CA2078652A1 - Electronic bolt lock with enhanced security features - Google Patents

Electronic bolt lock with enhanced security features

Info

Publication number
CA2078652A1
CA2078652A1 CA002078652A CA2078652A CA2078652A1 CA 2078652 A1 CA2078652 A1 CA 2078652A1 CA 002078652 A CA002078652 A CA 002078652A CA 2078652 A CA2078652 A CA 2078652A CA 2078652 A1 CA2078652 A1 CA 2078652A1
Authority
CA
Canada
Prior art keywords
lock
key
electronic
bolt lock
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002078652A
Other languages
French (fr)
Inventor
Gerald Lee Dawson
Daniel Lee Thompson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mas Hamilton Group Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2078652A1 publication Critical patent/CA2078652A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00428Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period
    • G07C2009/00468Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period after n uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights

Abstract

ABSTRACT

A high security bolt lock is described having the ability to reencrypt the combination code for the lock each time a key is used and thus partially defeat the use of an unauthorized key. The lock may be operated by a temporary one time use key. The key for the lock carries a data storage means and battery to provide a date/time stamp and key identification for any key used.
The key and lock may be coded to only allow access in a particular time block, or only in conjunction with an other key. The access to the lock may be controlled such that two keys must be used in a prescribed order to gain access through the lock.

Description

2 ~1 7 ~

AN ELECTRONIC BOI.T LOCK WITH
ENHANCED SECURITY FEATU~ES

~ ELATED APPLICATION
~he subject matter o this application is related to the subject matter of Patent Application Serial Number , (Docket MHg-91-002) iled , on even date herewith by Gerald L. Dawson et al., e~titled Bolt LocX Bolt Retractor Mechanism, and commonly assigned with this application to Mas-Hamilton Gxoup, of Lexlngton, Kentucky.

FIELD OF THE INVENTION

This invention relates ko bolt locks an`d, more specifically, to totally self-contained electxonic bol~
lwks, having a magneto ~enerator and enhanced security functions.

BACKGRoUND OF TH~ INVEN~ION

Bolt locks have been the common means for locking doors in structure~ and seCuring other items for years, if not ~5 centuries. The locks have been purely mechanical until recently, when electronics have developed to the poin~

2~78~i5~

of being usable in locks to perform the functions of authenticatin~ the access codes and permitting entry.

With the advent of electronic control, the need for~
additional security features may be satisfied. In a mechanical bol~ lock~ there i~ no capability to determine during which part of a day or week the operator may be granted access. Access to a ~ey by an unauthorize~ indiv$dual could result in the compromise of the lock by key duplication. Further~ with mechanical locks, the duplication of a key permits unlimited access to the bogus key holder until the tumbler system is re-keyed to blocX out all prlor keys.
Althoug~ intended for one particular office lock, 2 key may fit and operate an unrelated house lock. Author~zed individuals could not monitor operation o~ the lock nor establish key identity for each operation. If access is to be gran~ed only when two individuals are present and that they each have a key, mechanical locks must be ~upltcated ~o ~hat there are at least two locks on the enclosure. Mechanical bolt locks do not have the ability to permit a temporary key to be issued for a one time access and have the lock remain secure and deny access to that key on any subsequent attempt to open the lock. It is easily recognized that electronic bolt~lo~ks 2 ~7~
It is a still another object of the invention to record the key identification and the time of operation to the loc~.

It is a still additional object of the in~ention to locate the clock portion of an electronic lock in the key to enhance audit accountability.

SUMMRRY OF THE INVE~TION

The high security bolt lock of this invention has a self-contained electrical generator which i~ manually operated ~y the operator at the time of the operation of the lock to power the lock and its electronic controls.
This feature allows the lock to be installed in remote locations and left unattended ~or long periods of time without the need to maintain a viable electrical power source connected to the lock at al~ times.

~he lock is provided with a capability to recognize an access code only once; and thus, unauthorized duplication will not assure the individual of access to the lock on a continuing basis or, alternatively, the unauthorized access to the lock is known at the time the authorized key is next used. This is accomplished by the access code being rewritten in the key electronics ~8~

ofer the opportunity to increase the level of security while offering other advantages.

These shortcomings of high security mechanical bolt locks provide opportunities to defeat the lock.

SUMMARY OF ~HE INVENTION

It is an object ~f the invention to provide an ability to change ~he access code of an e~ectronic lock upon each use o~ an authorized key to unlock the lock.

It is an additional object of the invention is to permit access to the enclosure only when multiple keys are used lS to operate t~e same lock mechanism.

A further ob~ect of the invention is to permit the use of a temporary key to open the lock on a one-time basis.

It is an additional object of the invention to lLmit the use of a key to a defined group of locks.

It is another ob~ect of the invention to provide a limitation on the time of day during which a lock may be unlocked.

2~178~2 after each access to th~ lock. The access code is comprised of a number, recorded vr stored in a data storage memory device imbedded on the key. The data storage device is typically a nonvolatile EEPROM. As S the access code is read from the key and compared to the authorized access code stored in the memory of the microprocessor in the e].ectronic controls of the lock, the microprocessor generates an encrypted number which will be the access code for the nex~ opera~ion of the lock. This new access code is then written to the EEPROM of the key as well as the memory of the microprocessor of the electronic controls of the lock.
If the key is duplicated and the duplicate is used prior to the authorized key, the au~horized ~ey will not operate the lock ind~cating to the authorized operator that the lock has been operated by an unauthorized key.
This informs the lock owner or operator that there has been a overt entry~ If on the other hand, the authorized key is used first, the access code is changed to prevent the use of any unauthorized access codes contained in any unauthorized key, which may have been acquired during duplication.

The incorporation of an electrical storage device of a large enough capacity to maintain the operation of the microprocessor clock module in operation permits the MH9-gl-003 2~8~ ~

recording oE data creating an audit trail of the date, time and key identity for each operation or attempted operation of the lock. The electrical storage device may be either a battery of the rechargeable or non-`
rechargeable nature or a capacitor. ~he clock module of the electronic chip on the key is operated to continuously update the date time module of the electronic controls. The lock electronic controls are programmable to allow operation of the loc~ only within designated time and date periods. Attempts to operate the lock at other times will be met with rejection of the access code and inability to operate the lock successfully.

Each lock may be classified a~ to the use of the lock.
For example, a lock for use in a office would be classified in one category; a residence lock in a second cateqory; a vehicle lock in a third category and other uses in other categories. A category code stored in the key is compared to the category of the lock and a key of one category will not be accep~ed by locks of another category; or the classes may be arranged in a hlerarchy such that a key categorized to operate a lock of a selected cateqory will operate any lock with a compatible combination in any lock of a lower-leveL -security category. A category 2 key would be capable of 2~3~
opening a category 2 or 3 lock; a category 1 lock could b~ capable of operating all three cateyories of locks, assuming valid access codes for each lock. For example, a category 1 lock might be installed on a ~uilding .
entrance, a category 2 lock on a department entrance door, and a category 3 lock on an office door.
, Each key may be provided with a unlque identifying code such as a serial number, which may be accessed by the lock electronics when inserted in the lock. This key identification may be read from the key and stored in a nonvolatile memory of the lock along wi~h the date and time, as each key is used to create an audi$ trail of all keys used to operate the lock, the date and time the lock was operated, the date and time of use, and also identification of the keys which were unsuccessful in opening the lock.

It may be desired to separately maintain the clock operation on a clock chip imbedded in the key. With battery power the clock data is kept current. When the key is removed from the lock, the date/time clock circuit is removed from the lock. Of course, the clock chip could be incorporated into the lock electronic controls resident within the lock.

M~9~91-003 20786~

The shortcomings of the prior art mechanical locks may be overcome by this invention and a better understanding of the invention may be had from the ~
drawings and the following detalled description of ~he invention.

BRIEF DESCRIPTION OF THE DRAWINGS

Fig. 1 illustrates a bolt lock of the t~pe descr~bed herein in a dîagrammatic fashion.

Figs. 2A, 2B and 2C comprise a representation of the!
operations of the lock electronics and particularly the microprocessor controlling the lock operation, presented as a control lo~ic flow diagram.

Fig. 3 is a flow diagram illustrating the access code validation subroutine.

Fig. 4 is a flow diagram showing the reencryption subroutine.

Flg. 5 is a flow dlagram of the audit subroutine.

Fig. 6 is a flow dia~ram of the subroutine for tes~ing the battery of the key to determine a low voltage 2~7~
condition.

Fig~ 7 illustrates in flow diagram form the temporary key setup subroutine. --Fig. 8 shows in flow diagram form the subroutine for new key setup.

Fig. 9 illustrates the logic flow diagram of the lock initialization ~ubroutine.

Fig. 10 shows an example of a key for use in the invention.

Fig. 11 i9 a diagrammatic illustration of an initialization device, for initializing the lock and key.

Fig. 12 shows the routine for acquiring the audit data stored in the lock memory and for initializing the lockO

DETAILED DESCRIPTION OF THE BEST MODE
FOR CARRYING OUT THE INVENTION
_~ _ The fabrication of the bolt lock is shown in a MH9-91-~03 2~8~5'.~

diagrammatic fash~on in Fig. 1 The key 14 may be inserted into the key cylinder 18 to operate the lock 10. Lock operation from the standpoin~ of generation of the electrical power necessary to power the lock, and S from a mechanical sta~dpoint, is described in United States Patent Application Serial Number ~
(~ocket MH9-91-002) filed , the same date as this application was filed by Gerald L. Dawson et al., entitled Bolt Lock Bolt Retractor Mechanism, and commonly assigned herewith to Ma~-Hamilton ~roup~
Lexington, Kentucky, and is incorporated herein ~y reference.

The operations of the lock 10 are controlled by the electronics control 48. This electronic control 48 incorporates the circuitry ~ecessary to support a m~croprocessor 100 of the type manufactured and sold by ORI Electric Industries Company~ Ltd. of Tokyo, Japan under designation 80C51F. The specific design o~ the circuitry ~s not shown since it is within the skill of the art of circuit design, given the information provided by the supplier of the micropxocessor as regards the necessary support circuits for the microprocessor and the OUtp-lt circuits necessary to utilize the benefits of the microprocessor 100. _. _ 1~

2 ~ 7 ~

The control of the microprocessor 100 is provided by a program written specifically fQr this device and embedded in the memory portion of the microprocessor 100 or an associated memory storage device, if desired.
5 The best mode-of implementing this invention is through the use of a program to control the opexations of $h~
microprocessor 100; ~ person skilled in the art of programming may write a control program for the preferred microprocessor or any similar microprocessor manufactured ~y other companies, using th~ teaching~ and description con~ained herein together with the logic flow control illustrated in the drawings.

.

The control program is illustrated in and reference ig made to Fig. 2 which comprise~ Figs. 2A, 2B and 2C.
Entering the flow diagram of Fig. 2A at operation 109, the lock lO i~ powered by the generator 21 of Flg. l, and the electrical energy is stored in capacitor 102~
Capacitor 102 is sometimes referred to as a super cap due to the larqe capacitance and its ability to store a charge for a long period of time.

As the lock 10 is powered by the generator 21 and the capacitor 102, the key is electrically accessed to perform a battery check in operation 110. Operation 110 is expanded in Fig. 6, to be described below.

2 ~ 7~t3'~

Thereaft~r, presence of an audit~initialization ~evice ~s determined in operation 111 prior to the mode of the lock 10 baing determined. In operation 111, a t~st is made to determine if the lock 10 has a control ~ox or S audit/initializer device of Fig. ll attached. If sot the flow branches to Fig. 8. If not, the flow is to operation 112. .

The mode of the lock 10 is determined by the condition of flag bits set within the microprocessor 100 memory.
The settin~ of the mode may be accomplished at the time of manufacture or as described later. Thus the numbe!r of keys 14 and any relation between the keys 14 is determined by the setting of fla~ bits in the memory of ~he microprocessor lO0~ This may be accomplished by the mask configuration that is employed when the m~cropxocessor 100 and its memory are manufactured or it may be accomplished ~y wrlting the appropriate flag bits into the memory of the electronic controls 48 during the lock ~0 manufacturing process~

The first mode check is made in operation 112, where it is determined whether two keys 14 are required to open the lock 10. If the answer to this determination is in the negative, then a second mode check is made at ~

operation 114 where it is determined if the lock 10 i5 2 0 7 ~ 6 ~ rtl conditioned for opening only with a senior/~u~ord.inate mode of operation. In the senior/subordinate mode of operation, a senior key must be inserted in the lock 10 and the lock 10 electrically powered. Then after the senior key has been used and validated, the lock 10 is ~onditioned to accept the subordinate key 14, as will be more fully described later.

The senior/subordinate mode of operation perm$ts one person to grant or deny access by either validating the senior key or locking out all subordinate keys. If the senior/subordinate mode is not set, then the access code contained in the key 14 is checked for validity. Th.Ls check in operation 116, Fig. ~A, determines the leg~timacy of the stored numerical code. The checking step in operation 116 is expanded for a more thorou~h understanding in Fig. 3. The subroutine illustrated ~n Fig. 3 will be explained in more detail later.

Assuming for the sake o~ the discussion, at ~his point, that the ~ccess code is valid and so determined in operation 116, the lock 10 determines from the stored information in the EEPROM 15 whether the key 14 is an inltialization key 14. If it is not such a key, the flow then branches to operation 11 2 ~ 7~

If on the other hand the key 14 is an initialization ~ey, the flow i~ to operation ~l9 where the initialization subroutine is calledO This subrou~ine will be described with reference to Fig. 9 later. The flow out of operation ll9 is to point 130.

In operation 118, the key 14 which has been determined not to be an initiali~ation key in operation ll~is ; tested to determine if the key 14 is a one-u~e, temporary, key 14 or a key 14 that is to be granted regular, continued access. If the key 14 is not a temporary key 14 as determined in operation 118, then the lock 10, in operation 126, is allowed to open by sending a signal to the lock enabling device such as the stepper motor 22 and associated par~s of the co-pending, Gerald L. Dawson, et al., patent application referred to above. The lock 10 ~s enabled in operation 126 to accept She manual input from ~he operator to cause the bolt 12 to withdraw.

The acce~s code contained in the EEPROM 15 on key 14 i~
then reinitialized, reencrypted and written into hoth the EEPROM 15 as well as the memory portion of the microprocessor 100 in operation 128. This subroutine will be further explained in con~unction with the flow diagram in Fig. 4.

2 ~

Upon the comple~ion of the reinikialization and reencryp$ion of the access code, in operation 128, the flow is to the subroutine 130 illustrated in expanded form in Fig. 5.

When the key 14 is determined to be a temporary key 14 in operation 118, the access code stored in the temporary key 14 is checked in operation 120 by reading the access code ~tored in the EEPROM 15 of the key 14 and comparing it with the code in the memory of microprocassor 10Q. If the codes compare, then the key 14 and particularly the access code stored therein are invalidated in ~peration 122~ by the storing of a code indicating that the access c~de of ~he temporary key 14 is invalid and thus denying future access to the used temporary key 14. ~his may be accomplished in ~everal ways. One such approach would bloc~ access to the memory iocation in which the access code is stored.
This will prevent the ~torage of ~he reinltialized access code and if the key 14 is use~ again, the access code resident in the ~ey EEPROM 15 wiIl find no counterpart in the lock 10 and will thus preyent the flow through the operation 126, where the lock 10 may be enabled to be opened as described above. _ _ MH9-gl-003 2~7~
~n alternative approach to invalidating the access code of ~he temporary key 14 would be to se~ a bit in the memory of ~he microprocessor 100 to indicate that the access code for tha~ key 14 may not be recognized as valid; or the -access code rewritten to the EEPROM 15 could be a code that would not under any conditions be recognized as a valid access code. Other techniques will become apparent to one of skill in the art of ; programming which will prevent the temporary ~ey 14 from being used to open the lock 10 after the temporary key 14 has been used for its intended one-time use.

When the temporary key 14 is determined not to be valid as it fails ~o contain an access code which matches the valid access code stored in the microprocessor 100 memory, in operation 120, the con~rol flow branches to operation 124. In operation 124, a determination is made as to whether the key 14 is attempting to lock the lock 10 by extendin~ the bolt 17. If the determination is that the lock 10 is open and the lock 10 i8 being locked, the flow is from operation 124 to operation 125 where the lock 10 is allowed to be locked and, thereafter, to point 130 which is the entry point to the audit subroutine of Fig. S. As is seen from the path of the control flow, even though temporary key 14 has been invalidated for further use in opening the lock 10, MH9-gl-003 ~7~

the invalid temporary key 14 may be used to lock the lock 10 and the key 14 will be iden~ified in the audit subroutine to be described later.

If the key 14 in the lock 10 is a temporary key 14 with an invalid access code and the determinat~on of the activity of the temporary key 14 is that it is other ~han lockinq the lock 1~, i.e., attempting to open the lock 10, then the lo~ic control flow is dir~ctly to point 130 for entry into the audit subroutine to re~ord the attempt to open the lock l0, as will be described later.

In order for the lock 10 to accept any key 14, the key 14 must be first initialized. This initialization is : illustrated in F~g. ~. ~he key 14 is initialized by setting the first use flag. The setting of the first use flag allows the key to communicate to the lock 10 that the key has never been used before and that there is no access code in the memory of the microprocessor 100. ~he ~etting of the first use 1ag is accomplish~d in operation 200. The flag 1s stored in the EEPROM 15 on key 14.

In order for the nature of the key 14 to be determine~, a decision in operation 202 is made as to whether this 2 ~ 8 ~

key 14 is a temporary key 14. This information may be stored in the EEPROM 15 or may be input from ~he initialization device. The inik~alization device will be described later in reference to Fig. 11. At this point, suffice it to say that ~he initialization device is a computer 270and input, such as a keyboard 272, and an interface 274 to connect to the EEPROM lS to pvwer the EEPROM lS and to read and wr`ite to the memory locations therein. The initialization is the storing of 1~ data bits in predesignated addresses in the EEPRO~ 15.
The computer 270 may also be connected to microprocessor 100 through interface 276, which may take the form o1E a key like member lnsertable into the key cylinder 18 ~o connect to the microprocessor ports therein.

In either ca~e, re~ardless of the source of the information regarding the ~emporary nature of the key 14, if the ~ey 14 is a temporary, the ~e~porary key flag ls ~et in the EEPROM 15, in operation 204. On the other hand, if the key 14 is not lntended to be a temporary key 14, the temporary flag is reset in operation 2Q6.
After either operation 204 or 206, the initialization of the key 14 is complete.

Referring now to Fig. 8, to complete the prelimin~Ey-steps necessary to condition the lock 10 to accept any 2 ~ 3','~

key 14 and particularly the temporary key 14, the lock 10 which is intended to be operated by the key 14 is conditioned by the insertion of a master conditioning key 14 which has an EEPROM 15, just as do ~he regular and temporary accass keys 14. In the EEPROM 15 of the master conditioning key 14,a code is s~ored which when read and retrieved by the microprocessor 100 of the lock 10, causes the setting of a flag in the microprocessor 100 ~o cause the microprocessor 100 ~o treat the next key 14 inserted in the lock as a new key 14, when insert d in the lock 10 in operation 210. Thereafter, when the next key 14 is inserted in operation 212, a determination is made in operation 214 as to whether the firs~ use flag is set. If the flag is set, the flow is to operation 216 where the access code of the key 14 is initialized by encrypting the serial number o~ the key 14 as stored in the EEPROM 15 throu~h two levels ~f encryption, as described later herein, with reference to Fig. ~.
~0 After the reencryp~ions of the access code and the ~torage of the reencrypted code in both the EEPROM 15 and the memory of the microprocessor 100 in operation 216 in Fig. 8, the first use flag is turned off or reset in EEPROM 15 at operation 218. Thereafter, the n~ ~ey flag set in operation 210 is reset in operation 220. At 2 0 ~

this point the new key 14 is acceptable to the lock 10 If the first use flag is not on as determined in operation 214, the flow from operation 214 is directed to operation 220, and the flow progresses from that point. After operation 220 is complete, the routine is complete and ends. This subroutine may be inserted ~nto the flow of Fig. 2A at any desired point but preferably resides between operations 110 and 111. However, this routine may be inserted at any desired point prior to operation 116.

The initialization subroutine for initializing the lock in operation 119 is illustrated .in expanded form ~n :Fig.
lS 9. When the subroutine is called in opera~ion 119, the EEPROM 15 on key 14 is read and a determination is made to ~ee if the key 14, inserted in the lock 10, is an init~alization key 14 for the senior/subordinate mode of operation. The initialization key 14 will conv~y the operational mode of the lock 10 to the lock 10 and this information will be used by the microprocessor 100 to set a flag in the appropriate memory loc~tion of the microprocessor 100 causing the microprocessor 100 to function as in a particular mode of operation, depending upon which of the mode flags are set. One of skil~F in the art of programming microprocessors will clearly 2 ~
understand how a flag set in a particular location will control in which of alternative modes the mlcroprocessor 10 0 wi 11 operate .

When the determination is made in operation 23~ that the key 14 is a senior~su}:ordinate mode initialization key 14, the senior/subordinate mode key 14 .is set in .
operation 232. If, on the other hand, ~he key 14 is not a ~enior/subordinate mode key 14, the information s$ored in the EEPROM 15 is tested to determine if the information in the EEPROM 15 is determinative of a dual or two key 14 operation in operation 234.

When the initialization key 14 is a dual mode key 14 the dual mode fla~ is set in operation 236, causing subsequent operation o~ the lock 10 to be only in response to two designated keys 14.

If he the init~aliza~ion key 14 is not a dual ~ode !cey 14, as deter~ined in operation 234, then the single Jcey mode flag is set in operation 238, permitting any one key 14 with a valld access code to open the lock.
Thereafter and af~er operation 236 or 232 the logic control flow returns to the main program in Figs. 2A, 2B
or 2C, from which this subroutine was entered. _, _ 2 ~73 ~ .~J ~
The conditioning of the lock to desired categories may be accomplished .in the same manner, setting by inserting master category initialization keys into ~he lock 10 to set flags corresponding to the appropriate categorization for the lock lOo ~owever the preferred method of categori~ation is to set the bits in the memory of the microprocessor 100 during the manufacturing process by use of masks or to set the appropriate cate~ory ~its at the time o:E assembly and ~anufactu~e of the lock lOo At this point, operation 11~ will be explained in its expanded form as shown in Fig. 3. The subroutine in Fig. 3 is entered at point 160 and the flow of the logic control is directly to operation 162 where the category code stored in the EEPROM 15 i5 read and compared with the category code of the lock 10. The category code must match that of the lock 10 or be of a hi~her ranking category. For example, a building entrance door lock may be a cate~ory 1, a departmental door lock a category 2, and an individual office door may be a category 3.
A category 2 key would be capable of opening the departmental and office door since category 2 is higher than category 3, but not the maln buildin~ door, thereby 2S limiting access to the building only to those hours during which it was open for bus$ness.

^ `` 2 ~ 3 ~3 ~

Now referring back to the operation at 112 in Fig. 2A, if the mode of the lock 10 is that of requiring two keys 14 to be read and validated, the dual key mode, the flow is to Fig. 2C where the access code is checked to determine if it ls a valid access code ln operation 116.
Operation 116, although shown here, is the same operation 116 as shown in Fig. 2A and as expanded and illustrated in Fig. 3.
If the access code is not valid, the remaining operations ~n Fig. 2C are bypassed and the flow is to operation 130.

When the access code is found to be valid in operation 116 of Fig. 2C, the flow is to operation 117 as shown in Fig. 2C. The flow of the logic from operation 117 is to either operat~on 119 or operation 144 where the First Xey flag is checked ln the memory of the microprocessor 100 to determine if one of the two keys 14 reguired to operate the lock 10 has been previously validated.
Operations 117 and 119 have been described with regard to Fig. 2A previously and operat~ons 117 and 119 are ldentical to the llke numbered op~rations in both Fig.
2A and 2C.

MH9-91_003 20~8&~ ~

Should the First Key flag not be set as determined in operation 144, then the First Key flag is set in the memory of the microprocessor 100 ~o indicate that the ~ey 14 just validated is one key 14 of the two keys--5 required to open the lock 10. ~hereafter, the fl~w isto operation 128 in Fig. 2C where the access code is re~
encrypted and stored in the EEPROM lS of the key 14 and also overwritten in the designated storage locations of the memory of the microprocessor 100. ~he access code is stored is nonvolatile memory which w.ill retain the access code even when the power to the key 14 or lock 10 is no longer sufficient to operate the electronic controls 48 of the lock 10. The details of the operation 128 have been described with regard to Fig. 2A
and are the same in Fig. 2C.

Upon the completion of the writing of the reencrypted code to the memory of the microprocessor 100, the control logic will progress to operation 130, which will be expl~ined in con~unction wi~h FigO 5.

Referring back to operation 144, if the First Xey flag is set as determined in operation 144, then the lock is conditioned to allow the lock to open and the First Key flag is reset, indicating that both keys necessary~fQr authorized access have been validated and any further MH9-91-0~3 2~7~

attempt to open the lock will require two authorized keys. From operation 146, the logic flow is to operation 128, previously described.

S Should the dual key mode not be set in operation 112 of Fig. ~A and the se~ior/subordinate mode set as determined in operation 114, then the flow is to Fig.
2B and operation 132 where the access code for the key 14 is checked performing the same steps and operations of Fig. 3 for the senior access code as stored in the memory of the microprocessor 100~ If the access code of the key 14 is determined to be the proper valid code for the senior key 14, ~hen the flow is to operations 117 and 119 or from operation 117 branching to operation 136~ Operations 117 and 119 have been prev~ously descri.bed with reference to Fig. 2A.

When the key 14 is not an initialization key 14, as determined in operation 117, the the state of the subordinate mode is determined by checking whether a subordinate mode flag is set "ON" in operation 136. If the result of operation is 136 is negative, then the subordinate mode is set OM in operation 140 and the flow progresses to operation 130. If, on the other hand, the result of the inquiry in operation 136 is affirmat~e+.
then the subordinate mode 1s turned "OFF" in operation 2 ~ 3 ~

138. This series of alternatives act to toggle on and off ~he subordinate flag depending upon its state. The toggling of the subordinate mode flag controls whether the subordinate key 14 may operate the lock 10. For example, when the senior key 14 is used and checks val id and the subordinate mode is of f, it is turned on to all~w the subordinate key 14 to unlock the lock 10.
However, if the subordinate mode is on, then the lock 10 has already been conditioned to allow the subordinate 1~ key 14 ~o unlock the lock 10; and when the senior key 14 is used, it toggles the mode to prevent the subordinate key 14 from operating the lock 10. This allows the senior key 14 to lock the lock 10 and lock out all subordinate keys 14, until such time as the senior key 14 is again used to open the lock 10.

Should the check in operation 132 be neqative, and the subordinate mode be on as determined in operation 134, this indicates th~t the senior key 14 has already been verified and that this key 14, if it contain~ a valid access code, should be permitted as a subordinate key 14 to unlock the lock 10. Accordingly, the control logic flow is directed to operation 116 in Fig. 2A where the logic controls treat the key 14 as if the operation of the lock 10 is conditioned for single key 14 opera~on-.

$ ~ ~

To expand the operation and understanding of operations 116 and 132, reference is made to Fig. 3. Operations 116 and 132 have the same steps except that the access code tested i5 selectively tested against the senlor key access code in operation 132. Entry to the subroutine is at point 160. The first operation 160 in the subroutine is to check the category code stored in the EEPROM 15 on the key 14. The category code stored in the EEPROM 15 must match the category of the lock 10, as stored in the memory portion of the microprocessor 100.
If the category of the key 14 and the lock 10 is not a match or the category code on the key 14 not have a numerical value of less than or equal to that stored ln the lock 10, then the microprocessor operations will set an invalid ~ey 1ag in the memory o~ the microprocessor 100 ln operatio~ 170 and then return ~o ~he logi~
operatlons from which the branch orig$nated, If on the other hand, the code meets the crlteria of the decision in operation 162, the flow is along the affirmative path to operation 164.

In operation 164, the class of the key code ~tored in the EEPROM lS is compared to the class code of the lock 10~ The class is a code indicative of a time block with~n which the key 14 is permitted to operate t~ lock 10. If the cl~ss of the key 14 is matched to the class 2~78~2 of the lock 10, then the operational flow is to operation 166. If on the other hand the class does not match with the lock 10, the flow is to operation 170 which has been described earlier. --In operation 166, the combination code or unique code number to open the lock 10 is compared to the stored combination code in the memory of the microproces~or 100. If the two codes do not match exactly~ he invalid key flag is set in operation 1700 Of course if the codes do match, in operation 1~6, the valid key code flag is set in the memory of the microprocessor lOO and the operational control is returned to the point in the main flow in Fi~s. 2A, 2B or 2C, from which the flow branched to operation 160.

Xeferr~ng to Figs 2A and 2C, operations 128 are identlcal in their structure and flow. Both operations 128 are presented ln expanded form in Fig. 4. Entry into the subroutine of Fig. 4 is the starting point 180 where the flow is to operation 182. In operation 182, the key identification number is accessed from the EEP~OM 15 of key 14 and the key identification number is used as the starting point or value for re-encryption of the access code for the lock 10. ~ _ ~H9-91-003 The access code is set equal to the key identification number in operation 182 and then encrypted by mathematical manipulation, such as multiplication, division~ addi~ion, subtraction or combinations thereof, 5 using a l ock uni~ue num~er such as the lock serial number, by way of example, in operation 184.

In operation 186, once this encryptîon of the key identification number has occurred, the microprocessor 1~ 100 ge~erates a random number within preset limits.
The encrypted number resulting from operation 184 is further encrypted using the random number generated in operation 186.

15 ~fter the encryption step in ~peration 188, the resulting encrypted code is camouflaged by the ~nsertion of spurlous data bits into other bit locations in multiple bytes, in operation 190. These spurious bits may be referred to as garba~e bits. The spurious bits may be inserted into the encrypted code by placing the spurious ~its into several locations in a larger number of bytes in operation 190. This makes room for the encrypted access code bits in predetermined bit locations of the bytes in operation 192. For example, an eight bit access code may be scattered two bits~into each of four bytes and the remaining six bit locations MH9-91-0~3 2 ~

of each byte filled with garbage bits.

After the twice encrypted access code is altered further by the insertion of spurious or gar~age bits into the code bytes, the code bytes are then stored across several bytes of memory in the microprocessor 100 and in the EEPROM 15 of key 14.

Since the two codes are stored from the same series of code bytes, when the encrypted access code is retrieved from the memory of the microprocessor 100 and from the EEPROM 15 on key 14, they are identical. Since identity is the quality required to unlock khe lock 10, there is no need or advantage to de-encrypt the access code. The access code is not a cumulatively used value because the reencryption of the access.code always starts over with the successful opening of the l~ck 10 with a corxect access code a~d the next access code does not depend in any way upon the prior ~ccess code.

Referring now to Fig. 10, the key 14 may include a ba~tery 17 of long life characteristic which powers a clock module ~9. This clock module 19 provides a continuously updated date and time si~nal; the date/time signal is used for purposes of the class code comparison described above.

2 ~ .S ~

An alternative to the bat-~-ry 17 and the clock module 19 residing on the key 14 is _o include the clock in the electronic controls 48 of =~e lock 10. An electrical storage devicè such as a c-~acitor of large capacitance and very slow leakage rat~, sometimes referred to as a "super cap," such as ~a~u~_c~ured and ~old by Matsushita Corporation under the des_~ation of Panasonic Gold Cap, i~ used to sustain cloc~ oceration and may ~e recharged by the operation of the lcck 10, through rotation of the generator ~1. In some en~ ronments, electrical opsrating power may be su~Qlied to the lock frum a main power source over wires OI cables.

Also stored in the EEP~3M 'S on the key 14 is a number identifying t~e key 14. n~is identification number may then be accessed for key i~entification. The key identification number ~ay ~e used, for example, in the audit subroutine illustra~d in Fig. 5. The audit ~0 subroutine collects data ~i ch may then be later unloaded to provide an auc~t trail to identify the keys that were used to unloc~ t ~e }ock 10, lock the lock 10 or unsuccessfully attem2t _o unlock the lock 10. The audit subroutlne further ~cords the accessing of the audit data. Operation _7~ n Fig. 5 collects the-~ey identification code nu~- from the EEPROM 15 of key 14 ~C~ 91-003 and stores it along with the date and time in the non-volatile memory of the mi~roprocessor 100. From the suhroutine in Fig. 5, the flow is to the restart point 173 where the main flow control is reentered so thàt-the operation of the lock.electronic controls 48 will continue, as with the use of two keys 14 or when the key 14 is invalid. The electronic controls 48 then stand ready for the inSertiQn of any key 14 and an attempt to open the lock 10 with the newly inserted key 14. This lQ collec on of data will provide the lock owner with a .
record of which keys were used and a~ what time and daf e the keys were used to attempt to operate the lock 10, whether successful or unsuccessful. This will allow the owner to determine if people opened the enclosure at times of interest to the lock owner as well as identification of keys that were used to unsucce~sfully access the enclosure.

When all the conditlons of category, class and access codes have been satisfied, and the lock 10 is conditioned for opening, as in operations 125, l~b or 146, in Figs. 2A and 2C, the access is permissive~ The opening of the lock 10 does not occur as a result of these operations, but rather, allows the operator to 2S rotate the key cylinder 18 to operate the internal mechanical elements of the lock 10.

2 ~

In a lock such as disclosed and described in Co-pending application by G. L. Dawson et al., entitled Bolt Lock Retractor Mechanism, (Docket No. MH9-91-002) filed .
, 1991, and incorporated herein by reference, the key 14 is free to rotate for p~rposes o~ generating the operational voltage required to power the lock 10 and when the lock 10 is enabled for opening, the key 14 ; is then pushed to engage the key cylinder 18 with the sector gear 28.

This drive arrangement is particularly advantageous with xespect to th0 capability of the lock electronic controls 48 to detect the voltage level of the battery lS 17 of key 14. Referring to Fig. 6, the microprocessor 100 is capable of monltoring the voltage level of the battery 17 on the key 14. When the key 14 is inserted in the lock 10, of necessity, the key 14 will make electrical contact with the input and output ports of the microprocessor 100 to allow reading the stored access code and key identification codes. In a simil~r manner, the microprocessor 100 may be placed in indirect contact with the terminals of the battery 17, through an analog to digital converter 103 of conventional design that converts the analog voltage reading into a digital signal compatible with the microprocessor 100. When the MHg-91-003 ~7~Ga ~

contact is made, the voltage sampled and determined to be less than the required voltage specified as a threshold for a low battery voltage indication in operation 200, the microprocessor 100 acts to sat a condition requiring one or more additional tuxns of the key 14 to effect the withdrawal of the bolt 12. While the bolt 12 will be normally withdrawn with no more than one complete rotation of the key 14, the operation of the~enabling driYe chain permitting bolt 12 withdrawal may be delayed until the microprocessor 100 senses at least one additlonal complete rotation of the key 14 and the key cylinder 18. Upon the completion of the additional rotations of the key 14, the enabling drive chain is then actiYated.

The failure of the lock 10 to withdraw the bolt 12 in a normal manner prompt~ the operator to turn the key 14 an additional turns. Through knowledge of the operati~n of the lock 10, the operator will then recognize that the battery voltage is low; and while still sufficient ~o operate the lock 10 for a limited number of ti~es, the battery 17 an~ key 14 are in need of replacement. Th~
alternate approach is to allow the batte~y 17 to be replaceable. The cost of the EEPROM 15 on the key 14 ~g not insignificant; and until such time as it becom~s an - insignificant cost, it may be preferable to replace only the battery 17. Batteries are a~ailable which would keep the clock 19 ~ctive for more than a year at a time.

The initialization of the lock 10 may also be accomplished by the use of an audit~initialization device, illustrated in Fig. 11. Computer 270 is provided with an input device ~72 such as a keyboard 252. This allows operator control and selection of operations and the inputting of information as needed ~o l~ contr~l the operation of the computer 270. Computer 27 50 may be a microprocessor, a personal computer or a ma.inframe. If the computer is a personal computer or a mainframe, the locks 10 would need to be connected to the computer 270 by permanent wiring links to access the microprocessor 100 in each lock 10. On the other hand, if the microprocessor version of computer 250 i8 used, it lends itself to port~bility and use on location at the lock site. Computer 270 ~s provided with an interface 276 for connection with the lock 10. In the case of a portable unit, the interface 276 may take the form of a key like member insertable into the locX 10 to make contacts with the input/output interface of the microprocessor 100, which would normally engage key 14 to permit access to the con~ents of EEPROM 15. The portable device preferably is provided with a key like termination on the end of an umbilical cord. The key 2 ~ 7 ~ ~ ~ rJ

like termination is the interface 254 to the lock 10.

The microprocessor 100 of the lock 10, in operation 111 in Fig. 2A, determines if the device in the key cylinder 18 is an audit/initialization device. Assuming an affirmative result, the subroutine in Fig. 1.2 is called and the device tested to determine if the device is legitimate for the control and operation of that lock 10 in operation 260. If the device is determined as a valid for use with that lock 10, the auclit mode of operation is tested to determine if that mode is "ON", in operation 262. Upon an affirmative determination in operation 262, the audit data stored in the microprocessor 100 memory is read and stored in the memory of the audit/initiallzation device and the flow is to the "goto audit" step in operation 130, previously described, where the audit operation will ~e recorded in the memory of the microprocessor 100.

If, on the other hand, the audlt mode is not "ON" in operation 262, the flow branches to operation 266, to determine if the device is set to initialize the lock 10. If so, the initialization routine illustrated in Fi~. 9 is called at operation 119 and, thereafter, the flow is to StPp 130.

~7~3 ~
When the determination in operation 26~ is negative,the the operation 268 to be performed is to initialize the key 14 to the lock 10 and set the appropriate category and class data in the EEPROM 15 of key 14. This may be accomplished by inserting the key 14 into a key slot/
interface 27S in the audit/~nitialization device. Then t.he category of the lock 10 may be read from the lock lO
and recorded in the EEPROM lS on the key 14. The key 14 is set then to have a compatible category code to l~ allow access to that lock 10. The slock 19 on the key 14 may likewise be set from the audit/initialization device t in an analogous manner.

~he settlng of the class may be through the keyboard 27 52 and the microprocessor 270, by entering the appropriate time/day data necessary to set the time pexiod of access.

~n alternative to the key and lock initialization would be to set the initialization data at the time of manufacture or at shipment. While an alternative, th:is would require a significant expense and time delay as, in effect, all locks would have to be custom ordered to be compatible wlth existing keys and cate~ories of locks that the lock owner would already possess. ~ _ 2 ~ 7~

While the invention has been described using the aid of flow diagrams, it will be appreciated that the preferred embodiment of the best mode for carrying out the invention is a control program controlling a S microprocessor to make the necessary decisions and perform the necessary steps, described above, to control operation of the loc~ and access to the enclosure. With the flow diagrams contained herein~ and ordinary s~ill in the art of programming, a detailed control program may be prepared for the microprocessor of choice that will perform the operations required of the invention.
It will be further appreciated that some of the operations may be placed in different order as the order of the steps may not be necessarily that order described lS herein; also the operation~ described herein may be subdivided or combined with other operations, as desired and as be t utilized by the microprocessor of choice.
The pxeferred microprocessor for ~mpl~menting the best mode of carrying out the invention is the 80C~lF by OKI Electric Industries Company, Tokyo, Japan.

It will also be understood that changes may ~e made in the implementation of the invention without departing from the scope of the invention as set forth in the claims. ~ _ MHg-91-003

Claims (16)

1. An electronic bolt lock comprising:
a bolt;
electronic controls;
internal, self contained electrical power generating means for electrically powering said electronic controls;
a key cylinder;
a key insertable into said key cylinder and comprising a data storage means for storing at least a code for accessing and opening said lock;
means connectable to said key cylinder to withdraw said bolt;
said electronic control means further comprising means for creating a new access code and encrypting said code upon each successful opertion of said lock;
means for storing said new access code in encrypted form in both said lock and said key.
2. The electronic bolt lock of claim 1 wherein said electronic controls further comprise means for determining the validity of a plurality of keys and access codes carried thereon.
3. The electronic bolt lock of claim 2 wherein said means for determining further comprises means for determining the order of validation of said plurality of mh9-91-003 said keys.
4. The electronic bolt lock of claim 1 wherein said electronic means comprises means for determining the presence of a one time use key, and means for validating said one time use key a single time and for invalidating all future use of said one time use key.
5. The electronic bolt lock of claim 1 wherein said electronic controls further comprises means for acquiring and storing data representing the identity of said keys inserted into said lock to attempt to operate said lock.
6. The electronic bolt lock of claim 5 wherein said means for acquiring and storing further comprises means for acquiring and storing data representing the time and date of the insertion of said keys.
7. The electronic bolt lock of claim 1 wherein said means for creating said new access code and encrypting said access code, performs at least two encryption steps using at least a separate and distinct number for each encryption step.
8. The electronic bolt lock of claim 1 wherein said mh9-91-003 key comprises a battery and means, responsive to electrical energy form said batter for maintaining a record of the date and time.
9. The electronic bolt lock of claim 8 wherein said lock comprises means for reading said record from said key.
10. The electronic bolt lock of claim 9 wherein said bolt lock comprises means for recording at least the date and time of use of said key, in said lock.
11. The electronic bolt lock of claim 10 where in said key further comprises data stored in said data storage means corresponding to groups of locks which said key may activate.
12. The electronic bolt lock of claim 11 wherein said lock comprises electronic controls comprising storage memory, and said storage memory contains data identifying said lock as a member of a group of locks, and said electronic controls further comprises means for comparing said data stored in said data storage means of said key with said data indentifying said lock, and permiting operation of said lock only when said data stored compares favorably to said data identifying said mh9-91-003 lock.
13. The electronic bolt lock of claim 8 wherein said electronic controls further comprise analog to digital conversion means for converting the voltage of said battery to a digital signal.
14. The electronic bolt lock of claim 13 wherein said electronic controls further comprises means for enabling said lock to open in response to rotation of said key within said lock, and means means for comparing said digital signal to a value of predetermined magnatude and means for signaling a battery low condition.
15. The electronic bolt lock of claim 14 wherein said means for signaling a battery low condition comprises means for delaying operation of said means for enabling until a predetermined condition has occurred.
16. The electronic bolt lock of claim 15 wherein said predetermined condition comprises a rotation of said key.

mh9-91-003
CA002078652A 1991-09-20 1992-09-18 Electronic bolt lock with enhanced security features Abandoned CA2078652A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/763,119 US5170431A (en) 1991-09-20 1991-09-20 Electronic bolt lock with enhanced security features
US763,119 1991-09-20

Publications (1)

Publication Number Publication Date
CA2078652A1 true CA2078652A1 (en) 1993-03-21

Family

ID=25066928

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002078652A Abandoned CA2078652A1 (en) 1991-09-20 1992-09-18 Electronic bolt lock with enhanced security features

Country Status (4)

Country Link
US (1) US5170431A (en)
EP (1) EP0533507A1 (en)
JP (1) JPH07189537A (en)
CA (1) CA2078652A1 (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE37011E1 (en) * 1993-10-20 2001-01-09 Mas-Hamilton Group, Inc. Electronic combination lock utilizing a one time use combination
CA2133057C (en) * 1993-10-20 2005-03-15 Gerald Lee Dawson Electronic combination lock utilizing a one-time use combination
GB9413532D0 (en) * 1994-07-05 1994-08-24 Systemteq Limited Electronic locks
US5709114A (en) * 1994-11-21 1998-01-20 Mas-Hamilton Group Keypad entry electronic combination lock with self-generated combination
FR2738787B1 (en) * 1995-09-20 1997-12-05 Peugeot ANTI-THEFT DEVICE, PARTICULARLY FOR VEHICLES
US5872513A (en) * 1996-04-24 1999-02-16 The Chamberlain Group, Inc. Garage door opener and wireless keypad transmitter with temporary password feature
DE19618526A1 (en) * 1996-05-08 1997-11-20 Zangenstein Elektro Lock system
JP2940517B2 (en) * 1997-05-21 1999-08-25 日本電気株式会社 Nonlinear feedback shift register circuit
EP1181424B1 (en) 1999-05-06 2004-09-29 Assa Abloy AB Key and lock device
FR2805561B1 (en) * 2000-02-28 2002-05-03 Patrick Marie Philippe Baudry ELECTRONIC DEVICE FOR USING A SINGLE-USE COMBINATION FOR UNLOCKING A SELF-CONTAINED ELECTRONIC LOCK
US6401501B1 (en) 2000-05-01 2002-06-11 Master Lock Company Lock construction
WO2002018733A1 (en) * 2000-09-01 2002-03-07 Globalock Corporation Limited Electronic device with time dependent access codes and apparatus for generating those codes
DE20100847U1 (en) * 2001-01-16 2001-04-19 Huang Tsun Thin Chip-operated electronic lock
US20030179075A1 (en) * 2002-01-24 2003-09-25 Greenman Herbert A. Property access system
GB0310411D0 (en) 2003-05-07 2003-06-11 Koninkl Philips Electronics Nv Electronic device provided with cryptographic circuit and method of establishing the same
US20050212653A1 (en) * 2004-03-24 2005-09-29 Mike Hertel Security system to provide increased security to lockable apparatuses
US20110254661A1 (en) 2005-12-23 2011-10-20 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US7737846B2 (en) * 2005-12-23 2010-06-15 Invue Security Products Inc. Security system and method for protecting merchandise
US7791893B2 (en) * 2007-03-06 2010-09-07 International Business Machines Corporation Arrangement for powering USB keys
JP5586623B2 (en) * 2008-11-20 2014-09-10 湖北盛佳▲電▼器▲設備▼有限公司 Box with electronic locking device
CA2686844A1 (en) * 2009-12-02 2011-06-02 Yosi Shachar Remote access procedure for electronic locks
WO2012134307A1 (en) * 2011-04-01 2012-10-04 Herradura Michael Nolan Benesa The universal key and electronic lock system
US11017656B2 (en) 2011-06-27 2021-05-25 Invue Security Products Inc. Programmable security system and method for protecting merchandise
GB2520880A (en) 2012-10-09 2015-06-03 Rug Doctor Llc Kiosk for renting carpet cleaning machines
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
EP3221854A4 (en) 2014-11-18 2018-08-01 InVue Security Products, Inc. Key and security device
EP3312819A1 (en) * 2016-10-20 2018-04-25 TTI (Macao Commercial Offshore) Limited Systems and methods for diagnostics to support operation of a garage door opener using asynchronous reporting of logged data
DE102016221924A1 (en) * 2016-11-09 2018-05-09 Audi Ag Method for operating a central locking device, central locking device and motor vehicle
US10154016B1 (en) * 2017-06-12 2018-12-11 Ironclad Encryption Corporation Devices for transmitting and communicating randomized data utilizing sub-channels
US11021894B1 (en) 2017-11-14 2021-06-01 Smart Armor Protected, LLC Power-activated cam lock
CN109389716A (en) * 2018-09-21 2019-02-26 深圳市二八智能家居有限公司 Realize the method and device that safety long-distance is unlocked
US10825273B2 (en) 2018-10-16 2020-11-03 Edst, Llc Smart thermostat hub
US10453287B1 (en) 2019-05-29 2019-10-22 Capital One Services, Llc Utilizing a short-range wireless communication device to provide keyless access to a safe deposit box
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
CN112805636A (en) 2019-09-13 2021-05-14 开利公司 Building access system with programmed door locks

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US1365814A (en) * 1919-08-18 1921-01-18 Int Time Recording Co Ltd Recording-lock
US3821704A (en) * 1972-03-13 1974-06-28 D Sabsay Self re keying security device with coded key
JPS5538464B2 (en) * 1973-04-16 1980-10-04
US4209782A (en) * 1976-08-05 1980-06-24 Maximilian Wachtler Method and circuit arrangement for the electronically controlled release of door, safe and function locks using electronically coded keys
CA1101513A (en) * 1976-11-08 1981-05-19 Leonard J. Genest Security system
US4148092A (en) * 1977-08-04 1979-04-03 Ricky Martin Electronic combination door lock with dead bolt sensing means
US4207555A (en) * 1978-03-03 1980-06-10 The Eastern Company Lock system
DE3225754A1 (en) * 1982-07-09 1984-01-12 Hülsbeck & Fürst GmbH & Co KG, 5620 Velbert METHOD FOR THE LOCKING EFFECTIVE INTERACTION OF A KEY-LIKE PART WITH A LOCK-LIKE PART
GB2124808B (en) * 1982-07-27 1986-06-11 Nat Res Dev Security system
US4736419A (en) * 1984-12-24 1988-04-05 American Telephone And Telegraph Company, At&T Bell Laboratories Electronic lock system
US4786900A (en) * 1985-09-30 1988-11-22 Casio Computer Co. Ltd. Electronic key apparatus
US4988987A (en) * 1985-12-30 1991-01-29 Supra Products, Inc. Keysafe system with timer/calendar features
US4914732A (en) * 1985-10-16 1990-04-03 Supra Products, Inc. Electronic key with interactive graphic user interface
US4837822A (en) * 1986-04-08 1989-06-06 Schlage Lock Company Cryptographic based electronic lock system and method of operation
JP2767816B2 (en) * 1987-10-07 1998-06-18 セイコーエプソン株式会社 Remote control transmitter / receiver

Also Published As

Publication number Publication date
JPH07189537A (en) 1995-07-28
EP0533507A1 (en) 1993-03-24
US5170431A (en) 1992-12-08

Similar Documents

Publication Publication Date Title
CA2078652A1 (en) Electronic bolt lock with enhanced security features
US4283710A (en) Security system
US4213118A (en) Combination changing system and method
US6130621A (en) Method and apparatus for inhibiting unauthorized access to or utilization of a protected device
US4972182A (en) Electronic security lock
KR100307665B1 (en) Lock and key system employing an id code
US5508691A (en) Self-contained electronic lock with changeable master and slave codes
JP4906212B2 (en) Key and lock device
JPS63575A (en) Improved keying system
HU221771B1 (en) Programmable electronic locking device, electronic key and cylinder for a safety lock
US20080246583A1 (en) Access Control System
GB2118614A (en) Method of code changing for electronic lock
CA1276039C (en) Microcomputer controlled door locking system
EP0239342A2 (en) Electronic locking systems
CN111192386A (en) Intelligent lock system and unlocking method of intelligent lock
US6380843B1 (en) Secured access checking system enabling the automatic transfer of entitlement to produce keys
US20040190756A1 (en) Biometric enabled mailbox system
EP0238361A2 (en) Electronic locking systems
AU724882B2 (en) Secured access checking system enabling the automatic disabling of stolen or lost electronic keys and/or the transfer of entitlement to produce keys
JP2560616B2 (en) Cash handling machine
JP2001342760A (en) Electronic security system using fingerprint
JPH10252327A (en) Key system with id, night safe device, and rent safe system
JPS58575A (en) Electronic lock
JPH02311680A (en) Key and key system
CN114664010A (en) Method and system for opening box without networking dynamic password authentication authorization

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued