(19)
(11) EP 0 426 387 A2

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
08.05.1991 Bulletin 1991/19

(21) Application number: 90311750.5

(22) Date of filing: 26.10.1990
(51) International Patent Classification (IPC)5E05B 49/00
(84) Designated Contracting States:
AT BE CH DE DK ES FR GB GR IT LI LU NL SE

(30) Priority: 28.10.1989 GB 8924341

(71) Applicant: PAC INTERNATIONAL LIMITED
Stockport, Cheshire, SK6 2SN (GB)

(72) Inventors:
  • Bertenshaw, Philip Hall
    Stockport, Cheshire SK6 5DX (GB)
  • Bugler, Malcolm John
    Stockport, Cheshire SK6 4DB (GB)

(74) Representative: Quest, Barry et al
Wilson, Gunn, M'Caw, 41-51 Royal Exchange, Cross Street
Manchester M2 7BD
Manchester M2 7BD (GB)


(56) References cited: : 
   
       


    (54) Security system


    (57) A security system for a door opening mechanism (1, 2) incorporates a key reader (3,4) for reading electrically coded keys. Presentation of an acceptably coded key to the key reader (3, 4) causes the door to be opened by actuation of the door opening mechanism (1, 2). The system includes a control device (5) which has a main key reader (6) which reads the codes of keys presented thereto and a memory in which key codes are stored along with an indication as to the acceptability of each code for actuating the door opening mechanism (1, 2) whereby door opening can be permitted or denied on presentation of a key to the reader (3, 4).




    Description


    [0001] This invention relates to a security system for use with electrically coded keys, said system having at least one controlled mechanism incorporating a key reader whereby the mechanism can be actuated by presentation of an appropriately coded key thereto.

    [0002] As used herein the term 'electrically coded key' is used to indicate a portable element capable of storing a code which can be read by electrical means, whether by direct electrical contact or by magnetic or inductive or other proximity detection, to give an electrical output representative of the code.

    [0003] An object of the present invention is to provide a simple yet effective system which can be readily set up for use with existing keys having predetermined codes.

    [0004] According to the invention therefore there is provided a securing system for use with electrically coded keys, said system having at least one controlled mechanism incorporating a key reader whereby the mechanism can be actuated by presentation of an acceptably coded key to said mechanism key reader, characterised in that said system also has a control device for controlling the (or each) said controlled mechanism, said control device having a main key reader for reading codes of said keys when presented thereto, and a memory device for storing said codes with reference to the acceptability thereof for actuating the (or each) mechnism as aforesaid.

    [0005] With this arrangement, the securing system can be readily set up for use with existing keys in so far as the codes of such keys can be conveniently loaded into the system by presentation to the main reader. In particular, there is no necessity to use complicated or expensive hardware to set up and operate the system, such as vdu equipment and the like. Also it is possible to achieve convenient key administration without an unduly high rate of memory write cycles whereby memory storage devices such as EEPROM devices having limited write cycle capacity can be used. EEPROM devices are desirable because they do not require battery support.

    [0006] Preferably, provision is also made for cancelling a stored code so that the pertaining key can no longer be used to actuate the (or each) mechanism, whereby it is possible for such key to be used, as desired, elsewhere.

    [0007] Preferably also, provision is made for storing additional data in conjunction with a key code, such additional data acting to identify a limitation on the acceptability of the code. Thus, for example, where there are two or more controlled mechanisms the additional data may identify a selected one (or group) of said mechanisms for which the code is acceptable. Entry of such additional data may be effected via manual controls associated with the control device.

    [0008] Further, provision may be made for security actuation of the control device before a key code can be entered into memory and this m3y be effected by presentation of a 'master' key to the main reader.

    [0009] With regard to the keys, these may take any suitable form and thus, for example, may comprise magnetic cards, or integrated circuit devices. Preferably non-contact keys are used. One example of a device containing a digital code which can be read by an inductive proximity link without physical contact is described in GB 2176327B.

    [0010] With regard to the controlled mechanism, this may comprise a door opening mechanism. However, the system may comprise any other suitable kind of mechanism used for any suitable purpose.

    [0011] The invention will now be described further by way of example only and with reference to the accompanying drawings in which:-

    Fig. 1 is a schematic diagram illustrating one kind of security system according to the invention;

    Figs. 2-7 are flow charts illustrating the various modes of operation of the system.



    [0012] The system illustrated by way of example is for use in controlling two door opening mechanisms 1, 2 whereby access of personnel to different parts of secure premises can be controlled. The system is used with a plurality of coded keys as discussed hereinafter.

    [0013] The system comprises, for each door, a suitable mechanism 1, 2 which may comprise a solenoid, whereby on closure of a switch the solenoid is operated from a power source (eg. 12v) to release a bolt or to take other action to effect or permit opening of the door. Associated with each mechanism 1, 2 is a respective reader 3, 4 for reading the above mentioned coded keys. The readers 3, 4 may be located at convenient positions on or alongside the respective doors.

    [0014] The system further comprises a centrally located control device 5 which is connected remotely to the respective readers 3, 4 and the mechanisms 1, 2. The control device 5 has a main reader 6, for reading the above mentioned keys, also two push buttons 7, 8, a two-digit (7-segment) display device 8 and two LEDs 9, 10 coloured respectively red and green. These components are exposed on the front face 11 of a housing and are connected to control circuitry within the housing. The control circuitry includes a microprocessor control device and non-volatile memory storage (e.g. EEPROM).

    [0015] As mentioned, the system is used with a plurality of coded keys which have different unique codes which can be read by the different readers 3, 4, 6. That is, on presentation of a key in predetermined physical relationship to one of the readers 3, 4, 6 the reader 3, 4 or 6 receives an electrical signal representative of the respective code, which signal is passed- to the control circuitry of the control device 5.

    [0016] The keys, and correspondingly the readers 3, 4, 6 may be of any suitable form. In one embodiment each key has an integrated circuit device storing a digital code which is read by the respective reader 3, 4 or 6 when the key is presented in predetermined proximity thereto by establishment of an inductive link between an inductive component of the reader and an inductive component of the key. An arrangement of this kind is described in GB 2176327B. Other arrangements can of course also be used.

    [0017] In summary, the system operates as follows:

    [0018] The keys are pre-prepared with different unique codes (or numbers). To set up the system, the keys are presented one by one to the main key reader 6. One or a small number of these keys are automatically designated 'master' keys and the codes of these are stored in an appropriate part of the memory. For example the first three presented keys may be designated automatically as master keys.

    [0019] As each of the other keys is presented to the main key reader 6, the digital display 8 shows the identification number of the space in the memory in which the key code is to be stored and the green LED 10 is illuminated. At the same time two decimal points on the display 8 are illuminated and each of these can be switched on or off by actuating a respective one of the press buttons 7, 8. Both buttons 7, 8 are pressed if it is desired that the key should be capable of opening both door mechanisms, and only one button is pressed if access through only one door is to be permitted. The key code is then entered by presenting one of the 'master' keys to the reader. This code is stored together with additional data identifying the access level or access points relating to the particular key as determined by the pressing of the buttons 7, 8. The procedure can be repeated until all memory storage spaces have been filled (as shown by the number on the digital display 8).

    [0020] If a key is presented which contains a code already present in memory the digital display 8 indicates the storage space identification number and the red LED 9 is illuminated. This function can be used simply to identify the storage number of the key. However, if action is taken whilst the red LED is illuminated, it is now possible to delete the code from memory, thereby voiding the key, by presenting a master key to the reader 6. Voiding can also be effected without presentation of the key by selecting the identification number on the digital display, this being possible when the display is initially blank by pressing the buttons 7, 8 to increment the digits of the display. Voiding can be used if access is to be denied to a particular key or if a key has been lost.

    [0021] Also, other control functions can be carried out using the push buttons if a master key is first presented to the reader. Thus, for example, the lock release time, the type of door release and other system data can be set, also other functions, such as copying data from one controller to another can be effected.

    [0022] After the system has been set up as mentioned above the doors can be opened by presentation of appropriate keys to the readers 3, 4. When a key is presented to one of the readers 3, 4 the code is checked for acceptability against the stored list of codes and the door is opened if the code is found and if the code is found to be stored in conjunction with additional access level data which indicates that the particular door can be opened by that particular key. The master keys can also be used to open appropriate doors.

    [0023] With the arrangement described above it will be appreciated that the same keys can be used in the same or different systems as required by appropriate programming of the control device. Thus, if a change in access is required it is not necessary to destroy existing keys - it is only necessary o change the stored acceptability data. Similarly if access by an additional key is required it is only necessary to add data relating to an existing additional key, it is not necessary to specially manufacture a new key.

    [0024] The system minimises complexity in terms of requirements for display, number of controls and level of skill required for operation of the unit.

    [0025] Simple operation of the control device's administration system is made possible by automatically selecting the appropriate operating mode (add keys, void keys or data editing) by direct automatic analysis of the events required to carry out those functions rather than a separate selection process e.g. using a menu-driven system displayed on a vdu.

    [0026] All data in the control device's memory is protected against unauthorised modification by the need for presentation of a special 'master' or 'editor' key during data editing procedures. there is no need for the presentation of security data (mechanical key switches, cards, entry of passwords) upon 'entry into' the operating system.

    [0027] Presentation of a master or editor key is used not only for security as described but as an instruction to the operating system to carry out specific functions dependent upon the analysis of current data and conditions thereby simplifying operation.

    [0028] Operation of the above described system for key administration purposes is illustrated in more detail in the accompanying flow charts Figs. 2-7 and the following description provides more detailed information in relation to ADD, DELETE, and LOCK TIME SETTING modes.

    1. ADD MODE:-

    a) Present any key not in the database - display (8) shows number to be assigned and green LED lights. Both display decimal points will illuminate, indicating access for both channels. A 15 second timeout will exit add mode if no further action is taken.

    b) Individual channel access may be modified using the push buttons. Pressing the LH button (7) will toggle access for channel 1 (3) and pressing the RH button (8) will toggle access for channel 2 (4). The display decimal points will show the access level to be applied to the key to be added, the LH illuminated for channel 1 and the RH for channel 2.

    c) Present master key to confirm add - display blanks and green LED stays lit for 2 seconds.

    d) The above procedure is known as 'SINGLE SHOT' add.

    e) If desired, 'BLOCK ADD' mode may be entered by presenting a further new key to the controller while the green LED is still lit. This will cause this key to be added to the database, together with any further keys presented. In this mode the display will show the number of the next key to be assigned before it is presented. The access level applied to further keys may be modified as in b) above prior to presenting them if required.

    f) Exit from block add is either by the 15 second timeout or by re-presenting a master key.

    2. DELETE MODE:-

    a) Key selection by two options

    1) either;
    Pressing the RH push button will light display and allow the required key number to be selected - subsequent pressing 1H button causes LH digit to increment; pressing RH button causes RH digit to increment. Selecting a number without a valid key assigned to it will cause the display to flash.

    2) or;
    Presenting a key currently in the database will cause its number to be displayed.

    b) Both of the above options will also cause the red LED to light, indicating delete mode.

    c) Delete is confirmed by presenting a master key to the controller, the display first flashing for two seconds then blanking.

    3. LOCK TIME SETTING:-

    a) Present a master key - display shows its number and the red LED lights indicating delete mode.

    b) Pressing the LH button selects a channel 1 lock time, with the green LED flashing to indicate this. Pressing the RH button selects channel 2 lock time, with the red LED flashing. Note that the first press selects the channel to be set and displays its current value. Subsequent pressing of the LH button will increment the LH digit, and the RH button the RH digit.

    c) Exit from lock time setting is by re-presenting the master key or by no button activity for 15 seconds.



    [0029] The above described arrangement has the benefits of simplified administration and minimum number of processor operations. In essence, on presentation of a key to the key administration system, by noting the existence or absence of a listed code, the system can respond by automatically entering the ADD or DELETE mode, working on the assumption that if a key is presented with no listed code the user intends that an appropriate code should be established, and if a key is presented with an acceptable listed code the user intends that the code should be deleted. This saves considerable administration time, reduces complexity and minimises operational steps.

    [0030] It is of course to be understood that the invention is not intended to be restricted to the details of the above embodiment which are described by way of example only.


    Claims

    1. A security system for use with electrically coded keys, said system having at least one controlled mechanism incorporating a key reader whereby the mechanism can be actuated by presentation of an acceptably coded key to said mechanism key reader, characterised in that said system also has a control device for controlling the (or each) said controlled mechanism, said control device having a main key reader for reading codes of said keys when presented thereto, and a memory device for storing said codes with reference to the acceptability thereof for actuating the (or each) mechanism as aforesaid.
     
    2. A security system according to claim 1 wherein said control device has a cancel mode for cancelling a stored code whereby the pertaining key can no longer be used to actuate the (or each) mechanism, said control device being arranged to be put in said cancel mode when there is presented to the main key reader coded key for which said code is present in said memory device.
     
    3. A security system according to claim 1 or 2 wherein said control device has an add mode for adding a stored code whereby the pertaining key can then be used to actuate the (or each) mechanism, said control device being arranged to be put in said add mode when 'there is presented to the main key reader an acceptably coded key for which said code is not present in said memory device.
     
    4. A security system according to any one of claims 1 to 3 wherein provision is made for storing additional data in conjunction with said key code, such additional data acting to identify a limitation on the acceptability of the code.
     
    5. A security system according to claim 4 wherein said additional data identifies a selected one (or group) of said mechanisms for which the code is acceptable.
     
    6. A security system according to claim 4 or claim 5 wherein entry of said additional data is effected via manual controls associated with the control device.
     
    7. A security system according to any one of claims 1 to 6 wherein provision is made for security actuation of the control device before a key code can be entered into memory.
     
    8. A security system according to claim 7 wherein said security actuation is effected by presentation of a 'master' key to the main reader.
     
    9. A security system according to any one of claims 1 to 8 wherein said keys comprise magnetic cards.
     
    10. A security system according to any one of claims 1 to 8 wherein said keys comprise integrated circuit devices.
     
    11. A security system according to any one of claims 1 to 8 wherein said keys are of non-contact type.
     
    12. A security system according to any one of claims 1 to 11 wherein said controlled mechanism comprises a door-opening mechanism.
     




    Drawing