GB2506844A - Method for recovering lost keys and identity tag therefor - Google Patents

Method for recovering lost keys and identity tag therefor Download PDF

Info

Publication number
GB2506844A
GB2506844A GB201215628A GB201215628A GB2506844A GB 2506844 A GB2506844 A GB 2506844A GB 201215628 A GB201215628 A GB 201215628A GB 201215628 A GB201215628 A GB 201215628A GB 2506844 A GB2506844 A GB 2506844A
Authority
GB
United Kingdom
Prior art keywords
keys
owner
identity code
information
unique identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB201215628A
Other versions
GB201215628D0 (en
Inventor
Gary Lavis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB201215628A priority Critical patent/GB2506844A/en
Publication of GB201215628D0 publication Critical patent/GB201215628D0/en
Publication of GB2506844A publication Critical patent/GB2506844A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • AHUMAN NECESSITIES
    • A44HABERDASHERY; JEWELLERY
    • A44BBUTTONS, PINS, BUCKLES, SLIDE FASTENERS, OR THE LIKE
    • A44B15/00Key-rings
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/24Key distinguishing marks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0837Return transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Described is a method for recovering lost keys. The method comprises providing a unique identity code attachable to one or more keys wherein the identity code is linked to the owner of the keys, and providing contact details to a finder of the keys for contacting a contact centre. The contact centre provides information to the owner of the keys regarding a method of recovering the keys. The method of recovering the keys is decided by the finder and/or owner of the keys. Also described is a corresponding identity tag for a set of keys.

Description

METHOD FOR RECOVERING LOST KEYS AND IDENTITY TAG THEREFOR
The present invention relates to methods for recovering lost keys, in particular to identity tags for use in recovering lost keys, for new methods of purchase and for security.
A typical set of keys will include keys for multiple house-hold locks, key fobs and keys for cars, pius other keys and key fobs, for example to allow access to an office, to operate a bike lock or to operate a suitcase lock.
Misplacing a set of keys can cause a great deal of worry. cost and inconvenience. For example, once a set of keys has been lost it is necessary to try and remember which keys were present and then to make appropnate arrangements to change locks and obtain replacement keys. This can especially be a problem if a spare set of keys is not available or a spare set of keys is not accessiNe, for example if kept in a locked house. Rep'acing keys and/or locks can also prove very expensive, not to mention causing the inconvenience of not being able to gain access to a car, house, office, bicycle or suitcase. Misplacing a set of keys is particularly problematic if the keys are misplaced when the owner is away from home, for example at work or on holiday. Unfortunately, this is often the time when keys are lost.
Whilst there are known systems for recovery of lost keys, they suffer from a number of drawbacks. For example, one system involves the use of a key ring tag containing a barcode or credit card which provides access to a database containing details of the owner of the keys.
If a set of keys is lost having such a tag, the finder of the keys must take or send the keys to a supermarket. The supermarket will then look up the owner of the keys on their database with reference to the barcode or credit card and return the keys by post. This system clearly suffers from a number of drawbacks. For example, the keys cannot be returned to the owner quickly; rather the process will take several days. By the time several days have passed, the owner of the keys is very likely to have already taken action to either the replace the keys or to change locks, Particularly in modern times, it is very unlikely a home owner will allow a night to pass without changing their locks in such a situation. Accordingly, return of the keys will be too late.
In addition, sensitive data such as the home address of the owner is maintained on the database. This is not only a security concern but also detracts possible users from signing up to the service.
It is, therefore, an object of the present invention to seek to alleviate the above identified problems.
SUMMARY OF THE INVENTION
According to one aspect of the present invention, there is provided a method for recovering lost keys, comprising:-U) providing a unique identity code attachable to one or more keys wherein the identity code is linked to the owner of the keys; and (ii) providing contact details to a finder of the keys for contacting a contact centre, wherein the contact centre provides information to the owner of the keys regarding a method of recovering the keys and said method of recovering the keys is decided by the finder and/or owner of the keys.
Preferably, the unique identity code is linked to the owner of the keys without the owner of the keys revealing their name andlor address.
Preferably, the unique identity code is linked to the owner of the keys by a method which compnses:- (a) an owner of keys purchasing the unique identity code; and (b) the owner of the keys registering their information with the contact centre.
Preferably, the owner of the keys purchases the unique identity code anonymously.
in this respect, it will be appreciated that in preferred embodiments of the present invention, the unique identity code may be provided on an identity tag, for example a key ring, and the owner of the keys preferably purchases the identity tag from a shop or stall in exchange for cash or a credit/debit card payment.
Preferably, the owner of the keys is provided with a membership number.
Preferably, the membership number allows the owner of the keys to purchase more unique identity codes and/or identity tags.
Preferably, the owner of the keys purchases the unique identity code off-fine (i.e. not on the internet), for example in the form of a key-nng from a high street retailer.
Preferably, the owner of the keys registers their information with the contact centre by telephone. Alternativdy, the owner of the set of keys registers their information with the contact centre via a website.
Preferably, once the owner of the keys has registered their information with the contact centre, they are provided with a membership number.
Preferably, the membership number is provided via a telephone call, Preferably, the telephone call is not from an operative in the contact centre. Preferably. during the telephone call, the name andlor address of the owner of the keys is not asked for.
Preferably, the membership number is provided via an email.
Preferably, the owner of the keys registers their information with the contact centre online and the membership number is displayed on the website.
Preferably, the membership number allows the owner of the keys and unique identity code to communicate with the contact centre when the contact centre comprises a website.
Preferably, the owner of the keys purchases the unique identity code via the internet or via telephone.
Preferably, before purchase of the unique identity code via the internet or telephone, the owner of the keys is required to provide their emafi address.
Preferably, once the owner of the keys has provided their email address, they are provided with a membership number.
Preferably, the membership number is provided via an email and/or displayed on a website.
Preferably, the membership number allows the owner of the keys to purchase the unique identity code anonymously, for example via a bank transfer.
Preferably, the unique identity code, for example in the form of a key-ring, is sent to the owner of the keys without the owner of the keys revealing their name or address. Preferably, the unique identity code is sent to an address other than that of the owner of the keys. For example, the unique identity code is preferably sent to a trusted third party address, for example a trusted friend, sibling, solicitor or agent. In other embodiments, the unique identity code is preferably sent to a pick-up point, for example a collection box.
Preferably, the information about the owner of the keys is stored on an identity code database.
Preferably, the membership number is not stored on the identity code database.
Preferably, the membership number is stored on a separate database.
Preferably, the unique identity code and contact details are provided on an identity tag.
Preferably, the unique identity code and contact details are stamped into m identity tag.
Preferably, the identity tag is a key ring.
Preferably, the unique identity code reveals information about the owner of the keys when compared with an identity code database.
Preferably, the identity code database is stored on a secure server.
Preferably, the identity code database is not stored on the internet.
Preferably, the information about the owner of the keys comprises one or more telephone numbers and/or one or more email addresses.
Preferably, the information about the owner of the keys consists of one or more telephone numbers andior one or more email addresses.
Preferably, the information about the owner of the keys does not comprise a name or address.
Preferably, only the unique identity code and information about the owner of the keys are stored on the identity code database. For example, in preferred embodiments, only the unique identity code and telephone number and/or email address are stored on the identity code database for each owner of keys.
Preferably, the contact details are a telephone number and/or website address.
Preferably, the contact centre is a website, preferably an automated website.
Preferably, the website does not use cookies.
Preferably, the contact centre is a call centre for arranging recovery of the keys.
Preferably, the contact centre comprises one or more operatives for arranging recovery of the keys.
Preferably, the one or more operatives do not have access to a membership number provided to the owner of the keys.
Preferably, the one or more operatives only have access to the information held on the identity code database.
According to another aspect of the present invention, there is provided an identity tag for a set of keys, wherein the identity tag comprises:- (i) a unique identity code linkable to the owner of a set of keys; (ii) contact details for a contact centre, wherein when the identity code is linked to the owner of a set of keys and the contact centre is contacted by a finder of the keys to which the identity tag is attached the contact centre is able to provide information to the owner of the keys regarding a method of recovering the keys and wherein said method of recovering the keys is decided by the finder and/or owner of the keys.
Preferably, the unique identity code is linkable to the owner of the keys without the owner of the keys revealing their name and/or address.
Preferably, the unique identity code is linkable to the owner of the keys by a method which comprises:- (a) an owner of keys purchasing the unique identity code; and (b) the owner of the keys registenng their information with the contact centre.
Preferably, the owner of the keys is provided with a membership number.
Preferably, the membership number allows the owner of the keys to pm-chase more unique identity codes and/or identity tags.
Preferably, the membership number aHows the owner of the keys to communicate with the contact centre when the contact centre comprises a website.
Preferably, the information about the owner of the keys is stored on an identity code database.
Preferably, the membership number is not stored on the identity code database.
Preferably, the unique identity code and contact details are stamped into the identity tag.
Preferably, the identity tag is a key ring.
Preferably, the identity tag comprises instructions to a finder of lost keys to use the contact details to call a contact centre.
Preferably, the unique identity code reveals information about the owner of the keys when compared with an identity code database.
Preferably, the identity code database is stored on a secure server.
Preferably, the identity code database is not stored on the internet.
Preferably, the information about the owner of the keys comprises one or more telephone numbers and/or one or more email addresses.
Preferably, the information about the owner of the keys consists of one or more telephone numbers and/or one or more email addresses.
Preferably, the information about the owner of the keys does not comprise a name and/or address.
Preferably, only the unique identity code and information about the owner of the keys are stored on an identity code database. For example, in preferred embodiments, only the unique identity code and telephone number and/or email address are stored on the identity code database for each owner of the keys.
Preferably, the contact details are a telephone number and/or website address.
Preferably, the contact centre is a website, preferably an automated website.
Preferably, the website does not use cookies.
Preferably, the contact centre is a ca'l centre for arranging recovery of the keys.
Preferably, the contact centre comprises one or more operatives for arranging recovery of the keys.
Preferably, the one or more operatives do not have access to a membership number provided to the owner of the keys.
Preferably, the one or more operatives only have access to the information held on the identity code database.
It will be appreciated that, in one aspect of the present invention, there is provided an identity tag for use in the methods of the present invention.
The present invention, therefore, provides a quick and secure method for the recovery of a lost set of keys.
If a set of keys is found with an identity tag of the present invention the tinder can call a number provided on the identity tag and speak to an operative in a call centre. The operative can then contact the owner of the keys via the telephone number or email address provided in the identity code database to arrange collection of the keys. For example, the finder of the keys may infoirn the operative that they will leave the keys in a particular location, for example a police station, provide details of a meeting time and place when the keys can be handed back, or provide a telephone number so that the owner of the keys can contact the finder directly and arrange collection of the keys.
The unique identity code reveals no details about the owner of the keys and so provides a safe and secure way of ensuring recovery of the keys to the owner. In addition, only minimal information is included within the identity code database which provides peace of mind to users of the methods and identity tags of the present invention.
Within this specification embodiments have been described in a way which enables a clear and concise specification to be written, but it is intended and will be appreciated that embodiments may be variously combined or separated without parting from the invention.
For example, it will be appreciated that prefelTed features of the methods of the present invention are equally applicable to the identity tags of the present invention, and vice versa.
DETAILED DESCRIPTION
Example embodiments of the present invention will now be described with reference to the accompanying figures. in which Figure 1 shows a front view of an identity tag according to the present invention and for use in the methods of the present invention; and Figure 2 shows a rear view of an identity tag according to the present invention and for use in the methods of the present invention.
With reference to Figure 1. there is shown a front view of an identity tag 1 which includes a unique identity code 2 which can be linked to information on an identity code database about an owner of keys to which the identity tag is attached. In the example shown, the identity tag is in the form of a key ring.
With reference to Figure 2, there is shown a rear view of the identity tag I shown in Figure 1.
The identity tag 1 includes instructions and contact details 3 for a contact centre. When contacted using the contact details, the contact centre provides information to the owner of the keys regarding a method of recovering the keys, which is decided by the tinder and/or owner of the keys.
The present invention relates to methods for the recovery of lost keys. In particular, the methods of the present invention relate to the use of an identity tag which comprises a unique identity code linked to the owner of the keys and contact details for a call centre which can arrange recoveiy of the keys. Crucially, unfike known systems. the present invention allows the finder andlor owner of the keys to decide how the keys are to be returned to the owner, whilst at the same time ensuring that the identity tag reveals no information about the owner and that orfly minimal information is stored on the identity code database.
The present invention also allows an owner of keys to purchase the unique identity code anonymously. Accordingly, at no time is information other than an email address or telephone number disclosed by the owner of the keys. The invention, therefore, provides a safe and secure way of ensuring recovery of the keys to the owner.
By allowing the finder and/or owner of the keys to decide how the keys are to be returned to the owner, recovery of the keys can be achieved very quickly. For example, if keys are lost on the way to work and are found by another commuter, the owner of the keys could be contacted by the call centre before they arrive at work. If the finder provides their telephone number, the keys could be recovered almost immediately, depending upon the respective locations of the owner and finder. This is vastly superior to known systems which rely upon the finder of the keys taking or sending the keys to a third party and then allowing the third party to send the keys to the owner. As discussed above, by the time keys are returned in this way it is usually too late.
The present invention provides a quick and secure method for the recovery of a lost set of keys.
II
EXAMPLE
It will be appreciated that the methods and identity tags of the present invention can be provided by an organisation set up to deliver the methods and unique identity codes/tags of the present invention, for example under a key recovery scheme.
There are various options for an owner of a set of keys to join and register with such a scheme.
There are two main options by which the owner of the keys can join, i.e. become a member of the scheme, and to buy a unique identity code, for example provided on a key ring.
Option one: Off-line, for example in a retail outlet or at a stand / market place.
Option two: On-line.
Neither option requires the owner of the keys to reveal his or her home address in order to become a member of the scheme and/or to buy the unique identity code. In fact, there is no need for the owner of the keys to reveal their true identity or address in order to buy the product. In this way, the owner of the keys can be confident that their identity is protected.
Purchase Option One -Off-Line: The owner of the keys buys a key ring with the unique identity code pre-stamped on it. The owner of the keys then has two options to register and activate the unique identity code and the new membership.
Registration Option One for Off-Line Purchase -By Telephone: if the owner of the keys has no email address and/or does not want to use the internet then all the owner of the keys needs to do is telephone a call centre and pass on the following information to an operator: 1) His or her telephone number; 2) The name and location of the retailer where the purchase was made; 3) The date the purchase was made; and 4) The unique identity code on key ring or identity tag.
It will be noted that the owner of the keys does not provide his or her address.
The membership and the key nng then become live' and active within 24 hours. The organisation will then call the owner of the keys (not from the call centre) back to inform them that the membership and the key ring is live' and active'. At that point the owner of the keys is given the membership number so that they can use the website if and when they want too at any time at a later date.
It will be noted that during the telephone call from the organisation, no name or address of the owner of the keys is asked for. It is not required or needed.
it will also be noted that the telephone call from the organisation giving the membership number comes from another place not from an operative in the call centre.
Registration Option One for Off-Line Purchase -On the Internet If the owner of the keys has an email address they are encouraged to activate their membership on-line. To do this all they need to do is go to a join page' on the scheme website enter their email address. A system will then automatically and instantly generate a new and unique membership number for the owner of the keys. The system will generate the membership number and at the same time create an entry into a database and check the email address as being authentic.
With that membership number the owner of the keys can then complete the process on-line giving the limited information (no name and/or address) as described above.
The identity code database has no Internet connection to the scheme website. As a result, the identity code database is hacker proof' via the Internet.
Further only the unique identity code, telephone number and email address are stored on the identity code database in order to match the unique identity code to the contact information regarding the owner of the keys. In particular, it will be noted that the membership number is not stored on the identity code database. As a result, even the operators within the ca'l centre cannot see andior have access to the membership number.
Purchase Option Two -On-Line: The owner of the keys goes to the scheme website and clicks Join'. They are asked to enter their email address. Once this has been entered, a unique membership number is automatically created and displayed on the screen. The membership number is a'so sent to the email address provided.
That membership number can then be used to buy a unique identity code, for example on a key ring, via a number of gateways' not limited to paying direct into a bank of the owner of the keys' choosing.
The payment process is made not only extremely convenient but also maintains total anonymity as to the true identity of the owner of the keys, even from the organisation running the scheme.
In will be noted that the purchase can be made without the owner of the keys revealing their true identity. home address of business address, irrespective of which method the owner of the keys chooses to make the payment/purchase.
The identity code database is for the operators to access a telephone number or email address for the owner. The operators do not need to know the membership number of the owner of the keys. It is only the unique identity code within that database that reveals the contact details for the owner of the keys.
A more complete file with membership number is held on another database (not at the call centre) that can only be accessed by accounts and even then that file will not show the unique identity code. All accounts is interested in or needs to know is the membership Live' (as in paid for) and not the actual unique identity code number that may or may not appear on that key ring, or any key ring.
The membership number can be used in many ways by the organisation to update, set expiry, and so on. It can ako be used by the owner of the keys to login to the website and use features that the main website may provide.
The membership number allows the owner of the keys to purchase more unique identity codes and/or identity tags. In this way, the membership can be a group membership such as a family membership or corporate membership under which several unique identity codes and/or identity tags can be purchased.
The website does not use cookies and so no one will be tracked by the organisation, Users of the scheme can, therefore, be confident that their information will not be sold or disclosed as many other webmasters do.
When purchased online, the unique identity code, for example in the form of a keyring. can be sent to a third party address, a trusted friend, sibfing, soficitor, an agent, and so on.
Additional options include a nation-wide network of pick-up points.
In all examples and aspects of the present invention, the call centre operators cannot access anything other than the identity code database containing the information needed to contact the owner of the keys by phone and/or email.
The call centre operators will never pass on the telephone number or email address of the owner of the keys to a finder of the keys.
The operators will only pass on the telephone number of the finder of keys to the owner of the keys if the finder agrees with that method of contact.
It should be understood that various changes and modifications to the presently preferred embodiments described herein will be apparent to those skilled in the art. Such changes and modifications can be made without departing from the spirit and scope of the present invention and without diminishing its attendant advantages. It is therefore intended that such changes and modifications are covered by the appended claims.

Claims (35)

  1. CLAIMS1. A method for recovering lost keys, comprising:- (i) providing a unique identity code attachable to one or more keys wherein the identity code is linked to the owner of the keys; and (ii) providing contact details to a finder of the keys for contacting a contact centre.wherein the contact centre provides information to the owner of the keys regarding a method of recovenng the keys and said method of recovenng the keys is decided by the finder andlor owner of the keys.
  2. 2. A method according to daim I, wherein the unique identity code is linked to the owner of the keys without the owner of the keys revealing their name andior address.
  3. 3. A method according to claim I or 2, wherein the unique identity code is linked to the owner of the keys by a method which comprises:- (a) an owner of keys purchasing the unique identity code; and (b) the owner of the keys registering their information with the contact centre.
  4. 4. A method according to any preceding claim, wherein the owner of the keys purchases the unique identity code anonymously.
  5. 5. A method according to claim 3 or 4 wherein the owner of the keys is provided with a membership number.
  6. 6. A method according to any of claims 3 to 5, wherein the owner of the keys purchases the unique identity code off-line, for example in a shop.
  7. 7. A method according to any of claims 3 to 6, wherein owner of the keys registers their information with the contact centre by telephone or via a website.
  8. 8. A method according to any of claims 3 to 7. wherein once the owner of the keys has registered their information with the contact centre, they are provided with a membership n umber.
  9. 9. A method according to any of claims 3 to 5, wherein the owner of the keys pm-chases the unique identity code via the internet or telephone.
  10. 10. A method according to claim 9, wherein before purchase of the unique identity code, the owner of the keys is required to provide their email address, preferably wherein once the email address has been provided the owner of the keys is provided with a membership number.
  11. 11. A method according to claim 9 or 10, wherein the unique identity code is sent to the owner of the keys without the owner of the keys revealing their name or address.
  12. 12. A method according to claim 11, wherein the unique identity code is sent to an address other than that of the owner of the keys.
  13. 13. A method according to any of claims 5 to 12, wherein the membership number allows the owner of the keys to purchase the unique identity code anonymously.
  14. 14. A method according to any preceding claim, wherein information about the owner of the keys is stored on an identity code database.
  15. 15. A method according to claim 14, wherein the membership number is not stored on the identity code database.
  16. 16. A method according to claim 14 or 15, wherein only the unique identity code and information about the owner of the keys is stored on the identity code database.
  17. 17. A method according to any preceding claim, wherein the unique identity code and contact details are provided on an identity tag.
  18. 18. A method according to any preceding claim, wherein the unique identity code and contact details are stamped into an identity tag.
  19. 19. A method according to claim 17 or 18, wherein the identity tag is a key ring.
  20. 20. A method according to any preceding claim, wherein the unique identity code reveals information about the owner of the keys when compared with an identity code database.
  21. 21. A method according to claim 20, wherein the identity code database is stored on a secure server.
  22. 22. A method according to claim 20 or 21, wherein the identity code database is not stored on the internet.
  23. 23. A method according to any of claims 3 to 22. wherein the information about the owner of the keys compnses one or more telephone numbers and/or one or more email addresses.
  24. 24. A method according to any of claims 3 to 23, wherein the information about the owner of the keys consists of one or more telephone numbers and/or one or more email addresses.
  25. 25. A method according to any of claims 3 to 24, wherein the information about the owner of the keys does not comprise a name or address.
  26. 26. A method according to any preceding claim, wherein the contact details are a telephone number and/or website address.
  27. 27. A method according to any preceding claim, wherein the contact centre is a website, preferably an automated website, or a call centre for alTanging recovery of the keys.
  28. 28. A method according to claim 27, wherein the contact centre is a call centre comprising one or more operatives, wherein the only information about the owner of the keys to which the operatives have access to is the information he'd in an identity code database.
  29. 29. A method according to claim 27, wherein the website does not use cookies.
  30. 30. An identity tag for use in a method according to any preceding claim.
  31. 31. An identity tag for a set of keys, wherein the identity tag comprises:- (i) a unique identity code linkable to the owner of a set of keys; (ii) contact details for a contact centre.wherein when the identity code is linked to the owner of a set of keys and the contact centre is contacted by a finder of the keys to which the identity tag is attached the contact centre is able to provide information to the owner of the keys regarding a method of recovering the keys and wherein said method of recovering the keys is decided by the finder andlor owner of the keys.
  32. 32. An identity tag according to claim 30 or 31, wherein the unique identity code and contact details are stamped into the identity tag.
  33. 33. An identity tag according to any of claims 30 to 32, wherein the identity tag is a key ring.
  34. 34. An identity tag according to any of claims 30 to 33, wherein the identity tag comprises instructions to a finder of lost keys to use the contact details to call a contact centre.
  35. 35. An identity tag substantially as described herein with reference to the accompanying figures.
GB201215628A 2012-09-03 2012-09-03 Method for recovering lost keys and identity tag therefor Withdrawn GB2506844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB201215628A GB2506844A (en) 2012-09-03 2012-09-03 Method for recovering lost keys and identity tag therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB201215628A GB2506844A (en) 2012-09-03 2012-09-03 Method for recovering lost keys and identity tag therefor

Publications (2)

Publication Number Publication Date
GB201215628D0 GB201215628D0 (en) 2012-10-17
GB2506844A true GB2506844A (en) 2014-04-16

Family

ID=47075134

Family Applications (1)

Application Number Title Priority Date Filing Date
GB201215628A Withdrawn GB2506844A (en) 2012-09-03 2012-09-03 Method for recovering lost keys and identity tag therefor

Country Status (1)

Country Link
GB (1) GB2506844A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150269832A1 (en) * 2014-03-21 2015-09-24 John Candillier Systems and methods for facilitating the return of lost items to owners
US20150271127A1 (en) * 2014-03-21 2015-09-24 Rudy LelLouche Systems and methods for facilitating the return of lost items to owners
CN107675946A (en) * 2017-11-27 2018-02-09 黄萍 A kind of antitheft door key

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5036610A (en) * 1988-09-23 1991-08-06 Van Kirk Fehr Pet locator system and method
US5180192A (en) * 1990-04-30 1993-01-19 Herbert William S Lost personal accessory item identification and return method and articles
US6120146A (en) * 1997-10-28 2000-09-19 Harris; Fiona Fitzherbert Identification tag assembly and tool for eyeglasses
DE20103092U1 (en) * 2001-02-21 2001-05-03 Art Die Como Design Lost key return system and key fob
US6401095B1 (en) * 1999-09-21 2002-06-04 Robert M. Adler Geographically sensitive automated notice system
US20020181667A1 (en) * 2001-05-29 2002-12-05 Thomas Campbell Method and system for retrieval of lost goods
WO2003005251A1 (en) * 2001-07-03 2003-01-16 Geoffrey Raymond Personal item recovery reward system
DE20313780U1 (en) * 2003-09-05 2004-01-08 Art Di Como Design Und Modische Accessoires Gmbh Lost key return system and key fob
US20090055265A1 (en) * 2007-08-21 2009-02-26 Maria Lavoice Lost key rewards system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5036610A (en) * 1988-09-23 1991-08-06 Van Kirk Fehr Pet locator system and method
US5180192A (en) * 1990-04-30 1993-01-19 Herbert William S Lost personal accessory item identification and return method and articles
US6120146A (en) * 1997-10-28 2000-09-19 Harris; Fiona Fitzherbert Identification tag assembly and tool for eyeglasses
US6401095B1 (en) * 1999-09-21 2002-06-04 Robert M. Adler Geographically sensitive automated notice system
DE20103092U1 (en) * 2001-02-21 2001-05-03 Art Die Como Design Lost key return system and key fob
US20020181667A1 (en) * 2001-05-29 2002-12-05 Thomas Campbell Method and system for retrieval of lost goods
WO2003005251A1 (en) * 2001-07-03 2003-01-16 Geoffrey Raymond Personal item recovery reward system
DE20313780U1 (en) * 2003-09-05 2004-01-08 Art Di Como Design Und Modische Accessoires Gmbh Lost key return system and key fob
US20090055265A1 (en) * 2007-08-21 2009-02-26 Maria Lavoice Lost key rewards system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150269832A1 (en) * 2014-03-21 2015-09-24 John Candillier Systems and methods for facilitating the return of lost items to owners
US20150271127A1 (en) * 2014-03-21 2015-09-24 Rudy LelLouche Systems and methods for facilitating the return of lost items to owners
CN107675946A (en) * 2017-11-27 2018-02-09 黄萍 A kind of antitheft door key

Also Published As

Publication number Publication date
GB201215628D0 (en) 2012-10-17

Similar Documents

Publication Publication Date Title
US10629017B2 (en) Parking lockers
US11681815B2 (en) Secure tracking of items utilizing distributed computing
US7072892B2 (en) Business model for recovery of missing goods, persons, of fugitives or disbursements of unclaimed goods using the internet
US9916761B2 (en) Method and system for locating a mobile asset
US20170206532A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
KR101309594B1 (en) A system and method for verifying a user's identity in electronic transactions
US20020072924A1 (en) Lost property system
US20090144074A1 (en) System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto
US20080126258A1 (en) Authentication of e-commerce transactions using a wireless telecommunications device
US20120173411A1 (en) Management method of article
CN112287311A (en) Service implementation method and device based on block chain
GB2506844A (en) Method for recovering lost keys and identity tag therefor
US7653625B1 (en) Method for validation of proper ownership for resale of goods
CN111401916B (en) Transaction risk identification method and device
JP2012507767A (en) Method and system for storing and retrieving information
US8890692B1 (en) Systems and methods for aiding in recovery of lost articles
WO2020176550A1 (en) Streamlining issuing citations while enhancing police security
US20080144072A1 (en) Validation system and method therefor
US20070095899A1 (en) Global identification authentication system
WO1999018818A2 (en) Method of tracking ownership of personal property
KR100684499B1 (en) Personal code registration/use method and therefor service system using telecommunication network
KR20090111887A (en) Van(value added network) joining point integrated sale inquiry services which use a cellular phone
US20120030474A1 (en) System and Method for Personal Biometric Data Sequestering and Remote Retrieval with Power Checking
WO2001098970A1 (en) A system for notifying users in real time of transactions undertaken
Manjula et al. Location of Parked Vehicle

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)