Nothing Special   »   [go: up one dir, main page]

EP0239388B1 - Security system - Google Patents

Security system Download PDF

Info

Publication number
EP0239388B1
EP0239388B1 EP87302584A EP87302584A EP0239388B1 EP 0239388 B1 EP0239388 B1 EP 0239388B1 EP 87302584 A EP87302584 A EP 87302584A EP 87302584 A EP87302584 A EP 87302584A EP 0239388 B1 EP0239388 B1 EP 0239388B1
Authority
EP
European Patent Office
Prior art keywords
key
slave
security system
security
holder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP87302584A
Other languages
German (de)
French (fr)
Other versions
EP0239388A1 (en
Inventor
John Balfour Cockburn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cockburn John Balfour
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AT87302584T priority Critical patent/ATE87108T1/en
Publication of EP0239388A1 publication Critical patent/EP0239388A1/en
Application granted granted Critical
Publication of EP0239388B1 publication Critical patent/EP0239388B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass

Definitions

  • the present invention relates to security systems. It is an object of the invention to provide a security system of high security.
  • a security system comprises a security device, a master key, and one or more slave keys, the security device being programmable by use of the master key to respond to and only to, selected slave keys in combination with a coded representation of some personal characteristic of the slave key holder, for example, his thumb print, the pattern of his retinal blood-vessels, or his voice.
  • the master key and/or the slave keys may be in the form of a plastic card of similar type to a credit card, which may have a magnetic stripe carrying coded information, or may have computing or data storage means actually incorporated in the card.
  • the master key is of this type, but the slave key is a mechanical key having an enlarged portion containing means for detecting and digitising the print of a thumb grasping the key, and provided on its blade with electrical contacts whereby the digitized information may be passed to computing circuits within the security device.
  • the slave keys are plastic cards as described above, but the key holder speaks into a microphone and the frequency spectrum of his voice is analysed and digitally coded, or he may be required to look into an eyepiece, adjust his position until targets visible through the eyepiece are in alignment, and then, for example by pressing a button, cause his retinal image to be recorded and digitised.
  • additional security may be achieved by requiring the keyholder to supply in addition, a personal identification number.
  • U.S. Patent 3,383,657 describes a system in which a person is identified by scanning fingerprint optically to generate identifiers and comparing them with identifiers recorded on a personal identification card.
  • U.S. Patent 4,095,739 describes a system in which numbers on a security card are compared with numbers held in a store. A supervisory card unlocks access from a keyboard to enable numbers to be entered into the store.
  • the system comprises a locking device 1 which incorporates the steering lock and ignition switch of a motor car to be protected by the system, and if the car is equipped with a centralised locking system, also incorporates the door and boot locks.
  • the locking device includes computing means 2, the function of which will be more fully described below.
  • a master key 3 in the form of a plastic card containing recorded information which cooperates with the computing means 2 in the locking device to enable it to carry out a programming operation.
  • This master key is sent with the car in a sealed container, to be opened only by the purchaser of the car.
  • slave keys 4 With the car there are also supplied a number of slave keys 4 whose construction will be described more fully below.
  • the locking device has a slot to receive the master key and a keyhole for the insertion of a slave key.
  • the computing means When the car is sent from the factory the computing means is pre-programmed to respond to a slave key of a kind which is supplied to garages and distributors to enable them to service and transport the car as required.
  • the slave key as supplied to the purchaser of the car is of a more elaborate form, as shown in the figure. It resembles a conventional key, having a blade 5 and a stock or handle portion 6. This is provided with a window 7 over which the thumb of the key holder will be pressed in use, being located by a ridge 8 round the rim of the handle.
  • the window 7 contains electronic means for digitising the pattern of ridges on the surface of the holder's thumb, and electrical contacts 9,10 provided in the blade 5 of the key allow the digital data produced in this way to be passed to the computing means in the locking device.
  • the car When the car is delivered to the purchaser he breaks open the package containing the master key 3 and inserts the master key in the slot provided in the locking device. He then presses a reset button 11 provided in the locking device, causing any programme already set into the computing means to be deleted. He then inserts his slave key 4 with his thumb pressed over the window 7, and, by pressing an insert button 12 provided in the locking device causes the computing means to programme itself to recognise this slave key in combination with his own thumb print. By the insertion of another slave key and a further pressure of the insert button 12, the computing means of locking device may be programmed to recognise the key and thumb print of other persons whom he wishes to authorise to drive the car. Finally, he removes the master key, without which the computing means cannot further be programmed, or the programmes deleted.
  • the car is programmed, so to speak, to recognise the thumb prints of only those persons who are authorised to drive it, and to reject attempts to enter or to start the car by any other person.
  • the system is arranged to delete the initial programme set into the locking device automatically on first insertion of the master key, irrespective of whether or not the reset button is pressed. This ensures that the owner does not inadvertently leave the car accessible to anyone with a garage slave key.
  • the key is shown in the drawing as being similar to the conventional type of key used with cylinder locks, it need not be of key shape at all. It could be a plastic card incorporating a chip carrying the digitising means, or a plug-in device of any suitable shape.
  • the master key When ownership of the car is transferred, the master key is transferred with the car, and the new owner inserts it, presses the reset button to delete any previous programmes contained within the computing means and re-programmes it as necessary for his own purposes.
  • the slave key is also in the form of a plastic card and a single slot is provided in the locking device. Insertion, followed by removal, of the master key sets the locking device into its programming mode, and the slave keys can then be inserted, whereupon the locking device will be programmed to recognise them. A further insertion and removal of the master key closes the programming mode, and restores the device to its normal locking mode. While in the programming mode, it may be arranged that insertion of a slave key without a thumb on the digitising means will cancel that slave key from the programme.
  • thumb print digitiser In a simplified and less expensive version, only one thumb print digitiser is used, and this is placed on the dash board of the car.
  • the key may be a normal type of key, or of the credit card type, but in this case the thumb print check is not available against the opening of the external doors of the car, but only against unauthorised starting of the car since the digitiser is not accessible until the user has entered the car.
  • the above description relates to the protection of motor cars, but the system is of much more general application. It may be used for example, for controlling entry to hotel rooms or access to sensitive areas such as bank strongrooms or computer rooms containing confidential information, to domestic or office premises, to boats and caravans and the like. Furthermore, it may be used for controlling the operation of cash dispensers and other computer terminal devices, switch gear and machinery and anything else which needs to be protected from unauthorised interference.
  • Figure 2 illustrates diagrammatically an embodiment of the invention suitable for controlling access to premises or for restricting the operation of apparatus to authorised personnel.
  • This embodiment makes use of identification of the key holder by means of a voice recognition system.
  • voice recognition systems have been extensively described in the literature and by way of example reference may be made to the paper "High performance speaker verification using principal spectral components" by J.M. Naik and G.R. Doddington in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Tokyo, 1986, page 881-884.
  • FIG. 2 is a greatly simplified view of the console of apparatus for carrying out this embodiment of the invention.
  • the master and slave keys employed are both in the form of plastic cards which may be coded with a magnetic stripe or may incorporate a storage chip. Two card readers are provided, the first of them, 20, for the master key and the other, 21, for the slave keys.
  • a reset button 11 and an insert button 12 allow for programming, as described with reference to the embodiment of Figure 1, and the console is further provided with a display device 22 and a microphone 23.
  • the key holder inserts his slave key into the reader 21, whereupon the display 22 presents a number of digits or syllables which the key holder then pronounces into the microphone 23.
  • the computer circuits provided in the console analyse the sounds so recorded by means of a suitable algorithm, such, for example, as that in the above-mentioned paper, to obtain a set of parameters, which are then compared with stored information previously programmed into the computer memory.
  • a key pad 24 may be provided so that the key holder may also be required to key in a personal identification number in known manner. Such a key pad is also applicable to the other embodiments of the invention described herein.
  • the master key is inserted into the card reader 20 and the reset button 11 is pressed, thereupon clearing all stored slave key information from the computer memory of the system.
  • a slave key is then inserted into the card reader 21 and the insert button 12 is pressed and held down while the key holder speaks into the microphone 23, pronouncing whatever digits or syllables are displayed on the display 22.
  • the computer system may require him to repeat each a number of times so that each can be digitised and the results averaged.
  • the insert key is released and the slave key card is ejected.
  • a number of slave keys can be recorded in this manner, after which the master card is recovered, which may be arranged for example, to occur on pressing the insert button 12 when no slave card has been inserted into the reader 21.
  • FIG 3 is a fragmentary side view of the console of a modified form of the security system described with reference to Figure 2, in which identification of the slave key holder depends not on voice recognition but on recognition of the pattern of his optical fundus.
  • the display 22 and microphone 23 are replaced by an optical system 30 having an eyepiece 31.
  • the system is provided with master and slave card readers 20,21 and with reset and insert buttons 11,12 as described with reference to Figure 2 and with an additional record button 33.
  • the slave card holder inserts his card into the card reader 21 and looks into the eyepiece 31 of the optical system 30.
  • the eyepiece presents two or more target images to the view of the key holder and by moving his head slightly and adjusting the distance of his eye from the eyepiece, these images can be caused to coincide.
  • the key holder presses the record button 33 and the image of his retina is recorded within the optical system 30.
  • This image is then digitised, and the resulting digits are compared with stored data representing the fundus images of authorised key holders.
  • locking and unlocking is performed only by the slave keys.
  • the master key does not lock or unlock any physical device, but merely opens or closes the programming facility of the locking device which enables it to recognise the appropriate slave key, together with an associated physical characteristic, and optionally, also with a personal identification number.
  • slave keys it will be necessary for some or all of the slave keys to be recognisable by two or more locking devices. For example, in a hotel a guest will need access only to his own room, but cleaning staff will need access to all the rooms which they service. The present invention can provide for this without difficulty.
  • the system may have its own power supply within the security device, or if it is dependent on an external supply, it may be provided with stand-by batteries in a known manner.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

A security system including a security lock (1) which can be programmed by the use of a master key (3) to recognise specified slave keys (4). The system may include means for digitising a characteristic such as the thumb print, voice pattern, or retinal image of the holder of a slave key so that it is operable only by the key holder himself. The system is applicable inter alia to the protection of motor cars, the control of access to buildings and enclosures, and the restriction of operation of apparatus to authorised personnel.

Description

  • The present invention relates to security systems. It is an object of the invention to provide a security system of high security.
  • A security system according to the present invention comprises a security device, a master key, and one or more slave keys, the security device being programmable by use of the master key to respond to and only to, selected slave keys in combination with a coded representation of some personal characteristic of the slave key holder, for example, his thumb print, the pattern of his retinal blood-vessels, or his voice.
  • The master key and/or the slave keys may be in the form of a plastic card of similar type to a credit card, which may have a magnetic stripe carrying coded information, or may have computing or data storage means actually incorporated in the card. In one form of the invention the master key is of this type, but the slave key is a mechanical key having an enlarged portion containing means for detecting and digitising the print of a thumb grasping the key, and provided on its blade with electrical contacts whereby the digitized information may be passed to computing circuits within the security device. In other forms of the invention the slave keys are plastic cards as described above, but the key holder speaks into a microphone and the frequency spectrum of his voice is analysed and digitally coded, or he may be required to look into an eyepiece, adjust his position until targets visible through the eyepiece are in alignment, and then, for example by pressing a button, cause his retinal image to be recorded and digitised. In any of these forms of the invention additional security may be achieved by requiring the keyholder to supply in addition, a personal identification number.
  • U.S. Patent 3,383,657 describes a system in which a person is identified by scanning fingerprint optically to generate identifiers and comparing them with identifiers recorded on a personal identification card. U.S. Patent 4,095,739 describes a system in which numbers on a security card are compared with numbers held in a store. A supervisory card unlocks access from a keyboard to enable numbers to be entered into the store.
  • The invention will now be further described with reference to the accompanying drawings, in which:-
    • Figure 1 shows diagrammatically the essential components of a system according to the invention, relying on thumbprint identification, and suitable for use in locking the storing and ignition systems of a motor car;
    • Figure 2 shows diagrammatically the console of an access control system utilising voice recognition; and
    • Figure 3 is indicative of a modification of the arrangement of Figure 2 making use of retinal pattern recognition.
  • Referring first to Figure 1, the system comprises a locking device 1 which incorporates the steering lock and ignition switch of a motor car to be protected by the system, and if the car is equipped with a centralised locking system, also incorporates the door and boot locks. The locking device includes computing means 2, the function of which will be more fully described below.
  • When the car is sent from the factory to a dealer it is accompanied by a master key 3 in the form of a plastic card containing recorded information which cooperates with the computing means 2 in the locking device to enable it to carry out a programming operation. This master key is sent with the car in a sealed container, to be opened only by the purchaser of the car. With the car there are also supplied a number of slave keys 4 whose construction will be described more fully below. The locking device has a slot to receive the master key and a keyhole for the insertion of a slave key.
  • When the car is sent from the factory the computing means is pre-programmed to respond to a slave key of a kind which is supplied to garages and distributors to enable them to service and transport the car as required.
  • The slave key as supplied to the purchaser of the car is of a more elaborate form, as shown in the figure. It resembles a conventional key, having a blade 5 and a stock or handle portion 6. This is provided with a window 7 over which the thumb of the key holder will be pressed in use, being located by a ridge 8 round the rim of the handle. The window 7 contains electronic means for digitising the pattern of ridges on the surface of the holder's thumb, and electrical contacts 9,10 provided in the blade 5 of the key allow the digital data produced in this way to be passed to the computing means in the locking device.
  • When the car is delivered to the purchaser he breaks open the package containing the master key 3 and inserts the master key in the slot provided in the locking device. He then presses a reset button 11 provided in the locking device, causing any programme already set into the computing means to be deleted. He then inserts his slave key 4 with his thumb pressed over the window 7, and, by pressing an insert button 12 provided in the locking device causes the computing means to programme itself to recognise this slave key in combination with his own thumb print. By the insertion of another slave key and a further pressure of the insert button 12, the computing means of locking device may be programmed to recognise the key and thumb print of other persons whom he wishes to authorise to drive the car. Finally, he removes the master key, without which the computing means cannot further be programmed, or the programmes deleted.
  • By this means the car is programmed, so to speak, to recognise the thumb prints of only those persons who are authorised to drive it, and to reject attempts to enter or to start the car by any other person.
  • In a modification, the system is arranged to delete the initial programme set into the locking device automatically on first insertion of the master key, irrespective of whether or not the reset button is pressed. This ensures that the owner does not inadvertently leave the car accessible to anyone with a garage slave key.
  • Although the key is shown in the drawing as being similar to the conventional type of key used with cylinder locks, it need not be of key shape at all. It could be a plastic card incorporating a chip carrying the digitising means, or a plug-in device of any suitable shape.
  • When ownership of the car is transferred, the master key is transferred with the car, and the new owner inserts it, presses the reset button to delete any previous programmes contained within the computing means and re-programmes it as necessary for his own purposes.
  • In an alternative arrangement the slave key is also in the form of a plastic card and a single slot is provided in the locking device. Insertion, followed by removal, of the master key sets the locking device into its programming mode, and the slave keys can then be inserted, whereupon the locking device will be programmed to recognise them. A further insertion and removal of the master key closes the programming mode, and restores the device to its normal locking mode. While in the programming mode, it may be arranged that insertion of a slave key without a thumb on the digitising means will cancel that slave key from the programme.
  • In a simplified and less expensive version, only one thumb print digitiser is used, and this is placed on the dash board of the car. The key may be a normal type of key, or of the credit card type, but in this case the thumb print check is not available against the opening of the external doors of the car, but only against unauthorised starting of the car since the digitiser is not accessible until the user has entered the car.
  • The above description relates to the protection of motor cars, but the system is of much more general application. It may be used for example, for controlling entry to hotel rooms or access to sensitive areas such as bank strongrooms or computer rooms containing confidential information, to domestic or office premises, to boats and caravans and the like. Furthermore, it may be used for controlling the operation of cash dispensers and other computer terminal devices, switch gear and machinery and anything else which needs to be protected from unauthorised interference.
  • Figure 2 illustrates diagrammatically an embodiment of the invention suitable for controlling access to premises or for restricting the operation of apparatus to authorised personnel.
  • This embodiment makes use of identification of the key holder by means of a voice recognition system. Such systems have been extensively described in the literature and by way of example reference may be made to the paper "High performance speaker verification using principal spectral components" by J.M. Naik and G.R. Doddington in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Tokyo, 1986, page 881-884.
  • Figure 2 is a greatly simplified view of the console of apparatus for carrying out this embodiment of the invention. The master and slave keys employed are both in the form of plastic cards which may be coded with a magnetic stripe or may incorporate a storage chip. Two card readers are provided, the first of them, 20, for the master key and the other, 21, for the slave keys. A reset button 11 and an insert button 12 allow for programming, as described with reference to the embodiment of Figure 1, and the console is further provided with a display device 22 and a microphone 23.
  • In normal operation the key holder inserts his slave key into the reader 21, whereupon the display 22 presents a number of digits or syllables which the key holder then pronounces into the microphone 23. The computer circuits provided in the console analyse the sounds so recorded by means of a suitable algorithm, such, for example, as that in the above-mentioned paper, to obtain a set of parameters, which are then compared with stored information previously programmed into the computer memory. Since the computer is concerned, not with interpreting the received sounds, but with processing them to identify the speaker, a limited number of syllables or digits are chosen to be displayed and spoken but they are arranged to be presented at the display device 22 in random order so as to ensure that the device cannot be operated by means of a recording of the voice of a properly authorised key holder.
  • Optionally, a key pad 24 may be provided so that the key holder may also be required to key in a personal identification number in known manner. Such a key pad is also applicable to the other embodiments of the invention described herein.
  • In order to programme the system, the master key is inserted into the card reader 20 and the reset button 11 is pressed, thereupon clearing all stored slave key information from the computer memory of the system. A slave key is then inserted into the card reader 21 and the insert button 12 is pressed and held down while the key holder speaks into the microphone 23, pronouncing whatever digits or syllables are displayed on the display 22. The computer system may require him to repeat each a number of times so that each can be digitised and the results averaged. When the process has been completed the insert key is released and the slave key card is ejected. A number of slave keys can be recorded in this manner, after which the master card is recovered, which may be arranged for example, to occur on pressing the insert button 12 when no slave card has been inserted into the reader 21.
  • Figure 3 is a fragmentary side view of the console of a modified form of the security system described with reference to Figure 2, in which identification of the slave key holder depends not on voice recognition but on recognition of the pattern of his optical fundus.
  • In this embodiment, the display 22 and microphone 23 are replaced by an optical system 30 having an eyepiece 31. The system is provided with master and slave card readers 20,21 and with reset and insert buttons 11,12 as described with reference to Figure 2 and with an additional record button 33.
  • In use of this apparatus, the slave card holder inserts his card into the card reader 21 and looks into the eyepiece 31 of the optical system 30. The eyepiece presents two or more target images to the view of the key holder and by moving his head slightly and adjusting the distance of his eye from the eyepiece, these images can be caused to coincide. When this occurs the key holder presses the record button 33 and the image of his retina is recorded within the optical system 30. This image is then digitised, and the resulting digits are compared with stored data representing the fundus images of authorised key holders.
  • Programming of this variant is entirely analogous to that described with reference to Figure 2, using the master key and the reset and insert buttons, except, of course, that instead of speaking into the microphone when the system is to be programmed to accept a slave key the key holder presents his eye to the eyepiece 31 as already described.
  • It will be noted that locking and unlocking is performed only by the slave keys. The master key does not lock or unlock any physical device, but merely opens or closes the programming facility of the locking device which enables it to recognise the appropriate slave key, together with an associated physical characteristic, and optionally, also with a personal identification number.
  • In certain applications it will be necessary for some or all of the slave keys to be recognisable by two or more locking devices. For example, in a hotel a guest will need access only to his own room, but cleaning staff will need access to all the rooms which they service. The present invention can provide for this without difficulty.
  • The system may have its own power supply within the security device, or if it is dependent on an external supply, it may be provided with stand-by batteries in a known manner.

Claims (11)

  1. A security system comprising one or more keys (3,4) which are insertable in a security device (1), the security system including sensing means (7, 23, 30) which is arranged to sense a personal characteristic of a holder of such a key, the security device responding to, and only to, the combination of an inserted key (4) with a coded representation of the sensed personal characteristic of the holder of the inserted key, said keys comprising a master key (3) and one or more slave keys (4), which are distinct from the master key and said security device is programmable in an initial mode by the insertion of both the master key and a slave key (4) to recognise the inserted slave key in combination with said coded representation of the sensed personal characteristic of the holder of the inserted slave key by storing the corresponding coded representation, so that in a subsequent mode the programmable security device can recognise that slave key when inserted and compares sensed coded representation of said personal characteristic with the stored coded representation of said personal characteristic.
  2. A security according to Claim 1, in which the personal characteristic is a thumb print.
  3. A security system according to Claim 2, in which digitising means (7) for the thumb print is incorporated in the slave key (4).
  4. A security system according to Claim 1 in which the personal characteristic is a voice pattern.
  5. A security system according to Claim 1 in which the personal characteristic is a retinal image.
  6. A security system according to any preceding claim adapted to control the steering and/or ignition system of a motor car.
  7. A security system according to any of Claims 1 to 5 arranged to control access to a room or other enclosure.
  8. A security system according to any of Claims 1 to 5 arranged to prevent or allow the operation of apparatus.
  9. A security system according to any preceding claim, which is pre-programmed and includes means whereby the preset program is automatically deleted on the first insertion of the master key (3).
  10. A security system according to Claim 9 wherein said security device (1) is controlled by said preset program to respond to a futher slave key which is distinct from said first-mentioned slave keys (4).
  11. A security system according to any of claims 4 to 10, wherein said programmable security device incorporates display means (22) which is arranged to present to the holder of the slave key (4) a number of digits or syllables in random order, which are to be spoken by the holder of the salve key and served by the programmable security device.
EP87302584A 1986-03-25 1987-03-25 Security system Expired - Lifetime EP0239388B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT87302584T ATE87108T1 (en) 1986-03-25 1987-03-25 SECURITY SYSTEM.

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB868607338A GB8607338D0 (en) 1986-03-25 1986-03-25 Security system
GB8607338 1986-03-25
CA000571146A CA1319521C (en) 1986-03-25 1988-07-05 Security system

Publications (2)

Publication Number Publication Date
EP0239388A1 EP0239388A1 (en) 1987-09-30
EP0239388B1 true EP0239388B1 (en) 1993-03-17

Family

ID=25671969

Family Applications (1)

Application Number Title Priority Date Filing Date
EP87302584A Expired - Lifetime EP0239388B1 (en) 1986-03-25 1987-03-25 Security system

Country Status (5)

Country Link
EP (1) EP0239388B1 (en)
AT (1) ATE87108T1 (en)
CA (1) CA1319521C (en)
DE (1) DE3784750T2 (en)
GB (1) GB8607338D0 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4238301A1 (en) * 1992-11-13 1994-05-19 Gudrun Sybille Leguin Portable key for adjustment of appts. in vehicle or office - has memory for storing information regarding personal preferences for setting of appts., and coupled to sensor for receiving and transmitting of information
SE9301892L (en) * 1993-03-30 1994-10-01 Lennart Eriksson Procedure and device for lock control
WO1996022202A1 (en) * 1995-01-20 1996-07-25 Coms21 Limited Vehicle security system
DE19534139A1 (en) * 1995-09-14 1998-06-04 Elsdale Ltd Method and device for simplifying management and control tasks of a large number of vehicles
CA2199955A1 (en) * 1995-10-05 1997-04-06 Atsushi Ogawa Fingerprint registering method and fingerprint checking device
DE19747654A1 (en) * 1997-10-29 1999-05-20 Telefunken Microelectron Procedure for operating a security system
FR2770562A1 (en) * 1997-11-03 1999-05-07 Nogema Ingenierie Means of authorizing identification objects e.g. electronic access key
EP1032922A1 (en) * 1997-11-19 2000-09-06 Siemens Aktiengesellschaft Method for transmitting a biometrically defined authorization and access control system with biometrically defined access control
DE19851950A1 (en) * 1998-11-11 2000-05-25 Bosch Gmbh Robert Control device for a motor vehicle
US6377699B1 (en) * 1998-11-25 2002-04-23 Iridian Technologies, Inc. Iris imaging telephone security module and method
WO2001020538A2 (en) * 1999-09-15 2001-03-22 Quid Technologies Llc Biometric recognition utilizing unique energy characteristics of an individual organism
US7642895B2 (en) 1999-12-20 2010-01-05 The Chamberlain Group, Inc. Garage door operator having thumbprint identification system
DE10000720A1 (en) * 2000-01-12 2001-07-19 Fingerpin Ag Zuerich Closure device has identification system with biometric identification sensor mounted on key; biometric sensor can be mounted on grip part of key in form of finger detection sensor
WO2002075665A2 (en) * 2001-03-16 2002-09-26 G. Holdings Ltd. Portable data transmission device with biometric validation
GB2415036A (en) * 2004-06-09 2005-12-14 Johnson William N H Security device
DE102012013981A1 (en) * 2012-07-13 2014-01-16 Sudhaus Gmbh & Co. Kg Electronic locking device for luggage, office furniture, lockers and the like
US11087573B2 (en) * 2019-05-20 2021-08-10 Pixart Imaging Inc. Scheme for setting/using electronic device as keyless device of vehicle and adjusting devices in the vehicle

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3383657A (en) * 1965-05-28 1968-05-14 Ibm Personnel security system having personally carried card with fingerprint identification
FR2034137B1 (en) * 1969-02-10 1973-06-08 Dufour Adrien
US4053710A (en) * 1976-03-01 1977-10-11 Ncr Corporation Automatic speaker verification systems employing moment invariants
US4095739A (en) * 1977-08-26 1978-06-20 A-T-O Inc. System for limiting access to security system program
US4338025A (en) * 1978-04-10 1982-07-06 Engel Elton D Identification card, sensor, and system
FR2432858A1 (en) * 1978-08-09 1980-03-07 Hill Robert Identification system using pattern of eyeball blood vessels - superimposes radial branches onto circular scales to obtain set of characteristic readings
SE429884B (en) * 1979-06-05 1983-10-03 Thelin & Co Id Select ELECTRONIC WELDING
SE425704B (en) * 1981-03-18 1982-10-25 Loefberg Bo DATABERARE

Also Published As

Publication number Publication date
DE3784750T2 (en) 1993-10-21
DE3784750D1 (en) 1993-04-22
GB8607338D0 (en) 1986-04-30
EP0239388A1 (en) 1987-09-30
ATE87108T1 (en) 1993-04-15
CA1319521C (en) 1993-06-29

Similar Documents

Publication Publication Date Title
US5055658A (en) Security system employing digitized personal physical characteristics
EP0239388B1 (en) Security system
JP4436969B2 (en) Remote control device for vehicle
EP0924655B2 (en) Controlled access to doors and machines using fingerprint matching
US5337043A (en) Access control system with mechanical keys which store data
US5245329A (en) Access control system with mechanical keys which store data
US6129029A (en) Method and apparatus for accessing safe deposit box
GB2340975A (en) Access control device
JPH05233896A (en) In/out managing device
KR20070042362A (en) Authentication apparatus of doorlock using venous blood sensing and method for operating the same
US20060088192A1 (en) Identification system
JP2004211538A (en) Entrance-leaving control system
JP2004124497A (en) Entry control system equipped with function identifying qualified person and preventing entry of unqualified person accompanied by qualified person
JPH08218689A (en) Key housing device
JP2003521786A (en) Fingerprint authentication system
WO2005015512A1 (en) Improvement introduced in self-service equipment for banking
KR200188799Y1 (en) Apparatus for controlling entrance
NL1010508C2 (en) Door lock operated by finger- or thumb-print sensor uses data processor and solenoid to operate lock mechanism
JP2002207999A (en) Individual identifying device
KR200214065Y1 (en) A Control Apparatus for Locking &Unlocking System Utilizing Personal Identification Datas.
JPH04221181A (en) Custody system
JPH09114983A (en) Fingerprint information recording card system
JP2003162705A (en) Ic card authentication system
JPH05287949A (en) Electronic lock device
JPS6213672A (en) Data collimation apparatus using portable recording medium

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE ES FR GB GR IT LI LU NL SE

17P Request for examination filed

Effective date: 19880321

17Q First examination report despatched

Effective date: 19900725

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: COCKBURN, JOHN BALFOUR

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE ES FR GB GR IT LI LU NL SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRE;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.SCRIBED TIME-LIMIT

Effective date: 19930317

Ref country code: CH

Effective date: 19930317

Ref country code: NL

Effective date: 19930317

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 19930317

Ref country code: LI

Effective date: 19930317

Ref country code: BE

Effective date: 19930317

Ref country code: AT

Effective date: 19930317

Ref country code: SE

Effective date: 19930317

REF Corresponds to:

Ref document number: 87108

Country of ref document: AT

Date of ref document: 19930415

Kind code of ref document: T

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19930331

REF Corresponds to:

Ref document number: 3784750

Country of ref document: DE

Date of ref document: 19930422

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Effective date: 19930617

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 19930628

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

ET Fr: translation filed
PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19930726

Year of fee payment: 7

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Effective date: 19940131

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 19930617

26N No opposition filed
REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Effective date: 19941201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Effective date: 19930331