CA1207868A - Card reader for security system - Google Patents

Card reader for security system

Info

Publication number
CA1207868A
CA1207868A CA000435405A CA435405A CA1207868A CA 1207868 A CA1207868 A CA 1207868A CA 000435405 A CA000435405 A CA 000435405A CA 435405 A CA435405 A CA 435405A CA 1207868 A CA1207868 A CA 1207868A
Authority
CA
Canada
Prior art keywords
data
card
central controller
card reader
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000435405A
Other languages
French (fr)
Inventor
Bhupendra J. Khandwala
Jorge A. Young
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Scott Technologies Inc
Original Assignee
Figgie International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Figgie International Inc filed Critical Figgie International Inc
Application granted granted Critical
Publication of CA1207868A publication Critical patent/CA1207868A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • G07C1/12Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures
    • G07C1/14Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures with apparatus adapted for use with individual cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

IMPROVED CARD READER FOR SECURITY SYSTEM
Abstract of the Disclosure There is disclosed herein an improved card reader for a security system utilizing a central controller and a plurality of card readers for controlling traffic through critical doors in a facility. The improved reader includes means for improving the system throughput by buffer storing large numbers of transactions all occurring within a short time for time clock functions in time and attendance applications for hourly employees. Also disclosed are means for conditioned emergency responses to sensed changes in status of alarm contacts coupled to the reader and located in the vicinity of the reader within 2 miles. There is also disclosed means for temporarily storing transaction information for transactions made during periods when communications with the controller are lost. During such degraded mode operation, access is granted to cardholders with the proper system code and their ID code and the time of the transaction are stored in a buffer. When communications are restored, the transactions saved in the buffer are sent to the controller.

Description

~37~

Background of the Invention This application relates to the field of door access security systems and, particularly, to the field of card readers for door access security systems.
Door access security systems, utilizing magnetic card readers at doors to be controlled, are known in the prior art. Such systems include central controllers coupled to a plurality of readers, each of which is located at a specific door to be controlled. Authorized persons wishing to gain access through a door~ insert magnetic cards into slots in the reader. Magnetic codings on the cards are then read and data is sent to the controller which authorizes or refuses entry and tells the reader either to keep the door locked or unlock the door.
Such a system can advantageously be used as a time clock to keep a -record- of the hours -worked by hourly employees. - ~oweve-r-t~ a problem with- system throughp~t axises when a large number o employees all try to clock in or out at the same time. The delays caused by reading ~0 of a card, waiting for a poll signal to come to the reader from the con~oller, sending the card- data to the ~ontroller and waiting for the controller to process the information and send back a "Go" or "No Go" signal can create impatience in the workers at the end of the line.
Such card reader systems can also be used to moni~or alarm contacts located at strategic locations throughout a facility. In the prior art, a centrally located alarm contact monitoring device was located near the controller with individual wires coupling ~he contact monitoring device to th~ alarm contacts located throughout the plant. Such systems were effective but re~uired an individual polling protocol and the associated hardware ~or the alasm contact monitoring device. Further, individual wires had to be str~ng between all the contacts to be monitored and the central monitoring device. This could result in large expenditures for wire. Further, 7~
-2-~uch cen~ral contact monitoring devices were yenerally not well suited to applications where only a ~ingle ~larm ~ontact needed to be mcnitored ~ince the function rarely ~ustified the expense.
The prior art ~ystems al~o had r~om for improvement in ~he area of opera~ion during times when the communication lines between the reader and the central controller were down. In such a 6i~uation, if all access was denied, pe~ple w~uld be inconveni nced ~r, worse, trapped in an 1D undesirable emergency situation. The altern~tive would be to allow free access thr~ugh ~ll doors. ~owever, with record-keepin~ functions done at the central controller, . ~here would be no ~ecord of the individusls who entered and left specific areas during specific times while the lines were downO As a result, if the~t occ~rred dùring the down time, there would be no record t~ use in the i~vestigation_ 5ummary of the Discl~sure There is disclosed herein a card reader foE use in a security ~ystem for controlling access through key doors, ~aid security ~y~tem having a central controller. The card reader -reads magnetic ~ata stored on cards held by employees, ~tc. The cards have ~ system code and an I.D~
code on them. The card re~ders can do time ~nd attendance functions to serve as a time clock by reading data stsred permanently on the card and ~ending it ~o the central controller for pro~essing~ The central controller then ~rants or denies access based on the ~ard data.
~ptionally the improvrd card re~d~r can also make the decision whether to gran~ ~r deny access l~lly without dialogue with the control~er by reading some of the data on the ~ard and ~toring.the re~t for later tran~misEion t~
the central controller. Typically, thi~ i done by reading the system ~ode ~nd granting auth~ri~ation i~ the
3~ ~ystem code on the card ~at~hes . . he ~ystem ~ode vn u--er pr~grammable ~witches~ The I~D~ c~de i~ ~hen stored in X~

~ ) the buffer with the time of day of the transaction for later transmission to the central controller. This feature increases the throughput of the system by eliminating the need for each employee to wait for authori~ation from a controller which may be delayed while processing other messages from other readers.
The improved card reader can also sense when communications with the central controller are lost and grant or deny access without consulting the controller, based upon data on the card. During times when communications with the central controller are lost, the card reader stores the I.D. data from the card, for each employee who was granted authorization, in a buffer for later transmission to the central controller.
The improved card reader can also monitor alarm contacts for changes in status and signal these changes to the central controller. The central controller can be programmed to make a conditioned response to the reader coupled to the changed contact or to any other reader in the system. The response message can cause a relay or relays in the reader to change states, thereby signalling any devices coupled to the relay or relays that an action in response to the changed alarm contact is desired.
According to one aspect the invention relates to a card reader for use in a security system having a central controller which communicates with said card reader, said card reader comprising: a memory; means for readiny data stored permanently on cards; means for evaluating data Erom the cards independent of the central controller, and for selectively permitting access to a controlled location in response to the evaluation of the data from the cards~ with the card data remaining unchanged on the cards; means for receiving signals from said central controller; means coupled to said receiving means for sensing when communication with said central controller is lost; and means responsive . ~ .

7i~68 ~3a-to said sensing means for storing said data from said reading means in said memory during times when communica-tion with said central controller is lost.
According to another aspect the invention relates to a method of operating a security system which controls access to a location and which includes a local card reader and a central controller which communicate to limit access based on card data, comprising: reading data stored on a card;
evaluating the data from the card independently from the central controller; permitting access to a controlled location in response to the evaluation of the data from the card, with the card data remaining unchanged on the card; sensing at said local card reader for inability to communicate with said central controller; storing card data at said local card reader during periods of inability to communicate, transmitting stored card data from said local card reader to said central controller when communication ~s possible~ and receiving control signals from the central controller.
According to another aspect the invention relates to a card reader for use in a security system having a central controller and a plurality of said card readers, wherein the central controller and each card reader are electrically connected so as to each define an electrical communication system, each said card reader comprising: a memory; me~ns for readingdata stored permanent~y on a card, wherein said data is organized on said card so as to define first and second data segments, means for storing data read from said cards in said memory; means for sending data from said memory to ~aid central controller at a time controlled by said electrical communication system; means for receiving signals from said central controller; means for selectively permitting access to a controlled area in response to said signals from the central controller, means for storing at least one authorization code; a local buffer; means coupled to said receiving means Eor sensing that ability to communicate with '~., t~
.
-3b-said central controller is lost; means for comparing a selected one of said first and second data segments with said authorization code; means for granting or denying access to said controlled area independent of signals from the central controller in response to said comparison of one of said first and second data segments with said authorization code, while said ability to communicate with the central controller is lost; means for storing the other of said first and second data segments in said local buffer during periods when said ability to communicate with the central controller is lost; means coupled to said receiving means for sensing that said ability to communicate with the central controller is restored; and means for transmitting the data stored in said local buffer to said central controller at a time controlled by ~said electrical communica-tion system, when said abilit~ to communicate with the central controller has been restored.
~rief Description of the Drawings _ Figure 1 is a block diagram of a security system in which the improved reader of the invention could be used.
Figure 2 is a block diagram of the improved reader.
Figure 3 is a logic diagram of the optical isolator board.
Figures 4A and B are a logic diagram of the switch and relay board.
Figures 5A and B are a circuit diagram of the RAM
buffer board and power fail detect circuit.
Figures 6A, 6B and 6C are circuit diagrams of the CPU
reader board.
Figure 7 is a logic diagram of the CCM/COM logic.

~;

~ 7~8
-4-~ igures BA and 8B are ~ l~gic diagram of the circuitry ~f the delayed transmission buffer, ~ igure 9 is a flow diagram of ~he ~eq~ence of ~teps perfonmed by the ~ard reader in performing ~ ~ime ~nd attendance function.
~ igure 10 is a flow di~gram of the steps which are taken to unl~ad the time ~nd attendance data ~r~m the buffer and transmi~ it to the central controller 20.
~ igure 11 is a flow diagram of the time ofset routine perf~rmed by the card reader.
~igure 12 is a flow diagram of the steps aken by the card reader in buffering tran~actions during a degraded mQde when communic~tion is los~ with *he central c~ntroller.
1~ ~igure 13 is a flow diagr~m of the ~anner in which the card reader CPU unloads the delayed transmission ~uff~r when communications are restored.
Figure 14 is a flow diagram of the manner in which the card reader CPU senses alarm cont cts.
Figure 1~ is a ~1GW diagram for reporting of the status ~f alarm contacts by the card reader CP~.
Figure 16 i5 a flow dîagram for the c~n~ral ~ntroller process for ~n automatic resp~nse t~ a change in an alarm cont~ct.
Detailed De~cription o~ the Preferred Emb~diment Referring ~o ~igure 1 there is disclosed a sys~em diagram o~ a typical magnetic card reading security system. ~ controller 20 is coupled to a plurality of car~
readers of which readers 22 and 24 are typical~ ~he contr~ller 20 is coupled to each reader by an enable pair and ~ data pair by which the controller can communicate with any card reader in ~he sy~tem.
For example, ~he controller 20 communicates with ~he reader 22 by an enable pair 26 and a data pair 2B~ The contr~ller 20 poll~ the reader 22 for messages and ~enas c~mmands to i~ by the enable pair 260 Data is ~en~ ~o the X
.

con~roller 20 ~rc>m the reader 22 via the dat~s pair 2B.
Serial format is. used on both lines~, The reader 22 is typically located ~t a dc~or that needs to be access-controlled while the ~ontroller 20 can be located at çome distance ~rom ~he door. ~he ~tr~c~ural details of the controller 20 are well known in the art, and it can be purchased under ~che mc>del designatic>n ~AC
530/40 from Rusco Electronic Sy~tems in Glendale, California. The object ~ode ~ftware for the controller 10 is al so well ~nown ~nd can be purchased from the ~ame source.
- -In opeFation, the reader 22 receives ~ magne~ic r~rd in a card slo~-~2~ The det~ of a ~ypical magnetic card structure will be Eound in ~.S. Patents 3,717,749 or . ~5 3,811,9770 Other structures could al~o be used; the details of the structure o~ the magne~ic card ~re not critical to the invention. Any structure oapable of holding data enccded in a card and converting it to electric~l ~ignals c3pa~le of ~eing transmitted over a line will be sa~isfactory.
When the card is ~ead, the data on the card is stored in a temporary RAM loca~ion until ~ p~lling signal ~rom ~he controller 20 arrives on ~he enable lines 26. Upon receipt o~ the polling ~ignal ~n the line 26, the data from the card is ~rans~erred on the data lines ~8 to the controller 20 unless certain options are presen~ which cause ~he reader to independently make the awthorizatiun dectsion. The c~ntroller 20 processes the data ~nd sends b~ck a "Go" or ~No Go" ~ommand which ~auses the reader 22 to take the appropriate a~ti9n. If the command is. ~Go", the re~der 22 unlocks the door lat~h via khe lines 34 and ligh~ a green LED. If the c~mmand is ~No Go~, the reader 22 lights a red LED ~nd, optionally, energi es ~ No Go relay.
The reader 22 ~an also incorporate cir~uitry to m~nit~r a plurality of ~larm conta~ts connected to the ~7~1~i8 lines 30D When ~ne ~f ~he ~ontacts ~hanges ~tate, he reader 22 ~enses the ~hange ~nd ~ignals ~he contr~ller 20 on the next poll. ~he contr~ller 29 c~n ~hen prin~ out a pre-programmed message vn a printer 36. More impsrtantly, the con~roller 20 can automatically ~end back a command to ~ause a ~witch closure by energizing ~ relay in the reader 22 or in any other reader in the systemO This automatic resp~nse can also be any other command that the reader receives normally from the con~rol7er. The rel~y can be ~onnected to an emergency de~ice via the lines 38. The emergency device can be any device ~uch dS ~n ~utomatic phone diaier, a prinkler system, an àlarm or whatever other device that is desired~
The reader 24 is ~ different type ~f improved reader ~- 15 which ~an be used to keep time rec~rds for the attendanc~
of hourly employees' ~n their jobs. The reader 24 has a display 40, a card slot 42, ~nd ~ln~ and aout~ buttons, 44 and 46~ In operation, an employee would place his card in the card slot 42 and press either the ~in" b~tt~n 44 or the "out" button 4~. The data on his card plu~ the time of day displayed in the display 40 would then ~e stored in a buffer ~n the reader ~4, Based upon the ~ystem code data on the card, the reader 24 woul~ auth~rize ~r deny entry to the employee. If ~ntry is authorized by the ~5 reader 24 and.a green LE~ will be lit, the door will be unlo~ked via the lines 48. If entry is denied, the reader 24 will ~o indicate by lightin~ a red LED ~n the ~ace plste. All a~thorization or denial d2cisions are made locally by the reader 24, ~nd the d ta reyarding each transaction is stored in the loeal ~uffer in the reade~
24.
The controller 20 i5 coupl~d to the reader 24 by an enable pair SD and a data ~aiY 52~ The controller 20 p~ he reader 24 by sendin~ ~ poll signal ~n the line SD. Upon receipt of the poll signal, the reader 24 transfer~ the dat~ for one transaction ou~ of its ~u~er X

~2~3713~3 _,_ to the ~ontr~ller 20 via the da~a li~es 52. The ~ontroller ~hen can pro~ess the data in ~ny fashi~n including printing it ~ut on the printer 36. The details of the ~tructure and oper~ti~n o~ the controller 20 are exemplified by U.S. Patents 4,216,375 and 4,218,6gO.
The re~der 24 can ~lss include means ~ offset the time displayed in the di~play 40 ~rom the time ~ept by ~he controller 20 in the case that the controller is in a different time zone from the reader. Nonmally he 10 controller 20 keeps the master time for the sy~tem ~nd the reader 24 keep its own time. Every 1~ minutes, the reader 24 inquires the time-of the c~ntroll~r 20 and synchronizes the reader' r l~cai time with the master time kept by the controller. When the reader 24 is in a di~ferent time zone from the controller ~, a group of off~et switches in the reader ~4 are set to indicate the number o~ minu~es of o~fset between She local reader time and the controller time.
The reader 22 can als~ include a local bu~fer for keepin~ a record of all transactions which ~ccur during times wher~ communications with ~he controller ~0 are lost due to cutting of the wire pairfi, p~wer Eailure or ~or o~her reasons. When the reader 2~ has-n~t received a poll from the c~ntroller for a predetermined time, the reader will start storing the data ~o~ transactions during the downtime in its local buf~er. EaEh-magnetic ~ard has a system code a~d an ID code. The sys~em code is used by the seader to determine whether or n~t t~ grant authorization for ent~y to khe individual. ~f the individual i~ penmitted to enter, ~is ID c~de ~nd ~he local time will be ~t~r~d in the ~ocal buffer. When communication~ with the controller 20 are re~t~red, the d~ta in ~he bu~fer will be sent to the controller vi~ the data lines for processing there.
3~ Referring to ~igure 2, there is $hown a bl~ck dia~ram of a card reader f~r use in ~ ~ecurity ~ystem ~uch ~s ~s ~X

78~3 shown in ~igure 1. Although in reali~y ~wo different ~ypes of readers exist~ ~he core circuits of each type of reader are ~he s~me with ~ne type ~f re~der havi~g cert~in ~dditional optional circuits which ~he o~her d~es not have. Figure 2 represents a combined functional bl~ck diagram o a reader with the ~ommon core ~ircuits and with all the optional ~ircuit elements ~f both types of readers al so present .
~he card reader ~f Fiyure 2 communic~tes with the controller 2D of Figur~ 1 through ~n is~lation board 54.
The isolation board 54 serves ~o isolate he data ~n the enable . pair 26 -and . data pair 2~ from the logic ~ircuitry sf ~he rest of the ~ard reader. ~he i~olat~on b~ard 54 passes the ~ignals ~rom ~he en~ble la~e 26 through to the 1~ ~X data lines 56 and passes the data f~om the Tx data line-c 58 through to the data lines 2R.
The RX data lines ;6 are ~oupled to a multiplexer 60 in a switch ~nd relay board 62~ The purpDse o~ the mul~iplexer GO is to sele~t various data channels ~or conne~ti~n to a data lin~ D7 r 63 ~ 9~ a bus 64 . The bus 64 is coupled be~ween the switch . ~nd relay b~ard 62 and the data, address and contr~l termin~ls of ~ microproce~soF
CPU 66 on a reader CPD b~ard 67~ Address lines ~0-A2 from the bus 64 are ~lso coupled to the mul'ciplexer 60.
Through these ~d d ress line~, ~he CPU 66 causes the mul~iplexer 60 to ~elec~ c~ne e:f ~he data channels connected t~ it for conne~io~ ~o its data ~ltpUt coupled to the line D7. The microproces~or 66 ~an then read the dat~ on the se~ ected data ~h~nnel through the .D7 line 63. ~n ~igure 2 the ~nly dat~ channel~ which are ~hc~m ~re th~ ~x data line ~6 throl~gh which commands ~nd ~lling si~nals are received and the cc~il detect line 57 which carries data read ~rcm the ~ardO Other da'ca channels are used f~r other features of the reader not relev~nt to the 3~ pre~ent di~cussic~n., ~71~
. .~ .
~9_ Data to be transmitted ~rom the ~ard r~ader ~o the central ~ontrol~er 20 are inpu~ rom the ~ line 68 ~f the data bus 64 to a driver 70. The driver 7D is ~lso coupled to the A0-A2 ~ddress lines of the data bus 64 which ~upply ~n addre~s from th microproce~sor 66. ~he driver 70 h~s several addressable output~, ~ne of which is ~he Tx data lines 58. The address ~upplied to the driver 70 causes it ~o apply the ~ignal on ~he D~ line 6B to the selected ~utput. To transmit data, the microprocessor 66 places he data to be ~ent on the D~ bus line and writes the proper address on the address lines A~-A~ of the bus 64.
~he serial data on the D0 line is hen applieB ~o the.Tx .
data lines 58.
The central controller 20 seceives ~he data on .he ~5 data line 28 and ~cts upon the ~ata mesxage in some fashion dependin~ upon what ~he message is end may or may not send ~ command back to the card re~der ~ia the enable line 26.
~ go relay 71 is coupled to a door latch device by the lines 34O The lines 34 can be couple~ to relay contaets or oth~r switching devices to provide an interruptible current f~ow path ~o control whether the door ~tch is in a locked or unlocked ~tate. The go relay is also coupled to the driver 70 by ~ switching lîne 72. The switching ~5 line. controls the state o~ ~he go relay and thereby controls the ~tate of the door latch device~ The switching line is addresssble by the ~icroprocessor 66 through the driver 70 such that the mi6ropr~cessor 6 controls the s~ate of the go rel~y 7D~
q~he microprocessor ~56 is al~o coupled ~o a ~ard read~r coil circuit 74 by the ~)U5 64. The card reaâer ~ils 74 consis~7 in the preferred embodimeAt:~ of ~ plurality of coils coupled to the address and da~ca line of the bus 64 ~nd physically arranged so as t~ individually magnetieally in~eract with a plurality ~f magneti2ed ~pot~ on a card inserted in the ~ard ~lots 112 or 32. ~he 3nicroprocessor 7~8 --1 o-- .
66 can individually eddres~ and reDd eDch coil in the card reader ~oil ~ircuit 74 to determine the data in the magnetic sp~ts on .he card. The details ~f the card reading coil ~irc~it ~re known to those ~killed in the ~rt and are not critical to the invention.
The microprocessor 66 is al~o ~oupled to an optional displ~y 40 by the bus 64. In re3ders which are beiny used for time ~nd attendance functions, i.e~, ~s time ~loc~s, it i~ desirable that the time ~f d~y be displayed externally for the benefit of workers who are lined up and ~aiting to put their cards into the reader 24 to start or end their work shift . The display 40 can be any conventional display, ~nd the det~ils of i~s construction are not eritical -to the invention.
The microprocessor 66 is also coupled to a random access memory (RAM) board 78~ ~he RAM board 78 contains a R~M buffer memory-80, a battèry-backup ~ystem comprised of a battery 82 and a power fail detect ~ircuit 84. The power ~ail detect circuit 84 m~nitors the 12 volt unregulated D.C~ voltage derived from the A.C~ power line and connects the battery 82 to the power termin~ls of the RAM bu~fer 80 when the ~ n~ p~wer fails 90 ~ to preserve the data stored in the RAM 80. The ~A~ ~0 is ~elected by the microprocessor ~6 throu~h connecti~n of a ~5 decoder 86 to .the address and con~rol lines of the bus 64~ When the microprocessor 66 wishes to write a wora in the RAM ~0, the microprocess~r generates ~he proper ~ddress to selec~ the RAM 80 and pla~es ~t on the bus 64 thereby enablin~ the R~M ~0 through the decoder 86. The d~ta to be written int~ the ~AM 80 is ~hen placed on the data lines o~ the bus 64.
A delayed transmission buffer 88 is also ~oupled ~
~he micropr~cessor 66 through tbe bus 64. The purp~se ~f the dela~ed transmissi~n buffer ~B is to st~re d~ta read from the magnetic cards during times wh~n co~muni~ation with th~ central ~ontroller 20 are l~st.
X

~7868 A CCM/COM board 90 i~ ~lso ~ouple~ to the microprocessor G6 by the bus 64~ ~he puFpose of the : CC~/C~M board 90 i6 to monitor the condition ~f ~n alarm device or deviees external to the ~ard reader and ~o gener~te data indic~ting ~he conditiDn of the alarm devices for tgansmission to the central ~ontroller. The CCM/COM board g0 also can receive d~ta from the central ~ontr~ller which oauses a ~wi~ch closure on ~he CCM/COM
board. This swi~ch is couple~ ~o an emergen~y device by the line~ 3B. The alarm cont~cts ~re ~oupled to the CCM/COM board 90 by the lin~s 30.
When the card reader. is being used.for a ~ime ~nd ; attendance ~un~tion, the ~n ~nd Out buttons 44 and 4~ are used to tell the oard reader whether the cardholder wishes to enter or leave an area. The ~n an~ Out bu~cns 44 and 46 are coupled to the MUX 60 in the witch and relay board 62 by the llne 92.
~ red ~nd ~ ~reen indicator LED, represented by bl~cX
97 are each coupled to the MUX 60 by the bu~ 96. The LED'~ are used by the microprocessor 6~ to signal whether authoriza ion has been granted or denied.
The micr~processor 66 is c~upled to a feature memory 98 and to a program memory l on by the bus 64. The progrs~
memory lG0 stores the instructions for the microprocessor 25 66 and the feature memory 98 ~ores data indi~ating whi~h options are in effect ~or the mioroprocessor 66.
Referring to Figure 3, ~here ls sh~wn a circuit diagram $or the iso~ation ~oard ~4 in ~igure ~. The data lines 28 are coupled to the cGllector and emitter of a tr~n~i~tor 1~6 in the optical isolator ~02. The light emitting di~de 108 ~f the optical isolator ~02 is coupled acros6 the TX data lines 58. When ~he curren~ is~flowing in the TX data lines 58, the LED 108 i~ energized ~nd ~mit~ light ~ausing the transi~tor ~D6 to a~sume one ~f it~ two ~wi~hing states. Th OppQSite ~ate is as~umed when the ~ED 10~ i~ de-energized~
`

7~6 ~2-.The en~ble lines 26 ~re ~oupled thr~ugh ~ n~i e ~uppression ~ircuit 110 to the LED 112 of ~n cptical ~ or 116. The transi~t~r 114 of the opti~al ~lator ha~ its o~lle~tor ~nd emitter ~oupled to the XX data lines ~6. In the preferred cmb~diment, the ~pti~al isolator 116 is ~ MQ~san~o ~MC~2. Tbe ~ptical i~la~or 1D2 is a ~5Dnsanto*4N33 .
The details ~f the cir~uit of ~he swi~h ~nd relay b~ard 62 are given in Figures 4 A ~nd B whi~h ~re ~ l~gic ~o ~iagram vf that b~ard. The ~X da~a line 56 is ~upled o ~he data input D1 of the mul~iplexer -60~. A resistor 5~
couple~ a ~5 v~lt ~upply t~ the line S6 ~o p~sitively . cl~mp it ~t ~ logi~ 1 level except where the tr~nsist~r 114 on the i~la~i~n b~ard.cl~mps the line 56 to ground p~tenti~l. The other dat~ inputs of the.multiplexer 60A
~re coupled to other dat~ channels. ~or ex~mple ~he eard reader coil circuit 74 is o~upled ~o the D~ input of the multiplexer 60A by a line 57. ~he coil detect ~ignal line 57 carries She data from eAch ~al in the card reader coil circui~ 74 ~s it is ~ddressed by the microprocessor S6.
The out switch 46 and the in ~wit~h 44 ~re coupled to the D2 and D3 inputs respectively ~ the lines ~1~ and 120.
The address inputs 12 of the multipl~xer 60A ~re co~pled to thè ~0-2 ~d~re~s lines of the bus 64. The 2~ output 63 of the multi~lexe~ 6DA i~ cvupled tQ the D7 d~ a line of the bus 64. The microprocess~r 6~ contr~ls which of the data inputs are coupled to th2 data output fi3 by the ~ddress it ~pplies ~n the addres~ line~ 122.~ The chip ~e~ect input 126 is coupled t~ the sddres5 lines an 30 . th~ bus ~4 of the ~icroproce~sor 66 through ~ decoder ~n the reader CPU b~ard to ~e di~ussed m~re fully bel~w.
The micropr~cessor 66 cAn en~ble the ~ultipl~x~r 60A by wri~ the proper a~dress on the ~ddre~ line~ d~ivinQ
the ~ecoder ~upled tQ the li~e 126 ~not ~h~wn).
multiplexer 60B has ~ts ~ta outpu~ ~suple~ to the V7 data line 63. The data inputs ~f the ~ultiplexer 6~B
Trademark ~

~L2~8~
-~3-are coupled ~o various dat~ ~h~nnels~ The X~ data ~nput i coupled by the llne 128 ~o a ~t~mper~ ~witch (not ~how~). The tamper swi~ch i5 physically ~itu~ed ~ AS to ch~nge ~tates when the f~ceplate o~ the ~ard re~der is removed ca~sing an al~rm message ~o be tran~mi~ed to the ntroller 20. The Xl data inpu~ is coupled to a ~card in" ~witch (n~t ~hown). The ~c~rd ina ~witch is ~ituated ~ as to change states when ~ card is inserted in the card slo~. By periodic~lly ~hecking the condi~ion of these two swi~ches, ~he micr~processor 66 can tell whether tampering is ~ccurring or whether there is a card to be read in the c rd 510t. - . `
~ here are three gro~ps of eight switches ~n the swit~h and relay board 62. A time 4ffse~ group of switches 136 1~ is c~mprised of 8 ~witches 136~-B which are used ~o set a binary number representing the number o~ minu~es of ~ime ofset at the lo~al ~ard read2r. ~n those ~se~ where the local card reader is in a different time zone than the central controller 20, th~ ~wit~hes 136 are ~et f~r the number of minu~es ~y whi~h the lo~al ~ime ~ the ~ar~
reader differs from the time at the central ~ontr~ller.
A second group o~ switches 138 has several ~rposes.
The switches 138A-D are u~ed to set ~he am~un~ of cime tha~ the unlocX signal on the lines 34 ~o the d~ox la~ch device cau~es the door latch t~ remai~ unlo~ked. The switches 138A-D also determine ~he ~ime ~f energizati~n of a No ~o relay 166 and ~he time ~he red and green LEDs (no~
shown) in the bl~c~ 9? in Fig~re 2 ~re energized during certain times in the operation. The ~wit~h ~3~E is used to signal whether a 12 hour or 24 hour time display format i~ desired. The switch 73BF is used to enable and disable the bu~fer RAM B0 as an vption. ~he switche~ 138G and are not used.
The ~wit~hes 140 are used ~y the ~ustomer to 8et the 3~ ystem ~ode. The system code is ~ne of tb~ items ~f data whi~h is ~agnetically ~tored ~n each cardholder~ eardO

. .

~2~ o ~

When the ca~d r~ader makes the ~uthorization decision locally with~ut consultiny the central contr~ller 20, it i the system c~de stored on the ~witches 14DA-~ whi~h is compared to the system c~de ~n ~he cardh~lder'~ ~ard to determine i~ ~u~horization will be granted.
The ~witches 136, 138 and 140 ~re individu~lly addressable by the microprocessor 66 through the multiplexers 60A and 60B and ~ decoder 1~0~ The dec~der 140 has addres~ inputs 142 ~oupled to ~he address lines in ~he bus 64. The address supplied on ~he lines 142 is convert2d an the ~CD to decimal decoder 140 to a l~gic 2ero ~ignal.sn on2 ~ the ~utput lines ~-6 which comprise bus-144, Each o lines in the bus 144 is..coupled t~ one terminal of a plurality of switches in the ~wit~h groupfi 136, 133 and 140. When the group address appe~rs on the address lines 142, one ~f the outputs in the bus 144 goes l~w thereby a~tivating ~hat group. The o~her terminal o ea~h swit~h is coupled to the cathode of a di~de wbieh has i~s anode coupled to one of the XD-X3 input~ of the multiplexer 60B via the lines 132, 134, 130, ~8, 146 or 148. All o~ the XD-X3 input~ are ~l-sc ouple~ to volt ~upply through the resi6tors 150, 1~2, 154 ~nd 156.
The X0-X3 inputs wil} be held in ~ lo~ic one condi~ion ~xcept if ~he line c~uplin~ ~ha~ input is ~lso ~oupled to ~ ~roup o~ switches o~ which one has been en~bled by a logic zero ~rom the decoder 140 and the switch is clo~edO
The groups of swi~ches ~oupled t~ the X~-X3 i~puts of ~he multiplexer 60B interse ~ with tbe groups c~nnected ~ he bus 144 ~u~h that for any part icul ar output of the decoder 1~0 whi~h h~s been enableA, and ~or any ~arti~ular input of the multiplexer 60B which h s been enabled~ ~nly one swi~ch is couple~ to b~th en b ed lines. Thus th~
~icroprocessor 66 c~n individually read ea~h swig~h in the groups 136, 138 and 140 by ~h~nging the ~ddress ~ignal on 3~ the addresc lines of the bus 64, The multiplexer 60B has its inhibit line grounded by the line 158 and its disable input held high by connection through a resistor 160 to a t5 volt supply. The disable input is pulled low to take the D7 output out of the high impedance state when the signal CSSW is true on the line 162. The line 162 is coupled to a decoder on the reader CPU board 67 which is coupled to address and control lines of the microprocessor 66 in the bus 64.
~ata to be transmitted to the microprocesser 66 is placed on the Tx data line 58 by a driver 70. The driver 70 also has several other outputs. For example t the output line 164 can be connected to an optional No Go relay 166c When the line 164 is grounded by the driver 70, a ~5 volt supply coupled to the other terminal of the 1~ coil of the No Go relay 166 causes current to flow through the relay coil, thereby energizing it and causing the electrical conditions on the lines 168 coupled to the relay contacts to change.
In the preferred embodiment, the decoder 140 is a 74145 type TTL decoder such as made by Signetics, the MUX
60A is a 74LS 251 type multiplexer such as is made by Texas Instruments, the MUX 60B is a MC14512, (CMOS type decoder such as is made by Motorola, and the driver 70 is an NE590 type amp driver such as made by Signetics.
An output line 96 from the driver 70 is coupled to the GO LED (not shown) to energize it when authorization to access has been granted~ An output line 72 from the driver 70 is coupled to a terminal of the coil of a GO
Relay 71. When the driver 70 ~rounds the line 72, a ~5 volt supply coupled to the other terminal of the relay coil energizes the coil, causing the relay contacts to change the condition on the lines 34 coupled to the door locking device.
The driver 70 has a data input, the D0 data bit on the iine Ç8, and it has address inputs on the lines 172. The address inputs 172 are coupled to the microprocessor 66 by .

~2~7~6~

the bus 64. The address at these inputs determines which of the outputs of the driver 70 will be coupled to the data input 68. The microprocessor 66 can thus write a logic 0 or 1 to any of the outputs of the driver 70 by controlling the address on the lines 172 and the data on the data input line 68 which is coupled to data bit zero of the bus 64. The chip enable and clear inputs are coupled to decoder 250 of Figure 6C and a gate 282 in Figure 6B by the signal lines CSOUT and RST.
10Referring to Figure 5, there is shown a ci.rcuit diagram of the RAM buffer and power fail detect board.
The RAM buffer 80 has address lines 174 which are coupled to the address lines of the microprocessor 66 in the bus 64. Data inputs and outputs 176 are also coupled to the microprocessor 66 data lines in the bus 64. A write enable line 178 is coupled to a control line in the bus 64 from the microprocPssor -66 to control whether the RAM
buffer 80 is reading or writing data through the data lines 176 to the address specified on the lines 174.
~0A chip select line 180 is coupled to a decoder 86.
The decoder 86 has a VMA signal inp~t line 184 coupling one input of a NOR gate 182 to a ~MA control line of the microprocessor 66 in Figure 6B. The VMA signal is true when there is a valid memory address on the address lines ~5174. Because the other input to the NOR gate 182 is grounded, the NOR gate 182 serves as an inverter with the output on the line 186 false when a valid memory address is present on the address lines 174~ The resistor 188 couples a positive voltage supply to the VMA inp~t of the gate 182 to hold it at logic one except when VMA is false. The VMA signal on the line 184 is a control signal from the CPU 66 which indicat~s when a valid memory address exists on the address lines of the CPU. A NOR
gate 190 has one input coupled to the output of the NOR
gate 182 and the other input coupled to a CSRAM~ signal from a decoder 248 in Figure 6C. The CPU 66 786~

can cause CSRAM~ to be true, i.e., logic zero, and can assert VMA on the line 184. This causes two logic 0's at the inputs of the NOR gate 190 and a logic l appears on the line 1~4. This logic 1 is inverted in a NOR gate 196 and appears as a logic 0 on the line 198.
A NOR gate 200 serves to gate a power fail detect signal on a line ~02 from a power fail detector 84 through to the chip select input at pin t8 of the RAM buffer 80 if power fails. When power has not failed, however, the signal on the line 198 controls whether the RAM 80 is selected or deselected~ Normally, the signal from the power fail detector 84 on a line 20 is a logic 0 indicating no power failure. When the signal on the line 1~8 is a logic 0, the RAM 80 is selected because the signal on the line 204 is a logic 1 which is inverted by a NOR gate to assert the CS signal on the line 180 at logic zero thereby enabling the RAM buffer 80 to read and write data.
A RST signal on a line 208 comes from a reset circuit on the reader CPU board which will be described below.
The RST signal is a logic 0 at power up but becomes logic 1 1.2 seconds later as will be explained in connection with Figure 6B. A NOR gate 210 inverts ~his signal such that its output line 212 which is coupled to one input of a NOR gate 214 is normally low after power has been on for 1~2 seconds~
The NOR gate 214 has its other inp~t coupled to the output of a comparator 222 in the power fail detect circuit 84~ The comparator 222 has its inverting input 224 coupled to a voltage reference of approximately .5.3 volts when the power has not failed. The line 224 is held at this reference level by the voltage divider effect of the resistors 228 and 226 which couple a ~12 volt D.C.
supply of line power to ground.
The non-inverting input 230 of the comparator 222 is coupled to a 3.6 volt reference so~rce derived from ~78~31 ba~tery power. This reference voltage i~ generAted by a resistor 232 which coup~es ~ battery 82 (not ~hown) to ground thr~ugh a zener diode 234. ~he zener has a 3.6 v~lt breakdown v~ltage, ~nd has its cathode coupled to the S line 230. The comparatDr 222 ha-~ ~ resis~or 236 coupled between the output ~nd its non-inverting input to provide positive feedback. The ~utput ~n ~he line 216 will be a logi~ 0 ~s long as the power has not fail2d~ When the power fails, the battery referen~e ~n the line 230 exceeds the voltage on the line 224, ~nd the output ~n ~he lane 216 rises t~ a logic 1 level indicating power has failed.
The-logic 1 on the.line 216 with t~e ~ogic z~r~.on the -line 212 causes the N~ gate 214 to lower ~tS- ~utput on the line 218 to a logic zero. This 0 ~n the line 21B is inverted to a 1 on the line ~02 by the N~R g~te 220 wbich causes the output of the gate 200 to change to ~ 0, thereby deselecting ~he ~ffer 80 if it was in a selected conditionO When the RAM ~uffer ~0 is deselected, no data may be written into ~r read out ~ the bu~er. The power input 238 o~ the ~AM buffer 80 will be cuupled through any known switching mechanism ~40 to the battery ~2 (not shown) via a line 242 upon power failure~
Referring to Fisures SA, 6B, and 6C, there is shown a circuit diagram of the reader CP~ board. The microprocessor S6 is coupled ~o ~ feature memory 98 by ~at~ lines 240 and address lines 242. The feature memory ~ontains data regarding whi~h options are incorporated into the card reader. The ~icroproces~or ~6 is also ~oupled to a program memory 100 by the data lines 240 and the ~0-~ address lines 2~2, The enable inputs of the mem~ries 100 and 98 are coupled via the lines 244 and 246 to the microprocessor's address lines 242 thr~gh decoders 248 and 250, respectively~ in ~igure 6C. A cl~ck 252 genera e~ timing ~ignals for he IRQ an~ N~ pu~s on the lines 254 and 256, respectively. The detail~ of the construction and operation of the clo~k ~nd of the featurP
`f J~

-t~-and program memories will be ~ppreciated by ~hose ~killed in the art. Any ~echanism which generates signals periodically vn the lines 254 ~nd 25~ will ~uffice for purp~ses ~L the inventi~n.
The microprocessor 66 exe~utes the instru~tions which are ~tored in ~he pro~ram mem~ry 100. Within the pr~gram, which will be described ~elow, there are certain ~ubroutines which ae~ompli~h various b~usekeeping routines. The IRQ ~nd NMI inp~ts on the lines 254 and 256 cau~e vectoring to certain of th2~e subroutines. For ~xample, the IRQ line 254, when ~serted ~rue, will cause the program ~ontrol of the micropro~essor 66 to be vectored ~ a routine which reads all the Ewitche~
described herein.
When the NMI line 256 is asserted true 9 the micropr~cessor 66 i~ vectored to ~ tr~nsmit routine which transmits data to the ~entr~l controller 20 via ~he Tx data lines 58 and data lines 28.
Th microprocessor 66 must be rese~ to the beginning of the program upon the initial application of power to the circuitO A p~wer ~n reset circuit 254 accomplishe~
this purp~se. A comparator 2~6 has its non inverting input 258 coupled ~o a reference voltage de~ined by a resi~tive voltage divider compri~ed of the resi~tors 262 2~ and 264 c~upling the power ~upply to ground. The inverting input 260 .is coupled to one terminal of a capacitor in an RC ~ircuit comprised o~ ~a re~istor 266 and a capa~itor 268. When the power is first turned on~ the capacitor 268 ac~s as ~n initial short ~o ground and the volt~ge on th~ line i58 will exceed the volt~ge on the line 260~ and the output of the ~mparator 256 on the li~e 70 will be a l~gic 1. The line 270 is couplea to the input of a N~ e 272 whi~h acts as ~n inverter. The resi~t~rs 274 and 276 serve ~s a voltage divider to hold 3~ the li~e 270 in ~ logic 1 condition except when the comparator 256 asserts the line 270 low.
.X ' ~Z~

The logic 1 at power up on the line 270 i5 inverted ~nce in the NOR gate 272 ~nd ~gain in ~ N~R g~te 278 to become the PONCLR signal on the line 2B0.
As the voltagP on the capacitor 26R rises, it exceeds the volt~ge on the line 25a a~ a time determined by the values of the resis~or 26~ and ~he cDpacitor 268. When this happens, ~he 1 on the GUtpUt line 270 changes to a 9 and line 280 ~ollows suit. ~he initial 1 on ~he line 280 is communicated ~o the rese~ line ?84 of the CPU 66 as.a a 1~ by passage through a ~R gate 2B2. The other input to the N~R gate 282 is a line 286 from a deadman reset circuit 288. The:line 286 ~s normally ~ logic 0 except ~hen there is a problem, as ~ill be described below. With the line 2B6 normally logic 0, the ini ial logic 1 on the line 2R0 ~5 is inverted by the N~R g~te 2B2 ~nd resets the microprocessor 66 to the beginnin~ ~ddress of the program. Thereafter, the line 2B0 goes to ~ logic 0 and ~ays ~here.
The deadman reset circui~ 2B8 serves to reset the 29 microprocessor 66 in c~se tkere is a so~tware pro~lem.
Normally, the deadman reset circuit 288 will attempt t~
reset the micropr~cessor 66 periodically unlefis tbe software gives a trigger ~ignal nD/M Srigger" cn the line ~90. Thus if for ~ome reason the siynal Df~ trigger doeg not ~ccur, prosram contr~l is l~st; and the deadm~n reset circuit will cause the program counter t~ be reset to the beginning program location, The manner in which the deadman reset function is accompli~h~d is through the u~e o~ two retrigserable ~bnost~ble multi-vibr~tors 292 and 294. The one shot 292 h~s its ~ and ~lear (RD2) inputs coupled to a ~5 v~lt ~urce throu~h a resistor 2g6 and are therefoxe ~lways ~n a logic 1 ~tate. ~he 0 output on the line 298 is no~mally low until a nega~ive ~ransition occurs on the D/M trigger line 290, ~t which time the 0.output line 298 go2s to a logic 1 s~ate for ~ ti~e determined by the values of the J~

~C37~6~

resistor 300 and the c~pacitor 302 coupled to the external RC ~ircuit terminals. H~wever,the pul~e time e~tablished by the resist~rs 300 ~nd 302 is l~nger than the peri~d ~f ~he D/M trigger ~ignal. Th~s, the output line 298 will n~t return to zer~ after the ~ni~ial trigger pulse because ~he D/M trigger signal on the line 90 continues retrigger the ~ne ~hot 292.
The si~nals on the lines 298 and 2BO are c~upled to the input~ of a NOR gate 304. The output line 30S of the N~R gate 3D4 is coupled ~ the clear input o~ ~he one shot 294. The B islput of the ~ne Ehot 294 is held in a l~gic 1 c~ndition by connecti.on to a ~5 volt ~upply thro~gh the resist~r 296. The A input of the one-Ehot 294 i~ coupled by a line 30B to the clock 252 and ~arrie~ ~ 600 hertz cl4ck ~ignal.
After the ini~ial power up period, th~ gate 304 will h~ve a logic O ~t the inp~t c~upled to the line 280 and a logic 1 at the line 298 input unless the D/M trigger sign~l on the line 290 does n~t occur. The output line 306 will remain in a logic 0 state at all times which causes the ~ne sho.t 294 tc ign~re ~11 signals Bt the A and 13 inputs. ~3oweYer, if the D/M ~rigger signal on the line 290 fails to occur on ~chedule, indic~ting ~ome problem with the program execution, the one shot 29~ will time out 2~ and enable the one ~hot 294~ The ~lock signal on the line 308 will then trigger the one sho.t 294 causing a logic O
to 1 transition on the line 2B60 Thi5 causes the line 284 to drop fr~m logic 1 ~o O and reset~ the microprocessor 66.
Referring ~o Figure 6C, there is ~hown a l~gic diagram of the decoder eircuitry whi~h form~ part of he deco'der 86 in Figure 2. The dec~der ehip 248 has its select inputs coupled t~ the AI2-AI~ }ines of the addre~s bus 42 of ~he micr~pr~ce~r 66. The G1 enable input 3~0 is c~upled ~o the ~2 vut~u from the microprocess~r 66 which i~ the ~lo~k signal for the re~t of the sy5te~. ~he G2A
:X .
. . .

~2~7~36~

enable input low by virtue ~f being couple~ ~o a logic 1 through ~ resistor 312 and 2n inverter 374. The g2B input is c~upled to the power on clear sign~l PONCLR ~n the line 280.
The decoder 250 has its ~ and B ~elect inputs coupled to the address bus 242 ~nd its C ~elect input coupled to the R/W ~ignal ~rom the ~icropro~essor 66. The Gl enable input is c~upled to the ~2 clo~k ~ignal from the micr~processor 66, ~nd the G2A en~ble ~ignal is connected to the Y0 ~utput fr~m the decoder 248. ~he G2B enable input is coupled to the A7 line of the ~ddress bus 242 from ~he microprocessor 660 B~th the decoders 24B and 2~0 Dre 74L513B one of eight decoders ~uch ~s are manufactured by Texas Instruments.
t~ The outputs of the ~w~ decoders 24B and 250 are coupled to the various chip select input~ in ~he syst~m as labelled in Figure 6C. By writing the prop~r ~ddresses cn khe address lines 242, the microprocessor 66 can enable any chip in the syst2m needed ~or a parti~ular operation.
Turning to Figure 7 ~here is shown a logic di3gram of the CCM~COM board 90 in ~igure 2. ~ plurality of alarm ~ontacts are c~nnected ~o the b~ard by a plural~y of wire pairs together comprising ~he ~us 30. ~ach pair in the bus 30 is ~nergiz~d by connection o~ ~ne of the lines 2g through one of ~he resistors 313-320 to. ~ 50v~1t power ~upplyO The ~ther line from the pair is cQupled through a par~llel ~C n~ise s~ppression circuit to the anode o~ the dio~e in one o~ the ~p~ical is~lators 321 32B. The dio~es ~re energi2ed ~s long a$ the external contacts c~upled to ~he wire pairs are ~losed.
The transi~tors in the optical isol~t~rs haYe their coll~ct~r5 c~upled to a ~5-volt regul~ted power supply thr~uqh one of the resistors in the re~i~tor block 329.
The c~llector~ are also coupled to the dat~ channel~ of a 3~ multiplexer ~30 which is typically ~ 14512~ type multipleser such as i5 made b~ ~otorola. The data-input ~7~

of the mul~iplexer i~ coupled ~o the D7 d~ta line 63 ~f She microprocessor 66. The ~elect inputs 332 ~re ~upled t~ the A0-A2 address lines sf t:he ~icro~rocessor 66 such th~t the microprocecsor can individually redd e3ch
5 external contact ~ondition thao~gh ~he D7 da~ line 63.
The microprocessor 66 is programmed to periodically check 1;he ~ondition of each of the external contacts coupled ~o the bus 30. After ~he corltact is read, the ~icroprocessor 66 c~perates c~n a flag ~o indicate the 10 status of ~he alarm cc>ntact corresponding to that flag.
The flass are address position~ in a RAr~ memory 334 which ~an be ~ ~116 type CMOS static ~ sue!h RS iS made b~r Hitachi. The ~ddress inputs o~ the RAM 334 are`couplèd to ~he address lines 242 of th~ mi~roprocessor 66, and the 15 data l/O ports Df the ~A~ 334 are coupled to the data lines ~40 of the micropr~essor 66. The R ~ input line 335 of the RAM 334 is couple~ to the R/W csntrol si~nal from the microprocessor 66 to c~ntrol the direction of the data flow on the data lines 240.
~he chip ~elec~ input line 3~6 of the RAM 334 is coupled ~o the ~3 ~utput of a decoder 338 which has its A
and B select inputs coupled to the V~A contrDl ~ignal line 184 and Al 1 address line respectively of the microprocessor 66~ The en~ble input ~ignal Es~o on the ;25 line 192 for the decoder 338 is ~oupled to a chip select ~output from the decoder 248 in ~igure 6C ~uch that the :microprocessor 66 ~an enable the RAM 334 by enablin~ the decoder 338 ~nd writing the prvper bit on ~he ~1 line of the address bus.
3D Only two outputs from the dec~der 33B are used ~o only ~ne addres5 bit is needed to ~pe~lfy whi~h o~tput is active. The other ~utput on the line 342 is co~pled t~
~he chip select inpu~ 342 ~f a relay driver 344~ This X . .

.

~ 7~

driver 344 has three address inputs 346 which are co~pled to the address lines of ~he microprocessor 66~ The rela~
driver ~ls~ has a data line 34B coupled to the buffered D~
d~ta line of the microproces~or 66 throuyh ~ 74L~04 buffer 349 on Fi~ure 6C. The relay driver 344 h~ ~n output 350 which is coupl~d ~o the coil of ~ COM relay 352~ When he mi~roprocessor 66 ~elects the relay driver 344, and writes the proper address on the lines 3~6, the line ~43 will con~rol the state of the line 350, thereby controlling the ~tate of the relay contacts 354~
Turning t~ Figures 8A ~nd 8B there is shown a logic ~iagram of the cir~uitry of ~he dèlayed 'ransmission ~uffer 88 o~ Figure 2. A bat~ery backup circuit 3~6 in ~igure 8Bserves to protect the information in the RAM
1~ chips shown in ~igure 8B~ Each ~f the RAM chips is a 6116LP-4 CMOS static RAM ~uch as i5 manufactured by ~itachi. The ~5-volt line supply voltage on the line 358 nonT ally causes a forward bi~s on the diode 360 and the ~5 volt signal is thus coupled to the output line 362.
20 ~owever, when the power fails, the positive voltage 3n the line 354 from the hattery 366 exceeds the ~ age ~n the line 3~ which causes a reverse bias on the diode 360.
The diode 368, h~wever, will be ~rward biased ~uch ~ha~
the battery p~wer will be c~upled to the line 362 to keep the information in the RAM int~ct.
~ series of dec~der~ ~70-372 ~re ~upled t~ the ~11 line of ~he address ~u~ 242~ These de~ders ~re 74L5139 one of four dec~ders in the pre~err~d emb~iment. Th~
deeoders have outputs 373 37B whi~h ~re ~o~pled. to the 3~ chip ~eleet inputs of the 6 ~AM ~hips of ~igures 8B
through a p~wer fail dete~t ~ir~uit 3R~ E~h deeoder ha~
itfi B en~ble input ~upl~ to the V~A output 184 from the ~icr~pr~oessor 66 to enhble the dec~der t~ ~e~d the All ~it when-the dec~der ba~ be~n en~led. The decod~rs 370-35 372 ~re enabled by enable ~i~n~l on the ~ne 379-~81 eoupled to the ~ecoder 248 in Figure SC~ A p~wer ~

~3LZ~

circuit 382 sen5es when the line power represented by the voltage on ~he line 358 h~s failed by comparing the volt~ye at node 386 maintained by the line to the volt~ge ~t ~ node 388 maintained by ~he b~ttery 366. ~ comparator 390 ~hanqes the ~tate ~f its ~tput 392 when the battery vol~age at the node 388 exceeds the line volt~ge ~t the node 386. The compara~or is a National LM311 in the preferred embodiment.
The ~hip select ~ignals on the lines 373-378 are individually ooupled ~hrough ~4L532 ~R ga~es 343-398 to the chip ~elect inputs of the RAM chips in ~igure BB.
Each chip ~lect input is also coupled-~hro~gh the OR
gate~ 393-398 ts the output 392 ~rom the comparator 390 ~uch tha~ when the comparator finds ~ railure of line powerr ~11 the ~AM chips in ~igure 8B will be deselected ~o as to maintain the integrity of the data~
The connections and funotionin~ of the ~ hips of ~igure 8B wil~ be apparen~ to tho~e skilled in thQ art.
Data from the microprooessor 66 is input ~nd output on the linPs 24û t~ and ~rom t}2e addresses on the lines 242.
Turning n~w to Figure 9 there is shown a flow diagram of the steps taken by the card reader in performing a time ~nd attendan~e fun~tion. In this fun~tion, ~he card reader reads cards and l~cally authorizes entry or dep~rture based upon the sys~em c~de o~ the card without c~nsulting the ~entral controller ~nd s~res the data for each transaction with tbe l~cal time for la~er reporting to the central c~ntroller.
Xn 2n initiatization step 4 lOr the microprocessor ~PU
66 clears the RAM 80 on powerup. Thereafter, the CPU 66 transfers ~n the path 41~ t~ the exe~utive r~utine 4g4 where ~everal h~usekeeping functions ~re perfvrmed~ One of these functi~ns is to check f~r the presen~e of a card in the card sl~t. This fun~tion i~ represented by the 3~ transfer ~n the path 417 to the ~t~te 413 where the card ~wit~h is che~ked via the line 130 and the ~VX 60B in ~7~3~8 Figure 4 ~o determine if there i~ a card in the card ~lot. If n~ eard is in the 61~t~ the CPU returns to the executive routine 414 by the path 416. In ~he executive routine, certain basic tasks are performed. For ~xample, 5 the CPT~ checks whether ~ command ~rc~m ~he central ~ontroller 2~ has been received, whether a poll from ~he central c~ntroller needs to be acknowledged or whether there is a reques~ fc>r time from the local ~c~ntroller.
Periodically, the CPU return~ to the state 413.
If ~ card was found in the card slot, the CPU
transfers t~ a decision ~tate ~18 along the path 420 to determine if the s~stem co~e on the card in the slot matches the system code ~e~ ~n ~he switches 140 in Figure d, To do this, the CPU 66 individually addresses the 15 reading coils in the card reader 74 in Fi~ure 2 via the bus 64. The data fr~m each ~oil is transferred to the CPU
66 via the coil detect line 57, MUX 60A, D7 line ~3 and the bus 64 in ~igure 2.
If there is no match, the CPU 66 transfers to a no ?0 authGrization ~tate 422 via the path 424~ In this state~
~he CPU causes the display 40 in Figure 2 for a preset time to blink in a manner known to those ~killed in the art and turns on the red LED in ~he LED block g7 in Pigure 2 f~r a preset time vi~ the line 96, the driver 70, the ~0 line 68 ~nd the bus 64. ~he ~PU S6 then returns the executive state 414 via the path 4~3.
~ f ~he system c~de matches, the CPU 66 tr~ns~ers to a bu~fer full decision state 424 vi~ a path 4~6 to determine i~ there is room in the RAM buffer 8a in ~igure 2 to ~tore 30 the present tr~nsactionO If the buffer à~ full, the CP~
transfers to a state 427 via a path 42~ to ignore the card ~nd display ~ message on the display 40 in ~igure 2 indi~ating that the buffer i~ ~ull. The CP~ then transfers back to the executive ~tate 414 by the p~th 430O
3S If the buffer i~ not full, the CPU tr~nsfers to ~n ~uthorization sta~e ~32 by ~ path 434~ In ~he X

~207~8 authvrization state the CPU performs ~ ~a~ksD Firs~ the ID c~de from the magnetic card ifi ~tored in the buffer 80 ~long with the time of day an ~t~tes 436 and Ç36. Then ~he Gb rel~y 7~ in Fiyure 2 i~ en2rgized PQr a preset time via the bus ~4, the D0 data bi~ line 68, the ~ddress line A0-2 and the driver 70. The Go relay is energized for the time ~et by the swit~hes 13B in ~igure 4 60 they must be read via the multiplexer 6DB ~nd the D7 dak~ bit line 630 ~ inally, ~he ~reen LED in ~he L~D bl~ck 97 in ~igure 2 is turned on for a preset ~ime via the line 96 and the CPU
displays a WGo~ message in ~he display 40 as represented by the states 44~ ~nd 444~ The CPU 66 ~hen returns to the executive state 414 via the path 446.
Turning to ~igure 10 ~here is ~hown a flow diagram of ~he ~teps which are ~aken to transmit the da~a in the buffer 80 to ~he centr~l contrsller 20. The ~teps o~
Fi~ure 10 are ~aken each ~ime a poll signal ~omes in from the controller 200 The CPU normally opera~es in an executive m~de symboli2ea by the state 441 in ~igure 10.
The executive jump~ to various ~ubr~utines which per~
housekeeping and command scan ~unctions as mentioned earlier. These ~ubroutines are symb~lized ~y ~he state 443. One of the functions is to peric~dically check for the presence o$ ~ poll ~ign~l from the con~roller 2D in Figure ~. The pc~ll signa~ is sent per~odically to ~ach card reader in the system Vi8 the enable pair 26 c~upled th~t card re~des. The check f5r the pre~enc~ of a p~ll signal is symboli2ed by the ~tate 447 in ~i~ure 1~. If nD
poll has been received, the CPU returns to .its other housekeeping function~ in the ~tate 443 via the path 449~
If a poll has ~e~n ~eceived~ the CPU will ch~ck ~n int~rnal eounter which i. incremented esch ti~e a transaction is st~red in tbe ~uffer ~0. This operation is ~ymbolized by the block 451 an Fi~ure 10. If the count is non~z~ro, then, the CPU ~nOwB that there i~ data in the buffer 80 whieh needs tv be tran~mitted t~ the eentral ~( ' .

~7~

contoller 20. Transfer is then made to a ~te 448 by a path 450. If ~he ~ount is 2ero, the CPrJ returns to its other functions because there i~ n~ data to transmit.
This ~ransfer is symbolized by the path 4~3~
~n the state 448, the CPU ~etermines if the buffer option data is present in the ~eature memory gR in Figure 2. If the feature is present, he CPD will retrieve the data for one transaction from the buffer 80 and transmit it to the central controller 20. Thi~ ~perati~n is 1~ symboli2ed by the state 454 in Figure 10 and is ~ccomplished by .addressing .one of .he.transact~ons in the . buffer 80 and reading the data there by the ~us 64.. The data is then c~nverted to serial ~r~at in the CPU 66 and sent via ~he D~ data bit line 68 ~o the driver 70 in 15 Figure 2O The driver then places the data on the Tx data lines 58 and it is sent ~hr~u~h the ~pti~l is~l~tor board 54 onto the data line 2~ t~ ~he central ~ntroller 2~.
The CPU then returns to the executive r~utine via the path 456.
I~ the buf~er option is not present, ~he CPV S6 will transfer to a state 460 by ~ path ~5B where it che~ks for the presence of a card in the card sl~ . If there is a c~rd in ~he card reader, the c~rd data will ~e read by the CPU 66, converted to ser~al fvrmat and transmitted to the central ~ontroller 20D This ~tep is symb~lized by the hl~k 462. Con~rol i5 then returned to the executive.
If there is no ~ard in the reader, the CPD will transfer to the state 464 via ~he path 466 to determine if there is a time request pending. The card reader. which 30 have the time and ~ttendan~e function keep the local time but peri~dically reguest the time fr~m the cen~r~l controller ~o as t~ synchronize the local time ~ith the eentral e~ntroller timeO If there is a ti~e request p~ndin~, the card reader will a~k ~he time of the c~ntral 35 controller 20 as symbolized by the s~ate 4~6 and return to ~he execu~ive vi~ the pa h 4680 X

~Z~86~31 If n~ time request is pending, the CPU will acknowledge the poll ~s ~ymbolized by ~he ~ate ~70 ~nd return ~o the executive r~utine by he path 4~2.
~ urning t~ ure 11, ~here i~ ~hown a flow diagra~ ~f 5 ~he time o~fset routine performed by ~he CPU 66 to ~eep track of the local ~ime ~r~m the central rDn roller time when the ~entral ~ontroller i~ in ~ dif~eren~ time zone ~rom that of the reader.
The first step in the process is to read ~he offset 10 switches 136 in Figure 4 thrQugh the MUX 60B. The value of ~h~se swi~ch~s is stored in RA~ at a ~peci~ic address. ~hi~ is done 600 ~imes per ~e~nd in ~he ~tate 474.
Next, the CPU 66 convert~ th~ data in ~he RAM ~witch l~ data ~ddress to minutes and h~urs of ~f~et. The data from the 8~h switch determined whether the ~ffset is positive or negative while he fir~ 7 ~witches provide binary number representing up to 127 minutes of offset.
Any number of swit~hes could be used, however. This is 20 -cymbolized by the states 476 ~nd 478.
Finally, the l~cal time is offset in a ~ta~e 480 and stored in a loca.l buff~r of~se~ time a~dres~. Control is ~hen returned ~o the exe~utive routine~
Referring ~o Fiyure 12 there is shown a flow diagram 25 for the steps taken by the CPV S6 in handling transactions during a degraded m~de when c~mmuni~ati~n with the ~entral controller 22 is lost. The blo~ 415 symbolizes the executive routine. The background blo~k 4~3 ~ymbolizes al~ the routine houseke-eping che~ks and functi~ns ~hat the 30 card reader does when it i~ no~ doing one of the fore~round routines to handle ~ertain c~nditions the CPU
dis~overs during the executive rou~ine. ~art of the normal executive rou~ine i~ to ~he~k ~or the peri~di~
~ppear~nce of a poll signal fEOm the central controllerO
35 This check is symboli~ed by the block ~90. ~hi~ ~unction i~ implemen~ed by ~he CPU 66 in determining whether a poll X

signal has arrived in the preceding 30 ~econds. If a poll signal has arrived during the last 35 secon~, then there i~ no degraded m~de ~nd the CPU 66 determines what type of command has been re~eived, if any, ~nd pr~esses the 5 command as symb~lized by the bll~cJc 492. Control i~ then returned to the executive rc~u~ ine by the path 494.
If a poll signal has not ~rrived durin~ 'che preceding 30 secords; the card reader CPU 56 knows tha~ ~omething is wrong and enters the degraded m~de. This is ~ymbolized by the path 496. The f ir5t ~tep iS to determine i~ there is ~ card in the reader slo~. Thi~ tep is ~ymboli~ed by the blo~k 500. If there ~s no~ ~ card in~the reader, control is returned to the executive background lo~p 4i3 as symbolized by the path 498.
~f there is a ~ard in the reader, the CPU 66 addresses the feature memory 98 in ~igure 2 to determine if the buf~er option is presentO This is symbolized by the bl~ck 502 in Figure 12.
I~ the buffer option is not present, then no storage 20 of transaetions during he degr~ded m~de will occur.
However, it is ~till possible to ~uthorize or deny access to a ~ard holder based upon the ~ystem code ~hat is on his card without storiny the I.D. code ~nd time of day in a buffer. To determine whether or not ~ do this, ~he CPU
25 66 must again address the festure memory 9B to determine whether the degraded m~de option is present. This operation is ~ymboliæed by the bl~ck 504 in Figure 12. If the degraded mQde opti~n ix n~t in effect, the C~ returns to the backgroun~ loops ~43 by the path 506.
3~ If the degr~ded mode option is present, the CPU reads the system ~ode on the magneti~ c~rd in the r~ader ~lot via the card reader coils 74 ~nd .hen reads the switche~
140 in Figure 4~ The CPU 6~ c~mpare~ the system code sn th~ card to the system code on the ~witches for a match.
3~ This ~omp~ris~n is symb~li2ed by the block ~08 in Figure 12.
;X

8~6~

If there is n~ match~ the CPU 66 turns ~n the red LED
~or a time ~et by the switches on the ~witch ~nd rel~y b~ard 62 in ~igure 2~ This indicates n~ auth~rization ~s ~ymb~lized by the ~t~te 510~ The CRU 66 then ~ddre~ses the feature mem~ry 98 to dete~mine if ~he no 9~ ~ption is in effect, as ~ymb~lized by ~he ~ta~e 512. If ~t i~ n~t in effect~ the CPU 66 returns ~o ~he backgr~und l~ps 443 via the path 514. If the ~pti~n i~ in effect, the CPU
addresses the no g~ relay 166 in Figure 4 through the lO driver 70 by placing the proper address ~n the lines 172 and writing a l~gic 1 on She buffered'D~ dat~ bit line 6R~ The `n~ 9~ ~e~ 166 is ther~y energize~ fQr a. time set by the switches on the ~wit~h and relay ~oard 62, and whatever external device th~t ~s coupled to the no 15 relay c~ntac~s through the lines 167 will be signalled ~ch3t an unauth~rized person has at~empted ~n entry. This operation is symb~lized by the-block 516 in Figure 12.
If ~he system c~de on the switches match tha~ on the card, the CPU 66 energizes the green LED in the LED block 2D 97 ~f ~igure 2 for a predetermined time. The CP~ 66 als~
energizes the go relay ~1 in ~igure 4 for ~ time ~et by the ~witches 13B. ~his is done in ~ ilar manner to that ju~t described for the n~ go rel~y. This operation is symboli2ed by the ~lock 51B in Figure 12~ Control is 25 then returned to the background loops 442 via ~he path 520.
R~turning ~o the sta e ~02 in ~igur~ 12, if the buffer op~ion is present, the CPU ~6 check~ its in~ernal counter ~o de~ermine if the buf~er 8B in ~igure 2 i~ .full of 30 transaction dat~. ~his i~ ~ymbolized by the block 528 in ~igure 12. If the buffer is full, the CPU ~6 ignor~s the card and transfer~ back t~ the bac~ground loops 443 5S
symboli~ed by the path ~31 thro~gh the s~ate 522.
I~ the buffer i~ n~t full/ the CPU 66 will read the 35 system ~ode ~witches in Figure 4 and the ~ystem code da~a on the card ~nd ~ompare them ~ ~ymboli2ed by tbe block X

530. If there i5 no match, the red LED in the LED blc~ck 97 in Fig~:re 2 will be turned on for a time as ~ymbolized by ~ transfer to the state 510 via the path 532 in ~igure 12. Processing ~rom the ~tate 51D will continue as previously describe~.
If the ~ystem code does match, the CPU will ~tore the ~ ode from the card along wi h the loc~l time in the delayed tr~nsmission buf~er ~8 o~ ~igure 2 ~s .ymbolized by ~he block 533. Th~ green ~ED and Go relay are then l~ energized for a preset t~me in st~te 5~8.
The bu~fer 88 i5 unlo~ded one transaction at a time wben communications ire restored. Ref~rring ~o Figure 13, . . . . .
there is shown a flow diagram o~ the manner in which the CPU unlc~ads the bt~f~er. During the executive b~ckgr~und l~ routine, the CPU 66~continually checks for the presence of a poll signal from the ~entr~l controller. When a poll finally arrives, the reader knows that communications haYe been restored. This monitoring function is ~ymboli~ed by ~he bl~ck 540 in ~igure 13. If no poll has arrived, the CP~ returns to its other ba~kground functisns as ~ymbolized by the path ~42.
If a p~ll has arrived, the CPU 66 will check to ~ee i~
any higher priority messages sre ~aiting t~ be ~ent as symbolized by t~e block 544. If there is such ~ messager it is sent, as symbolized by ~h~ block 546, ~nd control is returned to the backgr~und rou~ine of the executiYeD
I~ n~ higher priority message is w~itin~, ~he CPU 66 will de~ermine if there are any transa~ti~n~ ~t~red in t~e bufer waiting to be 5ent as symb~lized by the block 30 S48. This i5 don~ by consulting the internal ~ounter in ~he CPU 66 to determine ho~ full ~he b~fe~ ~ is. I no data, i~ in the buffer ~, the CP~ determines whether there is a ~ime reque-rt p~ndin~ ~ sym~olized ~y the bl~ck 550O If there i~, the CPU 66 moves to the ~tate 552 to 35 reque~$ the time from the ~entr~l eontroller and then returns to ghe executive routin~O If there is n~ time 'Y

request pending, the CPU 66 will ~knowledge ~he poll in a ~tate 554 and return to the execu~ive routine.
Returning to the state 548 ~n Figure 13, if there ~are transactions in the buf~er 88 to be ~en~, he CPU 66 will retrieve one transac~ion data group~ ~orma~ it for ~erial ~ransmission and transmit it ~n the Manner previously discussed, using the D0 data k~it line 68, the driver 70, the ~ddress lines AO-2, the T:c data lines 58. and ~he isolation board ~4. The format for the transmission in 10 the preferred embodiment is ~ header identifying the type of reader wi~h the data, followed by a c~ndition code -indica~ing the type of transa~tion ~hat has been retrieved. Following ~he condition code, the I.D. data from ~he card is sent a~ong with the t~me o~ day whe~ the lS transaction occurred. These steps are symbolized by the block 5~6. Any format for transmis~ion will do, however~ Control i.~ then return~d to the executive routine.
Turning ~ow to ~igu~e 14; there is ~hown a ~low 2~ diagram of the steps the card reader CPU 66 takes in monitoring the alarm contacts connected to the lines 30 fro~. the CCM/COM board 93. ~he rout,ine illustrated in Figure 14 às executed by the ~PU 600 times per second ~nd is ànte~ded to sense the condition of the flags which 25 symboli~e the.stat~ of the alarm contactsO The ~irs~. ~tep is to read a CCM flag N to determine the last state of the flag. This step is symbolized by the block 560 in Figure 14~ To do ~his the CPU 66 pick~ the address ~or the flag N in the R~M 334 of ~igure 7 ~n~ writes that addr2ss on 30 the lines 242 after ~electing the RAM with the All and VMA
lines coupled to the de~oder 338 to drive the line 336 low. The R~W input of the RAM 334 is driven o the read ~tate by the mi~roprocessor 66 in Fiyure 6~.
There are four possible ~tates for the flag 35 symbolixing the ctate of i s correspondiny alarm cont~ct. ~he ~lag ~an show ~op~n and rep~rted~, Wclosed X

~z~

~ 34-and unreported~, ~open and unreported~ or ~clo~ed and repor~edW. ~n~ 8 bit byte as used to symbolize ~hese ~tates~
~f the flay ~hows ~clos~d and reported~, the CP~ 66 S ~ust know whether the ~larm cont~c~ N has ~h~nged s~atus since its last state ~s indicated by the flag N.
Therefore, the CPU 66 ~auses the alarm ~onta~t ~ to be read. ~his step is represented by the ~ransfer on the path 561 to the block 566 and ~s physically ac~omplished lD by selec~ing the contact N ~ddress and writing that rddress to the multiplexer 330 on the lines 332 in Figure 7. :The CPV 66 also enables the multiplexer ~3~ ln-any known manner util~ing the CSCCM signal connected to pin 15 of the multiplexer 330. The CSCCM signal can be lS generated by decoders 60upled to the address bus of the CPU 66 or in ~ny other known manner. ~th the address on the lines 332 set, the multiplexer 330 will select the one ~f its outputs X0-X7 for conne~tion to the D7 line coupled to the CPU 66 da~a bus 64. The CP~ 66 ~an then read the 2Q desired contact ~hrough one of the optical i~olators 321-328.
If the alarm cont~ct N i~ open, the C~ ~6 knows that the alarm contac~ has changed its status 6inoe the last time it was read and that this fa~t must be reported.
25 Therefore the CPU changes the state. of the flag N to an ~open and unreported~ sta us. This operation is ~ymbolized by the transfer on the p~ h 567 to the block 568 in Figure 14. Because the st~tus- of the alann cc>ntacts has changed, the CPU 6~ must update one bit of 3~ th~ status word that i~ Xept ira RAM to indicate the status of the alarm contacts~ The ~tatus word has one bit for each alarm contact t and the bit for contact N is cha;~ged to indicate tbe most current st~tus. Thi~ operat s:n is symbolized by .he transfer to the l:loek 570 on ~he pa~h X

~7~8 ~35-After the ~tatus word has been updated 9 the CPU 66 is ready to move on to read the n~xt flag. TD do this, N
mus~ b~ incremented. This ~tep is represented by the path 571 to ~he blook 572~ Af~er ~ is incremen~ed, the CPU 66 5 ~u~t know whether it has oompleted reading all the flags and con~acts. To do this, the C~U ~ompares the value of N
after i~ has been incremen~*d to the gotal number of alarm -c4nta~ts ~or,nected to the lines 30 in ~igure 2. In the preferred embodimRnt, ~his number is 7, but it ~an be any lO number depending upon how ~uch hardware is av~ilable.
This comparison oper~tion is represen~ed ~y ~he block 574 in Figure 14. ~ ~. is -less than or egual to 7, the.CPU
returns to the sta~e 560 by the path 576. If, however, N
is greater than 7, ~he flag reading tasX is finished ~nd l~ ~he CPU 66 returns to the executive routine 8S symbolized by the blo~k 578.
If the flag ~ had been in ~he ~open ~nd r~ported~
state, the C:PU wol~ld again like to know if there has been any chanqe of status of the alarm conta~t associated with 20 ~he ~12g N. To determine ~is, ~he CP~ ~6 reads the contact N. This operati~n is ~ymbolized by the path 582 to the ~tate 5a4.
If the contact N is open, there has been no ~hange from its last status and the CPU 66 is ready to read ~he 25 next flag. N will be incr~mented and processing ~ontinues ~s previ~usly described. ~his operation i~ sym~olized by the path 5~6 to the state 572 previously discus~ed~
~ f ~he c~ntact ~ is closed, the CP~ 6S knows there has been a change in s~atus since the last che~k.
30 A~cordingly, the C~ 66 must ~et the flag N tQ indicate the ~ontaot ~ is now ~losed and unreported. ~hi~
operation is sym~olized by the transfer on he path 5~ to the .~ate 90 in ~igure 140 Because there has been a change in the sta~us of one 35 of the alarm conta~t~, the ~tatus word ~u~t be updated, This operation is symbolized by the trans~er on the path X

-3~-~92 to the sta~e 57D, Pro~essing then continues as previously described.
Returning to ~he ~tate 566, if ~fter re~di~g flag N
and finding ~ts ~tus ~o be aclosed and reported~ the SPU ~6 then reads the contact N ~nd ~inds that lt is ~till ~losed, there has been no ~hange in ~he ~larm contact ~ondition since the last re~ding. Thus there is no need to change the fl~g ~tatus and there is no need to ohange the s~atus word. Ac~ordingly, the CP~ 66 merely increme~ts N as symbolized by the transfer on the pa~h 567 to the state 572. Processing then con~inue~ ~s previously described.- - - . ~ .
If in the state 560, the CPU 66 determines the flag N
is either ~closed and unrepor~ed~ or ~open ~nd unreportedn, there is no need to read ~he alarm contact because the central controller has not yet been notified o~ ~he change in status of the ~larm contact_which caused the flag to be set in either o~ these two states. Since notific~tion is the first priority, the CPU ~6 will merely update .he s~atus word to indicate the new status and continue reading the other flags~ This operation is symbolized ~y the transfer on the path 600 to the previously described ~ta~e 570.
Referring to Figure 15, there is shown a flow diagram 25 o the steps taken by the CPU in reporting the changing conditlons on the alarm conta~ts coupled to the line~ 30 to the ~entral controller ~0 in ~igure 1. The routine shown in Figure 15 is pe~iodi~ally executed when program control o~ the CPU 66 is transferred ~ro~ the ba~kground 30 ~asks of the executive routine represen ed by the block
6~ to the routine of Figure 150 The first step is for the C~U 66 t~ read the flag N to determine if it has been reported 9r is currently in an unreported ~t~tus. ~f the ~l~rm contact N change in 35 statu~ h~s n~t yet been reported as indicated by an unreport~d status ~f the fla9 N, then the CYU 66 ~end-~ a X

3L2~73!~
.) -37-.
CCM message to the central controller 20 reporting the changed condition ~f the alarm contDcts N. ~hese operations ~re represented by the block 604 where the flag ~ is read and the transfer ~n the path 606 to She ~lock 5 608 where the CCM me~sage is transmi~ted to the cen~ral con~rollowr. Referrins to Figure 2, the CC~ message is transmitted by formulation of the serial format mes~age inside the CPU 66 ~nd placing it on the D~ data bit line 68 tG drive the driver 70. The address bit lines A0 A2 10 ~re held by the CPU 66 at the ~ddress which connec~s the D0 data bit line to the Tx data lines 58. The serial data CCM message then pas^ees through the optical isolators on the isolation b~ard 54 and over the data lines 28 to the central controller 20 in Figure 1.
The next step after transmitting the CCM message is for the CPU 66 to determine if the flag i~ open or closed to determine whether to w~hang2 ~he flag So a ~losed and reported status" or an "upen and rep~rted status"~ This step is represented by the t~ansfer ~o ~he state 612 by 2~ the path 610.
If the flag is open, the CP~ 56 transIers to the state 614 by the pa~h 613 to change the flag status to ~open and reportedn., Control is then trans~ersed to the ~tate 602 by the p~th 616. If the fl~g i~ closed, the CPU 66 must 25 change the ~l~y ~o indicate that the ~ondition h~s now been reported. The CPU 66 th*n changes the flay status to 0closed and reportedn ~ta~us. This is represented by a transfer to the state 620 on the path 618. Con rol is ~hen returned to the state 602 ~y a path 622. From the 30 state 60~ pro~essing continues. The CP~ 66 th . n transfers to the sta~e 604 where fl~g N is again read~ This time~
the flag N will ~how that it has been report~d ~o the P~
fi6 will increment N. This ii represented b~ he transfer to the ~tate 624 by th~ path 642. The CPU 66 then 3~ compares the value of N to the maximum number of flags to be read as represented by a tran~fer on a path 626 to a X

\

6ta~e 628. ~f N is les th~n the m~ximum number of 1ags in the ystem, ~ontrol i~ transferred b~k to the exe~utive via ~ path 630. The next ~ime the executive jumps to the rou~ine o~ ~igure 15, the CPU 66 will read 5 ~l~g N ~ 1--I~ N is equal to the maximum number o~ flags in ~he system, the C~U 66 i~ finished reading ~ he flags and need only deter~ine wh*~her the cen~r~l controller 20 has requested the CC~ status word. This determination is 1~ represented by a trans~er ~o the state 63~ by ~he path 632~ If the ~entral ~ontroller 20 has not requested the - - CCM sta~us w~rd, control is transferrea back to the executive via the p~th ~36. If the central co~tr~lier has requested the CCM status word, the ~tatus word is ~ent as represented by trans f er to the state 640 on the path 638. Thereafter, control is returned ~o the execu~ive via the path 642.
Referring to ~igure t6 there is ~hown ~ flow diagram of ~he ~teps taken by the central controller 20 in Figure 1 ~o process messages ~rom the ~ard readers regarding changes in the s~atus of the alarm contacts. The blocks 620, 622 and 624 represent individual readers in the system which are coupled to the central ~ontroller 20~
Each reader has ~ts own data lines, such as data line 28 ~or the reader N, upon whi~h data is transmi~t~d ~rom the reader to the cen~cral controller 20. The controller 20 is ~180 coupled to each readar by enable liness ~uch as the enable line 26 coupled t4 the reader N, upon whieh commands are sent ~rom l:he controller 20 to the re~der.
30As represented by the blocks ~20, 622 and 624, each reader formulates and s~nds a number o~ message~ to the central controller~
~he messages received by the central controller 20 are deciphered 'co determine what type of message it is ~nd 35 what is the data in the messageO This operation is symbolized by the block 626.
X

97~6 One o~ the qllestions a-~ked by the controller ~s whe~h~r or not the received message is ~ CC~ message.
This decision is represented by the blsck 628 If 'che mess2ge is ~ ~:CM message, he ~ontroller mus~
5 determine frc~m ~he data in the mes~ye which alarm contact has ~hanged. ~his determination is represented by the bloc~ 630. The reason for ~his determina~ion is that the ~on~roller ~nay no~ be programmed by the user tc~ do any~hin~ in response to changes in cert~in alarm 10 c~ntacts. What the controller does in response to a ~han~e in ~atus of B particular alarm contact is user programmableO The controller keeps a table of user progr~mmable entries. The table can hàve an entry for each alarm contact in the system or ~t may only have 1~ entries for some of the alarm contactsO This table is called the CRO table, which stands ~or Conditioned Response Option. ~ typical table entry would include the alarm contact number, the contact condi i~n, the reader loc~tion, the condi~ion response loc~tion, ~ CRO override 2~ command and time limitation data.
The controller, after decipheriny the CCM message, mu-~t consult the CRO table to de~ermine i~ there is ~n entry for tha~ alaraT cont~ct. If there is, the controller will examine the cont~ct condition code, the alarm contact number, and the reader loca~ion data in the CCM message to determine if-it matches the entry in the CRO table. This opera~ion is symbol~zed by the ~lock fi32 in ~igure 1 6 D
The time zone data in the CRO table ~an be user-programmed to only allow the speeified ~onditioned 3Q response if ~he CCM messag~ for the contact ~n guestion comes in within the time parameter~ Alternatively~ the time ~one may be unlimited if ~he user pro~r~rns the ~ppropriate code, ~uch ~h~t the conditioned response will oecur any time a message matehing the CRt) entrSY cc~mes into 35 the c~ntroller. ~his operation is symbolized by ~he block 63~ ~

~7~
.

,, ~o-If there is a CRO t~ble ~ntry ~nd the CCM message ~o~es iA within ~he ~ime parameters of the CRO ta~le entry, the ~ontroller will send ~ CRO cD.mmand ~ the loca~ion ~pecified in ~he CRO ~ble ~ntry. This cou}d be to ~he reader coupled to the CCM cont~c~ whi~h changed to cause the C~ message in yuestion~ or it c~uld be to some other reader location in the ~ystem. Thi~ operation is ~ymbol~zed by the block 636~ The CXO respon~e message is sent So a buffer which holds ~essages ~o be sent to particular readers until their turn for ~ransmission over ~he enable lines come up. ~he messag@s are ~ent on a first come, first . ~erve basis. This mes-~ge buf~èring and-.
the periodic polling func~ion of the central controllerare represented by the block 638~ The messa~es are sent on one of tAe enable pairs 640.
The central controller also sear~hes the C~O table for other entries resarding the same alarm ~ontact. That is, the central controller may send one or more CRO responses - to one or more locations in the ~ystem in response to a 2~ change on an alarm ~onta~t. The CRO response ~an be ~ny of ~he reader commands ~sso~iated with the other reader functions su~h as ~go o~f line" or ~send CCM status wordn. In parti~ular, it may k~ a command to ener~ize a COM relay anywhere ~n the syst~m. This Wenergize COM
relay", command, when received by the CPU 66 in the re~der, causes it to address the relay 352 in Figure 7 through ~he ~ddress lines 346 after ~electing he driver 344 using the line 342 and the decoder 33Q. The coil of the relay 352 i~ then c~nnected to the D0 data bit line 3~ 348 ~rom the CPU 66 in Figure ~ sueh that th~ ~PU 66 can - energize the relay coil by wri ing ~ logic zeEo on the line 348. This changes the state o the relay ~ont~ct 354 which notifies an external device ~oupled to the relay contacts 354 ~y the lines 38 that fiome action is needed~
35 The external device can be ~ fire ala~m~ sprinkler system, telephone dialer or any other device.
`. )' `` 3~2~
~4 1--~ fter the CR0 message is ~ent~ the central con~roller continues on with processing ~11 the incoming messages.
This is 6ymbolized by the ~ransition on the path 642 ~o the state 644. The same would be ~rue i there were 5 either no CR0 table entry cDrresponding go ~he CCM message or if the CCM message were o~tside the time zone set by the CR0 table en~ry~ These two tran~itions are represented by the paths 646 and ~48~ respe~tively, t~ the state 644. The central controaller then sends data to be 10 printed regarding any or ~11 of the incoming messages to a printer as represented by the block 650. The cen~ral ~ontroller may send-a message to ~he printer regarding the CCM mes~age if desired.
This concludes the description of ~he system of the 15 improved card reader. Below there i~ listed the ma~hine language in hexadecimal notation9 implemen~ing the preferred embodiment of the flow diagram~ o~ Figures 9-16. Appendix A is the machine language for the flow diagrams of Figures 9-11. Appendix B is the machine 20 language for ~he flow diagrams of ~igures 1~-13. Appendix C is ~he machine language for the flow diagrams of ~igure~

- ~

~; ~

"; ~Z~786~

-~2-Ap~endix A
(c) copyright 1982 Rusco Electronic Systems-- a division of Figge International, Inc. -- all rights reser~ed.
aa~~5~~i)a~,~. ~;,O~a~~ ,7~34~~ ,3~,c~ ",~^~ F~~a~321 a-e S5 FF 37 ~de s0 c- 38 a~ ~r ~.7 aa as 8C ~3a 67 ~5 3~$~ 0 3Q âr i!~ a3 oC ~o aO câ F c~ 6~ 2~ r r ~
3~0 lf~ F sa lC FF 63 ' ~ ;F o~ _0 Cc a4 ~2 r- C~3 151 06~~1c~-~-~a~ c~r--~O~ c~~ a~c,-~a3~,-~,~O;
,a-a -a r_ sa -~ EC Oa _~ 2, a~ rF 6a z~ 3~1 6Q e~ ,~F
a~ c- 5~ 3-~ --35-~3C-37-~S-~ ;- FF 37 3~Q B~ 71 2~ 36 0~ 82 84 Q3 c.7 cS 81 Ql 22 05 7F 6 aB~3 35 ~r oa_d~_5J-a_-3D-7c~cD~,~D~7~ 7~ C~' SD 39 ~3D0 ~3 7fi 41 20 Cô S -4 26 32 cg _e 3D ~1 12 EE; 72 ~Ea ~~ 2J, B;~ ~5 B'~ 7- ~~ dQ C~ 0;2 15 6- ~9 0~ oC 0$3 0Fa ~ F3 ~-o --= 5,~ 06 ~, C~ d~ 3~ ~ 8'o ds 3C ~
FF 8r; F7 3D ~ 36 ~~, 1 BS, F e0 3C CE F~ ~3 DF
_c~ _'S_-_-~ 3~~C,2~^q~g'6~~35~2~ 3 5~ S~
1-Q Sô SD 5~ 32 ~9 DF ~3 Q3 5F 49 Z4 F~ F~ 3~d ~6 2 c 3c ;3~ C 13 27 9l 1~ 7.`~ r3F ~e ~e ~ 38 ~F
~ c~ 27 OF d3 0G a~ q5 00 51 09 2c. ' 4 d9 ZC 0a _D Zô' ~Q r t ^ u F'- 9~_ ~eJ_D6_~ 5_, ~ _,, ~q, " 39 ~ .i6 ~
3 C'c O~l ~-? ~7 33 ~-~ â9 3C 00 ~3 25,, 0~ 13 1~;
lrlQ ~?~ _5 ~ u r- 3~ ~ a~ ~i3 ~1 t31 ~1~ a~ al r6 i3~ ~ C~ rJ~ 3~ sO de .~a ~ ~._ a~ r~7 ~ ;C
lC~ Q0 c4 ZS f~ 3Z ~' ~ 2,'~ 3q 33 ;F Q~3 37 7.4 ~
1J~t c~ c~ S6 0~ ?7 ` ,' 36 ~F ~_ !4 ~6 11 27 2 ~ ,'F 30 lcO ' 1 ~6 L3 3, 15 oo Q9 5i 0r 'F ~d 31 2Q 12 ,~ ~a .~a eF 27 ag 96 1~ 9~ o' ~6 da ~5 2~ ~L S6 rP 3~ 51 '~_-,6 ~E_c,' $~ ;$~ c_c~ q~
-' O Z6 c2 '6 05 3~ L3 96 Co 49 ~'6 ~0 16 24 -6 ~r 0a :~~Q la ~ 7~ ~ 1? ~D, r de 19 96 CS 2.4 ZF 96 12 ~~;;3 -S ~ 73 ~ _ q5~ . a 16 C6 2~ ~S ~6 6~2 ~:d v~ ' o . a ~1 3 ' 1~ou ~ 6~ ~6 ~3 36 CS e.5 2~ 71~
Z;Q ~70 lS _ t 20 3S F37 L8 3D ?3 a7 13 33 oo 3'3 97 ~ 8_~_v3_2r_~3____c_.. ~_r~_~L~ 6_v5_~3_~91 2~ 2 Q~ ;r ~ 33 3'` 9~ c' 15 55 14 ;F ~i~ IZ :iD
C31~ 3r~ 35 7F c~ D~0 9a Ll -5 F6 397 13 73 t1~ 11 3~q 2qQCr '3 53 ~~ aa S'D Fr ;77 Q9 D'7 ~0 3~3 cS ~F BS 00 ~~ 3 L 6 ~ t 3 q 0 4 i` ~ 0 ~ 5 7 --;~ 3 ~ Q 0 '3 b v 0 5 ~ t O
25;~ ~C 3V ~ Ce ~3 as 3D ~c Dc ce aa rl3 aQ F6 aa6~
2~' ~ C_ ~t7 . 7 ~D 77 ~ t_~sl_C-_09 Ct 4~-- ~Q ~c Q~, a5 cDa~8 ^-O ci., c~ aa 53 __ ?~ C_ F- c~ ~a 3~ ~F FF
cC0 6~9 ~ F~ 0~ So r~ 30 ~r 39 ~Q 5~ 8it Q0 3r7 FE ae Q ~ o--c ~ --- J--~ --03 ---3 0~ - ~ g- o--F F~--rFc E--5~ ~
313 31 rF gO 53 5D 7C r~ CC ~!~A B~q 6Q L'c` 25 76 Si~i O
~-~9 L~ -6 ~ !3D, 4 5~ c ?S S6 6a ^5 Z6 2E B6 à~
-CD-~-.-~-.i~~-~~~-c~-s~-æ'~ tO~~ -ru-~aal-3z-~ --o~
31d ~3 36 ~? ~3r6 0$~ ~32 5~ a~ 08 27 0f~ ~7 0~ 6;
~~~ S5 7E -~ -D - j A ?,. ;,5 ~ 7 rr7 7E 74 3c C_ 30 " _ ~o ~ ~ c ~ 5 i O ;~1 1. C 2 ~ ., ô ~ Ç~
3r '7 ~3 2:~ a~ -F, E 7 F _~ 10 7E ,3 5`F 3D 741 3~ __ _ ?- 355~ __ __ _ ;6 :~0 3~ ZS 1~ 31) 7~: 62c ~ C_ ~ .~ 30~ ~C r J 30 .c i I v3 ~, ~3 31~ 6~1 dC 3.
~~* ~ 51 ~7, -rS7~ 5~J 7 ~ L --F 7' 7~ LL.3 7E
j~3 ,~ 3- ~F ~ ~` ~v ,~ 6â ' _~? ~5 c-q -~ 3 r~ a ~ _'` ~' BD 7~: ~3 c.~ 5 5 ~0 ~~ 25 ~'' 36 ?3 ~d ^5 5C ~r;c 62 25 ~5.~1 'v 3~ r~ J ~ 3~ C~ '-Jr ~ 7 ~r .

.~ "~

~aa 36 50 aF c7 ~S 36 ~B 7' 74 c9 oD ~D ~i as ~6 50 413 zS 25 39 36 Q0 34. c6 22 gD 48 25 lE 36 00 60 F6 423 00 32-C4 0; c7 ag B6 6a 0E 87 0a 61 351 'F 7E ;3 ~0 1D d6 3~ 7E 73 9F OO 0~ 20 ~2 oS a3 28 E3 SS a~
7:3 4D 86 aE ~E 73 9F 3c aD 2a ~a 86 3D c0 D9 ~s0_~6_lZ__E_,~__s__s6_l3_~a_c~__36_aa_s2_s4_ 1_2,~_~6 ` 4~a a~ ,9 36 a9 3i~ 26 il ~o a0 -6 c7 9Q FE a0 13 Z6 4, a 07 B6 0a 38 26 a2 ac 39 0D 39 86 35 7E 73 4D 86 480 ~ 1 7E 73 9F B6 00 32 84 04 c7 EB 0D 39 ~6 FF 97 ~sa~Oa~s,~sa~7F~0a~3a~s6~a0--aR--~-l3-~^~--aa-36-co-aE
4 R0 B6 a~ 08 Z6 ~1 7F 00 aQ ;F ao ~8 7f a0 ~B BD 7Z
30 99 7fl ~0 ''~ 2S 17 S6 lc 97 3p~ BD 76 ~3 ED 75 3B
d, ~ SD 75 3C` BD 75 74 8D a6 8D 23 BD 73 ~S 33 96 S0 ~,D3 3? a4 Z7 Z0 96 33 27 15 2i~ 1~ 43 Z;J 17 36 E7 28 4Ea 13 -,O F-_97 33 ,9 S6 F~_32 ~a a_ 20 Cl 96_E7_2`P, 4F8 03 7C ~0 33 39 96 36 27 lC 2Pl ZS d,3 Z7 ~F 96 E5 500 Z3 Z6 36 FF 97 36 7F 6a lZ 7F 50 8F 3g 9O E6 2B
5l0 25 7F 00 36 39 4F 97 3S 96 E6 2. 0C 86 0i 97 36 5ca 39 36 E6 Z3 ~4 7F dd 36 33 OS dl 37 3g Cc 00 3~
s3a DF 4B CE o0 o4 DF 49 86 FE 97 36 39 CE 30 EC 8D
s~a lF 97 ______E0_4_Sa~ _a~ 65 _~ _6__7__0_6S_3Q
ssa ~B Fi C a0 E8 8D 09 c~ aa Fi SD as B7 6a a~ 39 569 4F E6 ~3 S9.49 ES ~2 59 49 E6 01 53 49 E6 00 ss s~0 49 33 0F 39 CE 00 00 6D 19 27 0i:1 6C lP 25 a6 6C
530 13 Z6 a2 3D 8'o 00 08 SC 80 lf~ Z5 EB 83 DF 45 D~i -59a 46 ~'E, 5 ~9 DF s, DB 56 W 56 CO ao D9 55 07 55 '`~0 DE 55_E--_s~el_f~D_a0_11E 45 39 ~5 C3_75 FE_76_1.._76 ~a ~c ~6 ~8 ~; 00 ;6 F3 ~7 67 ~ 77 ;5 67 76 -o~ 75 sca DD '5 cP~ 96 3D :31 01 27 10 81 FE 27 0C 96 60 26, sDa 2~ el6 co Z~ c9 36 FF 37 38 i~D 76 46 39 7F a0 07 5ca, F 08 a~ 7F a~ ag 7F 0~ 33 39 ~6 CF 97 a~ Cc B9 SFQ Ba FF aa 31 39 BD 76 ~6 CF 00 13 7E 77 47 9o 3D
630 ~1 01 Z7 36 81 F_ Z7 32 7~ ;~ i5 g6 38 27 7S 96 61~ E~ 2B 74 7F 30 38 Z9 E6 95 66 26 0D `9~ 50 2~ 12 6c3 ~6 FF B7 a0 39 ~F 03 ~S 39 7F.a0 S5,CE ~0 lF 'E
65a 7i' 47 ~6 FF 87 a0 3S 7r 30 39 39 Bo aQ 39 Z7 F~
6~Q 95 co Z3 Fo =c0 EC ;? a0 3~ CE F? E7 OF cB CE ?F
65~ F3 DF Z7 CE FF EC QF c9 C6 FF F7 ~ 3C 7F aa 8s '~6~--7F-6~-~?-77FF-60-~c-336-~0-s2 ~i-dl-~6 0~ ~6 FF g~ -oZ0 34 BD 7B ;36 7F 3a 3D 39 CE F8 50 DF 2D 96 60 ~C ~ -ô98 Z~ 0~ _9__oa-39-dr-9~ ô~ 96 5r-_dC_Zl_~_Z~
6~a a3 3~ SF 39 7F ~Q 5F 96 5f 4C D6 E0 Z~ Z2 F6 80 6"a S2 C4 31 25 iB 81 03 Z7 0E ôl a~ Z7 Q3 9~ 5E 39 6C~ 7C aQ ;D 7F a0 SE 39 D6 5D Sl al 27 L7 9~ 5E 39 6Dd ~i ad Z~- 07 31 d~ c7 E8 37 5c 39 D6 5D Cl 0Z Z~
ocO 089; 5_ 39 7F ~a 5D C6 al D7 SE 39 ;F a0 SrE 7F'- ~~~
6Fa ~ _7F_~_3B_96_EI~_2R C15 S__E__FE_3F_C'3_3_, -, a~ s6 FF 9; 33 CE FF F6 Df c5 39 CE FF fF DF 19 CE - - .
71Q a~~8 DF iB 39 CE 00 00 DF i9 DF 18 8S FF 97 86 ;c3 3737 39 CE aa Oa DF lF DF ID ;E FF f6 DF 25 86 ,~.
~,3a~,-F~s7~,3~s7~as~7F~6~~dF~7?~6a~ïz~36~2Q~z4~~a~c-7' 7~0 E~ CE FF FF DF lD-`39 SF aa 6F al ~D Z7-18 Df 4D~
~_;~__-_FF__f DF_4F_DE ~D_E6 al D8 53 c7 01 ~5_00__9;
760 ~F ~Z ~0 ~ 26 Fl 39 o6 FF 37 00 37 Bô ~0 3C Z7 7,a 13 CE~ FF EC DF 2Z 39 B5 a0 3C 2~ 03 CE FF EC DF
__~J_;~ _37_ ~_-co__1_0d_ô4 a8_a0 3Z_ ~_a8_lcJ_0o ~ a aa CE aa Fa 3D J5 6a C_ oa FC 3D ~:~ 61 ~ 6a ag 7;tl~ ZD 0C F~3 ~3 96 5F ol 0C Z7 a3 3D 78 fl,q 39 ~sF E~7 ;30 63 ~5 ~B~ 60 Q6 F5 6~ 09 C~ OF 13 19 B7 6a 0~ Cc ~.~l'a~~7~c2~rô~~ja~09~C~~7Q~~~Oo~a~ ~2~~83~3D ~7 Da 7D0 53 c5 F~ 39 ~6 6a QO qB Qa 19 ~7 60 06 36 60 as Ca 1~9 Q~ 3~ sa ;~5 33 ô 6a ~s 2~ cl 0l z~ ac ~F~ 3~i 6a a6 ol 19 Z2 ag C;; 4a Sl) .~O_a 3; Oa ~ 3Y

\~ ~
6~

~4.4 ~

~aa 7C Oa os O~ 8F B7 63 0~ 33 B6 6a a6~zi-s9~cZ al .o-l~3-~9--c--0la-3o--~ce-~a-F7-5~-0~-co-8l-0c-09-~6-0~ ~9 83a 02 19 Iq7 04 ~1~ 2~i F5 F7 6~l 83 ~ a3 7C 60 03 CE
-~iSa-6a-1~Z-3,--o0~a0~F7~60~0Z~Co~al~89~86~9~3~l~a~al~i~' Oôa 01 S~ 26 o Co al aD as ,~6 aa ~9 az 19 ~7 04 SA
ô~;~~5f~~26~F6~Co~a~~~D~0~3~Cao~0~~~99~961~g99~~0~0~~~7~QO
3C~0 F5 86 &a 1~7 0C 2~ 07 CE 6a a3 C~ aa E;t a~a C~ e~.
O~a F6~87~60~a3~Fa6~O;~--F-s~Ca~-3Oa~29-~D-61~Fa~~6~~;F~~D~~
~C~ a7 F6 6e~ 01; 1~ cB 65~ 3D 7'o` lF 8D 75 FC 3D la F6 8c0 5D D6 Sc E~ D 78 F6 3~ 6a 3O 39 C5 24 3D 78 20 F6 oF~S 6a as BD ,'~ D5 39 18 1S~ Ag L~ lB 39 Bl~ 79 78 ~17 9la-F7-oa-ac--o-oE-a~-F7-oa-2as-39-8l-a7~-7g-5~7~-o6a-as q20 ZZ i3~ BD 7q ~f~ 39 8,6 12 3D ;'3 ~ 39 CEi Ss2 BÇI 7$
- 9~L0 3D 7g FC Bo 68 05~3B~al~l9~B7~5;~~005~08E~73--7CD--F~6-55a 60 86 BD 7~ za Z= :Z9 'ol S9 Z2 ZS BD 78 FC E~D 78 a60_DF___-a-aS-8DD--~9-a206-~9 - l6-44-4 ~ 44 44 C4 0F 39 9ô0 C6 40 ED 7.. ca 3D ;8-FC 7C 60 aS, BD 78 DF F6 6a 99~ ~5 r7 6 ~t_~D_79_0~_39--3-o~~a~~oZ ~1~ a4 z~ 1~ 96 9Ba 3S Z.4 ll ~t3 Oa l~-c~ 5.-~ lr:~L3 2~ as 5D ~C;Z5 9Ca----7~--a-l--7C-9-314-3-9-S~-2~--24-ED 3D ~_ S6 FE
9E9 B7 ô~ 11 39 4F Cc Q0 C~ E6 a0 2.4 a~ 4C CE 0~ C~
9F~ Eo a0 -a_~__aC-39a-`l~7-o~7-6~-a~--s-6--a~-B9-oa la B7 ~1'3 ô~ IO FE 5~ 10 ~6 O0 ac Z5 01 aD 3g Cc 7R 3F FF
~Z8 o0 l0 56_52_~3_3B_~6 da-377-o0-~F~?F~6~ 12 39 55 a~o Ra Fo a0 a~ 26 3E D~ 9~ 26 3S 44 4~ ~4 4~ 4~ CE
-~5a~~E~-aO~~DF-aL70--B~ -97~-i4-~4-8~ e--7~ -97---7-DE ~L
~7a 7; eQ 7~ io~ ~B FB 7B ~1 7B ~D.7B-7D-7B 83 7~ ~L
h~a 24 Sl la Z7 ~5-Sl---3-C-7-c-aô-~-F-F~9-~ 6-D6-~-3 6 ~d FF.D7 as CO ~6 ~7 ~C CE ~0 05 DF 5L 39 C6 FF F7 3a ~-~-''~''~'S~FD6~~~E3~c~~Z3~Co~r-F D7 ~o C6 ~c D7 ~D8 0D DF 51 16 4~L 44 44 ~4 ~_ 00 7~ 8~ ac 27 35 ag 7---0-a-D--.7-~c-c--Q-F-~ --Ec 27_s~_D6_~8_z~_D~
300 C6 ~2c la 2ca Cl Z~ 05 20 ca ~5 O9 2~ 3C 36 12 ~5 ~o-DF-51-39-2F-0ac 0~6-01-81-05 2c-c 6 9S 0c 31 d9 330 Z 80 96 0~ 91 05 2Z 42 C~ 0~ 09 DF 2D 96 92 57,:
~ A0 96 a3_97_5F_9F_~0~0__F_~o-~~97 6~ 97 5r 97 5 8Oa 9; SD 3; ~Oa aB 37 a~ 0C ~ ~a ~D 3~ 6a aE ,F a~
~~'50 898--AF0-~-4-~dQ--F--6~--2~ -97-3DD--E-~;~-8c-~-D-1E_B6 390 00 30 34 02 27 6~ o6 01 3? 3D 7E 77 0~ 36 Ig 20 ,_71_~D_,~ 6_:~_ Z~-3--~-;-ej'~~5al~9E6~'~.~~'2~ D'~~
BCa 7~ d0 33 36 30 ZO 3B ~3 ,5 O; 7F 0~ 33 ~6 50 Z~
_~D~-3l-g-----3z~D-4~06-330-~-7l~-c--~F-F7-d~-96-c--FF D
3rb FF 0a ~F 36 rF 97 0~ ,F ~0 30 39 30 ~O 35 FF 9~

.

7~G~

- 45 - .

C0Q a9 39 ,6 3D a7 32 20 ~ ~6 FF 20 06 96 31 ~3 .3 18 ~8 , ,2 ~1 ~6 ~9 oZ_8~ ~31 27_9~_~6 '1_Z9_~
CC3 ~6 35 2A 35 3O ~a o? 84 34 ?7 13 B6 Oa 3F 27 ~9 C,~ 81 ~h 27 2~ O1 55 26 oa 8D DZ 86 E0 2a 33 5D CC
S4a 4, CE_a0 a0 RR 3E 5D C~ ~3 ~6 3E 13 13 48 43 a8 C52 3C 00 Q3 ~5 Ef 7F oa 35 39 20 5E 96 09 23 SE 3D
C6~ ;3 6~ Z~ 55 O6 03 37 50 1; 36 70 8D ~S 17 8D R2 C~ 1C Fr 60 ~ ~ FE O~3 C4 F~ 60 2Z 39 D6 al D7 61 4F
c~a 9~ ôz 9~ ~3 8O a~ C~ 2O 7~ a0 O~ ;9 a8 63 4~ 2~
CRO 2, D6 62 D3 64 D7 6Z 4D 26 EE 96 62 36 00 1B 15 C~a-o6-3c^lQ-cr-3a-2D-~ c~~ 7~~,~36~as~27~aD~7Fa0~as~
CC3 86 33 3D 7C 12 86 01 7E 7C 12 7 7C as 36 Q0 3E
c~a c~ 3E 3~ ao 5Z ~ ac 2~-34 B6 6a a~ $4 3Z 31 aa c_~~~4~=c~~c4-3ô-~o-a~-4~-44-4d~-44-s~-a~-43-26-l3-3ô
CF3 Oa ô2 O4 04 2~ 13 EO 50 aF C-7 15 81 ~R 27 12 81 rea_'a-_26_~_86~-i3_20_a3_,'F_a0__5_Z_,7Z_2~_~F_~a 3 D'~3 39 4F CE ~0 ~oa ~ 3E FF Oa 18 16 BD 7D ~Q C4 ED
D2a F- 63 18 a3 ~6 3E a8 48 48 48 as ~c 0a 36 26 E5 D-Q 7F oa 95 FO 60 0C 36 60 aB BD 78 ~6 16 BD _ 7D 8~
D4O F5 OO ~E 35 60 ~D BD ,O FO 15 BD 7D 8R FE 6a =CO
D5a FF 60 1r FE 60 24 FF 60 22 36 00 82 84 a4 ~5 03 DS~ 7~ 77 a~ CE FF FB 3D 7, ~D 39 FE 6~ 2~ 27 19 0g D7a FF 60 24 F- 60 1r C6 aa 8C 6~ a6 26 35 CE 6~ 2~
DD~ Z3 01 a8 FF 60 lC OD 39 ac 39 ,D 60 CO 26 29 FE
s~a Oa 2a a3 r, 6a c-a zc 6a 2a~_~ aa O6 FF B7 6a z~
DnO OC 66 05 CD ~5 CE O0 2R Z0 O~ a8 FF Oa 20 BC 60 DBa lr~ ~6 97 86 FF B7 60 C-S 0C 39 9D 39 0e Qel 99 00 Dc~_aa_~a_Q~ _Qo__0_~s___~s_~a_d__~0_a0_0 ~a aa ~a o~ aa-~v-~0 ao d0 a0 Q8 ~a a~ aa a~ aa~aa DEa ao a0 a0 aq.~.s~-aa 0a aa aa-:a0 a0 Oo 0a a0 a0 2Fa ^a ao a0 ~a o0 aa o0 ao a0 3a 00 00 aa aa 08 aa Eala--0~-0~-~a-~u-a~--ae-~a 0~~00~~0-ola--aa-a0-~0--a~-o~
E1~ a~ a~ 00 ~ O~ ao aa ~a a0 a~ a9 0~:9~ a0 0a 9Q.
C~D a3 aa aa aa aa ~Q ~a a~ ao aa aa Qa aa 0~ ao a~
~c ~ a~~0~00~00-o-a-0~-0-a--aQ-~o--Qs-~0-0~3-~o-a~--d~--3-a E~a oo o0 aa 0'3 00 aa aa oa 3~ aa oa.a0 ao 3a 00 00 Er~_oa_l~_a0_a0__0_~3a_0~_~a0__a_~a__~,al3_0la-o0 v~a ~
E50 aq a0 aV~ aa a0 v~0 I)0 QO V~ 9~ aa aa 0~ aa aQ-la0~
E,0 oa 0~ 0a 0~ 00~a0 aa ~d ~0 a~ ~0 v0 ~0 ~a ~0 0~
E~a aQ a0 Qa 00 0a a0 oo-ao ~a aa ao a~ aa_a0 ao a0 ,~c~a~aa~~va~a0-ao-a0-~v~-v0-^va-ao-a-va-2-a-a~v-a-a o~~aa~s0 E~a 00 V~ ~a 00 00 ~0 a'3 a0 00 aa.aa O0 ~a o0 a0 oe ~-r~ _s_____~_0~__0_00-~a--0-a--sQ-aa--0-0--tl~ aa_ ~CO Q0 a~ a0 ~o Q0 Q0 ~Q ~ Q9 00 a0 aQ 00 ~ oa ~
E~a aa ~a aa a0 0a aa a0 a0 aa 3~ a0 a~ ~0 v0 0a ao ^- O QO aa aa a0 aa 00-o0 0Q 3a a0 a0 a~ 30 ~Q oa a8 ~r ~~~va~~3~a~~0a~30~~v'~V~~3~0a~~3~~~v0-3o--3~-`3a-~-0-~0-t~3 OFf~ ao a0 faa 0a ao afd ao a0 ao 90 00 a0 0fa va a0 00 '.rf'a~aQ~~ad~f~0~a~~a~~000~~qa~0~~0a~~d~09~q~a~~a~~00~~aa~~
~F~a aa 00 a9 a0 a0 0a a0 a0 aa 0a a0 30 aa a0 ao a~
~ a aa aa aa a0 aa a0 aa aQ aa aa a0 oa a0 d0 da aa F-.^~af~~v~0~fd~~f~0~f~a~s~~f~~a0~Q0-aa-a0-0~-f~0-f~0-oa--a~
F-~ a~ aa a~ q~ a0 aa ~a ~fd ~f~ ~v0 0~-0q a0 a0 00 af~
F7a ~Q Q0 a0 9a ~a 0Q Q0 a0 a0 a0 Qa d0 00 aQ aa 09 --FD-~-~d-a-aa-a0-~v-vo-v~d--va-~-v-a-a0-ao-~o-a-a-fd~-ov--a0 F~a fd~ a0 oa ao a0 aa aa 0fd a0 aa aa aa 30 ~0 aa o0 _f~Q_~a__Q_~0__e~Q__Q_3a_a~_aa_30 ~,~_a0_^0_0f~_ r^9 aa afd a~d ~d0 a0 aa aa fd0 a0 a~da aa a0 ~d~ afd as F.a o0 ae QQ 00 fd0 oa a0 Q0 ~ds f~)Q ae Q~d 00 ~0 o0 as . a aa o0 ae aa fd0 ao aa ~a aa a~ aa aa a0 ~a a0 ~v0 ~,-- ~~a~v~0a~af~~f~~aQ~a~d~v~~~v~ao~va~f~a~3av-ldQ-~0-ld~a-0~
Fr3 aa ao aa ^va a0 oo a0 a~3 ,~ SD ,a Of3 ;1 O~ ?a ~df.~

Appendix B
(c) Copyright 1982 Rusco Electronic Systems -- a di.yision of Figge International, Inc. -- all rights xeserYed~
00 gE 0~ 7F 7F 00 ~ 26 FF E7 00 ~ FE 40 2E ~ i2 1~ 34 27 ~C CE 0~ ~0 4F ~7 ~0 0~ ~C_~ 64 2~ F3 C
,0~~4~~0~~6F~~0~0~~~C 7~ 00 c~ F CL 41 c0 FF 4~ 3 3~ FF 40 32 FF 4~ 34 FF 4~ 36 CE 12 34 FF 4~ 2~ CE
4~ 0~ GF 00 ~ ~C 4~ 2E 2l~ F~ FE 40 ~ ~C ~ ~c 27 ~3 FF 4~ 32 FE 40 34 ~C 40 3~ 27 03 FF 4~t 3 ~ FE 4~ 3~ ~C 4~ 3~ FF ~ 5 ~D 7~ 7 ~ FF B7 40 cl ~c ~F ~ 0 9G 27 ~
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -0~_ ~D_~3 3~_2_ F_ c6 Fc_~F ~ ~e~ ~D 71 F~ ~ ?~ 26 1~ wE ~D 73 36 24 F1 ~iD 51 ~D 77 ~2 ~ 0~ c~ E~
7~ F2 ~D 73 36 2I Ed 2~ DE 7E 7el 0~ CE 4d e~l ~6~
3~ 6~ ~7 ~e? t~ e,~ 4~ F~ ~3 et3 ~ t~
~e~ 3~e,~ 3~,~c~~r~FF~~~ ~~F~~~3~cE~a~~~c~~r~
5~ C ~lel ~4 ~ F~ FF C~ ~tt~ t~ , ~ FF
~d Fr Z~ F~ _ ti~4_3~ ,-c_~~ _5_ _ t~t~__7 CE F~ ~ DF

_ _ _ _ _ _ ~ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ._ _ _ _ _ _ ._ .... _ .. .... _ ._ _. _ ._ _ _ _ _ _ _ _ _ .
3F ~ ~t~ 7F ~d ~ ~ 5E ~4 t~4 ~
E ~6 SE ~4 03 D6 3h C4 t~3 11 ~Ç 11l ~t, 5F ~ 0F
3 ~ 15 ~ iZ ~ 4 ~ 4 ~ E~
5 c~ 0~ CE FF EC 7E ~t; E~ ~:` Ft~ -L; f i Ç~ ~-E ~7 40 i5 3~ 7E 7e~ FC ~6 23 2~ ~F 36 30 :'sl ~t4 ~ 6 FZ i~
,r0 ~H FD E~ 7E 4~ 25 0~, F 00 ~ ED 7~_i5 .~E f~
~`0 ~D 7~ 3i ct~ ~3 4F CE Qd de~ r F 4d ~E iÇt ~
, el 71 C4 c4 2C FE ~t3 ZE O ~ ~3 4^j i is ~ 4^~ Ci C
0'0 d~ 0Ç c6 E~ ~F F6 4~ 2f ~D f' 1 C4 F6 4~ 0E E~
1~ 71 C4 FE~d 3~ FF 4d 4 FE 4d 31~ FF 4~1 3;~ ~D 39c~ 7F ~1~ c 33 FE ~1~3 3flCf i3 tJ3 FF 4d 3~ FE 4~; 32 3!~ 5C6F FF 26 05 CE 4l 2~ 2d ~ ;f~r3 FF ~d 32-4~ 33 dC39 7 ~ 4Ci 3r2~i 29_FE 4d_3h_C1i's FF ~ 3;i 5t~3 FE 4el ;!6E7 dt~ 1~i FFE`7 4d ~E ~C 6F FF L-'r:~ er CE
ht~ 4i 2~ cdt~l ~1 FF 4~ 36 EC 43 3c c6 ~Jf ~ i FF 1~7 f ~ ~ t3 3 C r~ 9 r~ 3 ~ 9 6L ~ L ~ L- cf_ ~ L ~ 3 c r 3 L 4 9 ~ c r c ~ .~. f r 5 r - 4 _ ~ ~ F .~ _ c r~ 2 r~
r;~ i Lt ~ F ~ F .' ~
. C )~ L, '`. -- F F ~i .~ .~ ~ ~ ;~ - _ _ ~ ~ ~ r _ r.- ~ `E ~ll~l -C~ ~ 4 ~ ?_'~ F~
." - I, L i~l f , 5 F l- ~ F ^,i F
"3r j; 13~3 t~ l . rj ~ rl 11 r I -- ~.1 c 1~,1 -t 7 ~ ~;1 4 Lr Cl~
-E4-L--ç-F 7 3 ~ 4 n 2~ r~r ~ 1 I r~ i 7.~ E~ E
, r ~ f, E ~ f ~ - F ~ - f ?

~47--00 72 B4 D7 I)6 E8 El E0 Dl D0 D4 70 7F 00 2f~ 7h 00 10 0f~2h 2E 86 ~7 97 0h 96 0~ 26 14 96 04 27 22 7F
20 00 04 9~ 0~; 97 0~ 86 09 97 02 7F 00 81 20 12 7Q
30 00 02 27 09 96 0~: 97 81 76 00 08 20 04 86 FF'~7 40 ~1 9~i 01 27 61 96 03 27 32 2~ 41 43 27 15 7~ 0~

60 00 03 3B 7~ 00 0B 26 4D 7F 00 03 96 C6 2~ 2F 96 70 05 26 42 73 00 ~5 96 09 97 07 3B 96 C6 2E 36 86 _____ ___ ____________________________________ _____.
0el__03_ _ 0B 8 _01 _7 _3 81~ 0 97 09 3B 95 C6 2~ 0E
7~ 00 0B 26 20 86 FE 97 .03 86 08 97 0B 3B 86 8~-~
97 0B 7F 00 01 3B 96 C6 2Q F4 7f~ 00 0B 26 06 73 30~ 00__1 7F 00 03 3B 0C 96 05 27 15 36 07 7F 00 05 54 39 96 25 27 15 2fl lD 43' 27 08 8D 37 25 20 7C 00 39 8D 2F 25 14 7F 00 25 39 8D 13 24 ' i0 97 31 7C 0 Zl 25 39 8D lD 24 EE 8D 33 g6 FE 97 25 39 4F
00 CE 04 E0- E6 04- 2~ 0~3 4C - 08 81 14 26 F6-' 0C- 39 97 ' ~
31 0D 39- I~:E~-04 E0 DF'-56- ' 96' 31 9B 57 97 57 ~C 00-- -' ~0 S9 56 97 5~i DE_56 P~6 00 0C 2B D3 0D 39 CE 73 F5 30 DF 56 96 31 9~ 57 97 57-' 8~i~ 00 99 56 97 56 DE 56 40 ~6 0l3 84-0F`-~1-=0~-'27--- 16 .-~1 0B 27 17'D6' 44--~l7 45-.-.;----'-' ` -50 D6 43 I:7 44 D6 42 -D;i 43 97 42 7C 00 30 39 86 ' FF

30 7F 00 2E 39 ~h 07 04 01 0F 0F 0F 0F 0B ~g 06 , .
a0 03 0~ 08 45 ~Z 86 FF`97- 80 97 B0 7F ~0 B0--`~ 7~
51 7~ 00 4F 26 Z9 BD 75` 60 ED 76 7F B~ 76 ~D BD
7g B6 BD 75 FF BD 78 87 8D 16 ED 74 ~8 8D 31 BD
74 h4 BD` 75 20`BD 75 92``BD 77-56 86 lE 97 4F
1~ 96 80 84 04 27 19 96 20 `27 ~E 2~ 13 43 27 1~:96 E7 2B 0C 86 FF 97 20 39 96 E7 2h 03 7C ~0 20 39 ~6 29 27 i6 2~ 20 43 27 09 96 E6 ZB 20 86 FF 97 ~0 ~9 39 96 E6 2B 23 7F ~0 _2_ 3 _ 4 97 2~ ~6 E6 2h 00 0_ 8_ 01 97 29 39 _6 E6 2B 04 7F_00 29 _9 86 0i;
37 2~ CE 00 33 DF 54 CE 7Z 6B DF SZ-BD 73 E3 86 FE 97 Z9 39 ~6 82 C4 01 27 12 96 00 27 0F 2h 1~
43 27_1`7-B6_6~ 07 2~ ----`~-FF-~7 00 39 5F D7 28 4~ ~6 68 ~7 2~ ~ C6 ~ 7 ~ 39 ~ ~g 0~ 2~ 0~ 5F
D7 00 39 C6 FE D7 00 39 CE 40 00 C6 07 F7 40 lQ
FF 413 18 7h 40 1~ 2E_33 h6 00 27 16 2h_lF_43- Z7 0:CI EE 01 f~6 ~2~3 ZE 16 FE 40 12 ~:56 FF h~ 00 0~ 56 00 20 10 EE 01 ~6 0el Z~ F6 FE 40 18 6C Q4~ 0C 5li 20 10__01 54_FE_40_1~_08_08 _2_- 7E 74_E0_54____40_15_39 Z~ 91~ 8~3 8~ ~0 27 33 96 21 27 11 2P~ ~3 ~3 27 3~ 6 C2 2B 2C 86 FF 97 21 7F l~0 24 39 96 C2 2~ lE 96 _0 82 84 10 27 07 96 Z4 Z6 03 8D 0F 39 DE i~ 26 0F
CE 00 18 96 60 4C 48 7E 77 36 CE 00 00 DF i8 39 96 80 84 20 27 20 9G 26 27 1;5 2~ 43 27 08 96 Cl Zh 13 7C 00 26 39 9~; _Cl 2~q 10 7F 1~~ 26_39 96 f ' 6~3 -48- .
00 _Ci 2E 03 7C 00 26 39 96_ C~ 2B F0 86 FE 97 26-7E
1~ 76 E4 96 82 84 10 27 11 96 2D 27 0E 2~ 0B 43 27 0g D6 CZ ZE 04 86 FF 97 ZD 39 96 C2 2~ FB 9Z 24 26 F7 7C 00 2D 39 CE 00 EC 8D 30 97 61 CE 00 E0:
40 8D 29 97 60 CE-08 E4 $D 2c 97 SE CE 00 E8 8D lB
CE 00 F4 8D 17 97 5F CE 0~ F0 8D 0F CE 00 FC 8D
0E 97 63 CE 00 F$ 8D 03 97 62 3~ 4F E6 03 59_49 E6 Q2 59 49 E6 0i 59 49 E6 00 59 4~ 88 0F 39,CE
0~ 0Q 00 6D 0C 27 23 6C 0D c6 lF 6C 0C 26 lB DF 56 Z0 4E DE 4E EE 00 ~D 00 DE 5~ ~g 48 8C 00 14 26 D2 39 76 45 76 72 76 B7 76 8C 76 ~5 76 C3 76 EC 76 D9 76 D4 76 DE 86 FF 97 24 96 22 81 01 27 10 $1 FE 27 0C 96 6i 26 0F 96 E6 2~ 17 86 FF 97 2B 7F
6Q 00 86 7F ~0 87 39 7F 0~ 86 7F 00 87 CE 0~ 0E 7E
77 36 96 22 $1 01 27 5B 81 FE 27 57 7E 76 F~ 96 00 2~ Z7 50:96 E6 2B 4C 7F- 00-2B 20 E~ 96 ~1 26 0C
'0 96 E6 Z~ 11 86 FF 97 2C 7F` Q0 85-39-;7F`-`0_ ~5--CE`~
00 14 7E 77 36 86 FF 97 $5 7F 00 2C 39 ~..2C 27 22 9~ E6 2B lE 20 EE 86 FF 97 $4 39 7C ~0 21 7C
00 2D 39 96`80=$4 40 27 .Q~ 86 FF~97 27 ~D 78 71 7F 0~ 2Z.~9 86_FF.97 $3-.39 86 FF--97-$2 64 B7 6g 08 ~9 CE FF FZ DF-- 0C CE 00 Q~DF.0E~ 10~
~Q 96 8~ 84 20 27 03..7F 00 84 39 C-E-~0-00-DF--0c-DF
______________ ..
00 0E DF 1~ 86 FF 97 ~6 ~7 87 4F 97 24 96 60 4C 48 lQ CE 00 10 2Q 21 86 FF`B7 40 2~-96-g~.84~10 2~1 5.~
-20 CE 00 00 DF_12 DF-14.CE-- FF FE- ~F-12-9~-~7.-c7~25 30___E_F_ EC_DF_i2 39 6F 00f 6F 01-4D 27 i8-~F~.5~--CF--~40 FF _C DF 5G DE 5~-~6--01 D~-SD:E~=~l-E6-Q0._D9.`5 5Q E7 00 4~ 26 Fi 39 7~ 40: ?~ 2~ 46 $6-14 B7 40 ~
B6 40 26_26 3C B6 40 29 ~B 01 19 B7 40 ,9 ~-l 60 f0 26 2F g6 02 B7 f40 29 B6 44 23 ~E 01 i9 ~7 40 28 0~ 16 C4 0F Cl 05 26 03 F7 40--21--81-60 26 13-7F 4 28 E6 40 Z7 $B 0i i9 E7 40 27. 81 24 c6 ~3 JF 40 2~ Z7 39 F6 40 25 26 3~ 44 44 44 44 48 CE 77-Cl DF
50 9E 51 97 5i ~6 ~0-99 50 97 50 DE 50 EE -00 ~E
00 7g E~ 7g-~6 7`g-9~.7g- D9 7~ 96 77 15 76 E4 78 96 7g 2E 7g 42 78 SD 7~ 69 7g 78 7~ 9G-78 BS 7~
C6 F6 40 ^cc 26 lB g4 0F 26 13 ~6 FF B7 40 27 ~7 40 2$ B7 40 26 B7 40 cl 4_ ~7 40 25 39 B7 40 22 00 39 C6 FF F7 40 26 FE 40 23 ~7 00 08 FF 40 23 7~
40 22 26 i9 CE 40 lE ~6 00 ~7 4~ 27 ~6 ~i B7 40 c0 2~ ~6 02 ~7 40 29 4F B7 -4~ 25 E7 40 26 39 B~ -78 E5 96 82 ~4 0C 27 19 C6 01 F7 40 16 ~6 FF B7 40 17 39 BD ~2 ES 96 ~ ~4 ~C Z7 05 86 FE B7 40 1~
- 50 3~ BD 78 E5 96 ~0 84 0~ 27 3C 7E 77 15 B~ 7g ES
96 ~0 ~4 08 27 30 7E 76 E4 8D 7~ 96 80 ~4 08 27 ~0 25 86 FF g7 2^c-7E-76 F~ - gD 6B 96 80 ~4`08-27 16 00 86 01 97 22, E 76 E4 96 80 ~4 01 27 09 96 62 84 84_02_2__21_36_01_B7 40 lD 4F B7 _8 0g 96 61 CE
30 00 lE 7E 77 3l~i ~D 2E 96 82 84 02 27 08 4F E~7 68 4008 ~.C B7 *0 lD 39 8D lD 96 82 ;34 0c 27 F7 86 55 50_~7_40_1D 86 FF 1~7 68 08 39 ;~6 FF E_ 40 25 CE 40 lE FF 40 23 39 86 ï0 7E 7~ 2F 01 96 20 c7 3E 2B
08 73 00 20 86 8~l 7E 7~ 0~ 43 26 2E 7F 00 20 2~
00 8l~ 7E i~ 0D l~E 18 'c6 4 i 96 2D 27 3D 2B 0C 73 0~l 2~ 86 80 BD 73 42 86 40 7E 73 42 96 'c'l 27 D6 c~ 0B
73 00 21 73 00 2D 86 2l~ 7E 7f~ 0D 43 2l~ C6 7F 00 2D 7F 00 21 ~6 1'2l 7E 7~ 0D B6 40 16 81 ~1 26 0D
7F 42l 16 86 $4~ 1:D '3 42 86 $1 7E 73 42 81 FE 26 0D 7C 40 16 86 84 BD 73 42 $6 82 7E 73 42 96 82 84 0C 27 69 B6 40 l~i 26 li4 CE 40 00 C6 04 96 82 ______~_ ____________________ _____________________.
00 ~:4 08 2;7 02_C6 07_F7 40 lB_5F 7~ 40 1 ~3 2B 2C 5C
i~i 00 27 22 2B 0E ~;3 00 ` 4F l~t 36 86 $0 BD 73 42 32 7E 73 42 43 26 0F 6F 00 86 41Z lB 36 86 g0 ~D
73 42 32 7E 73 42 08 08 08 20 CF B6 40 17 27 lD
7F 40 17 86 80 13D 73 42 ~;6 20 BD 73 42 E6 40 lC
5~1 84 7F D6 82 C4 08 26 57 84 0F 7E 73 42 96 22 27 ~0 13 ZB 07 73 00 22 g6` 40 20 23 43 ~ 37 7F ~0 ~2 ,0 86 30 ~0 19 B~i 40 lD 81 01 26 07 86 FE B7 40 lD
00 20 11 81 55 26 2C 86 FE B7 40 lD 20 0F 36 8D 19 10 32 20 lC 86 ~0 1~1 73 ~2 ~;6 40 20 13 81; ~0 ~1: 73 20 4c 86 44 20 0f~ 86 FF 2 zl 06 96 81 48 48 48 48 7E
30 73 42 96 28 2~ 51 96 SE 84 04 c7 21 96 5E 84 03 40 D6 3f:~ C4 03_11 Z6 11 96 5F 16 84 0F 91 3~ ;~6 2l8 50 54 S4 54 54 Dl 38 27 05 CE 00 00 I~F 38 96 80 ~4 60 02 26 66 96 80 84 01 Zli 71 8D BE 4F CE 00 00 P~
33 3D_EC 08 h6 33 48 48 48 4;3 08 8C 0Q08 26 EF
7F 0~ 28 39 7E 7h 25 BD 71 h4 24 Zh ~i 03 137 40 1~ 2D 86 70 BD 73 42 17 BD 73 4Z B~l 71 ~4 17 BD 73 42 7h 40 2D 2h F4 7F 40 3C FE 40 32 FF 40 30 FE
3h FF 40 38 39 B6_40 21 27_C!3 86 3~ El: Y3 42 86 01 BD 73 4Z 7F 40 ~1 39 96 2E 27 B7 8D 9h 96 43 48 48 48 48 9h 42 7E 73 42 96 23 21i 813 96 30 81 04 26 h0 86 50 BI) 73 42 8D 12 133 7B 44 Z5 07 70 8D Z0 6 F0 7E 7h 6C 8D 38 4F 7E 7h 6C CE 00 0~;
00 h6 33 hl 3B 27 03 7F 00 2F h7 3B 0g ~C 00 01 2G
EF 39 96 81 84 40 27 18 7C 00 ZF ~6 62 44 84 07 4~ !31 2F 21~ 0~3 7F 00_$2 _7F_00_2F CE FF C4 DF 1~
39 g6 ~1 84 2~ 27 0C 96 2E 27 08 7F 00 33 CE FF
C4 DF iC 39 8I) 20 7F ~0 58 CE 0~ 00 ~6 46 DF 50 97 59 DE 58 h6 33 D~ 50 ~1 42_26 ~$ ~8 8C 00 04 2~ Eh 0D 39 ~C 39 96 63 44 44 44 44 44 97 32 4F
Cl~ el4 CE '30 4h 91 32 c6 01 4C ~7 el0 0~ 4C 5h 26 0el ~F4 :7F 00 5$ 96 ~3 44 44 ..-44 84 03 97 59 DE 58 ~6 10 4~q 97 49 43 h7_4~_96 63 44 $4 03 97 59 DE 58 P~6 2 Zl 4f~ 2~q 01 43 97 48 43 fV 4~ CE 00 49 08 f~6 00 2B
30 FB 97 47 08 ~6 00 2B FB 97 46 36 63 84 01 27 08 50 ~0 0~ 00 ~0 00 ~0 el~ 00 00 00 00 1~0 ~0 ~1~ 0~ e,0 60 00 00 ~ 0~ 00 ~ 00 00 00 00 0~ ~0 00 00 00 00 70 1~0 00 00 0 21 00 el0 00 e~0 00 el0 01~) 00 00 00 00 i.00 _________________________________.___________________ 00 130 el0 0el ~0 00 `~0 ~0 00 Q~ 0el Q0 el~ 00 10 0~ 0 00 el0 ~el 0t~ 00 00 00 00 00 00 00 00 00,0 20 ~0 e,0 00 00 00 00 0Z1 ~0 . ~)0 00 00 00 0~ ~0 00`~0 0__0____ _~_0~____~a_~0__0 __~ 0 00__~_00-~
41a 00 ~0 00 00 00 00 00 ~0~1~ 00 00 ~? 00 ~30 00 00 5~ 00 0~ 0~ 00 Q~ 01~ 00 0000 00 ~ 0el1~t0 0el 00 ~i~3 00 0e~ 0~ 00 0~? 0~) 0~ 00l~8 00 013 _0 ~
7~ ~0 0~ 00 130 ~0 0000 00 012l 0~ 0 1~0 ~0 0el el0 ~ 0~1 0la 00 ~30 00 00el0 ~ 0 ~4 0el~0 00 00 ~ 00 0ZI el~ 00 00 ~0 0~ 0~- ~ 00` 00`-00 00 00 ~10 1~0 0~
20 00 00 0~3 00 00 00 00 00 00 00 00 ~0 l210 la0 ~30 00 130 00 00 012, 00 00 ~1~ 00 ~10 0~1 0~ 00 0~ 00 e~0 0~
4~ 00 00 0el 0~1 0~ 00 00 1~0` ~00 00 - 0~ 00 00 `~ 00 e~0 00 00 01a 00 00 ~ 0e~ 0 00 00 ~a~ 0 00 ~0 l~i0 ~0 130 0~ 00 ~0 el0 0ei 00 0~1 0~ 00 0~ 00 00 el0 00 70 00 '~1 0~ 00 00 00 013 el0 00 00 00 ~0 00 ~0 00-` 0~
_________.___________________________________,______ 00 ~_00 00 00 00 00 0~ 0~ ~0 ~ 0~ ~ 0~ ~ 0~. 00 10 00 00 Q~3 00 ` 00 0~1 00 ~0 ~0 ~a 0e~ 0~ 00 0~` 0e~ e"3 0elZ10 0~1 00- ~ 00 01a 120 0e~ 00 e!l~ 00 el0 1~0 1~0 ~
~0 h~?00 00 00 00 00 00- 00= 00 00 00 00_00 _` _~__0 w0 ~0 00 00 00 0el- 00 el~ 00 00 .1~0 00 el0 0~,,,1~0 ~!~
~ 00 00 ~0 00 00 ~ a 00 ~ 0~ 00 ~0--00 0~
~0 00 ~4 00 00 00 ~0 00~0 ~et 04 00 00 ~0 0~1 00 04 4~ 0g 00 00 ~30 0~ 130 00 04 00 0~ 0e~ ~0 0el e10 ~0e~~0~~~0~0~~00~0~--00--00-~0-00-00--00-e-0-00--00 30 ~0 e~ 4 00 00 330 00 06 00 00 0~ 00 ~0 1~0 00 21~ 00 ~ 00 00 00 0~ 00 00 ~0 00 00 4~ 00 00 00 00 30 00 ~0 00 00 00 0~ 0~ 0~ 0!3 el0 00 00 0~ 00 00 4~ 0~ 0~-0a ~0-00- ~0 0~- 00 00 00 00 0~ 00 00 50_ _4_~,0____0______0_4~ __00_00--~-~--a~--0-0-~
6~ 00 0g 00 ~0 00 ~ 00 ~ 00 04 ~ 0i~1 00 00 0~ ~0 70 00 00 e~ 00 ~0 00 00 0~ 00 00 00 00 00 0~ e~0 ~0 0~ 0~ 00 0~1 ~0 ~30 ~ ~0 ~ Q 00 0~ 0i~ 00 0~
0!~ ~0 el0 00 0~ 00 ~ 0000 ~_ 0~ 0i3 00 00 00 00 0~ ~0 00 ~e, 00 0~ 00 0g ~ 00 ~ 00 0~ 00 00 012 00 00 00 00 ~ 0~ 0000 ~0 ~0 0~ ~0 00 0t~ 00 4~ 0 1a0 0~ 00 ~ 00 ~0~0 00 ~e~ 0~ 00 00 ~ 00 5~ ~ 00 0~ 00 00 01~ 00 0001a 00 00 00 40 ~.0 00 00 ~;0 ~ 0 1~13 00 00 130 013 i~000 0~ 00 00 00 00 ~0 ~0 1~0 ~ 00 ~0 ~0 ~30 00 130Q0 00 ~0 ~ 00 i~0 ~10 00 ____________________________________________________.

71~

~0 00 0~-00 00 00 00 00 00 00 00 00 00 0~ 00 00 00 10 ~10 00 0000 00 00 00 00 0000 00 00 00 00 ~10 ~10 20 00 00 0001~t ~10 00 0000 0000 00 ~0 00 ~0 ~0 0~
30 0el 00 0000 00 00 00 ~0 0000 00 00 00 ~0 00 0Q
~0 00 0~ ~000 00 00 ~0 00 0000 ~0 00 ~0 00 ~0 00 50 Ij~ 00 0000 00 00 00 0~ 0400 01~ ~0 e~0 00 00 00 ~;00h 00 0000 00 00 00 00 0000 00 00 00 00 00 00 0 e~0 0000 ~ 10 00 0000 0000 00 0~ ~0 ~0 ~0 ~0 00 ' 00' '~0 ~0 0~ 00 00 00 00 00 00 0~ 00 0~ 0~ 00 10 00 00 00 01~ 00 00 0a_00 00 00 00 00 00 00 00 00 00 00 00 00 00 ~30 ~.0 0~ 00 ~el 0~ 00 00 00 0~ 00 el0el0 00 e~l3 00 00 0~ ~0 ~0 0~ 00 00 00 00 ~0 00 4~ 00 00 00 00 00 00 ~0 ~0 00 0~ 0e~ 00 00 ~0 ~ 0 ~0 00 01~ 00 013 00 00 ~~0 00 ~e~ 00 0~i ~0 1~0 ~0 00 ~ 0 01~ 00 00 00 01~ 00 ~t0 ~0 00 00 00 ~0 00 1~0 00 00 00 00 00 00 00 00 0~ 00 ~13 00 ~0 ~0 ~
~0 00 00 00 0~1 ~0 0~ 00 0~ 00 0~ 0 00 03 0Q 00 0~a00 0~ 0~ 00 ~0_00 00 0~ ~0 00 00 00 ~0 0 2~ 00 00 00 00 00` l~e~ 00 00 00 0Z1 0t~1 01Z~ 00 ~ ~0 0~
:~:0 00 ~0 013 00 00 00 0e~ 00 0~ 00 ~ 0 0~ ~0 ~ 0 00 00 01~ 00 0~ 0~ 00 ~0 0el 00 00 00 00 ~ 0 00 0el00 00 00 00 ~0 ~10 ~0 el0 00 0~ 00 ~ 0~ ~0 ~i0 00 00 00 00 0~ 00 ~(3 00 ~0 Q0 00 ~ 0 ei~ 2!0 ~0 00 00 00 00 00 00 00 00 74 05 70 00 ~2 ~B 70 00 . . .

``
r~

Appendix C
(c) Copyright 19~2 Rusco Electronic Systems -- a divislon of Figge International, Inc.--all rights reserved, ~00 ~E 0~ f F f F 00 ~0 ~ FF~ 00 ~0 CE ~0~ 00 4F h, 08 ~3C ~1~ 64 26 F8CE 6~} ~ '. F ~-~ q0 ~$ 8C t~
~2~lE :'~ F~ El: 70 5E 8rl55 E~ 7Ç~ F4 ~E 7F 13~ 6 03~2.7 2~ ~.7 E~D .7c 41~ Z4F4 2~; FZ .7F ~ g~ D 71 ~4;~96 Gf 2i; ~IE E~ ~2 4Rc~ Fi ~D ~0 1~ ~6 ~2 ~ E
~S~Z~l E~ 70 ~4 E~D ~24~ 24 E'~ 26 ~E2!2!P~2 CE 6~
050~1 8~i 68 Q~ ~0 0~ ~S08 8C 60 i6 c6 F6 t33 03 ~6 ~ 4~ C 5F FF ;~1~; F5 ~ 9I~ E ~?~3 ~?C
6F ~ ;C el~ 6~ F~ ,r~;j FF ~i E e~ 6 ~1 0!~ ~6 FF FF c6 F~ ~D 04 36 ~E f~l 5~ ~F Ç~l~ c~ CE FD
$ ~ 3 ~ ~ & c ~ ~ n ~ 1 ~ S ~ ~ 4 ~ ~ 7 ~ i 8 0E0 S4 02 2fi 35 ~C ~?i'3 S~ 0i c6 3(d ~F 0~ 2~ 36 5E ~4 0C~? Q4 ~ 0E ~!~ 5E 84 0~ D6 3~ C4 03 l l ~6 l S q6 5F
F--9 1--~ 9--;~ ~ ~' r ~ d, ~ , 4--~ 1--3 5--~
0E~ CEFF El 7E 75 F ,5 -c 76 c~ !6 c3 2 6 CC ~!Ç 3~1 $F0 ~104 2E~ F5 Fi~ f-3 15 ~D ;;;3 SC c5 09 7F 00 c~ ~D
10~ ~ ~ c6 f-E i-~ ~ n ~3 ~3 20 t~ ~ 2~ 2~ ~E 2~ ~C
110 56 10 3i, ~D 2S 32 ~ r.~E 52 08 rlF 52 2~ F4 F~ ~0 120 E~ 51 C4 lt~ 2~ 0i 4~ ~4 t~F ~E 54 ~ ~Q
i30 ~5 ~F 54 5t~ ~t~ 3B c~ t~4 56 FF ~ 3~ 7F 00 c~
1~:0 39 ~E 52 ~6 00 43 CE ~0 E~ ~ 00 i,~ t~ ~C 00 E8 150 26 F~ 08 ~3 44 ~q 25 Fr 0F ~6 FF q~ 2~ 6F t~t? ~1 i6;~ 01 0i 0i t3i F5 03 t'~ ~6 c.~ J6 0E i~ 0F CE 0t? E0 4 t~ C e~? E~ F.~ ~ 411 ~ ?t-`4 5~
76 E~t~ E4 E 3 ~4 ~d E2 ;; 7 E5 ;; 5 119 c ~ 2 E'i ~ q 19~; 7i i~73 7;~ ~ 1i7 i)6 E~ El E~l 1!1I~t~1~4 7ei ~F
1 rit3t~3 cfi ~ .R t~Q '~fl crî ~ E ~6 t~ tZ~ 2& 1 ~r ~t ~ i l ~Q t~4 2~ 2 ; Ft~t? t34 ;~i t~ 9,. t~ 0Y 9~ t3c ~ F Qt~ ~1 t' t? ~ 1 2 (~ q ~ 0 ~ ~ ~ t~ t~ ~ t;~ j 1~ t~4 3~ FF 9.~ 7 ~ 2~ ~2 2~ 41 4 7 1~; 7~ t~ ri t~ 7 t~ C~i ~9 ;~ t~!t~
1 F ;3 ~a 9 2 ~ 5 & ;- t- t~ t~ ;~ 3 ~ t3 t3 t3 ~ 2 ~i 4 ~ 7 F t3 t3 t3 ~Q~ C6 2~1 cF Q6 05 ~ 2 ,~ 3 ~0 05 9~i09 ~7 07 3E~
21Q t-~i 2E: 35 &L~t~3 ~ f ~3 &~ t~ ~ t?~q 3~
~c~ ; 2~ 7~ ~w ~ ct~ -E c~ ,r ~j t~ ~ ;' ".
23t3 t~E~ 3 E ~6 `d 0 9 7 e!~ 7F 0 ~ t~!1 3~ 9 ~; t-1~; 2 P~ F4 7f~i t~lt3 ~43 2;3~ 2t-. t'J~ t3t2; t31 -F t~ 3~ t71~ 9~ f 15 ~t;
Z 5 :3 t~ F '~10 t3 5 t~ 3 6 -F ~ S t3 ~6 ~4 .6 FC ~
2~13 Q6,73 0t3 i34 39 q6 5 ~ 1 5 24 1 11 43 27 0g ~D 37 2 ~ ~ ~ SC Ç ! ~1~ t~ !2 5 ` ~ 2 ,C C S i 4.7 F (;~ t~ ~ S ~ 9 ~ 1 1 3;
2 ~ ;: 2 ~ 3 17 C ~ ; C 5 j~ ~ ~ C; ~ C ~ r E d ~1 :3 3 ~ L- F C
3 3 4 rC~ E ;a 4 E ~ E ;; t~ ,r; ~ C t~ 1 4 c: Q
2:n~;t F6;?1- 3:~ ~7 31 133: 33_fE ;t4 Et3 ~:F 5& ?6 31 9E ~;7 q~ 5, ~ 9q 5~ q_ C~; ~E C~ C ~ E~ DJ 3D
~ C i~ 3 ~ ~ ~I r! F ~ r, ~ ~ i 9 E 5 ~ 9 ~ 5 ~ ~ 5 ~ Q 9 ~ ~; G
2~: 9~ S~ C 5~; Q5 ~Q ~3 ~F ~ c,7 1L~1 QE~
2E~ Dt~ 44 1I ~i 4~ D~ ~3 D; ;4 D~; 4~ ~7 2E~ 3;~ 39 ~ I-F 9,7 2E 3? t~ 3 ~i 4C t-~9 ~ FF FF
r~ F J F ~ 3 r F ~ E 3~q ~ 9~ F ~F ~F
x 310 0F 0~ 09 0603 0iZ 08 05 02 86 FF97 ~30 97 B0 7F
32~3 ~0 E0 BD 7265 7~ ~e, 4F 26 26 B~:74 71 B~ 75 g0 330 BD 75 BE ED74 C7 ED 75 1 l~ BD 76F4 8D 13 BD 73 340 E9 8D 2E E~D73 B5 E~D 74 31 ED 74f~3 ~6 lE 97 4F
350 3~ 96 ~ ~404 27 1 ~ ~!6 20 27 ~ 2~ 1 3 43 Z7 1 0 360 96 E7 22 0C86 FF 97 20 ~9 96 E~72~ 03 7C 00 20 37~ ~l996 29 2716 2~ 2~ 43 27 09 ~6E6 213 20 86 FF
3~e~ 97 29 39 96E6 2B 29 7F (~l~ 29 3Y4F 97 28 96 E6 3~el 2~ e~c 86 ell~7 2~1 3~l 96 E6 2B 047F 0~ 29 3~1 ~6 3f~0 ~ 7 2~3 CE00 33 DF 54 GE 71 7FDF 5Z BD 72 F7 40el 27 0D EE ~ 6 0~ 2B 16 FE 60 1~ i FF ~ 0~1 ~D
410 56 2la 10 EE~1 ~6 00 2~ F6 FE 6~18 6C 0el 0C 56 420 20 ~1 54 FF 6~ 18 0~ 08 ~8 7E 73 Fl 54 F7 60 lS
4 ~ 39 9~ g~ ~4 ~ 27 39 ~ 21 27 11 ZQ 33 43 27 3 440 96 C2 2~ ZC ~ FF 97 21 7F 00 24 39 96 C2 2~ i~
_50_96 ~2 84 10 Z7_07_96_2__26_0~_$D_0F_3~_DE_1__26 46Q 0F CE 00 18 96 60 4C 48 7E 76 42 CE ~0 ~ ~F 18 47Q ~ 80 84 2~ 27 20 ~6 2~ 2~ 15 ~ 3 27 ~
480 96 Cl 2~ i3 7C Q~ 2~ 3~ 96 Ci 2~ 10 7F 0~ 26 ~9 490 96 Cl 2B 03 7C 00 26 39 9~ Cl 2~ F~ ~6 FE 97 2 4~ 7E 75 F~ 96.~2 ~4 10 27 11 96 2~ 27 0E 2~ 0~ 4 4B0_27_0 _D6_C2 2~Q 4_8~_EF 97 2D 39 9~ C2 Z~ FE 96 4C0 24 26 F7 7C Q0 2D ~9 CE 00 EC 8D 30 ~7 6i CE ~Q
4D0 E0 8~ 29 97 60 CE 0~ E~l 8D 22 ~7 5E CE 0~ E8 ~`
4EQ lB_CE_00_F4 8D i7 97 5F CE Q0 F~ gD 0F_CE_0~_FC;
4F0 $~ 0B 97 63 CE 00 F~ 8D 03 97 62 39 4F E6 03 59 "`
5~ 49 E~ ~Z 59 49 E~ 01 59 49 E6 00 59 49 $$ ~F 39 51~ CE 0~ ~0 6D ~C 27 2~ 6C ~D 26_1F 6C 0C 26 1~ DF
52~ 56 D6 57 CE 75 42 DF 4E D~ 4F D7 4F ~6 00 D9 4E
530 D7 4E ~E 4E EE 0~ ~D 0~ DE 56 0g 0g 8C 00 14 26 540 D2 ~9 75 56 75 83 75 C8 75 ~D 75 ~ 75 D4 75 CD
55~ 7S ER ~5 E5 75 EF 8~ FF 9~ ~4 9~ c2 ~1 01 Z7 1 560 81 FE 27 0C 9~ 61 26 0F 96 E6 2~ 17 86 FF 97 2~
S70 ~F_0Q g~ 7F 0~ 87 3~ 7F 00 ~6`~F Q0 ~7 CE 00 ~E
5~0 ~E 76 42 96 2~ ~1 01 27 5B 81 FE 27 57 7E 76 ~
590 96 2B 27 S0 96 E6 2~ 4C 7F 00 2~ 20 E6 96 61 26 5Q~_~C_96_E6_2Qil_86 FF_97_ C_7F~ 5 39 7F 0~ 85 5~ CE ~ 14 7E 76 42 ~ FF 97 85 7F 0~ 2C 39 9~ 2C ~r SC0 Z7 22 56 E6 2~ lE 2~ EE 86 FF ~7 ~4 ~9 ~C 0~ 21 5D0 ~C 00 2~ 39 96 ~0 84`4~ 27 0~ 8~ FF g7 27 ~D 7~
5E0 ~E 7F 0~ ZZ ~ ~6 FF 97 ~3 39 36 FF ~7 ~ 3Y ~6 5F0 FF ~7 ~ 0~ 39 CE FF FE DF 0C CE 00 00 DF 0E DF
60~ 1~ Y6 30 ~4 Z0 Z7 0_ 7 00 ~4_~ E_00_00_DF_0C
61~ DF 0E DF 1~ ~C FF 97 86 97 ~7 4F 97 24 36 6~ 4C
620 4~ CE 0~ 10 20 iC 96 ~0 24 10 Z7 15 CE 00 00 ~F
6~0 12 DF 14 CE FF FE DF 12 ~6 27 Z7 25 CE FF EC DF
640 ~ z ~9 6F 00 6F 01 4D 27 1~ DF 5~ CE FF EC DF 5C
650 ~E 5~ E6 01 D~ SD E7 01 E6 ~0 D9 5C E7 00 4~ 26 6~ Fi ~9 44 44 44 44 4~ CE 76 7C DF S~ 9~ 51 g7 51 ~70 ~ 0Q 9~ 5~ ~7 5~ ~E 50 EE 0~ 6F 00 77 4~ 77 03 6~ 77 03 77 03 77 03 76 2~ 75 F5 77 03 75 9C 7~ B0 6~0 76 CB 76 D6 76 E5 77 09 77 2Z 77_33 ~ 77 46 96 .

~z~

6h0 82 84 0C 27-19 C6 01 F7 60 ~6.86 FF B7 60 i7 ~9 6B0 ~D 77 46 96 82 84 0C Z7 05 ~6 FE ~7 60 16 39 BD
6C~ 77 46 96 80 84 08 27 3B 7E 76 26 8D 79 g6 80 ~4 6D0 08 27 30 7E 75 F5 8D 6E 96 80 ~4 08 27 25 86 FF
6E0 Y7 22 7E 76 ~B 8D 5F Y6 80 84 08 27 16 86 01 Y7 6 0_22_7E ~5_F5 96_80 84_01 2J_09 ~6_~2__4_01 2__04 700 7F 00 2~ 39 86 FE 97 2~ ~9 8D ~B 96 ~Z ~4 ~Z Z7 710 21 86 01 B7 60 lD 4F B7 6g 0~ ~6 61 CE ~0 iE 7E
720 76 42 8D 22 96 a2 84 02 27 08 4F B7 ~ 4C B7 730 60 lD-~9 8D il 96 22 84 02 27 F77 ~6 55 B7 60 lD~
740 86 FF ~7 68 08 39 ~6 10 7E 78 ~0 01 96 20 Z7 3E
750 2~ 0~ 7~ 00 20 ~ ~0 7E 7~ ~E 4~ 26 2E 7F 00 20 760 ~6 80 7E 7~ 6E DE lg Z6 41 96 ZD 27 3D 2B 0C 73 770 00 2D 86 80 B~ 72 56 4F 7E 72 56 43 26 2C 7F
720 2D 26 20 BD 72 56 26 40 7E 72 56 96 21 27 D6 2~
790 0B 7~ 00 21 73 00 2~ ~6 20 7E 78 6E 43 26 66 7F.
7~ 0~ 2D 7F 00 2i 8~ 10 7E 78 6E ~C 60 16 81 01 26 7~ ~U 7F 6~ 16 ~6 80 ~D 72 56 86 81 7E 72 56 ~1 FE
7C0 26 0~ 7C ~ 16 ~6 ~0 E~ 72 56 86 $2 7E 72 56 ~6`
7~0 ~2 84 0C 27 69 ~6 60 1 ~ 26 64 CE 60 00 C~ ~4 96 7E0 82 84 0~ 27 02 C6 07 F7 60 lE 5F 7~ 60 lB 2E 2C
7F0 SC R~ 00 27 22 2~ 0E 6~.00~4F~i~ 3~ ~6 ~0 ~ 72 ~00 56 32 7E 7Z 56 43 26 0F 6F 00 æ6 4~ lE 36 86 ~0:
810 ~D 72 _6 32_7E_7Z 56 08 08 08 2~ CF ~6 60 17 27~
~20 1~ 7F 60 17 8~ 80 ~D 72 56 8~ 20 ~D 72 56 ~6 60, S30 15 84 7F ~6 8Z C4 ~8 2~ 57 ~4 0F 7E 72 56 ~6 22:
g40 27 1 ~ 2B 07 7~ 00 22 g6 40 2~ 23 4~ 26 07 7F 0~:
50 22 ~6 30 2~ 19 B6 60 i~ 81 ~ï 26 ~7 86 FE B7 6~
~60 lD 20 11 ~l 55 26 2C ~6 FE B7 6~ lD 20 0F 36 ~D
~70 19 32 2~ lC 86 8Q ~D 72 5~ ~ 4Q Z0 13 86 8Q ~D
~80 72 56.86 44 Z0 0~ ~6 FF 20 06 ~6 81 48 48 4$ 48
8~0 7E 72 56 ~6 2~ 2~ EF ~6 5E $4 04 27 21 ~6 5E 84 ~0 ~3 D6 3~ 64 03 11 2~ 6 5F i 6 ~4 ~F 91 3~ 26 8~0 ~8 54 54 54 54 Dl 3~ Z7 05 CE ~0 00 DF 38 Y6 80 8C0 ~4 02 26 21 ~6 ~0 84 01 26 2~ ~D BE 4F CE 00 00 ~0 ~ ~3 8~ 6 ~3 4~ 4~3 0~ ~3C 0~ 05 ~6 gE0 EF 7F 00 28 3~ 96 2E 27 9D gD 3F ~6 43 48 48 4g gF~ 4~ 9~ 42 20 9E~ 96 2~ Z6 Dl g6 ~0 ~gl ~4 Zf~i ~7 g6 ~00 50 8D $D gD 10 ~D 7Y 5C 25 06 8~ 1 E ~6 F0 20 ~D
~10 ~D 37 4F 20 B~ CE 00 Q6 ~6 3~ Ri 3B Z7 ~3 7F 00 920 ZF ~7 3~ ~9 ~C 00 ~1 26 EF 39 96 ~1 84 4~ 27 1 ~30 7C ~ 2F 96 62 44 84 07 4C 91 2F Z6 0B 7F 00 g2 ~40 7F 00 2E CF FF 64 DF 1~ 3~ ~6 81 84 Z0 27 0C 36 950 ~E 27 0~ 7F 00 ~3 CE FF C4 DF l C ~9 ~D 20 7F
960 58 CE 00 00 ~6 46 DF 50 97 59 DE 58 ~6 33 DE 5 970 Rl ~2 c6 0~ 08 8C 00 04 26 ER 0D 39 0C 39 96 63 98~ 44 44 44 44 44 97 32 4F C6 04 CE 00 4~ 91 32 26 ~0_~i 4C_~7 ~ 08 4C 5Q c6 F4 7F ~0 5~ ~6 6~ 44 44
9~0 44 g4 0~ 97 59 DE 5~ ~ 4~ g7 4g 4~ ~7 4h 96 6 9B0 44 84 0~ 97 5Y DE 5~ ~6 4~ 2~ 01 43 97 43 43 ~7 9C0 4R CF 00 49 08 R6 ~0 2B FB 97 47 0~ R6 00 2~ FB
. _ _ _ _ _ _ _ _ _ _ _. .. _ _ _ _ _ . _ _ _ _ _ . _ _ _ _ _ .. _ _ _ .. _. _ _ _ .. _ _ .. _ _ _ _ _ _. _ _ ~2~B6B

--5.5--9D0 9i 46 96` r6:~ ~34 0i 27 0~ 9-E~. 4-7 D6 46 97 46 D7 47 9E0 :~9 00 00 0~ 00 00 00 00 00 00 00 00 00 00 00 00 ~F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ~0~ 00 00 00 00 00 00 0~ ~0 00 00 00 00 00 00 00 00 ~10 1~1000 00 00 00 00 00 00 00 IZ10 0e~ 00 00 0~1 01ZI 0Ç~~20 00 00 ~ 00 00 ~0 00 00 00 00 0~ 00 00 00 00 '~0~00-0~~0~-0~~00-~-0~-00-~-0~-0~-0~-00--0-0-a0-00 P~40 ~0 00 0~ 00 0~ 00 00 00 00 0~ 00 ~ 00 ~0 0~ 00 P/50 00 0~ 00 00 00 00 00 00 00 ~30 00 40 00 00 00 ~0 ~;0 00 00 00 00 00 00 ~0 0e) 00 00 00 ~ 00 00 00 00 0 ~ 00 0~ ~ 00 00 00 00 ' 00 00 ~0 00 0~ 00 0~ ~0 ~0 ~0 00 ~0 00 00 0~ 00 0~ 00 0~ 0~ 0~ _0 00 ~0 ~00~ 0~ ~ 0~ 0 ~000000~ 0~ 0 ~Q0 00 00 00 4~ ~0 00 00 ~0 00 00 0~ ~ 0~ 1a0 00 00 RC0 00 00 00 00 00 00 00 00 00 00 00 0~ 00 00 00 00 ~0 ~0 0~ ~0 00 00 00 0~ 00 00 ~0 00 0~ ~g 00 00 ~0 ~E0 00 00 00 00 00 00 00 00 00 00 00 00 00 0~ 0~ 00 hF0 00 00 00 00-00:00-00 00--00 ~0-00-00-00-00--~0 00 ~00 0e~ 0e~ 00 00- 00 el0 e,0 ~0 0e~ 00 0~ 3 - 0~ -0,0 00- 00 E10 0__00 00_00_0 Q0__0 Q00_00__0__0_00____00____00 0 00 0e~ ~ 00 ~0 01~ 0~ 1~!0 01~ 00 ~0 00 00 ~0 00 00 00 00 00 0~ 00 ~0~ 00 ~0 0~ ~0 00-~0:, ~0 -0 ~40 ~ 0~-~0 ~0 ~ 0~ ~ 0~ 0~ 00 00 0~
~50 00 ~ 0~ 0~ ~0 ~0 00 ~0 00 00 ~0 0~ ~ 0~ 0~ ~0 E60 ~0 00 00 00 00 00 00 00 00 00 00 0~ 00-00 00 00 0 ~ 0 ~ 0 0 ~ 0 ~1 ~ 0 el 0 0 ~ 0 0 1~ 0 e~ 0 0 B~0 ~0 00 00 00 00 . 00 00 00 00 00 00 00 00 -00-00 00 ~0 B0 0Q 00 00 00 00 0PJ 0Q 00 00 00 00 00 00 -00 00 B~0_00 00 00 00 0~ 0QJ - 00_00 00 ~0 00_00 00 00 00 00 0 0 ~ 0 1Zt 1~ ~ 0 @! 0 e~ ~5 1 0 - 0 0 0 ~ ~ 0_ .0 0 - ~ &~ 0 0_ 0 0 ~ce~ 0 ~1~ 00 00 ~ 0 e!l~ 0~ 0~ 0el ~10 0~
B~0 0000 00 00 00 00 Z10 00 ~0 00 00 00 00 00 01ZI 00 BE0 0e~ 00 00 00 00 00 00 00 00 00 g0 01~ 0Q 00 00 00 BF4 00 00 00 00 00 00 00 e!0 00 00 00 00 00 00 00 00 c0~ 0~` 00 ~ e ~ Q 01~-0~
C10 ~0 0~ ~0 00 0~ 00 ~0 ~0 00 ~0 ~ 0~ 0 00 00 C~ 0~ 00 ~0 00 Q0 0~ 00 ~ 0~ 00 0~ ~0 0~ 00 0 C~0 ~ 0~ 00 00 0~ ~ 0~ 0~ 0~ 00 ~0 0~ 00 00 00 ~0 C4~ 0~ 00 0~-..00 0_ ~0 0~ 00 ~0 ~0-.00. 00 0~-00 00 ~0 C~0 ~ 0 00 01~ 01~ ~0 00 00 ~0 ~0 00 ~ 0 1~0 ~0 ~0 C6~ ~ 00 ~ 00 0~ 00 a~
C7~ 0 00 ~0 0_ ~ 0 0~ 0~ 00 ~0 ~ ~0 ~
C~0 ~0 00 00 00 ~ 00 00 ~0 00 00 0~ 00 00 ~0 00 0~
CY0 00 00 0~ 00 00 00 00 Q0 00 ~0 00 0~ 0~ 00 00 00 C~0 00 ~ 10 00 el0 00 00 00 00 ,0t~ 00 0_ 00 ~ 0 C~ 0~ 0~ 00 ~ 0~ 0~ ~0 ~0 ~0 00 0~ 0~ ~
ccei 1~0 0~ 00 00 00 ~0 0~ ~ 00 00 ~0 0~ 00 00 00 00 C~0 00 00 00 00 00_44 00 00_00 0Q 00 00 00 00 00 00 CF0 00 00 00 00 00 00 00 00 00 00 00 00 00 0g 00 0 0 00 1~ 0 1~1~ 0~ ~0 00 ~ ~0 0~ ~ 00 00 01~:
. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. _ _ _ _ _ _ _. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ... .

Dl 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1: 30 00 00 00 00 00 00 0~ 00 00_00 00 00 00 ~0 00 00 r~40 00 00 e~0 00 00 00 00 00 00 00 00 e~0 00 00 ~0 0 D50 00 00 00 00 00 00 00 00 00 00 00 00 0~ 00 00 00 1: 60 00 Q0 01~ 00 00 00 ~0 1~0 0~ 00 00 ~0 0,~ 00_01~ 00 ~70 ~0 00 ~ 00 00 00 00 00 00 00 00 00 00 00 ~0 00 ~ g ~0 00 013 00 00 00 00 00 00 0el 0~ 0e, 00 01a 00 0~1 D90 00 00 00 00 00 00 00 00 00 00 00 0~ 00 00 00 00`
D~0 ~0 00 00 ~0 00 00 0~1 00 00 00 00 00 00 00 0e~ 00 ~1~0 ~ 00 00 ~0 00 ~0 00 00 Q1~ 00 ~ 0 ~0 00 0 DC0 ~1~ 0~ 01~ 1~0 0e 00 0~ 0_ 00 00 00 0~ 0~ 00 e~ 0 DE0 00 ~ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 DF0 00_00_00 00 00 00 00 00 00 00 00 0el 0 Zl 00 00 00 E00 00 00 00 00 g0 00 00 00 00 00 0e~ 00 00 00 00 00 Ei 0 00 00 00 00 Q0 00 00 00 00 Q0 ~0 00 Q0 00 00 0el E20_Q0 00_00 00 Q0 12 0 00 00 00 00 0~ 0g 0Q 00 00 00 F30 ~0 00 00 00 00 00 00 00= 00 00 00 00. 00_00~ 00_ 00 E40 00 00` 00` 00- 01~ 0121`- 00 00 00 00 00 00 00 00 Q0 !~4 E50 00 00Q0_00 ~t0_00__Q00_09_00 00__0-_00 00_00 ll E60 00 00 00 00 00 00 00 00 210 00 00 0~ 00 00 00 00 E70 00 00 00 00Y 00.- Q0_00. 0e~. 00 00 .00. .e~0.. ~0. 0~ 00 0e E~ _00 00 00 00 00 00 `00. 00 00 00: -00 0b- 00-00 ~0 `0Z~
E90 02~ 00 00 00 00- 00 00 00 00 `~0 ~0` 0el el0`-00 ~0 -00 ER0 00 00 0el 00 00 00 00 00 0~1 0el 00 0~ 00 00 00 00 E1~0 0121 00 00 ~0 0el 00 00 00 0e! 00 00 00_00 00 00 00 EC0 00 00 0~ 00 00 00 00 00 00 00 04 :0~ Q0 ED0 00 00 00 00 00 00. 00 00 00 00. Ç!!0:- 00 00 00~ 0g ~0 EE0 00 00_00 00 g0_00 00 00 00 00 . el0 0el 00 00 013 00 F00 00 00 00 00 00 `00 ~00 00 00 Q0~ ~00` ~00-~ 30 00 00-- 00 F10 00_00 Q0 00 00 QQ 00 00` 810 00 Q10 00 0el 00 00 0e F20 00 00 00 00 00 0g 00 00 00 00 00 00 Q0 00 00 00 r ~0 00 01~ 00 00 00 00 00 00 00 00 00 0ia 00 00 00 00 F40 1Z!0 00 00 0_ 0_ _0 00 00` el0 00`00 00 04 00 00 00 F70 00 00 0Q 1~ Q0_00 0Q 130 00 00 ~0 0~ 00 00 00 iZ~
F~0 00 00 00_ 00 00 00_ 0~ 00 00 00 00 00 00 00 00 00 F90 00 00 00 00 00 00 00 00 00 00 00 0~~00 ~00~-0g~~0 F~0 00 00 00 00 0g 00 00 00 00 00 00_00 00 00 0 Zl 00 F~0 ;~0 00 0~ 00 0Q 0~ 00 00 00 00 00 00 01a 0e~ 00 00 FC0 0g 00 00 00 00 00 00 00 00 00 00 00 00 ~ 00~.~00 - 00 FE0 00 00 00 00 00 00 00 00 00 0e~ 00 00 00 00 0~ 00 FF0 00 00 00 ~0 00 00 00 00 73 19 7~ 00 71 9F ?0 00

Claims (38)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A card reader for use in a security system having a central controller which communicates with said card reader, said card reader comprising:
a memory;
means for reading data stored permanently on cards;
means for evaluating data from the cards independent of the central controller, and for selectively permitting access to a controlled location in response to the evaluation of the data from the cards, with the card data remaining unchanged on the cards;
means for receiving signals from said central controller;
means coupled to said receiving means for sensing when communication with said central controller is lost; and means responsive to said sensing means for storing said data from said reading means in said memory during times when communication with said central controller is lost.
2. An apparatus as defined in Claim 1 wherein said central controller periodically polls said card reader and wherein said sensing means senses when communication with said central controller is lost by absence of polls for a predetermined time.
3. An apparatus as defined in Claim 1 further comprising means for keeping the local time at said card reader and for synchronizing it with time kept by said central controller.
4. An apparatus as defined in Claim 1 wherein the means for permitting physical access comprises authorization means coupled to said reading means for granting or denying access to a controlled location based upon data read from said card.
5. An apparatus as defined in Claim 4 wherein said storing means includes means for inhibiting storage of data from card reading transactions when authorization is denied.
6. An apparatus as defined in Claim 1, additionally comprising:
means for determining whether said memory is full; and means for inhibiting said storing means when said memory is full.
7. An apparatus as defined in Claim 6 further comprising means for authorizing access to a controlled location in response to data read from said card, wherein said authorization means includes means for ignoring data from said reading means when said storing means is full.
8. An apparatus as defined in Claim 7 further including means for determining the time of day, wherein said storing means stores the time of day with said data from said reading means when said card is read.
9. An apparatus as defined in Claim 8 wherein said authorization means includes means for generating a first signal when authorization is granted and a second signal when authorization is denied.
10. An apparatus as defined in Claim 1 further comprising means for transmitting the data stored by said means for storing to said central controller when communication is restored.
11. An apparatus as defined in Claim 10 wherein said central controller polls said card reader, and wherein said means for transmitting transmits data for one card reading transaction from said means for storing at the time of each said poll from said central controller.
12. An apparatus as defined in Claim 4 wherein said card contains a first portion of data and a second portion of data and said authorization means includes means for granting or denying authorization based upon one of said first and second portions of data only.
13. An apparatus as defined in Claim 12 wherein said means for storing, stores the other of said first and second portions of data only.
14. An apparatus as defined in Claim 13 wherein said means for storing includes means for storing the local time at the time said second portion of data is read.
15. A method of operating a security system which controls access to a location and which includes a local card reader and a central controller which communicate to limit access based on card data, comprising:
reading data stored on a card;
evaluating the data from the card independently from the central controller;
permitting access to a controlled location in response to the evaluation of the data from the card, with the card data remaining unchanged on the card;

sensing at said local card reader for inablity to communicate with said central controller;
storing card data at said local card reader during periods of inability to communicate;
transmitting stored card data from said local card reader to said central controller when communication is possible; and receiving control signals from the central controller.
16. A method, as defined in Claim 15, additionally comprising:
storing the time of day with said card data at said local card reader.
17. A card reader as defined in Claim 1, further comprising:
means for controlling whether data from the reading means is to be stored in the memory during times when communication with the central controller is lost; and means for controlling whether access to the controlled location is to be permitted when communication with the central controller is lost.
18. A card reader as defined in Claim 1, further comprising:
means for monitoring the condition of devices external to the card reader; and means for generating data indicating the condition of the external devices for transmission to the central controller.
19. A card reader as defined in Claim 18, further comprising switch means for electrically connecting the card reader to additional external devices in response to signals received from the central controller, wherein the additional external devices may comprise such things as alarms or emergency signaling devices.
20. A method of operating a security system as defined in Claim 15, further comprising the steps of:
maintaining local time data at the card reader; and synchronizing said time data with the time kept by the central contoller.
21. A method of operating a security system as defined in Claim 20 wherein the step of synchronizing the local time comprises keeping the local time offset from the time at the central controller by a predetermined amount.
22. A method of operating a security system as defined in Claim 15, wherein the step of storing card data comprises the steps of:
sensing a control condition indicating whether data from the card is to be stored at the local card reader when communication with the central controller is lost; and storing said card data when the control condition indicates that said card data should be stored.
23. A method of operating a security system as defined in Claim 15 wherein the step of permitting physical access to a controlled location comprises the steps of:
sensing a control condition indicating whether access to the controlled location is to be permitted when communication with the central controller is lost; and providing a signal which permits physical access to the controlled location when the control condition indicates that such access should be permitted.
24. A method of operating a security system as defined in Claim 15, further comprising the steps of:
monitoring the condition of devices external to the card reader; and generating data indicating the condition of the external devices for transmission to the central controller.
25. A method of operating a security system as defined in Claim 24, further comprising the step of electrically connecting the card reader to additional external devices in response to signals received from the central controller, wherein the additional external devices may comprise such things as alarms or emergency signaling devices.
26. A card reader as defined in Claim 1, wherein the security system includes a plurality of said card readers, and wherein the central controller and each card reader are electrically connected so as to each define an electrical communication system, each said card reader further comprising means for sending the data read from the card to the central controller at a time controlled by the electrical communication system associated with the card reader.
27. A method of operating a security system as defined in Claim 15, wherein the reading step comprises reading data stored on cards inserted in the card reader with read cycles initiated at a rate determined by frequency of card insertions at said reader, and wherein the transmitting step is performed at a rate determined by the card reader and the central controller.
28. A method of operating a security system as defined in Claim 15, wherein the step of evaluating data from the card comprises comparing data from the card with authorization data provided in the card reader, and wherein the step of permitting access to a controlled area comprises generating an authorization signal when the compared data corresonds to said authorization data.
29. A card reader for use in a security system having a central controller and a plurality of said card readers, wherein the central controller and each card reader are electrically connected so as to each define an electrical communication system, each said card reader comprising:
a memory;
means for reading data stored permanently on a card, wherein said data is organized on said card so as to define first and second data segments;
means for storing data read from said cards in said memory;
means for sending data from said memory to said central controller at a time controlled by said electrical communication system;
means for receiving signals from said central controller;

means for selectively permitting access to a controlled area in response to said signals from the central controller;
means for storing at least one authorization code;
a local buffer;
means coupled to said receiving means for sensing that ability to communicate with said central controller is lost;
means for comparing a selected one of said first and second data segments with said authorization code;
means for granting or denying access to said controlled area independent of signals from the central controller in response to said comparison of one of said first and second data segments with said authorization code, while said ability to communicate with the central controller is lost;
means for storing the other of said first and second data segments in said local buffer during periods when said ability to communicate with the central controller is lost;
means coupled to said receiving means for sensing that said ability to communicate with the central controller is restored; and means for transmitting the data stored in said local buffer to said central controller at a time controlled by said electrical communication system, when said ability to communicate with the central controller has been restored.
30. A card reader for use in a security system as defined in Claim 29 wherein one of said first and second data segments comprises authorization data for comparison with said authorization code, and wherein the other of said first and second data segments comprises identification data for storage in said local buffer.
31. A card reader for use in a security system as defined in Claim 30, further comprising:
means for providing data indicating local time at said card reader; and means for storing said local time data in said local buffer when said other data segment is stored in said local buffer, thereby storing in said local buffer identification data relating to the card and a representation of the time at which a transaction involving said card occurred at the card reader.
32. A card reader for use in a security system as defined in Claim 29, further comprising means for sensing when said local buffer is full, and preventing further access to said controlled area while said buffer is full.
33. A card reader for use in a security system as defined in Claim 29, further comprising means responsive to a user selected operating option and also responsive to said means for sensing that said ability to communicate is lost, for prohibiting access to said controlled area while said ability to communicate with the central controller is lost.
34. A method of operating a card reader in a security system having a central controller and plural remote card readers wherein the central controller and each of the remote card readers cooperate to each define separate electrical communication systems, and wherein each card reader has a memory and a local buffer, the method comprising:

reading data stored permanently on a card inserted in a selected card reader, wherein said data is organized on said card so as to define first and second data segments, with read cycles initiated at a rate determined by frequency of card insertions at said reader;
storing data read from said cards in said memory;
sending data from said memory to said central controller at a time controlled by said electrical communication system;
receiving signals from said central controller;
selectively permitting access to a controlled area in response to said signals from the central controller;
storing at least one authorization code;
sensing that ability to communicate with said central controller is lost;
comparing a selected one of said first and second data segments with said authorization code;
granting or denying access to said controlled area independent of signals from the central controller in response to said comparison of said data segment with said authorization code, while said ability to communicate with the central controller is lost;
storing the other of said first and second data segments in said local buffer during periods when said ability to communicate with the central controller is lost;
sensing that said ability to communicate with the central controller is restored; and transmitting the data stored in said local buffer to said central controller at a time controlled by said electrical communication system, when said ability to communicate with the central controller has been restored.
35. A method of operating a card reader in a security system as defined in Claim 34, wherein one of said first and second data segments comprises authorization data, and wherein the other of said first and second data segments comprises identification data, said step of comparing a selected one of said data segments with said authorization code comprising the step of comparing said authorization data with said authorization code, and said step of storing the other of said data segments in said local buffer comprising the step of storing said identification data in said local buffer.
36. A method of operating a card reader in a security system as defined in Claim 35, further comprising the steps of:
providing data indicating local time at said card reader; and storing said local time data in said local buffer when said identification data is stored in said local buffer thereby storing in said local buffer identification data relating to the card, and a representation of the time at which a transaction involving said card occurred at the card reader.
37. A method of operating a card reader in a security system as defined in Claim 34, further comprising the steps of:
sensing when said local buffer is full; and preventing further access to said controlled area while said buffer is full.
38. A method of operating a card reader in a security system as defined in Claim 34 wherein, in response to a user selected operating option, the method includes the step of prohibiting access to said controlled area while said ability to communicate with the central controller is lost.
CA000435405A 1982-08-27 1983-08-26 Card reader for security system Expired CA1207868A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US41226982A 1982-08-27 1982-08-27
US412,269 1982-08-27

Publications (1)

Publication Number Publication Date
CA1207868A true CA1207868A (en) 1986-07-15

Family

ID=23632328

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000435405A Expired CA1207868A (en) 1982-08-27 1983-08-26 Card reader for security system

Country Status (3)

Country Link
EP (1) EP0105594A3 (en)
JP (1) JPS59108141A (en)
CA (1) CA1207868A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2960085B1 (en) * 2010-05-12 2012-08-17 Cie Des Alpes SYSTEM FOR CONTROLLING ACCESS TO A SITE

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3969584A (en) * 1975-01-17 1976-07-13 Cecil John Miller System for recording the actuation of remotely located locking devices
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4270043A (en) * 1979-03-13 1981-05-26 Kronos Inc. Methods of and apparatus for time clock recording and computation and related uses

Also Published As

Publication number Publication date
EP0105594A2 (en) 1984-04-18
EP0105594A3 (en) 1986-01-15
JPS59108141A (en) 1984-06-22

Similar Documents

Publication Publication Date Title
US4538056A (en) Card reader for time and attendance
US5475378A (en) Electronic access control mail box system
US4816658A (en) Card reader for security system
US7323967B2 (en) Electronically-controlled locker system
CA2083850C (en) Interactive network for remotely controlled hotel vending systems
US3742453A (en) Automatic hotel security system using coded magnetic card
US3866173A (en) Access control system for restricted area
EP0137767B1 (en) Improved card reader for security system
GB2383167A (en) Access control system having tenant codes that may be selectively displayed
GB2188468A (en) Time clock system
US6111502A (en) Method and device for keeping watch over premises by having differing activation times of sensors
EP0104767B1 (en) Card reader for security system
DE10250135A1 (en) Access control system in seamless communication with personnel management systems and the like
CA1207868A (en) Card reader for security system
US4544832A (en) Card reader with buffer for degraded mode
CA1207869A (en) Card reader for security system
JPH06185249A (en) Access controller
JPH0288859A (en) Systematized control for entering or leaving room with ic card
AU569030B2 (en) Improved card for security system
JPH02239365A (en) Locking/unlocking controller
JP2572506B2 (en) Access control system
AU2007231667A1 (en) A method of implementing anti-passback control in a partially connected physical access control system
JPH03103582A (en) Decentralized entrance/exit control system
WO1998054676A1 (en) System for control and surveillance of access and alarm installations within one or a number of buildings
JP2631120B2 (en) Remote access control device for unmanned buildings

Legal Events

Date Code Title Description
MKEX Expiry