IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0010661
(2004-12-13)
|
등록번호 |
US-7373352
(2008-05-13)
|
발명자
/ 주소 |
- Roatis,Calin V.
- Denison,William D.
- Myers,Gary L.
|
출원인 / 주소 |
- TriTeq Lock and Security, LLC
|
대리인 / 주소 |
Leydig, Voit & Mayer, Ltd.
|
인용정보 |
피인용 횟수 :
8 인용 특허 :
32 |
초록
▼
An electronic key control and management system for vending machines and like enclosures uses a computer and database to limit operation and parameters of electronic keys, customize the key limits, refresh keys, and collect, store and sort a host of data in various combinations, and according to pre
An electronic key control and management system for vending machines and like enclosures uses a computer and database to limit operation and parameters of electronic keys, customize the key limits, refresh keys, and collect, store and sort a host of data in various combinations, and according to preselected parameters to perform management of the keys and audit trail data.
대표청구항
▼
The invention claimed is: 1. A key management system for management of electronic keys used to access electronic locks of vending machines, comprising a computer having a software program for key management functionality; a database containing key management data; and a cradle communicating with th
The invention claimed is: 1. A key management system for management of electronic keys used to access electronic locks of vending machines, comprising a computer having a software program for key management functionality; a database containing key management data; and a cradle communicating with the computer for interfacing the computer with an electronic key; the software program having computer-executable instructions for performing an automatic key refreshing operation; receiving a the steps of receiving an initial transmission from a key through the cradle, the initial transmission initiating the automatic key refreshing operation; receiving a key identification number from the key through the cradle; retrieving from the database information of a user of the key and operation limit parameters for said user based on the key identification number; and sending the operation limit parameters through the cradle to the key for writing into a memory of the key, wherein the key contains audit trails data collected from vending machines accessed using said key, and wherein the software program has further computer-executable instructions for receiving the audit trails data from the key, and storing the received audit trails data into the database. 2. A key management system as in claim 1, wherein the cradle communicates with the key though wireless transmissions. 3. A key management system as in claim 2, wherein the cradle is connected to a communication port of the computer. 4. A key management system as in claim 1, wherein the software program includes computer-executable instructions for comparing the audit trails data received from the key with data stored in the database to determine whether the received audit trails data contains duplicate data that is duplicate to the data stored in the database, and removing the duplicate data before storing the received audit trails data into the database. 5. A key management system as in claim 1, wherein the software program has further computer-executable instructions for identifying from the received audit trails data a lock identification for an electronic lock not stored an the database, and presenting a user interface screen for prompting a user to enter data regarding the electronic lock. 6. A key management system as an claim 1, wherein the cradle initiates an encrypted challenge-response communication with the key upon receiving the initial transmission from the key. 7. A key management system as in claim 1, wherein the software program includes computer-executable instructions for presenting a user interface screen for prompting an authorized user to set operation limit parameters for an electronic key, and saving the operation limit parameters for the electronic key into the database. 8. A key management system as in claim 7, wherein the software program includes computer-executable instructions for presenting a user interface screen for a system administrator to add or delete a user having authority for setting operation limit parameters for electronic keys. 9. A key management system as in claim 1, wherein the database is at a location remote from the computer and accessible by the software program via a network. 10. A key management system as in claim 9, wherein the network is the Internet. 11. A key management system as in claim 9, wherein the computer includes a local data buffer for storing key management data downloaded from the database. 12. A key management system as in claim 1, where the software program includes computer-executable instructions for selecting and displaying operation limit parameters for a plurality of electronic keys. 13. A key management system for management of electronic keys used to access vending machines, comprising a plurality of key management stations including at least first and second key management stations, each key management station having a computer with a software program for key management functionality and a cradle communicating with the computer for interfacing the computer with an electronic key and for receiving an initial transmission from the key for initiating an automatic key refreshing operation, the first key management station having access to a first database containing key management data, and the second key management station having access to a second database containing key management data, the software program on the computer of the first key management station having computer-executable instructions for receiving operation limit parameters designated to a key identification number, storing the operation limit parameters with the key identification number into the first database, and generating an electronic data structure containing the key identification number and the operation limit parameters for said key for delivery to the second key management station for synchronizing the second database with the first database, and wherein the key contains audit trails data collected from vending machines accessed using said key, and wherein the software program has further computer-executable instructions for receiving the audit trails data from the key, and storing the received audit trails data into the database. 14. A key management system as in claim 13, wherein the software program of the first key management station has computer-executable instructions for presenting a user interface screen for prompting a user to manually enter the operation limit parameters for the key. 15. A key management system as in claim 13, wherein the electronic data structure is stored on a transportable medium for delivery to the second key management station. 16. A key management system as in claim 14, wherein the electronic data structure is transmitted to the second key management station via a network. 17. A key management system as in claim 13, wherein the software program of the first key management station further includes computer-executable instructions for receiving a second electronic data structure containing key management data, and importing the key management data in the second electronic data structure into the first database. 18. A key management system for management of electronic keys used to access vending machines, comprising a plurality of key management stations including at least first and second key management stations, each key management station having a computer with a software program for key management functionality and a cradle communicating with the computer for interfacing the computer with an electronic key, and for receiving an initial transmission and a key identification number from a key through the cradle, the initial transmission initiating an automatic key refreshing operation, the first and second key management stations both having access to a shared database containing the key management data, the first key management station having a first database address pointer and the second key management station having a second database address pointer that is the same as the first database address pointer, the software program on the computer of either key management station having computer-executable instructions for receiving operation limit parameters designated to a key identification number, storing the operation limit parameters with the key identification number into the shared database, wherein the key contains audit trails data collected from vending machines accessed using said key, and wherein the software program has further computer-executable instructions for receiving the audit trails data from the key, and storing the received audit trails data into the database. 19. A key management system as in claim 18, wherein the cradle communicates with the key through wireless transmissions. 20. A key management system as in claim 19, wherein the cradle is connected to a communication port of the computer. 21. A key management system as in claim 18, wherein the key contains audit trails data collected from vending machines accessed using said key, and wherein the software program has further computer-executable instructions for receiving the audit trails data from the key, and storing the received audit trails data into the database. 22. A key management system as in claim 21, wherein the software program includes computer-executable instructions for comparing the audit trails data received from the key with data stored in the database to determine whether the received audit trails data contains duplicate data that is duplicate to the data stored in the database, and removing the duplicate data before storing the received audit trails data into the database. 23. A key management system as in claim 21, wherein the software program has further computer-executable instructions for identifying from the received audit trails data a lock identification for an electronic lock not stored in the database, and presenting a user interface screen for prompting a user to enter data regarding the electronic lock. 24. A key management system as in claim 18, wherein the cradle initiates an encrypted challenge-response communication with the key upon receiving the initial transmission from the key. 25. A key management system as in claim 18, wherein the software program includes computer-executable instructions for presenting a user interface screen for prompting an authorized user to set operation limit parameters for an electronic key, and saving the operation limit parameters for the electronic key into the database. 26. A key management system as in claim 25, wherein the software program includes computer-executable instructions for presenting a user interface screen for a system administrator to add or delete a user having authority for setting operation limit parameters for electronic keys. 27. A key management system as in claim 18, wherein the database is at a location remote from the computer and accessible by the software program via a network. 28. A key management system as in claim 27, wherein the network is the Internet. 29. A key management system as in claim 27, wherein the computer includes a local data buffer for storing key management data downloaded from the database. 30. A key management system as in claim 18, where the software program includes computer-executable instructions for selecting and displaying operation limit parameters for a plurality of electronic keys.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.