US20050128050A1 - Multiple access electronic lock system - Google Patents

Multiple access electronic lock system Download PDF

Info

Publication number
US20050128050A1
US20050128050A1 US11/044,099 US4409905A US2005128050A1 US 20050128050 A1 US20050128050 A1 US 20050128050A1 US 4409905 A US4409905 A US 4409905A US 2005128050 A1 US2005128050 A1 US 2005128050A1
Authority
US
United States
Prior art keywords
data
contact
door
code
delay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/044,099
Inventor
George Frolov
Gary Lavelle
Leon Boiucaner
Michael Cote
Dominic Pesapane
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harrow Products LLC
Original Assignee
Harrow Products LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harrow Products LLC filed Critical Harrow Products LLC
Priority to US11/044,099 priority Critical patent/US20050128050A1/en
Publication of US20050128050A1 publication Critical patent/US20050128050A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00674Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
    • G07C9/0069Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7051Using a powered device [e.g., motor]
    • Y10T70/7062Electrical type [e.g., solenoid]
    • Y10T70/7068Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
    • Y10T70/7073Including use of a key

Definitions

  • This invention relates to the field of electronic door locks. More particularly, this invention relates to a multiple reader stand-alone door lock system for securing a door.
  • a door lock system may secure a dormitory room. Each resident of the room is issued an individual valid access code for the particular lock that secures their room. For safety and maintenance reasons, it is also required that the security and maintenance departments be able to access the dormitory rooms. Therefore, personnel from these departments are issued access codes for the door locks. Due to the large number of secured doors at a university, it is generally required that a single universal code be available to the safety and maintenance personnel to permit entry to large blocks of secured doors. Consequently, unauthorized personnel can gain entry to a large number of secured areas if the universal code is compromised.
  • the individual security and maintenance personnel each be assigned a unique universal code.
  • an individual door lock system will unlock not only for residents of the dormitory room, but also for a large number of additional universal codes.
  • a universal code has been compromised, all the doors within a block or on the system must be individually reprogrammed to delete the old universal code and enter a new universal code.
  • the invention in a preferred form relates to a multiple access stand-alone electronic door lock assembly.
  • the electronic lock assembly preferably mounts to a door having a latch which may be actuated by a handle or knob at either side of the door.
  • the interior door handle typically actuates to release the latch under all circumstances.
  • An electrically operated locking mechanism permits selective operation of the latch via the exterior door handle.
  • the electronic lock assembly comprises a lock controller and multiple access code readers.
  • the lock controller and the access code readers are powered from an on-board power source, such as a battery source.
  • the lock controller is programmable and has an associated memory. The memory stores valid access codes for comparison with access codes entered into one of the readers.
  • One of the readers is preferably a keypad.
  • the keypad receives personal access codes.
  • the second reader is an electronic touch entry key reader, such as a card reader.
  • the third reader is an electronic magnetic strip reader.
  • a computer data port for programming the lock controller or downloading audit trail information is also provided.
  • the lock controller compares an entered user access code from one or more of the readers to corresponding valid user access codes stored in the lock controller memory. An appropriate comparison causes the lock controller to generate a signal to the locking mechanism that places the door in an unlocked state.
  • a student In one preferred application for security systems having a large number of secured doors, such as a dormitory at a university setting, a student would be provided with either a card carrying a magnetic strip containing an access code or a personal access code for entry at the keypad for the assigned dormitory room. Security and maintenance personnel could obtain entry to blocks of rooms by use of the appropriate programmable data key. If an individual student's personal access code is compromised, only a single or a small number of locks require reprogramming with a new code in order to reestablish a secure environment. Any possible unauthorized entries would be restricted to a small number of secured areas. The small number of electronic keys held by security or maintenance personnel reduces the possibility of unauthorized entry.
  • the door lock system further embodies power saving functions for the on-board battery power supply to permit extended operation of the door lock system.
  • the lock controller has two operational modes, a sleep mode and an active mode. When the lock system is in the sleep mode, the lock system components place a minimal current draw on the battery source. Contact with the keypad, the electronic key reader device or the magnetic strip reader device transforms the lock controller from the sleep mode to the active mode. In the active mode, the lock controller scans the readers for an access code, processes the electronic inputs, generates various lock commands, and records appropriate data. A low current motor is employed in the locking mechanism to further conserve battery power.
  • An object of the invention is to provide a new and Improved electronic door security system having enhanced security features.
  • Another object of the Invention is to provide a new and improved electronic door security system which employs three different readers for obtaining access to a secured area.
  • a further object of the invention is to provide a new and Improved electronic door security system which incorporates a keypad, an electronic key reader, and an electronic magnetic strip reader.
  • FIG. 1 is an exploded isometric view, partly broken away and partly in schematic, of an electronic lock assembly in accordance with the present invention in association with a portion of a door, and a first latch assembly;
  • FIG. 2 is an exploded isometric view of a portion of the electronic lock assembly of FIG. 1 ;
  • FIG. 3 is an exploded isometric view, partly broken away and partly in schematic, of the electronic lock assembly of FIG. 1 in association with a portion of a door, and a second latch assembly;
  • FIG. 4 is a schematic block diagram of the electronic lock assembly of FIG. 1 ;
  • FIGS. 5 a and 5 b are a flow diagram of the main operating routine of the electronic lock system of FIG. 1 .
  • an electronic lock assembly in accordance with the present invention is generally designated by the numeral 10 .
  • the electronic lock assembly 10 is adapted for mounting to a door 12 ( FIG. 1 ).
  • An electrically actuated lock 14 is mounted in a throughbore 16 in the door 12 .
  • the lock 14 secures the door 12 via a latch 18 which engages a strike mounted to the door frame (not shown).
  • the door 12 has a secured or exterior side 20 and an unsecured or interior side 22 .
  • the latch 18 is actuatable from either side of the door 12 by an interior handle 24 and an exterior handle 26 .
  • the handles 24 , 26 may assume various forms including levers, as illustrated, knobs or other well-known door hardware.
  • the electronic lock assembly 10 has applications for a wide variety of doorway and lock set configurations including installations for mortise locks 28 ( FIG. 3 ), cylinder locks 14 and other electrically controlled lock assemblies.
  • the Interior handle 24 is preferably free to release the latch 18 under all circumstances.
  • An electrically controlled motorized drive unit 30 includes a motor 32 , as shown in FIG. 4 , for operating the lock to selectively secure the latch 18 and thereby prevent the exterior handle 26 from actuating the latch 18 for release.
  • the electronic lock assembly 10 comprises an exterior subassembly 34 which mounts against the exterior side 20 of the door 12 and a cooperative interior subassembly 36 which mounts against the interior side 22 of the door 12 .
  • Communication wires 38 carry electrical signals between the exterior subassembly 34 and the interior subassembly 36 .
  • a key operated lock cylinder 40 mounted in the exterior subassembly 34 provides a means of mechanically overriding the electronic lock controls described below.
  • the exterior subassembly 34 includes an input console which incorporates three (3) different types of access code readers 42 , 44 , 46 , as explained below.
  • the access code readers 42 , 44 , 46 are supported within a case 48 constructed of a tamper resistant material which is fastened to the door 12 by conventional fasteners 50 .
  • Anti-tamper plugs may be mounted over the fasteners 50 to prevent unauthorized removal of the exterior subassembly 34 from the door 12 .
  • the interior subassembly 36 has a mounting plate 52 and a cover 54 .
  • the mounting plate 52 is secured to the interior side 22 of the door 12 by fasteners 56 , preferably wood screws.
  • the cover 54 is mounted to the mounting plate 52 by screws 58 threadably engaging the studs 60 affixed to the mounting plate 52 .
  • the access code readers preferably include an externally accessible keypad 42 , a contact activatable reader 44 for electronically reading data stored in a programmable data key (TEK) 62 , such as a Locknectics TouchEntryTM data key, and a contact activatable reader 46 for reading data stored on a magnetic strip 72 which is carried on the edge portion of a card 64 (mag card).
  • a programmable data key such as a Locknectics TouchEntryTM data key
  • a contact activatable reader 46 for reading data stored on a magnetic strip 72 which is carried on the edge portion of a card 64 (mag card).
  • the data key reader 44 ( FIG. 2 ) includes first and second contacts 66 , 68 for contacting a ROM chip 70 carried on the data key 62 and providing a signal path therebetween.
  • the first contact 66 defines a horizontal conducting surface which contacts with the generally planar surface of the bottom of a first type of ROM chip 70 which is typically carried on a data key 62 .
  • the second contact 68 defines a vertical conducting surface on the side of the contact 68 for contacting a second type of ROM chip 70 which is typically carried on a data key 62 .
  • a first locating shoulder 74 is coaxial with the first contact 66 has a radius substantially equal to the radius of the first type of ROM chip 70 and a second shoulder 76 is coaxially positioned around the second contact 68 and has a radius substantially equal to that of the outer radius of the second type of ROM chip 70 .
  • the shoulders 74 , 76 locate the respective ROM chip 70 in conducting contact with the conducting surface of the contact 66 , 68 .
  • Each contact 66 , 68 defines a corresponding jack opening 78 for receiving male plug-in jacks from a computer.
  • the conducting surfaces of the first and second contacts 66 , 68 are conductively connected to the computer jack opening 78 . Consequently, the data key reader 44 accepts not only access code input through the contact activatable dataport, but also functions as a communication port to facilitate programming of the electronic lock assembly 10 and downloading audit trail data via a computer.
  • the mounting plate 52 of the interior subassembly 36 supports a lock controller 80 , a power source 82 , and four pushbuttons 84 , 86 , 88 , 90 .
  • the power source 82 for the electronic lock assembly 10 is a set of batteries mounted to the mounting plate 52 by battery holders.
  • S The lock (LOCK) 84 , unlock (UNLOCK) 86 , clear memory (CLR MEM) 88 and initiate program (INIT PROG) 90 push buttons provide signals which are received by the lock controller 80 as explained below.
  • the cover 54 of the interior subassembly 36 must be removed to provide access to the pushbuttons 84 , 86 , 88 , 90 .
  • the lock assembly 10 commonly includes an optional “privacy” mode that is initiated by the LOCK button 84 , as explained below.
  • the LOCK button 84 is accessible through the cover 54 to facilitate initiation of the privacy function.
  • the lock controller 80 is a programmable microprocessor driven system for controlling the lock via the electrical motorized drive unit 30 in response to access codes and computer commands entered at the readers 42 , 44 , 46 .
  • the lock controller 80 comprises a microprocessor 92 , such as, for example, a Motorola 68HC750C9 microprocessor.
  • the microprocessor 92 has an on-board memory 94 which can be programmed to store valid access codes and audit trail data.
  • a real-time clock communicates with the microprocessor 92 to record the chronological history of each attempted lock/unlock event, including each mechanical key override, and the associated access code entered.
  • the microprocessor 92 receives personal access codes and universal access codes from the readers 42 , 44 , 46 and compares those access codes to corresponding valid access codes stored in the memory 94 . If correspondence is found between an entered access code and a valid access code stored In the memory 94 , the microprocessor 92 sends a release signal to the drive unit 30 which actuates the low current motor 32 through a bidirectional motor driver 96 to place the lock in an unlocked state. The microprocessor 92 also generates signals to the LED Indicators 98 , 100 indicative of lock status.
  • the microprocessor 92 and other associated electronic components of the electronic lock assembly 10 are powered through a power supply circuit and power control 102 and an A/D converter 104 .
  • the microprocessor 92 has two operational modes.
  • the first passive mode which is the normal state for the system, is a sleep mode wherein the microprocessor 92 and other components of the system draw a minimal current from the batteries.
  • Each of the readers 42 , 44 , 46 and each of the push buttons 84 , 86 , 88 , 90 provides an input to the “wake-up” circuitry 106 of the lock controller 80 .
  • the system Upon the initial attempt to enter an input in one of the readers 42 , 44 , 46 or upon pressing one of the push buttons 84 , 86 , 88 , 90 , the system powers up to an active mode in order to perform the lock and security functions. Power is further conserved by using a low current motor 32 of the drive unit for the lock 14 .
  • FIGS. 5 a and 5 b The processing steps are illustrated by the flow diagram of FIGS. 5 a and 5 b wherein certain steps are numerically identified.
  • An initial contact at any of the readers 42 , 44 , 46 , push buttons 84 , 86 , 88 , 90 or the communications port 78 generates a power-up command 108 and the lock controller 80 is initialized.
  • the lock controller 80 is initialized by 1) Initializing the individual input/output (I/O) ports; 2) initializing and starting the computer operating properly (COP) timer; 3) setting the option register for extra RAM; 4) Initializing the keypad 42 ; 5) reading the type of master from the memory 94 and flagging same; 6) determining the presence of audit trail data (ATR) and flagging same; and 7) reading the lock electrostatic discharge (ESD) from the memory 94 , locking the door if the value indicates the unlocked, and resetting the value to indicate the locked status.
  • I/O input/output
  • COP computer operating properly
  • ATR audit trail data
  • ESD lock electrostatic discharge
  • the microprocessor 92 determines whether the mag card reader 46 , the data key reader 44 , the keypad 42 , the communications port 78 , the LOCK button 84 , the UNLOCK button 86 , the CLR MEM button 88 , or the INIT PROG button 90 was responsible for initiating the power-up command. If the microprocessor detects 110 the presence of a mag card 64 or a data key 62 or the closure of a key on the keypad 42 , the microprocessor reads the data 112 stored on the mag card 64 or the data key 62 or entered at the keypad 42 and performs a validation check 114 to determine whether the mag card 64 or data key 62 is valid or that the code entered at the keypad 42 is valid
  • a counter In the event that a key closure has occurred, a counter counts the number of keys that are pressed. If forty (40) keys are pressed without the entry of a code matching a valid code stored in the memory 94 , the microprocessor 92 locks out the keypad 42 . Allowing five (5) seconds to pass without pressing a key, or activating any of the other inputs, causes the microprocessor 92 to timeout and power-down to the sleep mode, erasing the keypad buffer and resetting the counter. If an entry code is entered at the keypad 42 , the code entered at the keypad 42 is compared 116 to a list of valid codes stored in the memory.
  • the microprocessor 92 executes a subroutine to read the data 112 stored on the data key 62 .
  • the microprocessor 92 generates a serial binary command signal to read key Identification information and to accept data from the key 62 within a pre-established time slot.
  • the microprocessor 92 validates 114 the data key 62 .
  • the microprocessor 92 calculates the cyclic redundancy check (CRC) and compares it to the CRC read from the data key 62 . If the calculated CRC does not match the CRC read from the data key 62 , the read data is discarded and the data key 62 is ignored.
  • CRC cyclic redundancy check
  • the key Identification information read from the data key 62 is compared to key identification Information stored in the memory 94 . If the stored key identification information does not match the key identification information read from the data key 62 , the read data is discarded and the data key 62 is ignored. If the comparison is positive, that is the stored key identification information matches the key identification information read from the data key 62 , the code read from the data key is compared 116 to a list of valid codes stored In the memory.
  • the microprocessor 92 executes a subroutine to read the data 1 12 stored on the mag card 64 .
  • the microprocessor 92 generates a serial binary command signal to accept data from the card within a pre-established time slot.
  • the microprocessor calculates the longitudinal redundancy check (LRC) and compares 114 the calculated value to the LRC read from the mag card 64 . If the calculated LRC does not match the LRC read from the mag card 64 , the read data is discarded and the mag card 64 is ignored. If the calculated LRC matches the LRC read from the mag card 64 , the data read from the mag card is compared to the master mag card stored in the memory.
  • LRC longitudinal redundancy check
  • the comparison is positive, that is the read data matches the stored master mag card, the data is not masked. If the read data does not match the stored master mag card, the read data is masked according to the mask stored in the memory, to eliminate data that is not required to operate the lock, and then the masked data is compared 116 to valid mag card data stored in the memory.
  • the microprocessor 92 After the microprocessor 92 verifies that the code entered at the keypad 42 or by a data key 62 or mag card 64 matches a valid code, the microprocessor 92 verifies 118 that the code is not a master code, which is used to allow access to the microcomputer for programming purposes 120 . If the code is not a master code, the microprocessor verifies 122 that the code has not expired.
  • the codes which are entered at the keypad 42 or by a data key 62 or a mag card 64 can be set to expire, either on a calendar date or after a set number of uses. This feature provides the flexibility of limiting the access of specific security or maintenance personnel or limiting the access of all security or maintenance personnel to a specific secured area.
  • the microprocessor 92 determines 124 whether the code provided by the data key 62 or mag card 64 is sufficient to actuate operation of the lock or whether a linked attribute, such as a personal Identification number (PIN), must also be entered at the keypad 42 . If a linked attribute is not required, a release signal is generated to the drive unit 30 for releasing the latch. If a linked attribute is required, the microprocessor initializes a timeout 126 , providing an upper limit on the time in which the PIN may be entered, and queries 128 the keypad to see if the PIN has been entered. If a PIN is not detected within the time limit set by the timeout, the data is discarded and the data key 62 or mag card 64 is ignored. If a PIN is detected, the PIN is compared 130 to valid codes stored in the memory 94 . If the PIN does not match a stored code number, the data is discarded and the data key 62 or mag card 64 is ignored.
  • a linked attribute such as a personal Identification number (P
  • mag card 64 assigned to each person sharing the room will contain identical code numbers. However, each person assigned to the room will be signed a unique PIN. Consequently, the microprocessor 92 must verify 132 that the PIN/mag card combination is a member of the set of combinations that is assigned to the occupants of the room. If the combination is a member of this set, a release signal is generated to the drive unit for releasing the latch.
  • the microprocessor executes a test 134 to determine if a computer is connected.
  • the microprocessor 62 queries 136 the computer for an audit command. If the audit command is received, the microprocessor transmits 138 the audit trail report to the computer and logs 140 the time and date of receipt of the audit command. If an audit command is not received, the microprocessor 92 queries the computer for data.
  • the computer may be used to update the list of valid codes stored In the memory. During external programming, all previously stored valid codes are deleted and the new codes are added to the memory. External programming may also be used to reset the date and time and to set/reset relock, nuisance and door propped delay times.
  • the microprocessor 92 may also be manually programmed 120 .
  • a master code entered at the keypad 42 or a master data key 62 or master mag card 64 initiates manual programming.
  • a code number is entered to designate whether the manual programming is to change users, add users, delete users, change the master, change user and function, add user and function, delete a user, revise the firmware, program the relock delay, program system data keys or system mag cards, or program programmer data keys. The appropriate data is then added, deleted or revised.
  • Tables 1a, 1b and 1c provide a listing of the function codes that may be used during manual programming.
  • the microprocessor executes a test 142 to determine if one of the pushbuttons 84 , 86 , 88 , 90 has been pressed and if so, which one. If the lock assembly 10 is in the locked state and the UNLOCK button 86 is pressed 141 , a release signal is generated 143 to the drive unit 30 for releasing the latch 18 . If the lock assembly 10 is in the unlocked state and the LOCK button 84 is pressed 145 , a lock signal is generated 147 to the drive unit 30 for capturing the latch 18 . Pressing the LOCK button 84 while the lock assembly 10 is secured or the UNLOCK button 86 while the lock assembly 10 is unsecured has no effect.
  • the microprocessor 92 may be programmed by the entry of a function code to enable a privacy mode. With the privacy mode enabled, pressing the LOCK button 84 Instructs the microprocessor 92 to lockout the keypad 42 , the data key reader 44 and the mag card reader 46 . Entry of a valid code at the keypad 42 or by a data key 62 or a mag card 64 will not initiate generation of a release signal. Pressing the UNLOCK button 86 cancels the privacy mode, allowing normal operation of the lock controller 80 upon receipt of a valid code.
  • the lock assembly 10 may include a position sensor 144 mounted in the door 12 that is activated by a magnet mounted in the door frame. Opening the door 12 activates the position sensor 144 to cancel the privacy mode. This ensures that the student is not accidentally locked out of the room if he does not manually cancel the privacy mode.
  • the privacy mode may also be initiated or canceled by the use of lockout code, lockout data key or lockout mag card.
  • the lock assembly 10 ′ may include a latch bolt position monitor 146 .
  • the lock controller 80 monitors the position of the latch bolt 18 ′ via the position monitor 146 and automatically initiates the privacy mode whenever the latch bolt 18 ′ is in the extended (latched) position and exits the privacy mode whenever the latch bolt 18 ′ is in the retracted (unlatched) position.
  • the lock assembly 10 ′ may include a manual switch 148 for initiating and exiting the privacy mode.
  • the lock assembly 10 may utilize master data keys, master mag S cards, programmer data keys, system data keys, system mag cards, user data keys and user mag cards. These devices may be programmed at a lock system.
  • the programming cycle is initiated by depressing the INIT PROG button 90 three (3) times 150 .
  • the red LED 98 will come on to indicate that the lock controller 80 is in a programming mode.
  • Each data key 62 and/or mag card is programmed by touching the data key 62 to a contact 66 , 68 or sliding the magnetic strip 72 through the reader 46 . If more than thirty ( 30 ) seconds elapses before another data key 62 or mag card 64 is programmed, the lock controller 80 will secure the programming cycle and revert to the normal cycle.
  • the data that was programmed is checked to verify that the same data was not previously programmed into a different data key 62 or mag card 64 . If the microprocessor 92 determines that non-unique data has been programmed into a subsequent data key or mag card, the programming cycle is canceled, and the green LED 100 flashes an error code.
  • System data keys and system mag cards may be programmed in a similar manner.
  • the programming cycle is initiated by pressing and releasing the INIT PROG and CLR MEM buttons 90 , 88 at the same time 152 .
  • the lock assembly 10 Since the lock assembly 10 does not use an external power source, the battery voltage is monitored and the lock controller 80 provides signals when the batteries approach the end of their useful life.
  • the lock controller A/D converter 104 measures the battery voltage every time the lock is brought out of the sleep mode. When the battery voltage drops to a first predetermined level, a valid code entry will cause the red LED 98 to flash slowly nine ( 9 ) times before the microprocessor 92 generates a release signal. This indicates that there is a “low battery” condition and that the batteries should be changed.
  • the batteries will discharge to a S second predetermined voltage level. This voltage level is selected to ensure that there is sufficient energy to unlock the lock at least one time. A valid code entry when the batteries are at this lower voltage level will cause the red LED 98 to flash quickly twelve times to indicate that there is a “low battery lockout” condition. While the batteries are at or below this voltage level, the microprocessor 92 will not generate a release signal unless a valid lockout code, lockout data key, or lockout mag card and a valid toggle code, toggle data key, or toggle mag card are used together to unlock the lock.
  • the lockout code, lockout data key or lockout Mag Cared is used first to cancel the low battery lockout, and the toggle code, toggle data key or toggle mag card is used to release the lock. Since a toggle command causes the lock controller 80 to maintain the lock in an unlocked condition, the possibility that there will be insufficient power to unlock a secured lock is reduced. If the batteries are drained to a failure condition, the mechanical key override will unlock the lock.
  • the lock assembly 10 is secured by operating the motor 32 in the counterclockwise direction for a predetermined period of time. Conversely, the lock assembly 10 is unsecured by operating the motor 32 in a clockwise direction for the same predetermined period of time. Generally this period of time is set for either 250 or 500 milliseconds.
  • the lock is released while in the secured state (and not in lockout) with the receipt of a valid release code from the keypad, a data key 62 or mag card 64 . Lock release is indicated by flashing the green LED 100 during the relock delay period. When the relock delay period expires, the lock is secured, both LEDs 98 , 100 are turned off, and the lock assembly 10 is placed in the sleep mode.
  • the lock is toggled open while in the secured state (and not in lockout) with the receipt of a valid toggle code from the keypad, a data key 62 or mag card 64 .
  • the toggle open state is indicated by turning the green LED 100 on briefly while the motor 32 runs.
  • the lock is toggled closed while In the unsecured state (and not in lockout) with the receipt of a valid toggle code from the keypad, a data key 62 or mag card 64 .
  • the lock assembly 10 is placed in a lockout mode by the receipt of a valid lockout code from the keypad 42 , a data key or a mag card 64 . Lockout freezes the lock assembly 10 in Its current state. While the lock assembly 10 is in a lockout mode, the receipt of a valid release code or a valid toggle code will cause the red LED 98 to flash twelve times.
  • the lock controller 80 of the invention places the lock in an unlocked mode upon entry of a valid personal access code via the keypad 42 , a programmable data key (data key) 62 , a magnetic strip card (mag card) 64 , or a combination of either a data key or a magnetic strip card and a personal identification number (PIN).
  • data key data key
  • mag card magnetic strip card
  • PIN personal identification number
  • each door user would be given either a mag card having a unique code and/or a unique numerical code to be entered at the keypad that would permit authorized entry through a particular number of doors. For security and other personnel that require access through all doorways, these personnel would be issued data keys or data keys and a unique PIN.

Abstract

A door security system for controlling access through a door of a secured area by controlling a lock status of an associated locking unit of the door. The system includes an operator that operates the locking unit of the door, a key pad, a magnetic card reader, and a contact activatable data port. A data processor is responsive to the magnetic card reader, the data port, and the keypad for controlling the operator. Each of the keypad, the magnetic card reader, and the contact activatable data port can manipulate the lock status of the locking unit of the door. The data processor further comprises link means for requiring multiple entries for implementing the lock status of the door.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the priority of U.S. patent application Ser. No. 10/337,148 filed Jan. 6, 2003, which claims the priority of U.S. patent application Ser. No. 09/286,348 filed Apr. 5, 1999, which claims the priority of U.S. Provisional Patent Application No. 60/080,693 filed on Apr. 3, 1998.
  • BACKGROUND OF THE INVENTION
  • This invention relates to the field of electronic door locks. More particularly, this invention relates to a multiple reader stand-alone door lock system for securing a door.
  • It is known in the field of electronic door locks to use a stand-alone electrically controlled lock to secure the door to a door frame. Such locks typically employ a system that compares stored valid user codes to an access code which is entered by a person seeking entry to the secured area. Such access code systems have generally used a single code reader device, such as a keypad or a card reader, for receiving the access code.
  • Electrically controlled door locks have found acceptance in business and university settings. For example, a door lock system may secure a dormitory room. Each resident of the room is issued an individual valid access code for the particular lock that secures their room. For safety and maintenance reasons, it is also required that the security and maintenance departments be able to access the dormitory rooms. Therefore, personnel from these departments are issued access codes for the door locks. Due to the large number of secured doors at a university, it is generally required that a single universal code be available to the safety and maintenance personnel to permit entry to large blocks of secured doors. Consequently, unauthorized personnel can gain entry to a large number of secured areas if the universal code is compromised.
  • To better control and monitor access to the secured areas, it is generally preferred that the individual security and maintenance personnel each be assigned a unique universal code. As a consequence, an individual door lock system will unlock not only for residents of the dormitory room, but also for a large number of additional universal codes. The greater the number of valid codes for a particular doorway, the greater the possibility that random entry of access codes will release the lock. When a universal code has been compromised, all the doors within a block or on the system must be individually reprogrammed to delete the old universal code and enter a new universal code.
  • SUMMARY OF THE INVENTION
  • Briefly stated, the invention in a preferred form relates to a multiple access stand-alone electronic door lock assembly. The electronic lock assembly preferably mounts to a door having a latch which may be actuated by a handle or knob at either side of the door. The interior door handle typically actuates to release the latch under all circumstances. An electrically operated locking mechanism permits selective operation of the latch via the exterior door handle.
  • The electronic lock assembly comprises a lock controller and multiple access code readers. The lock controller and the access code readers are powered from an on-board power source, such as a battery source. The lock controller is programmable and has an associated memory. The memory stores valid access codes for comparison with access codes entered into one of the readers.
  • One of the readers is preferably a keypad. The keypad receives personal access codes. The second reader is an electronic touch entry key reader, such as a card reader. The third reader is an electronic magnetic strip reader. A computer data port for programming the lock controller or downloading audit trail information is also provided. The lock controller compares an entered user access code from one or more of the readers to corresponding valid user access codes stored in the lock controller memory. An appropriate comparison causes the lock controller to generate a signal to the locking mechanism that places the door in an unlocked state.
  • In one preferred application for security systems having a large number of secured doors, such as a dormitory at a university setting, a student would be provided with either a card carrying a magnetic strip containing an access code or a personal access code for entry at the keypad for the assigned dormitory room. Security and maintenance personnel could obtain entry to blocks of rooms by use of the appropriate programmable data key. If an individual student's personal access code is compromised, only a single or a small number of locks require reprogramming with a new code in order to reestablish a secure environment. Any possible unauthorized entries would be restricted to a small number of secured areas. The small number of electronic keys held by security or maintenance personnel reduces the possibility of unauthorized entry.
  • The door lock system further embodies power saving functions for the on-board battery power supply to permit extended operation of the door lock system. In particular, the lock controller has two operational modes, a sleep mode and an active mode. When the lock system is in the sleep mode, the lock system components place a minimal current draw on the battery source. Contact with the keypad, the electronic key reader device or the magnetic strip reader device transforms the lock controller from the sleep mode to the active mode. In the active mode, the lock controller scans the readers for an access code, processes the electronic inputs, generates various lock commands, and records appropriate data. A low current motor is employed in the locking mechanism to further conserve battery power.
  • An object of the invention is to provide a new and Improved electronic door security system having enhanced security features.
  • Another object of the Invention is to provide a new and improved electronic door security system which employs three different readers for obtaining access to a secured area.
  • A further object of the invention is to provide a new and Improved electronic door security system which incorporates a keypad, an electronic key reader, and an electronic magnetic strip reader.
  • Other objects and advantages of the invention will become apparent from the drawings and the specification.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is an exploded isometric view, partly broken away and partly in schematic, of an electronic lock assembly in accordance with the present invention in association with a portion of a door, and a first latch assembly;
  • FIG. 2 is an exploded isometric view of a portion of the electronic lock assembly of FIG. 1;
  • FIG. 3 is an exploded isometric view, partly broken away and partly in schematic, of the electronic lock assembly of FIG. 1 in association with a portion of a door, and a second latch assembly;
  • FIG. 4 is a schematic block diagram of the electronic lock assembly of FIG. 1; and
  • FIGS. 5 a and 5 b are a flow diagram of the main operating routine of the electronic lock system of FIG. 1.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • With reference to the drawings wherein like numerals represent like parts and steps throughout the Figures, an electronic lock assembly in accordance with the present invention is generally designated by the numeral 10. The electronic lock assembly 10 is adapted for mounting to a door 12 (FIG. 1). An electrically actuated lock 14 is mounted in a throughbore 16 in the door 12. The lock 14 secures the door 12 via a latch 18 which engages a strike mounted to the door frame (not shown). For purposes of illustration, the door 12 has a secured or exterior side 20 and an unsecured or interior side 22. The latch 18 is actuatable from either side of the door 12 by an interior handle 24 and an exterior handle 26. The handles 24, 26 may assume various forms including levers, as illustrated, knobs or other well-known door hardware.
  • The electronic lock assembly 10 has applications for a wide variety of doorway and lock set configurations including installations for mortise locks 28 (FIG. 3), cylinder locks 14 and other electrically controlled lock assemblies. The Interior handle 24 is preferably free to release the latch 18 under all circumstances. An electrically controlled motorized drive unit 30 includes a motor 32, as shown in FIG. 4, for operating the lock to selectively secure the latch 18 and thereby prevent the exterior handle 26 from actuating the latch 18 for release.
  • With reference to FIGS. 1, 2 and 3, the electronic lock assembly 10 comprises an exterior subassembly 34 which mounts against the exterior side 20 of the door 12 and a cooperative interior subassembly 36 which mounts against the interior side 22 of the door 12. Communication wires 38 carry electrical signals between the exterior subassembly 34 and the interior subassembly 36. A key operated lock cylinder 40 mounted in the exterior subassembly 34 provides a means of mechanically overriding the electronic lock controls described below.
  • With reference to FIG. 2, the exterior subassembly 34 includes an input console which incorporates three (3) different types of access code readers 42, 44, 46, as explained below. The access code readers 42, 44, 46 are supported within a case 48 constructed of a tamper resistant material which is fastened to the door 12 by conventional fasteners 50. Anti-tamper plugs (not shown) may be mounted over the fasteners 50 to prevent unauthorized removal of the exterior subassembly 34 from the door 12. With reference to FIGS. 1 and 3, the interior subassembly 36 has a mounting plate 52 and a cover 54. The mounting plate 52 is secured to the interior side 22 of the door 12 by fasteners 56, preferably wood screws. The cover 54 is mounted to the mounting plate 52 by screws 58 threadably engaging the studs 60 affixed to the mounting plate 52.
  • The access code readers preferably include an externally accessible keypad 42, a contact activatable reader 44 for electronically reading data stored in a programmable data key (TEK) 62, such as a Locknectics TouchEntry™ data key, and a contact activatable reader 46 for reading data stored on a magnetic strip 72 which is carried on the edge portion of a card 64 (mag card). The apparatus and method for storing data on a data key or in a magnetic strip is well known In the industry.
  • The data key reader 44 (FIG. 2) includes first and second contacts 66, 68 for contacting a ROM chip 70 carried on the data key 62 and providing a signal path therebetween. The first contact 66 defines a horizontal conducting surface which contacts with the generally planar surface of the bottom of a first type of ROM chip 70 which is typically carried on a data key 62. The second contact 68 defines a vertical conducting surface on the side of the contact 68 for contacting a second type of ROM chip 70 which is typically carried on a data key 62. A first locating shoulder 74 is coaxial with the first contact 66 has a radius substantially equal to the radius of the first type of ROM chip 70 and a second shoulder 76 is coaxially positioned around the second contact 68 and has a radius substantially equal to that of the outer radius of the second type of ROM chip 70. The shoulders 74, 76 locate the respective ROM chip 70 in conducting contact with the conducting surface of the contact 66, 68.
  • Each contact 66, 68 defines a corresponding jack opening 78 for receiving male plug-in jacks from a computer. The conducting surfaces of the first and second contacts 66, 68 are conductively connected to the computer jack opening 78. Consequently, the data key reader 44 accepts not only access code input through the contact activatable dataport, but also functions as a communication port to facilitate programming of the electronic lock assembly 10 and downloading audit trail data via a computer.
  • The mounting plate 52 of the interior subassembly 36 supports a lock controller 80, a power source 82, and four pushbuttons 84, 86, 88, 90. The power source 82 for the electronic lock assembly 10 is a set of batteries mounted to the mounting plate 52 by battery holders. S The lock (LOCK) 84, unlock (UNLOCK) 86, clear memory (CLR MEM) 88 and initiate program (INIT PROG) 90 push buttons provide signals which are received by the lock controller 80 as explained below. Generally, the cover 54 of the interior subassembly 36 must be removed to provide access to the pushbuttons 84, 86, 88, 90. The lock assembly 10 commonly includes an optional “privacy” mode that is initiated by the LOCK button 84, as explained below. In a lock assembly 10 having the privacy mode, the LOCK button 84 is accessible through the cover 54 to facilitate initiation of the privacy function.
  • With reference to FIG. 4, the lock controller 80 is a programmable microprocessor driven system for controlling the lock via the electrical motorized drive unit 30 in response to access codes and computer commands entered at the readers 42, 44, 46. The lock controller 80 comprises a microprocessor 92, such as, for example, a Motorola 68HC750C9 microprocessor. The microprocessor 92 has an on-board memory 94 which can be programmed to store valid access codes and audit trail data. A real-time clock communicates with the microprocessor 92 to record the chronological history of each attempted lock/unlock event, including each mechanical key override, and the associated access code entered.
  • The microprocessor 92 receives personal access codes and universal access codes from the readers 42, 44, 46 and compares those access codes to corresponding valid access codes stored in the memory 94. If correspondence is found between an entered access code and a valid access code stored In the memory 94, the microprocessor 92 sends a release signal to the drive unit 30 which actuates the low current motor 32 through a bidirectional motor driver 96 to place the lock in an unlocked state. The microprocessor 92 also generates signals to the LED Indicators 98, 100 indicative of lock status.
  • An Important consideration for the stand-alone lock systems is low power consumption in order to obtain long battery life. The microprocessor 92 and other associated electronic components of the electronic lock assembly 10 are powered through a power supply circuit and power control 102 and an A/D converter 104. In order to conserve battery power, the microprocessor 92 has two operational modes. The first passive mode, which is the normal state for the system, is a sleep mode wherein the microprocessor 92 and other components of the system draw a minimal current from the batteries. Each of the readers 42, 44, 46 and each of the push buttons 84, 86, 88, 90 provides an input to the “wake-up” circuitry 106 of the lock controller 80. Upon the initial attempt to enter an input in one of the readers 42, 44, 46 or upon pressing one of the push buttons 84, 86, 88, 90, the system powers up to an active mode in order to perform the lock and security functions. Power is further conserved by using a low current motor 32 of the drive unit for the lock 14.
  • The processing steps are illustrated by the flow diagram of FIGS. 5 a and 5 b wherein certain steps are numerically identified. An initial contact at any of the readers 42, 44, 46, push buttons 84, 86, 88, 90 or the communications port 78 generates a power-up command 108 and the lock controller 80 is initialized. Typically, the lock controller 80 is initialized by 1) Initializing the individual input/output (I/O) ports; 2) initializing and starting the computer operating properly (COP) timer; 3) setting the option register for extra RAM; 4) Initializing the keypad 42; 5) reading the type of master from the memory 94 and flagging same; 6) determining the presence of audit trail data (ATR) and flagging same; and 7) reading the lock electrostatic discharge (ESD) from the memory 94, locking the door if the value indicates the unlocked, and resetting the value to indicate the locked status.
  • The microprocessor 92 determines whether the mag card reader 46, the data key reader 44, the keypad 42, the communications port 78, the LOCK button 84, the UNLOCK button 86, the CLR MEM button 88, or the INIT PROG button 90 was responsible for initiating the power-up command. If the microprocessor detects 110 the presence of a mag card 64 or a data key 62 or the closure of a key on the keypad 42, the microprocessor reads the data 112 stored on the mag card 64 or the data key 62 or entered at the keypad 42 and performs a validation check 114 to determine whether the mag card 64 or data key 62 is valid or that the code entered at the keypad 42 is valid
  • In the event that a key closure has occurred, a counter counts the number of keys that are pressed. If forty (40) keys are pressed without the entry of a code matching a valid code stored in the memory 94, the microprocessor 92 locks out the keypad 42. Allowing five (5) seconds to pass without pressing a key, or activating any of the other inputs, causes the microprocessor 92 to timeout and power-down to the sleep mode, erasing the keypad buffer and resetting the counter. If an entry code is entered at the keypad 42, the code entered at the keypad 42 is compared 116 to a list of valid codes stored in the memory.
  • In the event a data key 62 is detected 110, the microprocessor 92 executes a subroutine to read the data 112 stored on the data key 62. The microprocessor 92 generates a serial binary command signal to read key Identification information and to accept data from the key 62 within a pre-established time slot. The microprocessor 92 then validates 114 the data key 62. The microprocessor 92 calculates the cyclic redundancy check (CRC) and compares it to the CRC read from the data key 62. If the calculated CRC does not match the CRC read from the data key 62, the read data is discarded and the data key 62 is ignored. If the calculated CRC matches the CRC read from the data key 62, the key Identification information read from the data key 62 is compared to key identification Information stored in the memory 94. If the stored key identification information does not match the key identification information read from the data key 62, the read data is discarded and the data key 62 is ignored. If the comparison is positive, that is the stored key identification information matches the key identification information read from the data key 62, the code read from the data key is compared 116 to a list of valid codes stored In the memory.
  • In the event a mag card 64 is detected 110, the microprocessor 92 executes a subroutine to read the data 1 12 stored on the mag card 64. The microprocessor 92 generates a serial binary command signal to accept data from the card within a pre-established time slot. The microprocessor calculates the longitudinal redundancy check (LRC) and compares 114 the calculated value to the LRC read from the mag card 64. If the calculated LRC does not match the LRC read from the mag card 64, the read data is discarded and the mag card 64 is ignored. If the calculated LRC matches the LRC read from the mag card 64, the data read from the mag card is compared to the master mag card stored in the memory. If the comparison is positive, that is the read data matches the stored master mag card, the data is not masked. If the read data does not match the stored master mag card, the read data is masked according to the mask stored in the memory, to eliminate data that is not required to operate the lock, and then the masked data is compared 116 to valid mag card data stored in the memory.
  • After the microprocessor 92 verifies that the code entered at the keypad 42 or by a data key 62 or mag card 64 matches a valid code, the microprocessor 92 verifies 118 that the code is not a master code, which is used to allow access to the microcomputer for programming purposes 120. If the code is not a master code, the microprocessor verifies 122 that the code has not expired. The codes which are entered at the keypad 42 or by a data key 62 or a mag card 64 can be set to expire, either on a calendar date or after a set number of uses. This feature provides the flexibility of limiting the access of specific security or maintenance personnel or limiting the access of all security or maintenance personnel to a specific secured area.
  • If the code has not expired, the microprocessor 92 determines 124 whether the code provided by the data key 62 or mag card 64 is sufficient to actuate operation of the lock or whether a linked attribute, such as a personal Identification number (PIN), must also be entered at the keypad 42. If a linked attribute is not required, a release signal is generated to the drive unit 30 for releasing the latch. If a linked attribute is required, the microprocessor initializes a timeout 126, providing an upper limit on the time in which the PIN may be entered, and queries 128 the keypad to see if the PIN has been entered. If a PIN is not detected within the time limit set by the timeout, the data is discarded and the data key 62 or mag card 64 is ignored. If a PIN is detected, the PIN is compared 130 to valid codes stored in the memory 94. If the PIN does not match a stored code number, the data is discarded and the data key 62 or mag card 64 is ignored.
  • It is quite common for a number of students to share a room in a college dormitory. Generally, the mag card 64 assigned to each person sharing the room will contain identical code numbers. However, each person assigned to the room will be signed a unique PIN. Consequently, the microprocessor 92 must verify 132 that the PIN/mag card combination is a member of the set of combinations that is assigned to the occupants of the room. If the combination is a member of this set, a release signal is generated to the drive unit for releasing the latch.
  • Should neither a key closure, a data key 62, nor a mag card 64 be detected, the microprocessor executes a test 134 to determine if a computer is connected. When a computer is connected, the microprocessor 62 queries 136 the computer for an audit command. If the audit command is received, the microprocessor transmits 138 the audit trail report to the computer and logs 140 the time and date of receipt of the audit command. If an audit command is not received, the microprocessor 92 queries the computer for data. The computer may be used to update the list of valid codes stored In the memory. During external programming, all previously stored valid codes are deleted and the new codes are added to the memory. External programming may also be used to reset the date and time and to set/reset relock, nuisance and door propped delay times.
  • The microprocessor 92 may also be manually programmed 120. A master code entered at the keypad 42 or a master data key 62 or master mag card 64 initiates manual programming. A code number is entered to designate whether the manual programming is to change users, add users, delete users, change the master, change user and function, add user and function, delete a user, revise the firmware, program the relock delay, program system data keys or system mag cards, or program programmer data keys. The appropriate data is then added, deleted or revised. Tables 1a, 1b and 1c provide a listing of the function codes that may be used during manual programming.
    TABLE 1a
    Day/Night-Relay
    Function Code Code Release Mode Code Type Actual Function
    111 N/A Default Delay′ Normal Default release
    113 N/A Default Delay One use One-use default release
    115 N/A Default Delay Lockout Lockout
    117 N/A Default Delay Double Double default release
    119 N/A Default Delay Normal Default release
    131 N/A Default Delay Normal Default release
    133 N/A Default Delay One use One-use default release
    135 N/A Default Delay Lockout Lockout
    137 N/A Default Delay Double Double default release
    139 N/A Default Delay Normal Default release
    151 N/A Alt. Delay #1′ Normal Alt. Delay #1 release
    153 N/A Alt. Delay #1 One use One-use Alt. Delay #1 release
    155 N/A Alt. Delay #1 Lockout Lockout
    157 N/A Alt. Delay #1 Double Double Alt. Delay #1 release
    159 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    171 N/A Alt. Delay #2′ Normal Alt. Delay #2 release
    173 N/A Alt. Delay #2 One use One-use Alt Delay #2 release
    175 N/A Alt. Delay #2 Lockout Lockout
    177 N/A Alt. Delay #2 Double Double Alt. Delay #2 release
    179 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    191 N/A Toggle Normal Toggle release
    193 N/A Toggle One use One-use Toggle release
    195 N/A Toggle Lockout Lockout
    197 N/A Toggle Double Double Toggle release
    199 N/A Toggle Normal Toggle release
    311 N/A Default Delay Normal Default release
    313 N/A Default Delay One use One-use default release
    315 N/A Default Delay Lockout Lockout
    317 N/A Default Delay Double Double default release
    319 N/A Default Delay Normal Default release
    331 N/A Default Delay Normal Default release
    333 N/A Default Delay One use One-use default release
    335 N/A Default Delay Lockout Lockout
    337 N/A Default Delay Double Double default release
    339 N/A Default Delay Normal Default release
    351 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    353 N/A Alt. Delay #1 One use One-use Alt. Delay #1 release
    355 N/A Alt. Delay #1 Lockout Lockout
    357 N/A Alt. Delay #1 Double Double Alt. Delay #1 release
    359 N/A Alt. Delay #1 Normal Alt. Delay #1 release
  • TABLE 1b
    Day/Night-Relay
    Function Code Code Release Mode Code Type Actual Function
    371 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    373 N/A Alt. Delay #2 One use One-use Alt Delay #2 release
    375 N/A Alt. Delay #2 Lockout Lockout
    377 N/A Alt. Delay #2 Double Double Alt. Delay #2 release
    379 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    391 N/A Toggle Normal Toggle release
    393 N/A Toggle One use One-use Toggle release
    395 N/A Toggle Lockout Lockout
    397 N/A Toggle Double Double Toggle release
    399 N/A Toggle Normal Toggle release
    511 N/A Default Delay Normal Default release
    513 N/A Default Delay One use One-use default release
    515 N/A Default Delay Lockout Lockout
    517 N/A Default Delay Double Double default release
    519 N/A Default Delay Normal Default release
    531 N/A Default Delay Normal Default release
    533 N/A Default Delay One use One-use default release
    535 N/A Default Delay Lockout Lockout
    537 N/A Default Delay Double Double default release
    539 N/A Default Delay Normal Default release
    551 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    553 N/A Alt. Delay #1 One use One-use Alt. Delay #1 release
    555 N/A Alt. Delay #1 Lockout Lockout
    557 N/A Alt. Delay #1 Double Double Alt. Delay #1 release
    559 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    571 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    573 N/A Alt. Delay #2 One use One-use Alt Delay #2 release
    575 N/A Alt. Delay #2 Lockout Lockout
    577 N/A Alt. Delay #2 Double Double Alt. Delay #2 release
    579 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    591 N/A Toggle Normal Toggle release
    593 N/A Toggle One use One-use Toggle release
    595 N/A Toggle Lockout Lockout
    597 N/A Toggle Double Double Toggle release
    599 N/A Toggle Normal Toggle release
    711 N/A Default Delay Normal Default release
    713 N/A Default Delay One use One-use default release
    715 N/A Default Delay Lockout Lockout
    717 N/A Default Delay Double Double default release
    719 N/A Default Delay Normal Default release
    731 N/A Default Delay Normal Default release
    733 N/A Default Delay One use One-use default release
  • TABLE 1c
    Day/Night-Relay
    Function Code Code Release Mode Code Type Actual Function
    735 N/A Default Delay Lockout Lockout
    737 N/A Default Delay Double Double default release
    739 N/A Default Delay Normal Default release
    751 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    753 N/A Alt. Delay #1 One use One-use Alt. Delay #1 release
    755 N/A Alt. Delay #1 Lockout Lockout
    757 N/A Alt. Delay #1 Double Double Alt. Delay #1 release
    759 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    771 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    773 N/A Alt. Delay #2 One use One-use Alt Delay #2 release
    775 N/A Alt. Delay #2 Lockout Lockout
    777 N/A Alt. Delay #2 Double Double Alt. Delay #2 release
    779 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    791 N/A Toggle Normal Toggle release
    793 N/A Toggle One use One-use Toggle release
    795 N/A Toggle Lockout Lockout
    797 N/A Toggle Double Double Toggle release
    799 N/A Toggle Normal Toggle release
    911 N/A Default Delay Normal Default release
    913 N/A Default Delay One use One-use default release
    915 N/A Default Delay Lockout Lockout
    917 N/A Default Delay Double Double default release
    919 N/A Default Delay Normal Default release
    931 N/A Default Delay Normal Default release
    933 N/A Default Delay One use One-use default release
    935 N/A Default Delay Lockout Lockout
    937 N/A Default Delay Double Double default release
    939 N/A Default Delay Normal Default release
    951 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    953 N/A Alt. Delay #1 One use One-use Alt. Delay #1 release
    955 N/A Alt. Delay #1 Lockout Lockout
    957 N/A Alt. Delay #1 Double Double Alt. Delay #1 release
    959 N/A Alt. Delay #1 Normal Alt. Delay #1 release
    971 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    973 N/A Alt. Delay #2 One use One-use Alt Delay #2 release
    975 N/A Alt. Delay #2 Lockout Lockout
    977 N/A Alt. Delay #2 Double Double Alt. Delay #2 release
    979 N/A Alt. Delay #2 Normal Alt. Delay #2 release
    991 N/A Toggle Normal Toggle release
    993 N/A Toggle One use One-use Toggle release
    995 N/A Toggle Lockout Lockout
    997 N/A Toggle Double Double Toggle release
    999 N/A Toggle Normal Toggle release
  • Should neither a key closure, a data key 62, a mag card 64, nor a computer be detected, the microprocessor executes a test 142 to determine if one of the pushbuttons 84, 86, 88, 90 has been pressed and if so, which one. If the lock assembly 10 is in the locked state and the UNLOCK button 86 is pressed 141, a release signal is generated 143 to the drive unit 30 for releasing the latch 18. If the lock assembly 10 is in the unlocked state and the LOCK button 84 is pressed 145, a lock signal is generated 147 to the drive unit 30 for capturing the latch 18. Pressing the LOCK button 84 while the lock assembly 10 is secured or the UNLOCK button 86 while the lock assembly 10 is unsecured has no effect.
  • The microprocessor 92 may be programmed by the entry of a function code to enable a privacy mode. With the privacy mode enabled, pressing the LOCK button 84 Instructs the microprocessor 92 to lockout the keypad 42, the data key reader 44 and the mag card reader 46. Entry of a valid code at the keypad 42 or by a data key 62 or a mag card 64 will not initiate generation of a release signal. Pressing the UNLOCK button 86 cancels the privacy mode, allowing normal operation of the lock controller 80 upon receipt of a valid code. Alternatively, the lock assembly 10 may include a position sensor 144 mounted in the door 12 that is activated by a magnet mounted in the door frame. Opening the door 12 activates the position sensor 144 to cancel the privacy mode. This ensures that the student is not accidentally locked out of the room if he does not manually cancel the privacy mode. The privacy mode may also be initiated or canceled by the use of lockout code, lockout data key or lockout mag card.
  • When the lock assembly 10′ is installed with a mortise lock 28, as shown in FIG. 3, the lock assembly 10′ may include a latch bolt position monitor 146. The lock controller 80 monitors the position of the latch bolt 18′ via the position monitor 146 and automatically initiates the privacy mode whenever the latch bolt 18′ is in the extended (latched) position and exits the privacy mode whenever the latch bolt 18′ is in the retracted (unlatched) position. Alternatively, the lock assembly 10′ may include a manual switch 148 for initiating and exiting the privacy mode.
  • The lock assembly 10 may utilize master data keys, master mag S cards, programmer data keys, system data keys, system mag cards, user data keys and user mag cards. These devices may be programmed at a lock system. To program the master data keys, master mag cards, and programmer data keys, the programming cycle is initiated by depressing the INIT PROG button 90 three (3) times 150. The red LED 98 will come on to indicate that the lock controller 80 is in a programming mode. Each data key 62 and/or mag card is programmed by touching the data key 62 to a contact 66, 68 or sliding the magnetic strip 72 through the reader 46. If more than thirty (30) seconds elapses before another data key 62 or mag card 64 is programmed, the lock controller 80 will secure the programming cycle and revert to the normal cycle.
  • After each data key 62 or mag card 64 is programmed, the data that was programmed is checked to verify that the same data was not previously programmed into a different data key 62 or mag card 64. If the microprocessor 92 determines that non-unique data has been programmed into a subsequent data key or mag card, the programming cycle is canceled, and the green LED 100 flashes an error code.
  • System data keys and system mag cards may be programmed in a similar manner. The programming cycle is initiated by pressing and releasing the INIT PROG and CLR MEM buttons 90, 88 at the same time 152.
  • Since the lock assembly 10 does not use an external power source, the battery voltage is monitored and the lock controller 80 provides signals when the batteries approach the end of their useful life. The lock controller A/D converter 104 measures the battery voltage every time the lock is brought out of the sleep mode. When the battery voltage drops to a first predetermined level, a valid code entry will cause the red LED 98 to flash slowly nine (9) times before the microprocessor 92 generates a release signal. This indicates that there is a “low battery” condition and that the batteries should be changed.
  • If the users ignore this signal, the batteries will discharge to a S second predetermined voltage level. This voltage level is selected to ensure that there is sufficient energy to unlock the lock at least one time. A valid code entry when the batteries are at this lower voltage level will cause the red LED 98 to flash quickly twelve times to indicate that there is a “low battery lockout” condition. While the batteries are at or below this voltage level, the microprocessor 92 will not generate a release signal unless a valid lockout code, lockout data key, or lockout mag card and a valid toggle code, toggle data key, or toggle mag card are used together to unlock the lock. The lockout code, lockout data key or lockout Mag Cared is used first to cancel the low battery lockout, and the toggle code, toggle data key or toggle mag card is used to release the lock. Since a toggle command causes the lock controller 80 to maintain the lock in an unlocked condition, the possibility that there will be insufficient power to unlock a secured lock is reduced. If the batteries are drained to a failure condition, the mechanical key override will unlock the lock.
  • The lock assembly 10 is secured by operating the motor 32 in the counterclockwise direction for a predetermined period of time. Conversely, the lock assembly 10 is unsecured by operating the motor 32 in a clockwise direction for the same predetermined period of time. Generally this period of time is set for either 250 or 500 milliseconds. The lock is released while in the secured state (and not in lockout) with the receipt of a valid release code from the keypad, a data key 62 or mag card 64. Lock release is indicated by flashing the green LED 100 during the relock delay period. When the relock delay period expires, the lock is secured, both LEDs 98, 100 are turned off, and the lock assembly 10 is placed in the sleep mode. The lock is toggled open while in the secured state (and not in lockout) with the receipt of a valid toggle code from the keypad, a data key 62 or mag card 64. The toggle open state is indicated by turning the green LED 100 on briefly while the motor 32 runs. The lock is toggled closed while In the unsecured state (and not in lockout) with the receipt of a valid toggle code from the keypad, a data key 62 or mag card 64. The lock assembly 10 is placed in a lockout mode by the receipt of a valid lockout code from the keypad 42, a data key or a mag card 64. Lockout freezes the lock assembly 10 in Its current state. While the lock assembly 10 is in a lockout mode, the receipt of a valid release code or a valid toggle code will cause the red LED 98 to flash twelve times.
  • In summary, the lock controller 80 of the invention places the lock in an unlocked mode upon entry of a valid personal access code via the keypad 42, a programmable data key (data key) 62, a magnetic strip card (mag card) 64, or a combination of either a data key or a magnetic strip card and a personal identification number (PIN). In large systems employing large numbers of the stand alone lock system of the invention, each door user would be given either a mag card having a unique code and/or a unique numerical code to be entered at the keypad that would permit authorized entry through a particular number of doors. For security and other personnel that require access through all doorways, these personnel would be issued data keys or data keys and a unique PIN.
  • While preferred embodiments of the foregoing invention have been set forth for purposes of illustration, the foregoing description should not be deemed a limitation of the invention herein. Accordingly, various modifications, adaptations and alternatives may occur to one skilled in the art without departing from the spirit and the scope of the present invention.

Claims (20)

1. A door security system for controlling access through a door of a secured area by controlling a lock status of an associated locking unit of the door, the system comprising:
an operator operating the locking unit of the door;
a key pad;
a magnetic card reader;
a contact activatable data port; and
a data processor responsive to said magnetic card reader, said data port, and said keypad for controlling said operator, such that each of the keypad, the magnetic card reader, and the contact activatable data port can manipulate the lock status of the locking unit of the door;
wherein said data processor further comprises link means for requiring multiple entries for manipulating the lock status of the door.
2. The door security system of claim 1, further comprising key operated override means coupled to said operator for overriding the lock status of the door.
3. The door security system of claim 1, wherein the contact activatable data port includes a data key reader having a first contact and a second contact.
4. The door security system of claim 3, wherein the first contact is adapted to read a first type of ROM chip and the second contact is adapted to read a second type of ROM chip.
5. The door security system of claim 3, wherein each of the first contact and the second contact define jack openings adapted to connect a computer to the locking unit.
6. The door security system of claim 5, wherein data can be uploaded or downloaded to/from the computer via both the first contact and the second contact.
7. A door security system comprising:
a lock operator adapted for selectively locking and unlocking a latch;
a console comprising a first portion mounted on an unsecured side of the door and a second portion mounted on a secured side of the door;
a key pad mounted in said first portion of said console;
a magnetic card reader adapted for receiving data from a card, said magnetic card reader being mounted in said first portion of said console;
a contact activatable data port adapted for receiving data from a key, said data port being mounted in said first portion of said console;
a memory mounted in said second portion of said console, said memory storing at least one valid personal access code; and
a data processor mounted in said second portion of said console, said data processor communicating with said memory, said card reader, said data port, said keypad, and said lock operator, said data processor comprising:
input means for receiving data from said magnetic card reader, said data port and said keypad and identifying an access code input;
input validation means for validating the key or card, the input validation means providing an input valid signal if the key or card is valid;
code comparison means responsive to said input valid signal for comparing said access code to at least one valid access code stored in said memory, said code comparison means generating a first permissive signal in response to a positive comparison; and
release means responsive to said first permissive signal for generating a release signal to said lock operator
wherein said input validation means comprises master code determination means for determining whether the access code is a master code, said master code determination means generating said input valid, signal if the access code is a master code.
8. The door security system of claim 7 wherein said release means comprises:
linked attribute determination means responsive to said first permissive signal for determining whether a linked attribute must also be entered at said keypad, said linked attribute determination means generating a release signal if a linked attribute is not required, said linked attribute determination means generating a second permissive signal if a linked attribute is required;
query means responsive to said second permissive signal for querying said keypad for a personal identification number;
PIN comparison means for comparing said personal identification number to at least one valid personal identification number stored in said memory means, said PIN comparison means generating said release signal in response to a positive comparison.
9. The door security system of claim 7 wherein said input validation means comprises:
LRC receiving means for receiving a longitudinal redundancy check signal from the card;
LRC calculator means for providing a calculated longitudinal redundancy check signal for the card;
LRC comparison means for comparing the longitudinal redundancy check signal of the LRC receiving means to the calculated longitudinal redundancy check signal, said LRC comparison means generating said input valid signal in response to a positive comparison.
10. The door security system of claim 7 wherein said input validation means comprises:
CRC receiving means for receiving a cyclic redundancy check signal from the key;
CRC calculator means for providing a calculated cyclic redundancy check signal for the key;
CRC comparison means for comparing the cyclic redundancy check signal of the CRC receiving means to the calculated cyclic redundancy check signal, said CRC comparison means generating said input valid signal in response to a positive comparison.
11. The door security system of claim 11 wherein said input validation means comprises expiration determination means for determining whether or not the access code has expired, said expiration determination means generating said input valid signal in response to a determination that the access code has not expired.
12. The door security system of claim 7, further comprising key operated override means coupled to said operator for overriding the lock status of the door.
13. The door security system of claim 7, wherein the contact activatable data port includes a data key reader having a first contact and a second contact.
14. The door security system of claim 13, wherein the first contact is adapted to read a first type of ROM chip and the second contact is adapted to read a second type of ROM chip.
15. The door security system of claim 13, wherein each of the first contact and the second contact define jack openings adapted to connect a computer to the locking unit.
16. The door security system of claim 15, wherein data can be uploaded or downloaded to/from the computer via both the first contact and the second contact.
17. An access control system operable to control access to a door by a plurality of users, at least some of the users defining a user code, a card data, and a contact data categorized in one of at least two groups, the system comprising:
a latch movable between a locked position and an unlocked position;
an operator coupled to the latch and operable to move the latch between the locked position and the unlocked position;
a key pad operable to receive a user code;
a magnetic card reader operable to read card data from a magnetic strip of a card;
a contact activatable data port operable to read contact data from a ROM chip; and
a data processor operable to move the latch from the locked position to the unlocked position in response to one of the user code, the card data, and the contact data corresponding to one of a user code, a card data, and a contact data categorized in a first group.
18. The access control system of claim 17, wherein the data processor is operable to query a user to enter a PIN in response to one of the user code, the card data, and the contact data corresponding to one of a user code, a card data, and a contact data categorized in a second group.
19. The access control system of claim 18, wherein the data processor is operable to move the latch from the locked position to the unlocked position in response to an entered PIN corresponding to a user PIN.
20. The access control system of claim 17, further comprising a key-operated lock coupled to the operator and operable to move the latch from the locked position to the unlocked position.
US11/044,099 1998-04-03 2005-01-27 Multiple access electronic lock system Abandoned US20050128050A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/044,099 US20050128050A1 (en) 1998-04-03 2005-01-27 Multiple access electronic lock system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US8069398P 1998-04-03 1998-04-03
US28634899A 1999-04-05 1999-04-05
US10/337,148 US6876293B2 (en) 1998-04-03 2003-01-06 Multiple access electronic lock system
US11/044,099 US20050128050A1 (en) 1998-04-03 2005-01-27 Multiple access electronic lock system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/337,148 Continuation US6876293B2 (en) 1998-04-03 2003-01-06 Multiple access electronic lock system

Publications (1)

Publication Number Publication Date
US20050128050A1 true US20050128050A1 (en) 2005-06-16

Family

ID=46281808

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/337,148 Expired - Lifetime US6876293B2 (en) 1998-04-03 2003-01-06 Multiple access electronic lock system
US11/044,099 Abandoned US20050128050A1 (en) 1998-04-03 2005-01-27 Multiple access electronic lock system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/337,148 Expired - Lifetime US6876293B2 (en) 1998-04-03 2003-01-06 Multiple access electronic lock system

Country Status (1)

Country Link
US (2) US6876293B2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070290790A1 (en) * 2004-10-20 2007-12-20 Harrow Products Llc Lock Programming Device
US20090320537A1 (en) * 2008-06-27 2009-12-31 Richard Keith Alexander Tamper evident security lock
US20110203331A1 (en) * 2010-02-25 2011-08-25 Sargent Manufacturing Company Locking device with embedded circuit board
US20130169411A1 (en) * 2012-01-03 2013-07-04 Taiwan Fu Hsing Industrial Co., Ltd. Method for operating an electronic lock
US8616031B2 (en) 2012-05-10 2013-12-31 Wesko Systems Limited Interchangeable electronic lock
US20140241527A1 (en) * 2013-02-22 2014-08-28 Kabushiki Kaisha Toshiba Device and authentication method therefor
FR3009113A1 (en) * 2013-07-23 2015-01-30 Dubois Ind HORODATE ACCESS CONTROL DEVICE WITH CODES AND MANUAL PROGRAMMING
US9100187B2 (en) 2011-11-11 2015-08-04 Kabushiki Kaisha Toshiba Authenticator
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US9225513B2 (en) 2011-08-31 2015-12-29 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US9617757B2 (en) 2010-02-25 2017-04-11 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US9663972B2 (en) 2012-05-10 2017-05-30 Wesko Locks Ltd. Method and system for operating an electronic lock
US10465422B2 (en) 2012-05-10 2019-11-05 2603701 Ontario Inc. Electronic lock mechanism

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1264060B1 (en) * 1999-12-08 2007-11-21 Winfield Locks, Inc., doing business as Computerized Security Systems Electronic lock
EP1483470A4 (en) * 2002-03-05 2006-06-07 Kim Jong O Apparatus for opening/closing the door
US7096698B2 (en) * 2003-03-11 2006-08-29 Harrow Products Llc Override assembly for door lock systems having a clutch mechanism
US7918745B2 (en) * 2003-08-11 2011-04-05 Cobra Golf, Inc. Golf club head with alignment system
US7009499B2 (en) * 2004-04-30 2006-03-07 Mack Trucks, Inc. Vehicle anti-theft entry system
US20060032418A1 (en) * 2004-08-13 2006-02-16 Fireking International Manual override for use with an electric safe
US20060066440A1 (en) * 2004-09-28 2006-03-30 Ming-Hsiang Yeh Structure of door lock control apparatus
US7548151B2 (en) * 2005-01-27 2009-06-16 Inncom International Inc. Power management lock system and method
US7872565B2 (en) * 2006-02-03 2011-01-18 The Chamberlain Group, Inc. Programmer protection method and apparatus for use with a movable barrier operator
US20080174403A1 (en) * 2006-02-09 2008-07-24 Michael Wolpert Multiple wireless access points for wireless locksets
MX2008013177A (en) * 2006-04-13 2008-10-21 Schlage Lock Co Electronic deadbolt lock.
US11557163B2 (en) 2006-08-16 2023-01-17 Isonas, Inc. System and method for integrating and adapting security control systems
US9589400B2 (en) 2006-08-16 2017-03-07 Isonas, Inc. Security control and access system
US9153083B2 (en) 2010-07-09 2015-10-06 Isonas, Inc. System and method for integrating and adapting security control systems
US7690230B2 (en) 2006-09-26 2010-04-06 Yake Security Inc. Housing for electronic lock
US7962748B2 (en) * 2006-10-04 2011-06-14 The Boeing Company Methods and systems for securing a computer network
US8272241B2 (en) * 2008-06-27 2012-09-25 Schlage Lock Company Electronic door with key-in-lever feature
WO2010048057A1 (en) * 2008-10-22 2010-04-29 Coincode Inc. Method for locking and unlocking a locking device
US8292336B2 (en) * 2009-04-15 2012-10-23 Townsteel, Inc. Mortise lock assembly
US20100269553A1 (en) * 2009-04-24 2010-10-28 Min Zhong Double lock system
AU2010258928B2 (en) * 2009-06-08 2014-11-20 Harrow Products Llc Electronic door lock for reduced power consumption
US9129090B2 (en) * 2009-09-14 2015-09-08 Blackboard Inc. Distributed service point transaction system
ES2387715B1 (en) * 2011-03-03 2013-06-24 Ojmar, S.A. CLOSURE SYSTEM WITH INFRARED COMMUNICATION.
US9051761B2 (en) 2011-08-02 2015-06-09 Kwikset Corporation Manually driven electronic deadbolt assembly with fixed turnpiece
MX345362B (en) * 2011-12-09 2017-01-27 Sargent Mfg Co Fire actuated release mechanism to separate electronic door lock from fire door.
US20130212661A1 (en) * 2012-02-13 2013-08-15 XceedlD Corporation Credential management system
CN105122313B (en) * 2013-03-11 2018-04-03 品谱股份有限公司 Electronics plug-inserting lock
US9487971B2 (en) 2013-03-15 2016-11-08 Spectrum Brands, Inc. Electro-mechanical locks with bezel turning function
US9916746B2 (en) 2013-03-15 2018-03-13 August Home, Inc. Security system coupled to a door lock system
CN104484915B (en) * 2014-11-10 2017-09-12 广东力维智能锁业有限公司 A kind of intelligent door lock is classified method of deploying troops on garrison duty and its is classified system of deploying troops on garrison duty
US9430892B2 (en) * 2014-11-12 2016-08-30 Smarte Carte, Inc. Locker rental system using external codes
WO2016139528A1 (en) * 2015-03-03 2016-09-09 Acsys Ip Holding Inc. Systems and methods for redundant access control systems based on mobile devices
US9489822B2 (en) * 2015-03-18 2016-11-08 Google Inc. Systems and methods of privacy within a security system
US10161162B2 (en) 2015-05-21 2018-12-25 Yale Security Inc. Escutcheon mounting plate
USD790956S1 (en) 2015-07-08 2017-07-04 Yale Security Inc. Escutcheon
USD791577S1 (en) 2015-07-08 2017-07-11 Yale Security Inc. Escutcheon
US10122138B2 (en) 2016-01-05 2018-11-06 Spectrum Brands, Inc. One-piece connector for lock assembly and method of same
US10776524B2 (en) * 2016-01-14 2020-09-15 Intel Corporation Secure communication channel for system management mode
US10937264B2 (en) * 2017-11-01 2021-03-02 Ademco Inc. Systems and methods for disarming a security system monitoring a secured area using a two-dimensional scannable access code
USD876200S1 (en) * 2018-03-09 2020-02-25 ASSA ABLOY Residential Group, Inc. Door lock
USD876923S1 (en) 2018-03-09 2020-03-03 ASSA ABLOY Residential Group, Inc. Door lock
USD868563S1 (en) * 2018-03-09 2019-12-03 ASSA ABLOY Residential Group, Inc. Door lock set
US10366556B1 (en) * 2018-08-07 2019-07-30 LockState, Inc. Intelligent lock
US10789800B1 (en) 2019-05-24 2020-09-29 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
US10832509B1 (en) * 2019-05-24 2020-11-10 Ademco Inc. Systems and methods of a doorbell device initiating a state change of an access control device and/or a control panel responsive to two-factor authentication
CN112805636A (en) 2019-09-13 2021-05-14 开利公司 Building access system with programmed door locks
US20220051502A1 (en) 2020-08-14 2022-02-17 Big Belly Solar Llc System and method of providing a wireless unlocking system for a group of battery-powered storage devices
CA3230147A1 (en) * 2021-09-09 2023-03-16 Assa Abloy Americas Residential Inc. Electronic lock assembly and method of installing the same
WO2023114909A1 (en) * 2021-12-17 2023-06-22 Spectrum Brands, Inc. Electronic lock with mortise insert

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3812403A (en) * 1972-06-29 1974-05-21 K Gartner Electronic combination lock including sequential signal generator and signal display
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
US4677284A (en) * 1985-08-22 1987-06-30 Genest Leonard Joseph Multi-access security system
US5079435A (en) * 1988-12-20 1992-01-07 Honda Giken Kogyo Kabushiki Kaisha Vehicle anti-theft system using second key means
US5083122A (en) * 1989-02-21 1992-01-21 Osi Security Devices Programmable individualized security system for door locks
US5140317A (en) * 1990-05-11 1992-08-18 Medeco Security Locks, Inc. Electronic security system
US5412378A (en) * 1990-06-13 1995-05-02 Clemens; Jon K. Antitheft protection of devices
US5479151A (en) * 1994-03-31 1995-12-26 Harrow Products, Inc. Electromagnetic door lock with on-board programmable access control
US5602536A (en) * 1985-10-16 1997-02-11 Supra Products, Inc. Data synchronization method for use with portable, microprocessor-based device
US5695038A (en) * 1995-07-24 1997-12-09 Brink's, Incorporated Drop safe
US5749253A (en) * 1994-03-30 1998-05-12 Dallas Semiconductor Corporation Electrical/mechanical access control systems and methods
US5841361A (en) * 1996-03-18 1998-11-24 Hoffman; Ronald J. Keyless locking system
US5847656A (en) * 1991-06-21 1998-12-08 C & M Technology, Inc. Electronic combination lock with high security features
US5896095A (en) * 1997-05-07 1999-04-20 Mas-Hamilton Group Electronic lock with access
US5923264A (en) * 1995-12-22 1999-07-13 Harrow Products, Inc. Multiple access electronic lock system
US6130621A (en) * 1992-07-09 2000-10-10 Rsa Security Inc. Method and apparatus for inhibiting unauthorized access to or utilization of a protected device
US6298147B1 (en) * 1997-01-01 2001-10-02 Advanced Recognition Technologies, Inc. Instruction and/or an identification input unit
US6600406B1 (en) * 1997-05-23 2003-07-29 Irevo, Inc. Electronic information key system

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3812403A (en) * 1972-06-29 1974-05-21 K Gartner Electronic combination lock including sequential signal generator and signal display
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
US4677284A (en) * 1985-08-22 1987-06-30 Genest Leonard Joseph Multi-access security system
US5602536A (en) * 1985-10-16 1997-02-11 Supra Products, Inc. Data synchronization method for use with portable, microprocessor-based device
US5079435A (en) * 1988-12-20 1992-01-07 Honda Giken Kogyo Kabushiki Kaisha Vehicle anti-theft system using second key means
US5083122A (en) * 1989-02-21 1992-01-21 Osi Security Devices Programmable individualized security system for door locks
US5140317A (en) * 1990-05-11 1992-08-18 Medeco Security Locks, Inc. Electronic security system
US5412378A (en) * 1990-06-13 1995-05-02 Clemens; Jon K. Antitheft protection of devices
US5847656A (en) * 1991-06-21 1998-12-08 C & M Technology, Inc. Electronic combination lock with high security features
US6130621A (en) * 1992-07-09 2000-10-10 Rsa Security Inc. Method and apparatus for inhibiting unauthorized access to or utilization of a protected device
US5749253A (en) * 1994-03-30 1998-05-12 Dallas Semiconductor Corporation Electrical/mechanical access control systems and methods
US5479151A (en) * 1994-03-31 1995-12-26 Harrow Products, Inc. Electromagnetic door lock with on-board programmable access control
US5695038A (en) * 1995-07-24 1997-12-09 Brink's, Incorporated Drop safe
US5923264A (en) * 1995-12-22 1999-07-13 Harrow Products, Inc. Multiple access electronic lock system
US5841361A (en) * 1996-03-18 1998-11-24 Hoffman; Ronald J. Keyless locking system
US6298147B1 (en) * 1997-01-01 2001-10-02 Advanced Recognition Technologies, Inc. Instruction and/or an identification input unit
US5896095A (en) * 1997-05-07 1999-04-20 Mas-Hamilton Group Electronic lock with access
US6600406B1 (en) * 1997-05-23 2003-07-29 Irevo, Inc. Electronic information key system

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070290790A1 (en) * 2004-10-20 2007-12-20 Harrow Products Llc Lock Programming Device
US20090320537A1 (en) * 2008-06-27 2009-12-31 Richard Keith Alexander Tamper evident security lock
US9617757B2 (en) 2010-02-25 2017-04-11 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US20110203331A1 (en) * 2010-02-25 2011-08-25 Sargent Manufacturing Company Locking device with embedded circuit board
US8325039B2 (en) * 2010-02-25 2012-12-04 Sargent Manufacturing Company Locking device with embedded circuit board
US10829959B2 (en) 2010-02-25 2020-11-10 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US10378244B2 (en) 2010-02-25 2019-08-13 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US8922370B2 (en) 2010-02-25 2014-12-30 Sargent Manufacturing Company Locking device with embedded circuit board
US9920552B2 (en) 2010-02-25 2018-03-20 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US9845621B2 (en) 2010-02-25 2017-12-19 Sargent Manufacturing Company Locking device with configurable electrical connector key and internal circuit board for electronic door locks
US9725929B2 (en) 2010-02-25 2017-08-08 Sargent Manufacturing Company Locking device with embedded circuit board
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US10361850B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US9225513B2 (en) 2011-08-31 2015-12-29 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US9887841B2 (en) 2011-08-31 2018-02-06 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US10361851B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US9100187B2 (en) 2011-11-11 2015-08-04 Kabushiki Kaisha Toshiba Authenticator
US20130169411A1 (en) * 2012-01-03 2013-07-04 Taiwan Fu Hsing Industrial Co., Ltd. Method for operating an electronic lock
US9663972B2 (en) 2012-05-10 2017-05-30 Wesko Locks Ltd. Method and system for operating an electronic lock
US8616031B2 (en) 2012-05-10 2013-12-31 Wesko Systems Limited Interchangeable electronic lock
US10465422B2 (en) 2012-05-10 2019-11-05 2603701 Ontario Inc. Electronic lock mechanism
US11434663B2 (en) 2012-05-10 2022-09-06 2603701 Ontario Inc. Electronic lock mechanism
US20140241527A1 (en) * 2013-02-22 2014-08-28 Kabushiki Kaisha Toshiba Device and authentication method therefor
FR3009113A1 (en) * 2013-07-23 2015-01-30 Dubois Ind HORODATE ACCESS CONTROL DEVICE WITH CODES AND MANUAL PROGRAMMING

Also Published As

Publication number Publication date
US6876293B2 (en) 2005-04-05
US20030132829A1 (en) 2003-07-17

Similar Documents

Publication Publication Date Title
US6876293B2 (en) Multiple access electronic lock system
US5923264A (en) Multiple access electronic lock system
CA1307574C (en) Electronic security lock
US7482907B2 (en) Electronic access control device
US7698917B2 (en) Electronic deadbolt lock with a leverage handle
US9728017B2 (en) Electronic door access control system
US4684945A (en) Electronic lock with secure backdoor access
US20030141959A1 (en) Fingerprint biometric lock
US20020142831A1 (en) Method and apparatus for controlling access to areas of gaming machines
IL99716A (en) Door locking system
AU2002250240A1 (en) Method and apparatus for controlling access to areas of gaming machines
KR200418827Y1 (en) Automatic management system for opening and closing door of control box
US20090241615A1 (en) Defeatable room access control system and method
JPS63255477A (en) Electronic locking device
KR20030066608A (en) Method and system for unlocking doorway
JP2971055B2 (en) Lock unit
JP7248543B2 (en) Electric Cylinder with Dial Verification Mechanism for Crime Prevention
KR100581678B1 (en) Method and system for unlocking doorway
JPH05321523A (en) Crime prevention system using id card
KR20080092546A (en) Going in and out man management type electronic door lock
JP2902080B2 (en) Operation control device
JP2902081B2 (en) Operation control device
CA2053544C (en) Electronic interlock for storage assemblies
JPH05295934A (en) Key controlling device for security facility
JPH0624534Y2 (en) PIN code display for keyless rental lockers

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION