A decentralized key management system for controlling access to multiple vehicles among multiple users includes vehicle keys for the respective vehicles, individual locking key containers for the vehicles, electronic access devices for assignment to the users and a database. Each of the containers h
A decentralized key management system for controlling access to multiple vehicles among multiple users includes vehicle keys for the respective vehicles, individual locking key containers for the vehicles, electronic access devices for assignment to the users and a database. Each of the containers has a storage area within which a vehicle key or keys for one vehicle can be stored operable to unlock key containers if authorized. The access devices are operable to unlock the key containers if authorized. The access devices are programmable with information from the database such that an assigned access device is programmed with a specific user's access privileges for obtaining access to one or more of the vehicles in the system.
대표청구항▼
We claim: 1. A key management system for controlling access to vehicle keys, comprising: a key set that includes a vehicle key to a particular vehicle and a key tag associated with the vehicle key, the key tag having an electronically readable identifier stored thereon and an electrical contact por
We claim: 1. A key management system for controlling access to vehicle keys, comprising: a key set that includes a vehicle key to a particular vehicle and a key tag associated with the vehicle key, the key tag having an electronically readable identifier stored thereon and an electrical contact portion; a key container that can be located on or near the vehicle, the key container having a key set storage area secured by an electronic lock, the key container operable to detect the key set when the key set is properly stored in the key set storage area; and an open architecture electronic access device carried by a user to access the key container, the access device having a memory that is updated with at least the identifier of the key tag when the key container is successfully accessed and the key set is removed from the key set storage area; wherein the access device is programmed to expire periodically, and wherein information stored in the memory of an expired access device is automatically uploaded to a database. 2. The key management system of claim 1, wherein the key container includes a memory that stores at least the identifier of the key tag of the stored key set. 3. The key management system of claim 1, wherein the memory of the key container includes a lock out list identifying an unauthorized access device or an unauthorized user. 4. The key management system of claim 1, wherein the memory of the access device records the approximate time that a successful access was made. 5. The key management system of claim 1, wherein the memory of the access device records the approximate time that the key tag was returned to the key set storage area. 6. The key management system of claim 1, further comprising a central computer and an associated database for administering the key management system, the central computer allowing an administrator to set the user's access privileges and track the user's access activity. 7. The key management system of claim 6, wherein the user logs into the central computer to reestablish his expired access privileges. 8. The key management system of claim 1, wherein the user seeking to access the key container uses the access device to communicate the user's identifying information and to select one of a predetermined group of codes corresponding to the purpose of the access. 9. The key management system of claim 1, wherein the information stored in the memory of an expired access device is automatically uploaded to a database when the access device is reauthorized. 10. The key management system of claim 1, wherein the key container is operable to communicate with the key set when the electrical contact portion of the key tag is placed to complete an electrical circuit of the key container. 11. The key management system of claim 1, wherein the key container and access device are each programmed to participate in a challenge response exchange with each other during user attempts to access the key container. 12. The key management system of claim 1, wherein the access device memory includes stored privileges associated with a specific user to which the access device has been assigned, and wherein at least some of the privileges are set to expire periodically. 13. The management system of claim 1, wherein the key container memory includes information on access privileges that is used in determining whether the user's access request is granted based on comparing the information on access privileges stored in the key container memory with a specific user's privileges communicated via the access device. 14. A key management system for controlling access to vehicle keys, comprising: a key set that includes a vehicle key to a particular vehicle and a key tag associated with the vehicle key, the key tag having a memory having a stored electronically readable identifier and of operable to store tracking information; and a key container that can be located on or near the vehicle, the key container having a key set storage area secured by an electronic lock, the key container operable to detect the key set when the key set is properly stored in the key set storage area; and an electronic access device carried by a user to access the key container, the access device having a memory that is updated with at least the identifier of the key tag when the key container is successfully accessed and the key set is removed from the key set storage area. 15. The key management system of claim 14, wherein the key container communicates wirelessly with the key tag. 16. The key management system of claim 14, wherein the key tag and access device are each programmed to participate in a challenge response exchange with each other during user attempts to access the key container. 17. The key management system of claim 14, wherein the access device memory includes stored privileges associated with a specific user to which the access device has been assigned, and wherein at least some of the privileges are set to expire periodically. 18. The key management system of claim 14, wherein the key tag memory includes information on access privileges that is used in determining whether the user's access request is granted based on comparing the information on access privileges stored in the key tag memory with a specific user's privileges communicated via the access device. 19. A key management system for controlling access to a vehicle key stored proximal to a remotely located vehicle, comprising: a key container located proximal to one of the remotely located vehicles, the key container having a key storage area for storing a vehicle key associated with the respective vehicle and being secured by an electronic lock; a key tag associated with the vehicle key, the key tag having a memory with an electronically stored identifier and operable to record information when the key storage area is accessed; and an electronic key for accessing the key container, the electronic key operable to establish a communications link with the key tag via the key container and having a memory, wherein information about access events is stored in at least one of the memory of the key tag or the memory of the electronic key. 20. The system of claim 19, wherein the communications link is an infrared link. 21. The system of claim 19, wherein the communications link is an RF link. 22. The system of claim 19, wherein the electronic key is an open architecture personal digital assistant. 23. The system of claim 19, wherein the electronic key is an open architecture mobile phone. 24. The system of claim 19, wherein the key tag is detectible by the key container via a wireless communications link.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (107)
Kniffin John M. ; McCauley Ron ; Wells ; III Ralph H. ; Sherman John W. ; Larson Wayne F., Access control device featuring key ordering or key simultaneity.
Henderson Walter G. (Salem OR) Larson Wayne F. (Salem OR) Barrett Philip D. (Salem OR), Data synchronization method for use with portable, microprocessor-based device.
Saliga Thomas V. (4702 Baycrest Dr. Tampa ; Hillsborough County FL 33615), Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-li.
Henderson Walter G. (Corvallis OR) Archer ; II John Q. (Salem OR) Daum Gerald R. (Salem OR) Ellson George A. (Salem OR) Gray John E. (Salem OR) Larson Wayne F. (Salem OR) Olds Rockne M. (Salem OR) Sc, Electronic key with interactive graphic user interface.
Danler Richard W. (Corvallis OR) Sherman John W. (Corvallis OR) Babler David (Vancouver WA) Chapin Ron M. (Gervais OR) Kniffin John M. (Portland OR) Reviea Kenneth L. (Salem OR) Schreiner Lynn L. (Co, Electronic security system.
Henderson Walter G. (Corvallis OR) Archer ; II John Q. (Salem OR) Daum Gerald R. (Salem OR) Ellson George A. (Salem OR) Gray John E. (Salem OR) Larson Wayne F. (Salem OR) Olds Rockne M. (Salem OR) Sc, Electronic security system with configurable key.
Barrett Philip D. (Salem OR) Daum Gerald R. (Salem OR) Larson Wayne F. (Salem OR), Method and apparatus for compiling data relating to operation of an electronic lock system.
Hughes William C. (Scotia NY) Nelson Wayne B. (Schenectady NY) Possin George E. (Schenectady NY), Method and apparatus for randomizing memory site usage.
Atalla Martin M. (Atherton CA) Hopkins W. Dale (Charlotte NC), Method and means for combining and managing personal verification and message authentication encrytions for network tran.
Bjorklund Ronald E. (Gattieres FRX) Bauchot Frederic (Saint Jeannet FRX) Wetterwald Michele M. (Cagnes Sur Mer FRX) Kutten Shay (Rockaway NJ) Herzberg Amir (Bronx NY), Method and system for key distribution and authentication in a data communication network.
Moulart Yves,BEX ; Dawirs Michel,BEX ; Hazard Michel,FRX, Method for producing a common key in two devices, in order to implement a common cryptographic procedure, and associated.
Batten Lynn Margaret,CAXITX R3T 5V4, Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem.
Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
LaBarre Robert E. (Willington CT) Koopman ; Jr. Philip J. (Hebron CT), Random clock composition-based cryptographic authentication process and locking system.
Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Yeh Phil C. (Poug, Secure key management using control vector translation.
Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Martin William C. (Concord NC) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure key management using programable control vector checking.
Chen Qilun ; Murphy ; Jr. Thomas Edwin ; Rieth Paul Francis ; Stevens Jeffrey Scott, System and method for building and exchanging encrypted passwords between a client and server.
Soum Rene (33 Rue Montcabrier 31500 Toulouse FRX), Wireless remote control high security system permitting the opening or theft-proof closing of relays actuating systems s.
Grant, Jeffrey A.; Phillips, Jonathon D.; Fawcett, Christopher J.; Bomber, Karen Bellum; McKinney, Larry T.; Warren, William M., Merchandise display security systems and methods.
Nitta, Shigeru; Iida, Hajime; Uenosono, Manabu; Kurokawa, Takeshi; Okubo, Shinichiro; Ohtsuki, Kazuaki, Operation permission control device and machine having the same mounted thereon.
Czyszczewski, Joseph Stanley; Krack, James Anthony; Lewis, Jr., Harry Reese, Systems, methods, and media for managing electronic asset tags for asset devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.