WO1996019083A1 - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
WO1996019083A1
WO1996019083A1 PCT/US1995/015968 US9515968W WO9619083A1 WO 1996019083 A1 WO1996019083 A1 WO 1996019083A1 US 9515968 W US9515968 W US 9515968W WO 9619083 A1 WO9619083 A1 WO 9619083A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
code
keys
lock
mode
Prior art date
Application number
PCT/US1995/015968
Other languages
French (fr)
Inventor
Jean-François COURTEHEUSE
Original Assignee
Alliance Technologies
Knowhow Licensing & Know-How Transfer B.V.
Schneider, Yochai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL11488895A external-priority patent/IL114888A0/en
Application filed by Alliance Technologies, Knowhow Licensing & Know-How Transfer B.V., Schneider, Yochai filed Critical Alliance Technologies
Priority to AU45117/96A priority Critical patent/AU4511796A/en
Publication of WO1996019083A1 publication Critical patent/WO1996019083A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors

Definitions

  • the present invention relates to access control systems in general and in particular to electronic access control systems.
  • Electronic access control systems are well known in the prior art.
  • Electronic access control sys ⁇ tems include those described in the following US Patents: 5,140,317 to Hyatt, Jr. et al., 5,089,692 to Tonnesson, 5,083,122 to Clark, 5,019,812 to Gostahagberg et al., 5,003,810 to Stinar et al., 4,972,182 to Novik et al., 4,964,023 to Nishizawa et al., 4,937,437 to Ferguson, 4,922,736 to Tanaka et al., 4,891,636 to Rieker, 4,856,310 to Parienti, 4,789,859 to Clarkson et al., 4,712,103 to Gotanda, 4,663,952 to Gelhard, 4,392,134 to Lutz, 4,257,030 to Bruhin et al., 4,250,533 to Nelson, 4,232,353 to Mosciatti et
  • the present invention seeks to provide an improved access control system.
  • the word "key” refers to a device for insertion into a lock, such as an elec ⁇ tronic lock, as defined hereinbelow.
  • the key includes a microchip which receives a random identifying code or "fingerprint", for example, during time of manufacture of the microchip.
  • the identifying code includes a key code which may be one of 10 40 possible combinations.
  • index refers to a location in an EPROM of the lock in which the key code is stored.
  • the memory locations in the EPROM are counted from a zero position.
  • the key codes are stored in the first available location in memory and may be located by the location they occupy in memory.
  • lock refers to an electronic part of a system that reads and identifies key codes and processes the information.
  • the lock receives instructions to memorize key codes and erase unwanted key codes, for example, the code of a lost key.
  • a mode for designating and processing at least one Master key of a set of keys is not only a key for opening external devices but also a key for authorizing the key programming mode of the system.
  • a mode for processing at least one user key of a set of keys typically includes at least one Master key.
  • the Master key may also be used as a user key.
  • an access control system including a set of at least one keys having an identifying code, a code storage memory opera ⁇ tive to store at least one identifying code, and a lock operative to read the identifying code of the key, where ⁇ in the lock has a learning mode and an operating mode, the lock being operative in the learning mode to store the identifying code of at least one of the keys in the code storage memory, and being operative in the operating mode to provide an output signal including an indication of whether the identifying code of at least one of the keys matches a stored identi ⁇ fying code.
  • the code storage memory is operative to store a plurality of identifying codes.
  • the lock includes an interface between the lock and at least one of the keys and the interface includes no more than two electrical connections. Additionally in accordance with a preferred embodiment of the present invention, the lock enters the learning mode when the code storage memory is empty.
  • the set of keys includes at least one master key.
  • the set of keys includes at least one user key.
  • the learning mode stores the identifying code of at least one master key.
  • the learning mode stores the identifying code of at least one user key.
  • the user key may also be used as a user key.
  • the lock re-enters learn ⁇ ing mode upon reading the identifying code of at least one of the master keys which matches the stored identify ⁇ ing code of the master key.
  • At least one of the keys is presented for reading by the lock.
  • the lock receives signals from an external device for locating a location in the memory of the identifying code of at least one of the keys.
  • the system may also in ⁇ clude an external device receiving the output control signal from the lock, wherein the external device is controlled by the control signal.
  • an access control method providing a set of at least one keys having an identifying code, storing at least one identifying code in a code storage memory, and providing a lock operative to read the identifying code of the key, which, in a learning mode, stores the identifying code of at least one of the keys in the code storage memory, and in an operating mode, provides an output signal including an indication of whether the identifying code of at least one of the keys matches a stored identifying code.
  • Fig. 1 is a simplified block diagram of a locking system constructed and operative in accordance with a preferred embodiment of the present invention
  • Figs. 2A - 2C are together a simplified flow chart illustrating the operation of the system of Fig. 1;
  • Figs. 3A - 3C are together a simplified flow chart illustrating the operation of step 240 of Fig. 2A;
  • Fig. 4 is a simplified flow chart illustrating the operation of step 220 of Fig. 2A;
  • Fig. 5 is a simplified pictorial illustration of a portion of the apparatus of Fig. 1;
  • Figs. 6A - 6C are simplified schematic diagrams of a portion of the system of Fig. 1;
  • Fig. 7 is a simplified flowchart illustrating the operation of another preferred embodiment of Figs. 2A - 4;
  • Fig. 8 is a simplified flowchart illustrating the operation of the key code reading portion of the method of Fig. 7;
  • Fig. 9 is a simplified flowchart illustrating the operation of the timing portion of the method of Fig. 7;
  • Fig. 10 is a simplified flowchart illustrating the operation of replacing the key code of a lost key by the method of Fig. 7;
  • Fig. 11 is a simplified flowchart illustrating the operation of trig- gering an external device by the method of Fig. 7, and
  • Fig. 12 is a simplified flowchart illustrating the operation of reading of the correct key cycle of the method of
  • Fig. 1 is a simplified block diagram of a locking system which is constructed and operative in accordance with a preferred embodiment of the present invention.
  • the apparatus of Fig. 1 comprises a CPU 100, such as an ST 62T10 B6-HWD commercially available from Thomson of France.
  • the apparatus also comprises an I/O interface 120.
  • the I/O interface 120 is an integral part of the CPU 100.
  • the I/O interface 120 is connected to the CPU 100; the CPU 100 may communicate with other components of the system through the I/O interface 120.
  • the apparatus of Fig. 1 further comprises one or more electronic keys 130.
  • Each key 130 may be placed in removable operative contact with I/O interface 120, and thus with CPU 100.
  • Each key 130 includes electronic circuitry, including circuitry which produces an identi ⁇ fying code number.
  • the structure of the key 130 is described in detail below with reference to Figs. 5 and 6A - 6C.
  • the apparatus of Fig. 1 further comprises a memory 140, which may be any suitable computer memory device such as an E-PROM device, for example the NMC 9306 commercially available from Thomson of France.
  • the memory 140 is electrically connected to I/O interface 120 and thus to CPU 100.
  • the memory 140 is capable of stor ⁇ ing at least one, and preferably a multiplicity, of identifying code numbers assigned to the keys 130.
  • the apparatus of Fig. 1 further comprises a control and reporting interface 150.
  • the control and reporting interface 150 is electrically connected to I/O interface 120 and thus to the CPU 100.
  • the control and reporting interface 150 transmits signals from the CPU 100 in order to control an external device and/or to send information concerning the operation of the CPU 100 to a reporting device.
  • the control and reporting interface 150 is selected so as to be compatible with the desired external devices and/or reporting devices.
  • Examples of external devices that might be controlled through the control and reporting interface 150 include the following: a) a bolt or latch controlling a door, a gate, or another entry barrier, whether the entry barrier bars entry to an outdoors area, a building, a room, a safe, or another enclosure; b) a vending machine; c) a vehicle ignition; d) a photocopy machine; e) a television, video machine, or other electronic device.
  • reporting devices that might re ⁇ ceive information through the control and reporting interface 150 include the following: a) a computer display screen or other display device; b) a computer memory device such as a disk or a tape; c) a printing device; d) an indicator light, such as an LED.
  • the system is configured to include at least an indicator light attached through control and reporting interface 150; such an indicator light is referred to herein as an LED.
  • the operation of the apparatus of Fig. 1 is now briefly described.
  • the CPU 100 has a plurality of modes, comprising learning mode and operating mode.
  • the opera ⁇ tion of the apparatus of Fig. 1 when CPU 100 is in learn ⁇ ing mode is as follows:
  • One of the keys 130 is placed in operative contact with the I/O interface 120.
  • Operative contact may include insertion of the key 130 into a socket or keyhole; placing the key 130 in proximity with an induc ⁇ tive coupling; or another appropriate method of achieving operative contact.
  • Placing the key 130 in operative contact with the I/O interface 120 is also termed herein "presenting" the key 130; removing the key 130 from operative contact with the I/O interface 120 is also termed herein "removing" the key 130.
  • the CPU 100 receives a signal from I/O inter ⁇ face 120 indicating that one of the keys 130 has been presented. The CPU 100 then reads the code number from the key 130 and stores the code number in the memory 140. When the key 130 is removed, the CPU 100 preferably remains in learning mode so that another one of the keys 130 can be placed in operative contact with the I/O interface 120. Alternatively, the CPU 100 may enter operating mode after the key 130 is removed.
  • the CPU 100 preferably remains in learning mode until a predefined sequence of events has occurred.
  • the predefined sequence may include the presentation of a maximum number of different keys 130; the presentation of the same key 130 more than once; signaling through a switch or other signaling device, not shown in Fig. l; or some other appropriate sequence of events.
  • the CPU 100 enters operating mode.
  • the operation of the apparatus of Fig. 1 when CPU 100 is in operating mode is as follows: The CPU 100 receives a signal from I/O interface 120 indicating that one of the keys 130 has been presented. The CPU 100 then reads the code number from the key 130. The CPU 100 then sends a signal through the I/O interface 120 to the control and reporting interface 150.
  • the signal may comprise one or more of the following: an indication of whether or not the code number read from the key 130 matches one of the code number in memory 140; an indica ⁇ tion to the control and reporting interface 150 to oper ⁇ ate or not to operate a particular external device; the code number read from the key 130; the current date and time.
  • the control and reporting interface 150 re ⁇ ceives the signal from the I/O interface 120 and, based on the signal, controls an external device or sends a report to a reporting device.
  • the control may include one or more of the following: a) opening or closing a bolt or latch control ⁇ ling a door, a gate, or another entry barrier; b) dispensing or preventing the dispensing of a product from a vending machine; c) operating or preventing the operation of a vehicle ignition; d) allowing or preventing the operation of a photocopy machine; e) allowing or preventing the operation of a television, video machine, or other electronic device or restricting the operation of the electronic device to certain functions.
  • the report may include the following: the code number read from the key; the date and time.
  • Figs. 2A - 2C is a simplified flow chart illustrating the operation of a preferred embodiment of the system of Fig. 1.
  • the fol ⁇ lowing definitions are useful in understanding the present invention:
  • Protect mode a mode of operation of the access control system wherein access is normally denied unless a correct key is presented.
  • Temporary free access mode a mode of opera ⁇ tion of the access control system wherein access is unrestricted; no key is needed to gain access. This mode is called “temporary” because it generally is in effect for a relatively short period of time. This is the normal way of accessing whatever is controlled by the access control.
  • Permanent free access mode a mode of opera ⁇ tion of the access control system wherein access is unrestricted; no key is needed to gain access. This mode is called “permanent” because it generally is in effect for a relatively long period of time.
  • Self protect mode a mode of operation of the access control system wherein access is refused even to a normally permitted key.
  • self protect mode is entered after an incorrect key is inserted.
  • Self protect preferably remains in effect for a specific amount of time, such as one minute, upon the first instance of an incorrect key being inserted and remains in effect for a longer time, such as, for example, double the previous length of time, each time an incorrect key is again inserted.
  • Wait mode a mode of operation of the access control system wherein the CPU 100 ceases to operate for a predefined time until the CPU 100 is awakened by a timer.
  • the timer is preferably part of the microcontrol ⁇ ler and is programmed to awaken the CPU 100 at a prede ⁇ termined interval. Said interval is preferably no less than the longest time necessary to traverse the steps of Figs. 2A - 2C, described below, so that the CPU 100 is not awakened except when it is in wait mode.
  • the interval may, for example be once every 20 milliseconds.
  • Default state a state of the access control system, typically the state in which the access control system begins after it is manufactured and when it is first installed, in which no information about keys is stored in the reference table. In this state, the access control system stands ready to receive keys and record their codes in memory as valid keys.
  • Figs. 2A - 2C comprise the following:
  • STEP 200 Turn power on. Turning power on begins the operation of the system.
  • STEP 210 Initialize variables and timer. All variables associated with the system are given their initial values. A timer, used in subsequent steps, is set to zero. The locking system is placed in protect mode.
  • STEP 220 Initialize memory.
  • the memory 140 is initialized. This step is explained in more detail below with reference to Fig. 4.
  • STEP 230 Wait mode. The CPU 100 enters wait mode until reawakened by the timer.
  • STEP 240 Check interruption timer. When the interruption timer, described above, activates the CPU 100 various checks are made to determine the next action to be taken. This step is described in more detail below with reference to Fig. 3.
  • STEP 250 Check temporary free access mode. Check to see whether the system is in temporary free access mode.
  • STEP 260 Check self protect mode. Check to see whether the system is in self protect mode.
  • STEP 270 Check for key present in lock. Check the lock to see whether any of the keys 130 has been presented to the lock.
  • STEP 280 Read key code. The code is read from the key 130.
  • STEP 290 Search key code in code reference table.
  • the memory 140 stores the codes of those keys which are authorized for access; conceptually, the list of such codes may be considered to be a table, which is called the code reference table.
  • the code reference table is searched to determine whether the code of the key 130 which was presented is found in the table.
  • STEP 300 Check whether the key code is found in the code reference table. A check is made to see whether the key code is found in the reference table. A key code found in the code reference table is authorized for access to the system; a key code absent from the code reference table is not authorized for access.
  • STEP 310 Check whether the system is in the default state. If in the default state, as described above, presentation of a key comprises a request to enter the key code into the code reference table, rather than a request for access.
  • STEP 320 Increment counter of invalid at ⁇ tempts. This step is reached when an invalid key has been presented; a count is kept to show how many times an invalid key has been presented.
  • STEP 330 Does counter of invalid attempts equal the maximum value? Check whether the counter of invalid attempts equals a predetermined value, as, for example, 25.
  • STEP 340 Enter self protect mode.
  • STEP 350 Indicate self protect mode. The fact that the system is in self protect mode is indicated through some reporting device, preferably an LED, at ⁇ tached to the control and reporting interface 150.
  • STEP 360 Does code read match previous code read? The key code is read a number of times on successive ⁇ sive cycles of the interruption timer to ensure that the code is read correctly. If an object other than a prop ⁇ erly constructed and operative key is presented to the lock, the lock will generally read a different code each time. The present step checks to see whether the key being presented has the same code as was read on the previous cycle of the interruption timer.
  • STEP 370 Increment the code stability coun ⁇ ter. This counter tracks the number of times that the same code has been read, on successive read attempts as explained above with reference to step 360.
  • STEP 380 Check if stability counter is at its maximum value. Check whether the number of times that the same code has been read in sequence is equal to a predetermined maximum value. Reaching this maximum value indicates that a key, as opposed to some other object, has been presented to the lock.
  • STEP 390 Write key code into code reference table. The code of the key that was presented is written into the code reference table, thus adding this key to the list of key authorized for the system.
  • STEP 400 Reset the code stability counter. The code stability counter is reset to zero to indicate that the code read is different from the previous code read.
  • STEP 410 Indicate wrong key. The fact that the an unauthorized key has been presented is indicated through some reporting device, preferably an LED, at ⁇ tached to the control and reporting interface 150.
  • STEP 420 Does the total number of memorized codes equal the total size of the code reference table less one?
  • the code reference table holds all the keys that have been learned. If some predetermined number of those keys is presented, then it is possible to learn another key. For example, a fixed number such as two keys may be required; alternatively, a number dependent on the total number of keys learned, such as the total number less one, may be required.
  • STEP 430 Initialize code of lost key with default value.
  • the code of the lost key is erased and replaced with the default value.
  • the default value is some determined value, for example 0.
  • STEP 440 Has a key been recognized in previ ⁇ ous readings? Check whether the key most recently inserted in the lock is a known key in the code reference table.
  • STEP 450 Check if correct key is already memorized.
  • STEP 460 Start countdown for permanent free access. After a predetermined period of time, as, for example, one minute, with the key remaining in the lock, the system will enter permanent free access mode upon removal of the key.
  • STEP 470 Store recognition of key in memory. The first time that the key is used for this particular operation, the key code is stored in memory.
  • STEP 480 Indicate key recognition. The fact that a recognized key has been presented is indicated through some reporting device, preferably an LED, at ⁇ tached to the control and reporting interface 150.
  • Figs. 3A - 3C are a simplified flow chart illustrating the operation of step 240 of Fig. 2A.
  • the steps of Fig. 3 include the following:
  • STEP 500 Is free access mode active? Check to see if free access mode is active.
  • STEP 505 Is permanent free access mode ac ⁇ tive? Check to see if permanent free access mode is active.
  • STEP 510 Read external input.
  • an additional external input device may be present in the system.
  • a time-of-day clock providing the current time might optionally be present so that access is further restricted or less restricted at certain times of day. If the optional external input device is present, it is read in the present step.
  • STEP 530 Increase the duration of temporary free access.
  • Temporary free access mode must already be in effect, since the "yes" branch of step 500 and the "no" branch of step 505 have been traversed. Therefore, since temporary free access has been requested, the duration of temporary free access is now increased by some predetermined amount.
  • STEP 540 Decrement duration of temporary free access.
  • Temporary free access mode is in effect, as explained above with reference to step 530. Since tempo ⁇ rary free access has not been requested, the remaining duration of temporary free access mode is decreased.
  • STEP 550 End temporary free access timing? Check whether the temporary free access timer has been decremented to zero.
  • STEP 560 Erase memorized indices correspond ⁇ ing to read keys.
  • the "yes" branch of step 550 having been traversed, temporary free access mode is now over. Since the system has been in temporary free access mode, the system is not in programming mode where new keys are memorized. Therefore, the indices corresponding to recently read keys are erased to prevent their being accidentally treated as part of a key memorization proc ⁇ ess.
  • STEP 570 Deactivate operating devices.
  • the external device controlled by the system is deactivated. For example, if the external device is a bolt associated with a door, the bolt is locked.
  • the display indicates the current mode.
  • the display may be any appropriate dis ⁇ play, such as, for example: an LED; a series of differ ⁇ ently colored lights or LEDs; or a computer display screen.
  • the specific steps which display the current mode are:
  • STEP 575 Display "protected mode”.
  • STEP 580 Display "temporary free access mode"
  • STEP 590 Display "not programmed”.
  • STEP 595 Display "request permanent free access,
  • STEP 600 Self protect mode? Check if self protect mode is active.
  • STEP 605 Decrement self protect timing. Reduce the remaining time that self protect mode must remain in effect.
  • STEP 610 End self protect mode? If the self protect mode timer has reached zero, self protect mode should end.
  • STEP 615 Double self protect duration if new reading is incorrect. As explained above with reference to the definition of self protect mode, if another incor ⁇ rect key is presented then the self protect time is doubled.
  • STEP 620 Enter protected mode.
  • STEP 625 Key present and correct? Check whether a key is present and correct.
  • STEP 630 Decrement "request permanent free access” timing. As explained above with reference to step 460, permanent free access mode is entered when a valid key has been has been in the lock for a specified period of time and is then removed. The associated timer, which tracks how long the key has been in the lock, is decremented.
  • STEP 635 End "request permanent free access” timing? Check if the "request permanent free access” timer has expired. If the timer has expired, then the key has been in the lock long enough to request permanent free access.
  • STEP 640 Memorize request of "permanent free access”. Note that permanent free access is now in effect.
  • STEP 645 Code(s) with default values? Check whether the key code tables have default values, indicat ⁇ ing that no keys have yet been programmed.
  • Fig. 4 is a simplified flow chart illustrating the operation of step 220 of Fig. 2A.
  • the steps of Fig. 4 include the follow ⁇ ing:
  • STEP 650 Read EPROM identifier.
  • the EPROM contains an identifying code; reading this code verifies whether the EPROM is already known to the system. If not, the EPROM will be initialized in subsequent steps.
  • STEP 660 Initialize all key codes with de ⁇ fault values. Since the EPROM is not known to the sys ⁇ tem, it does not contain valid information. Therefore, all key code values must be initialized to the default.
  • STEP 665 Write codes on EPROM. The default values are written to the EPROM.
  • STEP 670 Write identifier on EPROM.
  • the identifying code associated with this system is written to the EPROM.
  • each access control system has a unique identifying code.
  • STEP 675 Read EPROM codes. The codes in the EPROM are read into active system memory.
  • STEP 680 Are there one or more codes with default values? Check if there are any default values in the key code table.
  • STEP 685 Display "protected mode”. The system enters protected mode if the key code table is filled in.
  • STEP 690 Display "not programmed”. The system enters programming mode if part of all of the key code table has default values, indicating that the system is not fully programmed.
  • the key 130 comprises a shank 700, formed of a conductive material, typically metal.
  • the key 130 further comprises a junction 705, formed of an insulating material.
  • the junction 705 is formed so as to divide the shank 700 into two portions electrically insulated from each other.
  • An electronic circuit 710 is mounted across the junction 705, such that each terminal 720 of the elec ⁇ tronic circuit 710 may be in contact, respectively, with the shank 700 on each side of the junction 705.
  • Biasing means 715 such as springs, are mounted so as to maintain the two terminals 720 in electrical contact, respective ⁇ ly, with the two sides of the junction 705.
  • Figs. 6A - 6C are simplified schematic diagrams of a portion of the system of Fig. 1.
  • Fig. 6A is a simplified schematic diagram of a preferred embodiment of the CPU 100, the I/O interface 120, the memory 140, and the control and reporting inter ⁇ face 150.
  • Fig. 6B is a simplified schematic diagram of a preferred embodiment of the portion of the key 130 com ⁇ prising electronic circuit 710 of Fig. 5.
  • Fig. 6C is a simplified schematic diagram illustrating the operational interface between the apparatus of Fig. 6A and the appa ⁇ ratus of Fig. 6B. It will be appreciated from Fig. 6C that the operational interface requires only two electri ⁇ cal connections.
  • Figs. 7 to 12 illustrate another preferred embodiment of the present invention for coding keys and reading key codes.
  • Fig. 7 The steps illustrated in Fig. 7 include the following:
  • Steps 1000 and 1010 are the same as steps 200 and 210 of the first embodiment of the invention and the system is set in order to read a key inserted into a lock.
  • Step 1030 The system reads a key index.
  • Step 1040 The system checks the contents of the EPROM index.
  • Step 1050 If the answer to step 1040 is nega ⁇ tive, namely the key index is unrecognizable to the EPROM, the EPROM code is set to its zero position for writing a key code and an index.
  • Step 1070 In this step, a set of Master Keys is created.
  • the Master Key set of the system is generally identified as a first key subset, of a set of keys, to be read by the system.
  • the number of Master Keys, in the Master Key subset, to be used by a device of the present invention, is arbitrary and is decided upon by the user in this step.
  • Step 1080 The EPROM memorizes the key codes of the Master Keys and their respective memory indices. The system then proceeds to step 1140 to the Display Mode of the system.
  • Step 1090 This step is reached if the answer to step 1040 is affirmative.
  • the system ascertains the mode of the reading status of the system, such as, for example, if the system is in a key program ⁇ ming mode or a mode for triggering a device.
  • Step 1100 A check is made to ascertain if the system is in the key programming mode. If the answer to this step is positive the system then proceeds to step 1120.
  • Step 1110 This step is reached by a nega ⁇ tive answer to step 1100. In this step a check is per ⁇ formed to determine if the system is in the free access mode. A negative answer to this check and the system advances to step 1140.
  • Step 1120 In this step the system triggers a device for which the key was inserted in the lock.
  • Step 1130 In this step a time count down commences for functioning of an external device or appli ⁇ cation.
  • the time counting generally commences for a given time period, for example 50 seconds, and counts down to zero time.
  • Display Mode the present operation of the system is displayed on a display device (Display Mode), such as
  • Step 1150 The system timer is initialized.
  • Step 1160 In this step the system waits until the timer reaches its zero time position.
  • Step 1170 The timer operation commences and the timer operation will be further described with respect to steps 1230 to 1450 in Fig. 9.
  • Step 1180 The system checks if the lock is in the self-protect mode. If the answer to step 1180 is positive the system returns to step 1160.
  • Step 1190 This step is reached if the answer to step 1180 is negative. In this step the system checks for the presence of a key in the lock.
  • Step 1200 If the answer to step 1190 is nega ⁇ tive, step
  • 1200 checks to ascertain if thee is a key present in the lock.
  • step 1200 For a negative answer to step 1200, the system returns to step 1160.
  • Step 1210 If the answer to step 1190 is affirmative, the key code is read and the system proceeds to step 1640, Fig. 8.
  • Step 1220 If the answer to step 1200 is af ⁇ firmative, the system ascertains that a correct key code was read and the system proceeds to step 1860, the "Correct Key Code Cycle", Fig.12
  • Step 1640 This step follows step 1210 of Fig. 7 as a result of a positive answer to step 1190. In this step the key code reading procedure commences.
  • Step 1650 The lock reads the key code.
  • Step 1660 The system asks if the key code read is the same as a previously read code. This step enables the system to differentiate between a situation in which a key is inserted in to the lock, immediately removed and is replaced by another key. Thus, the system knows if keys are inserted or removed and can ensure that it is acting on reliable and authorized information. For a negative answer, the system proceeds to step 1840.
  • Step 1840 If the answer to step 1660 is negative, the key code read presently by the lock is memorized.
  • Step 1850 In this step the system performs a security check and reads the key code a given number of times, for example
  • Step 1670 If the answer to step 1660 is posi ⁇ tive, the system performs a similar security check on the key code being read, to that described with respect to step 1850. The lock reads the key code again, a number of times, for example five times, thus ensuring the same key code is being read before proceeding to step 1700.
  • Step 1680 In this step the system asks if it has read the same key code successively the required number of times.
  • Step 1690 This step is reached if the answer to step 1680 is positive. In this step the key code position counter is reset to zero in readiness for further operations.
  • Step 1700 In this step the system compares the read key to the codes previously stored in the EPROM.
  • Step 1710 The system checks for a protection mode.
  • Step 1720 If the answer to step 1710 is af ⁇ firmative, step 1720 asks if the key code being read by the lock exists in the EPROM.
  • Step 1730 For an affirmative answer to step 1720, the system checks if it is recording the current operation of reading a key code.
  • Step 1760 For a negative answer to step 1730, step 1760 records that it is reading a key code.
  • Step 1770 This step checks if the code being read is belongs to the Master key subset.
  • Step 1780 Following a positive answer to step 1770, initialization of time or duration of the program ⁇ ming commences. The system returns to step 1210.
  • Step 1740 If the answer to step 1720 is nega ⁇ tive, the lock system enters the self-protect mode.
  • Step 1750 This present mode of the system is registered in the EPROM and the system returns step 1210.
  • Step 1790 If a negative answer is returned by step 1710, the system asks if the system is in the Master key programming mode.
  • Step 1800 For a positive answer to step 1790 the system checks if the Master key code being read exists in the EPROM.
  • Step 1810 For an affirmative answer to step 1180, the display reads: "ALREADY PROGRAMMED" and the system returns to step 1210.
  • Step 1820 A negative answer to step 1790 and the system checks for a User Key mode. A positive answer to this check and the system continues to step 1800. A negative answer to step 1820 and the system returns to step 1210.
  • Step 1830 This step is reached by a negative answer to step 1800.
  • the EPROM reads the key code and assigns the first available memory position to the read key code. The system returns to step 1210.
  • Fig. 9 demonstrates the timer operation and includes the following steps:
  • Step 1230 The timer operation commences and the system proceeds to step 1460, Fig. 10.
  • Step 1460 The system checks for the key pro ⁇ gramming mode. If the answer is negative, the system returns to step 1240.
  • Step 1470 For an affirmative reply to step 1460, a user enters the memory position of a key, such as a lost key, in to the EPROM by an external data entry.
  • a key such as a lost key
  • Step 1480 In this step the system asks if the code is to be advanced to the required memory location of the lost key.
  • Step 1490 For a positive answer to step 1480, the memory positions are advanced until the required location in memory is reached.
  • Step 1500 In this step the system asks if the external entry is requesting to increment the index number, index number has been reached. For a negative answer, the system returns to step 1240.
  • Step 1510 A positive answer to step 1500 and the key code of the lost key, occupying the present memory loca ⁇ tion, is erased from memory.
  • Step 1520 In this step the key code is set to zero.
  • Step 1240 The system asks if the timer for the programming mode countdown is set to zero. For a positive answer, the system proceeds to step 1320.
  • Step 1250 For a negative answer, the system continues its countdown.
  • Step 1260 Again the system asks if the zero position has been reached. If the answer is negative, the system proceeds to step 1320.
  • Step 1270 For a positive answer to step 1260, the system asks if a user's key is to be programmed in to memory.
  • Step 1280 If the answer to step 1270 is nega ⁇ tive, the system decides which key code is to be erased. This decision is based on steps 1480, 1490 and 1500 (Fig. 10) .
  • Step 1290 In this step the system enters the User Key programming mode.
  • Step 1300 In this step the system enters the Protect Mode.
  • Step 1310 In this step the system records its operation mode. This is done in case of power failure. Thus on reconnection of power the system returns to the correct mode.
  • Step 1320 In this step the system asks if it is in the command mode and is triggering the function of an external device.
  • Step 1330 If the answer to step 1320 is posi ⁇ tive, the system reads any information or command from the external source required to trigger the operation of the device.
  • external sources can be a push button control, a keyboard, a remote control transmitter or a computer device.
  • Step 1340 The system asks if the external information being received is a request to maintain the external device, being triggeepd, in its present position. 1350: If the answer to step 1340 is negative, a time countdown allocated to the operation commences.
  • Step 1360 In this step the system asks if the countdown of step 1350 is completed and returns to zero.
  • Step 1370 If the answer to step 1360 is posi ⁇ tive, the command device is deactivated.
  • Step 1380 In this step the system checks for the temporary free access mode. For a negative answer the system continues to step 1620.
  • Step 1390 For an affirmative answer to step 1380, the system enters the protection mode.
  • Step 1400 In this step, as for step 1310, the system registers its current mode.
  • Step 1410 If the answer to step 1340 is posi ⁇ tive the system proceeds to step 1410. In this step the countdown operation is activated.
  • Step 1420 If the answer to step 1320 is nega ⁇ tive, the system checks for the self-protect mode. If the answer to step 1420 is negative the system proceeds to step 1530.
  • Step 1430 If the answer to step 1420 is posi ⁇ tive, a self-protect countdown commences.
  • Step 1440 The system asks if the self-protect countdown is zero. If the answer is negative the system proceeds to step 1620.
  • Step 1450 If the answer to step 1440 is posi ⁇ tive, the system will double its time allocation for the self-protect mode, in the event of a second successive insertion of an erroneous key.
  • the flowchart includes the following:
  • Step 1530 The system is asking as in step 1730, if the system is in the current act of reading a key.
  • Step 1540 In this step the system reads the information from an external entry.
  • Step 1550 In this step, the system asks if the external source is requesting Permanent Free Access (PFA) .
  • PFA Permanent Free Access
  • Step 1560 If the answer to step 1550 is positive, the
  • Step 1570 This step is reached for a negative answer to step 1530.
  • the system asks if the current mode is PFA. A negative answer to this question and the system proceeds to step 1620.
  • Step 1580 If the answer to step 1570 is posi ⁇ tive, the system reads the external entry.
  • Step 1590 The system requests if the external entry also requires to trigger an external device.
  • Step 1600 If the answer to step 1590 is posi ⁇ tive, the system triggers the device.
  • Step 1610 In this step, the system initializes the lapse of time which is allocated to the previous order of triggering of the external device.
  • Step 1630 The end of operation of system timer.
  • the flowchart includes the following steps:
  • Step 1860 The "Correct Key Code Cycle” com ⁇ mences.
  • Step 1870 On reading a correct key code, the system erases from memory that the process of reading a key was undertaken.
  • Step 1880 The programming time commences counting down to time zero.
  • Step 1890 The system works in the minimum time allowed for the self-protect mode.
  • Step 1900 The system checks for the protect mode.
  • Step 1920 If the answer to step 1900 is posi ⁇ tive, the system enters the free temporary access mode. The system proceeds to step 1940.
  • Step 1910 If the answer to step 1900 is negative, the system requests if the permanent free access mode is required.
  • Step 1930 If the answer to step 1910 is af ⁇ firmative, the system enters the permanent free access mode.
  • Step 1940 The system then demands to operate the command device.
  • Step 1950 In this step, the initializing of the countd ⁇ taapof the command device commences.
  • Step 1970 For a positive answer to step I960, the system enters the protect mode.
  • Step 1980 In this step the command device is deactivated.
  • Step 1990 The system registers the mode in the EPROM.
  • Step 2000 The system enters the display mode and displays "Correct Key Code Read".
  • Step 2100 The end of "read correct cycle” is reached.

Abstract

An access control system includes a set of at least one keys (130) having an identifying code, a code storage memory (140) operative to store at least one identifying code, and a lock operative to read the identifying code of the key, wherein the lock has a learning mode and an operating mode, the lock being operative in the learning mode to store the identifying code of at least one of the keys in the code storage memory, and being operative in the operating mode to provide an output signal including an indication of whether the identifying code of at least one of the keys matches a stored identifying code.

Description

ACCESS CONTROL SYSTEM
FIELD OF THE INVENTION
The present invention relates to access control systems in general and in particular to electronic access control systems.
BACKGROUND OF THE INVENTION
Electronic access control systems are well known in the prior art. Electronic access control sys¬ tems include those described in the following US Patents: 5,140,317 to Hyatt, Jr. et al., 5,089,692 to Tonnesson, 5,083,122 to Clark, 5,019,812 to Gostahagberg et al., 5,003,810 to Stinar et al., 4,972,182 to Novik et al., 4,964,023 to Nishizawa et al., 4,937,437 to Ferguson, 4,922,736 to Tanaka et al., 4,891,636 to Rieker, 4,856,310 to Parienti, 4,789,859 to Clarkson et al., 4,712,103 to Gotanda, 4,663,952 to Gelhard, 4,392,134 to Lutz, 4,257,030 to Bruhin et al., 4,250,533 to Nelson, 4,232,353 to Mosciatti et al., 4,209,782 to Donath et al., 3,800,284 to Zucker et al., 3,686,659 to Bostrom, 3,660,831 to Nicola et al., and Re. 29,259 to Sabsay.
Commercially available access control systems include the SiteKey Intelligent system available from Medeco Security Electronics, 3625 Allegheny Drive, Salem, VA, 24153, USA. SUMMARY OF THE INVENTION
The present invention seeks to provide an improved access control system.
In the present invention, the word "key" refers to a device for insertion into a lock, such as an elec¬ tronic lock, as defined hereinbelow. The key includes a microchip which receives a random identifying code or "fingerprint", for example, during time of manufacture of the microchip. The identifying code includes a key code which may be one of 1040 possible combinations.
The term "index", in the present invention, refers to a location in an EPROM of the lock in which the key code is stored.
The memory locations in the EPROM are counted from a zero position. The key codes are stored in the first available location in memory and may be located by the location they occupy in memory.
The word "lock" or "locking system" in the present invention, refers to an electronic part of a system that reads and identifies key codes and processes the information. The lock receives instructions to memorize key codes and erase unwanted key codes, for example, the code of a lost key.
Thus, with the present invention, it is possi¬ ble to instruct more than one lock to read a single key code allowing the use of a single key for more than one lock system. Some of the modes of operation of the lock are:
(1) A mode for designating and processing at least one Master key of a set of keys. In this invention, a Master key is not only a key for opening external devices but also a key for authorizing the key programming mode of the system.
(2) A mode for processing at least one user key of a set of keys. A "set of keys" typically includes at least one Master key.
The Master key may also be used as a user key.
(3) A mode for sending output signals that trigger the functioning of a device.
There is thus provided, in accordance with a preferred embodiment of the present invention, an access control system including a set of at least one keys having an identifying code, a code storage memory opera¬ tive to store at least one identifying code, and a lock operative to read the identifying code of the key, where¬ in the lock has a learning mode and an operating mode, the lock being operative in the learning mode to store the identifying code of at least one of the keys in the code storage memory, and being operative in the operating mode to provide an output signal including an indication of whether the identifying code of at least one of the keys matches a stored identi¬ fying code.
Further in accordance with a preferred embodi¬ ment of the present invention, the code storage memory is operative to store a plurality of identifying codes.
Still further in accordance with a preferred embodiment of the present invention, the lock includes an interface between the lock and at least one of the keys and the interface includes no more than two electrical connections. Additionally in accordance with a preferred embodiment of the present invention, the lock enters the learning mode when the code storage memory is empty.
Further in accordance with a preferred embodi¬ ment of the present invention, the set of keys includes at least one master key.
Still further in accordance with a preferred embodiment of the present invention, the set of keys includes at least one user key.
Further in accordance with a preferred embodi¬ ment of the present invention, the learning mode stores the identifying code of at least one master key.
Additionally in accordance with a preferred embodiment of the present invention, the learning mode stores the identifying code of at least one user key. The user key may also be used as a user key.
Further in accordance with a preferred embodi¬ ment of the present invention, the lock re-enters learn¬ ing mode upon reading the identifying code of at least one of the master keys which matches the stored identify¬ ing code of the master key.
Still further in accordance with a preferred embodiment of the present invention, at least one of the keys is presented for reading by the lock.
Additionally in accordance with a preferred embodiment of the present invention, the lock receives signals from an external device for locating a location in the memory of the identifying code of at least one of the keys.
Further in accordance with a preferred embodi¬ ment of the present invention, the system may also in¬ clude an external device receiving the output control signal from the lock, wherein the external device is controlled by the control signal. Also provided, in accordance with another preferred embodiment of the present invention, is an access control method providing a set of at least one keys having an identifying code, storing at least one identifying code in a code storage memory, and providing a lock operative to read the identifying code of the key, which, in a learning mode, stores the identifying code of at least one of the keys in the code storage memory, and in an operating mode, provides an output signal including an indication of whether the identifying code of at least one of the keys matches a stored identifying code.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will be understood and appreciated from the following detailed description, taken in conjunction with the drawings in which:
Fig. 1 is a simplified block diagram of a locking system constructed and operative in accordance with a preferred embodiment of the present invention;
Figs. 2A - 2C are together a simplified flow chart illustrating the operation of the system of Fig. 1;
Figs. 3A - 3C are together a simplified flow chart illustrating the operation of step 240 of Fig. 2A;
Fig. 4 is a simplified flow chart illustrating the operation of step 220 of Fig. 2A;
Fig. 5 is a simplified pictorial illustration of a portion of the apparatus of Fig. 1;
Figs. 6A - 6C are simplified schematic diagrams of a portion of the system of Fig. 1;
Fig. 7 is a simplified flowchart illustrating the operation of another preferred embodiment of Figs. 2A - 4;
Fig. 8 is a simplified flowchart illustrating the operation of the key code reading portion of the method of Fig. 7;
Fig. 9 is a simplified flowchart illustrating the operation of the timing portion of the method of Fig. 7;
Fig. 10 is a simplified flowchart illustrating the operation of replacing the key code of a lost key by the method of Fig. 7; Fig. 11 is a simplified flowchart illustrating the operation of trig- gering an external device by the method of Fig. 7, and
Fig. 12 is a simplified flowchart illustrating the operation of reading of the correct key cycle of the method of
Fig. 7.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Reference is now made to Fig. 1 which is a simplified block diagram of a locking system which is constructed and operative in accordance with a preferred embodiment of the present invention. The apparatus of Fig. 1 comprises a CPU 100, such as an ST 62T10 B6-HWD commercially available from Thomson of France. The apparatus also comprises an I/O interface 120. In the case of the ST 62T10 B6-HWD, the I/O interface 120 is an integral part of the CPU 100. The I/O interface 120 is connected to the CPU 100; the CPU 100 may communicate with other components of the system through the I/O interface 120.
The apparatus of Fig. 1 further comprises one or more electronic keys 130. Each key 130 may be placed in removable operative contact with I/O interface 120, and thus with CPU 100. Each key 130 includes electronic circuitry, including circuitry which produces an identi¬ fying code number. The structure of the key 130 is described in detail below with reference to Figs. 5 and 6A - 6C. Preferably, there may be a multiplicity of possible identifying code numbers uniquely assigned to the keys 130 in such a way that each one of the keys 130 may have a different code number even if there are a multiplicity of the keys 130.
The apparatus of Fig. 1 further comprises a memory 140, which may be any suitable computer memory device such as an E-PROM device, for example the NMC 9306 commercially available from Thomson of France. The memory 140 is electrically connected to I/O interface 120 and thus to CPU 100. The memory 140 is capable of stor¬ ing at least one, and preferably a multiplicity, of identifying code numbers assigned to the keys 130.
The apparatus of Fig. 1 further comprises a control and reporting interface 150. The control and reporting interface 150 is electrically connected to I/O interface 120 and thus to the CPU 100. The control and reporting interface 150 transmits signals from the CPU 100 in order to control an external device and/or to send information concerning the operation of the CPU 100 to a reporting device. Preferably, the control and reporting interface 150 is selected so as to be compatible with the desired external devices and/or reporting devices.
Examples of external devices that might be controlled through the control and reporting interface 150 include the following: a) a bolt or latch controlling a door, a gate, or another entry barrier, whether the entry barrier bars entry to an outdoors area, a building, a room, a safe, or another enclosure; b) a vending machine; c) a vehicle ignition; d) a photocopy machine; e) a television, video machine, or other electronic device.
Examples of reporting devices that might re¬ ceive information through the control and reporting interface 150 include the following: a) a computer display screen or other display device; b) a computer memory device such as a disk or a tape; c) a printing device; d) an indicator light, such as an LED. Preferably, the system is configured to include at least an indicator light attached through control and reporting interface 150; such an indicator light is referred to herein as an LED.
The operation of the apparatus of Fig. 1 is now briefly described. The CPU 100 has a plurality of modes, comprising learning mode and operating mode. The opera¬ tion of the apparatus of Fig. 1 when CPU 100 is in learn¬ ing mode is as follows:
One of the keys 130 is placed in operative contact with the I/O interface 120. Operative contact may include insertion of the key 130 into a socket or keyhole; placing the key 130 in proximity with an induc¬ tive coupling; or another appropriate method of achieving operative contact. Placing the key 130 in operative contact with the I/O interface 120 is also termed herein "presenting" the key 130; removing the key 130 from operative contact with the I/O interface 120 is also termed herein "removing" the key 130.
The CPU 100 receives a signal from I/O inter¬ face 120 indicating that one of the keys 130 has been presented. The CPU 100 then reads the code number from the key 130 and stores the code number in the memory 140. When the key 130 is removed, the CPU 100 preferably remains in learning mode so that another one of the keys 130 can be placed in operative contact with the I/O interface 120. Alternatively, the CPU 100 may enter operating mode after the key 130 is removed.
The CPU 100 preferably remains in learning mode until a predefined sequence of events has occurred. The predefined sequence may include the presentation of a maximum number of different keys 130; the presentation of the same key 130 more than once; signaling through a switch or other signaling device, not shown in Fig. l; or some other appropriate sequence of events. When the predefined sequence of events has occurred, the CPU 100 enters operating mode.
The operation of the apparatus of Fig. 1 when CPU 100 is in operating mode is as follows: The CPU 100 receives a signal from I/O interface 120 indicating that one of the keys 130 has been presented. The CPU 100 then reads the code number from the key 130. The CPU 100 then sends a signal through the I/O interface 120 to the control and reporting interface 150. The signal may comprise one or more of the following: an indication of whether or not the code number read from the key 130 matches one of the code number in memory 140; an indica¬ tion to the control and reporting interface 150 to oper¬ ate or not to operate a particular external device; the code number read from the key 130; the current date and time.
The control and reporting interface 150 re¬ ceives the signal from the I/O interface 120 and, based on the signal, controls an external device or sends a report to a reporting device. In the case of control of an external device, the control may include one or more of the following: a) opening or closing a bolt or latch control¬ ling a door, a gate, or another entry barrier; b) dispensing or preventing the dispensing of a product from a vending machine; c) operating or preventing the operation of a vehicle ignition; d) allowing or preventing the operation of a photocopy machine; e) allowing or preventing the operation of a television, video machine, or other electronic device or restricting the operation of the electronic device to certain functions.
In the case of sending a report to a reporting device, the report may include the following: the code number read from the key; the date and time.
Reference is now made to Figs. 2A - 2C which is a simplified flow chart illustrating the operation of a preferred embodiment of the system of Fig. 1. The fol¬ lowing definitions are useful in understanding the present invention:
Protect mode: a mode of operation of the access control system wherein access is normally denied unless a correct key is presented.
Temporary free access mode: a mode of opera¬ tion of the access control system wherein access is unrestricted; no key is needed to gain access. This mode is called "temporary" because it generally is in effect for a relatively short period of time. This is the normal way of accessing whatever is controlled by the access control.
Permanent free access mode: a mode of opera¬ tion of the access control system wherein access is unrestricted; no key is needed to gain access. This mode is called "permanent" because it generally is in effect for a relatively long period of time.
Self protect mode: a mode of operation of the access control system wherein access is refused even to a normally permitted key. Generally, self protect mode is entered after an incorrect key is inserted. Self protect preferably remains in effect for a specific amount of time, such as one minute, upon the first instance of an incorrect key being inserted and remains in effect for a longer time, such as, for example, double the previous length of time, each time an incorrect key is again inserted.
Wait mode: a mode of operation of the access control system wherein the CPU 100 ceases to operate for a predefined time until the CPU 100 is awakened by a timer. The timer is preferably part of the microcontrol¬ ler and is programmed to awaken the CPU 100 at a prede¬ termined interval. Said interval is preferably no less than the longest time necessary to traverse the steps of Figs. 2A - 2C, described below, so that the CPU 100 is not awakened except when it is in wait mode. The interval may, for example be once every 20 milliseconds.
Default state: a state of the access control system, typically the state in which the access control system begins after it is manufactured and when it is first installed, in which no information about keys is stored in the reference table. In this state, the access control system stands ready to receive keys and record their codes in memory as valid keys.
The steps illustrated in Figs. 2A - 2C comprise the following:
STEP 200: Turn power on. Turning power on begins the operation of the system.
STEP 210: Initialize variables and timer. All variables associated with the system are given their initial values. A timer, used in subsequent steps, is set to zero. The locking system is placed in protect mode.
STEP 220: Initialize memory. The memory 140 is initialized. This step is explained in more detail below with reference to Fig. 4.
STEP 230: Wait mode. The CPU 100 enters wait mode until reawakened by the timer.
STEP 240: Check interruption timer. When the interruption timer, described above, activates the CPU 100 various checks are made to determine the next action to be taken. This step is described in more detail below with reference to Fig. 3.
STEP 250: Check temporary free access mode. Check to see whether the system is in temporary free access mode.
STEP 260: Check self protect mode. Check to see whether the system is in self protect mode.
STEP 270: Check for key present in lock. Check the lock to see whether any of the keys 130 has been presented to the lock.
STEP 280: Read key code. The code is read from the key 130.
STEP 290: Search key code in code reference table. The memory 140, as described above, stores the codes of those keys which are authorized for access; conceptually, the list of such codes may be considered to be a table, which is called the code reference table. The code reference table is searched to determine whether the code of the key 130 which was presented is found in the table.
STEP 300: Check whether the key code is found in the code reference table. A check is made to see whether the key code is found in the reference table. A key code found in the code reference table is authorized for access to the system; a key code absent from the code reference table is not authorized for access.
STEP 310: Check whether the system is in the default state. If in the default state, as described above, presentation of a key comprises a request to enter the key code into the code reference table, rather than a request for access.
STEP 320: Increment counter of invalid at¬ tempts. This step is reached when an invalid key has been presented; a count is kept to show how many times an invalid key has been presented.
STEP 330: Does counter of invalid attempts equal the maximum value? Check whether the counter of invalid attempts equals a predetermined value, as, for example, 25.
STEP 340: Enter self protect mode.
STEP 350: Indicate self protect mode. The fact that the system is in self protect mode is indicated through some reporting device, preferably an LED, at¬ tached to the control and reporting interface 150.
STEP 360: Does code read match previous code read? The key code is read a number of times on succes¬ sive cycles of the interruption timer to ensure that the code is read correctly. If an object other than a prop¬ erly constructed and operative key is presented to the lock, the lock will generally read a different code each time. The present step checks to see whether the key being presented has the same code as was read on the previous cycle of the interruption timer.
STEP 370: Increment the code stability coun¬ ter. This counter tracks the number of times that the same code has been read, on successive read attempts as explained above with reference to step 360.
STEP 380: Check if stability counter is at its maximum value. Check whether the number of times that the same code has been read in sequence is equal to a predetermined maximum value. Reaching this maximum value indicates that a key, as opposed to some other object, has been presented to the lock.
STEP 390: Write key code into code reference table. The code of the key that was presented is written into the code reference table, thus adding this key to the list of key authorized for the system.
STEP 400: Reset the code stability counter. The code stability counter is reset to zero to indicate that the code read is different from the previous code read.
STEP 410: Indicate wrong key. The fact that the an unauthorized key has been presented is indicated through some reporting device, preferably an LED, at¬ tached to the control and reporting interface 150.
STEP 420: Does the total number of memorized codes equal the total size of the code reference table less one? The code reference table holds all the keys that have been learned. If some predetermined number of those keys is presented, then it is possible to learn another key. For example, a fixed number such as two keys may be required; alternatively, a number dependent on the total number of keys learned, such as the total number less one, may be required.
STEP 430: Initialize code of lost key with default value. The code of the lost key is erased and replaced with the default value. The default value is some determined value, for example 0.
STEP 440: Has a key been recognized in previ¬ ous readings? Check whether the key most recently inserted in the lock is a known key in the code reference table.
STEP 450: Check if correct key is already memorized.
STEP 460: Start countdown for permanent free access. After a predetermined period of time, as, for example, one minute, with the key remaining in the lock, the system will enter permanent free access mode upon removal of the key.
STEP 470: Store recognition of key in memory. The first time that the key is used for this particular operation, the key code is stored in memory.
STEP 480: Indicate key recognition. The fact that a recognized key has been presented is indicated through some reporting device, preferably an LED, at¬ tached to the control and reporting interface 150.
Reference is now made to Figs. 3A - 3C, which are a simplified flow chart illustrating the operation of step 240 of Fig. 2A. The steps of Fig. 3 include the following:
STEP 500: Is free access mode active? Check to see if free access mode is active.
STEP 505: Is permanent free access mode ac¬ tive? Check to see if permanent free access mode is active.
STEP 510: Read external input. Optionally, an additional external input device may be present in the system. For example, a time-of-day clock providing the current time might optionally be present so that access is further restricted or less restricted at certain times of day. If the optional external input device is present, it is read in the present step. STEP 520: Temporary free access requested? Check whether temporary free access has been requested.
STEP 530: Increase the duration of temporary free access. Temporary free access mode must already be in effect, since the "yes" branch of step 500 and the "no" branch of step 505 have been traversed. Therefore, since temporary free access has been requested, the duration of temporary free access is now increased by some predetermined amount.
STEP 540: Decrement duration of temporary free access. Temporary free access mode is in effect, as explained above with reference to step 530. Since tempo¬ rary free access has not been requested, the remaining duration of temporary free access mode is decreased.
STEP 550: End temporary free access timing? Check whether the temporary free access timer has been decremented to zero.
STEP 560: Erase memorized indices correspond¬ ing to read keys. The "yes" branch of step 550 having been traversed, temporary free access mode is now over. Since the system has been in temporary free access mode, the system is not in programming mode where new keys are memorized. Therefore, the indices corresponding to recently read keys are erased to prevent their being accidentally treated as part of a key memorization proc¬ ess.
STEP 570: Deactivate operating devices. The external device controlled by the system is deactivated. For example, if the external device is a bolt associated with a door, the bolt is locked.
STEPS 575 - 595 : The display indicates the current mode. The display may be any appropriate dis¬ play, such as, for example: an LED; a series of differ¬ ently colored lights or LEDs; or a computer display screen. The specific steps which display the current mode are:
STEP 575: Display "protected mode". STEP 580: Display "temporary free access mode"
STEP 585: Display "permanent free access mode"
STEP 590: Display "not programmed". STEP 595: Display "request permanent free access,
STEP 600: Self protect mode? Check if self protect mode is active.
STEP 605: Decrement self protect timing. Reduce the remaining time that self protect mode must remain in effect.
STEP 610: End self protect mode? If the self protect mode timer has reached zero, self protect mode should end.
STEP 615: Double self protect duration if new reading is incorrect. As explained above with reference to the definition of self protect mode, if another incor¬ rect key is presented then the self protect time is doubled.
STEP 620: Enter protected mode.
STEP 625: Key present and correct? Check whether a key is present and correct.
STEP 630: Decrement "request permanent free access" timing. As explained above with reference to step 460, permanent free access mode is entered when a valid key has been has been in the lock for a specified period of time and is then removed. The associated timer, which tracks how long the key has been in the lock, is decremented.
STEP 635: End "request permanent free access" timing? Check if the "request permanent free access" timer has expired. If the timer has expired, then the key has been in the lock long enough to request permanent free access.
STEP 640: Memorize request of "permanent free access". Note that permanent free access is now in effect.
STEP 645: Code(s) with default values? Check whether the key code tables have default values, indicat¬ ing that no keys have yet been programmed.
Reference is now made to Fig. 4, which is a simplified flow chart illustrating the operation of step 220 of Fig. 2A. The steps of Fig. 4 include the follow¬ ing:
STEP 650: Read EPROM identifier. The EPROM contains an identifying code; reading this code verifies whether the EPROM is already known to the system. If not, the EPROM will be initialized in subsequent steps.
STEP 655: Identifier correct? Is the EPROM already known?
STEP 660: Initialize all key codes with de¬ fault values. Since the EPROM is not known to the sys¬ tem, it does not contain valid information. Therefore, all key code values must be initialized to the default.
STEP 665: Write codes on EPROM. The default values are written to the EPROM.
STEP 670: Write identifier on EPROM. The identifying code associated with this system is written to the EPROM. Preferably, each access control system has a unique identifying code.
STEP 675: Read EPROM codes. The codes in the EPROM are read into active system memory.
STEP 680: Are there one or more codes with default values? Check if there are any default values in the key code table.
STEP 685: Display "protected mode". The system enters protected mode if the key code table is filled in.
STEP 690: Display "not programmed". The system enters programming mode if part of all of the key code table has default values, indicating that the system is not fully programmed.
Reference is now made to Fig. 5 which is a simplified pictorial illustration of a portion of the apparatus of Fig. 1. The key 130 comprises a shank 700, formed of a conductive material, typically metal. The key 130 further comprises a junction 705, formed of an insulating material. The junction 705 is formed so as to divide the shank 700 into two portions electrically insulated from each other.
An electronic circuit 710 is mounted across the junction 705, such that each terminal 720 of the elec¬ tronic circuit 710 may be in contact, respectively, with the shank 700 on each side of the junction 705. Biasing means 715, such as springs, are mounted so as to maintain the two terminals 720 in electrical contact, respective¬ ly, with the two sides of the junction 705. Preferably, as depicted in Fig. 5, there are two terminals 720 and two portions of the shank 700 insulated from each other by the junction 705, although there may be more than two terminals 720 and more than two portions of the shank 700.
Reference is now made to Figs. 6A - 6C are simplified schematic diagrams of a portion of the system of Fig. 1. Fig. 6A is a simplified schematic diagram of a preferred embodiment of the CPU 100, the I/O interface 120, the memory 140, and the control and reporting inter¬ face 150. Fig. 6B is a simplified schematic diagram of a preferred embodiment of the portion of the key 130 com¬ prising electronic circuit 710 of Fig. 5. Fig. 6C is a simplified schematic diagram illustrating the operational interface between the apparatus of Fig. 6A and the appa¬ ratus of Fig. 6B. It will be appreciated from Fig. 6C that the operational interface requires only two electri¬ cal connections. In Figs. 7 to 12 illustrate another preferred embodiment of the present invention for coding keys and reading key codes.
The steps illustrated in Fig. 7 include the following:
Steps 1000 and 1010: Steps 1000 and 1010 are the same as steps 200 and 210 of the first embodiment of the invention and the system is set in order to read a key inserted into a lock.
Step 1030: The system reads a key index.
Step 1040: The system checks the contents of the EPROM index.
Step 1050: If the answer to step 1040 is nega¬ tive, namely the key index is unrecognizable to the EPROM, the EPROM code is set to its zero position for writing a key code and an index.
Step 1070: In this step, a set of Master Keys is created. The Master Key set of the system is generally identified as a first key subset, of a set of keys, to be read by the system. The number of Master Keys, in the Master Key subset, to be used by a device of the present invention, is arbitrary and is decided upon by the user in this step.
Step 1080: The EPROM memorizes the key codes of the Master Keys and their respective memory indices. The system then proceeds to step 1140 to the Display Mode of the system.
Step 1090: This step is reached if the answer to step 1040 is affirmative. In this step the system ascertains the mode of the reading status of the system, such as, for example, if the system is in a key program¬ ming mode or a mode for triggering a device.
Step 1100: A check is made to ascertain if the system is in the key programming mode. If the answer to this step is positive the system then proceeds to step 1120.
Step 1110: This step is reached by a nega¬ tive answer to step 1100. In this step a check is per¬ formed to determine if the system is in the free access mode. A negative answer to this check and the system advances to step 1140.
Step 1120: In this step the system triggers a device for which the key was inserted in the lock.
Step 1130: In this step a time count down commences for functioning of an external device or appli¬ cation. The time counting generally commences for a given time period, for example 50 seconds, and counts down to zero time. Step
1140: In this step the present operation of the system is displayed on a display device (Display Mode), such as
an LED.
Step 1150: The system timer is initialized.
Step 1160: In this step the system waits until the timer reaches its zero time position.
Step 1170: The timer operation commences and the timer operation will be further described with respect to steps 1230 to 1450 in Fig. 9.
Step 1180: The system checks if the lock is in the self-protect mode. If the answer to step 1180 is positive the system returns to step 1160.
Step 1190: This step is reached if the answer to step 1180 is negative. In this step the system checks for the presence of a key in the lock.
Step 1200: If the answer to step 1190 is nega¬ tive, step
1200 checks to ascertain if thee is a key present in the lock.
For a negative answer to step 1200, the system returns to step 1160.
Step 1210: If the answer to step 1190 is affirmative, the key code is read and the system proceeds to step 1640, Fig. 8.
Step 1220: If the answer to step 1200 is af¬ firmative, the system ascertains that a correct key code was read and the system proceeds to step 1860, the "Correct Key Code Cycle", Fig.12
Reference is now made to Fig. 8 and the illus¬ trated flowchart includes the following steps:
Step 1640: This step follows step 1210 of Fig. 7 as a result of a positive answer to step 1190. In this step the key code reading procedure commences.
Step 1650: The lock reads the key code.
Step 1660: The system asks if the key code read is the same as a previously read code. This step enables the system to differentiate between a situation in which a key is inserted in to the lock, immediately removed and is replaced by another key. Thus, the system knows if keys are inserted or removed and can ensure that it is acting on reliable and authorized information. For a negative answer, the system proceeds to step 1840.
Step 1840: If the answer to step 1660 is negative, the key code read presently by the lock is memorized.
Step 1850: In this step the system performs a security check and reads the key code a given number of times, for example
5 times, to ensure that the system is memorizing the same key code belonging to the key presently inserted in the lock.
Step 1670: If the answer to step 1660 is posi¬ tive, the system performs a similar security check on the key code being read, to that described with respect to step 1850. The lock reads the key code again, a number of times, for example five times, thus ensuring the same key code is being read before proceeding to step 1700.
Step 1680: In this step the system asks if it has read the same key code successively the required number of times.
Step 1690: This step is reached if the answer to step 1680 is positive. In this step the key code position counter is reset to zero in readiness for further operations.
Step 1700: In this step the system compares the read key to the codes previously stored in the EPROM.
Step 1710: The system checks for a protection mode.
Step 1720: If the answer to step 1710 is af¬ firmative, step 1720 asks if the key code being read by the lock exists in the EPROM.
Step 1730: For an affirmative answer to step 1720, the system checks if it is recording the current operation of reading a key code.
Step 1760: For a negative answer to step 1730, step 1760 records that it is reading a key code. Step 1770: This step checks if the code being read is belongs to the Master key subset.
Step 1780: Following a positive answer to step 1770, initialization of time or duration of the program¬ ming commences. The system returns to step 1210.
Step 1740: If the answer to step 1720 is nega¬ tive, the lock system enters the self-protect mode.
Step 1750: This present mode of the system is registered in the EPROM and the system returns step 1210.
Step 1790: If a negative answer is returned by step 1710, the system asks if the system is in the Master key programming mode.
Step 1800: For a positive answer to step 1790 the system checks if the Master key code being read exists in the EPROM.
Step 1810: For an affirmative answer to step 1180, the display reads: "ALREADY PROGRAMMED" and the system returns to step 1210.
Step 1820: A negative answer to step 1790 and the system checks for a User Key mode. A positive answer to this check and the system continues to step 1800. A negative answer to step 1820 and the system returns to step 1210.
Step 1830: This step is reached by a negative answer to step 1800. In this step the EPROM reads the key code and assigns the first available memory position to the read key code. The system returns to step 1210.
Fig. 9 demonstrates the timer operation and includes the following steps:
Step 1230: The timer operation commences and the system proceeds to step 1460, Fig. 10.
Step 1460: The system checks for the key pro¬ gramming mode. If the answer is negative, the system returns to step 1240.
Step 1470: For an affirmative reply to step 1460, a user enters the memory position of a key, such as a lost key, in to the EPROM by an external data entry.
Step 1480: In this step the system asks if the code is to be advanced to the required memory location of the lost key.
Step 1490: For a positive answer to step 1480, the memory positions are advanced until the required location in memory is reached.
Step 1500: In this step the system asks if the external entry is requesting to increment the index number, index number has been reached. For a negative answer, the system returns to step 1240.
Step 1510: A positive answer to step 1500 and the key code of the lost key, occupying the present memory loca¬ tion, is erased from memory.
Step 1520: In this step the key code is set to zero.
Continuing the procedure, the flowchart in Fig. 9 includes the following steps:
Step 1240: The system asks if the timer for the programming mode countdown is set to zero. For a positive answer, the system proceeds to step 1320.
Step 1250: For a negative answer, the system continues its countdown.
Step 1260: Again the system asks if the zero position has been reached. If the answer is negative, the system proceeds to step 1320.
Step 1270: For a positive answer to step 1260, the system asks if a user's key is to be programmed in to memory.
Step 1280: If the answer to step 1270 is nega¬ tive, the system decides which key code is to be erased. This decision is based on steps 1480, 1490 and 1500 (Fig. 10) .
Step 1290: In this step the system enters the User Key programming mode.
Step 1300: In this step the system enters the Protect Mode.
Step 1310: In this step the system records its operation mode. This is done in case of power failure. Thus on reconnection of power the system returns to the correct mode.
Step 1320: In this step the system asks if it is in the command mode and is triggering the function of an external device.
Step 1330: If the answer to step 1320 is posi¬ tive, the system reads any information or command from the external source required to trigger the operation of the device. Examples of external sources can be a push button control, a keyboard, a remote control transmitter or a computer device.
Step 1340: The system asks if the external information being received is a request to maintain the external device, being triggeepd, in its present position. 1350: If the answer to step 1340 is negative, a time countdown allocated to the operation commences.
Step 1360: In this step the system asks if the countdown of step 1350 is completed and returns to zero.
Step 1370: If the answer to step 1360 is posi¬ tive, the command device is deactivated.
Step 1380: In this step the system checks for the temporary free access mode. For a negative answer the system continues to step 1620.
Step 1390: For an affirmative answer to step 1380, the system enters the protection mode.
Step 1400: In this step, as for step 1310, the system registers its current mode.
Step 1410: If the answer to step 1340 is posi¬ tive the system proceeds to step 1410. In this step the countdown operation is activated.
Step 1420: If the answer to step 1320 is nega¬ tive, the system checks for the self-protect mode. If the answer to step 1420 is negative the system proceeds to step 1530.
Step 1430: If the answer to step 1420 is posi¬ tive, a self-protect countdown commences.
Step 1440: The system asks if the self-protect countdown is zero. If the answer is negative the system proceeds to step 1620.
Step 1450: If the answer to step 1440 is posi¬ tive, the system will double its time allocation for the self-protect mode, in the event of a second successive insertion of an erroneous key.
Referring to Fig. 11, the flowchart includes the following:
Step 1530: The system is asking as in step 1730, if the system is in the current act of reading a key.
Step 1540: In this step the system reads the information from an external entry.
Step 1550: In this step, the system asks if the external source is requesting Permanent Free Access (PFA) .
Step 1560: If the answer to step 1550 is positive, the
system requests PFA mode. Step 1570: This step is reached for a negative answer to step 1530. The system asks if the current mode is PFA. A negative answer to this question and the system proceeds to step 1620.
Step 1580: If the answer to step 1570 is posi¬ tive, the system reads the external entry.
Step 1590: The system requests if the external entry also requires to trigger an external device.
Step 1600: If the answer to step 1590 is posi¬ tive, the system triggers the device.
Step 1610: In this step, the system initializes the lapse of time which is allocated to the previous order of triggering of the external device.
Step 1630: The end of operation of system timer.
Referring to Fig. 12, the flowchart includes the following steps:
Step 1860: The "Correct Key Code Cycle" com¬ mences.
Step 1870: On reading a correct key code, the system erases from memory that the process of reading a key was undertaken.
Step 1880: The programming time commences counting down to time zero.
Step 1890: The system works in the minimum time allowed for the self-protect mode.
Step 1900: The system checks for the protect mode.
Step 1920: If the answer to step 1900 is posi¬ tive, the system enters the free temporary access mode. The system proceeds to step 1940.
Step 1910: If the answer to step 1900 is negative, the system requests if the permanent free access mode is required. Step 1930: If the answer to step 1910 is af¬ firmative, the system enters the permanent free access mode.
Step 1940: The system then demands to operate the command device.
Step 1950: In this step, the initializing of the countdβtaapof the command device commences. 1960: If the answer to step 1910 is negative, the system checks for the permanent free access mode. For a nega¬ tive reply to step 1960 the system proceeds to step 2100.
Step 1970: For a positive answer to step I960, the system enters the protect mode.
Step 1980: In this step the command device is deactivated.
Step 1990: The system registers the mode in the EPROM.
Step 2000: The system enters the display mode and displays "Correct Key Code Read".
Step 2100: The end of "read correct cycle" is reached.
It is appreciated that various features of the invention which are, for clarity, described in the con¬ texts of separate embodiments may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, de¬ scribed in the context of a single embodiment may also be provided separately or in any suitable subcombination.
It will be appreciated by persons skilled in the art that the present invention is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present invention is defined only by the claims that follow:

Claims

1. An access control system comprising: a set of at least one keys having an identify¬ ing code; a code storage memory operative to store at least one identifying code; and a lock operative to read the identifying code of the key, wherein said lock has a learning mode and an operating mode, the lock being operative in the learning mode to store the identifying code of at least one of the keys in the code storage memory, and being operative in the operating mode to provide an output signal comprising an indication of whether the identifying code of at least one of the keys matches a stored identi¬ fying code.
2. An access control system according to claim 1 wherein the code storage memory is operative to store a plurality of identifying codes.
3. An access control system according to any of the preceding claims wherein the lock comprises an inter¬ face between the lock and at least one of the keys and the interface comprises no more than two electrical connections.
4. An access control system according to any of claims 1 and 2 wherein the lock enters the learning mode when the code storage memory is empty.
5. An access control system according to claim 1 wherein said set of keys comprises at least one master key .
6. An access control system according to claim 1 wherein said set of keys comprises at least one user key.
7. An access control system according to claim 5 wherein the learning mode stores the identifying code of at least one master key.
8. An access control system according to claim 6 wherein the learning mode stores the identifying code of at least one user key.
9. An access control system according to claim 8 wherein the lock re-enters learning mode upon reading the identifying code of at least one of the master keys which matches the stored identifying code of the master key.
10. An access control system according to claim 9 wherein at least one of the keys is presented for reading by the lock.
11. An access control system according to claim 1 wherein said lock receives signals from an external device for locating a location in the memory of the identifying code of at least one of the keys.
12. An access control system according to any of the preceding claims and also comprising an external device receiving the output control signal from the lock, wherein the external device is controlled by the control signal.
13. An access control method comprising: providing a set of at least one keys having an identifying code; storing at least one identifying code in a code storage memory; and providing a lock operative to read the identi¬ fying code of the key, which, in a learning mode, stores the identifying code of at least one of the keys in the code storage memory, and in an operating mode, provides an output signal comprising an indication of whether the identifying code of at least one of the keys matches a stored identifying code.
14. A system according to any of the preceding claims 1 - 12 and substantially as shown and described above.
15. A system according to any of the preceding claims 1 - 12 and substantially as illustrated in any of the drawings.
16. A method according to claim 13 and substantial¬ ly as shown and described above.
17. A method according to claim 13 and substantial¬ ly as illustrated in any of the drawings.
PCT/US1995/015968 1994-12-11 1995-12-11 Access control system WO1996019083A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU45117/96A AU4511796A (en) 1994-12-11 1995-12-11 Access control system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IL111947 1994-12-11
IL11194794 1994-12-11
IL114888 1995-08-09
IL11488895A IL114888A0 (en) 1995-08-09 1995-08-09 Access control system

Publications (1)

Publication Number Publication Date
WO1996019083A1 true WO1996019083A1 (en) 1996-06-20

Family

ID=26322959

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1995/015968 WO1996019083A1 (en) 1994-12-11 1995-12-11 Access control system

Country Status (2)

Country Link
AU (1) AU4511796A (en)
WO (1) WO1996019083A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997031347A1 (en) * 1996-02-22 1997-08-28 Volumatic Limited Key security system
GB2359914A (en) * 2000-03-01 2001-09-05 Peter Victor Devito A method of selectively granting or barring access in a token controlled access system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4750118A (en) * 1985-10-29 1988-06-07 Chamberlain Manufacturing Corporation Coding system for multiple transmitters and a single receiver for a garage door opener
US4789859A (en) * 1986-03-21 1988-12-06 Emhart Industries, Inc. Electronic locking system and key therefor
US4845490A (en) * 1987-01-28 1989-07-04 Emhart Industries, Inc. Electronic locking system
US4967305A (en) * 1989-01-06 1990-10-30 Datatrak, Inc. Electronic door lock apparatus, system and method
US5140317A (en) * 1990-05-11 1992-08-18 Medeco Security Locks, Inc. Electronic security system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4750118A (en) * 1985-10-29 1988-06-07 Chamberlain Manufacturing Corporation Coding system for multiple transmitters and a single receiver for a garage door opener
US4789859A (en) * 1986-03-21 1988-12-06 Emhart Industries, Inc. Electronic locking system and key therefor
US4845490A (en) * 1987-01-28 1989-07-04 Emhart Industries, Inc. Electronic locking system
US4967305A (en) * 1989-01-06 1990-10-30 Datatrak, Inc. Electronic door lock apparatus, system and method
US5140317A (en) * 1990-05-11 1992-08-18 Medeco Security Locks, Inc. Electronic security system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997031347A1 (en) * 1996-02-22 1997-08-28 Volumatic Limited Key security system
GB2359914A (en) * 2000-03-01 2001-09-05 Peter Victor Devito A method of selectively granting or barring access in a token controlled access system
GB2359914B (en) * 2000-03-01 2003-07-09 Peter Victor Devito A method of selectively granting and barring access and apparatus therefor

Also Published As

Publication number Publication date
AU4511796A (en) 1996-07-03

Similar Documents

Publication Publication Date Title
US4634846A (en) Multimode programmable stand-alone access control system
US3866173A (en) Access control system for restricted area
US4970504A (en) Security system
US4972182A (en) Electronic security lock
US4148012A (en) Access control system
US4095739A (en) System for limiting access to security system program
AU2001247941B2 (en) Method and apparatus for computer memory protection and verification
US4795893A (en) Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power
USRE35336E (en) Self-contained programmable terminal for security systems
US5067155A (en) Method and means to limit access to computer systems
US5513105A (en) Vehicle security system
EP0372110A1 (en) A security system
GB1414126A (en) Secutity for computer systems
GB1597984A (en) Security systems
JPS60138645A (en) Safety device and method for disabling microprocessor control type electronic equipment after occurrence of use forbidding event
AU2001247941A1 (en) Method and apparatus for computer memory protection and verification
US5233658A (en) Method and means to limit access to computer systems
GB2118614A (en) Method of code changing for electronic lock
US5986564A (en) Microcomputer controlled locking system
US20050179544A1 (en) Security system
CA1252854A (en) Microcomputer controlled locking system
WO1996019083A1 (en) Access control system
JPS5980871A (en) Key code register system for guard
JPH0288859A (en) Systematized control for entering or leaving room with ic card
JPH05204766A (en) Identity confirming device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TT UA UG US UZ VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642