SENTRILOCK, LLC Patent applications |
Patent application number | Title | Published |
20150091696 | ELECTRONIC KEY LOCKOUT CONTROL IN LOCKBOX SYSTEM - An electronic lockbox system includes a wireless portable transponder that communicates with an electronic lockbox using a low power radio link. The portable transponder includes: a wide area network radio to communicate to a central clearinghouse computer, a motion sensor to activate its wide area network radio, and a connector to communicate with a secure memory device. The electronic lockbox sends a hail message that is intercepted by the portable transponder; the hail message includes identification information. The portable transponder responds with a message that includes a time sensitive encryption key; the lockbox authenticates this response message using its own time sensitive encryption key. If an electronic key is used to access the lockbox, the improved system effectively disables the electronic key during a showing, so that the electronic key cannot be used to access another lockbox until the correct dwelling key has been placed back into the lockbox. | 04-02-2015 |
20140266586 | CONTEXTUAL DATA DELIVERY TO MOBILE USERS RESPONSIVE TO ACCESS OF AN ELECTRONIC LOCKBOX - An electronic lockbox sends identifying data to a portable communications device, which relays that data to a central computer, generating a response from the central computer containing customized information of special interest to the user. Such data can include information relating to the lockbox's property, and contextually relevant information relating to other similar properties nearby. Such data from the central computer also can be delivered to one more auxiliary portable communication devices, including such devices carried by individuals either in close proximity to the lockbox or at a remote location. The data also could comprise visitation history relevant to the user, allowing an agent or a prospect to review information about previous visits to properties. The central computer can also query a user to provide location information for a lockbox that has been added to the system database. | 09-18-2014 |
20130187756 | ELECTRONIC KEY LOCKOUT CONTROL IN LOCKBOX SYSTEM - An electronic lockbox system includes a wireless portable transponder that communicates with an electronic lockbox using a low power radio link. The portable transponder includes: a wide area network radio to communicate to a central clearinghouse computer, a motion sensor to activate its wide area network radio, and a connector to communicate with a secure memory device. The electronic lockbox sends a hail message that is intercepted by the portable transponder; the hail message includes identification information. The portable transponder responds with a message that includes a time sensitive encryption key; the lockbox authenticates this response message using its own time sensitive encryption key. If an electronic key is used to access the lockbox, the improved system effectively disables the electronic key during a showing, so that the electronic key cannot be used to access another lockbox until the correct dwelling key has been placed back into the lockbox. | 07-25-2013 |
20130106572 | VEHICLE ACTIVITY MODULE | 05-02-2013 |
20130106569 | VEHICLE ACTIVITY MODULE | 05-02-2013 |
20120326845 | VEHICLE ACTIVITY MODULE - Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and to store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.” | 12-27-2012 |