Interesting ideas, but Lokki is right with the updated key issue: you can only unlock one thing with the device. If you unlocked your door and it rewrote the variable key portion then your phone wouldn't know what to expect (for example), unless they used the Internet of Things and a central database, which increases: power drain, probability of system being hacked, etc.
If a device can just be read by proximity (even if it is very close proximity) then having it as the only mechanism for a master password isn't great, but having it as part of two-factor authentication is probably reasonable. I'm planning to use my ring for 2FA on my phone with a fallback to a really long password, because that way I get convenience when I have the ring (NFC and short password) but anyone breaking into my phone has to either brute-force a long password or have cloned my ring [i:1tpt4rbi]as well as[/i:1tpt4rbi] stealing my phone [i:1tpt4rbi]and then[/i:1tpt4rbi] break a password.
At work we have mag-stripe cards or NFC passes to get into different buildings. For some buildings it is enough to just swipe, but for others you need swipe and pin. Unless those passes do extra crypto (i.e. they're not just passive NFC) then all you need is a clone of the card and you can get in to some places. The mag-stripe cards definitely won't do anything but give data, and many organisations will use those without concern (although they do need swiping rather than just proximity to clone, I believe).