[0001] This invention relates to a security system for use with electrically coded keys,
said system having at least one controlled mechanism incorporating a key reader whereby
the mechanism can be actuated by presentation of an appropriately coded key thereto.
[0002] As used herein the term 'electrically coded key' is used to indicate a portable element
capable of storing a code which can be read by electrical means, whether by direct
electrical contact or by magnetic or inductive or other proximity detection, to give
an electrical output representative of the code.
[0003] An object of the present invention is to provide a simple yet effective system which
can be readily set up for use with existing keys having predetermined codes.
[0004] According to the invention therefore there is provided a securing system for use
with electrically coded keys, said system having at least one controlled mechanism
incorporating a key reader whereby the mechanism can be actuated by presentation of
an acceptably coded key to said mechanism key reader, characterised in that said system
also has a control device for controlling the (or each) said controlled mechanism,
said control device having a main key reader for reading codes of said keys when presented
thereto, and a memory device for storing said codes with reference to the acceptability
thereof for actuating the (or each) mechnism as aforesaid.
[0005] With this arrangement, the securing system can be readily set up for use with existing
keys in so far as the codes of such keys can be conveniently loaded into the system
by presentation to the main reader. In particular, there is no necessity to use complicated
or expensive hardware to set up and operate the system, such as vdu equipment and
the like. Also it is possible to achieve convenient key administration without an
unduly high rate of memory write cycles whereby memory storage devices such as EEPROM
devices having limited write cycle capacity can be used. EEPROM devices are desirable
because they do not require battery support.
[0006] Preferably, provision is also made for cancelling a stored code so that the pertaining
key can no longer be used to actuate the (or each) mechanism, whereby it is possible
for such key to be used, as desired, elsewhere.
[0007] Preferably also, provision is made for storing additional data in conjunction with
a key code, such additional data acting to identify a limitation on the acceptability
of the code. Thus, for example, where there are two or more controlled mechanisms
the additional data may identify a selected one (or group) of said mechanisms for
which the code is acceptable. Entry of such additional data may be effected via manual
controls associated with the control device.
[0008] Further, provision may be made for security actuation of the control device before
a key code can be entered into memory and this m3y be effected by presentation of
a 'master' key to the main reader.
[0009] With regard to the keys, these may take any suitable form and thus, for example,
may comprise magnetic cards, or integrated circuit devices. Preferably non-contact
keys are used. One example of a device containing a digital code which can be read
by an inductive proximity link without physical contact is described in GB 2176327B.
[0010] With regard to the controlled mechanism, this may comprise a door opening mechanism.
However, the system may comprise any other suitable kind of mechanism used for any
suitable purpose.
[0011] The invention will now be described further by way of example only and with reference
to the accompanying drawings in which:-
Fig. 1 is a schematic diagram illustrating one kind of security system according to
the invention;
Figs. 2-7 are flow charts illustrating the various modes of operation of the system.
[0012] The system illustrated by way of example is for use in controlling two door opening
mechanisms 1, 2 whereby access of personnel to different parts of secure premises
can be controlled. The system is used with a plurality of coded keys as discussed
hereinafter.
[0013] The system comprises, for each door, a suitable mechanism 1, 2 which may comprise
a solenoid, whereby on closure of a switch the solenoid is operated from a power source
(eg. 12v) to release a bolt or to take other action to effect or permit opening of
the door. Associated with each mechanism 1, 2 is a respective reader 3, 4 for reading
the above mentioned coded keys. The readers 3, 4 may be located at convenient positions
on or alongside the respective doors.
[0014] The system further comprises a centrally located control device 5 which is connected
remotely to the respective readers 3, 4 and the mechanisms 1, 2. The control device
5 has a main reader 6, for reading the above mentioned keys, also two push buttons
7, 8, a two-digit (7-segment) display device 8 and two LEDs 9, 10 coloured respectively
red and green. These components are exposed on the front face 11 of a housing and
are connected to control circuitry within the housing. The control circuitry includes
a microprocessor control device and non-volatile memory storage (e.g. EEPROM).
[0015] As mentioned, the system is used with a plurality of coded keys which have different
unique codes which can be read by the different readers 3, 4, 6. That is, on presentation
of a key in predetermined physical relationship to one of the readers 3, 4, 6 the
reader 3, 4 or 6 receives an electrical signal representative of the respective code,
which signal is passed- to the control circuitry of the control device 5.
[0016] The keys, and correspondingly the readers 3, 4, 6 may be of any suitable form. In
one embodiment each key has an integrated circuit device storing a digital code which
is read by the respective reader 3, 4 or 6 when the key is presented in predetermined
proximity thereto by establishment of an inductive link between an inductive component
of the reader and an inductive component of the key. An arrangement of this kind is
described in GB 2176327B. Other arrangements can of course also be used.
[0017] In summary, the system operates as follows:
[0018] The keys are pre-prepared with different unique codes (or numbers). To set up the
system, the keys are presented one by one to the main key reader 6. One or a small
number of these keys are automatically designated 'master' keys and the codes of these
are stored in an appropriate part of the memory. For example the first three presented
keys may be designated automatically as master keys.
[0019] As each of the other keys is presented to the main key reader 6, the digital display
8 shows the identification number of the space in the memory in which the key code
is to be stored and the green LED 10 is illuminated. At the same time two decimal
points on the display 8 are illuminated and each of these can be switched on or off
by actuating a respective one of the press buttons 7, 8. Both buttons 7, 8 are pressed
if it is desired that the key should be capable of opening both door mechanisms, and
only one button is pressed if access through only one door is to be permitted. The
key code is then entered by presenting one of the 'master' keys to the reader. This
code is stored together with additional data identifying the access level or access
points relating to the particular key as determined by the pressing of the buttons
7, 8. The procedure can be repeated until all memory storage spaces have been filled
(as shown by the number on the digital display 8).
[0020] If a key is presented which contains a code already present in memory the digital
display 8 indicates the storage space identification number and the red LED 9 is illuminated.
This function can be used simply to identify the storage number of the key. However,
if action is taken whilst the red LED is illuminated, it is now possible to delete
the code from memory, thereby voiding the key, by presenting a master key to the reader
6. Voiding can also be effected without presentation of the key by selecting the identification
number on the digital display, this being possible when the display is initially blank
by pressing the buttons 7, 8 to increment the digits of the display. Voiding can be
used if access is to be denied to a particular key or if a key has been lost.
[0021] Also, other control functions can be carried out using the push buttons if a master
key is first presented to the reader. Thus, for example, the lock release time, the
type of door release and other system data can be set, also other functions, such
as copying data from one controller to another can be effected.
[0022] After the system has been set up as mentioned above the doors can be opened by presentation
of appropriate keys to the readers 3, 4. When a key is presented to one of the readers
3, 4 the code is checked for acceptability against the stored list of codes and the
door is opened if the code is found and if the code is found to be stored in conjunction
with additional access level data which indicates that the particular door can be
opened by that particular key. The master keys can also be used to open appropriate
doors.
[0023] With the arrangement described above it will be appreciated that the same keys can
be used in the same or different systems as required by appropriate programming of
the control device. Thus, if a change in access is required it is not necessary to
destroy existing keys - it is only necessary o change the stored acceptability data.
Similarly if access by an additional key is required it is only necessary to add data
relating to an existing additional key, it is not necessary to specially manufacture
a new key.
[0024] The system minimises complexity in terms of requirements for display, number of controls
and level of skill required for operation of the unit.
[0025] Simple operation of the control device's administration system is made possible by
automatically selecting the appropriate operating mode (add keys, void keys or data
editing) by direct automatic analysis of the events required to carry out those functions
rather than a separate selection process e.g. using a menu-driven system displayed
on a vdu.
[0026] All data in the control device's memory is protected against unauthorised modification
by the need for presentation of a special 'master' or 'editor' key during data editing
procedures. there is no need for the presentation of security data (mechanical key
switches, cards, entry of passwords) upon 'entry into' the operating system.
[0027] Presentation of a master or editor key is used not only for security as described
but as an instruction to the operating system to carry out specific functions dependent
upon the analysis of current data and conditions thereby simplifying operation.
[0028] Operation of the above described system for key administration purposes is illustrated
in more detail in the accompanying flow charts Figs. 2-7 and the following description
provides more detailed information in relation to ADD, DELETE, and LOCK TIME SETTING
modes.
1. ADD MODE:-
a) Present any key not in the database - display (8) shows number to be assigned and
green LED lights. Both display decimal points will illuminate, indicating access for
both channels. A 15 second timeout will exit add mode if no further action is taken.
b) Individual channel access may be modified using the push buttons. Pressing the
LH button (7) will toggle access for channel 1 (3) and pressing the RH button (8)
will toggle access for channel 2 (4). The display decimal points will show the access
level to be applied to the key to be added, the LH illuminated for channel 1 and the
RH for channel 2.
c) Present master key to confirm add - display blanks and green LED stays lit for
2 seconds.
d) The above procedure is known as 'SINGLE SHOT' add.
e) If desired, 'BLOCK ADD' mode may be entered by presenting a further new key to
the controller while the green LED is still lit. This will cause this key to be added
to the database, together with any further keys presented. In this mode the display
will show the number of the next key to be assigned before it is presented. The access
level applied to further keys may be modified as in b) above prior to presenting them
if required.
f) Exit from block add is either by the 15 second timeout or by re-presenting a master
key.
2. DELETE MODE:-
a) Key selection by two options
1) either;
Pressing the RH push button will light display and allow the required key number to
be selected - subsequent pressing 1H button causes LH digit to increment; pressing
RH button causes RH digit to increment. Selecting a number without a valid key assigned
to it will cause the display to flash.
2) or;
Presenting a key currently in the database will cause its number to be displayed.
b) Both of the above options will also cause the red LED to light, indicating delete
mode.
c) Delete is confirmed by presenting a master key to the controller, the display first
flashing for two seconds then blanking.
3. LOCK TIME SETTING:-
a) Present a master key - display shows its number and the red LED lights indicating
delete mode.
b) Pressing the LH button selects a channel 1 lock time, with the green LED flashing
to indicate this. Pressing the RH button selects channel 2 lock time, with the red
LED flashing. Note that the first press selects the channel to be set and displays
its current value. Subsequent pressing of the LH button will increment the LH digit,
and the RH button the RH digit.
c) Exit from lock time setting is by re-presenting the master key or by no button
activity for 15 seconds.
[0029] The above described arrangement has the benefits of simplified administration and
minimum number of processor operations. In essence, on presentation of a key to the
key administration system, by noting the existence or absence of a listed code, the
system can respond by automatically entering the ADD or DELETE mode, working on the
assumption that if a key is presented with no listed code the user intends that an
appropriate code should be established, and if a key is presented with an acceptable
listed code the user intends that the code should be deleted. This saves considerable
administration time, reduces complexity and minimises operational steps.
[0030] It is of course to be understood that the invention is not intended to be restricted
to the details of the above embodiment which are described by way of example only.
1. A security system for use with electrically coded keys, said system having at least
one controlled mechanism incorporating a key reader whereby the mechanism can be actuated
by presentation of an acceptably coded key to said mechanism key reader, characterised
in that said system also has a control device for controlling the (or each) said controlled
mechanism, said control device having a main key reader for reading codes of said
keys when presented thereto, and a memory device for storing said codes with reference
to the acceptability thereof for actuating the (or each) mechanism as aforesaid.
2. A security system according to claim 1 wherein said control device has a cancel
mode for cancelling a stored code whereby the pertaining key can no longer be used
to actuate the (or each) mechanism, said control device being arranged to be put in
said cancel mode when there is presented to the main key reader coded key for which
said code is present in said memory device.
3. A security system according to claim 1 or 2 wherein said control device has an
add mode for adding a stored code whereby the pertaining key can then be used to actuate
the (or each) mechanism, said control device being arranged to be put in said add
mode when 'there is presented to the main key reader an acceptably coded key for which
said code is not present in said memory device.
4. A security system according to any one of claims 1 to 3 wherein provision is made
for storing additional data in conjunction with said key code, such additional data
acting to identify a limitation on the acceptability of the code.
5. A security system according to claim 4 wherein said additional data identifies
a selected one (or group) of said mechanisms for which the code is acceptable.
6. A security system according to claim 4 or claim 5 wherein entry of said additional
data is effected via manual controls associated with the control device.
7. A security system according to any one of claims 1 to 6 wherein provision is made
for security actuation of the control device before a key code can be entered into
memory.
8. A security system according to claim 7 wherein said security actuation is effected
by presentation of a 'master' key to the main reader.
9. A security system according to any one of claims 1 to 8 wherein said keys comprise
magnetic cards.
10. A security system according to any one of claims 1 to 8 wherein said keys comprise
integrated circuit devices.
11. A security system according to any one of claims 1 to 8 wherein said keys are
of non-contact type.
12. A security system according to any one of claims 1 to 11 wherein said controlled
mechanism comprises a door-opening mechanism.