AU652184B2 - A system of operating a lock - Google Patents

A system of operating a lock Download PDF

Info

Publication number
AU652184B2
AU652184B2 AU85863/91A AU8586391A AU652184B2 AU 652184 B2 AU652184 B2 AU 652184B2 AU 85863/91 A AU85863/91 A AU 85863/91A AU 8586391 A AU8586391 A AU 8586391A AU 652184 B2 AU652184 B2 AU 652184B2
Authority
AU
Australia
Prior art keywords
lock
identification code
safe
operating
access codes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU85863/91A
Other versions
AU8586391A (en
Inventor
John Russell Watts
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lock Focus Pty Ltd
Original Assignee
Lock Focus Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lock Focus Pty Ltd filed Critical Lock Focus Pty Ltd
Priority to AU85863/91A priority Critical patent/AU652184B2/en
Publication of AU8586391A publication Critical patent/AU8586391A/en
Application granted granted Critical
Publication of AU652184B2 publication Critical patent/AU652184B2/en
Assigned to LOCK FOCUS PTY LTD reassignment LOCK FOCUS PTY LTD Alteration of Name(s) in Register under S187 Assignors: WATTS, JOHN RUSSELL
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Description

~Th
V
AML I 4 go 4 0 5 2 AU S TRAM A Patents Act 1990 00 *a 00 S 06 094 a COMPLETE SPECIFICATION FOR A STANDARD PATENT NAME OF APPLICANT: ACTUAL INVENTOR: JOHN RUSSELL WATTS 87 WELL STREET MIDDLE BRIGHTON, VICTORIA 3186 AUSTRAL IA JOHN RUSSELL WATTS ADDRESS FOR SERVICE: H r-AK-& (n W-..kk 601 ST. fIL-A RemAD, INVENTION TITLE: "A SYSTEM OF OPERATING A LOCK" The following statement is a full description of this invention, including the best method of performing it known to me: j i/ 2 19 0 t 4 S D111 oO 4. 4 0 4 00 9 SO(o D n d b0 9 a0 00 O o o I 06 0 0 o 6 0 0 00 94490a 0 00 4 04 09 009000 4 0 A SYSTEM OF OPERATING A LOCK The present invention relates to a system of operating a lock using identification codes. More particularly the present invention relates to a system of .operating a safe using identification codes and magnetic strip identification cards.
BACKGROUND OF THE INVENTION Various situations exist in which it is necessary to provide access to a secured location for a number of people. Conventionally, each person who requires entry to the loca' -on needs to be provided with a key to operate a lock of the secured locations. These keys can be costly to provide and are prone to loss. Furthermore, if the people who are to be given access to the secure location are constantly varying, it can be difficult to provide keys for all the people and to keep track of all the keys.
Such a situation is common with the safe or safety deposit boxes in a hotel. Many guests require use of the hotel safe or of the safety deposit boxes in order to protect valuables whilst resident in the hotel. Usually each guest is provided with a key which is able to operate -3the hotel safe in conjunction with a key from the hotel management. There may not always be sufficient keys to satisfy the demands of the guests, and guests often leave withou returning the keys to the safe. It is also not uncommon for guests to loose the keys or for the keys to be stolen.
The present invention attempts to overcome one or more of the above problems.
SUMMARY OF THE INVENTION According to the present invention there is provided a device for operating a lock comprising: 0 o an identification code reader for reading an identification code, a control means for comparing the identification 0 code with known access codes, and ,l Ioperating means for operating the lock if the Identification code matches one of the known access codes, wherein the control means is able to make the identification code into one of the known access codes if the identification code is not one of the known access 0 codes and the lock is open, thus allowing operation of the lock.
The present invention further provides a method of o operating a lock comprising: reading an identification code, o 00 .*bo comparing the identification code with known access 4 codes, if the identification code matches one of the known access codes, allowing operation of the lock, and if the identification code does not match one of the known access codes and the lock is open, then the identification may be made one of the known access codes and thus allowing operation of the lock.
It is preferred that there is further provided a grand master identification code, and if the identification i code matches the grand master identification code, a next identification code read is made a master identification code and stored such the master identification code becomes one of the known access codes.
According to another aspect of the present Invention there is provided a safe comprising: a lock for securing the safe, an identification code reader for reading an identification code, memory means for storing known access codes, control means for comparing the identification code with the known codes, and 0o O 0 e* operating means for operating the lock to lock and unlock the safe upon corresponding locking and unlocking So°0 instructions from the control means, °0 0 o o. wherein the control means, in use, instructs the operating means to lock the safe if the identification code matches one of the known access codes, and the control means instructs the operating means to lock the safe and makes the identification code one of the known access codes, if the identification code does nut match one of the 040400 known access codes and the safe is not locked.
It is preferred that there is further provided an output means and means for storing a history of the operation of the lock, wherein the history of the operation of the lock, including the date, time and the 0| 0 identification codes of previous accesses, can be displayed i 0 or printed on the output means.
I It is further preferred that the identification card is a magnetic strip card, bank card or credit card and .T the identification card reader is a magnetic strip card reader.
DESCRIPTION OF THE PREFERRED EMBODIMENT Preferred embodiments of the present invention will i- 1~ .3 I n_ 6 0c o 00 00 6 6000 o ~O 46 6 0 o~ 0 5 now be described, by way of example only, with reference to the accompanying drawings in which: Figure 1 illustrates one preferred embodiment of the present invention, Figure 2 shows a data flow diagram illustrating the inputs and outputs to the control program of the system, and Figure 3 illustrates the flow of data between the subroutines of the control program.
The preferred embodiment illustrated in Fig. 1 comprises a safe 1 having a lock 2. The lock 2 may be operated by an electric motor 3 which is under the control of a computer 4. The computer 4 is connected to a magnetic strip card reader The computer 4 comprises a central processing unit 6, memory 7 and a clock 11. During the manufacturing process a grand master code is stored in the memory 7.
During initial operation of the safe 1, a grand master card must be passed through the magnetic card reader 5. The grand master card has the grand master code stored thereon in the form of an identification code. The magnetic card reader 5 reads the identification code from the grant master card and passes it to the computer 4. The computer 4 compares the identification code read from the card with all codes known to it, which at this stage is only the grand master code stored in memory 7. If the computer 4 finds the identification code and the grand master code in memory 7 to match, then the computer is alerted that the next identification code to be read by the magnetic card reader 5 will become a master identification code which is to be stored in the memory 7 as one of the identification codes known to the computer and as a code to access the safe. In this way the safe 1 is programmed to identify the master identification card which is to used by hotel a p 06 6 *c
A
1 1 a- 6aa 1,a o a 0 0r ar oa a 00 a9 0a a a *a 41 cca 4a 04 0 00 0.C 0 management to, among other things, override operation of other cards. Note, two different grand master cards may be required to establish a new master identification card, if greater security is required. Alternatively, a number of master identification cards may be established by passing different cards through the magnetic card reader 5 after the grand master card or cards have been read. Note that the passage of a grand master invalidates any previous master identification cards. Furthermore, the grand master card cannot beused to open or close the safe, but merely indicates to the computer that there is to be a change in the master identification cards used.
During normal operation, a guest passes his own credit card, or some other identification card provided by the hotel, through the magnetic card reader 5 of an unused open safe. The magnetic card reader 5 reads an identification code from the guest's card, and compares it with the grand master code and the master code(s) in the memory 7. Finding the identification code not to match with any one of the grand master code or the master code(s), the computer stores the identification code into the memory 7 in an area which corresponds to a guest's locking code. This locking code then becomes one of the access codes which will allow access to the safe. Since the safe is open and the guest has now entered his identification code into the computer, the computer controls the electric motor 3 to lock the safe 1 using lock 2.
When the guest later wishes to access the safe, he passes his identification card through the magnetic card reader 5. The magnetic card reader 5 reads the identification code on the card and passes it to computer 4. The computer compares the identification code with the known grand master code, and the access codes comprising the master identification code and guest's locking code.
Finding the identification code to match the guest's aa a 0 a a &I aa I 401 C.t
I
7 locking code, the computer operates the lock by operating electric motor 3 to open lock 2. In order to lock the safe again, the guest simply passes his card though the magnetic card reader 5 again, as described above. If no match is found with any of the known codes, access is denied.
If a guest losses his identification card, or the system does not operate properly, the safe may be opened using the master identification card held by hotel management. The master identification card is passed through the magnetic card reader 5, which reads the magnetic identification code on the card. This code is compared with the codes in memory, and finding the OQ a O identification code to match the master identification °O~b code, the safe will open under control of the computer.
a a Note, it is possible to program the computer to require a more than one master identification card in order to open q the safe. The safe cannot be closed using the master identification card, consequently the guests card will be required to close the safe again.
At any time the master identification card(s) may be replace or reprogrammed by using the grand master card.
ooua In one embodiment of the present invention there is oo p a a °oprovided a micro-switch 9 on the magnetic card reader In normal operation the computer is at a low power mode, o o but as a card is placed within the magnetic card reader so ~the micro-switch 9 activates the computer to a full power mode level, ready for normal operation.
In another preferred embodiment of the present invention, the system is provided with a printer which is S attached to the computer, and facilities within the memory to store a history of the operation of the safe. Therefore, if a guest claims that access has been made to the safe without his permission or a record is required of the use of the safe, a computer print-out can prov:Lde details of the history of accesses made to this safe, including the times, dates and cards used to enter and close the safe.
a0 00 o st I^S 00 0 0 o 0a 0 0 0 0 00 o 00 4 00 0 0 4 t I 0 0 o 0 0 0 0 0 0a 0 4I 0 0
I,
-8- If personal credit cards are used as identification cards, it is very easy to determine the person who attempted the illegal entry.
The safe and computer may be provided with battery back-up 10 which is able to provide the system with power when the normal method of powering the system fails.
If the lock fails or the safe is maliciously damaged, the safe is provided with a drill point and a bolt withdrawal mechanism which provides overriding access to the safe. Using this mechanism destroys the electronic circuit boards of the computer so that the safe cannot be used inadvertently before proper repairs can be affected.
In another preferred embodiment of the present invention, the system is provided with a red and green LED's and a beeper under the control of the computer, the various LED's and the beeper can be used to indicate the status of the safe, such as satisfactory locking of the safe, the use of an incorrect card, insufficient power supply such as a flat battery or identification of the 'grand master or master identification card. The signals may be used in conjunction with the beeper, alternatively the beeper may also be used to act as an alarm in the situation of unauthorised access.
The computer 4 is normally held in a low power mode to conserve battery life. The computer 4 is activated to full power mode prior to being required to accept input from the magnetic card reader 5. The micro-switch 9 is depressed when a card is inserted into the magnetic card reader 5. The computer 4 is taken to full power mode when this switch 9 is activated.
The computer 4 is also activated to full power mode at regular intervals by the clock 11 so that the battery status can be assessed and so that the memory can be reset i i, in case a malfunction has occurred. Once activated to full power mode the computer 4 remains powered up for a preset time sufficient to receive codes and process the codes, control the lock 2, if required, and then power down.
The computer 4 is controlled by a number of software routines which analyse data inputs, such as codes from the magnetic card reader 5, and controls various outputs, such as the electric motor 3.
Figure 2 illustrates the flow of data inputs and outputs to and from the software of the computer 4. The "Card In Switch" input indicates that the micro-switch 9 has been depressed and the computer 4 should go to full S" power mode in order to control the system. The s "Card Data Clock" data input contains identification data read from an identification card The "Battery_Lo" signal indicates the battery voltage level, The "Wakeup_Intr" signal is produced by the clock 11 at a predetermined time. This signal will cause the computer 4 to go to full power mode to check for the "Battery_Lo" signal and to perform other housekeeping tasks at regular intervals. The "Read Time" input provides the date and time from the clock. The "Usage_Print_Request" signal indicates when a user wishes to obtain a printout from the computer 4 of the operation history of the safe, The "Usage_Print_Output" output is produced by the control program and is sent to the printer to produce a requested operation history. The "Bolt_Open Close" output Sa0 but f controls the electric motor 3 which opens and closes the lock 2. The "LED Beeper Motor via MUX" output controls the LED's and the beeper to indicate the status of the safe, as explained above.
Figure 3 illustrates the subroutines of the control software and the dataflow between the routines. The "Get Card ID" subroutine obtains the identification data "Card Data Clock" from the identification care inserted in the card reader. This subroutine produces the identification code "Card ID" of the card. The "Make_Access_Decision" subroutine outputs the "LEDBeeper_Motor_via MUX" signals to indicate the status of the safe resulting from the reading of the identification code and the "Access Decision" signal once it has determined whether a known code has been entered or a new code has been entered which may open or close the safe. The known codes are stored in the "Allowed Cards" database. Both the "Card ID" and the "Access Decision" are sent to the "TimeStampedAccessRecord" database where the event is recorded in the history together with the time from the "Read Time" signal of the clock.
The recorded history information is made available a 5°o to the "Print Format" subroutine when a o o "Usage_Print_Request" signal is received which requests a o computer printout of the history. The history is sent to the printer through output "Usage Print Output".
s° The "OpenCloseOperation" subroutine receives the "Access Decision" from the "Make Access Decision" subroutine and from this signal it knows whether the lock 2 is to opened or closed. The "Bolt OpenClose" signal is sent to the motor 3 which moves the lock 2 to its required '2 position.
,o The "Battery_Flat Handling" subroutine is executed once the "Open Close_Operation" indicates via the "Battery Status" signal that an access decision has been Smade, or when the clock takes the system to full power mode at regular intervals via the "Wakeup_Intr" signal. The "Battery_Lo" signal from the battery indicates whether the user should be warned of a low battery level by changing the "LEDBeeper_Motor via MUX" signal to the LED's and the beeper.
L "t L -I 11- I 11 It will be appreciated that features of the above invention may be varied for different applications. For instance, the security system described above may also be used to control entry to offices in office buildings, to control entry to lockers at health clubs and sports facilities, etc. It is also possible to vary the operation of the safe, such as including a shutdown card which may be used to prevent a safe or a certain card from being used.
Furthermore, the motor may be replaced by a solenoid which, when activated, permits a mechanical lever to rotate and retract the locking bolt of the lock. There may be a set time for which the solenoid remains active, after which it return to a position in which it engages the lever to oil a o prevent bolt retraction.
o 0 The foregoing description of the embodiments of the o°00 invention have been presented for purposes of illustration S only. It is not intended to be exhdustive or to limit the invention to the embodiments, and many variations and modifications will be obvious to one skilled in the art.
For example, the system may be divided with a power pack which is connected to 240 volts mains power, in which case the batteries are isolated by a solenoid switch.
Alternatively, it may be required that locking codes l 90 V contain a certain code, for example, the first three characters may have to be 999, such that only limited operation of the safe is allowed. It is also possible to a oallow the master cards to both lock and unlock the safe.
O
SOII

Claims (20)

1. A method of operating a lock, comprising: reading an identification code, comparing the identification code with known access codes, if the identification code matches one of the known access codes, allowing operation of the lock, and if the identification code does not match one of the known access codes and the lock is open, then the identification code is made one of the known access codes, thus allowing operation of the lock. o o S2. A method according to claim 1, wherein there is o, further provided a grand master identification code, and if j 0° the identification code matches the grand master identification code, a next identification code read is made a master identification code and stored so the master identification code becomes one of the known access codes.
3. A method according to claim 2, wherein if the identification code matches the stored master identification code, the lock is capable of being opened if b o the lock is closed, but the lock may not be closed if the lock is open. S 0
4. A method according to any one of the preceding 44 claims, wherein if the identification code is not one of the known access codes, the lock is not capable of being I opened if the lock is closed, but if the lock is open, then the identification code is stored as a locking code and becomes one of the known access codes. A method according to claim 4, wherein if the identification code matches the locking code, the lock is capable of being opened if the lock is closed, and the locking code is removed from the known access codes. 13
6. A method of operating a lock substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
7. A device for operating a lock, comprising: an identification code reader for reading an identification code, a control means for comparing the identification code with known access codes, and operating means for operating the lock if the identification code matches one of the known access codes, 0 C wherein the control means is able to make the o "o identification code into one of the known access codes if o the identification code is not one of the known access S0 o9 codes and the lock is open, thus allowing operation of the lock. 0 40 0@
8. A device according to claim 7, further comprising a Smster =ie~\\ca>n ooAes memory for storing grand master identification codeshand I69 known access codes. 0 4
9. A device according to Claim 7, further comprising an output means and means for storing a history of the 0 operation of the lock, wherein the history of the operation of the lock, including the date, time and the identification codes of previous accesses, can be displayed 00 o0 or printed on the output means. A device according to any one of claims 7 to 9, further comprising a battery-backup.
11. A device according to any one of claims 7 to further comprising an override means for operating the lock when any of one or more of the identification card reader, the control means, or the operating means is/are damaged or inoperable. 14
12. A device according to claimsUA wherein a history of en>ce\'- -Ae- master.ica usage is stored separately -e a E 1 1 .L i t--nS. -Lt and can be displayed or printed separately on the output means.
13. A device according to any one of claims 7 to 12, further comprising a battery for supplying power to the device and a low battery sensing means, wherein the voltage of the battery sensed and if the voltage falls below a first predetermined level, the battery is indicated as being flat by an indication means.
14. A device according to claim 13, wherein if the 0 o° voltage drops below a second predetermined level, the lock o is unlocked and cannot be relocked until the battery is replaced. 0 oi 'r 0 4 15. A device according to any one of claims 7 to 14, ,I tI S f further comprising indication means for indicating a status of the lock.
16. A device according to any one of the claims 7 to c f l 15, wherein the identification code is provided on a 0 0 magnetic strip card, a bank card or credit card and the identification code reader is a magnetic strip card reader.
17. A device for operating a lock, substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
18. A safe comprising: a lock for securing the safe, an identification code reader for reading an identification code, memory means for storing known access codes, control means for comparing the identification code with the known access codes, and operating means for operating the lock to lock and The following statement is a full description of this invention, including the best method of performing it known to me: unlock the safe upon corresponding locking and unlocking instructions from the control means, wherein the control means, in use, instructs the operating means to unlock the safe if the identification code matches one of the known access codes, and the control means instructs the operating means to lock the safe and makes the identification code one of the known access codes, if the identification code does not match one of the known access codes and the safe is not locked.
19. A safe according to claim518,.wherein the memory means also stores a qeand master code, and wherein the safe is capable of being unlocked if the identification code matches the gaftd mastercode and the safe is locked, but o the safe is not capable of being locked if the safe is oN, u.ocked. 0 r o ao 20. A safe according to claim 18 or 19, further comprising an output device and wherein the memory means is capable of storing a history of the operating of the ,lock and the history may be printed or displayed on the output device. '00 )00 0 J ag' 2 21. A safe according to claims20, wherein a history of o;ao master oe usage is stored separately n: 111 1 i +.ry e- h~e= Et=ba De-ek and can be displayed or printed separately on the output means. 0" 22. A safe according to any one of claims 18 to 21, a so: further comprising a battery for supplying power to the device and a low battery sensing means, wherein the voltage of the battery sensed and if the voltage falls below a 16 first predetermined level, the battery is indicated as being flat by an indication means.
23. A safe according to claim 22, wherein if the voltage drops below a second predetermined level, the lock is unlocked and cannot be relocked until the battery is replaced.
24. A safe according to any one of claims 20 to 23, further comprising an override means for operating the lock when any of one or more of the identification code reader, the control means, or the operating means are damaged or So" inoperable.
25. A safe according to any e of claims 18 to4g, o g further comprising indication means for indicating S e a status of the lock. I C
26. A device according to any one of the claims 19 to wherein the identification code is provided on a magnetic strip card, a bank card or credit card and the o identification code reader is a magnetic strip card reader.
27. A safe substantially as hereinbefore described with O. reference to and as illustrated in the accompanying a^ drawings. c DATED this 15th day of October, 1991. SNT rf jd44Z8 ABSTRACT The present invention relates to a method and a device for operating a lock, particularly the lock of a safe, using identification cards. Known lock operating systems required keys which are prone to loss, misuse and other disadvantages. The present invention attempts to overcome one or more of these problems by providing a method and device for operating a lock of a safe (1) under the control of a computer The computer (4) controls access to the safe by reading identification cards of users using a magnetic strip card reader The present invention has a principle use in allowing users to use their credit cards as a method of accessing a secured location. It is recommended that Figure 1 accompanies this ft Ct abstract.. C t g* I f 4 IS .t LI 5 C S a4
AU85863/91A 1990-10-15 1991-10-15 A system of operating a lock Ceased AU652184B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU85863/91A AU652184B2 (en) 1990-10-15 1991-10-15 A system of operating a lock

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPK279590 1990-10-15
AUPK2795 1990-10-15
AU85863/91A AU652184B2 (en) 1990-10-15 1991-10-15 A system of operating a lock

Publications (2)

Publication Number Publication Date
AU8586391A AU8586391A (en) 1992-04-16
AU652184B2 true AU652184B2 (en) 1994-08-18

Family

ID=25640531

Family Applications (1)

Application Number Title Priority Date Filing Date
AU85863/91A Ceased AU652184B2 (en) 1990-10-15 1991-10-15 A system of operating a lock

Country Status (1)

Country Link
AU (1) AU652184B2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU498682B2 (en) * 1975-09-26 1979-03-22 Cannon, John W. Card actuated lock
AU577335B2 (en) * 1984-05-17 1988-09-22 Leonard Joseph Genest Electronic lock
AU633106B2 (en) * 1989-06-02 1993-01-21 Tls Technologies Pty. Ltd. Security system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU498682B2 (en) * 1975-09-26 1979-03-22 Cannon, John W. Card actuated lock
AU577335B2 (en) * 1984-05-17 1988-09-22 Leonard Joseph Genest Electronic lock
AU633106B2 (en) * 1989-06-02 1993-01-21 Tls Technologies Pty. Ltd. Security system

Also Published As

Publication number Publication date
AU8586391A (en) 1992-04-16

Similar Documents

Publication Publication Date Title
CA1307574C (en) Electronic security lock
US7758428B2 (en) Method and apparatus for controlling access to areas of gaming machines
AU2002250240A1 (en) Method and apparatus for controlling access to areas of gaming machines
CA2098973A1 (en) Electroic access control mail box system
US5124696A (en) Electronic lock system
JPH092621A (en) Data management information system
AU652184B2 (en) A system of operating a lock
US4851828A (en) Electronic locking devices
JP2006099729A (en) File management system, basic storage unit, expansion storage unit and external information terminal
JP2000145219A (en) Lock management system
JPH08218689A (en) Key housing device
CA2035638C (en) Minibar system
JP2818178B2 (en) Card access control system
JP2008248651A (en) Locker equipment
JP2555476B2 (en) PIN code input type locker system
JP2002364220A (en) Door lock system and door lock operating method
TW588139B (en) Method and system for unlocking doorway
EP0246903B1 (en) A method for clearing unlocking key codes in an electronic locking device
JP2920231B2 (en) Unlocking device
JPH05342226A (en) Change reserve fund management system
JPH0781432B2 (en) Locker device
JPH089925B2 (en) Storage system
JPH02311680A (en) Key and key system
JPS63236194A (en) Locker managing system
JPH04120385A (en) Card setting method in card type locker system

Legal Events

Date Code Title Description
MK14 Patent ceased section 143(a) (annual fees not paid) or expired