US3906447A - Security system for lock and key protected secured areas - Google Patents
Security system for lock and key protected secured areas Download PDFInfo
- Publication number
- US3906447A US3906447A US328179A US32817973A US3906447A US 3906447 A US3906447 A US 3906447A US 328179 A US328179 A US 328179A US 32817973 A US32817973 A US 32817973A US 3906447 A US3906447 A US 3906447A
- Authority
- US
- United States
- Prior art keywords
- code
- key
- lock mechanism
- time
- key code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- a key code is stored in each lock mechanism and compared with the key code on a digital coded key. If correspondence exists, entrance to the secured area is granted.
- the lock mechanism stored key code can be changed in response to an order code imprinted directly on the key. This obviates the requirement of wired or wireless wave communications links between the control console and each of the remote secured areas.
- a further feature of the invention resides in the provision of apparatus for automatically changing the stored key code at each secured area after a variable predetermined time interval.
- coIIMTER BITS BACKGROUND OF THE INVENTION At the present time, most secured areas such as rooms in hotels, motels and office buildings, as well as baggage lockers and ignition systems on rental cars, are p vided with locks operated by the mechanical interaction of a key and lock tumbler. In recent years this ancient mechanical system has, to some extent, given way to new electronic lock systems responsive to digitally coded keys.
- the entrance to a secured area is controlled with an electronic lock which includes an unlocked trigger command circuit, responsive to a digitally coded key, a lock bolt, and an associated lock-bolt control logic circuit responsive to an unlock trigger signal. Included in the unlock trigger command circuit is a memory storing a unique digital key code.
- the electronic key lock is indeed an important improvement over the prior mechanical key and tumbler arrangement, many of the security problems associated with the mechanical key and tumbler arrangement remain with the electronic key lock. For example, with respect to secured areas such as motels and hotels, where numerous people have access to room keys, an unauthorized person might easily gain access to a guests room. For example, a hotel guest may retain his key after checking out of the hotel and at a later date illegally enter the room now occupied by another guest.
- each secured area has associated therewith an electronic lock mechanism storing a unique key code.
- an individual seeks to enter a secured area, he presents a digitally coded key to the lock mechanism wherein the key code on the key is compared with the stored key code and if correspondence exists an unlock trigger command is generated and applied to lock bolt control circuitry to unlock the secured area.
- the key code stored in each lock mechanism is easily and rapidly changed in response to an order code contained directly on the digitally coded key. As a result, no wired or wireless wave communication links are required between a control console and the remote secured areas to accomplish the selected changing of the stored key codes.
- Imprinted on the key is an order code which, according to one embodiment of the invention may be made to correspond to the time the key is issued.
- the lock mechanism operates to compare the order code on the key presented to it with the time of presentation, and if the time difference is within a predetermined time interval, the key code on the key is set into the lock mechanism.
- the order code corresponds to the key code formerly set into the lock mechanism.
- the former key code would have been stored, for example, in the central control console for imprinting as an order code on the next issued key for the secured area.
- Other order codes will be readily apparent to those of ordinary skill in the art and, in any choice of an order code, subsequent presentation of the key to this lock mechanism causes the generation of an unlock trigger command.
- a further feature of the invention involves the generation of a time of departure code.
- This time of departure code is imprinted on the key when issued and entered into the lock mechanism when the order code is presented thereto.
- the lock mechanism automatically changes at random the stored key code, thus preventing the guest from entering the room.
- a still further feature of the invention resides in apparatus, responsive to the key code on a digitally coded key which permits the hotel to verify the guests authority to use the hotels restaurant, bar, shops, parking lot and other servide facilities.
- FIGS. 1a and 1b are a detailed functional block diagram of the control console of the instant invention.
- FIG. 2 is a drawing of one example of a digitally coded key, which may be used with the security system of the invention
- FIGS. 3a and 3b are a functional block diagram of the lock mechanism of the instant invention.
- FIG. 4 is a block diagram illustrating the application of the invention to a hotel.
- the security system will be described with reference to its use in a hotel, although it is to be understood that the security system is not limited to this use alone, having a more general application.
- the security system can be used to secure any area to which access is given to many people, each for only short periods of time. Once a persons permissible access time is over, he is barred from entering the area.
- the pres ent invention will find application in securing baggage lockers, the ignition lock system of rental vehicles, protected cargo areas and office buildings.
- a secured area is generally protected from unauthorized entrance by a lock mechanism. Those with authority to enter are given a key which gains them access to the secured area. Since keys are easily reproduced, security against unauthorized entrance by a person formally having authority to enter an area is very weak. The quality of security increases greatly if the lock mechanism is changed each time the identity of the au thorized user changes, so that even if he reproduces or keeps the key which formally admitted him to the area, it becomes ineffective once his authorization has expired.
- the present invention which involves an improved security system of the type which uses electronic key locks, provides a reliable and inexpensive technique for changing the key code stored in the lock mechanism.
- the stored key code is compared with the key code on a key presented to the lock mechanism by the individual who desires access to the secured area and if the two codes correspond, entrance is granted.
- the present invention provides for alteration of the stored key code in the lock mechanism by incorporating on the key issued to the authorized user what is termed herein an order code which, upon presentation to the lock mechanism, causes the mechanism to be set to the key code on the key of the authorized user. Thereafter, each time the user presents his key to the lock mechanism, he is permitted to enter the secured area.
- FIG. 1 illustrates the central control console of the invention adapted for use in a hotel or motel.
- a guest When a guest is assigned a room, his room number is entered into the control console through the decimal keyboard 100 which is coupled to the room number register 11.
- the register For a three digit room number, the register may take the form of three ten stage registers. each stage of a register representing a different digit.
- Register 11 is coupled to a decimal to binary converter 9, wherein the room number is converted into a binary code. Subsequently the binary coded room number is stored in binary register 6.
- the guest key code which will be imprinted on a room key and subsequently presented to the lock mechanism at the guests assigned room, is a randomly generated number produced by a random number generator 105 and stored in shift register 2.
- the key code and the room number in binary form may be directly imprinted on the room key. However, this would be detrimental to the security of the area since the codes could easily be counterfeited and reproduced.
- the room number and the key code are enciphered in a manner to be described in detail below, prior to its formation on the key.
- the order code is a time representative code and corresponds to the time a guest checks in, that is, his arrival time.
- mechanism which compares the order code, that is, the arrival time, with the time that the guest presents his key to the lock mechanism located at the entrance to his room and if the difference in time is within a predetermined time interval, the new guest code is entered into the room lock mechanism.
- the measure of time used in this system is advantageously not real time, but rather non-real time corresponding simply to a count in a binary counter.
- the counter may be preset to any arbitrary number with the lock mechanisms at each of the hotel rooms synchronized to this preset number.
- Each count in the counter corresponds to a known unit of time, such as 1/60 of a second.
- the counter would have a recycle time longer than the longest expected guest stay.
- the counter may be made to recycle once every two or three years.
- a long recycle time is desirable when the security system is provided with the optional time departure feature, wherein the guests check-out time is also set into the lock mechanism and at this time, the key code assigned to the guest's room is automatically changed so that this key will no longer gain him entrance to the room.
- the order code generator is comprised of binary counter 16 and clock 17.
- Clock 17 may be a conventional oscillator, powered from the 60 Hertz building power source. Thus, each pulse produced by clock 17 and each increment of the counter 16 corresponds to l/60 of a second.
- the system may be initialized by re setting counter 16, to zero.
- a signal at terminal A which may be generated manually, through the use of a simple pushbutton switch, resets the counter 16. The counter then begins to increment in l/60 of a second intervals.
- each count in the counter represents a time interval of H60 of a second
- a 32 stage counter has a recycle period greater than the two weeks
- a 48 stage counter has a recycle period greater than [00,000 years.
- the arrival time is set into counter 5 and applied to transformation matrix 4 which simply interleaves the bits from registers 5 and 6 in a manner determined by the wiring of the matrix 4.
- the scheduled departure time of the guest is entered into register 7.
- the departure time is a function of the check-in time. That is, the departure time is merely the arithmetic sum of the check in time plus the duration of the guests stay.
- the duration of stay is entered into decimal keyborad 200, the output of which is supplied to decimal to binary converter 202.
- the duration of stay is preferably determined in hours, since guests often do not check into a hotel at the beginning of the hotels day, usually beginning around noon and ending the following noon.
- Binary register 208 stores a count corresponding to an hour in system time.
- register 208 stores the binary equivalent to 60 X to 360 2l ,600 which corresponds to the number of counts in a one hour period.
- the contents of register 208 are multiplied by the output from decimal to binary converter 202 to generate a binary number equivalent to the duration of stay in system time. This number is added to the arrival time from counter 16 in adder 206 and stored in departure time register 7.
- the contents of register 7 together with the contents of registers 5 and 6, are applied to transformation matrix 4 through the register 8 whereby they are interleaved. Further encipherment is accomplished by adding the output of transformation matrix 4 with the randomly generated key code in register 2 in a modulo 2 adder 3.
- the output of the adder 3, together with the contents of the key code register 2 are applied to a further transformation matrix to further scramble the codes.
- the output of the matrix 20 is supplied to the input of a conventional psuedorandom sequence generator 21.
- the output of the adder 3 is also supplied directly to counter 13 to preset this counter.
- a signal B which may be manually generated using a push button switch, or automatically generated in response to the loading of counter 13, enables coincidence gate 23.
- Gate 14, coupled to the output of counter 13, provides a logic 1 when the counter has reached its full count.
- the output of gate 14 is a logic 0, which is inverted to a logic 1, by operation of inverter 26, to enable gate 24.
- clock pulses from clock 22 simultaneously increment counter 13 and register 18 of the psuedorandom sequence generator 21.
- the output of the psuedorandom sequence generator 21, together with the output of adder 3 is further enciphered in transformation matrix and applied to a key writer 27, which imprints, as illustrated in FIG. 2, an encipherment 300 of the key code, room number, order code and departure time on the key.
- the room number 302, in decimal form may also be imprinted on the key.
- the key may take the form of a key card having a configuration equivalent to that of an ordinary credit card.
- the encipherment may be a printed or magnetized array of marks, or any kind of signal in any form representing the information in the encipherment.
- the key card may also have imprinted thereon hotel advertising 304.
- each lock mechanism is provided with an electronic key reader 37, such as that described in US. Pat. No. 3,688,269.
- the reader 37 reads the encipherment of the key code, room number, order code and time of departure, from the inserted key card 28.
- This encipherment is partially unscrambled by transformation matrix 38, which is the reverse of transformation matrix 25.
- transformation matrix 38 which is the reverse of transformation matrix 25.
- the output of transformation matrix 38 therefore corresponds to the output of the adder 3 and the output of the psuedorandom sequence generator 21 after gate 24 has been disabled.
- the information on bus 32 corresponds to the output of adder 3 which was previously supplied as the preset input to counter 13. At the remote lock mechanism, this preset count is applied to register 43.
- Transformation matrix 46 which receives the contents of shift register 31 is the reverse of the transfor mation matrix 20.
- the bits on bus 35 correspond to the guest key code, while those on bus 33 correspond to the output of adder 3.
- the bits on bus 33 are applied to modulo2 subtractor 48, while the key code on bus 35 is applied to the subtrahend input of the subtractor 48.
- the output of the subtractor thus corresponds to the input to adder 3 from the transformation matrix at the control console.
- Transformation matrix 49 is the reverse of transformation matrix 4 and thus, the output of transformation matrix 49 corresponds to the order code, room number and time of departure.
- the order code is supplied to subtractor 50, the room number to comparator 51 and the time of departure to the comparator 52 and subtractor 90.
- Each lock mechanism is provided with a binary counter 65 operating in synchronism with the binary counter 16 of the control console.
- Clock 66 corresponds to clock 17, and thus when clock 17 provides clock pulses spaced at 1/60 of a second. clock 66 also provides pulses at l/ of a second intervals. Any lack of synchronism is acceptable to the system as long as the time interval is within the allowable time interval between check-in time and the time of presentation of the key card 28 to the lock mechanism.
- the count in binary counter is applied to the subtrahend input of the subtractor 50, while the minuend input receives the order code from the transformation matrix 49.
- the output of the subtractor 50 is supplied to a conventional threshold detector 68, the threshold of which is set to correspond to the allowable time interval between check-in time and the time of presentation of the key card 28 to the lock mechanism. If the key card 28 is presented to the key reader 37 within the predetermined time interval, the output of the threshold gate 68 is at a logic 0, enabling the coincidence gate 53, through inverter 67.
- the second input to gate 53 is coupled to the output of comparator 51 which compares the room number derived from the transformation matrix 49 with the room number stored in register 72.
- the guest continues to gain access to his room even after the preset time interval determined by the threshold of threshold gate 68 has passed.
- the lock mechanism has been set with the new key code, each time the guest presents his key card 28 to the key reader 37, the encipherment is read therefrom and passed through transformation matrix 38, psuedorandom sequence generator 39 and the transformation matrix 46 to recover the key code and place it on bus 35 in the manner just described.
- the bits on bus 32 correspond to the preset count applied to the binary counter 13 of FIG. 1, while the code applied to the shift register 31 from the matrix 38 corresponds to the output from the shift register 18 of the psuedorandom sequence generator 21 when coincidence gate 24 has been disabled.
- Clock 40 operating through coincidence gate 41, shifts register 31 backwards while decrementing counter 45, which has been preset to its full count.
- the output of comparator 44 goes to a logic high disabling gate 41.
- the output from shift register 31, which is applied to the transformation matrix 46 corresponds to the guest key code and the output of the adder 3 after it has been interleaved by matrix 20.
- Transformation matrix 46 is the inverse of transformation matrix and thus, the key code is recovered on bus 35 and applied to comparator 47. Since the key code on the guest's key card 28 now corresponds to the key code stored in shift register 54, the output of comparator 47 goes to a logic 1 generating an unlock trigger signal which is applied to the lock bolt mechanism 62 causing the lock bolt of the room to move to its unlocked position.
- the time of departure feature will now be described.
- the guests time of departure has been recovered as previously explained and applied to comparator 52 and subtractor 90.
- the comparator 52 also receives the count in binary counter 65.
- the output of the comparator 52 raises to a logic 1, setting latch 96 to enable gate 94.
- the purpose of subtractor 90 is to provide the guest with a check-out grace period. While the subtrahend input of suhtractor 90 receives the departure time, the minuend input receives the count in counter 65.
- the difference signal is applied to threshold circuit 92 having a threshold level corresponding to the grace period.
- threshold circuit 92 As long as the input to threshold circuit 92 from subtractor 90 is below the threshold, and thus within the grace period, the output of circuit 92 is at a logic 0. When the grace period has lapsed, the output of threshold circuit 92 assumes a logic 1 causing the output of coincidence gate 94 to assume a logic I. enabling coincidence gate 70, while resetting register 54.
- Each lock mechanism has associated therewith a random number generator 73 and a shift register 74 storing the random number generated by the generator 73. When coincidence gate is enabled, the number stored in shift register 74 passes through the gate 70 and OR gate 71 to the shift register 54.
- Pass keys are prepared in the same manner as the guests key cards.
- the entire circuitry illustrated in FIG. 3, except for binary counter 65 and clock 66, are duplicated.
- the room register associated with the pass key circuitry at each lock mechanism contains a common arbitrary room number.
- the grace period determined by the threshold circuit 68 in the pass key portion of the lock mechanism is set equal to the length of the work shift and the time of departure is set to correspond to the end of the work shift. In this manner, an employees key card is valid only for the duration of his work shift.
- FIG. 4 is a block diagram representation of the application of the present invention to a hotel.
- Central console 500 may be connected by means of wires to the hotels restaurant 502, bar 503, shops 504 and the parking lot gate 505.
- the encipherment imprinted on the guest key card 28 is also inserted into a central computer memory 400. This memory is accessed by a card reading terminal 406 at each service area in the hotel such as the bar or restau rant, using conventional computer techniques. If the guest key card is still valid, the comparator 404 displays an accept signal at a signaling means 402 at the service areas a reject signal otherwise.
- the cashier can change at random the guest key code in the central computer memory 400, thereby preventing the guest from continuing to charge services after he has paid his bill.
- the rooms may be master keyed by storing the key code used for the first key (as for example in a shift register) and using the stored key code instead of a new key code to generate the encipherment for the other room (5) of the group of assigned rooms.
- Each key of the group of keys would be used in the correct room lock mechanism the very first time the key is inserted, but after the first insertion all keys may be used interchangeably with each other.
- the room numbers of all assigned rooms would be included in the encipherment on each key, and the lock mechanism would accept that one of the room numbers ex tracted from the encipherment that corresponds to its own room number.
- the output of transformation matrix 49 would involve all the assigned roomnumbers and would be compared in turn with the binary register 72. If one compares favorably, the output of comparator 51 becomes high.
- the system has application to baggage lockers. When so used, the time of departure feature would generally be omitted. Further, the inventive system has applicability to the field of rental vehicles.
- the automobile ignition lock for example, may include a lock bolt mechanism and control circuit such as the circuit 62 used in hotels.
- the circuitry of FIG. 3 would be included in a box mounted in the vehicle, while circuitry of FIG. 1 would be included in the rental office.
- a lock mechanism for generating an unlock trigger signal said mechanism including storage means storing a key code and comparison. means for comparing the stored key code with an applied key code to cause the generation of the unlock trigger signal when the two key codes coincide, the improvement comprising:
- a machine readable card having formed thereon an order code and a key code enciphered together, means in said lock mechanism for reading said order code and key code in enciphered form,
- first comparison means for comparing the order code with a lock mechanism generated signal
- lock mechanism of claim 3 wherein said key has further formed thereon an identification code, said lock mechanism further including means for storing a lock mechanism identification code, means for reading the identification code from the key, second comparison means for comparing the stored lock mechanism identification code with the read identification code and means for blocking said key code accept signal when the stored lock mechanism identification code does not correspond to the read identification code.
- lock mechanism further includes a lock bolt control circuit responsive to said unlock trigger signal and a lock bolt responsive to the lock bolt control circuit, said lock' mechanism being coupled to an entrance door of a room, said key having further formed thereon a time of departure code, said lock mechanism including third comparison means responsive to said time of departure code and lock mechanism generated time representative signal for producing a key code non-accept signal when said time representative signal is greater than the time of departure code, means for storing a randomly generated key code and means responsive to said nonaccept signal for resetting said key code storage means and entering said randomly generated key code therein.
- a security system for a lock mechanism comprised of a lock belt, a lock bolt control circuit and unlock trigger. command circuitry, said unlock trigger command circuitry including means for storing a key code and means for comparing the stored key code with a key code read from a key, said security system including apparatus for encoding said key comprising:
- adder means foradding said order code and said key code
- pseudorandom sequence generator receiving said key code and the output of said adder
- a first binary counter receiving the output of said adder to preset said first counter, means for simultaneously incrementing said first counter and pseudorandom sequence generator until the binary counter reaches its full count, and
- keycard writer means for forming the number contained in the pseudorandom sequence generator on a key card said number being said order code and said key code enciphered together.
- said lock mechanism is coupled to an entrance door of a hotel room further including means for storing a room number
- said adding means including means for adding said room number to said order code, departure time and key code
- said key card writer means including means for forming the room number on said key in decimal form.
- lock bolt control circuitry comprises:
- first comparison means for comparing the order code with a lock mechanism generated signal, and means responsive to said comparison for storing the key code read from said coded key in said means for storing a key code.
- the apparatus for encoding further includes means for storing a departure time code
- said lock bolt control circuit further includes means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a oneto-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code
- said adder means in said apparatus for encoding further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
- the apparatus of claim 6 further including means for storing a departure time code, said adder means further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
- first transformation matrix means for scrambling said order code and departure code prior to their application to the adder means
- second transformation matrix means for scrambling the output of the adder means and key code prior to their application to the pseudorandom sequence generator
- third transformation matrix means responsive to the output of said adder means and pseudorandom sequence generator for scrambling and means for applying the output of said third transformation matrix means to said key writer means.
- lock bolt control circuitry comprises:
- third comparison means for comparing the output of said third binary counter with the first of the outputs of said fourth transformation matrix
- fifth transformation matrix means connected to said second pseudorandom sequence generator and being the reverse of said second transfer matrix means for unscrambling to provide outputs corresponding to the output of said adder means and said key code
- subtractor means for subtracting the two outputs of said fifth transformation matrix means to recover said order code scrambled with said departure code
- sixth transformation matrix means connected to said subtractor means and being the reverse of said first transformation matrix means for unscrambling said order code and said departure code, fourth comparison means for comparing the order code with a lock mechanism generated signal, and
- the security system of claim 15 further including means for generating a time representative signal, fifth comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a oneto-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
- said lock bolt control circuit including means for generating a time representative signal, said first comparison means comprising means for subtracting the time represented by said order code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a key code accept signal when the value of the output of the subtracting means is below the threshold level of said threshold means.
- said encoding apparatus further including means for storing a departure time code
- said adder means further including means for adding said departure time code to said key code
- said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
- said reading means also reads said departure time code
- said lock bolt control circuitry including means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
- said second comparison means comprising means for subtracting the time represented by the departure time code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a non-accept signal when the value of the output of the subtracting means is above the threshold level of said threshold means.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
An electronic lock security system including a control console and several remote secured areas, the entrance to each of the secured areas being controlled by an electronic lock mechanism responsive to a digital coded key. A key code is stored in each lock mechanism and compared with the key code on a digital coded key. If correspondence exists, entrance to the secured area is granted. The lock mechanism stored key code can be changed in response to an order code imprinted directly on the key. This obviates the requirement of wired or wireless wave communications links between the control console and each of the remote secured areas. A further feature of the invention resides in the provision of apparatus for automatically changing the stored key code at each secured area after a variable predetermined time interval.
Description
United States Patent Crafton SECURITY SYSTEM FOR LOCK AND KEY PROTECTED SECURED AREAS 179/2 CA; 235/6l.7 B
[56] References Cited UNITED STATES PATENTS 3,622,991 11/1971 Lehrer 340/147 R 3,662,342 2/1971 Hiedin 340/149 A X' 3,743,134 7/1973 Constable 340/149 A X 3,800.284 3/1974 Zuckcr 340/149 R $821,704 6/1974 Sabsay 340/149 A Primary E.\'aminer-l-larold I. Pitts Attorney, Agent, or Firm--Sughrue, Rothwell, Mion, Zinn and Macpeak 1 Sept. 16, 1975 5 7 ABSTRACT An electronic lock security system including a control console and several remote secured areas, the entrance to each of the secured areas being controlled by an electronic lock mechanism responsive to a digital coded key. A key code is stored in each lock mechanism and compared with the key code on a digital coded key. If correspondence exists, entrance to the secured area is granted. The lock mechanism stored key code can be changed in response to an order code imprinted directly on the key. This obviates the requirement of wired or wireless wave communications links between the control console and each of the remote secured areas. A further feature of the invention resides in the provision of apparatus for automatically changing the stored key code at each secured area after a variable predetermined time interval.
21 Claims, 6 Drawing Figures O0 GO PATENTEDSER I IRIS 3 905,447
SEE FIG. lb
- SHEET 1. [1F 5 FIG. h
A O-R BINARY OOIINTER c (kBlTS) CLOCK IT 16 TRANSFORMATION MATRIX 20 8 I E SHIFT REGISTER (2n BITS] I I I PSEUDO RANOOM TRANSFORMATION MATRIX 25 KEY OARO WRITER KEY CARD 8 27 28 CLOCK 22 I PATENTEDSEPISIBYS 3806,44?
PATENTEDSEPI 81975 3,906,447
SHEU3UF5 L B o o o o O o A C O O O O o HOTEL 0 0o 0 O0 OO O O O O0 O0 3 83 000 o o 0 N30 "3 O O 000 o O 0 o o o o 0 O O O o 00 oo 00 O 302 O O O O O O 0 DOOR LOCK
RESTAURANT 1 DOOR 502 LOCK 500 DOOR LOCK BAR CENTRAL L CDNSOLE 505 DOOR LOCK SHOPS DOOR LOCK 504 PARKING-LOT GATE DOOR
505 LOCK T L r TERRIER SHIFT REGISTER 54 COMPARATOR 47 TRANSFORMATION MATRIX 46 em 5 5w GUEST KEY CARD ENCIPHERMENT SHIFT REGISTER 7 KEY READER TRANSFORMATION MATRIX 38 RIEEE A AE A 'IACOAI BINARY COUNTER GUEST KEYCARD EMPLOYEE KEY CARD ENCIPHERMENT EXCLUSIVE IBSEUDORANDOM SEQUENCE GENERATOR LNTTII 5 RRESET LR LOCK BOLT MECHANISM CONTROL CIRCUIT HG. 5E:
CLOCK 66 CLOCK 40 PATENTH] SEP 1 6 I975 sum 5 ME 5 BINARY REGISTER ROOM NUMBER 72 94 55 67 68 & l 6; g LATCH 92 A 96 SUBTRACTOR 50 ooMPARAToR 5| COMPARATOR 5g SUBTRACTOR TIME OF I TIME OF ROOM DEPARTURE ARRIvAI. NUMBER (ORDER CODE) TRAMsEoRMATIoM MATRIx 49 SUBTRACTOR (MODULO-Z) C BINARY COUNTER 45 RREsET WITH ALL ONES CLOCKED BACKWARDS l COMPARATOR 44 REGISTER FIG. 3b
coIIMTER BITS BACKGROUND OF THE INVENTION At the present time, most secured areas such as rooms in hotels, motels and office buildings, as well as baggage lockers and ignition systems on rental cars, are p vided with locks operated by the mechanical interaction of a key and lock tumbler. In recent years this ancient mechanical system has, to some extent, given way to new electronic lock systems responsive to digitally coded keys. In brief, the entrance to a secured area is controlled with an electronic lock which includes an unlocked trigger command circuit, responsive to a digitally coded key, a lock bolt, and an associated lock-bolt control logic circuit responsive to an unlock trigger signal. Included in the unlock trigger command circuit is a memory storing a unique digital key code. When a coded key is inserted into the electronic lock mechanism, the code on the key is read and compared with the stored key code to determine correspondence. If correspondence exists, an unlock trigger command signal is generated to activate the lock bolt control logic to cause the lock bolt to move to its unlocked position.
An example of an unlocked trigger control circuit, responsive to digitally coded keys is described in US. Pat. No. 3,668,269 to Edwin Miller. An example of a lock bolt control circuit, responsive to an unlock trigger command and its associated lock bolt is described in copending application, Ser. No. 84,085 by Stephen Paull and Paul A. Crafton, filed Oct. 26; 1970 and assigned to an affiliate of the assignee of the present invention.
Although the electronic key lock is indeed an important improvement over the prior mechanical key and tumbler arrangement, many of the security problems associated with the mechanical key and tumbler arrangement remain with the electronic key lock. For example, with respect to secured areas such as motels and hotels, where numerous people have access to room keys, an unauthorized person might easily gain access to a guests room. For example, a hotel guest may retain his key after checking out of the hotel and at a later date illegally enter the room now occupied by another guest.
Attempts at solving this problem have involved changing the key code which permits entrance into a secured area each time the identity of the person authorized to enter the area is changed. Examples of such systems can be found in US. Pat. No. 3,622,991 to Lehrer et al., issued Nov. 23, I971 and US. Pat. No. 3,662,342 to Hedin et al., issued Feb. 16, 1971. In such prior art systems, alteration of the stored key code at each of the remote areas requires the use of wired or wireless wave communications links. More specifically, a control console is connected to each of the remote secured areas by way of wires. When a key code is to be changed, the control console transmits over a wired or wireless wave communication link an address signal identifying the secured area at which the key code is to be changed along with a new key code.
This type of system is extremely expensive and oftentimes not feasible especially in older buildings where the installation of additional electrical lines between some central control console and each of the rooms of the building is not practical.
SUMMARY OF THE INVENTION The present invention is directed to an improved electronic lock security system.
In accordance with the teachings of the present invention, each secured area has associated therewith an electronic lock mechanism storing a unique key code. When an individual seeks to enter a secured area, he presents a digitally coded key to the lock mechanism wherein the key code on the key is compared with the stored key code and if correspondence exists an unlock trigger command is generated and applied to lock bolt control circuitry to unlock the secured area. The key code stored in each lock mechanism is easily and rapidly changed in response to an order code contained directly on the digitally coded key. As a result, no wired or wireless wave communication links are required between a control console and the remote secured areas to accomplish the selected changing of the stored key codes.
Imprinted on the key is an order code which, according to one embodiment of the invention may be made to correspond to the time the key is issued. The lock mechanism operates to compare the order code on the key presented to it with the time of presentation, and if the time difference is within a predetermined time interval, the key code on the key is set into the lock mechanism. According to an alternative embodiment of the invention, the order code corresponds to the key code formerly set into the lock mechanism. The former key code would have been stored, for example, in the central control console for imprinting as an order code on the next issued key for the secured area. Other order codes will be readily apparent to those of ordinary skill in the art and, in any choice of an order code, subsequent presentation of the key to this lock mechanism causes the generation of an unlock trigger command.
A further feature of the invention, particularly applicable to hotels and motels and the like, involves the generation of a time of departure code. This time of departure code is imprinted on the key when issued and entered into the lock mechanism when the order code is presented thereto. When the departure time is reached, the lock mechanism automatically changes at random the stored key code, thus preventing the guest from entering the room.
A still further feature of the invention resides in apparatus, responsive to the key code on a digitally coded key which permits the hotel to verify the guests authority to use the hotels restaurant, bar, shops, parking lot and other servide facilities.
BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1a and 1b are a detailed functional block diagram of the control console of the instant invention;
FIG. 2 is a drawing of one example of a digitally coded key, which may be used with the security system of the invention;
FIGS. 3a and 3b are a functional block diagram of the lock mechanism of the instant invention; and
FIG. 4 is a block diagram illustrating the application of the invention to a hotel.
DETAILED DESCRIPT ION OF THE PREFERRED EMBODIMENTS For ease in understanding the present invention, the security system will be described with reference to its use in a hotel, although it is to be understood that the security system is not limited to this use alone, having a more general application. The security system can be used to secure any area to which access is given to many people, each for only short periods of time. Once a persons permissible access time is over, he is barred from entering the area. In addition to hotels. the pres ent invention will find application in securing baggage lockers, the ignition lock system of rental vehicles, protected cargo areas and office buildings.
A secured area is generally protected from unauthorized entrance by a lock mechanism. Those with authority to enter are given a key which gains them access to the secured area. Since keys are easily reproduced, security against unauthorized entrance by a person formally having authority to enter an area is very weak. The quality of security increases greatly if the lock mechanism is changed each time the identity of the au thorized user changes, so that even if he reproduces or keeps the key which formally admitted him to the area, it becomes ineffective once his authorization has expired.
The present invention, which involves an improved security system of the type which uses electronic key locks, provides a reliable and inexpensive technique for changing the key code stored in the lock mechanism. As previously indicated, in electronic lock systems, the stored key code is compared with the key code on a key presented to the lock mechanism by the individual who desires access to the secured area and if the two codes correspond, entrance is granted. The present invention provides for alteration of the stored key code in the lock mechanism by incorporating on the key issued to the authorized user what is termed herein an order code which, upon presentation to the lock mechanism, causes the mechanism to be set to the key code on the key of the authorized user. Thereafter, each time the user presents his key to the lock mechanism, he is permitted to enter the secured area.
FIG. 1 illustrates the central control console of the invention adapted for use in a hotel or motel. When a guest is assigned a room, his room number is entered into the control console through the decimal keyboard 100 which is coupled to the room number register 11. For a three digit room number, the register may take the form of three ten stage registers. each stage of a register representing a different digit. Register 11 is coupled to a decimal to binary converter 9, wherein the room number is converted into a binary code. Subsequently the binary coded room number is stored in binary register 6.
The guest key code, which will be imprinted on a room key and subsequently presented to the lock mechanism at the guests assigned room, is a randomly generated number produced by a random number generator 105 and stored in shift register 2. The key code and the room number in binary form may be directly imprinted on the room key. However, this would be detrimental to the security of the area since the codes could easily be counterfeited and reproduced. As an added measure of security, the room number and the key code are enciphered in a manner to be described in detail below, prior to its formation on the key.
The order code and its generation will now be described. The order code, according to one embodiment is a time representative code and corresponds to the time a guest checks in, that is, his arrival time. At each lock mechanism there is provided, as described in greater detail below, mechanism which compares the order code, that is, the arrival time, with the time that the guest presents his key to the lock mechanism located at the entrance to his room and if the difference in time is within a predetermined time interval, the new guest code is entered into the room lock mechanism. The measure of time used in this system is advantageously not real time, but rather non-real time corresponding simply to a count in a binary counter. The counter may be preset to any arbitrary number with the lock mechanisms at each of the hotel rooms synchronized to this preset number. Each count in the counter corresponds to a known unit of time, such as 1/60 of a second. The counter would have a recycle time longer than the longest expected guest stay. For example, the counter may be made to recycle once every two or three years. A long recycle time is desirable when the security system is provided with the optional time departure feature, wherein the guests check-out time is also set into the lock mechanism and at this time, the key code assigned to the guest's room is automatically changed so that this key will no longer gain him entrance to the room.
The order code generator is comprised of binary counter 16 and clock 17. Clock 17 may be a conventional oscillator, powered from the 60 Hertz building power source. Thus, each pulse produced by clock 17 and each increment of the counter 16 corresponds to l/60 of a second. The system may be initialized by re setting counter 16, to zero. A signal at terminal A, which may be generated manually, through the use of a simple pushbutton switch, resets the counter 16. The counter then begins to increment in l/60 of a second intervals. Recalling that a day is comprised of 86,400 seconds, in a system wherein each count in the counter represents a time interval of H60 of a second, a 32 stage counter has a recycle period greater than the two weeks, and a 48 stage counter has a recycle period greater than [00,000 years.
The arrival time is set into counter 5 and applied to transformation matrix 4 which simply interleaves the bits from registers 5 and 6 in a manner determined by the wiring of the matrix 4.
When the departure time feature is used, the scheduled departure time of the guest is entered into register 7. The departure time is a function of the check-in time. That is, the departure time is merely the arithmetic sum of the check in time plus the duration of the guests stay. To enter the departure time into the system, the duration of stay is entered into decimal keyborad 200, the output of which is supplied to decimal to binary converter 202. The duration of stay is preferably determined in hours, since guests often do not check into a hotel at the beginning of the hotels day, usually beginning around noon and ending the following noon. Binary register 208 stores a count corresponding to an hour in system time. In the system under discussion, register 208 stores the binary equivalent to 60 X to 360 2l ,600 which corresponds to the number of counts in a one hour period. The contents of register 208 are multiplied by the output from decimal to binary converter 202 to generate a binary number equivalent to the duration of stay in system time. This number is added to the arrival time from counter 16 in adder 206 and stored in departure time register 7.
The contents of register 7 together with the contents of registers 5 and 6, are applied to transformation matrix 4 through the register 8 whereby they are interleaved. Further encipherment is accomplished by adding the output of transformation matrix 4 with the randomly generated key code in register 2 in a modulo 2 adder 3. The output of the adder 3, together with the contents of the key code register 2 are applied to a further transformation matrix to further scramble the codes. The output of the matrix 20 is supplied to the input of a conventional psuedorandom sequence generator 21. The output of the adder 3 is also supplied directly to counter 13 to preset this counter.
When counter 13 is loaded, a signal B, which may be manually generated using a push button switch, or automatically generated in response to the loading of counter 13, enables coincidence gate 23. Gate 14, coupled to the output of counter 13, provides a logic 1 when the counter has reached its full count. Thus, when counter 13 is preset from the output of adder 3, with a count other than a full count, the output of gate 14 is a logic 0, which is inverted to a logic 1, by operation of inverter 26, to enable gate 24. When gates 23 and 24 are enabled, clock pulses from clock 22 simultaneously increment counter 13 and register 18 of the psuedorandom sequence generator 21. lncrementing continues until counter 13 reaches its full count, at which time the output of gate 14 assumes a logic 1 thereby disabling gate 24 through the operation of inverter 26. In this manner, the key code, and the output of adder 3 are further enciphered increasing still fur ther the security of the system. This encipherment prevents an individual from isolating the arrival time from the codes imprinted on the room key and subsequently counterfeiting a room key including thereon an order code corresponding to the time at which he seeks to enter the room illegally.
The output of the psuedorandom sequence generator 21, together with the output of adder 3 is further enciphered in transformation matrix and applied to a key writer 27, which imprints, as illustrated in FIG. 2, an encipherment 300 of the key code, room number, order code and departure time on the key. In addition, the room number 302, in decimal form, may also be imprinted on the key. As illustrated in FIG. 2, the key may take the form of a key card having a configuration equivalent to that of an ordinary credit card.
Alternatively to entering the encipherment 300 as an array of holes as shown in FIG. 2, the encipherment may be a printed or magnetized array of marks, or any kind of signal in any form representing the information in the encipherment.
In addition to the above information, the key card may also have imprinted thereon hotel advertising 304.
The lock mechanism at each room will now be described. Referring to FIG. 3, each lock mechanism is provided with an electronic key reader 37, such as that described in US. Pat. No. 3,688,269. The reader 37 reads the encipherment of the key code, room number, order code and time of departure, from the inserted key card 28. This encipherment is partially unscrambled by transformation matrix 38, which is the reverse of transformation matrix 25. The output of transformation matrix 38 therefore corresponds to the output of the adder 3 and the output of the psuedorandom sequence generator 21 after gate 24 has been disabled. The information on bus 32 corresponds to the output of adder 3 which was previously supplied as the preset input to counter 13. At the remote lock mechanism, this preset count is applied to register 43. The remaining bits from transformation matrix 38 are applied to the shift register 31 forming part of psuedorandom sequence generator 39. When register 31 is loaded, clock 40 increments shift register 31 backwards, while decrementing binary counter 45 previously preset to its full count. Decrementing of register 31 and counter 45 continues until comparator 44 detects correspondence between the preset count in register 43 and the count in counter 45. At this point, the output of comparator 44 goes to a logic 1, which, through the operation of inverter 60, disables coincidence gate 41 to thereby block further clock pulses from entering register 31 and counter 45. Register 31 now stores a binary num ber identical to that which was supplied from transformation matrix 20 to shift register 18 of the psuedorandom sequence generator 21 at the control console.
Each lock mechanism is provided with a binary counter 65 operating in synchronism with the binary counter 16 of the control console. Clock 66 corresponds to clock 17, and thus when clock 17 provides clock pulses spaced at 1/60 of a second. clock 66 also provides pulses at l/ of a second intervals. Any lack of synchronism is acceptable to the system as long as the time interval is within the allowable time interval between check-in time and the time of presentation of the key card 28 to the lock mechanism.
The count in binary counter is applied to the subtrahend input of the subtractor 50, while the minuend input receives the order code from the transformation matrix 49. The output of the subtractor 50 is supplied to a conventional threshold detector 68, the threshold of which is set to correspond to the allowable time interval between check-in time and the time of presentation of the key card 28 to the lock mechanism. If the key card 28 is presented to the key reader 37 within the predetermined time interval, the output of the threshold gate 68 is at a logic 0, enabling the coincidence gate 53, through inverter 67. The second input to gate 53 is coupled to the output of comparator 51 which compares the room number derived from the transformation matrix 49 with the room number stored in register 72. If a match exists, the output of comparator 51 goes to a logic 1 causing the output of coincidence gate 53 to also obtain a logic I enabling coincidence gate 69, while simultaneously resetting shift register 54. Shift register 54 is now ready to receive a new key code. This new key code is provided by the key code on bus 35, which is applied to the shift register 54 through enabled coincidence gate 69 and OR gate 71. In addition, the logic 1 at the output of gate 53 is applied to the lock bolt control circuit 62 through the OR gate 55 to cause the lock bolt associated with the room to move to its unlocked position. The lock bolt control circuit may correspond to that described in co-pending patent application Ser. No. 84,08, by Stephen Paull and Paul A. Crafton, filed Oct. 26, 1970 and assigned to an affiliate of the assignee of the present invention.
The guest continues to gain access to his room even after the preset time interval determined by the threshold of threshold gate 68 has passed. Once the lock mechanism has been set with the new key code, each time the guest presents his key card 28 to the key reader 37, the encipherment is read therefrom and passed through transformation matrix 38, psuedorandom sequence generator 39 and the transformation matrix 46 to recover the key code and place it on bus 35 in the manner just described.
More specifically, the bits on bus 32 correspond to the preset count applied to the binary counter 13 of FIG. 1, while the code applied to the shift register 31 from the matrix 38 corresponds to the output from the shift register 18 of the psuedorandom sequence generator 21 when coincidence gate 24 has been disabled. Clock 40, operating through coincidence gate 41, shifts register 31 backwards while decrementing counter 45, which has been preset to its full count. When the preset count in register 43 corresponds to the count in counter 45, the output of comparator 44 goes to a logic high disabling gate 41. At this time, the output from shift register 31, which is applied to the transformation matrix 46 corresponds to the guest key code and the output of the adder 3 after it has been interleaved by matrix 20. Transformation matrix 46 is the inverse of transformation matrix and thus, the key code is recovered on bus 35 and applied to comparator 47. Since the key code on the guest's key card 28 now corresponds to the key code stored in shift register 54, the output of comparator 47 goes to a logic 1 generating an unlock trigger signal which is applied to the lock bolt mechanism 62 causing the lock bolt of the room to move to its unlocked position.
The time of departure feature will now be described. The guests time of departure has been recovered as previously explained and applied to comparator 52 and subtractor 90. The comparator 52 also receives the count in binary counter 65. When the count in the binary counter 65 corresponds to the count representing the time of departure, the output of the comparator 52 raises to a logic 1, setting latch 96 to enable gate 94. The purpose of subtractor 90 is to provide the guest with a check-out grace period. While the subtrahend input of suhtractor 90 receives the departure time, the minuend input receives the count in counter 65. The difference signal is applied to threshold circuit 92 having a threshold level corresponding to the grace period. As long as the input to threshold circuit 92 from subtractor 90 is below the threshold, and thus within the grace period, the output of circuit 92 is at a logic 0. When the grace period has lapsed, the output of threshold circuit 92 assumes a logic 1 causing the output of coincidence gate 94 to assume a logic I. enabling coincidence gate 70, while resetting register 54. Each lock mechanism has associated therewith a random number generator 73 and a shift register 74 storing the random number generated by the generator 73. When coincidence gate is enabled, the number stored in shift register 74 passes through the gate 70 and OR gate 71 to the shift register 54. Subsequent presentation of the guest key card 28 to the key reader 37 of the lock mechanism does not result in a logic high from comparator 47 since the key code on the guest key card differs from the key code now stored in shift register 54. Therefore, lock bolt mechanism 62 is not triggered.
Provision is also made for allowing hotel employees to enter rooms with a pass key. Pass keys are prepared in the same manner as the guests key cards. At each room, the entire circuitry illustrated in FIG. 3, except for binary counter 65 and clock 66, are duplicated. The room register associated with the pass key circuitry at each lock mechanism, contains a common arbitrary room number. The grace period determined by the threshold circuit 68 in the pass key portion of the lock mechanism is set equal to the length of the work shift and the time of departure is set to correspond to the end of the work shift. In this manner, an employees key card is valid only for the duration of his work shift.
FIG. 4 is a block diagram representation of the application of the present invention to a hotel. Central console 500 may be connected by means of wires to the hotels restaurant 502, bar 503, shops 504 and the parking lot gate 505. Returning to FIG. 1, it can be seen that the encipherment imprinted on the guest key card 28 is also inserted into a central computer memory 400. This memory is accessed by a card reading terminal 406 at each service area in the hotel such as the bar or restau rant, using conventional computer techniques. If the guest key card is still valid, the comparator 404 displays an accept signal at a signaling means 402 at the service areas a reject signal otherwise.
By generating a random guest key code plus the room number, at the cashiers console 408, the cashier can change at random the guest key code in the central computer memory 400, thereby preventing the guest from continuing to charge services after he has paid his bill.
If a family or a group of persons is registered and assigned to two or more rooms as a group. the rooms may be master keyed by storing the key code used for the first key (as for example in a shift register) and using the stored key code instead ofa new key code to generate the encipherment for the other room (5) of the group of assigned rooms. Each key of the group of keys would be used in the correct room lock mechanism the very first time the key is inserted, but after the first insertion all keys may be used interchangeably with each other. If it is desired to permit each key to be used for any room of the group even the first time used, the room numbers of all assigned rooms would be included in the encipherment on each key, and the lock mechanism would accept that one of the room numbers ex tracted from the encipherment that corresponds to its own room number. The output of transformation matrix 49 would involve all the assigned roomnumbers and would be compared in turn with the binary register 72. If one compares favorably, the output of comparator 51 becomes high.
As previously indicated, the system has application to baggage lockers. When so used, the time of departure feature would generally be omitted. Further, the inventive system has applicability to the field of rental vehicles. The automobile ignition lock, for example, may include a lock bolt mechanism and control circuit such as the circuit 62 used in hotels. The circuitry of FIG. 3 would be included in a box mounted in the vehicle, while circuitry of FIG. 1 would be included in the rental office.
While the invention has been particularly shown and described. with reference to a preferred embodiment thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.
What is claimed is:
1. A lock mechanism for generating an unlock trigger signal, said mechanism including storage means storing a key code and comparison. means for comparing the stored key code with an applied key code to cause the generation of the unlock trigger signal when the two key codes coincide, the improvement comprising:
a machine readable card having formed thereon an order code and a key code enciphered together, means in said lock mechanism for reading said order code and key code in enciphered form,
means for deciphering said order code and said key code, first comparison means for comparing the order code with a lock mechanism generated signal, and
means responsive to said comparison for storing the key code read from said coded key in said storage means.
2. The lock mechanism of claim 1, wherein said order code represents time, said lock mechanism including means for generating a time representative signal, said first comparison means comprising means for subtracting the time represented by said order code from the time representative signal, said lock mechanism further including threshold means responsive to the output of said subtracting means for producing a key code accept signal when the value of the output of the subtracting means is below the threshold level of said threshold means.
3. The lock mechanism of claim 2, wherein said key has further formed thereon an identification code, said lock mechanism further including means for storing a lock mechanism identification code, means for reading the identification code from the key, second comparison means for comparing the stored lock mechanism identification code with the read identification code and means for blocking said key code accept signal when the stored lock mechanism identification code does not correspond to the read identification code.
4. The lock mechanism of claim 3, wherein said lock mechanism further includes a lock bolt control circuit responsive to said unlock trigger signal and a lock bolt responsive to the lock bolt control circuit, said lock' mechanism being coupled to an entrance door of a room, said key having further formed thereon a time of departure code, said lock mechanism including third comparison means responsive to said time of departure code and lock mechanism generated time representative signal for producing a key code non-accept signal when said time representative signal is greater than the time of departure code, means for storing a randomly generated key code and means responsive to said nonaccept signal for resetting said key code storage means and entering said randomly generated key code therein.
5. A security system for a lock mechanism comprised of a lock belt, a lock bolt control circuit and unlock trigger. command circuitry, said unlock trigger command circuitry including means for storing a key code and means for comparing the stored key code with a key code read from a key, said security system including apparatus for encoding said key comprising:
means for generating a random key code,
shift register means for storing the output of said generating means, 7
means for storing an order code,
adder means foradding said order code and said key code,
pseudorandom sequence generator receiving said key code and the output of said adder,
a first binary counter receiving the output of said adder to preset said first counter, means for simultaneously incrementing said first counter and pseudorandom sequence generator until the binary counter reaches its full count, and
keycard writer means, for forming the number contained in the pseudorandom sequence generator on a key card said number being said order code and said key code enciphered together.
6. The apparatus of claim 5, wherein said order code represents time, said apparatus further comprising a second binary, counter clock means for incrementing the count in the binary counter at predetermined time intervals, and means responsive to a request for coding said key for transferring the contents of said counter to said order code storage means.
7. The apparatus of claim 6, wherein said lock mechanism is coupled to an entrance door of a hotel room further including means for storing a room number, said adding means including means for adding said room number to said order code, departure time and key code, said key card writer means including means for forming the room number on said key in decimal form.
8. The apparatus of claim 7, further comprising a central memory means storing the key code and its associated room number, card reader means for reading the codes on said key, comparison means for comparing the key code and room number stored in said central memory with the read codes from said key and means for producing a billing accept signal when correspondence is determined.
9. The apparatus of claim 3, wherein said lock mechanism is attached to a baggage locker.
10. The apparatus of claim 3, wherein said lock mechanism is attached to an automobile starter circuit.
11. The security system including the apparatus of claim 5 wherein said lock bolt control circuitry comprises:
means in said lock mechanism for reading the order code and the key code as formed on said key card, first comparison means for comparing the order code with a lock mechanism generated signal, and means responsive to said comparison for storing the key code read from said coded key in said means for storing a key code.
12. The security system of claim 11 wherein the apparatus for encoding further includes means for storing a departure time code, and said lock bolt control circuit further includes means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a oneto-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code; said adder means in said apparatus for encoding further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
13. The apparatus of claim 6 further including means for storing a departure time code, said adder means further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
14. The apparatus of claim 13, further including first transformation matrix means for scrambling said order code and departure code prior to their application to the adder means, second transformation matrix means for scrambling the output of the adder means and key code prior to their application to the pseudorandom sequence generator, and third transformation matrix means responsive to the output of said adder means and pseudorandom sequence generator for scrambling and means for applying the output of said third transformation matrix means to said key writer means.
15. The security system including the apparatus of claim 14 wherein said lock bolt control circuitry comprises:
means in said lock mechanism for reading the scrambled order code, departure code and key code as formed on said key card,
fourth transformation matrix means connected to said means for reading and being the reverse of said thrid transfer matrix means for unscrambling to provide outputs corresponding to the outputs of said adder means and pseudorandom sequence generator,
second pseudorandom sequence generator receiving the second of the outputs of said fourth transformation matrix,
third binary counter initially preset to its full count,
third comparison means for comparing the output of said third binary counter with the first of the outputs of said fourth transformation matrix,
means for simultaneously decrementing said third counter and said second pseudorandom sequence generator until said third comparison means produces an output,
fifth transformation matrix means connected to said second pseudorandom sequence generator and being the reverse of said second transfer matrix means for unscrambling to provide outputs corresponding to the output of said adder means and said key code,
subtractor means for subtracting the two outputs of said fifth transformation matrix means to recover said order code scrambled with said departure code,
sixth transformation matrix means connected to said subtractor means and being the reverse of said first transformation matrix means for unscrambling said order code and said departure code, fourth comparison means for comparing the order code with a lock mechanism generated signal, and
means responsive to said fourth comparison means for storing the key code from said fifth transformation matrix means in said means for storing a key code.
16. The security system of claim 15 further including means for generating a time representative signal, fifth comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a oneto-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
17. The security system of claim 11 wherein said order code represents time, said apparatus for encoding further comprising a second binary counter, clock means for incrementing the count in the binary counter at predetermined time intervals, and means responsive to a request for coding said key for transferring the contents of said counter to said order code storage means.
18. The security system of claim 17, said lock bolt control circuit including means for generating a time representative signal, said first comparison means comprising means for subtracting the time represented by said order code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a key code accept signal when the value of the output of the subtracting means is below the threshold level of said threshold means.
19. The security system of claim 11, said encoding apparatus further including means for storing a departure time code, said adder means further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
20. The security system of claim 19 wherein said reading means also reads said departure time code, said lock bolt control circuitry including means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
21. The security system of claim 20, said second comparison means comprising means for subtracting the time represented by the departure time code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a non-accept signal when the value of the output of the subtracting means is above the threshold level of said threshold means.
Claims (21)
1. A lock mechanism for generating an unlock trigger signal, said mechanism including storage means storing a key code and comparison means for comparing the stored key code with an applied key code to cause the generation of the unlock trigger signal when the two key codes coincide, the improvement comprising: a machine readable card having formed thereon an order code and a key code enciphered together, means in said lock mechanism for reading said order code and key code in enciphered form, means for deciphering said order code and said key code, first comparison means for comparing the order code with a lock mechanism generated signal, and means responsive to said comparison for storing the key code read from said coded key in said storage means.
2. The lock mechanism of claim 1, wherein said order code represents time, said lock mechanism including means for generating a time representative signal, said first comparison means comprising means for subtracting the time represented by said order code from the time representative signal, said lock mechanism further including threshold means responsive to the output of said subtracting means for producing a key code accept signal when the value of the output of the subtracting means is below the threshold level of said threshold means.
3. The lock mechanism of claim 2, wherein said key has further formed thereon an identification code, said lock mechanism further including means for storing a lock mechanism identification code, means for reading the identification code from the key, second comparison means for comparing the stored lock mechanism identification code with the read identification code and means for blocking said key code accept signal when the stored lock mechanism identification code does not correspond to the read identification code.
4. The lock mechanism of claim 3, wherein said lock mechanism further includes a lock bolt control circuit responsive to said unlock trigger signal and a lock bolt responsive to the lock bolt control circuit, said lock mechanism being coupled to an entrance door of a room, said key having further formed thereon a time of departure code, said lock mechanism including third comparison means responsive to said time of departure code and lock mechanism generated time representative signal for producing a key code non-accept signal when said time representative signal is greater than the time of departure code, means for storing a randomly generated key code and means responsive to said non-accept signal for resetting said key code storage means and entering said randomly generated key code therein.
5. A security system for a lock mechanism comprised of a lock belt, a lock bolt control circuit and unlock trigger command circuitry, said unlock trigger command circuitry including means for storing a key code and means for comparing the stored key code with a key code read from a key, said security system including apparatus for encoding said key comprising: means for generating a random key code, shift register means for storing the output of said generating means, means for storing an order code, adder means for adding said order code and said key code, pseudorandom sequence generator receiving said key code and the output of said adder, a first binary counter receiving the output of said adder to preset said first counter, means for simultaneously incrementing said first counter and pseudorandom sequence generator until the binary counter reaches its full count, and key card writer means, for forming the number contained in the pseudorandom sequence generator on a key card said number being said order code and said key code enciphered together.
6. The apparatus of claim 5, wherein said order code represents time, said apparatus further comprising a second binary, counter clock means for incrementing the count in the binary counter at predetermined time intervals, and means responsive to a request for coding said key for transferring the contents of said counter to said order code storage means.
7. The apparatus of claim 6, wherein said lock mechanism is coupled to an entrance door of a hotel room further including means for storing a room number, said adding means including means for adding said room number to said order code, departure time and key code, said key card writer means including means for forming the room number on said key in decimal form.
8. The apparatus of claim 7, further comprising a central memory means storing the key code and its associated room number, card reader means for reading the codes on said key, comparison means for comparing the key code and room number stored in said central memory with the read codes from said key and means for producing a billing accept signal when correspondence is determined.
9. The apparatus of claim 3, wherein said lock mechanism is attached to a baggage locker.
10. The apparatus of claim 3, wherein said lock mechanism is attached to an automobile starter circuit.
11. The security system including the apparatus of claim 5 wherein said lock bolt control circuitry comprises: means in said lock mechanism for reading the order code and the key code as formed on said key card, first comparison means for comparing the order code with a lock mechanism generated signal, and means responsive to said comparison for storing the key code read from said coded key in said means for storing a key code.
12. The security system of claim 11 wherein the apparatus for encoding further includes means for storing a departure time code, and said lock bolt control circuit further includes means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a one-to-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code; said adder means in said apparatus for encoding further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
13. ThE apparatus of claim 6 further including means for storing a departure time code, said adder means further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
14. The apparatus of claim 13, further including first transformation matrix means for scrambling said order code and departure code prior to their application to the adder means, second transformation matrix means for scrambling the output of the adder means and key code prior to their application to the pseudorandom sequence generator, and third transformation matrix means responsive to the output of said adder means and pseudorandom sequence generator for scrambling and means for applying the output of said third transformation matrix means to said key writer means.
15. The security system including the apparatus of claim 14 wherein said lock bolt control circuitry comprises: means in said lock mechanism for reading the scrambled order code, departure code and key code as formed on said key card, fourth transformation matrix means connected to said means for reading and being the reverse of said thrid transfer matrix means for unscrambling to provide outputs corresponding to the outputs of said adder means and pseudorandom sequence generator, second pseudorandom sequence generator receiving the second of the outputs of said fourth transformation matrix, third binary counter initially preset to its full count, third comparison means for comparing the output of said third binary counter with the first of the outputs of said fourth transformation matrix, means for simultaneously decrementing said third counter and said second pseudorandom sequence generator until said third comparison means produces an output, fifth transformation matrix means connected to said second pseudorandom sequence generator and being the reverse of said second transfer matrix means for unscrambling to provide outputs corresponding to the output of said adder means and said key code, subtractor means for subtracting the two outputs of said fifth transformation matrix means to recover said order code scrambled with said departure code, sixth transformation matrix means connected to said subtractor means and being the reverse of said first transformation matrix means for unscrambling said order code and said departure code, fourth comparison means for comparing the order code with a lock mechanism generated signal, and means responsive to said fourth comparison means for storing the key code from said fifth transformation matrix means in said means for storing a key code.
16. The security system of claim 15 further including means for generating a time representative signal, fifth comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a one-to-one comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
17. The security system of claim 11 wherein said order code represents time, said apparatus for encoding further comprising a second binary counter, clock means for incrementing the count in the binary counter at predetermined time intervals, and means responsive to a request for coding said key for transferring the contents of said counter to said order code storage means.
18. The security system of claim 17, said lock bolt control circuit including means for generating a time representative signal, said first comparison means comprising means for subtracting the time represented by said order code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a key code accept signal when the value of the output of the subtracting means is below the threshold level of said threshold means.
19. The security system of claim 11, said encoding appAratus further including means for storing a departure time code, said adder means further including means for adding said departure time code to said key code, said pseudorandom sequence generator receiving as the output of the adder the sum of the key code, order code and departure time code.
20. The security system of claim 19 wherein said reading means also reads said departure time code, said lock bolt control circuitry including means for generating a time representative signal, second comparison means for comparing the time representative signal with the departure time code to produce a non-accept signal when a comparison exists, and means responsive to the non-accept signal for changing the lock mechanism stored key code.
21. The security system of claim 20, said second comparison means comprising means for subtracting the time represented by the departure time code from the time representative signal, threshold means responsive to the output of said subtracting means for producing a non-accept signal when the value of the output of the subtracting means is above the threshold level of said threshold means.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US328179A US3906447A (en) | 1973-01-31 | 1973-01-31 | Security system for lock and key protected secured areas |
AU65007/74A AU6500774A (en) | 1973-01-31 | 1974-01-30 | Security system |
FR7403254A FR2216423B3 (en) | 1973-01-31 | 1974-01-31 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US328179A US3906447A (en) | 1973-01-31 | 1973-01-31 | Security system for lock and key protected secured areas |
Publications (1)
Publication Number | Publication Date |
---|---|
US3906447A true US3906447A (en) | 1975-09-16 |
Family
ID=23279857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US328179A Expired - Lifetime US3906447A (en) | 1973-01-31 | 1973-01-31 | Security system for lock and key protected secured areas |
Country Status (3)
Country | Link |
---|---|
US (1) | US3906447A (en) |
AU (1) | AU6500774A (en) |
FR (1) | FR2216423B3 (en) |
Cited By (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4012583A (en) * | 1975-03-03 | 1977-03-15 | Motorola, Inc. | Pay TV control system |
US4148012A (en) * | 1975-09-26 | 1979-04-03 | Greer Hydraulics, Inc. | Access control system |
WO1980002711A1 (en) * | 1979-06-05 | 1980-12-11 | Thelin Handel Id Select | Electronic lock with changeable opening code |
US4271352A (en) * | 1979-05-07 | 1981-06-02 | Thomas Lon G | Lost personal accessory return method and article |
US4298792A (en) * | 1977-11-22 | 1981-11-03 | Bsg-Schalttechnik Gmbh & Co., K.G. | Locking apparatus for preventing unauthorized access |
US4315247A (en) * | 1979-08-13 | 1982-02-09 | Germanton Charles E | Security systems employing an electronic lock and key apparatus |
US4415893A (en) * | 1978-06-27 | 1983-11-15 | All-Lock Electronics, Inc. | Door control system |
DE3331357A1 (en) * | 1982-09-02 | 1984-03-08 | Elkem A/S, Oslo | RECORDABLE ELECTRONIC LOCK AND METHOD FOR TRANSCODING THE SAME |
US4519228A (en) * | 1981-04-01 | 1985-05-28 | Trioving A/S | Electronic recodeable lock |
US4525805A (en) * | 1982-12-20 | 1985-06-25 | Richard Prosan | Secure locking system employing radiant energy and electrical data transmission |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
EP0169150A1 (en) * | 1984-07-20 | 1986-01-22 | Jacques Lewiner | Coded lock device, especially with a keyboard |
US4575622A (en) * | 1983-07-29 | 1986-03-11 | Esac, Inc. | Electronic access control system for coin-operated games and like selectively accessible devices |
US4596985A (en) * | 1982-11-27 | 1986-06-24 | Kiekert Gmbh & Co. Kommanditgesellschaft | Radio-controlled lock method with automatic code change |
US4629873A (en) * | 1979-06-15 | 1986-12-16 | Stockburger H | Method and means for producing and analyzing secret identifying code marks in machine-scanned data carriers |
US4672376A (en) * | 1983-12-02 | 1987-06-09 | Jacques Lewiner | Portable control code transmitter with delayed code neutralization |
US4688026A (en) * | 1984-05-15 | 1987-08-18 | Scribner James R | Method of collecting and using data associated with tagged objects |
US4692762A (en) * | 1982-06-04 | 1987-09-08 | Jacques Lewiner | Remote control coded devices |
US4717816A (en) * | 1984-02-13 | 1988-01-05 | Raymond James W | Electronic lock and key system for hotels and the like |
US4721954A (en) * | 1985-12-18 | 1988-01-26 | Marlee Electronics Corporation | Keypad security system |
US4723593A (en) * | 1985-06-07 | 1988-02-09 | Aica Kogyo Co., Ltd. | Room temperature control unit responsive to occupancy |
US4758819A (en) * | 1985-06-06 | 1988-07-19 | Aica Kogyo Co., Ltd. | Keysensor |
US4773020A (en) * | 1982-02-04 | 1988-09-20 | Anderson Carl A | System for locking objects |
US4837822A (en) * | 1986-04-08 | 1989-06-06 | Schlage Lock Company | Cryptographic based electronic lock system and method of operation |
US4868914A (en) * | 1987-12-21 | 1989-09-19 | Unisafe Limited | Method for clearing unlocking key codes in an electronic locking device |
US4870400A (en) * | 1988-01-26 | 1989-09-26 | Yale Security Inc. | Electronic door lock key re-sequencing function |
US4887292A (en) * | 1985-12-30 | 1989-12-12 | Supra Products, Inc. | Electronic lock system with improved data dissemination |
US4896246A (en) * | 1985-12-30 | 1990-01-23 | Supra Products, Inc. | Electronic lock with energy conservation features |
US4914732A (en) * | 1985-10-16 | 1990-04-03 | Supra Products, Inc. | Electronic key with interactive graphic user interface |
US4916443A (en) * | 1985-10-16 | 1990-04-10 | Supra Products, Inc. | Method and apparatus for compiling data relating to operation of an electronic lock system |
US4929880A (en) * | 1985-12-30 | 1990-05-29 | Supra Products, Inc. | Electronic lock system with battery conservation features |
US4947163A (en) * | 1985-10-16 | 1990-08-07 | Supra Products, Inc. | Electronic security system with configurable key |
US4967366A (en) * | 1989-03-06 | 1990-10-30 | Gilbarco Inc. | Integrated gasoline dispenser and POS authorization system with unattached pin pad |
US4988987A (en) * | 1985-12-30 | 1991-01-29 | Supra Products, Inc. | Keysafe system with timer/calendar features |
GB2251266A (en) * | 1990-12-03 | 1992-07-01 | Trioving As | Coded lock/key system with override |
US5180192A (en) * | 1990-04-30 | 1993-01-19 | Herbert William S | Lost personal accessory item identification and return method and articles |
US5204663A (en) * | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
US5245652A (en) * | 1985-10-16 | 1993-09-14 | Supra Products, Inc. | Secure entry system with acoustically coupled telephone interface |
US5326104A (en) * | 1992-02-07 | 1994-07-05 | Igt | Secure automated electronic casino gaming system |
EP0618550A1 (en) * | 1993-03-31 | 1994-10-05 | N.V. Nederlandsche Apparatenfabriek NEDAP | Access-permitting system having decentral authorizations |
US5359322A (en) * | 1992-09-28 | 1994-10-25 | Stanley Home Automation | Method and apparatus for interconnected electronic locks |
US5397884A (en) * | 1993-10-12 | 1995-03-14 | Saliga; Thomas V. | Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks |
US5477041A (en) * | 1991-02-26 | 1995-12-19 | Computerized Security Systems, Incorporated | Adaptable electronic key and lock system |
US5510780A (en) * | 1994-02-18 | 1996-04-23 | Profit Plus Corporation | Time cycled security code and activation control system |
US5670933A (en) * | 1994-07-14 | 1997-09-23 | Toyota Jidosha Kabushiki Kaisha | Antitheft apparatus and method for an automobile |
US5673034A (en) * | 1993-10-12 | 1997-09-30 | Saliga; Thomas V. | Security system comprising three apparatuses sharing a time-varying code |
US5702304A (en) * | 1994-10-12 | 1997-12-30 | Acres Gaming, Inc. | Method and apparatus for operating networked gaming devices |
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
WO1998043196A1 (en) * | 1997-03-21 | 1998-10-01 | Martin Jay R | Door lock control apparatus using paging communication |
US5986564A (en) * | 1984-03-28 | 1999-11-16 | Computerized Security Systems, Inc. | Microcomputer controlled locking system |
US5995013A (en) * | 1994-05-06 | 1999-11-30 | Nissan Motor Co., Ltd. | Controller using transmitter and receiver |
AU716421B3 (en) * | 1994-10-12 | 2000-02-24 | Acres Gaming, Inc. | Method of operating networked gaming devices |
US6046681A (en) * | 1997-11-07 | 2000-04-04 | Solop; John | Remote controlled door lock system |
US6102288A (en) * | 1993-06-04 | 2000-08-15 | Vendoret Holding S. A. | Card for a pledge lock |
DE19914407A1 (en) * | 1999-03-30 | 2000-10-05 | Deutsche Telekom Ag | Method for deriving identification numbers converts a customer's personal data into a binary number of a set bit length with the help of a secret key. |
US6380843B1 (en) * | 1996-04-19 | 2002-04-30 | La Poste | Secured access checking system enabling the automatic transfer of entitlement to produce keys |
US6415386B1 (en) * | 1995-07-21 | 2002-07-02 | Yi Shi | Cryptogram lock system with automatically variable true random code tonglingge |
ES2176107A1 (en) * | 2000-12-18 | 2002-11-16 | Fresno Manuel Matias | Hotel door security system |
EP1281827A1 (en) * | 2001-08-03 | 2003-02-05 | Talleres De Escoriaza, S.A. | Electronic closing system for access control |
US20030036825A1 (en) * | 2000-03-28 | 2003-02-20 | Jong-Hae Kim | Multiway control system for keyset |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
US6696981B1 (en) | 1999-04-05 | 2004-02-24 | Honda Giken Koyo Kabushiki Kaisha | Apparatus for managing entry and exit of a shared vehicle |
US6729958B2 (en) | 1993-01-22 | 2004-05-04 | Mgm Grand, Inc. | Gaming system with ticket-in/ticket-out capability |
US6746330B2 (en) | 1999-09-21 | 2004-06-08 | Igt | Method and device for implementing a coinless gaming environment |
US6809628B1 (en) | 1999-03-29 | 2004-10-26 | Aaron Bensimon | Personal or personalizable device for the conditional use of electric or electronic appliances, method of use |
US6842105B1 (en) * | 1985-10-16 | 2005-01-11 | Ge Interlogix, Inc. | Dual mode data logging |
US6850898B1 (en) | 1999-07-07 | 2005-02-01 | The Regents Of The University Of California | Vehicle sharing system and method for allocating vehicles based on state of charge |
US6850153B1 (en) | 1999-07-07 | 2005-02-01 | The Regents Of The University Of California | Vehicle sharing system and method for controlling or securing vehicle access and/or enablement |
US6941197B1 (en) | 1999-07-07 | 2005-09-06 | The Regents Of The University Of California | Vehicle sharing system and method with vehicle parameter tracking |
US6947881B1 (en) | 1999-07-07 | 2005-09-20 | Honda Giken Kogyo Kabushiki Kaisha | Shared vehicle system and method with vehicle relocation |
US20050206499A1 (en) * | 2004-03-19 | 2005-09-22 | Fisher Scott R | Electronic lock box with multiple modes and security states |
US6967567B1 (en) * | 1999-05-07 | 2005-11-22 | Honda Giken Kogyo Kabushiki Kaisha | Vehicle and system for controlling return and retrieval of the same |
US6975997B1 (en) | 1999-07-07 | 2005-12-13 | Honda Giken Kogyo Kabushiki Kaisha | Method for efficient vehicle allocation in vehicle sharing system |
WO2006021047A1 (en) * | 2004-08-27 | 2006-03-02 | Honeywell Limited | An access control system and a method of access control |
US7009489B2 (en) | 2002-06-14 | 2006-03-07 | Sentrilock, Inc. | Electronic lock system and method for its use |
WO2006029820A1 (en) * | 2004-09-14 | 2006-03-23 | Thoughtfab Limited | Method for documenting property or possession and transfer of property or possession of a merchandise |
US7086258B2 (en) | 2004-03-19 | 2006-08-08 | Sentrilock, Inc. | Electronic lock box with single linear actuator operating two different latching mechanisms |
WO2006092393A2 (en) * | 2005-03-02 | 2006-09-08 | International Business Machines Corporation | Multiple use secure transaction card |
US7181409B1 (en) | 1999-07-07 | 2007-02-20 | The Regents Of The University Of California | Shared vehicle system and method involving reserving vehicles with highest states of charge |
US20080067245A1 (en) * | 2006-09-06 | 2008-03-20 | Honda Motor Co., Ltd. | Basket tag with 2-d bar code |
US7454363B1 (en) | 2000-08-03 | 2008-11-18 | Igt | Method and apparatus for voucher sorting and reconciliation in soft count process |
US20090293565A1 (en) * | 2008-05-29 | 2009-12-03 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Card type mechanical key |
US20100148919A1 (en) * | 2003-01-10 | 2010-06-17 | Roberts Stuart J | Method and system for room activity communication |
US8232860B2 (en) | 2005-10-21 | 2012-07-31 | Honeywell International Inc. | RFID reader for facility access control and authorization |
US8351350B2 (en) | 2007-05-28 | 2013-01-08 | Honeywell International Inc. | Systems and methods for configuring access control devices |
US8598982B2 (en) | 2007-05-28 | 2013-12-03 | Honeywell International Inc. | Systems and methods for commissioning access control devices |
US8707414B2 (en) | 2010-01-07 | 2014-04-22 | Honeywell International Inc. | Systems and methods for location aware access control management |
US8787725B2 (en) | 2010-11-11 | 2014-07-22 | Honeywell International Inc. | Systems and methods for managing video data |
US8878931B2 (en) | 2009-03-04 | 2014-11-04 | Honeywell International Inc. | Systems and methods for managing video data |
US9019070B2 (en) | 2009-03-19 | 2015-04-28 | Honeywell International Inc. | Systems and methods for managing access control devices |
US9280365B2 (en) | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
US9344684B2 (en) | 2011-08-05 | 2016-05-17 | Honeywell International Inc. | Systems and methods configured to enable content sharing between client terminals of a digital video management system |
US20170109836A1 (en) * | 2015-10-16 | 2017-04-20 | Adt Us Holdings, Inc. | Security system that tracks employees on site and hours worked |
US9704313B2 (en) | 2008-09-30 | 2017-07-11 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
US9894261B2 (en) | 2011-06-24 | 2018-02-13 | Honeywell International Inc. | Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface |
US10038872B2 (en) | 2011-08-05 | 2018-07-31 | Honeywell International Inc. | Systems and methods for managing video data |
US20190100166A1 (en) * | 2016-07-20 | 2019-04-04 | Tencent Technology (Shenzhen) Company Limited | Data processing method and device, and system |
US10362273B2 (en) | 2011-08-05 | 2019-07-23 | Honeywell International Inc. | Systems and methods for managing video data |
US10523903B2 (en) | 2013-10-30 | 2019-12-31 | Honeywell International Inc. | Computer implemented systems frameworks and methods configured for enabling review of incident data |
US11355111B2 (en) * | 2017-01-24 | 2022-06-07 | Honeywell International Inc. | Voice control of an integrated room automation system |
US11761239B2 (en) | 2019-09-13 | 2023-09-19 | Carrier Corporation | Building access system with programming door locks |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3622991A (en) * | 1969-09-16 | 1971-11-23 | Electro Optics Devices Corp | Electronic locking system |
US3662342A (en) * | 1971-02-16 | 1972-05-09 | Phinizy R B | Key-controlled electronic security system |
US3743134A (en) * | 1969-12-03 | 1973-07-03 | Smiths Industries Ltd | Access-control equipment and item-dispensing systems including such equipment |
US3800284A (en) * | 1973-01-12 | 1974-03-26 | Pitney Bowes Inc | Electronic combination lock and lock system |
US3821704A (en) * | 1972-03-13 | 1974-06-28 | D Sabsay | Self re keying security device with coded key |
-
1973
- 1973-01-31 US US328179A patent/US3906447A/en not_active Expired - Lifetime
-
1974
- 1974-01-30 AU AU65007/74A patent/AU6500774A/en not_active Expired
- 1974-01-31 FR FR7403254A patent/FR2216423B3/fr not_active Expired
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3622991A (en) * | 1969-09-16 | 1971-11-23 | Electro Optics Devices Corp | Electronic locking system |
US3743134A (en) * | 1969-12-03 | 1973-07-03 | Smiths Industries Ltd | Access-control equipment and item-dispensing systems including such equipment |
US3662342A (en) * | 1971-02-16 | 1972-05-09 | Phinizy R B | Key-controlled electronic security system |
US3821704A (en) * | 1972-03-13 | 1974-06-28 | D Sabsay | Self re keying security device with coded key |
US3800284A (en) * | 1973-01-12 | 1974-03-26 | Pitney Bowes Inc | Electronic combination lock and lock system |
Cited By (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4012583A (en) * | 1975-03-03 | 1977-03-15 | Motorola, Inc. | Pay TV control system |
US4148012A (en) * | 1975-09-26 | 1979-04-03 | Greer Hydraulics, Inc. | Access control system |
US4298792A (en) * | 1977-11-22 | 1981-11-03 | Bsg-Schalttechnik Gmbh & Co., K.G. | Locking apparatus for preventing unauthorized access |
US4415893A (en) * | 1978-06-27 | 1983-11-15 | All-Lock Electronics, Inc. | Door control system |
US4271352A (en) * | 1979-05-07 | 1981-06-02 | Thomas Lon G | Lost personal accessory return method and article |
US4392133A (en) * | 1979-06-05 | 1983-07-05 | Lundgren Sten T | Electronic lock with changeable opening code |
WO1980002711A1 (en) * | 1979-06-05 | 1980-12-11 | Thelin Handel Id Select | Electronic lock with changeable opening code |
US4629873A (en) * | 1979-06-15 | 1986-12-16 | Stockburger H | Method and means for producing and analyzing secret identifying code marks in machine-scanned data carriers |
US4315247A (en) * | 1979-08-13 | 1982-02-09 | Germanton Charles E | Security systems employing an electronic lock and key apparatus |
US4519228A (en) * | 1981-04-01 | 1985-05-28 | Trioving A/S | Electronic recodeable lock |
US4773020A (en) * | 1982-02-04 | 1988-09-20 | Anderson Carl A | System for locking objects |
US4692762A (en) * | 1982-06-04 | 1987-09-08 | Jacques Lewiner | Remote control coded devices |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
DE3331357A1 (en) * | 1982-09-02 | 1984-03-08 | Elkem A/S, Oslo | RECORDABLE ELECTRONIC LOCK AND METHOD FOR TRANSCODING THE SAME |
US4596985A (en) * | 1982-11-27 | 1986-06-24 | Kiekert Gmbh & Co. Kommanditgesellschaft | Radio-controlled lock method with automatic code change |
US4525805A (en) * | 1982-12-20 | 1985-06-25 | Richard Prosan | Secure locking system employing radiant energy and electrical data transmission |
US4575622A (en) * | 1983-07-29 | 1986-03-11 | Esac, Inc. | Electronic access control system for coin-operated games and like selectively accessible devices |
US4672376A (en) * | 1983-12-02 | 1987-06-09 | Jacques Lewiner | Portable control code transmitter with delayed code neutralization |
US4717816A (en) * | 1984-02-13 | 1988-01-05 | Raymond James W | Electronic lock and key system for hotels and the like |
US5986564A (en) * | 1984-03-28 | 1999-11-16 | Computerized Security Systems, Inc. | Microcomputer controlled locking system |
US4688026A (en) * | 1984-05-15 | 1987-08-18 | Scribner James R | Method of collecting and using data associated with tagged objects |
FR2568032A1 (en) * | 1984-07-20 | 1986-01-24 | Lewiner Jacques | CODE LOCKING DEVICE, ESPECIALLY A KEYBOARD |
EP0169150A1 (en) * | 1984-07-20 | 1986-01-22 | Jacques Lewiner | Coded lock device, especially with a keyboard |
US4870411A (en) * | 1984-07-20 | 1989-09-26 | Jacques Lewiner | Coded locking device, more especially with keyboard |
US4758819A (en) * | 1985-06-06 | 1988-07-19 | Aica Kogyo Co., Ltd. | Keysensor |
US4723593A (en) * | 1985-06-07 | 1988-02-09 | Aica Kogyo Co., Ltd. | Room temperature control unit responsive to occupancy |
US4947163A (en) * | 1985-10-16 | 1990-08-07 | Supra Products, Inc. | Electronic security system with configurable key |
US5245652A (en) * | 1985-10-16 | 1993-09-14 | Supra Products, Inc. | Secure entry system with acoustically coupled telephone interface |
US6842105B1 (en) * | 1985-10-16 | 2005-01-11 | Ge Interlogix, Inc. | Dual mode data logging |
US20050168320A1 (en) * | 1985-10-16 | 2005-08-04 | General Electric Company | Electronic real estate lockbox system |
US4914732A (en) * | 1985-10-16 | 1990-04-03 | Supra Products, Inc. | Electronic key with interactive graphic user interface |
US4916443A (en) * | 1985-10-16 | 1990-04-10 | Supra Products, Inc. | Method and apparatus for compiling data relating to operation of an electronic lock system |
US4721954A (en) * | 1985-12-18 | 1988-01-26 | Marlee Electronics Corporation | Keypad security system |
US4887292A (en) * | 1985-12-30 | 1989-12-12 | Supra Products, Inc. | Electronic lock system with improved data dissemination |
US4929880A (en) * | 1985-12-30 | 1990-05-29 | Supra Products, Inc. | Electronic lock system with battery conservation features |
US4896246A (en) * | 1985-12-30 | 1990-01-23 | Supra Products, Inc. | Electronic lock with energy conservation features |
US4988987A (en) * | 1985-12-30 | 1991-01-29 | Supra Products, Inc. | Keysafe system with timer/calendar features |
US4837822A (en) * | 1986-04-08 | 1989-06-06 | Schlage Lock Company | Cryptographic based electronic lock system and method of operation |
US4868914A (en) * | 1987-12-21 | 1989-09-19 | Unisafe Limited | Method for clearing unlocking key codes in an electronic locking device |
US4870400A (en) * | 1988-01-26 | 1989-09-26 | Yale Security Inc. | Electronic door lock key re-sequencing function |
US4967366A (en) * | 1989-03-06 | 1990-10-30 | Gilbarco Inc. | Integrated gasoline dispenser and POS authorization system with unattached pin pad |
US5180192A (en) * | 1990-04-30 | 1993-01-19 | Herbert William S | Lost personal accessory item identification and return method and articles |
US5204663A (en) * | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
GB2251266A (en) * | 1990-12-03 | 1992-07-01 | Trioving As | Coded lock/key system with override |
US5260551A (en) * | 1990-12-03 | 1993-11-09 | Trioving A.S | Time controlled lock system |
USRE36426E (en) * | 1990-12-03 | 1999-12-07 | Trioving A.S | Time controlled lock system |
GB2251266B (en) * | 1990-12-03 | 1994-10-19 | Trioving As | Time controlled lock system |
US5477041A (en) * | 1991-02-26 | 1995-12-19 | Computerized Security Systems, Incorporated | Adaptable electronic key and lock system |
US5326104A (en) * | 1992-02-07 | 1994-07-05 | Igt | Secure automated electronic casino gaming system |
US5359322A (en) * | 1992-09-28 | 1994-10-25 | Stanley Home Automation | Method and apparatus for interconnected electronic locks |
US6736725B2 (en) | 1993-01-22 | 2004-05-18 | Mgm Grand, Inc. | Gaming method and host computer with ticket-in/ticket-out capability |
US6729957B2 (en) | 1993-01-22 | 2004-05-04 | Mgm Grand, Inc. | Gaming method and host computer with ticket-in/ticket-out capability |
US6729958B2 (en) | 1993-01-22 | 2004-05-04 | Mgm Grand, Inc. | Gaming system with ticket-in/ticket-out capability |
US20050020353A1 (en) * | 1993-01-22 | 2005-01-27 | Mgm Grand, Inc. | Slot machine with ticket-in/ticket-out capability |
US7275991B2 (en) | 1993-01-22 | 2007-10-02 | Mgm Grand, Inc. | Slot machine with ticket-in/ticket-out capability |
EP0618550A1 (en) * | 1993-03-31 | 1994-10-05 | N.V. Nederlandsche Apparatenfabriek NEDAP | Access-permitting system having decentral authorizations |
NL9300566A (en) * | 1993-03-31 | 1994-10-17 | Nedap Nv | Access granting system with decentralized authorizations. |
US6102288A (en) * | 1993-06-04 | 2000-08-15 | Vendoret Holding S. A. | Card for a pledge lock |
US5673034A (en) * | 1993-10-12 | 1997-09-30 | Saliga; Thomas V. | Security system comprising three apparatuses sharing a time-varying code |
US5397884A (en) * | 1993-10-12 | 1995-03-14 | Saliga; Thomas V. | Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks |
US5510780A (en) * | 1994-02-18 | 1996-04-23 | Profit Plus Corporation | Time cycled security code and activation control system |
US5995013A (en) * | 1994-05-06 | 1999-11-30 | Nissan Motor Co., Ltd. | Controller using transmitter and receiver |
US5670933A (en) * | 1994-07-14 | 1997-09-23 | Toyota Jidosha Kabushiki Kaisha | Antitheft apparatus and method for an automobile |
US6162122A (en) * | 1994-10-12 | 2000-12-19 | Acres Gaming Incorporated | Method and apparatus for operating networked gaming devices |
US5702304A (en) * | 1994-10-12 | 1997-12-30 | Acres Gaming, Inc. | Method and apparatus for operating networked gaming devices |
USRE43727E1 (en) | 1994-10-12 | 2012-10-09 | Igt | Method for operating networked gaming devices |
US8172682B2 (en) | 1994-10-12 | 2012-05-08 | Igt | Computer network and method for changing the pay schedules of gaming devices |
US7798899B2 (en) | 1994-10-12 | 2010-09-21 | Igt | Method and apparatus for controlling the cost of playing an electronic gaming device |
US20030228904A1 (en) * | 1994-10-12 | 2003-12-11 | Acres John F. | Method and apparatus for operating networked gaming devices |
US7749077B2 (en) | 1994-10-12 | 2010-07-06 | Igt | Method and apparatus for operating multiple games on a network of gaming devices |
AU716421B3 (en) * | 1994-10-12 | 2000-02-24 | Acres Gaming, Inc. | Method of operating networked gaming devices |
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
US6415386B1 (en) * | 1995-07-21 | 2002-07-02 | Yi Shi | Cryptogram lock system with automatically variable true random code tonglingge |
US6380843B1 (en) * | 1996-04-19 | 2002-04-30 | La Poste | Secured access checking system enabling the automatic transfer of entitlement to produce keys |
WO1998043196A1 (en) * | 1997-03-21 | 1998-10-01 | Martin Jay R | Door lock control apparatus using paging communication |
US6046681A (en) * | 1997-11-07 | 2000-04-04 | Solop; John | Remote controlled door lock system |
US20050144473A1 (en) * | 1999-03-29 | 2005-06-30 | Aaron Bensimon | Personal or personalizable device for the conditional use of electric or electronic appliances, method of use |
US6809628B1 (en) | 1999-03-29 | 2004-10-26 | Aaron Bensimon | Personal or personalizable device for the conditional use of electric or electronic appliances, method of use |
DE19914407A1 (en) * | 1999-03-30 | 2000-10-05 | Deutsche Telekom Ag | Method for deriving identification numbers converts a customer's personal data into a binary number of a set bit length with the help of a secret key. |
US6991176B1 (en) | 1999-03-30 | 2006-01-31 | Deutsche Telekom Ag | Method for generating identification numbers |
US6696981B1 (en) | 1999-04-05 | 2004-02-24 | Honda Giken Koyo Kabushiki Kaisha | Apparatus for managing entry and exit of a shared vehicle |
US6967567B1 (en) * | 1999-05-07 | 2005-11-22 | Honda Giken Kogyo Kabushiki Kaisha | Vehicle and system for controlling return and retrieval of the same |
US6850898B1 (en) | 1999-07-07 | 2005-02-01 | The Regents Of The University Of California | Vehicle sharing system and method for allocating vehicles based on state of charge |
US6850153B1 (en) | 1999-07-07 | 2005-02-01 | The Regents Of The University Of California | Vehicle sharing system and method for controlling or securing vehicle access and/or enablement |
US6975997B1 (en) | 1999-07-07 | 2005-12-13 | Honda Giken Kogyo Kabushiki Kaisha | Method for efficient vehicle allocation in vehicle sharing system |
US6941197B1 (en) | 1999-07-07 | 2005-09-06 | The Regents Of The University Of California | Vehicle sharing system and method with vehicle parameter tracking |
US6947881B1 (en) | 1999-07-07 | 2005-09-20 | Honda Giken Kogyo Kabushiki Kaisha | Shared vehicle system and method with vehicle relocation |
US7181409B1 (en) | 1999-07-07 | 2007-02-20 | The Regents Of The University Of California | Shared vehicle system and method involving reserving vehicles with highest states of charge |
US6746330B2 (en) | 1999-09-21 | 2004-06-08 | Igt | Method and device for implementing a coinless gaming environment |
US20030036825A1 (en) * | 2000-03-28 | 2003-02-20 | Jong-Hae Kim | Multiway control system for keyset |
US6897767B2 (en) * | 2000-03-28 | 2005-05-24 | Jong-Hae Kim | Multiway control system for keyset |
US7454363B1 (en) | 2000-08-03 | 2008-11-18 | Igt | Method and apparatus for voucher sorting and reconciliation in soft count process |
ES2176107A1 (en) * | 2000-12-18 | 2002-11-16 | Fresno Manuel Matias | Hotel door security system |
EP1281827A1 (en) * | 2001-08-03 | 2003-02-05 | Talleres De Escoriaza, S.A. | Electronic closing system for access control |
US6622912B2 (en) | 2001-08-03 | 2003-09-23 | Talleres De Escoriaza, S.A. | Electronic locking system for control of access |
US20050264400A1 (en) * | 2002-06-14 | 2005-12-01 | Sentrilock, Inc. | Electronic lock system and method for its use with a secure memory card |
US7009489B2 (en) | 2002-06-14 | 2006-03-07 | Sentrilock, Inc. | Electronic lock system and method for its use |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
US7193503B2 (en) | 2002-06-14 | 2007-03-20 | Sentrilock, Inc. | Electronic lock system and method for its use with a secure memory card |
US6989732B2 (en) | 2002-06-14 | 2006-01-24 | Sentrilock, Inc. | Electronic lock system and method for its use with card only mode |
US8264329B2 (en) * | 2003-01-10 | 2012-09-11 | Monismart Systems, Llc | Method and system for room activity communication |
US20100148919A1 (en) * | 2003-01-10 | 2010-06-17 | Roberts Stuart J | Method and system for room activity communication |
US7086258B2 (en) | 2004-03-19 | 2006-08-08 | Sentrilock, Inc. | Electronic lock box with single linear actuator operating two different latching mechanisms |
US7420456B2 (en) | 2004-03-19 | 2008-09-02 | Sentri Lock, Inc. | Electronic lock box with multiple modes and security states |
US20050206499A1 (en) * | 2004-03-19 | 2005-09-22 | Fisher Scott R | Electronic lock box with multiple modes and security states |
WO2006021047A1 (en) * | 2004-08-27 | 2006-03-02 | Honeywell Limited | An access control system and a method of access control |
US20080301463A1 (en) * | 2004-09-14 | 2008-12-04 | Dirk Michelsen | Method for Documenting Property or Possession and Transfer of Property or Possession of a Merchandise |
US7860797B2 (en) | 2004-09-14 | 2010-12-28 | Thoughtfab Limited | Method for documenting property or possession and transfer of property or possession of a merchandise |
WO2006029820A1 (en) * | 2004-09-14 | 2006-03-23 | Thoughtfab Limited | Method for documenting property or possession and transfer of property or possession of a merchandise |
WO2006092393A3 (en) * | 2005-03-02 | 2007-03-08 | Ibm | Multiple use secure transaction card |
WO2006092393A2 (en) * | 2005-03-02 | 2006-09-08 | International Business Machines Corporation | Multiple use secure transaction card |
US8941464B2 (en) | 2005-10-21 | 2015-01-27 | Honeywell International Inc. | Authorization system and a method of authorization |
US8232860B2 (en) | 2005-10-21 | 2012-07-31 | Honeywell International Inc. | RFID reader for facility access control and authorization |
US20080067245A1 (en) * | 2006-09-06 | 2008-03-20 | Honda Motor Co., Ltd. | Basket tag with 2-d bar code |
US8351350B2 (en) | 2007-05-28 | 2013-01-08 | Honeywell International Inc. | Systems and methods for configuring access control devices |
US8598982B2 (en) | 2007-05-28 | 2013-12-03 | Honeywell International Inc. | Systems and methods for commissioning access control devices |
US20090293565A1 (en) * | 2008-05-29 | 2009-12-03 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Card type mechanical key |
US8156776B2 (en) * | 2008-05-29 | 2012-04-17 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Card type mechanical key |
US9704313B2 (en) | 2008-09-30 | 2017-07-11 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
US8878931B2 (en) | 2009-03-04 | 2014-11-04 | Honeywell International Inc. | Systems and methods for managing video data |
US9019070B2 (en) | 2009-03-19 | 2015-04-28 | Honeywell International Inc. | Systems and methods for managing access control devices |
US9280365B2 (en) | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
US8707414B2 (en) | 2010-01-07 | 2014-04-22 | Honeywell International Inc. | Systems and methods for location aware access control management |
US8787725B2 (en) | 2010-11-11 | 2014-07-22 | Honeywell International Inc. | Systems and methods for managing video data |
US9894261B2 (en) | 2011-06-24 | 2018-02-13 | Honeywell International Inc. | Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface |
US10362273B2 (en) | 2011-08-05 | 2019-07-23 | Honeywell International Inc. | Systems and methods for managing video data |
US10038872B2 (en) | 2011-08-05 | 2018-07-31 | Honeywell International Inc. | Systems and methods for managing video data |
US9344684B2 (en) | 2011-08-05 | 2016-05-17 | Honeywell International Inc. | Systems and methods configured to enable content sharing between client terminals of a digital video management system |
US10863143B2 (en) | 2011-08-05 | 2020-12-08 | Honeywell International Inc. | Systems and methods for managing video data |
US10523903B2 (en) | 2013-10-30 | 2019-12-31 | Honeywell International Inc. | Computer implemented systems frameworks and methods configured for enabling review of incident data |
US11523088B2 (en) | 2013-10-30 | 2022-12-06 | Honeywell Interntional Inc. | Computer implemented systems frameworks and methods configured for enabling review of incident data |
US20170109836A1 (en) * | 2015-10-16 | 2017-04-20 | Adt Us Holdings, Inc. | Security system that tracks employees on site and hours worked |
US10559040B2 (en) * | 2015-10-16 | 2020-02-11 | The Adt Security Corporation | Security system that tracks employees on site and hours worked |
US20190100166A1 (en) * | 2016-07-20 | 2019-04-04 | Tencent Technology (Shenzhen) Company Limited | Data processing method and device, and system |
US10759385B2 (en) * | 2016-07-20 | 2020-09-01 | Tencent Technology (Shenzhen) Company Limited | Electronic lock and key for performing an unlock operation |
US11355111B2 (en) * | 2017-01-24 | 2022-06-07 | Honeywell International Inc. | Voice control of an integrated room automation system |
US11761239B2 (en) | 2019-09-13 | 2023-09-19 | Carrier Corporation | Building access system with programming door locks |
Also Published As
Publication number | Publication date |
---|---|
FR2216423B3 (en) | 1976-11-26 |
FR2216423A1 (en) | 1974-08-30 |
AU6500774A (en) | 1975-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US3906447A (en) | Security system for lock and key protected secured areas | |
US5591950A (en) | Programmable electronic lock | |
JP4155412B2 (en) | Locking device and method of using the same | |
US6130621A (en) | Method and apparatus for inhibiting unauthorized access to or utilization of a protected device | |
US5397884A (en) | Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks | |
US5120939A (en) | Databaseless security system | |
US5506575A (en) | Key-lock system and method using interchange of system-originated codes | |
JP2673941B2 (en) | Vehicle security device with usage rights electronically encoded | |
US4209782A (en) | Method and circuit arrangement for the electronically controlled release of door, safe and function locks using electronically coded keys | |
USRE29259E (en) | Self re-keying security device | |
JPH07315169A (en) | Vehicle safeguarding device with electronically coded right to use | |
CN108712389A (en) | A kind of intelligent lock system | |
US20040103287A1 (en) | Electronic device with time dependent access codes and apparatus for generating those codes | |
US3508205A (en) | Communications security system | |
US6393567B1 (en) | Method of enabling a server to authorize access to a service from portable devices having electronic microcircuits, e.g. devices of the smart card type | |
CN106534221B (en) | Appointment time switching device agreed by remote non-networking encryption algorithm and control method | |
GB1604158A (en) | Security system using keyboard data and encoded data cords for controlling access to secured locations | |
JP3959913B2 (en) | Entrance / exit management system and identity verification method | |
WO2002008551A1 (en) | Access method and system | |
WO2021149831A1 (en) | Electronic lock system, method performed using electronic lock system, portable terminal, method performed using portable terminal, and computer program | |
JP4669693B2 (en) | Admission management system and admission management method | |
US3771128A (en) | Method and apparatus for credit verification | |
JPS602466B2 (en) | locking device | |
KR20060055045A (en) | A goods management system and method thereof | |
Goutay | Smart card applications in security and data protection |