述钥匙交换位置,以用于由被授权个体存取。计算机系统跟踪被保持在钥匙交换位置的多组钥匙以及具有确定一组钥匙何时可以被发放以及被发放给谁的规则。计算机系统可以执行一些步骤来认证尝试接收多组钥匙的个体。A key exchange system includes a key exchange location where one or more sets of keys are held for access by authorized individuals. A computer system tracks the sets of keys held at the key exchange location and has rules that determine when and to whom a set of keys can be released. The computer system can perform steps to authenticate an individual attempting to receive the sets of keys.

下面是可以如何使用这样的系统的非限制性实例。考虑所有者有时将公寓出租给旅行者若干天的情况。所有者将公寓的一组钥匙存放至钥匙交换位置,在那里该组钥匙被安全储存,而不是安排在特定地点和时间与旅行者碰面来移交所述公寓的钥匙。当在钥匙交换位置处交出钥匙时,可以采用一个或更多个步骤来验证钥匙。所有者还向钥匙交换系统的计算机系统提供识别旅行者的信息以及规定旅行者何时被授权存取该组钥匙的规则。所有者可以在旅行者到达之前在方便的任何时候采用这些步骤。The following is a non-limiting example of how such a system might be used. Consider a scenario where an owner occasionally rents an apartment to a traveler for a few days. Rather than arranging to meet the traveler at a specific location and time to hand over the apartment's keys, the owner deposits the apartment's set of keys at a key exchange location, where they are securely stored. When the keys are handed over at the key exchange location, one or more steps can be taken to authenticate the keys. The owner also provides the key exchange system's computer system with information identifying the traveler and rules governing when the traveler is authorized to access the set of keys. The owner can take these steps at any convenient time before the traveler arrives.

钥匙交换系统可以在适当的时候自动通知旅行者钥匙交换位置在何处。钥匙交换位置可以例如被置于商家内,例如公寓当地的咖啡馆。旅行者可以在允许的时间内要求从钥匙交换位置获取该组钥匙并且然后可以访问公寓。如下面所描述的,对旅行者的认证和对公寓的这组钥匙的发放可以不同程度地自动化。旅行者可以最终将该组钥匙存放回钥匙交换位置。The key exchange system can automatically notify the traveler of the key exchange location at the appropriate time. The key exchange location can be located within a business, such as a local café near the apartment. The traveler can request to receive their set of keys from the key exchange location within a specified timeframe and then access the apartment. As described below, the authentication of the traveler and the issuance of the set of keys to the apartment can be automated to varying degrees. The traveler can then return the set of keys to the key exchange location.

可以理解的是,如在上面的非限制性实例中所描述的系统具有这样的优点,即公寓或其他资产的钥匙可以进行交换而无需所有者和旅行者之间面对面的碰面。此外,可选地,这样的系统能够以不需要所有者访问旅行者的信用卡或其他支付信息的方式来管理对使用公寓或其他资产的付费。在某些实施例中,所有者和旅行者能够通过联网的便携式装置例如智能电话、平板电脑等与系统交互。这样的系统在为所有者和旅行者均提供期望的安全性的同时,能够非常易于由所有者和旅行者使用。As will be appreciated, a system such as the one described in the non-limiting example above offers the advantage of enabling keys to an apartment or other property to be exchanged without requiring a face-to-face meeting between the owner and the traveler. Furthermore, such a system can optionally manage payment for the use of an apartment or other property without requiring the owner to access the traveler's credit card or other payment information. In certain embodiments, the owner and traveler can interact with the system via a networked portable device, such as a smartphone, tablet, or the like. Such a system can be highly user-friendly for both owners and travelers while providing the desired security for both.

优选地,钥匙标识符是机器可读取的。在特定实施例中,钥匙标识符在钥匙或装置上进行编码,或者被嵌入钥匙或装置内,所述装置例如通过钥匙链物理地附接至钥匙或一组钥匙。“钥匙标记”是可以被扫描以读取钥匙标识符的物理结构。可使用任意适合的技术来读取钥匙标记。例如,钥匙标记可以包括近场通信(“NFC”)标签、可选的可扫描条码(例如,UPC码、QR码等)、标记在钥匙上或者标记在附接至钥匙的标签上的一系列符号(例如,字符、数字和/或其他符号)、蓝牙标记等。理想地,每个钥匙组不具有会允许未被授权方将钥匙组与其所属的资产相关联的人类可读标号。Preferably, the key identifier is machine-readable. In a particular embodiment, the key identifier is encoded on a key or device, or is embedded in a key or device that is physically attached to a key or a set of keys, such as via a key chain. A "key tag" is a physical structure that can be scanned to read the key identifier. Any suitable technology can be used to read the key tag. For example, the key tag can include a near-field communication ("NFC") tag, an optional scannable barcode (e.g., a UPC code, a QR code, etc.), a series of symbols (e.g., characters, numbers, and/or other symbols) marked on the key or on a tag attached to the key, a Bluetooth tag, etc. Ideally, each key set does not have a human-readable label that would allow an unauthorized party to associate the key set with the asset to which it belongs.

在一个有用且新颖的实施例中,在钥匙链中提供钥匙标记。所述钥匙链包括金属链坠和链或用于将链坠耦接至多个钥匙或钥匙组的其他附接件。所述链坠包括嵌入链坠的金属中的凹陷内的非金属材料中的NFC标签。例如,NFC标签可以通过粘合层被粘合在凹陷中,所述粘合层包含即使近处存在金属仍允许读取NFC标签的隔离层。包括这样的隔离层的NFC标签被标记为“抗金属”NFC标签。所述标签可以由一层塑料、环氧树脂等覆盖。在NFC标签附近存在金属一般会干扰对该NFC标签的可靠扫描。然而,已经发现的是,如上面所描述的嵌入凹陷的NFC标签可以被位于凹陷上的在NFC标签附近的NFC扫描仪可靠地读取。In one useful and novel embodiment, a key tag is provided in a key chain. The key chain comprises a metal pendant and a chain or other attachment for coupling the pendant to a plurality of keys or key sets. The pendant comprises an NFC tag in a non-metallic material embedded in a recess in the metal of the pendant. For example, the NFC tag can be bonded in the recess by an adhesive layer comprising an isolation layer that allows the NFC tag to be read even if metal is nearby. NFC tags that include such an isolation layer are labeled as "metal-resistant" NFC tags. The tag can be covered by a layer of plastic, epoxy resin, etc. The presence of metal in the vicinity of the NFC tag generally interferes with reliable scanning of the NFC tag. However, it has been found that an NFC tag embedded in a recess as described above can be reliably read by an NFC scanner located on the recess in the vicinity of the NFC tag.

图7A至图7D中示出示例性钥匙链。钥匙链具有金属链坠,所述金属链坠在其一个面上具有凹陷。NFC标签被附连在凹陷中,标签和链坠的金属体之间具有隔离层。环氧树脂、塑料或类似物的层覆盖标签。标志、公司名称或其他标号可以被标记在链坠上。唯一序列号或其他的唯一人类可识读标识信息可以被标记在链坠上。An exemplary key chain is shown in Figures 7A to 7D. The key chain has a metal pendant with a depression on one side. An NFC tag is attached to the depression with a barrier between the tag and the metal body of the pendant. A layer of epoxy, plastic, or the like covers the tag. A logo, company name, or other designation may be marked on the pendant. A unique serial number or other unique human-readable identification information may be marked on the pendant.

NFC标签可以利用唯一URL作为钥匙标识符来编码。唯一序列号(或钥匙链名称)在编码或制造过程期间可以被印刷在NFC标签或者钥匙链上。序号可以被链接至用于管理钥匙交换的计算机系统中的唯一URL(例如,如下面所论述的钥匙交换服务器数据库)。NFC tags can be encoded with a unique URL as the key identifier. A unique serial number (or keychain name) can be printed on the NFC tag or keychain during the encoding or manufacturing process. The serial number can be linked to a unique URL in the computer system used to manage the key exchange (e.g., a key exchange server database as discussed below).

在钥匙交换系统中使用这样的钥匙链坠具有各种有利之处,包括:1)金属链坠对于要求在多方之间持续使用和转移钥匙以及与储存储藏箱的硬壁的物理接触的钥匙交换系统会是充分耐用的——所述链坠的会与其他表面或物体接触的大部分表面是耐用金属;2)可以形成金属钥匙链以与特定钥匙保持装置配合操作——在某些实施例中,金属可以包括磁性金属并且钥匙保持装置可以通过磁性将钥匙链整体或部分地保持在储存位置;3)将非金属材料的抗金属NFC标签固定在金属链坠中的凹陷内实现了使用具有这样的金属链坠的NFC标签;4)NFC标签使得钥匙链和钥匙标识符能够被智能电话检测,使得与客户端装置的交互和钥匙交换系统的大规模分布能够实现;5)URL作为钥匙标识符的嵌入与NFC标签的智能电话交互结合实现了扩展信息和营销可能性以帮助系统的大规模分布;以及6)包括链接的序列号(或名称)使得即使是在扫描仪不可用时用户仍能够在视觉上区分多个钥匙组链并且识别期望的钥匙组。There are various advantages to using such a key fob in a key exchange system, including: 1) the metal fob will be sufficiently durable for a key exchange system that requires constant use and transfer of keys between multiple parties and physical contact with the hard walls of a storage box - the majority of the surfaces of the fob that will come into contact with other surfaces or objects is durable metal; 2) the metal key fob can be formed to operate in conjunction with a particular key retaining device - in some embodiments, the metal can include magnetic metal and the key retaining device can magnetically retain the key fob in whole or in part in a storage position; 3) securing a metal-resistant NFC tag of non-metallic material within a recess in the metal fob enables the use of an NFC tag with such a metal fob; 4) the NFC tag enables the key fob and key identifier to be detected by a smartphone, enabling interaction with client devices and large-scale distribution of the key exchange system; 5) the embedding of a URL as a key identifier combined with smartphone interaction with the NFC tag enables extended information and marketing possibilities to assist in large-scale distribution of the system; and 6) the inclusion of a linked serial number (or name) enables a user to visually distinguish between multiple key set chains and identify the desired key set even when a scanner is not available.

钥匙交换系统包括计算机系统,所述计算机系统具有被授权的用户。计算机系统可以以任何适合的方式来认证用户。例如,用户可以使用用户名/密码认证登录到计算机系统。可以使用任何适合的认证方法。不同的用户可以具有与任一特定钥匙组相关的不同权利。一个用户(例如,资产所有者或资产管理者)可以具有与特定一组钥匙相关的管理权(该用户可以被称为“钥匙管理员”)。管理权可以允许钥匙管理员授权其他人对该组钥匙的存取。The key exchange system includes a computer system having authorized users. The computer system can authenticate users in any suitable manner. For example, a user can log in to the computer system using username/password authentication. Any suitable authentication method can be used. Different users can have different rights associated with any particular set of keys. A user (e.g., an asset owner or asset manager) can have administrative rights associated with a particular set of keys (this user can be referred to as a "key administrator"). Administrative rights can allow the key administrator to authorize others to access the set of keys.

计算机系统维护数据库,所述数据库记录钥匙组以及由钥匙管理员做出的与钥匙组相关联的允许。这样的数据库可以以各种不同的方式来实现。例如,在一个实施例中,每个钥匙组与资产相关联并且由钥匙管理员授予的存取权与所述资产相关联。在这样的实施例中,存取权与所述钥匙组间接地相关联。在其他实施例中,数据库被结构化,使得存取权(通过钥匙标识符)与每个钥匙组直接相关联。在其他情况下,钥匙管理员可以添加存取规则,该存取规则指示用于发放被保持在钥匙交换位置的钥匙组的条件。钥匙管理员通常有权添加/改变并且删除这样的存取规则。无论规则采用何种形式以及无论针对数据库选择何种特定布置,给定根据与钥匙组相关联的钥匙标记的钥匙标识符,计算机系统被配置成访问与该钥匙标识符直接地或间接地相关联的规则并且基于所述规则来确定特定个体是否被授权存取该钥匙组。A computer system maintains a database that records key sets and the permissions associated with the key sets made by key managers. Such a database can be implemented in a variety of different ways. For example, in one embodiment, each key set is associated with an asset and the access rights granted by the key manager are associated with the asset. In such an embodiment, the access rights are indirectly associated with the key sets. In other embodiments, the database is structured so that access rights (via key identifiers) are directly associated with each key set. In other cases, the key manager can add access rules that indicate the conditions for issuing key sets held in a key exchange location. The key manager typically has the authority to add/change and delete such access rules. Regardless of the form the rules take and regardless of the specific arrangement selected for the database, given a key identifier tagged according to a key associated with a key set, the computer system is configured to access the rules directly or indirectly associated with the key identifier and determine, based on the rules, whether a particular individual is authorized to access the key set.

为了钥匙管理员的方便,系统可以允许钥匙管理员使名称与不同资产和/或不同钥匙组相关联。例如,若资产为日内瓦的公寓,则钥匙管理员可以选择使名称“日内瓦公寓”与资产和/或其钥匙组相关联,若资产为游艇,则钥匙管理员可以选择使名称“游艇”与资产和/或其钥匙组相关联。For the convenience of the key manager, the system may allow the key manager to associate names with different assets and/or different key sets. For example, if the asset is an apartment in Geneva, the key manager may choose to associate the name "Geneva Apartment" with the asset and/or its key set; if the asset is a yacht, the key manager may choose to associate the name "Yacht" with the asset and/or its key set.

在钥匙交换中心或钥匙存取位置执行钥匙从一个个体到另一个个体的物理转移。钥匙交换中心可以位于可便于交出和领取钥匙的任何位置。例如,钥匙交换中心可以在咖啡馆或咖啡店、餐馆、便利店、大堂、购物中心、机场、公共交通枢纽、游艇码头、停车库、停车场等等中。The physical transfer of keys from one individual to another is performed at a key exchange center or key access location. A key exchange center can be located anywhere that facilitates the handover and collection of keys. For example, a key exchange center can be located in a cafe or coffee shop, restaurant, convenience store, lobby, shopping mall, airport, public transportation hub, marina, parking garage, parking lot, and so on.

在某些实施例中,每个钥匙交换中心包括能够读取钥匙标记的扫描仪。扫描仪可以被并入钥匙储存设备或者通过适当配备的联网计算机或手持装置来分开地设置。在每个钥匙交换中心处,在交出钥匙组和领取钥匙组时扫描钥匙标记。扫描钥匙标记读取钥匙标识符。钥匙标识符然后可以从钥匙交换中心被转发至钥匙交换服务器,该钥匙交换服务器跟踪钥匙交换网络中所有钥匙组的位置。In some embodiments, each key exchange center includes a scanner capable of reading key tags. The scanner can be integrated into the key storage device or provided separately via a suitably equipped networked computer or handheld device. At each key exchange center, the key tags are scanned when a key set is surrendered or collected. Scanning the key tags reads the key identifier. The key identifier can then be forwarded from the key exchange center to a key exchange server, which tracks the location of all key sets in the key exchange network.

钥匙交换服务器可以验证每个钥匙组是否处于其预期的位置。钥匙交换服务器还验证钥匙交换中心处的个体是否被授权来领取钥匙组。如果做出了存取请求并且确定出该个体被授权来领取钥匙组,则钥匙交换服务器向钥匙交换中心处的装置提供指令以使被授权的个体能够存取该钥匙组。钥匙交换服务器还可以通过接收所扫描的标记的钥匙标识符并且然后向钥匙交换中心处的装置提供用于储存钥匙组的指令并且在服务器中更新与钥匙相关联的钥匙位置来协调将钥匙组放在钥匙交换中心处。The key exchange server can verify that each key set is in its expected location. The key exchange server also verifies that the individual at the key exchange center is authorized to retrieve the key set. If an access request is made and it is determined that the individual is authorized to retrieve the key set, the key exchange server provides instructions to the device at the key exchange center to enable the authorized individual to access the key set. The key exchange server can also coordinate the placement of the key set at the key exchange center by receiving the scanned tagged key identifier and then providing instructions to the device at the key exchange center to store the key set and updating the key location associated with the key on the server.

图1图示了用于处理在钥匙交换网络中的在个体之间的钥匙组的交换的示例性系统100。在图1中示出了具有代表性的个体102、个体104和个体106以及具有代表性的钥匙103、钥匙105和钥匙107。在本文中为了解释的目的,个体102是管理用户,其拥有为一个或更多个钥匙组分配存取权的特权。个体104、个体106为访客用户,所述访客用户可以被管理用户(例如个体102)准许存取钥匙组中的一个钥匙组。可选地,相对于其他钥匙组,用户102可以为访客用户。FIG1 illustrates an exemplary system 100 for processing the exchange of key groups between individuals in a key exchange network. FIG1 shows representative individuals 102, 104, and 106, as well as representative keys 103, 105, and 107. For purposes of explanation herein, individual 102 is an administrative user who has the privilege of assigning access rights to one or more key groups. Individuals 104 and 106 are guest users who can be granted access to one of the key groups by an administrative user (e.g., individual 102). Alternatively, user 102 can be a guest user with respect to other key groups.

系统100包括钥匙交换服务器108,所述钥匙交换服务器108被配置成跟踪钥匙组的位置并且被配置成管理和协调个体之间的钥匙转移,例如在管理用户102与在访客用户104、106中的一个或更多个访客用户之间的钥匙转移。管理用户102可以与钥匙交换服务器108通信以准许针对钥匙组的存取权。访客用户104、106可以与钥匙交换服务器108通信以请求存取钥匙组。个体102、个体104和个体106与钥匙交换服务器108之间的交互可以通过在由个体使用的客户端装置112上显示的钥匙交换界面来处理。客户端装置可以为被配置成与钥匙交换服务器108通信的任何装置。客户端装置可以,例如,包括个人计算机、终端、亭(kiosk)或者与钥匙柜一体的联网控制器或其他设备。在某些情况下,客户端装置可以包括移动装置,例如平板计算机、膝上电脑、智能电话等。在特定实施例中,所有用户可以具有相同类型的账户并且使用单个集成接口,但是在所述接口中具有与某些钥匙组相关的管理特权而只有访客特权与某些其他钥匙组相关。System 100 includes a key exchange server 108, which is configured to track the location of a key set and to manage and coordinate key transfers between individuals, such as between an administrative user 102 and one or more guest users 104 and 106. Administrative user 102 can communicate with key exchange server 108 to grant access to a key set. Guest users 104 and 106 can communicate with key exchange server 108 to request access to a key set. Interactions between individuals 102, 104, and 106 and key exchange server 108 can be handled through a key exchange interface displayed on a client device 112 used by the individual. The client device can be any device configured to communicate with key exchange server 108. The client device can, for example, include a personal computer, a terminal, a kiosk, or a networked controller or other device integrated with a key cabinet. In some cases, the client device can include a mobile device, such as a tablet computer, a laptop computer, a smartphone, etc. In certain embodiments, all users may have the same type of account and use a single integrated interface, but in that interface have administrative privileges associated with certain key sets and only guest privileges associated with certain other key sets.

为了使得钥匙交换服务器108能够跟踪钥匙组的位置并且管理被分配给钥匙组的存取权,唯一钥匙标识符被分配给钥匙交换网络中的每个钥匙组。可以在钥匙标记中对钥匙标识符进行编码。例如,在图1的实施例中,钥匙103的唯一钥匙标识符可以在钥匙链103A上的NFC(近场通信)标签103B中进行编码,所述钥匙链103A被附接至钥匙103。尽管图1中仅示出了一个附接至钥匙链103A的具有代表性的钥匙103,但要理解的是,多个钥匙可以附接至链103A。例如,如果资产为公寓单元,对单元进行访问所需的所有钥匙,例如用于公共资产的钥匙链坠和用于单元的房屋钥匙,可以被附接至钥匙链103A。在某些实施例中,其中钥匙组包括多个钥匙,标记可以可选地被附接至或嵌入每个钥匙,从而系统可以验证应当为钥匙组的一部分的所有钥匙存在。In order to enable the key exchange server 108 to track the location of key sets and manage the access rights assigned to key sets, a unique key identifier is assigned to each key set in the key exchange network. The key identifier can be encoded in a key tag. For example, in the embodiment of Figure 1, the unique key identifier of key 103 can be encoded in an NFC (near field communication) tag 103B on a key chain 103A, which is attached to key 103. Although Figure 1 shows only one representative key 103 attached to the key chain 103A, it is understood that multiple keys can be attached to the chain 103A. For example, if the asset is an apartment unit, all keys required to access the unit, such as a key fob for the common asset and a house key for the unit, can be attached to the key chain 103A. In certain embodiments, where the key set includes multiple keys, a tag can optionally be attached to or embedded in each key so that the system can verify the presence of all keys that should be part of the key set.

假定管理用户102有特权控制针对钥匙组103的存取权。例如,如果管理用户102希望将其钥匙组103转移给访客用户104,他可以通过将存取权转交至钥匙交换服务器108来将这些存取权授予访客用户104。存取权可以包括对存取的限制,例如,时间段,在该时间段期间允许访客用户104存取钥匙组103。钥匙交换服务器108包括存取规则数据库134,所述存取规则数据库134储存由钥匙管理员针对钥匙组分配的存取规则。每个存取规则可以(直接地或间接地)链接至特定钥匙标识符并且链接至被授权用户。Assume that administrative user 102 has the privilege to control access rights to key sets 103. For example, if administrative user 102 wishes to transfer his key set 103 to guest user 104, he can grant these access rights to guest user 104 by transferring the access rights to key exchange server 108. Access rights can include restrictions on access, such as time periods during which guest user 104 is allowed to access key sets 103. Key exchange server 108 includes an access rule database 134 that stores access rules assigned by key administrators to key sets. Each access rule can be linked (directly or indirectly) to a specific key identifier and to an authorized user.

管理用户102可以通过在由管理用户102使用的客户端装置112A上提供的管理钥匙交换界面110将存取权转交至钥匙交换服务器108。客户端装置112A可以在互联网上与钥匙交换服务器108通信。The administrative user 102 may transfer access rights to the key exchange server 108 through an administrative key exchange interface 110 provided on a client device 112A used by the administrative user 102. The client device 112A may communicate with the key exchange server 108 over the Internet.

如果管理用户102拥有钥匙组103,那么他或她可以把钥匙组103放在钥匙交换中心,从而被授权的访客用户104可以以后领取该钥匙组103。钥匙交换中心可以具有如图1所示的用于储存钥匙组的钥匙柜或其他钥匙保持设备120。在特定实施例中,当钥匙组103被放在钥匙交换中心时,扫描其钥匙标记(例如,钥匙链103A)以读取被编码的唯一钥匙标识符。钥匙103放在钥匙柜120中的可用储藏箱(例如,图1中的储藏箱125C)中。在某些情况(例如,钥匙组刚被先前用户归还至钥匙交换中心的情况)下,钥匙组103可能已经位于钥匙交换中心并且因此不需要交出钥匙。If the administrative user 102 owns the key set 103, he or she can place the key set 103 at a key exchange center so that an authorized guest user 104 can later collect the key set 103. The key exchange center may have a key cabinet or other key holding device 120 for storing the key set as shown in Figure 1. In a specific embodiment, when the key set 103 is placed at the key exchange center, its key tag (e.g., key fob 103A) is scanned to read the encoded unique key identifier. The keys 103 are placed in an available storage box (e.g., storage box 125C in Figure 1) in the key cabinet 120. In some cases (e.g., where the key set has just been returned to the key exchange center by a previous user), the key set 103 may already be at the key exchange center and therefore does not need to be handed over.

一旦钥匙组103已经到达钥匙交换中心,则钥匙组103的钥匙标识符和钥匙组103的位置(例如,钥匙交换中心位置和储存钥匙组103的钥匙储藏箱编号)被传送至钥匙交换中心108。钥匙交换服务器108维护钥匙库存数据库133,该钥匙库存数据库133使钥匙标识符与位置(和与钥匙组相关的其他信息)相关联。钥匙交换服务器108使位置信息与被保持在钥匙库存数据库133中的那个位置上的钥匙组的钥匙标识符相关联。在某些实施例中,钥匙储藏箱由钥匙交换服务器108(该钥匙交换服务器108可以例如通过使用钥匙库存数据库133来确定哪些钥匙储藏箱是可用的)指定并且将位置传送至钥匙交换中心。Once the key set 103 has arrived at the key exchange center, the key identifier of the key set 103 and the location of the key set 103 (e.g., the key exchange center location and the key storage box number where the key set 103 is stored) are transmitted to the key exchange center 108. The key exchange server 108 maintains a key inventory database 133 that associates key identifiers with locations (and other information related to the key set). The key exchange server 108 associates the location information with the key identifier of the key set held at that location in the key inventory database 133. In some embodiments, the key storage box is designated by the key exchange server 108 (which can, for example, determine which key storage boxes are available by using the key inventory database 133) and the location is transmitted to the key exchange center.

大约在访客用户104被授权根据管理用户102所设置的存取规则来存取钥匙组103的时候,钥匙交换服务器108可以自动地向访客用户104提供保存钥匙组103的钥匙交换中心的位置的通知。该通知可以以电子邮件、文本消息、语音消息、在访客用户的钥匙交换账户页面出现的消息等的形式来提供。该通知可以可选地包含附加信息,例如钥匙交换位置的工作时间、关于到达钥匙交换位置的行动指南等。Approximately when the guest user 104 is authorized to access the key set 103 according to the access rules set by the administrative user 102, the key exchange server 108 may automatically provide the guest user 104 with a notification of the location of the key exchange center where the key set 103 is stored. The notification may be provided in the form of an email, a text message, a voice message, a message that appears on the guest user's key exchange account page, etc. The notification may optionally include additional information, such as the key exchange location's operating hours, instructions for arriving at the key exchange location, etc.

为获得钥匙组103,访客用户104可以造访钥匙组103所在的钥匙交换中心并且将他或她的钥匙领取请求传送至钥匙交换服务器108。这一请求可以由访客用户104通过在由访客用户104使用的客户端装置112B上提供的访客钥匙交换界面111传送至钥匙交换服务器108。可以提示访客用户登录或提供其他认证信息。客户端装置112B可以在互联网上与钥匙交换服务器108通信。To obtain the key set 103, the guest user 104 can visit the key exchange center where the key set 103 is located and transmit his or her key retrieval request to the key exchange server 108. This request can be transmitted by the guest user 104 to the key exchange server 108 through a guest key exchange interface 111 provided on a client device 112B used by the guest user 104. The guest user may be prompted to log in or provide other authentication information. The client device 112B can communicate with the key exchange server 108 over the Internet.

基于钥匙领取请求所提供的信息,钥匙交换服务器108检查存取规则数据库134以验证访客用户104被授权存取钥匙组103。如果确定访客用户104是被这样授权的,则钥匙交换服务器108将指令转发至钥匙交换中心以使访客用户104能够存取钥匙组103。在某些实施例中,该指令包括识别钥匙柜中的储存了钥匙组103的具体储藏箱的储藏箱编号的标识。可以在钥匙交换中心处的客户端装置112上接收该储藏箱编号。在钥匙交换中心处能存取钥匙柜120的人员(例如代管钥匙交换中心的商家的雇员)然后可以打开相应的储藏箱并且将钥匙组103交给被授权的访客用户104。Based on the information provided in the key retrieval request, the key exchange server 108 checks the access rules database 134 to verify that the guest user 104 is authorized to access the key set 103. If it is determined that the guest user 104 is so authorized, the key exchange server 108 forwards instructions to the key exchange center to enable the guest user 104 to access the key set 103. In some embodiments, the instructions include an identifier of a storage box number that identifies the specific storage box in the key cabinet where the key set 103 is stored. The storage box number can be received on the client device 112 at the key exchange center. A person at the key exchange center who has access to the key cabinet 120 (e.g., an employee of the merchant who hosts the key exchange center) can then open the corresponding storage box and hand over the key set 103 to the authorized guest user 104.

在某些实施例中,特别是在用于请求钥匙的客户端装置112B是不受系统100的操作者控制的装置的情况下(例如,在客户端装置112B是访客用户的平板电脑或移动电话的情况下),钥匙交换服务器108可以请求来自客户端装置112B的位置信息。该位置信息可以例如由客户端装置122B的GPS系统提供。钥匙交换服务器108可以将从客户端装置112B接收的位置信息与钥匙交换位置的已知坐标相比较,并且只有在从客户端装置112B接收的位置信息与钥匙交换位置的位置足够严格地匹配时才会授权将所请求的钥匙组发放给访客用户。In some embodiments, particularly where the client device 112B used to request the keys is not controlled by the operator of the system 100 (e.g., where the client device 112B is a tablet or mobile phone of a guest user), the key exchange server 108 may request location information from the client device 112B. This location information may be provided, for example, by the GPS system of the client device 112B. The key exchange server 108 may compare the location information received from the client device 112B with the known coordinates of the key exchange location and authorize the release of the requested key set to the guest user only if the location information received from the client device 112B closely matches the location of the key exchange location.

在将钥匙组103交给访客用户104之前,可以扫描钥匙组103以读取钥匙标识符并且验证已经找到正确的钥匙组。Before handing the key set 103 to the guest user 104 , the key set 103 may be scanned to read the key identifier and verify that the correct key set has been found.

在某些实施例中,钥匙组被储存在自动控制钥匙组的发放的自动钥匙保持设备中。例如,在钥匙交换服务器108的指引下,钥匙柜中的储藏箱或抽屉的打开或者钥匙的其他提交方式可以是自动的并且由控制和处理单元控制。自动控制的钥匙柜或亭可以被安放在钥匙交换中心中以处理用户之间的钥匙交换。在某些实施例中,用于管理钥匙交换的自动控制的钥匙柜作为自动接待系统的一部分被安放,以代替旅店、酒店或其他设施中的使人存取钥匙的人员接待/服务台。In some embodiments, the key sets are stored in an automated key holding device that automatically controls the issuance of key sets. For example, under the direction of the key exchange server 108, the opening of a storage box or drawer in a key cabinet or other method of key delivery can be automated and controlled by a control and processing unit. An automated key cabinet or kiosk can be placed in a key exchange center to handle key exchanges between users. In some embodiments, an automated key cabinet for managing key exchanges is placed as part of an automated reception system, replacing the human reception/service desk in a hotel, motel, or other facility where people access keys.

特别地,图1中图示的实施例包括钥匙柜,该钥匙柜具有控制和处理单元122,该控制和处理单元122用于控制包含钥匙组的各个隔间或储藏箱的抽屉或门的打开和关闭(例如,图1的储藏箱125A、125B和125C)。In particular, the embodiment illustrated in FIG. 1 includes a key cabinet having a control and processing unit 122 for controlling the opening and closing of drawers or doors of various compartments or storage boxes containing sets of keys (e.g., storage boxes 125A, 125B, and 125C of FIG. 1 ).

一旦从钥匙交换服务器108接收指令,控制和处理单元122使特定隔间门打开或者滑出储藏箱抽屉,或者将钥匙组发放进分发开口中等。打开储藏箱抽屉允许在储藏箱中储存的钥匙组被访客用户领取,或者允许钥匙组被管理用户或其他用户放进储藏箱中。在另一实施例中,自动柜可以具有用于由用户放置和拿取钥匙组的单个容纳装置,为了向用户提交,所述柜机械性地移动相关储藏箱或钥匙组。Upon receiving instructions from the key exchange server 108, the control and processing unit 122 causes a particular compartment door to open, or slides out a storage box drawer, or dispenses a key set into a dispensing opening, etc. Opening the storage box drawer allows a key set stored in the storage box to be retrieved by a guest user, or allows a key set to be placed in the storage box by an administrative user or other user. In another embodiment, the automated cabinet may have a single receptacle for placing and retrieving key sets by a user, with the cabinet mechanically moving the associated storage box or key set for presentation to the user.

客户端装置112(包括图1中的客户端装置112A、112B)可以包括能够连接至互联网并且与钥匙交换服务器108通信的智能电话、移动装置、个人计算机、膝上电脑、平板电脑或者任何其他装置(包括定制计算机终端和亭)。在某些实施例中,客户端装置112B被并入钥匙交换位置的钥匙柜120。Client devices 112 (including client devices 112A and 112B in FIG. 1 ) may include smartphones, mobile devices, personal computers, laptops, tablets, or any other devices (including custom computer terminals and kiosks) capable of connecting to the Internet and communicating with key exchange server 108. In some embodiments, client device 112B is incorporated into a key cabinet 120 at a key exchange location.

本文所描述的步骤中的一些步骤包括扫描钥匙标记以读取钥匙标识符。例如,如上面所论述的,在钥匙交换中心处交出钥匙组期间,扫描钥匙标记。还可以在钥匙交换中心处领取钥匙期间扫描钥匙标记。钥匙标记可以由能够读取被编码的钥匙标识符的装置来扫描。在钥匙标识符被编码进钥匙链上的NFC标签中的实施例中,钥匙可以由具有NFC功能的装置扫描,例如,举例说明,具有NFC功能的智能电话或平板电脑。这些装置可以被配置成运行钥匙交换应用,该钥匙交换应用将钥匙标识符发送至钥匙交换服务器108。Some of the steps described herein include scanning a key tag to read a key identifier. For example, as discussed above, a key tag is scanned during the handover of a key set at a key exchange center. The key tag can also be scanned during the collection of keys at a key exchange center. The key tag can be scanned by a device capable of reading an encoded key identifier. In embodiments where the key identifier is encoded into an NFC tag on a key chain, the key can be scanned by an NFC-enabled device, such as, for example, an NFC-enabled smartphone or tablet. These devices can be configured to run a key exchange application that sends the key identifier to the key exchange server 108.

图1的系统100或其一些部分可以被配置成实现本文所描述的方法中的一种方法或更多种方法。下面参考图2至图5更加详细地描述这些方法。The system 100 of Figure 1 or some parts thereof can be configured to implement one or more of the methods described herein. These methods are described in more detail below with reference to Figures 2 to 5.

图2图示了根据一个实施例的用于管理用户分配对钥匙组的存取权的方法150。例如,能够执行方法150,以使管理用户102能够准许访客用户104存取钥匙组103(图1)。每当管理用户希望针对个体创建新的存取规则时,可以重复方法150。方法150可以实现为图1的钥匙交换服务器108的处理器可访问的程序存储器中所包含的软件。处理器通过执行由软件提供的软件指令来实现该方法。管理用户可以经由图1的管理钥匙交换界面110来提供对软件的输入。FIG2 illustrates a method 150 for assigning access rights to a key set by an administrative user, according to one embodiment. For example, method 150 can be executed to enable administrative user 102 to grant guest user 104 access to key set 103 ( FIG1 ). Method 150 can be repeated each time the administrative user wishes to create new access rules for an individual. Method 150 can be implemented as software contained in a program memory accessible to a processor of key exchange server 108 of FIG1 . The processor implements the method by executing software instructions provided by the software. An administrative user can provide input to the software via administrative key exchange interface 110 of FIG1 .

方法150在块152通过接收管理用户的凭证而开始。这样的凭证可以包括,例如,由用户提供的用户的账户名、电子邮件和/或密码153。可以由管理用户利用在图1的客户端装置112A处提供的管理钥匙交换界面110在登录至账户的登录页面处提供这样的凭证。在管理用户的凭证已被钥匙交换服务器108验证之后,可以向管理用户提供对他或她个人管理页面114(参见图1)的访问,其中他可以看到资产、钥匙和/或钥匙标识符的列表(取决于界面的表示),对这些资产、钥匙和/或钥匙标识符的列表他具有管理特权。所述列表还可以指示每个钥匙组的当前位置(例如,如果钥匙组正被保持在钥匙交换中心,则指示钥匙存取位置,或者如果钥匙组已经被先前用户领取,则指示钥匙组的已知的最后下落)。在块154,钥匙交换服务器108从直接或间接识别一个或更多个钥匙组的列表(例如,钥匙名称或标识符155)接收管理用户的选择,存取规则将直接地或间接地与所述一个或更多个钥匙组相关联。Method 150 begins at block 152 by receiving the credentials of the administrative user. Such credentials can include, for example, the user's account name, email and/or password 153 provided by the user. Such credentials can be provided by the administrative user at the login page of logging into the account using the administrative key exchange interface 110 provided at the client device 112A of FIG. 1 . After the administrative user's credentials have been verified by the key exchange server 108, the administrative user can be provided with access to his or her personal management page 114 (see FIG. 1 ), where he or she can see a list (depending on the representation of the interface) of assets, keys and/or key identifiers for which he or she has management privileges. The list can also indicate the current location of each key group (for example, if the key group is being kept at a key exchange center, then indicate the key access location, or if the key group has been picked up by a previous user, then indicate the known last whereabouts of the key group). At block 154 , the key exchange server 108 receives the administrative user's selection from a list (eg, key names or identifiers 155 ) that directly or indirectly identify one or more key groups with which the access rule is to be directly or indirectly associated.

方法150通过在块156接收来自管理用户的可能存取所选择的钥匙组的被授权访客的标识符157以及在块158接收被授权访客可能进行存取的时间段159的细节来继续创建针对所选择的(多个)钥匙组的存取规则。访客标识符157可以为电子邮件地址、用户账户名、电话号码、信用卡信息、姓名和地址,或者唯一地识别钥匙交换网络中的用户的任何其他标识符。时间段159可以指示被授权的访客将存取钥匙组的天(数天)和/或小时(数小时)(例如,被授权的访客可以预订一夜的住宿并且被准许在2月7日下午3时和2月8日上午10时之间存取)。在某些情况下,时间段159可以包括重复出现的时间段(例如,被授权的访客为被授权在每月第二个周一的下午12时和下午4时之间存取钥匙的清洁人员)或者该时间段可以被指定为不受限的。在某些情况下,可以不指定特定存取期,即,访客用户可以被授权在钥匙组已经被存放至钥匙存取位置之后的任何时间接收钥匙组。Method 150 continues by creating access rules for the selected key set(s) by receiving, at block 156, identifiers 157 of authorized visitors who may access the selected key set from the administrative user, and, at block 158, details of the time period 159 during which the authorized visitor may have access. Visitor identifier 157 may be an email address, user account name, phone number, credit card information, name and address, or any other identifier that uniquely identifies a user in the key exchange network. Time period 159 may indicate the day(s) and/or hour(s) during which the authorized visitor may access the key set (e.g., an authorized visitor may book a one-night stay and be granted access between 3:00 PM on February 7th and 10:00 AM on February 8th). In some cases, time period 159 may include a recurring time period (e.g., an authorized visitor is a cleaning staff member authorized to access the keys between 12:00 PM and 4:00 PM on the second Monday of each month) or the time period may be specified as unlimited. In some cases, no specific access period may be specified, ie, a guest user may be authorized to receive the key set at any time after the key set has been deposited at the key access location.

在块158分配被授权的时间段159之前,钥匙交换服务器108可以进行检查以确定时间段159是否与该钥匙组的先前分配的存取规则相冲突。例如,如果已经分配不同的访客用户在同一时间段或交叠时间段存取同一钥匙组,则时间段159可以生成警告或不被分配。Before assigning the authorized time period 159 at block 158, the key exchange server 108 may check to determine whether the time period 159 conflicts with previously assigned access rules for the key set. For example, if different guest users have already been assigned access to the same key set during the same time period or overlapping time periods, the time period 159 may generate a warning or not be assigned.

一旦已经在块156和块158创建存取规则,如果管理用户希望创建影响同一钥匙组或其他钥匙组的其他存取规则,则方法150可以通过进行至块154来进行重复。Once access rules have been created at blocks 156 and 158 , the method 150 may repeat by proceeding to block 154 if the administrative user wishes to create additional access rules affecting the same key set or other key sets.

管理用户可以在回收时被分配对由钥匙标记和其钥匙标识符识别的钥匙组的管理特权。例如,希望使用与资产相关的钥匙交换系统的用户可以获取新的钥匙标记(例如,以NFC钥匙链的形式)。执行应用的具有NFC功能的客户端装置可以轻触钥匙链,以使钥匙标识符从NFC钥匙链被读取并且被发送至钥匙交换服务器108。管理用户可以通过客户端装置上的界面提供其用户凭证并且请求将他分配为钥匙管理员。钥匙交换服务器108然后可以更新管理用户的数据库132(参见图1)以使管理用户与钥匙标识符相关联。An administrative user can be assigned administrative privileges for a key group identified by a key token and its key identifier upon recycling. For example, a user who wishes to use a key exchange system associated with an asset can obtain a new key token (e.g., in the form of an NFC key fob). An NFC-enabled client device executing an application can tap the key fob to cause the key identifier to be read from the NFC key fob and sent to the key exchange server 108. The administrative user can provide their user credentials through an interface on the client device and request that they be assigned as a key administrator. The key exchange server 108 can then update the database 132 of administrative users (see FIG. 1 ) to associate the administrative user with the key identifier.

其他方法可以用来使钥匙标识符与管理用户相关联。例如,在运送或者以其他方式提供钥匙标记之前,用户可以将在钥匙标记上可视的唯一序列码输入到其账户中或者钥匙交换服务可以将钥匙标识符链接至用户的账户。钥匙标识符然后可以被添加至钥匙组的列表或者在用户账户中包含存取规则的其他数据表示,管理用户有权基于所述钥匙组的列表来添加对资产的存取规则或者与资产相关联。Other methods can be used to associate a key identifier with an administrative user. For example, before the key token is shipped or otherwise provided, the user can enter a unique serial number visible on the key token into their account, or a key exchange service can link the key identifier to the user's account. The key identifier can then be added to a list of key groups or other data representations containing access rules in the user's account, and the administrative user can add access rules to or associate them with assets based on the list of key groups.

图3图示了每当在钥匙交换中心交出钥匙组时可执行的方法200。例如,当管理用户102在钥匙交换中心交出钥匙组103使得该钥匙组以后可以由被授权的访客用户104(图1)领取时,可以执行方法200。当访客用户104使用完钥匙组之后在钥匙交换中心归还/交出钥匙组103时,也可以执行方法200。方法200还可以被实现为图1的钥匙交换服务器108的处理器可访问的程序存储器中所包含的软件。处理器通过执行软件所提供的软件指令来实现所述方法。FIG3 illustrates a method 200 that can be executed whenever a key set is surrendered at a key exchange center. For example, method 200 can be executed when administrative user 102 surrenders key set 103 at a key exchange center so that the key set can later be collected by authorized guest user 104 ( FIG1 ). Method 200 can also be executed when guest user 104 returns/hands over key set 103 at a key exchange center after using the key set. Method 200 can also be implemented as software contained in a program memory accessible to a processor of key exchange server 108 of FIG1 . The processor implements the method by executing software instructions provided by the software.

方法200通过在钥匙交换中心处扫描钥匙标记来发起。例如,当用户到达钥匙交换中心交出钥匙组时,具有NFC功能的客户端装置112B可以轻触包含钥匙标记的钥匙链以读取被编码在NFC标签上的钥匙标识符。该钥匙标识符可以由客户端装置112B上的钥匙交换应用被发送至钥匙交换服务器108。在某些实施例中,客户端装置112B可以为以下装置中的任何一种装置:与钥匙交换位置特别地关联的客户端装置(所述客户端装置可以包括单独的装置或者与钥匙储存柜一体的例如控制器的装置)或者诸如用户的平板电脑或智能手机的便携式装置。在块202,方法200从客户端装置112B接收钥匙标识符203。Method 200 is initiated by scanning a key tag at a key exchange center. For example, when a user arrives at a key exchange center to hand over a set of keys, an NFC-enabled client device 112B can tap a key fob containing the key tag to read a key identifier encoded on the NFC tag. The key identifier can be sent to a key exchange server 108 by a key exchange application on the client device 112B. In some embodiments, the client device 112B can be any of the following: a client device specifically associated with a key exchange location (which can include a separate device or a device integrated with a key storage cabinet, such as a controller) or a portable device such as a user's tablet or smartphone. At block 202, method 200 receives a key identifier 203 from the client device 112B.

在块204,方法200识别钥匙位置。这可以以各种方式实现。例如,方法200可以从客户端装置112B接收位置数据205并且基于这样的数据确定钥匙位置(例如,钥匙交换中心位置)。这样的位置数据205可以包括GPS数据、移动网络位置数据,和/或用户数据输入,或者钥匙交换服务器108可以链接至其数据库中的一个位置的装置身份数据,和/或其他内容。At block 204, the method 200 identifies the key location. This can be accomplished in various ways. For example, the method 200 can receive location data 205 from the client device 112B and determine the key location (e.g., the key exchange center location) based on such data. Such location data 205 can include GPS data, mobile network location data, and/or user data input, or device identification data that the key exchange server 108 can link to a location in its database, and/or other content.

在块206,储藏箱编号207被分配给钥匙,储藏箱编号207标识钥匙柜中用于储存钥匙的可用储藏箱。储藏箱编号的分配可以由钥匙交换服务器108、控制和处理单元122来执行,或者人可以为登记存放的钥匙组选择可用的储藏箱。在钥匙交换服务器108没有进行对储藏箱的分配的情况下,所选择的储藏箱被传送至钥匙交换服务器108。At block 206, a storage bin number 207 is assigned to the key, identifying an available storage bin in the key cabinet for storing the key. The assignment of the storage bin number can be performed by the key exchange server 108 or the control and processing unit 122, or a human can select an available storage bin for the key set to be registered. If the key exchange server 108 does not assign a storage bin, the selected storage bin is transmitted to the key exchange server 108.

在块208,将所识别的钥匙位置和所分配的储藏箱编号与在块202接收的钥匙标识符203相关联。在块209,钥匙交换服务器108发送信号至钥匙柜120的控制和处理单元122以使所分配的储藏箱打开,从而钥匙组可以被放置在储藏箱中。在钥匙柜120不具有控制和处理单元122的其他实施例中,在块209的步骤可以被替换成将所分配的储藏箱编号发送至钥匙交换中心处的客户端装置的步骤,使得在钥匙交换中心工作的人员得知哪个储藏箱用于将该钥匙储存在其中,或者由在钥匙交换中心工作的人员将钥匙放在打开的储藏箱中并且通过储藏箱传感器或者由工人通过客户端装置界面将该信息发送到服务器。At block 208, the identified key location and the assigned storage bin number are associated with the key identifier 203 received at block 202. At block 209, the key exchange server 108 sends a signal to the control and processing unit 122 of the key cabinet 120 to open the assigned storage bin so that the key set can be placed in the storage bin. In other embodiments where the key cabinet 120 does not have a control and processing unit 122, the step at block 209 can be replaced by sending the assigned storage bin number to a client device at a key exchange center so that personnel working at the key exchange center know which storage bin to store the key in, or by having personnel working at the key exchange center place the key in an open storage bin and sending this information to the server via a storage bin sensor or by the worker via a client device interface.

在某些实施例中,例如可以在访客用户领取钥匙组之后或者当访客用户变得有权根据特定的规则来领取钥匙组时提示钥匙管理员提供要对访客用户发布的可选指令或其他信息。所述信息可以包括例如与钥匙组相关联的资产的地图、照管资产的指令等。在某些实施例中,系统提供这样的指令的模板,该模板包括可在系统中获得的例如资产位置等的信息。在某些实施例中,钥匙管理员可以选择储存一组用于资产的指令,使得系统可以向资产的访客用户自动地提供同样的指令。In some embodiments, for example, a key administrator can be prompted to provide optional instructions or other information to be issued to a guest user after the guest user receives a key set, or when the guest user becomes entitled to receive a key set according to specific rules. This information can include, for example, a map of the asset associated with the key set, instructions for caring for the asset, and so on. In some embodiments, the system provides a template for such instructions, which includes information available in the system, such as the asset's location. In some embodiments, the key administrator can choose to store a set of instructions for an asset so that the system can automatically provide the same instructions to guest users of the asset.

方法200通过检索已经与钥匙标识符203直接地或间接地相关联的任何存取规则211而进行至块210。如果存在已被允许根据存取规则211中的一条规则来存取钥匙组的用户并且用户的被授权的存取期的起点在预定时间内(例如,不到一天的时间),则方法200着手向被授权的用户发布当前钥匙位置213和所需的任何领取指令或代码215。这样的领取指令或代码215可以由系统或钥匙管理员来生成以在钥匙领取时认证访客用户。The method 200 proceeds to block 210 by retrieving any access rules 211 that have been directly or indirectly associated with the key identifier 203. If there is a user who has been granted access to the key set according to one of the access rules 211 and the start of the user's authorized access period is within a predetermined time (e.g., less than a day), the method 200 proceeds to issue the current key location 213 and any required collection instructions or codes 215 to the authorized user. Such collection instructions or codes 215 can be generated by the system or key administrator to authenticate a guest user at the time of key collection.

在其他实施例中,方法200的步骤210和212可以在其他时间被执行。例如,钥匙交换服务器208可以配置成使得其周期性地读取或处理存取规则,并且若针对被授权的用户的即将到来的被授权的存取期的开始处于预定时间内,则向被授权的用户发布钥匙的当前钥匙位置213。例如,钥匙交换服务器208可以被配置成在被授权的存取期开始之前的一天向被授权的用户发布当前钥匙位置213和领取指令或代码215。In other embodiments, steps 210 and 212 of method 200 may be performed at other times. For example, key exchange server 208 may be configured to periodically read or process access rules and, if the start of an upcoming authorized access period for an authorized user is within a predetermined time, issue a current key location 213 of the key to the authorized user. For example, key exchange server 208 may be configured to issue current key location 213 and pick-up instructions or code 215 to the authorized user one day before the start of the authorized access period.

图4图示根据一个实施例的用于为个体提供对钥匙组的存取的可以在钥匙领取时执行的方法250。例如,当访客用户104到达钥匙交换中心领取钥匙组103时(图1)可以执行方法250。方法250可以实现为图1的钥匙交换服务器108的处理器可访问的程序存储器中所包含的软件。处理器通过执行软件提供的软件指令来实现该方法。FIG4 illustrates a method 250 that can be performed at key pickup time for providing an individual with access to a key set, according to one embodiment. For example, method 250 can be performed when guest user 104 arrives at a key exchange center to pick up key set 103 ( FIG1 ). Method 250 can be implemented as software contained in a program memory accessible to a processor of key exchange server 108 of FIG1 . The processor implements the method by executing software instructions provided by the software.

方法250在块251通过接收访客用户的凭证253而开始。这样的凭证可以包括,例如,用户提供的用户账户名、电子邮件和/或密码253。可以由访客用户在客户端装置112B(图1)处提供的访客钥匙交换界面111的登录页面处提供这样的凭证。凭证可以附加地或者可替换地包括PIN(例如,在块252处设置有存取指令或代码215的PIN)、通过移动电话的双认证或者唯一物理存取标记(例如包含与访客相关联的唯一标识符的NFC标签)的提交之中的一个或更多个。Method 250 begins at block 251 by receiving credentials 253 for a guest user. Such credentials may include, for example, a user account name, email, and/or password 253 provided by the user. Such credentials may be provided by the guest user at a login page of the guest key exchange interface 111 provided at the client device 112B ( FIG. 1 ). The credentials may additionally or alternatively include one or more of a PIN (e.g., the PIN provided with the access instructions or code 215 at block 252 ), two-factor authentication via a mobile phone, or submission of a unique physical access token (e.g., an NFC tag containing a unique identifier associated with the guest).

输入的访客用户的凭证253可以由钥匙交换服务器108将这些凭证与在用户凭证数据库131中的与用户相关联的一组凭证相比较来验证(参见图1)。在验证访客用户凭证之后,在块252,可以提示访客用户提供其他存取指令或代码215。例如,可以在方法200的块212事先通知访客用户钥匙组的领取存取代码215(图3)。存取代码215可以辅助钥匙交换服务器108确定访客用户正请求存取哪个钥匙组,因为可想而知的是,访客用户可以具有对该钥匙存取位置的多个不同钥匙组的存取特权,例如访客用户可以是对许多不同资产的钥匙有存取权的清洁人员。如果不需要附加的存取代码215并且不清楚访客会希望存取钥匙交换中心处的哪个钥匙组,则可以提示访客针对存取事件选择一个钥匙组。The guest user's credentials 253 entered can be verified by the key exchange server 108 by comparing them to a set of credentials associated with the user in the user credential database 131 (see FIG1 ). After the guest user's credentials are verified, at block 252 , the guest user can be prompted to provide additional access instructions or codes 215 . For example, the guest user can be notified in advance of a key set collection access code 215 ( FIG3 ) at block 212 of method 200 . The access code 215 can assist the key exchange server 108 in determining which key set the guest user is requesting access to, as it is conceivable that a guest user could have access privileges to multiple different key sets at the key access location, such as a guest user who is a cleaning staff member with access to keys for many different assets. If an additional access code 215 is not required and it is unclear which key set the guest wishes to access at the key exchange center, the guest can be prompted to select a key set for the access event.

在块254,方法250识别正在进行钥匙存取请求的客户端装置112B的时间和位置。钥匙存取请求的时间例如可以由钥匙交换服务器108查询钥匙交换服务器108可存取的定时信息257的源来确定。客户端装置的位置可以通过从客户端装置112B接收位置数据255并且基于这样的数据确定客户端装置位置(例如,钥匙交换中心位置)来识别。这样的位置数据255可以包括来自客户端装置112B的GPS数据、来自客户端装置112B的移动网络位置数据、来自客户端装置112B的用户数据输入或者钥匙交换服务器108可以链接至所述钥匙交换服务器108的数据库中的一个位置的来自客户端装置112的装置身份信息,或者在钥匙交换位置处通过按钮、扫描仪或者某些其他交互装置实现的物理提交验证和/或类似内容。At block 254, the method 250 identifies the time and location of the client device 112B making the key access request. The time of the key access request can be determined, for example, by the key exchange server 108 querying a source of timing information 257 accessible to the key exchange server 108. The location of the client device can be identified by receiving location data 255 from the client device 112B and determining the client device location (e.g., a key exchange center location) based on such data. Such location data 255 can include GPS data from the client device 112B, mobile network location data from the client device 112B, user data input from the client device 112B, device identity information from the client device 112B that the key exchange server 108 can link to a location in a database of the key exchange server 108, or physical submission verification at the key exchange location via a button, scanner, or some other interactive device, and/or the like.

在块256,检索对所请求的钥匙的相关存取规则211,其规定了访客用户的钥匙存取权。在块258,方法250着手认证访客用户的请求。例如,在块258,钥匙存取请求的时间可以与在存取规则中规定的被授权的存取期进行比较,以确定是否在被授权的存取期内恰当地做出了该钥匙存取请求。此外,在块258,块254处确定的客户端装置112B的位置可以与和被请求的钥匙组的钥匙标识符相关联的钥匙存取位置进行比较。这可以帮助确定访客用户是否处于用于领取钥匙组的正确位置。如果钥匙组处于其他地方,或者在被授权的存取期之外做出该钥匙存取请求,则拒绝该钥匙存取请求。At block 256, the associated access rules 211 for the requested key are retrieved, which specify the guest user's key access rights. At block 258, method 250 proceeds to authenticate the guest user's request. For example, at block 258, the time of the key access request can be compared with the authorized access period specified in the access rules to determine whether the key access request was properly made within the authorized access period. Additionally, at block 258, the location of the client device 112B determined at block 254 can be compared with the key access location associated with the key identifier of the requested key set. This can help determine whether the guest user is in the correct location to retrieve the key set. If the key set is elsewhere, or if the key access request was made outside of the authorized access period, the key access request is denied.

如果钥匙存取请求通过认证,则方法250通过将存取指令发送至客户端装置112B来进行至块260。例如,在图示的实施例中,存取指令包括其中储存有钥匙组的储藏箱的储藏箱编号207。储藏箱编号207已事先在钥匙组被交出或最近的的钥匙库存扫描时与所请求的钥匙组的钥匙标识符相关联(例如,如参考图3的方法200的块208所描述的)。在钥匙交换中心对钥匙柜有存取权的人可以使用在块260处提供的存取指令打开储藏箱以从指定的储藏箱获取所请求的钥匙组。If the key access request is authenticated, the method 250 proceeds to block 260 by sending an access instruction to the client device 112B. For example, in the illustrated embodiment, the access instruction includes the storage box number 207 of the storage box in which the key set is stored. The storage box number 207 has been previously associated with the key identifier of the requested key set when the key set was surrendered or when the key inventory was recently scanned (e.g., as described with reference to block 208 of method 200 of FIG. 3 ). A person with access to the key cabinet at the key exchange center can use the access instruction provided at block 260 to open the storage box and retrieve the requested key set from the designated storage box.

在块262,方法250通过接收该钥匙组的钥匙标识符203来验证已经找到正确的钥匙组。例如,在将钥匙组交给访客用户之前,打开储藏箱找到钥匙组的人可以将钥匙链轻触具有NFC功能的客户端装置112B以读取在钥匙链的NFC标签上被编码的钥匙标识符。该钥匙标识符可以由客户端装置112上的钥匙交换应用发送至钥匙交换服务器108。钥匙交换服务器108则可以验证所扫描的钥匙标识符是否对应于所请求的钥匙组的钥匙标识符。At block 262, method 250 verifies that the correct key set has been found by receiving the key identifier 203 for the key set. For example, before handing the key set to a guest user, the person who opened the storage box and found the key set can tap the key fob to the NFC-enabled client device 112B to read the key identifier encoded on the NFC tag of the key fob. The key identifier can be sent by the key exchange application on the client device 112 to the key exchange server 108. The key exchange server 108 can then verify whether the scanned key identifier corresponds to the key identifier of the requested key set.

图5图示了根据另一实施例的用于为个体提供对钥匙组的存取的可以在钥匙领取时执行的方法300。例如,当访客用户104到达钥匙交换中心领取钥匙组103(图1)时,可以执行方法300。方法300在某些方面类似于图4的方法250。类似的附图标记用来表示类似的步骤或部件。方法300可以实现为图1的钥匙交换服务器108的处理器可访问的程序存储器中所包含的软件。处理器通过执行由软件提供的软件指令来实现该方法。可以经由在客户端装置112B上显示的访客钥匙交换界面111来将输入提供至软件(参见图1)。FIG5 illustrates a method 300 that can be performed at key collection time for providing an individual with access to a key set according to another embodiment. For example, when a guest user 104 arrives at a key exchange center to collect a key set 103 ( FIG1 ), the method 300 can be performed. The method 300 is similar in some respects to the method 250 of FIG4 . Similar reference numerals are used to represent similar steps or components. The method 300 can be implemented as software contained in a program memory accessible to a processor of the key exchange server 108 of FIG1 . The processor implements the method by executing software instructions provided by the software. Input can be provided to the software via the guest key exchange interface 111 displayed on the client device 112B (see FIG1 ).

在钥匙柜具有(例如通过打开和关闭在钥匙柜中的抽屉或储藏箱)控制对被保持在钥匙柜中的钥匙组的存取的控制和处理单元122(图1)的情况下,可以执行方法300。钥匙柜120的控制和处理单元122可以在互联网上与钥匙交换服务器208通信。方法300包括与方法200类似的步骤251、252、254、256和258。然而,在方法300的块264处方法300开始不同于方法250。在块264,方法300验证在与钥匙的标识符相关联的储藏箱中存在正确的钥匙组,而不是(根据方法250的块260)将存取指令发送至客户端装置112B。这一验证步骤可以由位于钥匙储藏箱中的扫描仪来实现,所述扫描仪能够扫描在储藏箱中所包含的钥匙标记上的NFC标签。例如,钥匙交换服务器208可以将指令转发至钥匙柜120的控制和处理单元122以激活所述扫描仪来读取所识别的储藏箱(或者在搜寻钥匙标识符203的过程中在钥匙柜120中的所有储藏箱)中的钥匙标记的钥匙标识符203。扫描的钥匙标识符然后由控制和处理单元122转发至钥匙交换服务器208进行验证。如果确定出在储藏箱中存在正确的钥匙组,则在块268,钥匙交换服务器208将指令269发送至控制和处理单元122以打开包含钥匙组的储藏箱或以其他方式使钥匙组可存取。在某些实施例中,系统(例如,通过电子邮件、文本消息等的方式)向钥匙组接收方自动提供与钥匙组相关的附加信息(例如,从钥匙交换位置到达该钥匙组所属资产的行动指南)。Method 300 may be performed if the key cabinet includes a control and processing unit 122 ( FIG. 1 ) that controls access to the set of keys held in the key cabinet (e.g., by opening and closing a drawer or storage compartment within the key cabinet). The control and processing unit 122 of the key cabinet 120 may communicate with the key exchange server 208 over the Internet. Method 300 includes steps 251, 252, 254, 256, and 258, similar to those of method 200. However, method 300 begins differently from method 250 at block 264 of method 300. At block 264, instead of sending an access instruction to the client device 112B (according to block 260 of method 250), method 300 verifies that the correct set of keys is present in the storage compartment associated with the key's identifier. This verification step may be accomplished by a scanner located within the key storage compartment that is capable of scanning an NFC tag on a key tag contained within the storage compartment. For example, the key exchange server 208 may forward an instruction to the control and processing unit 122 of the key cabinet 120 to activate the scanner to read the key identifier 203 of the key tag in the identified storage box (or all storage boxes in the key cabinet 120 during the search for the key identifier 203). The scanned key identifier is then forwarded by the control and processing unit 122 to the key exchange server 208 for verification. If it is determined that the correct key set is present in the storage box, then at block 268, the key exchange server 208 sends an instruction 269 to the control and processing unit 122 to open the storage box containing the key set or otherwise make the key set accessible. In some embodiments, the system automatically provides additional information related to the key set (e.g., instructions for getting to the asset to which the key set belongs from the key exchange location) to the recipient of the key set (e.g., via email, text message, etc.).

在方法250的块262处和方法300的块264处的钥匙验证步骤可以帮助防止将错误的钥匙组提供给访客用户。例如,与所请求的钥匙不同的钥匙组可能已被非故意地放在储藏箱中,则验证步骤将发现这个错误。上述验证步骤并非对所有实施例都是必须的。在特定实施例中,验证步骤可省略或者以某些其他方式被执行。The key verification steps at block 262 of method 250 and block 264 of method 300 can help prevent the incorrect set of keys from being provided to a guest user. For example, a key set different from the requested key may have been inadvertently placed in a storage box, and the verification step will detect this error. The above verification steps are not required for all embodiments. In certain embodiments, the verification step may be omitted or performed in some other manner.

钥匙交换服务器108可以以可选的方式实现如图1所示的一个或更多个通知生成器140,所述一个或更多个通知生成器140确定一个或更多个用户(例如访客用户和/或管理用户)何时接收一个或更多个事件的通知。这些通知可以由钥匙交换服务器108生成和/或可以包括或并入用户提供的信息(例如,钥匙管理员可以提供在提供给访客用户的多个通知中的一个通知中要包括的内容——这样的内容可以从客户端装置108通过用户接口上传或者输入至钥匙交换服务器108)。The key exchange server 108 may optionally implement one or more notification generators 140, as shown in FIG1 , that determine when one or more users (e.g., guest users and/or administrative users) receive notifications of one or more events. These notifications may be generated by the key exchange server 108 and/or may include or incorporate user-provided information (e.g., a key administrator may provide content to be included in one of the notifications provided to a guest user—such content may be uploaded or input to the key exchange server 108 from a client device 108 via a user interface).

通知生成器可以被配置成分发一个或更多个不同的通知。每个通知可以与相应的标准相关联。通知生成器140可以被配置成搜索钥匙存取服务器108的一个或更多个数据库,以识别应当分发通知的情况。在某些实施例中,通知生成器104被配置成搜索钥匙交换服务器108可访问的数据库(例如钥匙库存数据库133和规则数据库134)以识别应何时分发通知以及应给谁分发通知。例如,通知生成器140可以自动地通知钥匙管理者访客用户104已经在何时从储藏箱125接收钥匙组103。The notification generator can be configured to distribute one or more different notifications. Each notification can be associated with a corresponding criterion. The notification generator 140 can be configured to search one or more databases of the key access server 108 to identify situations in which notifications should be distributed. In certain embodiments, the notification generator 104 is configured to search databases accessible to the key exchange server 108 (e.g., the key inventory database 133 and the rules database 134) to identify when notifications should be distributed and to whom. For example, the notification generator 140 can automatically notify the key manager when the guest user 104 has received the key set 103 from the storage box 125.

作为另一非限制性示例,通知生成器140可以(根据与钥匙组103相关联的存取规则)确定访客用户104可以存取钥匙组103的最早时间,并且,当临近该时间时(例如,当该时间是1天后时,数小时后时,或者某些其他时间段之后),可以检查以验证要交换的钥匙组103存在于钥匙交换位置(例如,在钥匙保持设备120的储藏箱125中)。如果(例如,如钥匙库存数据库133所指示的)钥匙组103存在,则通知生成器140可以自动地通知访客103:很快就能够存取在保持该钥匙组的钥匙交换位置处的钥匙组103。如果钥匙组103不存在,则通知生成器可以通知相应的钥匙管理员:钥匙组103尚未被放在钥匙保持设备120中,并且在某些实施例中,可以提供信息或指示,以辅助钥匙管理员及时将钥匙组103交至钥匙交换位置。As another non-limiting example, notification generator 140 may determine the earliest time that guest user 104 can access key set 103 (based on access rules associated with key set 103) and, when that time approaches (e.g., when that time is one day later, a few hours later, or some other time period later), may check to verify that the key set 103 to be exchanged is present at the key exchange location (e.g., in storage box 125 of key holding device 120). If key set 103 is present (e.g., as indicated by key inventory database 133), notification generator 140 may automatically notify guest 103 that key set 103 will soon be accessible at the key exchange location where it is held. If key set 103 is not present, notification generator 140 may notify the corresponding key handler that key set 103 is not yet in key holding device 120 and, in some embodiments, may provide information or instructions to assist the key handler in promptly delivering key set 103 to the key exchange location.

通知可以例如借助于电子邮件、文本消息、语音消息、呈现在用户的钥匙交换账户页面中的消息和/或其他形式。通知生成器140可以在发生特定事件的同时生成通知,和/或可以在这样的事件发生之前生成警告通知。例如,通知生成器140可以在可获得钥匙组103的最早时间之前通知访客:钥匙组103已经被放置在储藏箱125(如上面所论述的)中,或者通知生成器140可以将该通知推迟至可获得钥匙组103的那一时刻。下面的示例使用后一方式,但是该示例可以适合于在截止期限或其他确定时间之前提供通知。The notification may be, for example, by means of an email, a text message, a voice message, a message presented on the user's key exchange account page, and/or other forms. The notification generator 140 may generate a notification at the same time as a particular event occurs, and/or may generate a warning notification before such an event occurs. For example, the notification generator 140 may notify the visitor that the key set 103 has been placed in the storage box 125 (as discussed above) before the earliest time that the key set 103 is available, or the notification generator 140 may postpone the notification until the moment when the key set 103 is available. The following example uses the latter approach, but the example may be adapted to provide notifications before a deadline or other determined time.

图9示出可以由通知生成器执行的非限制性的示例性通知调度方法400。在块410中,通知生成器确定在其期间允许访客用户104存取钥匙组103的时间段。这可以通过检查存取规则数据库134获取基于时间的存取限制来执行。当该时间段开始时(即,当允许访客用户104存取钥匙组103时),通知生成器继续进行至块415并且确定钥匙组103是否存在于钥匙交换位置(例如,在图1中的储藏箱125C中)。FIG9 illustrates a non-limiting exemplary notification scheduling method 400 that may be performed by a notification generator. At block 410, the notification generator determines a time period during which the guest user 104 is allowed to access the key set 103. This may be performed by checking the access rules database 134 for time-based access restrictions. When the time period begins (i.e., when the guest user 104 is allowed to access the key set 103), the notification generator proceeds to block 415 and determines whether the key set 103 is present in the key exchange location (e.g., in the storage box 125C in FIG1 ).

如果钥匙组103不存在,则通知生成器进行至块420并且根据通知生成器的配置,将通知发送至与钥匙组103相关联的钥匙管理员以提醒他们寄存钥匙组103,将通知发送至访客用户104以通知他们钥匙组103尚未被寄存,或者这二者。否则,如果钥匙组103存在,则通知生成器进行至块425并通知访客用户104钥匙组103已被寄存并且可存取。If the key set 103 does not exist, the notification generator proceeds to block 420 and, depending on the configuration of the notification generator, sends a notification to the key administrator associated with the key set 103 to remind them to check in the key set 103, sends a notification to the guest user 104 to inform them that the key set 103 has not been checked in, or both. Otherwise, if the key set 103 does exist, the notification generator proceeds to block 425 and informs the guest user 104 that the key set 103 has been checked in and is accessible.

从块425,通知生成器140继续进行至块430,在块430,通知生成器确定一个时间,预计到该时间为止会从钥匙交换位置取走钥匙组103。如果在该时间之前发生了钥匙组103被提供至访客用户,则通知生成器进行至块437并检测钥匙组的取走,在检测之后,通知生成器进行至块445,在块445通知生成器通知钥匙管理员该取走事件。如果钥匙组103在该时间之前没有被取走,则当检测到时间已过时通知生成器进行至块435,在块435之后,通知生成器进行至块440,在块440,通知生成器通知钥匙管理员:直到相关时间为止该钥匙组103未被取走。如果钥匙组103后来被取走,则钥匙生成器140进行至块437。From block 425, notification generator 140 proceeds to block 430, where it determines a time by which the key set 103 is expected to be removed from the key exchange location. If the key set 103 is provided to the guest user before this time, notification generator 140 proceeds to block 437 and detects the removal of the key set. After detection, notification generator 140 proceeds to block 445, where it notifies the key administrator of the removal event. If the key set 103 is not removed before this time, notification generator 140 proceeds to block 435 upon detecting that the time has expired. After block 435, notification generator 140 proceeds to block 440, where it notifies the key administrator that the key set 103 has not been removed up to the relevant time. If the key set 103 is subsequently removed, key generator 140 proceeds to block 437.

从块445,通知生成器进行至块450,在块450,通知生成器确定一个时间,预定到该时间为止访客用户104要将钥匙组103归还至钥匙交换位置。如果在该时间之前发生了钥匙组103被存放至钥匙交换位置,则所述通知生成器进行至块465并检测钥匙组103的归还,在检测之后,通知生成器进行至块470,在块470通知钥匙管理员钥匙组103被归还。如果发生了钥匙组103未在该时间之前被归还,当检测时间已过时通知生成器进行至块455,在块455之后,通知生成器进行至块460,在块460,通知生成器通知访客104:直到相关时间为止都没有取走钥匙组103。如果钥匙组103后来被归还,通知生成器140进行至块465。From block 445, the notification generator proceeds to block 450, where it determines a time by which the guest user 104 is scheduled to return the key set 103 to the key exchange location. If the key set 103 is deposited at the key exchange location before this time, the notification generator proceeds to block 465 and detects the return of the key set 103. After this detection, the notification generator proceeds to block 470, where it notifies the key administrator that the key set 103 has been returned. If the key set 103 is not returned before this time, the notification generator proceeds to block 455 when the detection time has expired. After block 455, the notification generator proceeds to block 460, where it notifies the guest 104 that the key set 103 was not removed until the relevant time. If the key set 103 is subsequently returned, the notification generator 140 proceeds to block 465.

通知生成器140在被设置的情况下可以以在钥匙交换服务器108上运行的软件、以被并入钥匙交换服务器108或者对于钥匙交换服务器108而言是可访问的硬件或者以软件和硬件的混合的形式来实现。通知生成器140在被设置的情况下可以与钥匙交换服务器108的其他部分成一体或者可以被实现为分开的部件或子系统。The notification generator 140, if provided, may be implemented as software running on the key exchange server 108, as hardware incorporated into or accessible to the key exchange server 108, or as a hybrid of software and hardware. The notification generator 140, if provided, may be integrated with other portions of the key exchange server 108 or may be implemented as a separate component or subsystem.

图6A、图6A和图6B为根据一个实施例的钥匙交换应用的示例性图形用户界面的截屏。图6A和图6B示出了管理用户能够用来为访客用户分配对管理用户的钥匙组的存取权的管理钥匙交换界面的示例性屏幕。图6C示出了向访客用户显示在特定钥匙交换中心处可领取所请求的钥匙组的通知的访客用户钥匙交换界面的示例性屏幕。Figures 6A, 6B, and 6C are screenshots of an exemplary graphical user interface for a key exchange application, according to one embodiment. Figures 6A and 6B illustrate exemplary screen shots of an administrative key exchange interface that an administrative user can use to assign access to the administrative user's key set to a guest user. Figure 6C illustrates an exemplary screen shot of a guest user key exchange interface that displays a notification to a guest user that a requested key set is available for pick-up at a specific key exchange center.

各种客户端计算装置可以用来辅助钥匙组的存放和取出并且以其他方式与钥匙交换服务器108进行交互。例如,具有NFC功能的平板电脑或其他类似装置可以用来处理钥匙领取/交出。装置可以包含应用,所述应用执行钥匙交换中心功能,例如扫描钥匙组的标记。服务器108可以使用与钥匙交换位置的操作者相关联的凭证来认证应用。这些凭证可以与钥匙交换位置的物理位置相关联。可以借助于平板电脑或其他装置来提供用于保持或找到钥匙组的信息(例如储藏箱编号)。Various client computing devices can be used to facilitate the storage and retrieval of key sets and otherwise interact with the key exchange server 108. For example, an NFC-enabled tablet or other similar device can be used to handle key collection/handover. The device can include an application that performs key exchange center functions, such as scanning a tag on the key set. The server 108 can authenticate the application using credentials associated with the operator of the key exchange location. These credentials can be associated with the physical location of the key exchange location. Information used to store or locate the key set (e.g., a storage bin number) can be provided via the tablet or other device.

图8示出可以设置在钥匙交换位置的示例性钥匙储存柜500。柜500包括多个储藏箱502,在该实施例中所述多个储藏箱502均通过单独的门504被访问。每个门504可以由电控机构506锁定闭合。控制器510被连接至机构506并且因此能够使门504锁定或者使门504解锁,从而用户可以打开门以将钥匙组放入相应的储藏箱502或者从储藏箱502取走钥匙组。FIG8 illustrates an exemplary key storage cabinet 500 that can be located at a key exchange location. Cabinet 500 includes multiple storage boxes 502, each of which is accessed through a separate door 504 in this embodiment. Each door 504 can be locked and closed by an electronically controlled mechanism 506. A controller 510 is connected to mechanism 506 and can thereby lock or unlock door 504, allowing a user to open the door to place a key set into or remove a key set from a corresponding storage box 502.

控制器510具有允许其借助于互联网与服务器(例如,图1中所示的服务器108)通信的有线或无线网络接口。举例来说,控制器510可以包括无线网络接口,例如WiFi接口或蜂窝数据接口。钥匙储存柜500包括用于将电力供给至控制器510的电源512。在某些实施例中,电源连接至外部源,例如市电。在其他实施例中,电源包括电池和/或太阳能电池。The controller 510 has a wired or wireless network interface that allows it to communicate with a server (e.g., server 108 shown in FIG1 ) via the Internet. For example, the controller 510 may include a wireless network interface, such as a WiFi interface or a cellular data interface. The key storage cabinet 500 includes a power supply 512 for supplying power to the controller 510. In some embodiments, the power supply is connected to an external source, such as mains electricity. In other embodiments, the power supply includes a battery and/or a solar cell.

用于扫描钥匙标记的扫描仪514与每个储藏箱502相关联。扫描仪514与控制器510进行数据通信。在某些实施例中,控制器510包括用户接口(未示出),所述用户接口允许控制器510被访客用户用作与钥匙交换服务器108通信的客户端装置以请求对钥匙组的发放,或者被钥匙管理员用作与钥匙交换服务器108通信的客户端装置以交出钥匙组。储存柜500可以包括显示器或用于向用户指示具体储藏箱的其他系统。例如,被配置成显示储藏箱编号的LCD显示器、与每个储藏箱相关联的LED或LCD等。A scanner 514 for scanning key tags is associated with each storage box 502. The scanner 514 is in data communication with the controller 510. In some embodiments, the controller 510 includes a user interface (not shown) that allows the controller 510 to be used by a guest user as a client device communicating with the key exchange server 108 to request the issuance of a key set, or to be used by a key administrator as a client device communicating with the key exchange server 108 to hand over a key set. The storage cabinet 500 may include a display or other system for indicating a specific storage box to the user. For example, an LCD display configured to display the storage box number, an LED or LCD associated with each storage box, etc.

如在阅读本说明书时将理解的,本文描述的钥匙交换系统和方法为资产所有者或资产管理者(或者资产的占有人)提供若干益处。例如,这些系统和方法为资产所有者或资产管理者(例如房地产管理公司)提供了用于为一个或更多个个体提供对资产所有者或资产管理者(例如房地产管理公司)的资产的钥匙的存取的方便方式,而无需安装密码箱、将钥匙隐藏在在资产外不或者在实际现场与个体碰面。资产所有者或者资产管理者能够通过与钥匙交换服务器通信的客户端装置(例如智能手机),通过限制每个个体能够存取钥匙的时间来控制多个连续拜访者的存取权。这在资产所有者或资产管理者将资产出租给访客或者需要向特定拜访者(例如,承包商、清洁人员、房地产经纪人、评估人员等)授予临时存取权的情况会是有用的。此外,使用本文描述的系统和方法,资产所有者或资产管理者可以对同一资产的多个钥匙组授予存取权。例如,资产拥有者或资产管理者可以使租用所述资产的当前访客可使用一个钥匙组,而资产的清洁人员是可使用另一钥匙组。As will be understood upon reading this specification, the key exchange systems and methods described herein provide several benefits to asset owners or asset managers (or occupiers of an asset). For example, these systems and methods provide an asset owner or asset manager (e.g., a real estate management company) with a convenient way to provide one or more individuals with access to keys to the asset owner's or asset manager's (e.g., real estate management company) assets without having to install a lockbox, hide the keys outside the asset, or physically meet with the individual on site. The asset owner or asset manager can control access rights for multiple consecutive visitors by limiting the time each individual can access the keys through a client device (e.g., a smartphone) that communicates with a key exchange server. This can be useful in situations where the asset owner or asset manager rents an asset to visitors or needs to grant temporary access rights to specific visitors (e.g., contractors, cleaning staff, real estate agents, appraisers, etc.). In addition, using the systems and methods described herein, the asset owner or asset manager can grant access rights to multiple sets of keys to the same asset. For example, a property owner or property manager may make one set of keys available to current guests renting the property, while another set of keys may be available to the property's cleaning staff.

本文描述的钥匙交换系统和方法还可以为资产的访客或拜访者提供若干益处。例如,使用这些钥匙交换系统和方法,正租用资产的访客不需要使他的到达时间和其业主的可用时间相协调。访客可以在被授权的存取期和钥匙交换中心的工作时间内的任何时候获得资产的钥匙。钥匙交换系统和方法还为访客提供了在拜访结束后归还钥匙的方便方式。The key exchange systems and methods described herein can also provide several benefits to property visitors. For example, using these key exchange systems and methods, a property visitor who is renting a property does not need to coordinate their arrival time with the property owner's availability. Visitors can obtain keys to the property at any time during their authorized access period and the key exchange center's operating hours. The key exchange systems and methods also provide a convenient way for visitors to return keys after their visit.

用作钥匙交换中心的商家(例如,举例来说,咖啡馆)(除了可能由钥匙交换网络的运营商/所有者可能提供给商家的用于换取商家的在持有、管理或运营钥匙交换中心方面的服务的潜在直接补偿以外)还可以受益于由来领取或交出钥匙组的用户带来的增加的业务量。Merchants (such as, for example, cafes) that serve as key exchange centers can also benefit from increased business brought in by users who come to pick up or hand in sets of keys (in addition to potential direct compensation that may be provided to the merchant by the operator/owner of the key exchange network in exchange for the merchant's services in holding, managing or operating the key exchange center).

通过其中系统被配置成支持忠诚计划的实施例,这样的客流量的值能够增加,在所述忠诚计划中,每当用户在钥匙交换中心网络中的商家进行购买时,当客户端装置验证了该购买活动和用户的身份时,用户可以在钥匙交换系统中累积信用或值。这样的忠诚计划会鼓励钥匙交换计划的用户成为钥匙交换中心网络中的商家的顾客。The value of such foot traffic can be increased through embodiments in which the system is configured to support a loyalty program in which each time a user makes a purchase at a merchant in the key exchange center network, the user can accumulate credit or value in the key exchange system when the client device verifies the purchase activity and the user's identity. Such a loyalty program encourages users of the key exchange program to become customers of merchants in the key exchange center network.

本文所描述的系统易于扩展。例如,单个钥匙存取服务器(例如,108)可以服务大量的钥匙存取位置。这些钥匙存取位置中的一些可以为不同品牌的或者以不同方式呈现给公众。在某些实施例中,不同的客户端软件(例如,用户用于管理针对钥匙组的存取规则的软件或者在钥匙交换位置处使用的客户端软件)对于不同的用户可以是不同的。在这样的实施例中,服务器系统108可以管理在各种不同品牌的钥匙交换位置处的钥匙组。在某些实施例中,一个或更多个钥匙存取服务器108可以为网络的一部分,所述钥匙存取服务器服务于分布在多个钥匙存取位置的登入所述网络的若干钥匙柜120或自动钥匙交换亭。钥匙交换服务器系统可以具有应用编程接口(API,application programming interface),该接口允许程序员将其自身的应用写入由钥匙存取服务器系统108提供的存取功能。这样的应用可以包括,例如:提供定制接口以使钥匙柜120或自动钥匙交换亭能够与钥匙存取服务器108和客户端装置进行交互以执行特定钥匙交换功能的应用,以及提供监视在钥匙存取位置的钥匙柜120或自动钥匙交换亭的状态的应用。定制应用和对定制应用的更新可以被远程地推送至钥匙柜或自动钥匙交换亭。The system described herein is easily scalable. For example, a single key access server (e.g., 108) can service a large number of key access locations. Some of these key access locations may be of different brands or presented to the public in different ways. In certain embodiments, different client software (e.g., software used by users to manage access rules for key sets or client software used at key exchange locations) may be different for different users. In such embodiments, the server system 108 can manage key sets at various brands of key exchange locations. In certain embodiments, one or more key access servers 108 may be part of a network that services several key cabinets 120 or automated key exchange kiosks distributed across multiple key access locations and logged into the network. The key exchange server system may have an application programming interface (API) that allows programmers to write their own applications to access the functionality provided by the key access server system 108. Such applications may include, for example, applications that provide customized interfaces to enable the key cabinet 120 or automated key exchange kiosk to interact with the key access server 108 and client devices to perform specific key exchange functions, and applications that provide monitoring of the status of the key cabinet 120 or automated key exchange kiosk at the key access location. Customized applications and updates to customized applications can be pushed remotely to the key cabinet or automated key exchange kiosk.

作为非限制性示例,汽车租赁公司可能希望在汽车租赁点使用这样的API来从人员配备模式过渡到自动钥匙交换系统,资产管理或预订公司可能希望集成这样的API以向其客户提供对其自有品牌的、通过当地商家合伙的网络分布的钥匙交换中心的访问,汽车共享公司可能希望使用这样的API而不是在车内安装新技术来提供使用汽车钥匙的汽车共享选择,具有大厅或前台/服务台的大楼可以使用这样的API来实现针对其住户或访客的自动接待系统,或者在不同时间将钥匙分给不同个体的其他商家(如,举例来说,电影院或者运输公司)可以使用这样的API来提供钥匙管理系统以管理其钥匙物流。As non-limiting examples, a car rental company may wish to use such an API to transition from a staffed model to an automated key exchange system at car rental locations, a property management or reservation company may wish to integrate such an API to provide its customers with access to its own branded key exchange centers distributed through a network of local merchant partners, a car sharing company may wish to use such an API to offer car sharing options using car keys rather than installing new technology in vehicles, a building with a lobby or front desk/service desk may use such an API to implement an automated reception system for its residents or visitors, or other businesses that distribute keys to different individuals at different times (such as, for example, a movie theater or a transportation company) may use such an API to provide a key management system to manage their key logistics.

在某些实施例中,个体用户可以选择允许系统自动地生成存取规则(或者系统可以被配置成自动地生成存取规则)。例如,系统可以包括人员可能希望允许系统自动地生成规则的预订功能,所述规则将允许服务提供者响应于来自用户的服务请求访问资产。例如,用户所请求的清洁、购物、递送、维修或其他服务的认可供应者可以自动获得钥匙组。作为另一示例,资产预订公司(例如,汽车租赁公司或住宅租赁公司)可以建立一种系统,在该系统自动生成存取规则或者用于在发生预订时由管理用户基于预订数据批准。In some embodiments, an individual user may choose to allow the system to automatically generate access rules (or the system may be configured to automatically generate access rules). For example, the system may include a reservation function in which a person may wish to allow the system to automatically generate rules that would allow service providers to access assets in response to service requests from users. For example, an approved provider of cleaning, shopping, delivery, repair, or other services requested by a user could automatically obtain a set of keys. As another example, a property reservation company (e.g., a car rental company or a home rental company) could establish a system in which access rules are automatically generated or for approval by an administrative user based on reservation data when a reservation occurs.

除了个体服务请求,还可能实现不间断的服务请求。作为非限制性示例,钥匙交换服务可以向用户提供使包裹递送到虚拟地址的选项。这样的包裹然后可以由递送人员递送至用户的家中,其中在包裹到达时向所述递送人员自动提供对用户的钥匙的存取权。可以针对有限的时间段来授权。如果钥匙组没有以及时的方式归还,则系统可以提供自动警告。In addition to individual service requests, continuous service requests are also possible. As a non-limiting example, a key exchange service could offer users the option of having a package delivered to a virtual address. This package could then be delivered to the user's home by a delivery person, who would automatically be provided access to the user's keys upon arrival. This authorization could be granted for a limited time period. If the key set is not returned in a timely manner, the system could provide an automatic warning.

在某些实施例中,可以由钥匙交换中心处的人员通过客户端装置或者储藏箱中的嵌入式传感器周期性地扫描钥匙储藏箱中的钥匙组以更新钥匙交换系统的钥匙组库存。每个储藏箱可以具有指示储藏箱的身份的可扫描的标识符,从而该扫描检测钥匙标识符和储藏箱标识符中的任一项或者两项。这样的周期性库存扫描可以控制人为错误或者对钥匙放置的干扰,检测安全漏洞,提供用于向用户的账户发布的经更新的位置数据或用于使钥匙管理员放心的库存确认。In some embodiments, personnel at a key exchange center can periodically scan the key sets in key storage boxes using a client device or an embedded sensor in the storage box to update the key set inventory of the key exchange system. Each storage box can have a scannable identifier indicating the identity of the storage box, so that the scan detects either or both the key identifier and the storage box identifier. Such periodic inventory scans can control for human error or interference with key placement, detect security breaches, provide updated location data for publication to users' accounts, or provide inventory confirmation for reassurance to key administrators.

在某些实施例中,系统可以提供允许访客用户为访问不同资产而进行预留的预订服务。某些用户可能希望允许系统自动生成规则,以允许已经预订其资产的访客用户在预订时间段期间存取用于所预订的资产的钥匙组。所述系统可以被配置成自动生成这样的规则。In some embodiments, the system may provide a reservation service that allows guest users to make reservations for access to different properties. Some users may wish to allow the system to automatically generate rules to allow guest users who have reserved their properties to access the key set for the reserved property during the reserved time period. The system may be configured to automatically generate such rules.

在某些实施例中,系统包括日历和用于管理资产预订的其他工具。身为钥匙管理员的用户可以使用这样的特征来管理存取调度并且将存取调度聚集进单个系统(即便是这些用户以在系统外部的方式为访客提供消息)。In some embodiments, the system includes a calendar and other tools for managing property bookings. Users who are key managers can use such features to manage access schedules and aggregate access schedules into a single system (even if these users provide messages to visitors in a way that is external to the system).

可以理解的是,可以应用本文所描述的系统来支持一系列不同商业模式。系统可以提供特定特征以支持这些商业模式。例如,在某些实施例中,所有者或者希望将钥匙组转交至其他一些人员的其他人员可以为对系统的这种使用付钱。在这样的实施例中,在允许所有者交出要被交换的钥匙组之前,系统可从所有者收付款(例如,信用卡支付银行转账、借记卡支付等)。在可选方式中,系统可以在钥匙组的交换已经发生之前或之后,自动地向所有者计费。这样的支付或计费可以为统一费率或者可以基于钥匙交换的详情(例如,钥匙在被预期接收方领取之前被保持的时间有多长)。在计费是基于钥匙交换的详情的情况下,系统可以自动地监视这样的详情。It is understandable that the system described herein can be applied to support a series of different business models. The system can provide specific features to support these business models. For example, in certain embodiments, the owner or other personnel wishing to transfer the key set to other personnel can pay for this use of the system. In such an embodiment, before allowing the owner to hand over the key set to be exchanged, the system can collect payment (for example, credit card payment, bank transfer, debit card payment, etc.) from the owner. In an optional manner, the system can automatically bill the owner before or after the exchange of the key set has occurred. Such payment or billing can be a flat rate or can be based on the details of the key exchange (for example, how long the key is kept before being collected by the expected recipient). When billing is based on the details of the key exchange, the system can automatically monitor such details.

在某些实施例中,系统的用户可以为(例如,以订购的方式)对系统的访问付钱。在某些情况下,用户可以支付费用,从而有资格成为钥匙管理员。费用可以是例如订购一段时间的方式。系统可以自动地向用户计费并且可以拒绝从迄今为止尚未支付适当费用的用户接收用于交换的钥匙组。In some embodiments, users of the system can pay for access to the system (e.g., on a subscription basis). In some cases, users can pay a fee to qualify as key administrators. The fee can be in the form of a subscription for a period of time, for example. The system can automatically bill users and may refuse to accept key sets in exchange from users who have not paid the appropriate fee to date.

如本文所描述的系统可以以可选的方式被配置成向系统的用户递送广告或优惠券。例如,系统可以将与钥匙组有关的资产的本地商家的广告和/或优惠券递送至所有钥匙接收方或者所选择的钥匙接收方(所述商家通常对于钥匙交换位置也是本地的)。系统可以在钥匙交换位置所处的城市或乡镇中或者在周围区域中递送大约在钥匙交换时发生的活动的活动门票的报价。The system as described herein can optionally be configured to deliver advertisements or coupons to users of the system. For example, the system can deliver advertisements and/or coupons for local merchants of assets related to the key set to all or selected key recipients (the merchants are typically also local to the key exchange location). The system can deliver offers for event tickets to events occurring approximately at the time of the key exchange in the city or town where the key exchange location is located, or in the surrounding area.

如本文描述的系统可以包括预订系统或者与预订系统相关联,所述预订系统允许人们预订对资产的访问并且为这样的资产访问付钱。系统可以包括针对钥匙交换进行收费。A system as described herein may include or be associated with a reservation system that allows people to reserve access to a property and pay for such property access.The system may include charging a fee for key exchanges.

在某些实施例中,系统可以被配置成支持对由管理钥匙交换中心的商家提供并且并入钥匙交换服务的预订和支付系统的增值服务的提供和/或计费。作为非限制性示例,可以向钥匙交换中心的钥匙管理员提供以下选项:钥匙管理中心在发放钥匙之前检查或者扫描访客的ID、预先购买食品和饮品(例如,在为咖啡馆的钥匙交换中心处)以供访客在到达时领取,或者在营业时间之后通过将指定钥匙放置在商家位置外部的密码箱中来处理钥匙领取。此外,可以引入工具来跟踪服务水平和活动,例如用户满意度、钥匙库存扫描的频率、平均钥匙领取次数、顾客花费在增值服务上的金额等。In certain embodiments, the system can be configured to support the provision and/or billing of value-added services provided by merchants managing key exchange centers and incorporated into the reservation and payment systems of the key exchange services. As non-limiting examples, key managers at key exchange centers can be offered the following options: the key management center checks or scans the visitor's ID before issuing a key, pre-purchases food and beverages (e.g., at a key exchange center that is a cafe) for the visitor to pick up upon arrival, or handles key pickup after business hours by placing designated keys in a lockbox outside the merchant's location. In addition, tools can be introduced to track service levels and activities, such as user satisfaction, frequency of key inventory scans, average number of key pickups, amount of money spent by customers on value-added services, etc.

在某些实施例中,钥匙标识符可以与代金券相关联,该代金券由钥匙管理员购买、用于在管理钥匙交换中心的商家或添加到网络以接受这样的代金券的其他商家使用。代金券可以由钥匙管理员购买由访客例如游客使用以提升其旅游体验。例如,钥匙管理员可能购买一定金额或者一定数量的当地咖啡馆的食品和饮品,购买当地景点的门票等,并且使它们与特定钥匙组和/或访客相关联以在访客停留期间进行使用。这样的优惠券在客户端装置扫描钥匙标记和钥匙交换服务器接收钥匙标识符、检查优惠券以及向客户端装置发送在该位置该特定优惠券可用于兑现时可以被兑现。In some embodiments, a key identifier can be associated with a voucher that can be purchased by a key keeper for use at a merchant that manages a key exchange center or at other merchants that have been added to the network to accept such vouchers. Vouchers can be purchased by a key keeper for use by a visitor, such as a tourist, to enhance their travel experience. For example, a key keeper might purchase a certain amount or quantity of food and drinks at a local cafe, purchase tickets to a local attraction, and so on, and associate them with a specific key set and/or visitor for use during the visitor's stay. Such vouchers can be redeemed when a client device scans the key tag and the key exchange server receives the key identifier, checks the voucher, and sends a notification to the client device indicating that the specific voucher is available for redemption at that location.

在不同实施例中,支付可以采用由各种事件触发的各种形式。钥匙管理员可以每次使用钥匙交换系统时进行支付,在这种情况下,针对每次领取和/或交出钥匙组对钥匙管理员计费。这样的计费可以包括“隔夜费用”以使计费与对钥匙交换设施的基于时间的使用相匹配。可替换地,对于包裹使用,可以支付反复订购费。支付可以被链接到系统中的不同事件,例如预订、增值服务或者代金券购物、服务请求、访客对资产的预订、钥匙的交出或领取等。In different embodiments, payment can take various forms, triggered by various events. A key keeper can pay each time they use the key exchange system, in which case they are billed for each collection and/or handover of a key set. Such billing can include an "overnight fee" to align billing with time-based use of the key exchange facility. Alternatively, for package use, a recurring subscription fee can be paid. Payments can be linked to different events in the system, such as reservations, value-added service or voucher purchases, service requests, guest reservations for assets, key handovers or collections, and so on.

在某些实施例中,系统被配置成允许钥匙管理员通过依赖于存取技术而不是物理钥匙的钥匙交换系统共同管理其他资产或者将钥匙交换系统中的资产从钥匙过渡到数字锁技术。在这样的情况下,钥匙交换系统可以通过如下方式支持这样的资产增加和过渡:a)提供可以无缝地替代依赖于交换物理钥匙的系统的结合了数字锁的系统,b)(例如,通过API)将其预订系统与其他数字锁提供者结合,或者c)在数字锁提供者没有提供或者拒绝提供结合点的情况下,允许钥匙管理者将对数字锁有存取权的数字钥匙(例如,诸如以低成本移动装置的形式)储存在钥匙交换中心。跨平台并且技术不限的实施例可以以安全和受控方式向访客用户和被授权的服务供应者提供对各种资产的访问。In some embodiments, the system is configured to allow key managers to co-manage other assets through a key exchange system that relies on access technology other than physical keys or to transition assets in a key exchange system from keys to digital lock technology. In such cases, the key exchange system can support such asset addition and transition by: a) providing a system that incorporates digital locks that can seamlessly replace systems that rely on exchanging physical keys, b) integrating its reservation system with other digital lock providers (e.g., via an API), or c) allowing key managers to store digital keys (e.g., such as in the form of low-cost mobile devices) that provide access to digital locks at a key exchange center if the digital lock provider does not provide or refuses to provide an integration point. Cross-platform and technology-agnostic embodiments can provide access to a variety of assets to guest users and authorized service providers in a secure and controlled manner.

前述内容仅仅是为了支持各种商业功能的目的而可以并入本文所描述的系统的特征的非限制性示例。.The foregoing is merely a non-limiting example of features that may be incorporated into the systems described herein for the purpose of supporting various business functions.

其中部件(例如,服务器、客户端装置、数据库、软件模块、处理器、程序存储器、钥匙、钥匙链、钥匙柜、储藏箱等)除非另有所指,否则在上文是指这样的部件的提及(包括对“装置”的提及),所述部件应当为解释为包括作为该部件的等同物的执行所述部件(即,也就是说,在功能上是等同的)的功能的任何部件,包括在结构上不等价于执行所图示的示例性实施例中的功能的所公开的结构的部件。Where a component (e.g., a server, a client device, a database, a software module, a processor, a program memory, a key, a key chain, a key cabinet, a storage box, etc.) is referred to above as such a component (including references to "device"), unless otherwise indicated, the component should be interpreted as including any component that performs the function of the component (i.e., that is, is functionally equivalent) as an equivalent of the component, including components that are not structurally equivalent to the disclosed structure that performs the function in the illustrated exemplary embodiments.

尽管已经在上面论述了多个示例性方面和实施例,但本领域的技术人员将认识到其特定修改、变换、增加和子组合。例如:While a number of exemplary aspects and embodiments have been discussed above, those skilled in the art will recognize certain modifications, permutations, additions, and sub-combinations thereof. For example:

·在本文所描述的实施例中,钥匙标识符在附接至钥匙或钥匙组上的钥匙链上进行编码。在其他实施例中,钥匙标识符可以在附接至钥匙的某些其他物体上进行编码,或者甚至直接处于钥匙自身上。In the embodiments described herein, the key identifier is encoded on a key fob attached to a key or set of keys. In other embodiments, the key identifier may be encoded on some other object attached to the key, or even directly on the key itself.

·在特定实施例中,唯一序列号可以被印刷或刻在用在钥匙交换网络中的每个钥匙链上。序列号可以链接至钥匙的唯一钥匙标识符,从而该序列号可以用于识别钥匙(作为扫描钥匙链的可替换方式)。例如,如果具有NFC功能的装置不可用或者在对钥匙链执行可视检查以识别钥匙更方便的情况下,可以使用序列号。In certain embodiments, a unique serial number may be printed or engraved on each key fob used in a key exchange network. The serial number may be linked to the key's unique key identifier so that the serial number can be used to identify the key (as an alternative to scanning the key fob). For example, the serial number may be used if an NFC-enabled device is unavailable or if it is more convenient to perform a visual inspection of the key fob to identify the key.

·在图1图示的实施例中,钥匙交换服务器108包括用户凭证数据库131、管理用户数据库132、钥匙库存数据库133以及存取规则数据库134。这样的数据库不必如所示的那样存在于钥匙交换服务器108上。在其他实施例中,这些数据库中的一个或更多个可以在钥匙交换服务器108可访问的另一服务器或者储存装置中提供。In the embodiment illustrated in FIG1 , the key exchange server 108 includes a user credential database 131, an administrative user database 132, a key inventory database 133, and an access rules database 134. Such databases need not reside on the key exchange server 108 as shown. In other embodiments, one or more of these databases may be provided on another server or storage device accessible to the key exchange server 108.

因此,意图的是,所附权利要求和此后所引入的权利要求不应当受限于示例中所阐述的实施例,而应当给出与说明书整体上一致的最广泛的理解。Therefore, it is intended that the appended claims and claims hereafter introduced should not be limited to the embodiments set forth in the examples, but should be given the broadest interpretation consistent with the description as a whole.

Claims (59)

1.一种便于在钥匙存取位置交换包括一个或更多个钥匙的钥匙组的方法,所述方法包括:1. A method for facilitating the exchange of a key set comprising one or more keys at a key access location, the method comprising: 扫描附接至所述钥匙组的钥匙标记以获取唯一钥匙标识符;识别所述钥匙存取位置;在所述钥匙存取位置处为所述钥匙组分配储藏箱;以及使所述储藏箱和所述钥匙存取位置与所述钥匙组相关联;Scan the key tag attached to the key group to obtain a unique key identifier; identify the key access location; assign a storage box to the key group at the key access location; and associate the storage box and the key access location with the key group; 接收针对所述钥匙组的存取规则,其中所述存取规则识别被授权方;Receive access rules for the key group, wherein the access rules identify the authorized party; 向所述被授权方发布所述钥匙存取位置;Publish the key access location to the authorized party; 通过客户端装置从所述被授权方接收针对所述钥匙组的存取请求,所述存取请求提供用户凭证;The client device receives an access request for the key group from the authorized party, the access request providing user credentials. 通过对照与所述被授权方相关联的一组凭证而验证在所述存取请求中提供的所述用户凭证来认证所述存取请求;以及The access request is authenticated by verifying the user credentials provided in the access request against a set of credentials associated with the authorized party; and 如果所述存取请求通过认证,则发送提交所述钥匙组的存取指令。If the access request is authenticated, an access instruction to submit the key set is sent. 2.如权利要求1所述的方法,包括:确定所述客户端装置的位置,其中认证所述存取请求还包括将所述客户端装置的位置与和所述钥匙组相关联的所述钥匙存取位置相比较。2. The method of claim 1, further comprising: determining the location of the client device, wherein authenticating the access request further comprises comparing the location of the client device with the key access location associated with the key group. 3.如权利要求1或2中的任一项所述的方法,包括:通过从所述客户端装置接收以下内容中的一项或更多项来识别所述钥匙存取位置:GPS数据、移动网络位置数据、装置身份数据、与所述装置的物理交互以及用户数据输入。3. The method of any one of claims 1 or 2, comprising: identifying the key access location by receiving one or more of the following from the client device: GPS data, mobile network location data, device identity data, physical interaction with the device, and user data input. 4.如权利要求2所述的方法,包括:通过从所述客户端装置接收以下内容中的一项或更多项来确定所述客户端装置的位置:GPS数据、移动网络位置数据、装置身份数据、与所述装置的物理交互以及用户数据输入。4. The method of claim 2, further comprising: determining the location of the client device by receiving one or more of the following from the client device: GPS data, mobile network location data, device identity data, physical interaction with the device, and user data input. 5.如权利要求1所述的方法,其中所述存取规则包括被授权存取期,所述方法包括识别所述存取请求的时间,并且认证所述存取请求包括将所述存取请求的时间与所述被授权存取期相比较。5. The method of claim 1, wherein the access rule includes an authorized access period, the method includes identifying the time of the access request, and authenticating the access request includes comparing the time of the access request with the authorized access period. 6.如权利要求1所述的方法,包括:接收针对所述钥匙组的多个存取规则,其中所述存取规则中的每条规则识别被授权方和相应的被授权存取期。6. The method of claim 1, further comprising: receiving a plurality of access rules for the key group, wherein each access rule identifies an authorized party and a corresponding authorized access period. 7.根据权利要求6所述的方法,包括:在所述相应的被授权存取期的预定时间内向所述被授权方中的每一个被授权方发布所述钥匙存取位置。7. The method of claim 6, further comprising: publishing the key access location to each of the authorized parties during a predetermined time period of the respective authorized access period. 8.如权利要求1所述的方法,包括:通过在所述钥匙存取位置发起对所述钥匙标记的扫描来验证正确钥匙组被提交。8. The method of claim 1, further comprising: verifying that the correct key set has been submitted by initiating a scan of the key marker at the key access location. 9.如权利要求1所述的方法,其中发送用于提交所述钥匙组的存取指令包括向所述客户端装置发送与所述钥匙组相关联的储藏箱。9. The method of claim 1, wherein sending an access instruction for submitting the key group includes sending a storage box associated with the key group to the client device. 10.如权利要求1所述的方法,其中所述储藏箱能够由控制和处理单元来控制,并且发送提交所述钥匙组的存取指令包括将信号发送至所述控制和处理单元以使所述钥匙组成为可存取的。10. The method of claim 1, wherein the storage box is controllable by a control and processing unit, and sending an access instruction to submit the key set includes sending a signal to the control and processing unit to make the key set accessible. 11.如权利要求1所述的方法,包括:通过激活所述储藏箱中的扫描仪以从所述钥匙标记读取所述钥匙组的所述钥匙标识符来验证所请求的钥匙组处于所述储藏箱中。11. The method of claim 1, further comprising: verifying that the requested key set is in the storage box by activating a scanner in the storage box to read the key identifier of the key set from the key mark. 12.如权利要求1所述的方法,其中所述钥匙标识符包括URL。12. The method of claim 1, wherein the key identifier includes a URL. 13.如权利要求12所述的方法,其中所述URL被链接至被分配给所述钥匙组的唯一标识信息。13. The method of claim 12, wherein the URL is linked to unique identification information assigned to the key group. 14.如权利要求13所述的方法,其中所述标识信息包括数字、字母或其他字母数字字符串。14. The method of claim 13, wherein the identification information includes numbers, letters or other alphanumeric strings. 15.如权利要求1任一项所述的方法,其中所述钥匙标识符在附接至所述钥匙组的钥匙链上进行编码。15. The method of any one of claims 1, wherein the key identifier is encoded on a key chain attached to the key group. 16.如权利要求15所述的方法,其中所述钥匙标识符在所述钥匙链上的NFC标签中进行编码。16. The method of claim 15, wherein the key identifier is encoded in an NFC tag on the keychain. 17.如权利要求1所述的方法,包括:周期性地扫描在一个或更多个钥匙交换位置的钥匙组的钥匙标记并且基于来自周期性扫描的信息来更新钥匙组与储藏箱和所述钥匙存取位置的关联性。17. The method of claim 1, further comprising: periodically scanning key tags of a key group at one or more key exchange locations and updating the association between the key group and the storage box and the key access location based on information from the periodic scans. 18.如权利要求1所述的方法,其中向所述被授权方发布所述钥匙存取位置包括将所述钥匙存取位置发送至所述被授权方可访问的用户账户页面或电子邮箱账户。18. The method of claim 1, wherein publishing the key access location to the authorized party includes sending the key access location to a user account page or email account accessible to the authorized party. 19.如权利要求1所述的方法,包括:响应于将所述钥匙组提交至所述被授权方和在钥匙存取位置交出所述钥匙组中的一项或更多项来自动地生成送至与所述钥匙组相关联的用户的通知。19. The method of claim 1, further comprising: automatically generating a notification to a user associated with the key group in response to submitting the key group to the authorized party and handing over one or more items of the key group at a key access location. 20.如权利要求1所述的方法,包括:如果直到指定时间为止还未将所述钥匙组提交至所述被授权方,则自动生成送至与所述钥匙组相关联的用户的通知。20. The method of claim 1, further comprising: automatically generating a notification to the user associated with the key group if the key group has not been submitted to the authorized party by a specified time. 21.如权利要求5所述的方法,包括:在所述存取期到期之前的预定时间自动生成送至所述被授权方的通知。21. The method of claim 5, further comprising: automatically generating a notification to be sent to the authorized party at a predetermined time prior to the expiration of the access period. 22.如权利要求1所述的方法,包括:响应于将所述钥匙组提交至所述被授权方来自动生成送至所述被授权方的通知。22. The method of claim 1, further comprising: automatically generating a notification to be sent to the authorized party in response to submitting the key set to the authorized party. 23.如权利要求22所述的方法,包括:从与所述钥匙组相关联的管理用户接收送至所述被授权方的通知的内容,并且在送至所述被授权方的通知中包括所述内容。23. The method of claim 22, further comprising: receiving, from an administrative user associated with the key group, the content of a notification to the authorized party, and including the content in the notification to the authorized party. 24.如权利要求1所述的方法,包括:向所述被授权方自动提供一个或更多个预购物品、优惠券或所述钥匙交换位置本地的其他商品或服务报价。24. The method of claim 1, further comprising: automatically providing the authorized party with one or more pre-purchased items, coupons, or other offers for goods or services local to the key exchange location. 25.如权利要求1所述的方法,包括:响应于针对家庭服务的用户请求、资产预订、反复存取请求以及由被授权来请求钥匙交换服务的第三方系统做出的请求中的一项或更多项来自动生成所述存取规则。25. The method of claim 1, further comprising: automatically generating the access rules in response to one or more of a user request for a home service, an asset reservation, a recurring access request, and a request made by a third-party system authorized to request the key exchange service. 26.一种便于在多个钥匙存取位置中的一个密钥存取位置异步交换包括一个或更多个钥匙的钥匙组的系统,所述系统包括钥匙交换服务器,所述钥匙交换服务器被配置成:26. A system for facilitating asynchronous exchange of a key group comprising one or more keys at one of a plurality of key access locations, the system comprising a key exchange server configured to: 接收在附接至所述钥匙的钥匙标记上进行编码的唯一钥匙标识符;Receive a unique key identifier encoded on a key tag attached to the key; 确定所述钥匙存取位置;Determine the key access location; 在所述钥匙存取位置处为所述钥匙组分配储藏箱;A storage box is assigned to the key group at the key access location; 使所述储藏箱和所述钥匙存取位置与所述钥匙组相关联;Associate the storage box and the key access location with the key set; 接收或生成针对所述钥匙组的存取规则,其中所述存取规则识别被授权方;Receive or generate access rules for the key group, wherein the access rules identify the authorized party; 向所述被授权方发布所述钥匙存取位置;Publish the key access location to the authorized party; 通过客户端装置从所述被授权方接收针对所述钥匙组的存取请求,所述存取请求提供用户凭证;The client device receives an access request for the key group from the authorized party, the access request providing user credentials. 通过对照与所述被授权方相关联的一组凭证而验证在所述存取请求中提供的所述用户凭证来认证所述存取请求;以及The access request is authenticated by verifying the user credentials provided in the access request against a set of credentials associated with the authorized party; and 如果所述存取请求通过认证,则发送将所述钥匙组提交至所述被授权方的存取指令。If the access request is authenticated, an access instruction is sent to submit the key set to the authorized party. 27.如权利要求26所述的系统,其中所述钥匙存取服务器被配置成确定所述客户端装置的位置并且被配置成通过以下步骤认证所述存取请求,所述步骤包括将所述客户端装置的位置与和所述钥匙组相关联的所述钥匙存取位置相比较。27. The system of claim 26, wherein the key access server is configured to determine the location of the client device and is configured to authenticate the access request by means of the following steps, the steps including comparing the location of the client device with the key access location associated with the key group. 28.如权利要求26或27中的任一项所述的系统,其中所述钥匙存取服务器被配置成通过从所述客户端装置接收以下内容中的一项或更多项来识别所述钥匙存取位置:GPS数据、移动网络位置数据、装置身份数据、与所述装置的物理交互以及用户数据输入。28. The system of any one of claims 26 or 27, wherein the key access server is configured to identify the key access location by receiving one or more of the following from the client device: GPS data, mobile network location data, device identity data, physical interaction with the device, and user data input. 29.如权利要求27所述的系统,其中所述钥匙存取服务器被配置成通过从所述客户端装置接收以下内容中的一项或更多项来确定所述客户端装置的位置:GPS数据、移动网络位置数据、装置身份数据、与所述装置的物理交互以及用户数据输入。29. The system of claim 27, wherein the key access server is configured to determine the location of the client device by receiving one or more of the following from the client device: GPS data, mobile network location data, device identity data, physical interaction with the device, and user data input. 30.如权利要求26所述的系统,其中所述存取规则包括被授权存取期并且所述钥匙存取服务器被配置成识别所述存取请求的时间并且被配置成通过以下步骤认证所述存取请求,所述步骤包括将所述存取请求的时间与所述被授权存取期相比较。30. The system of claim 26, wherein the access rule includes an authorized access period and the key access server is configured to identify the time of the access request and is configured to authenticate the access request by means of a step including comparing the time of the access request with the authorized access period. 31.如权利要求26所述的系统,其中所述钥匙存取服务器被配置成接收或者生成针对所述钥匙组的多个存取规则,其中所述存取规则中的每条规则识别被授权方和相应的被授权存取期。31. The system of claim 26, wherein the key access server is configured to receive or generate a plurality of access rules for the key group, wherein each access rule identifies an authorized party and a corresponding authorized access period. 32.如权利要求26所述的系统,其中所述钥匙存取服务器被配置成在相应的被授权存取期的预定时间内向所述被授权方中的每一个被授权方发布所述钥匙存取位置。32. The system of claim 26, wherein the key access server is configured to publish the key access location to each of the authorized parties within a predetermined time period of the respective authorized access period. 33.如权利要求26所述的系统,包括钥匙柜子系统,所述钥匙柜子系统包括在所述钥匙存取位置的多个储藏箱。33. The system of claim 26, further comprising a key cabinet subsystem, the key cabinet subsystem including a plurality of storage boxes at the key access location. 34.如权利要求33所述的系统,其中所述多个储藏箱中的每一个储藏箱适于接收一个钥匙和钥匙链组合。34. The system of claim 33, wherein each of the plurality of storage boxes is adapted to receive a combination of a key and a keychain. 35.如权利要求33所述的系统,其中所述钥匙柜子系统包括控制和处理单元并且所述钥匙交换服务器被配置成通过向所述控制和处理单元发送信号以使所述钥匙组能够被所述被授权方存取来发送用于提交所述钥匙组的存取指令。35. The system of claim 33, wherein the key cabinet subsystem includes a control and processing unit and the key exchange server is configured to send an access instruction for submitting the key group by sending a signal to the control and processing unit to enable the key group to be accessed by the authorized party. 36.如权利要求35所述的系统,其中所述钥匙柜子系统包括在所述储藏箱中的扫描仪,其中所述钥匙交换服务器被配置成将信号发送至所述控制和处理单元,使所述扫描仪被激活以读取所述钥匙组的所述钥匙标识符从而验证所请求的钥匙组在所述储藏箱中。36. The system of claim 35, wherein the key cabinet subsystem includes a scanner in the storage box, wherein the key exchange server is configured to send a signal to the control and processing unit to activate the scanner to read the key identifier of the key set to verify that the requested key set is in the storage box. 37.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成从对所述钥匙组的扫描接收所述钥匙标识符,并且被配置成根据所述钥匙标识符来验证要提交给所述被授权方的钥匙组是正确的钥匙组。37. The system of claim 26, wherein the key exchange server is configured to receive the key identifier from a scan of the key group and is configured to verify, based on the key identifier, that the key group to be submitted to the authorized party is a correct key group. 38.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成通过向所述客户端装置发送与所述钥匙组相关联的所述储藏箱来发送用于提交所述钥匙的存取指令。38. The system of claim 26, wherein the key exchange server is configured to send an access instruction for submitting the key by sending the storage box associated with the key group to the client device. 39.如权利要求26所述的系统,其中与所述钥匙组相关联的所述钥匙标识符包括URL。39. The system of claim 26, wherein the key identifier associated with the key group includes a URL. 40.如权利要求39所述的系统,其中所述钥匙标识符被链接至在钥匙链上的可视的唯一标识信息。40. The system of claim 39, wherein the key identifier is linked to a visible unique identification information on the key chain. 41.如权利要求26所述的系统,其中所述钥匙标记位于附接至所述钥匙组的钥匙链上。41. The system of claim 26, wherein the key mark is located on a key chain attached to the key set. 42.如权利要求26所述的系统,其中所述钥匙标识符在NFC标签中进行编码。42. The system of claim 26, wherein the key identifier is encoded in the NFC tag. 43.如权利要求42所述的系统,其中所述NFC标签被嵌入金属链坠中的凹陷。43. The system of claim 42, wherein the NFC tag is embedded in a recess in the metal pendant. 44.如权利要求43所述的系统,其中所述NFC标签通过抗金属层与所述链坠的金属分开并且通过环氧树脂层被固定在金属凹陷中。44. The system of claim 43, wherein the NFC tag is separated from the metal of the pendant by an anti-metal layer and is fixed in the metal recess by an epoxy resin layer. 45.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成处理针对所述钥匙组的多个存取规则,其中所述存取规则中的每条规则识别被授权方和相应的被授权存取期。45. The system of claim 26, wherein the key exchange server is configured to process a plurality of access rules for the key group, wherein each access rule identifies an authorized party and a corresponding authorized access period. 46.如权利要求45所述的系统,其中所述钥匙交换服务器被配置成在所述相应的被授权存取期的预定时间内向所述被授权方中的每一个被授权方发布所述钥匙存取位置。46. The system of claim 45, wherein the key exchange server is configured to publish the key access location to each of the authorized parties during a predetermined time period of the respective authorized access period. 47.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成在一个或更多个钥匙交换位置处周期性地触发对钥匙组的钥匙标记的扫描并且被配置成基于来自周期性扫描的信息来更新钥匙组与储藏箱和所述钥匙存取位置的关联性。47. The system of claim 26, wherein the key exchange server is configured to periodically trigger scans of key tags on the key group at one or more key exchange locations and is configured to update the association between the key group and the storage box and the key access location based on information from the periodic scans. 48.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成通过将所述钥匙存取位置发送至所述被授权方可访问的用户账户页面或者电子邮箱账户来向所述被授权方发布钥匙存取位置。48. The system of claim 26, wherein the key exchange server is configured to publish the key access location to the authorized party by sending the key access location to a user account page or email account accessible to the authorized party. 49.如权利要求26所述的系统,包括通知生成器,所述通知生成器被配置成响应于将所述钥匙组提交至所述被授权方和在钥匙存取位置交出所述钥匙组中的一项或更多项来生成送至与所述钥匙组相关联的用户的通知。49. The system of claim 26, further comprising a notification generator configured to generate a notification to a user associated with the key set in response to submitting the key set to the authorized party and handing over one or more items of the key set at a key access location. 50.如权利要求49所述的系统,其中所述通知生成器被配置成如果直到指定时间为止还未将所述钥匙组提交至所述被授权方,则自动生成送至与所述钥匙组相关联的用户的通知。50. The system of claim 49, wherein the notification generator is configured to automatically generate a notification to the user associated with the key group if the key group has not been submitted to the authorized party by a specified time. 51.如权利要求30所述的系统,包括通知生成器,所述通知生成器被配置成生成通知,其中所述通知生成器被配置成在所述存取期到期之前的预定时间自动生成送至所述被授权方的通知。51. The system of claim 30, further comprising a notification generator configured to generate a notification, wherein the notification generator is configured to automatically generate a notification to be sent to the authorized party at a predetermined time prior to the expiration of the access period. 52.如权利要求26所述的系统,其中所述钥匙交换服务器包括通知生成器,所述通知生成器被配置成响应于将所述钥匙组提交至所述被授权方来自动生成送至所述被授权方的通知。52. The system of claim 26, wherein the key exchange server includes a notification generator configured to automatically generate a notification to be sent to the authorized party in response to submitting the key set to the authorized party. 53.如权利要求52所述的系统,其中所述钥匙交换服务器被配置成从与所述钥匙组相关联的管理用户接收送至所述被授权方的通知的内容并且储存所述内容,并且被配置成在送至所述被授权方的通知中包含所述内容。53. The system of claim 52, wherein the key exchange server is configured to receive and store the content of a notification sent to the authorized party from an administrative user associated with the key group, and is configured to include the content in the notification sent to the authorized party. 54.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成向所述被授权方自动提供一个或更多个预购物品、优惠券或者所述钥匙交换位置本地的其他商品或服务报价。54. The system of claim 26, wherein the key exchange server is configured to automatically provide the authorized party with one or more pre-purchased items, coupons, or other offers for goods or services local to the key exchange location. 55.如权利要求26所述的系统,其中所述钥匙交换服务器被配置成从根据针对家庭服务的用户请求、资产预订、反复存取请求以及被授权来请求钥匙交换服务的第三方系统的请求中的一项或更多项的系统请求来生成存取规则。55. The system of claim 26, wherein the key exchange server is configured to generate access rules from one or more system requests based on user requests for home services, asset reservations, recurring access requests, and requests from third-party systems authorized to request key exchange services. 56.如权利要求33所述的系统,其中所述钥匙交换服务器被配置成使交互应用被下载至所述钥匙柜子系统,所述交互应用包括使所述钥匙柜子系统能够与所述钥匙交换服务器交互的指令。56. The system of claim 33, wherein the key exchange server is configured to download an interactive application to the key cabinet subsystem, the interactive application including instructions that enable the key cabinet subsystem to interact with the key exchange server. 57.如权利要求56所述的系统,其中所述钥匙交换服务器被配置成使对所述交互应用的更新被下载至所述钥匙柜子系统。57. The system of claim 56, wherein the key exchange server is configured to download updates to the interactive application to the key cabinet subsystem. 58.如权利要求33所述的系统,其中所述钥匙交换服务器被配置成监视所述钥匙柜子系统的状态。58. The system of claim 33, wherein the key exchange server is configured to monitor the status of the key cabinet subsystem. 59.一种便于在钥匙存取位置交换包括一个或更多个钥匙的钥匙组的方法,所述方法包括:59. A method for facilitating the exchange of a key set comprising one or more keys at a key access location, the method comprising: 接收在附接至所述钥匙组的钥匙标记上进行编码的唯一钥匙标识符;Receive a unique key identifier encoded on a key tag attached to the key group; 确定所述钥匙存取位置;Determine the key access location; 在所述钥匙存取位置处为所述钥匙组分配储藏箱;A storage box is assigned to the key group at the key access location; 使所述储藏箱和所述钥匙存取位置与所述钥匙组相关联;Associate the storage box and the key access location with the key set; 向被授权方发布所述钥匙存取位置;Publish the key access location to the authorized party; 通过客户端装置从所述被授权方接收针对所述钥匙组的存取请求,所述存取请求提供用户凭证;The client device receives an access request for the key group from the authorized party, the access request providing user credentials. 获取与所述钥匙组相关联的存取规则,其中所述存取规则识别所述被授权方的被授权存取期;Obtain the access rules associated with the key group, wherein the access rules identify the authorized access period of the authorized party; 通过对照与所述被授权方相关联的一组凭证而验证在所述存取请求中提供的所述用户凭证并且通过验证在所述被授权存取期内做出所述存取请求来认证所述存取请求;以及The access request is authenticated by verifying the user credentials provided in the access request against a set of credentials associated with the authorized party, and by verifying that the access request was made within the authorized access period; and 如果所述存取请求通过认证,则将存取指令发送至钥匙柜控制器以对储藏箱进行解锁。If the access request is authenticated, an access command is sent to the key cabinet controller to unlock the storage box.
HK16105543.3A 2013-02-15 2014-01-15 Methods and systems for management of key exchanges HK1217799B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361765618P 2013-02-15 2013-02-15
US61/765,618 2013-02-15
PCT/CA2014/050022 WO2014124529A1 (en) 2013-02-15 2014-01-15 Methods and systems for management of key exchanges

Publications (2)

Publication Number Publication Date
HK1217799A1 HK1217799A1 (en) 2017-01-20
HK1217799B true HK1217799B (en) 2020-03-06

Family

ID=

Similar Documents

Publication Publication Date Title
JP6632887B2 (en) Method and system for managing key exchange
US10915856B2 (en) Package management system with accelerated delivery
EP1444619B1 (en) System and method for facilitating delivery and return service
JP6958118B2 (en) Delivery box device, delivery box control device, delivery box management server, delivery box, delivery box control method and program
JP7710237B2 (en) Key Safes and Key Access Systems
US20170169422A1 (en) Digital Token System for Physical Medium Digitalization and Physical Store Optimization
AU2002309453A1 (en) System and method for facilitating delivery and return service
JP2012185568A (en) Facility reservation management system, use situation notification device and use situation updating method
US20200226859A9 (en) System and method for electronic access
JP3766004B2 (en) Locker multipurpose use system and computer program
JP7673115B2 (en) Information processing device
HK1217799B (en) Methods and systems for management of key exchanges
JP6298190B1 (en) Information processing apparatus, information processing method, and information processing program
JP2021166043A (en) Information processing device
US20200097925A1 (en) System and method for electronic access