EP0107291A2 - Card reader for security system - Google Patents

Card reader for security system Download PDF

Info

Publication number
EP0107291A2
EP0107291A2 EP83304918A EP83304918A EP0107291A2 EP 0107291 A2 EP0107291 A2 EP 0107291A2 EP 83304918 A EP83304918 A EP 83304918A EP 83304918 A EP83304918 A EP 83304918A EP 0107291 A2 EP0107291 A2 EP 0107291A2
Authority
EP
European Patent Office
Prior art keywords
card
reader
data
time
circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP83304918A
Other languages
German (de)
French (fr)
Other versions
EP0107291A3 (en
Inventor
Bhupendra J. Khandwala
Jorge A. Young
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Scott Technologies Inc
Original Assignee
Figgie International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Figgie International Inc filed Critical Figgie International Inc
Publication of EP0107291A2 publication Critical patent/EP0107291A2/en
Publication of EP0107291A3 publication Critical patent/EP0107291A3/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • G07C1/12Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures
    • G07C1/14Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures with apparatus adapted for use with individual cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • This application relates to the field of door access security systems and, particularly, to the field of card readers for door access security systems.
  • Door access security systems utilizing magnetic card readers at doors to be controlled, are known in the prior art. Such systems include central controllers coupled to a plurality of readers, each of which is located at a specific door to be controlled. Authorized persons wishing to gain access through a door, insert magnetic cards into slots in the reader. Magnetic codings on the cards are then read and data is sent to the controller which authorizes or refuses entry and tells the reader either to keep the door locked or unlock the door.
  • Such a system can advantageously be used as a time clock to keep a record of the hours worked by hourly employees.
  • a problem with system throughput arises when a large number of employees all try to clock in or out at the same time.
  • the delays caused by reading of a card, waiting for a poll signal to come to the reader from the controller, sending the card- data to the controller and waiting for the controller to process the information and send back a "Go" or "No Go" signal can create impatience in the workers at the end of the line.
  • Such card reader systems can also be used to monitor alarm contacts located at strategic locations throughout a facility.
  • a centrally located alarm contact monitoring device was located near the controller with individual wires coupling the contact monitoring device to the alarm contacts located throughout the plant.
  • Such systems were effective but required an individual polling protocol and the associated hardware for the alarm contact monitoring device. Further, individual wires had to be strung between all the contacts to be monitored and the central monitoring device. This could result in large expenditures for wire. Further, such central contact monitoring devices were generally not well suited to applications where only a single alarm contact needed to be monitored since the function rarely justified the expense.
  • a card reader for use in a security system for controlling-access through key doors, said security-system-having a central controller.
  • the card reader -reads magnetic-data stored on cards held by employees, etc.
  • the cards have a system code and an I.D. code on them.
  • the card readers can do time and attendance functions to serve as a time clock by reading data-stored permanently on the card and sending it to the central controller for processing.
  • the central controller then grants or denies access based on the card- data.
  • the improved card reader can also make the decision whether to grant or deny access locally without dialogue with the controller by reading some of the data on the card and storing-the rest for later transmission to the central controller.
  • This feature increases the throughput of the system by eliminating the need for each employee to wait for authorization from a controller which may be delayed while processing other messages from other readers.
  • the improved card reader can also sense when communications with the central controller are lost and grant or deny access without consulting the controller, based upon data on the card. During times when communications with the central controller are lost, the card reader stores the I.D. data from the card, for each employee who was granted authorization, in a buffer for later transmission to the central controller.
  • the improved card reader can also monitor alarm contacts for changes in status and signal these changes to the central controller.
  • the central controller can be programmed to make a conditioned response to the reader coupled to the changed contact or to any other reader in the system.
  • the response message can cause a relay or relays in the reader to change states., thereby. signalling any devices -coupled to the relay or relays that an action in response to the changed alarm contact is desired.
  • FIG. 1 there is disclosed a system diagram of a typical magnetic card reading security system.
  • a controller-20 is coupled to-a plurality of card readers of which readers 22 and 24 are typical.
  • the controller 20 is coupled to each reader by an enable pair and a data pair by which the controller can communicate with any card reader in the system.
  • the controller 20 communicates with the reader 22 by an enable pair 26 and a data pair 28.
  • the controller 20 polls the reader 22 for messages and sends commands to it by the enable pair 26.
  • Data is sent to-the controller 20 from the reader 22 via the data pair 28.
  • Serial format is used on both lines.
  • the reader 22 is typically located at a door that needs to be access-controlled while the controller 20 can be located at some distance from the door.
  • the structural details of the controller 20 are well known in the art, and it can be purchased under the model designation MAC 53 0/40 from Rusco Electronic Systems in Glendale, California.
  • the object code software for the controller is also well known and can be purchased from the same source.
  • the reader 22 receives a magnetic card in a card slot 32.
  • the details of a typical magnetic card structure will be-found in U.S. Patents 3,717,749 or 3,811,977. Other structures could also be used; the details of the structure of the magnetic card are not critical to the invention. Any- structure capable of holding data encoded in a -card and converting it - to electrical signals capable of being transmitted over a line will be satisfactory.
  • the data on the card is stored in a temporary RAM location until a polling signal from the controller 20 arrives on the enable lines 26.
  • the data from the card is. transferred_ on the data lines 28 to the controller 20 unless certain options are present which cause the reader to independently make the authorization decision.
  • the controller 20 processes the data and sends back a "Go” or "No Go” command which causes the reader 22 to take the appropriate action. If the command is.. "Go”, the reader 22 unlocks the door latch via the lines 34 and lights a green LED. If the command is "No Go”, the reader 22 lights a red LED and, optionally, energizes a No Go relay.
  • the reader 22 can also incorporate circuitry to monitor a plurality of alarm contacts connected to the lines 30. When one of the contacts changes state, the reader 22 senses the change and signals the controller 20 on the next poll. The controller 20 can then print out a pre-programmed message on a printer 36. More importantly, the controller 20 can automatically send back a command to cause a switch closure by energizing a relay in the reader 22 or in any other reader in the system. This automatic response can also be any other command that the reader receives normally from the controller.
  • the relay can be connected to an emergency device via the lines 38.
  • the emergency device can be any device such as an automatic phone dialer, a sprinkler system, an alarm or whatever other device that is desired.
  • the reader 24 is a different type-of imgroved reader which can be used to keep time records for the attendance of hourly employees' on their jobs.
  • the reader 24 has a display 40, a card slot 42, and in and "out" buttons, 44 and 46.
  • an employee would place his card in the card slot 42 and press either the "in” button 44 or the "out” button 46.
  • the data on his card plus the time of day displayed in the display 40 would then be stored in a buffer in the reader 24.
  • the reader 24 would-authorize or deny entry to the employee. If entry is authorized by the reader 24 and a green LED will be lit, the door will be unlocked via the lines 48. If entry is denied, the reader 24 will so indicate by lighting a red LED on the face plate. All authorization or denial decisions are made locally by the reader 24, and the data regarding each transaction is stored in the local buffer in the reader 24.
  • the controller 20 is coupled to the reader 24 by an enable pair 50 and a data pair 52.
  • the controller 20 polls the reader 24 by sending a poll signal on the line 50.
  • the reader 24 transfers the data for one transaction out of its buffer to the controller 20 via the data lines 52.
  • the controller then can process the data in any fashion including printing it out on the printer 36.
  • the details of the structure and operation of the controller 20 are exemplified by U.S. Patents 4,216,375 and 4,218,690.
  • the reader 24 can also include means to offset the time displayed in the display 40 from the time kept by the controller 20 in the case that the controller is in a different time zone from the reader. Normally the controller 20 keeps the master time for the system and the reader 24 keep its own time. Every 15 minutes, the reader 24 inquires the time of the controller 20 and synchronizes the reader's local time with the master time kept by the controller. When the reader 24 is in a different time zone from the controller 20, a group of-offset switches in the reader 24 are set to indicate the number of minutes of offset between the local reader time and the controller time.
  • the reader 22 can also include a local buffer for keeping a record of all transactions which occur during times when communications with the controller 20 are iost due to cutting of: the wire pairs, power failure o for other reasons.
  • the reader 22 When the reader 22 has-not received a poll from the controller for a predetermined time, the reader will start storing the data for transactions during the downtime in its local buffer.
  • Each magnetic card has a system code and an ID code. The system code is used by the reader to determine whether or -not to grant authorization for entry to the individual.. If the individual is permitted to enter, his ID code and the - local time will be stored in the local buffer.
  • the data in the buffer will be sent to the controller via the data lines for processing there.
  • FIG 2 there is shown a block diagram of a card reader for use in a security system such as is shown in Figure 1.
  • Figure 1 Although in reality two different types of readers exist, the core circuits of each type of reader are the same with one type of reader having certain additional optional circuits which the other does not have.
  • Figure 2 represents a combined functional block diagram of a reader with the common core circuits and with all the optional circuit elements of both types of readers also present.
  • the card reader of Figure 2 communicates with the controller 20 of Figure 1 through an isolation board 54.
  • the isolation board 54 serves to isolate the data on the enable pair 26 and data pair 28 from the logic circuitry of the rest of the card reader.
  • the isolation board 54 passes the signals -from the enable line 26 through to the RX data lines 56 and passes the data from the Tx data lines 58 through to the data lines 28.
  • the RX data lines 56 are coupled to a multiplexer 60 in a switch and relay board 62.
  • the purpose of the multiplexer 60 is to select various data channels for connection to a data line D7, 63, of a bus 64.
  • the bus 64 is coupled between the switch and relay board 62 and the data, address and -control terminals of a microprocessor CPU 66 on a reader CPU board 67.
  • Address lines AO-A2 from the bus 64 are also coupled to the multiplexer 60. Through these address lines, the CPU 66 causes the multiplexer 60 to select one of -the data channels connected to -it for connection to its data output coupled to the line D7.
  • the microprocessor 66 can-then read the data on the selected data channel through the .D7 line 63.
  • the only data. channels which are shown are the Rx data line 56 through which commands and polling signals are received and the coil detect line 57 which carries data read from the card. Other data channels are used for other features of the reader not relevant
  • Data to be transmitted from the card reader to the central controller 20 are input from the D ⁇ line 68 of the data bus 64 to a driver 70.
  • the driver 70 is also coupled to the A ⁇ -A2 address lines of the data bus 64 which supply an address from the microprocessor 66.
  • the driver 70 has several addressable outputs, one of which is the Tx data lines 58.
  • the address supplied to the driver 70 causes it to apply the signal on the D ⁇ line 68 to the selected output.
  • the microprocessor 66 places the data to be sent on the D ⁇ bus line and writes the proper address on the address lines A ⁇ -A2 of the bus 64.
  • the serial data on the D ⁇ line is then applied to the Tx data lines 58.
  • the central-controller- 20 receives the data- on the data line 28 and acts upon ---the data message in some fashion depending upon what the message is and may or may not send a command back-to the card reader via the enable line 26.
  • a go relay 71 is coupled to a door latch device by the lines 34.
  • the lines 34 can be coupled to relay contacts or other switching devices to provide an interruptible current flow path to control whether the door latch-is in a locked or unlocked state.
  • the go relay is also coupled to the driver 70 by a switching line 72.
  • the switching line controls the state of- the go relay and thereby controls the state of the door latch device.
  • the switching line is addressable by the microprocessor 66 through the driver 70 such- that the microprocessor 66 controls the state of the go relay 70.
  • the microprocessor 66 is also coupled to a card reader coil circuit 74 by the bus 64.
  • the card reader coils' 74 consist, in the preferred embodiment, of a plurality of coils coupled to the address and data line of the bus 64 and physically arranged so as to individually magnetically interact with a plurality of magnetized spots on a card inserted in the card slots 42 or 32.
  • the microprocessor 66 can individually address and read each coil in the card reader coil circuit 74 to determine the data in the magnetic spots on the card.
  • the details of the card reading coil circuit are known to those skilled in the art and are not critical to the invention.
  • the microprocessor 66 is also coupled to an optional display 40 by the bus 64.
  • an optional display 40 In readers which are being used for time and attendance functions, i.e., as time clocks, it is desirable that the time of day be displayed externally for the benefit of workers who are lined up and waiting to put their cards into the reader 24 to start or end their work shifts.
  • the display 40 can be any conventional display, and the details of its construction are not critical to the invention.
  • the microprocessor 66 is also coupled to a random access memory (RAM) board 78.
  • the RAM board 78 contains a RAM buffer memory 80, a-battery-backup system comprised of a battery 82 and a power fail detect circuit 84.
  • the power fail detect circuit 84 monitors the 12 volt unregulated D-.C. voltage aerived from the A.C. power line and connects the-battery 82 to the power terminals of the RAM buffer 80 when the A.C. line power fails -so as to preserve the data stored in the RAM 80.
  • the RAM 80 is selected by the microprocessor 66 through connection of a decoder 86 to the address -and control lines of the bus 64.
  • the microprocessor 66 When the microprocessor 66 wishes to write a word in the RAM 80, the microprocessor generates the proper address to select the- RAM 80 and places it on the bus 64 thereby enabling the RAM 80 through the decoder 86. The data to be written into the RAM 80 is then placed on the data lines of the bus 64.
  • a delayed transmission buffer 88 is also coupled to the microprocessor 66 through the bus 64.
  • the purpose of the delayed transmission buffer 88 is to store data read from the magnetic cards during times when communication with the central controller 20 are lost.
  • a CCM/COM board 90 is also coupled to the microprocessor 66 by the bus 64.
  • the purpose of the CCM/COM board 90 is to monitor the condition of an alarm device or devices external to the card reader and to generate data indicating the condition of the alarm devices for transmission to the central controller.
  • the CCM/COM board 90 also can receive data from the central controller which causes a switch closure on the CCM/COM board. This switch is coupled to an emergency device by the lines 38.
  • the alarm contacts are coupled to the CCM/COM board 90 by the lines 30.
  • buttons 44 and 46 are used to tell-the card reader whether-the cardholder wishes to enter or leave an area.
  • the In and Out buttons 44 and 46 are coupled to the MUX 60 in the switch and relay board 62 by the line 92.
  • a red and a green indicator LED, represented by block 97 are each coupled to the M U X 60 by the bus 96.
  • the microprocessor 66 is coupled to a feature memory-98 and to a program memory 100 by the bus 64.
  • the program memory 100 stores the instructions for the microprocessor 66 and-the feature memory 98 stores data indicating which options are in effect for the microprocessor 66.
  • FIG. 3 there is shown a circuit diagram for the isolation board 54 in Figure 2.
  • the data lines 28 are coupled to the collector and emitter of a transistor 106 in the optical isolator 102.
  • the light emitting diode 108 of the optical isolator 102 is coupled across the TX data lines 58.
  • the LED 108 When the current is flowing in the TX data lines 58, the LED 108 is energized and emits light causing the transistor 106 to assume one of its two switching states. The opposite state is assumed when the LED 108 is de-energized.
  • the enable lines 26 are coupled through a noise suppression circuit 110 to the LED 112 of an optical isolator 116.
  • the transistor 114 of the optical isolator has its collector and emitter coupled to the RX data lines 56.
  • the optical isolator 116 is a Monsanto MCT2.
  • the optical isolator 102 is a Monsanto 4N33.
  • the details of the circuit of the switch and relay board 62 are given in Figures 4 A and B which are a logic diagram of that board.
  • the RX data line 56 is coupled to the data input D1 of the multiplexer 60A.
  • a resistor 59 couples a +5 volt supply to the line 56 to positively clamp it at a logic 1 level except where the transistor 114 on the isolation board clamps the line 56 to ground potential.
  • the other data inputs of the multiplexer 60A are coupled to other data channels.
  • the card reader coil circuit 74 is coupled to the D ⁇ input of the multiplexer 60A by a line 57.
  • the coil detect signal line 57 carries the data from each coil in the card reader coil circuit 74 -as it-is addressed by the microprocessor 66.
  • the out switch 46 and the in switch 49 are coupled to the D2 and D3 inputs respectively by the lines 118 and 120.
  • the address inputs 122 of the multiplexer 6DA are coupled to the A ⁇ -2 address lines of the bus 64.
  • the output 63 of the multiplexer 60A is coupled to the D7 data line of the bus 64.
  • the microprocessor 66 controls which of the data inputs are coupled to the data output 63 by the address- it supplies on the address lines 323
  • the chip select input 126 is coupled to the address lines in the bus 64 of the microprocessor 66 through a decoder on the reader CPU board to be discussed more fully below.
  • the microprocessor--66-can enable the multiplexer 60A by writing the proper address on the address lines driving the decoder coupled to the line 126 (not shown).
  • a multiplexer 60B has- its data output coupled to the D7 data line 63.
  • the data inputs of the multiplexer 60B are coupled to various data channels.
  • the XO data input is coupled by the line 128 to a "tamper" switch (not shown).
  • the tamper switch is physically situated so as to change states when the faceplate of the card reader is removed causing an alarm message to be transmitted to the controller 20.
  • the X1 data input is coupled to a "card in” switch (not shown).
  • the "card in” switch is situated so as to change states when a card is inserted in the card slot.
  • a time offset group of switches 136 is comprised of 8 switches 136A-B which are used to set a binary number representing the number of minutes of time offset at the local card reader. In those cases where the local card reader is in a different time zone than the central controller 20, the switches 136 are set for the number of minutes by which the local time at the card reader differs from- the time at the central controller.
  • a second group of switches 138 has several purposes.
  • the switches 138A-D are used to set the amount of time that the unlock signal on the lines 34 to the door latch device causes the door latch to remain unlocked.
  • the switches 138A-D also determine the time of energization of a No Go relay 166 and the time the red and green LEDs (not shown) in the block 97 in Figure 2 are energized -during certain times in the operation.
  • the switch 138E. is used to signal whether a 12 hour or 24 hour time display format - is desired.
  • the switch 138F is used to enable and disable the buffer RAM 80 as an option.
  • the switches 138G and H are not used.
  • the switches 140 are used by the customer to set the system code.
  • the system code is one of-the items of data which is magnetically stored on each cardholder's card.
  • the card reader makes the authorization decision locally without consulting the central controller 20, it is the system code stored on the switches 140A-E which is compared to the system code on the cardholder's card to determine if authorization will be granted.
  • the switches 136, 138 and 140 are individually addressable by the microprocessor 66 through the multiplexers 60A and 60B and a decoder 140.
  • the decoder 140 has address inputs 142 coupled to the address lines in the bus 64.
  • the address supplied on the lines 142 is converted in the BCD to decimal decoder 140 to a logic zero signal on one of the output lines 0-6 which comprise a bus 144.
  • Each of lines in the bus 144 is coupled to one terminal of a plurality of switches -in the switch groups 136, 138 and 140. When the group address appears on the address lines 142, one of the outputs in the bus 144 goes low thereby- activating that group.
  • each switch is coupled to the cathode of a diode which has its anode coupled to one of the XO-X3 inputs of the multiplexer 60B via the lines 132, 134, 130, 128, 146 or 148. All of -the XD-X3 inputs are also coupled to a + 5 volt supply through the resistors 150,152,154 and 156. The XO-X3 inputs will be held in a--logic one condition except if the line coupling that input is also coupled to a group of switches of which-one has been enabled by a logic zero from the decoder 140 and the switch is closed.
  • the groups of switches coupled to the XO-X3 inputs of the'multiplexer 60B intersert with the groups connected to the bus 144 such that for. any particular output of the decoder 140 which has been enabled, and for any particular input of the multiplexer 60B which has been enabled, only one switch is coupled to both enabled lines.
  • the - microprocessor 66 can individually read each switch in the groups 136, 138 and 140 by changing the address signals on the address lines of the bus 64.
  • the multiplexer 60B has its inhibit line grounded by the line 158 and its disable input held high by connection through a resistor 160 to a +5 volt supply.
  • the disable input is pulled low to take the D7 output out of the high impedance state when the signal CSSW is true on the line 162.
  • the line 162 is coupled to a decoder on the reader C PU board 67 which is coupled to address and control lines of the microprocessor 66 in the bus 64.
  • Data to be transmitted to the microprocesser 66 is placed on the Tx data line 58 by a driver 70.
  • the driver 70 also has several other outputs.
  • the output line 164 can be connected to an optional No Go relay 166.
  • a +5 volt supply coupled to the other terminal of the coil of the No Go relay 166 causes current to flow through the relay coil, thereby energizing it and causing the electrical conditions on the lines 168 coupled to the relay contacts to change.
  • the decoder 140 is a 74145 type TTL decoder such as made by Signetics
  • the MUX 60A is a 74LS 251 type multiplexer such as is made by Texas Instruments
  • the MUX 60B is a MC14512
  • CMOS type decoder such as is made by Motorola
  • the driver 70 is an NE590 type amp driver such as made by Signetics.
  • An output line 96 from the driver 70 is coupled to the GO LED (not shown) to energize it when authorization to access has been granted.
  • An output line 72 from the driver 70 is coupled to a terminal of the coil of a GO Relay 71. When the driver 70 grounds the line 72, a +5 volt supply coupled to the other terminal of the relay coil energizes the coil, causing the relay contacts to change the condition on the lines 34 coupled to the door locking device.
  • the driver 70 has a data input, the Do data bit on the line 68, and it has address inputs on the lines 172.
  • the address inputs 172 are coupled to the microprocessor 66 by the bus 64. The address at these inputs determines which of the outputs of the driver 70 will be coupled to the data input 68.
  • the microprocessor 66 can thus write a logic 0 or 1 to any of the outputs of the driver 70 by controlling the address on the lines 172 and the data on the data input line 68 which is coupled to data bit zero of the bus 64.
  • the chip enable and clear inputs are coupled to decoder 250 of Figure 6C and a gate 282 in Figure 6B by the signal lines CSOUT and RST.
  • the RAM buffer 80 has address lines 174 which are coupled to the address lines of the microprocessor 66 in the bus 64. Data inputs and outputs 176 are also coupled to the microprocessor 66 data lines in the bus 64. A write enable line 178 is coupled to a control line- in the bus 64 from the microprocessor 66 to control whether the RAM buffer 80 is reading or writing data through the data lines 176 to the address specified on the lines 174.
  • a chip select line 180 is coupled to a decoder 86.
  • the decoder 86 has a VMA signal input line 184 coupling one input of a NOR gate 182 to a VMA control line of the microprocessor 66 in Figure 6B.
  • the VMA signal is true when there is a valid memory address on the address lines 174. Because the other input to the NOR gate 182 is grounded, the NOR gate 182 serves as an inverter with the output on the line 186 false when a valid memory address is present on the address lines 174.
  • the resistor 188 couples a positive voltage supply to the VMA input of the gate 182 to hold it at logic one except when VMA is false.
  • the VMA signal on the line 184 is a control signal from the CPU 66 which indicates when a valid memory address exists on the address lines of the CPU.
  • a NOR gate 190 has one input coupled to the output of the NOR gate 182 and the other input coupled to a CSRAM ⁇ signal from a decoder 248 in Figure 6C.
  • the CPU 66 can cause CSRAM ⁇ to be true, i.e., logic zero, and can assert VMA on the line 184.
  • This logic 1 is inverted in a NOR gate 196 and appears as a logic 0 on the line 198.
  • a NOR gate 200 serves to gate a power fail detect signal on a line 202 from a power fail detector 84 through to the chip select input at pin 18 of the RAM buffer 80 if power fails.
  • the signal on the line 198 controls whether the RAM 80 is selected or deselected. Normally, the signal from the power fail detector 84 on a line 20 is a logic 0 indicating no power failure.
  • the RAM 80 is selected because the signal on the line 204 is a logic 1 which is inverted by a NOR gate to assert the CS signal on the line 180 at logic zero thereby enabling the RAM buffer 80 to read and write data.
  • a RST signal on a line 208 comes from a reset circuit on the reader CPU board which will be described below.
  • the RST signal is a logic 0 at power up but becomes .logic 1 1.2 seconds later as will be explained in connection with Figure 6B.
  • a NOR gate 210 inverts this signal such that its output line 212 which is coupled to one input of a NOR gate 214 is normally low after power has been on for 1.2 seconds.
  • the NOR gate 214 has its other input coupled to the output of a comparator 222 in the power fail detect circuit 84.
  • the comparator 222 has its inverting input 224 coupled to a voltage reference of approximately .5.3 volts when the power has not failed.
  • the line 224 is held at this reference level by the voltage divider effect of the resistors 228 and 226 which couple a +12 volt D.C. supply of line power to ground.
  • the non-inverting input 230 of the comparator 222 is coupled to a 3.6 volt reference source derived from battery power.
  • This reference voltage is generated by a resistor 232 which couples a battery 82 (not shown) to ground through a zener diode 234.
  • the zener has a 3.6 volt breakdown voltage, and has its cathode coupled to the line 230.
  • the comparator 222 has a resistor 236 coupled between the output and its non-inverting input to provide positive feedback.
  • the output on the line 216 will be a logic 0 as long as the power has not failed.
  • the battery reference on the line 230 exceeds the voltage on the line 224, and the output on the line 216 rises to a logic 1 level indicating power has failed.
  • the logic 1 on the line 216 with the logic zero on the line 212 causes the NOR gate 214 to lower its output on the line 218 to a logic zero.
  • This 0 on the line 218 is inverted to a 1 on the line 202 by the NOR gate 220 which causes the output of the gate 200 to change to a 0, thereby deselecting the buffer 80_ if it was in a selected condition.
  • the RAM buffer 80 is deselected, no data may be written into or read out of the buffer.
  • the power input 238 of the RAM buffer 80 will be coupled through any known switching mechanism 240 to the battery 82 (not shown) via a line 242 upon power failure.
  • FIG. 6A, 6B, and 6C there is shown a circuit diagram of the reader CPU board.
  • the microprocessor 66 is coupled to a feature memory 98 by data lines 240 and address lines 242.
  • the feature memory contains data regarding which options are incorporated into the card reader.
  • the microprocessor 66 is also coupled to a program memory 100 by the data lines.240 and the AJd-A4 address lines 242.
  • the enable inputs of the memories 100 and 98 are coupled via the lines 244 and 246 to the microprocessor's address lines'242 through decoders 248 and 250, respectively, in Figure 6C.
  • a clock 252 generates timing signals for the IRQ and NMI inputs on the lines 254 and 256, respectively.
  • the details of the construction and operation of the clock and of the feature and program memories will be appreciated by those skilled in the art. Any mechanism which generates signals periodically on the lines 254 and 256 will suffice for purposes of the invention.
  • the microprocessor 66 executes the instructions which are stored in the program memory 100. Within the program, which will be described below, there are certain subroutines which accomplish various housekeeping routines.
  • the IRQ and NMI inputs on the lines 254 and 256 cause vectoring to certain of these subroutines. For example, the IRQ line 254, when asserted true, will cause the program control of the microprocessor 66 to be vectored to a routine which reads all the switches described herein.
  • the microprocessor 66 When the NMI line 256 is asserted true, the microprocessor 66 is vectored to a transmit routine which transmits data-to the central-controller 20 via the Tx data lines 58 and data lines 28.
  • the microprocessor 66 must be reset to the beginning of the program upon the initial application of power to the circuit.
  • a power on reset -circuit 254 accomplishes this purpose.
  • a comparator 256 has its non-inverting input 258 coupled to a reference voltage defined by a resistive voltage divider comprised of the resistors 262 and 264 coupling the power supply to ground.
  • the inverting input 260 is coupled to one terminal of a capacitor in an RC circuit comprised of a resistor 266 and a capacitor 268. When the power is first turned 'on, the capacitor 268 acts as an initial short to ground and the voltage on the line 258 will exceed the voltage on the line 260, and the output of the comparator 256 on the line 270 will be a logic 1.
  • the line 270 is coupled to the input of a NOR gate 272 which acts as an inverter.
  • the resistors 274 and 276 serve as a voltage divider to hold the line 270 in a logic 1 condition except when the comparator 256 asserts the line 270 low.
  • the logic 1 at power up on the line 270 is inverted once in the NOR gate 272 and again in a NOR gate 278 to become the PONCLR signal on the line 280.
  • the 1 on the output line 270 changes to a 0 and line 280 follows suit.
  • the initial 1 on the line 280 is communicated to the reset line 284 of the CPU 66 as a 0 by passage through a NOR gate 282.
  • the other input to the NOR gate 282 is a line 286 from a deadman reset circuit 288.
  • the line 286 is normally a logic 0 except when there is a problem, as will be described below.
  • the initial logic 1 on the line 280 is inverted by the NOR gate 282 and resets the microprocessor - 66 to the beginning address of the program. Thereafter,- the line 280 goes -to a logic 0 and - stays there.
  • the deadman reset circuit 288 serves to reset the microprocessor 66 in case there is a software problem. Normally, the deadman reset circuit 288 will attempt-to reset the microprocessor 66 periodically unless the software gives a trigger signal "D/M trigger" on the line 290. Thus if for some reason the signal D/M trigger does not occur, program control is lost, and the deadman reset circuit will cause the program counter to be reset to the beginning program location.
  • the manner in which the deadman reset function is accomplished is through the use of two retriggerable monostable multi-vibrators 292 and 294.
  • the one shot 292-- has its B and clear (R D2 ) inputs coupled to a +5 volt source through a resistor 296 and are therefore always in a logic 1 state.
  • the 0 output on the line 298 is normally low until a negative transition occurs on the D/M trigger line 290, at which time the 0 output line 298 goes to a logic 1 state for a time determined by the values of the resistor 300 and the capacitor 302 coupled to the external RC circuit terminals.
  • the pulse time established by the resistors 300 and 302 is longer than the period of the D/M trigger signal.
  • the output line 298 will not return to zero after the initial trigger pulse because the D/ M trigger signal on the line 90 continues to retrigger the one shot 292.
  • the signals on the lines 298 and 280 are coupled to the inputs of a NOR gate 304.' The output line 306 of the NOR gate 304 is coupled to the clear input of the one shot 294.
  • the B input of the one shot 294 is held in a logic 1 condition by connection to a +5 volt supply through the resistor 296.
  • the A input of the one shot 294 is coupled by a line 308 to the clock 252 and carries a 600 hertz-clock signal.
  • the NOR gate 304 will have a logic 0 at-the input coupled to the line 280 and a logic 1 at the line 298 input unless the D/M trigger signal on the line 290 does not occur.
  • the output line 306 will remain in a-logic 0 state at all times which causes the one shot 294 to ignore all signals at the A and B inputs.
  • the one shot 292 will time out and enable the one shot 294.
  • the clock signal on the line 308 will then trigger the one shot .294 causing a logic 0 to 1 transition on the line 286. This causes the line 284 to drop from logic 1 to 0 and resets the microprocessor 66.
  • the decoder chip- 248 has its select inputs coupled to the AI2-AI4 lines of the address bus 242 of the microprocessor 66.
  • the G1 enable input 310 is coupled to the ⁇ 2 output from the microprocessor 66 which is the clock signal for the rest of the system.
  • the G2A enable input low by virtue of being coupled to a logic 1 through a resistor 312 and an inverter 314.
  • the G2B input is coupled to the power on clear signal PONCLR on the line 280.
  • the decoder 250 has its A and B select inputs coupled to the address bus 242 and its C select input coupled to the R/W signal from the microprocessor 66.
  • the G1 enable input is coupled to the ⁇ 2 clock signal from the microprocessor 66, and the G2A enable signal is connected to the Y ⁇ output from the decoder 248.
  • the G2B enable input is coupled to the A7 line of the address bus 242 from the microprocessor 66.
  • Both the decoders 248 and 250 are 74L5138 one of eight decoders such as are manufactured- by Texas Instruments.
  • the outputs of the two decoders 248 and 250 are coupled to the various chip select inputs in the system as labelled in Figure 6C. -By writing the proper addresses on the address lines 242, the microprocessor 66 can enable any chip in the system needed for a particular operation.
  • FIG. 7 there-is shown a logic diagram of the CCM/COM board 90 in Figure 2.
  • a plurality of alarm contacts are connected-to the board by a plurality of wire pairs together comprising the bus 30.
  • Each pair in the bus 30 is energized by connection of one of the lines through one of the resistors 313-320 to- a 5-volt power supply.
  • the other line from the pair is coupled through a parallel RC noise suppression circuit to the anode of the diode in one of the-optical-isolators 321-328.
  • the diodes are energized as long as the external contacts coupled to the wire pairs are closed.
  • the transistors in the optical isolators have their collectors coupled to a +5-volt regulated power supply through one of the resistors in the resistor block 329.
  • the collectors are also coupled to the data channels of a multiplexer 330 which is typically a 14512B type multiplexer such as is made by-Motorola.
  • the data input of the multiplexer is coupled to the D7 data line 63 of the microprocessor 66.
  • the select inputs 332 are coupled to the AO-A2 address lines of the microprocessor 66 such that the microprocessor can individually read each external contact condition through the D7 data line 63.
  • the microprocessor 66 is programmed to periodically check the condition of each of the external contacts coupled to the bus 30. After the contact is read, the microprocessor 66 operates on a flag to indicate the status of the alarm contact corresponding to that flag.
  • the flags are address positions in a RAM memory 334 which can be a 6116 type CMOS static RAM such as is made by Hitachi.
  • the address inputs of the RAM 334 are coupled to the address lines 242 of the-microprocessor 66, and the data I/O ports of the RAM 334 are coupled to the- data lines 240 of the microprocessor 66.
  • the R/W input line 335 of the RAM 334 is coupled to the R/W control signal from the microprocessor 66 to control the direction of the data flow on the data lines 240.
  • the chip select input line 336 of the RAM 334 is coupled to the Y3 output of a decoder 338 which has its A ' and B select inputs coupled to the VMA control signal line 184 and A11 address line respectively of the microprocessor 66.
  • the enable input signal CSRAMO on the line 192 for the decoder 338 is coupled to a chip select output from the decoder 248 in Figure 6C such that the microprocessor 66 can enable the RAM 334 by enabling the decoder 338 and writing the proper bit on the A11 line of the address bus.
  • the other output on the line 342 is coupled to the chip select input 342 of a relay driver 344.
  • This driver 344 has three address inputs 346 which are coupled to the address lines of the microprocessor 66.
  • the relay driver also has a data line 348 coupled to the buffered Do data line of the microprocessor 66 through a 74L504 buffer 349 on Figure 6C.
  • the relay driver 344 has an output 350 which is coupled to the coil of a COM relay 352.
  • FIG. 8A and 8B there is shown a logic diagram of the circuitry of the delayed transmission buffer 88 of Figure 2.
  • a battery backup circuit 356 in Figure 8B serves-to protect the -information in the RAM chips shown in Figure 8B.
  • Each of the RAM chips is a 6116LP-4 CMOS static RAM such as is manufactured by Hitachi.
  • the +5-volt line supply voltage on the line 358 normally causes a forward bias on the diode 360 and the +5 volt signal is thus coupled to the output line 362.
  • the positive voltage on the line 364 from the battery 366 exceeds the voltage on the line 358 which causes a reverse bias on the diode 360.
  • the diode 368 will be forward biased such that the battery power will be coupled to the line 362 to keep the information in the RAM intact.
  • a series of decoders 370-372 are coupled to the A11 line of the address bus 242. These decoders are 74L5139 one of four decoders in the preferred emboiment.
  • the decoders have outputs 373-378 which are coupled. to the chip select inputs of the 6 RAM chips of Figures 8B through a power fail detect circuit 382.
  • Each decoder has its B enable input coupled to the VMA output 184 from the microprocessor 66 to enable the decoder to read the A11 bit when the decoder has been enabled.
  • the decoders 370-372 are enabled by enable signals on the lines 379-381 coupled to the decoder 248 in Figure 6C.
  • a power fail circuit 382 senses when the line power represented by the voltage on the line 358 has failed by comparing the voltage at node 386 maintained by the line to the voltage at a node 388 maintained by the battery 366.
  • a comparator 390 changes the state of its output 392 when the battery voltage at the node 388 exceeds the line voltage at the node 386.
  • the comparator is a National LM311 in the preferred embodiment.
  • the chip select signals on the lines 373-378 are individually coupled through 74L532 OR gates 393-398 to the chip select inputs of the RAM chips in Figure 8B. Each chip select input is also coupled through the OR gates 393-398 to the output 392 from the comparator 390 such that when the comparator finds a failure of line power, all the RAM chips in Figure 8B will be deselected so as to maintain the integrity of the data.
  • FIG. 9 there is shown a flow diagram of the steps taken by the card reader in performing-a time and attendance function.
  • the card reader reads cards and locally authorizes entry or departure based upon the system code on the card without consulting the central controller and stores the data for each transaction with the local time for later reporting to the central controller.
  • the microprocessor CPU 66 clears the RAM 80 on powerup. Thereafter, the CPU 66 transfers on the path 412 to the executive routine 414 where several housekeeping functions are performed. One of these functions is to check for the presence of a card in the card slot. This function is represented by the transfer on the path 417 to the state 413 where the card switch is checked via the line 130 and the MUX 60B in Figure 4 to determine if there is a card in the card slot. If no card is in the slot, the CPU returns to the executive routine 414 by the path 416. In the executive routine, certain basic tasks are performed. For example, the CPU checks whether a command from the central controller 20 has been received, whether a poll from the central controller needs to be acknowledged or whether there is a request for time from the local controller. Periodically, the CPU returns to the state 413.
  • the CPU transfers to a decision state 418 along the path 420 to determine if the system code on the card in the slot matches the system code set on the switches 140 in Figure 4. To do this, the CPU 66 individually addresses the reading coils in the card reader 74 in Figure 2 via the bus 64. The data from each coil is transferred to the CPU 66 via the coil detect-line- 57, MUX 60A, D7 line 63 and the bus 64 in Figure 2.
  • the CPU 66 transfers to a no authorization state 422 via the path 424.
  • the CPU causes the display 40 in Figure 2 for a preset--. time to blink--in a manner known-to those -skilled in the- art and turns on the red LED in the LED block 97 in Figure 2 for a preset time via the line 96, the driver 70, the D ⁇ line 68 and the bus 64.
  • the CPU 66 then returns the executive state 414 via the path 423.
  • the CPU 66 transfers to a buffer full decision state 424 via a path 426 to determine if there is room in the RAM buffer 80 in Figure 2 to store the present transaction. If the buffer is full, the CPU transfers to a state 427 via a path 428 to ignore the card and display a message on the display 40 in Figure 2 indicating that the buffer is full. The CPU then transfers back to the executive state 414 by the path 430.
  • the CPU transfers to an authorization state 432 by a path 434.
  • the authorization state the CPU performs 5 tasks.
  • the Go relay 71 in Figure 2 is energized for a preset time via the bus 64, the Do data bit line 68, the address line AO-2 and the driver 70.
  • the Go relay is energized for the time set by the switches 138 in Figure 4 so they must be read via the multiplexer 60B and the D7 data bit line 63.
  • the green LED in the LED block 97 in Figure 2 is turned on for a preset time via the line 96 and the CPU displays a "Go" message in the display 40 as represented by the states 442 and 444.
  • the CPU 66 then returns to the- executive state 414 via the path 446.
  • FIG. 10 there is shown a flow diagram of the steps which are taken to transmit the data in the buffer 80 to the central controller 20.
  • the steps of Figure 10 are taken eaeh time -a poll signal comes in from the controller 20.
  • the CPU normally operates in an executive mode symbolized by the state 441 in Figure 10.
  • the executive jumps to various subroutines which perform housekeeping and command - scan functions as mentioned earlier. These subroutines are symboliz by the state 443.
  • One of the functions is to periodically-check for the presence of a poll signal from the controller 20 in Figure 1.
  • the poll signal is sent periodically to each card reader in the system via the enable pair 26 coupled that card reader.
  • the check for the presence of a poll signal is symbolized by the state 447 in Figure 10. If no poll has been received, the CPU returns to its other housekeeping functions in the state 443 via the path 449.
  • the CPU will check an internal counter which is incremented each time a transaction is stored in the buffer 80. This operation is symbolized by the block 451 in Figure 10. If the count is non-zero, then, the CPU knows that there is data in the buffer 80 which needs to be transmitted to the central contoller 20. Transfer is then made to a state 448 by a path 450. If the count is zero, the CPU returns to its other functions because there is no data to transmit. This transfer is symbolized by the path 453.
  • the CPU determines if the buffer option data is present in the feature memory 98 in Figure 2. If the feature is present, the CPU will retrieve the data for one transaction from the buffer 80 and transmit it to the central controller 20. This operation is symbolized by the state 454 in Figure 10 and is accomplished by addressing one of the transactions in the buffer 80 and reading the data there by the bus 64. The data is then converted to serial format in the CPU 66 and sent via the D ⁇ data bit line 68 to the driver 70 in Figure 2. The driver then places the data on the Tx data lines 58 and it is sent through the optical isolator board 54 onto the data line 28 to the central controller 20. The CPU then returns to the executive routine via the path 456.
  • the CPU 66 will transfer to a state 460 by a path 458 where it checks for the presence of a card in the card slot. If there is a card in the card reader, the card data will be read by the CPU 66, converted to serial format and transmitted to the central controller 20. This step is symbolized by the block 462. Control is then returned to the executive.
  • the CPU will transfer to the state 464 via the path 466 to determine if there is a time request pending.
  • the card readers which have the time and attendance function keep the local time but periodically request the time from the central controller so as to synchronize the local time with the central controller time. If there is a time request pending, the card reader will ask the time of the central controller 20 as symbolized by the state 466 and return to the executive via the path 468.
  • the CPU will acknowledge the poll as symbolized by the state 470 and return to the executive routine by the path 472.
  • FIG 11 there is shown a flow diagra- of the time offset routine performed by the CPU 66 to keep track of the local time from the central controller time when the central controller is in a different time zone from that of the reader.
  • the first step in the process is to read the offset switches 136 in Figure 4 through the MUX 60B.
  • the value of those switches is stored in RAM at a specific address. This is done 600 times per second in the state 474.
  • the CPU 66 converts the data in the RAM switch data address to minutes and hours of offset.
  • the data from the 8th switch determined whether the offset is positive or negative while the first 7 switches provide a binary number representing up to 127 minutes of offset. Any number of switches could be used, however. This is symbolized by the states 476 and 478.
  • FIG. 12 there is shown a flow diagram for the steps taken by the CPU 66 in handling transactions during a degraded mode when communication with the central controller 22 is lost.
  • the block 415 symbolizes the executive routine.
  • the background block 443 symbolizes all the routine housekeeping checks and functions that the card reader does when it is not doing one of the foreground routines to handle certain conditions the CPU discovers during the executive routine. Part of the normal executive routine is to check for the periodic appearance of a poll signal from the central controller. This check is symbolized by the block 490. This function is implemented by the CPU 66 in determining whether a poll signal has arrived in the preceding 30 seconds.
  • the card reader CPU 66 knows that something is wrong and enters the degraded mode. This is symbolized by the path 496.
  • the first step is to determine if there is a card in the reader slot. This step is symbolized by the block 500. If there is not a card in the reader, control is returned to the executive background loop 443 as symbolized by the path 498.
  • the CPU-66 addresses the feature memory 98 in Figure 2 to determine if the buffer option is present. This is symbolized by the-block 502 in Figure 12.
  • the buffer option If the buffer option is not present, then no storage of transactions during the degraded mode will occur. However, it is still possible to authorize or deny access to a card holder based upon the system-code that is on his card without storing the I.D. code and time of day in a buffer. To determine whether or not to do this, the CPU 66 must again address the feature memory 98 to determine whether the degraded mode option is present. This operation is symbolized by the block 504 in Figure 12. If the degraded mode option is not in effect, the CPU returns to the background loops 443 by the path 506.
  • the CPU reads the system code on the magnetic card in the reader slot via the card reader coils 74 and then reads the switches 140 in Figure 4.
  • the CPU 66 compares the system code on the card to the system code on the switches for a match. This comparison is symbolized by the block 508 in Figure 12. -
  • the CPU 66 turns on the red LED for a time set by the switches on the switch and relay board 62 in Figure 2. This indicates no authorization as symbolized by the state 510.
  • the CPU 66 then addresses the feature memory 98 to determine if the no go option is in effect, as symbolized by the state 512. If it is not in effect, the CPU 66 returns to the background loops 443 via the path 514. If the option is in effect, the CPU addresses the no go relay 166 in Figure 4 through the driver 70 by placing the proper address on the lines 172 and writing a logic 1 on the buffered D ⁇ data bit line 68.
  • the no go relay 166 is thereby energized for a time set by the switches on the switch and relay board 62, and whatever external device that is coupled to the no go relay contacts through the lines 167 will be signalled that an unauthorized person has attempted an entry. This operation is symbolized by the-block 516 in Figure 12.
  • the CPU 66 energizes the green LED in the LED block 97 of Figure 2 for a predetermined time.
  • The. CPU 66 also energizes the go relay -71 in Figure 4 for a time set by-the switches 138. This is done in a similar manner to that just described for the no go relay. This operation is symbolized by the block 518 in Figure 12. Control is then returned to the background loops 442 via the path 520.
  • the CPU 66 checks its internal counter to determine if the buffer 88 in Figure 2 is .full of transaction data. This is symbolized by the block 528 in Figure 12. If the buffer is full, the CPU 66 ignores the card and transfers back to the background loops 443 as - symbolized by the path 531 through the state 522.
  • the CPU 66 will read the system code switches in Figure 4 and the system code data on the card and compare them as symbolized by the block 530. If there is no match, the red LED in the LED block 97 in Figure 2 will be turned on for a time as symbolized by a transfer to the state 510 via the path 532 in Figure 12. Processing from the state 510 will continue as previously described.
  • the CPU will store the I . D . code from the card along with the local time in the delayed transmission buffer 88 of Figure 2 as symbolized by the block 533.
  • the green LED and Go relay are then energized for a preset time in state 518.
  • the buffer 88 is unloaded one transaction at a time when communications are restored.
  • FIG 13 there is shown a flow diagram of the manner in which the CPU unloads the buffer.
  • the CPU 66 continuously checks for the presence of a poll signal from the central controller. When a poll finally arrives, the reader knows that-communications have been restored. This monitoring function is symbolized by the block 540 in Figure 13. If no poll has arrived, the CP U returns to its other background functions as symbolized by-the path 542.
  • the CPU-66 will check to see if any higher priority messages are waiting to be sent as symbolized by the block 544. If there is such a message, it is sent, as symbolized by the block 546, and control is returned to the background routine of the executive.
  • the CPU 66 will determine if there are any transactions stored in the buffer waiting to be sent as symbolized by the .block 548. This is done by consulting the internal counter in the CPU 66 to determine how full the buffer 88 is. If no data, is in the buffer 88, the CPU determines whether there is a time request pending as symbolized by the block 550. If there is, the CPU 66 moves to the state 552 to request the time from the central controller and then returns to the executive routine. If there is no time request pending, the CPU 66 will acknowledge the poll in a state 554 and return to the executive routine.
  • the CPU 66 will retrieve one transaction data group, format it for serial transmission and transmit it in the manner previously discussed, using the D ⁇ data bit line 68, the driver 70, the address lines AO-2, the Tx data lines 58 and the isolation board 54.
  • the format for the transmission in the preferred embodiment is a header identifying the type of reader with the data, followed by a condition code indicating the type of transaction that has been retrieved. Following the condition code, the I.D. data from the card is sent along with the time of day when the _ transaction occurred. These steps are symbolized by the block 556. Any format, for transmission will - do, - however. Control is then returned to the executive routine.
  • FIG 14 there is shown a flow diagram of the steps the card reader CPU 66 takes in monitoring the alarm -contacts connected to the lines 30 from the CCM/COM board 90.
  • the routine illustrated in Figure 14 is executed by the CPU 600 times per second and is intended to sense the condition of the flags which symbolize the state of the alarm contacts.
  • the first step is to read a CCM flag N to determine the last state of the flag. This step is symbolized by the block 560 in Figure 14.
  • the CPU 66 picks the address for the flag N in the RAM 334 of Figure 7 and writes that address on the lines 242 after selecting the RAM with the All and VMA lines coupled to the decoder 338 to drive the line 336 low.
  • the R/W input of the RAM 334 is'driven to the read state by the microprocessor 66 in Figure 6A.
  • the flag symbolizing the state of its corresponding alarm contact.
  • the flag can show "open and reported”, “closed and unreported”, “open and unreported” or "closed and reported”.
  • One 8 bit byte is used to symbolize these states.
  • the CPU 66 If the flag shows "closed and reported", the CPU 66 must know whether the alarm contact N has changed status since its last state as indicated by the flag N. Therefore, the CPU 66 causes the alarm contact N to be read. This step is represented by the transfer on the path 561 to the block 566 and is physically accomplished by selecting the contact N address and writing that address to the multiplexer 330 on the lines 332 in Figure 7.
  • the CPU 66 also enables the multiplexer 330 in any known manner utilizing the CSCCM signal connected to pin 15 of the multiplexer 330.
  • the CSCCM signal can be generated by decoders coupled to the address bus of the CPU 66 or in any other known manner.
  • the multiplexer 330 With the address on the lines 332 set, the multiplexer 330 will select the one of its outputs XO-X7 for connection to the D7 line coupled to the CP U 66 data bus 64. The CPU 66 can then read the desired contact through one of the optical isolators 321-328.
  • the CPU 66 If the alarm contact N is open, the CPU 66 knows that - the alarm contact has changed its status since the last time it was read and that this fact must be reported. Therefore the CPU changes the state of-the flag N to an "open and unreported" status. This- operation is symbolized by the transfer on the path 567 to-the block 568 in Figure 14.' Because the status- of the alarm contacts has changed, the CPU 66 must update one bit of the status word that is kept in RAM to indicate the status of the alarm contacts. The status word has one bit for each alarm contact, and the bit for 'contact N is changed to indicate the most current status. This operation is symbolized by the transfer to the block 570 on the path 569.
  • N must be incremented. This step is represented by the path 571 to the block 572. After N is incremented, the CPU 66 must know whether it has completed reading all the flags and contacts. To do this, the CPU compares the value of N after it has been incremented to the total number of alarm contacts connected to the lines 30 in Figure 2. In the preferred embodiment, this number is 7, but it can be any number depending upon how much hardware is available. This comparison operation is represented by the block 574 in Figure 14. If N is less than or equal to 7, the CPU returns to the state 560 by the path 576. If, however, N is greater than 7, the flag reading task is finished and the CPU 66 returns to the executive routine as symbolized by the block 578.
  • the CPU would again like to know if there has been any chanqe of status of the alarm contact associated with the flag N. To determine this, the CPU 66 reads the contact N. This operation is symbolized by the path 582 to the state 584.
  • the CPU 66 If the contact N'is closed, the CPU 66 knows there has been a change in status since the last check. Accordingly, the CPU 66 must set the flag N to indicate the contact N is now closed and unreported. This operation is symbolized by the transfer on the path 588 to the state 90 in Figure 14.
  • the CPU 66 if after reading flag N and finding its status to be "closed and reported", the CPU 66 then reads the contact N and finds that it is still closed, there has been no change in the alarm contact condition since the last reading. Thus there is no need to change the flag status and there is no need to change the status word. Accordingly, the CPU 66 merely increments N as symbolized by the transfer on the path 567 to the state 572. Processing then continues as previously described.
  • the CPU 66 determines the flag N is either "closed and unreported” - or "open and unreported", there is no need to read the alarm contact because the central controller has not yet been notified of the change in status of the alarm contact which caused the flag to be set in either of these two states. Since notification is the first priority, the CPU 66 will merely update the__status word to indicate the new status and continue reading the other flags. This operation is symbolized by the transfer on the path 600 to the previously described state 570.
  • FIG 15 there is shown a flow diagram of the steps taken by the CPU in reporting the changing conditions on the alarm contacts coupled to the lines 30 to the central controller 20 in Figure 1.
  • the routine shown in Figure 15 is periodically executed when program control of the CPU 66 is transferred from the background tasks of the executive routine represented by the block 602 to the routine of Figure 15.
  • the first step is for the CPU 66 to read the flag N to determine if it has been reported or is currently in an unreported status. If the alarm contact N change in status has not yet been reported as indicated by an unreported status of the flag N, then the CPU 66 sends a CCM message to the central controller 20 reporting the changed condition of the alarm contacts N.
  • These operations are represented by the block 604 where the flag N is read and the transfer on the path 606 to the block 608 where the CCM message is transmitted to the central controller.
  • the CCM message is transmitted by formulation of the serial format message inside the CPU 66 and placing it on the D ⁇ data bit line 68 to drive the driver 70.
  • the address bit lines AO-A2 are held by the CPU 66 at the address which connects the D ⁇ data bit line to the Tx data lines 58.
  • the serial data CCM message then passes through the optical isolators on the isolation board 54 and over the data lines 28 to the central controller 20 in Figure 1.
  • the next step after transmitting the CCM message is for the CPU 66 to determine if the flag is open or closed to determine whether to change- the flag to a "closed and reported status" or an "open and reported status". This step is represented by the transfer to the state 612 by the path 610.
  • the CPU 66 transfers to the state 614 by the path 613 to change the flag status to "open and reported”. Control is then transferred to the state 602 by the path 616. If the flag is closed, the CPU 66 must change the flag to indicate that the condition has now been reported. The CPU 66 then changes the flag status to- "closed and reported” status. This is represented by a transfer to -the state 620 on the path 618. Control is then returned to the state 602 by a path 622. From the state 602 processing continues. The CPU 66 then transfers to the state 604 where flag N is again read. This time, the flag N will show that it has been reported so the CPU 66 will increment N. This is represented by the transfer to the state 624 by the path 642.
  • the CPU 66 compares the value of N to the maximum number of flags to be read as represented by a transfer on a path 626 to a state 628. If N is less than the maximum number of flags in the system, control is transferred back to the executive via a path 630. The next time the executive jumps to the routine of Figure 15, the CPU 66 will read flag N + 1.
  • N is equal to the maximum number of flags in the system, the CPU 66 is finished reading all the flags and need only determine whether the central controller 20 has requested the CCM status word. This determination is represented by a transfer to the state 634 by the path 632. If the central controller 20 has not requested the CCM status word, control is transferred back to the executive via the path 636. If the central controller has requested the CCM status word, the status word is sent as represented by transfer to the state 640 on the path 638. Thereafter, control is returned to the executive_via the path 642.
  • FIG 16 there is shown a flow diagram of the steps taken by the central controller 20 in Figure 1 to process messages from the card readers regarding changes in the status of the alarm-contacts.
  • the blocks 620, 622 and 624- representr individual readers in the system which are coupled to the central controller 20. Each reader has its own data lines, such as data line 28 for the reader N, upon which data is transmitted from the reader to the central controller 20.
  • the controller 20 is also coupled to each reader by enable lines, such as the enable line 26 coupled to the reader N, upon which commands are sent from the controller 20 to the reader.
  • each reader formulates and sends a number of messages to the central controller.
  • the messages received by the central controller 20 are deciphered to determine what type of message it is and what is the data in the message. This operation is_ symbolized by the block 626.
  • One of the questions asked by the controller is whether or not the received message is a CCM message. This decision is represented by the block 628.
  • the controller must determine from the data in the message which alarm contact has changed. This determination is represented by the block 630. The reason for this determination is that the controller may not be programmed by the user to do anything in response to changes in certain alarm contacts. What the controller does in response to a change in status of a particular alarm contact is user programmable.
  • the controller keeps a table of user programmable entries. The table can have an entry for each alarm contact in the system or it may only have entries for some of the alarm contacts. This table is called the CRO table, which stands for-- Conditioned Response Option. A typical table entry would include the alarm contact number, the contact condition, the reader location, the condition response location, a CRO override command and time limitation-data.
  • the controller - after -deciphering the CCM message, must consult the CRO table to determine if there is an- entry for that alarm contact. If there is, the controller will examine the contact condition code, the alarm contact number, and the reader location data in the CCM message to determine if-it matches the entry in the CRO table. This operation is symbolized by the block 632 in Figure 16.
  • the time zone data in the CRO table can be user- programmed to only allow the specified conditioned response if the CCM message for the contact in question comes in within the time parameter.
  • the time zone may be unlimited if the user programs the appropriate code, such that the conditioned response will occur any time a message matching the CRO entry comes into the controller. This operation is symbolized by the block 634.
  • the controller will send a CRO command to the location specified in the CRO table entry. This could be to the reader coupled to the CCM contact which changed to cause the CCM message in question, or it could be to some other reader location in the system. This operation is symbolized by the block 636.
  • the CRO response message is sent to a buffer which holds messages to be sent to particular readers until their turn for transmission over the enable lines come up. The messages are sent on a first come, first serve basis. This message buffering and the periodic polling function of the central controller are represented by the block 638. -The messages are sent on one of the enable pairs 640.
  • the central controller also searches the CRO table for other entries-regarding the same alarm contact. That is, the central controller may send one or more CRO responses to one or more locations in the system in response to a change on an alarm contact.
  • the CRO response can be any of the reader commands associated with the- other reader functions such as "go off line”- or * send CCM status word". In particular, it may be a command to energize a COM relay anywhere in the system. This "energize COM relay", command, when received by the CPU 66 in the reader, causes it to address the relay 352 in Figure 7 through the address lines 346 after selecting the driver 344 using the line 342 and the decoder 338.
  • the coil of the relay 352 is then connected to the D ⁇ data bit line 348 from the CPU 66 in Figure 2 such that the CPU 66 can energize the relay coil by writing a logic zero on the line 348.
  • the external device can be a fire alarm, sprinkler system, telephone dialer or any other device.
  • the central controller continues on with processing all the incoming messages. This is symbolized by the transition on the path 642 to the state 644. The same would be true if there were either no CRO table entry corresponding to the CCM message or if the CCM message were outside the time zone set by the CRO table entry. These two transitions are represented by the paths 646 and 648, respectively, to the state 644.
  • the central controaller then sends data to be printed regarding any or all of the incoming messages to a printer as represented by the block 650.
  • the central controller may send a message to the printer regarding the CCM message if desired.
  • Appendix A is the machine language for the flow diagrams of Figures 9-11.
  • Appendix B is the machine language for the flow diagrams of Figures 12-13.
  • Appendix C is the machine language for the flow diagrams of Figures 14-16.

Abstract

There is disclosed herein an improved card reader for a security system utilizing a central controller and a plurality of card readers for controlling traffic through critical doors in a facility. The improved reader includes means for improving the system throughput by buffer storing large numbers of transactions all occurring within a short time for time clock functions in time and attendance applications for hourly employees. Also disclosed are means for conditioned emergency responses to sensed changes in status of alarm contacts coupled to the reader and located in the vicinity of the reader within 2 miles. There is also disclosed means for temporarily storing transaction" information for transactions made during periods when communications with the controller are lost. During such degraded mode operation, access is granted to cardholders with the proper system code and their ID code and the time of the transaction are stored in a buffer. When communications are restored, the transactions saved in the buffer are sent to the controller.

Description

    Background of the Invention
  • This application relates to the field of door access security systems and, particularly, to the field of card readers for door access security systems.
  • Door access security systems, utilizing magnetic card readers at doors to be controlled, are known in the prior art. Such systems include central controllers coupled to a plurality of readers, each of which is located at a specific door to be controlled. Authorized persons wishing to gain access through a door, insert magnetic cards into slots in the reader. Magnetic codings on the cards are then read and data is sent to the controller which authorizes or refuses entry and tells the reader either to keep the door locked or unlock the door.
  • Such a system can advantageously be used as a time clock to keep a record of the hours worked by hourly employees. - However, a problem with system throughput arises when a large number of employees all try to clock in or out at the same time. The delays caused by reading of a card, waiting for a poll signal to come to the reader from the controller, sending the card- data to the controller and waiting for the controller to process the information and send back a "Go" or "No Go" signal can create impatience in the workers at the end of the line.
  • Such card reader systems can also be used to monitor alarm contacts located at strategic locations throughout a facility. In the prior art, a centrally located alarm contact monitoring device was located near the controller with individual wires coupling the contact monitoring device to the alarm contacts located throughout the plant. Such systems were effective but required an individual polling protocol and the associated hardware for the alarm contact monitoring device. Further, individual wires had to be strung between all the contacts to be monitored and the central monitoring device. This could result in large expenditures for wire. Further, such central contact monitoring devices were generally not well suited to applications where only a single alarm contact needed to be monitored since the function rarely justified the expense.
  • The prior art systems also had room for improvement in the area of operation during times when the communication lines between the reader and the central controller were down. In such a situation, if all access was denied, people would be inconvenienced or, worse, trapped in an undesirable emergency situation. The alternative would be to allow free access through all doors. However, with record-keeping functions done at the central controller, there would be no record of the individuals who entered and left specific areas during specific times while the lines were down. As a result, if theft occurred during the down time, there would be no record to use in the investigation.
  • Summary of the Disclosure
  • There is disclosed herein a card reader for use in a security system for controlling-access through key doors, said security-system-having a central controller. The card reader-reads magnetic-data stored on cards held by employees, etc. The cards have a system code and an I.D. code on them. The card readers can do time and attendance functions to serve as a time clock by reading data-stored permanently on the card and sending it to the central controller for processing. The central controller then grants or denies access based on the card- data. Optionally the improved card reader can also make the decision whether to grant or deny access locally without dialogue with the controller by reading some of the data on the card and storing-the rest for later transmission to the central controller. Typically, this is done by reading the system code and granting authorization if the system code on the card matches the system code on user programmable switches. The I.D. code is then stored in the buffer with the time of day of the transaction for later transmission to the central controller. This feature increases the throughput of the system by eliminating the need for each employee to wait for authorization from a controller which may be delayed while processing other messages from other readers.
  • The improved card reader can also sense when communications with the central controller are lost and grant or deny access without consulting the controller, based upon data on the card. During times when communications with the central controller are lost, the card reader stores the I.D. data from the card, for each employee who was granted authorization, in a buffer for later transmission to the central controller.
  • The improved card reader can also monitor alarm contacts for changes in status and signal these changes to the central controller.- The central controller can be programmed to make a conditioned response to the reader coupled to the changed contact or to any other reader in the system. The response message can cause a relay or relays in the reader to change states., thereby. signalling any devices -coupled to the relay or relays that an action in response to the changed alarm contact is desired.
  • Brief Description of the Drawings
    • Figure 1 is a block-diagram of a security sytem in which the improved reader of the invention could be used.
    • Figure 2 is a block diagram of the improved reader.
    • Figure 3 is a logic diagram of the optical isolator board.
    • Figures 4 A and B are a logic diagram of the switch-and relay board.
    • Figures 5 A and B are a circuit diagram of the RAM buffer board and power fail detect circuit.
    • Figures 6A, 6B and 6C are circuit diagrams of the CPU reader board.
    • Figure 7 is a logic diagram of the CCM/COM logic.
    • Figures 8A and 8B are a logic diagram of the circuitry of the delayed transmission buffer.
    • Figure 9 is a flow diagram of the sequence of steps performed by the card reader in performing a time and attendance function.
    • Figure 10 is a flow diagram of the steps which are taken to unload the time and attendance data from the buffer and transmit it to the central controller 20.
    • Figure 11 is a flow diagram of the time offset routine performed by the card reader.
    • Figure 12 is a flow diagram of the steps taken by the card reader in buffering transactions during a degraded mode when communication is lost with the central controller.
    • Figure 13 is a flow diagram of the manner in which the card reader CPU unloads the delayed transmission buffer when communications are restored.
    • Figure 14 is a flow diagram of the manner in which the card reader CPU senses alarm contacts.
    • Figure -15 is a flow diagram for reporting of the status of alarm contacts by the card reader CPU.
    • Figure 16 is a flow diagram for the central controller process for an automatic response to a change in an alarm contact.
    Detailed Description of the Preferred Embodiment
  • Referring to Figure 1 there is disclosed a system diagram of a typical magnetic card reading security system. A controller-20 is coupled to-a plurality of card readers of which readers 22 and 24 are typical. The controller 20 is coupled to each reader by an enable pair and a data pair by which the controller can communicate with any card reader in the system.
  • For example, the controller 20 communicates with the reader 22 by an enable pair 26 and a data pair 28. The controller 20 polls the reader 22 for messages and sends commands to it by the enable pair 26. Data is sent to-the controller 20 from the reader 22 via the data pair 28. Serial format is used on both lines.
  • The reader 22 is typically located at a door that needs to be access-controlled while the controller 20 can be located at some distance from the door. The structural details of the controller 20 are well known in the art, and it can be purchased under the model designation MAC 530/40 from Rusco Electronic Systems in Glendale, California. The object code software for the controller is also well known and can be purchased from the same source.
  • In operation, the reader 22 receives a magnetic card in a card slot 32. The details of a typical magnetic card structure will be-found in U.S. Patents 3,717,749 or 3,811,977. Other structures could also be used; the details of the structure of the magnetic card are not critical to the invention. Any- structure capable of holding data encoded in a -card and converting it - to electrical signals capable of being transmitted over a line will be satisfactory.
  • When the card is read, the data on the card is stored in a temporary RAM location until a polling signal from the controller 20 arrives on the enable lines 26. Upon receipt of the polling signal on the line 26, the data from the card is. transferred_ on the data lines 28 to the controller 20 unless certain options are present which cause the reader to independently make the authorization decision. -The controller 20 processes the data and sends back a "Go" or "No Go" command which causes the reader 22 to take the appropriate action. If the command is.. "Go", the reader 22 unlocks the door latch via the lines 34 and lights a green LED. If the command is "No Go", the reader 22 lights a red LED and, optionally, energizes a No Go relay.
  • The reader 22 can also incorporate circuitry to monitor a plurality of alarm contacts connected to the lines 30. When one of the contacts changes state, the reader 22 senses the change and signals the controller 20 on the next poll. The controller 20 can then print out a pre-programmed message on a printer 36. More importantly, the controller 20 can automatically send back a command to cause a switch closure by energizing a relay in the reader 22 or in any other reader in the system. This automatic response can also be any other command that the reader receives normally from the controller. The relay can be connected to an emergency device via the lines 38. The emergency device can be any device such as an automatic phone dialer, a sprinkler system, an alarm or whatever other device that is desired.
  • The reader 24 is a different type-of imgroved reader which can be used to keep time records for the attendance of hourly employees' on their jobs. The reader 24 has a display 40, a card slot 42, and in and "out" buttons, 44 and 46. In operation, an employee would place his card in the card slot 42 and press either the "in" button 44 or the "out" button 46. The data on his card plus the time of day displayed in the display 40 would then be stored in a buffer in the reader 24. Based upon the system code data on the card, the reader 24 would-authorize or deny entry to the employee. If entry is authorized by the reader 24 and a green LED will be lit, the door will be unlocked via the lines 48. If entry is denied, the reader 24 will so indicate by lighting a red LED on the face plate. All authorization or denial decisions are made locally by the reader 24, and the data regarding each transaction is stored in the local buffer in the reader 24.
  • The controller 20 is coupled to the reader 24 by an enable pair 50 and a data pair 52. The controller 20 polls the reader 24 by sending a poll signal on the line 50. Upon receipt of the poll signal, the reader 24 transfers the data for one transaction out of its buffer to the controller 20 via the data lines 52. The controller then can process the data in any fashion including printing it out on the printer 36. The details of the structure and operation of the controller 20 are exemplified by U.S. Patents 4,216,375 and 4,218,690.
  • The reader 24 can also include means to offset the time displayed in the display 40 from the time kept by the controller 20 in the case that the controller is in a different time zone from the reader. Normally the controller 20 keeps the master time for the system and the reader 24 keep its own time. Every 15 minutes, the reader 24 inquires the time of the controller 20 and synchronizes the reader's local time with the master time kept by the controller. When the reader 24 is in a different time zone from the controller 20, a group of-offset switches in the reader 24 are set to indicate the number of minutes of offset between the local reader time and the controller time.
  • The reader 22 can also include a local buffer for keeping a record of all transactions which occur during times when communications with the controller 20 are iost due to cutting of: the wire pairs, power failure o for other reasons. When the reader 22 has-not received a poll from the controller for a predetermined time, the reader will start storing the data for transactions during the downtime in its local buffer. Each magnetic card has a system code and an ID code. The system code is used by the reader to determine whether or -not to grant authorization for entry to the individual.. If the individual is permitted to enter, his ID code and the - local time will be stored in the local buffer. When communications with the controller 20 are restored, the data in the buffer will be sent to the controller via the data lines for processing there.
  • Referring to Figure 2, there is shown a block diagram of a card reader for use in a security system such as is shown in Figure 1. Although in reality two different types of readers exist, the core circuits of each type of reader are the same with one type of reader having certain additional optional circuits which the other does not have. Figure 2 represents a combined functional block diagram of a reader with the common core circuits and with all the optional circuit elements of both types of readers also present.
  • The card reader of Figure 2 communicates with the controller 20 of Figure 1 through an isolation board 54. The isolation board 54 serves to isolate the data on the enable pair 26 and data pair 28 from the logic circuitry of the rest of the card reader. The isolation board 54 passes the signals -from the enable line 26 through to the RX data lines 56 and passes the data from the Tx data lines 58 through to the data lines 28.
  • The RX data lines 56 are coupled to a multiplexer 60 in a switch and relay board 62. The purpose of the multiplexer 60 is to select various data channels for connection to a data line D7, 63, of a bus 64. The bus 64 is coupled between the switch and relay board 62 and the data, address and -control terminals of a microprocessor CPU 66 on a reader CPU board 67. Address lines AO-A2 from the bus 64 are also coupled to the multiplexer 60. Through these address lines, the CPU 66 causes the multiplexer 60 to select one of -the data channels connected to -it for connection to its data output coupled to the line D7. The microprocessor 66 can-then read the data on the selected data channel through the .D7 line 63. In Figure 2 the only data. channels which are shown are the Rx data line 56 through which commands and polling signals are received and the coil detect line 57 which carries data read from the card. Other data channels are used for other features of the reader not relevant to the present discussion.
  • Data to be transmitted from the card reader to the central controller 20 are input from the Dφ line 68 of the data bus 64 to a driver 70. The driver 70 is also coupled to the Aφ-A2 address lines of the data bus 64 which supply an address from the microprocessor 66. The driver 70 has several addressable outputs, one of which is the Tx data lines 58. The address supplied to the driver 70 causes it to apply the signal on the Dφ line 68 to the selected output. To transmit data, the microprocessor 66 places the data to be sent on the Dφ bus line and writes the proper address on the address lines Aφ-A2 of the bus 64. The serial data on the Dφ line is then applied to the Tx data lines 58.
  • The central-controller- 20 receives the data- on the data line 28 and acts upon ---the data message in some fashion depending upon what the message is and may or may not send a command back-to the card reader via the enable line 26.
  • A go relay 71 is coupled to a door latch device by the lines 34. The lines 34 can be coupled to relay contacts or other switching devices to provide an interruptible current flow path to control whether the door latch-is in a locked or unlocked state. The go relay is also coupled to the driver 70 by a switching line 72. The switching line controls the state of- the go relay and thereby controls the state of the door latch device. The switching line is addressable by the microprocessor 66 through the driver 70 such- that the microprocessor 66 controls the state of the go relay 70.
  • The microprocessor 66 is also coupled to a card reader coil circuit 74 by the bus 64. The card reader coils' 74 consist, in the preferred embodiment, of a plurality of coils coupled to the address and data line of the bus 64 and physically arranged so as to individually magnetically interact with a plurality of magnetized spots on a card inserted in the card slots 42 or 32. The microprocessor 66 can individually address and read each coil in the card reader coil circuit 74 to determine the data in the magnetic spots on the card. The details of the card reading coil circuit are known to those skilled in the art and are not critical to the invention.
  • The microprocessor 66 is also coupled to an optional display 40 by the bus 64. In readers which are being used for time and attendance functions, i.e., as time clocks, it is desirable that the time of day be displayed externally for the benefit of workers who are lined up and waiting to put their cards into the reader 24 to start or end their work shifts. The display 40 can be any conventional display, and the details of its construction are not critical to the invention.
  • The microprocessor 66 is also coupled to a random access memory (RAM) board 78. The RAM board 78 contains a RAM buffer memory 80, a-battery-backup system comprised of a battery 82 and a power fail detect circuit 84. The power fail detect circuit 84 monitors the 12 volt unregulated D-.C. voltage aerived from the A.C. power line and connects the-battery 82 to the power terminals of the RAM buffer 80 when the A.C. line power fails -so as to preserve the data stored in the RAM 80. The RAM 80 is selected by the microprocessor 66 through connection of a decoder 86 to the address -and control lines of the bus 64. When the microprocessor 66 wishes to write a word in the RAM 80, the microprocessor generates the proper address to select the- RAM 80 and places it on the bus 64 thereby enabling the RAM 80 through the decoder 86. The data to be written into the RAM 80 is then placed on the data lines of the bus 64.
  • A delayed transmission buffer 88 is also coupled to the microprocessor 66 through the bus 64. The purpose of the delayed transmission buffer 88 is to store data read from the magnetic cards during times when communication with the central controller 20 are lost.
  • A CCM/COM board 90 is also coupled to the microprocessor 66 by the bus 64. The purpose of the CCM/COM board 90 is to monitor the condition of an alarm device or devices external to the card reader and to generate data indicating the condition of the alarm devices for transmission to the central controller. The CCM/COM board 90 also can receive data from the central controller which causes a switch closure on the CCM/COM board. This switch is coupled to an emergency device by the lines 38. The alarm contacts are coupled to the CCM/COM board 90 by the lines 30.
  • When the card reader is being used for a time and attendance function, the In and Out buttons 44 and 46 are used to tell-the card reader whether-the cardholder wishes to enter or leave an area. The In and Out buttons 44 and 46 are coupled to the MUX 60 in the switch and relay board 62 by the line 92.
  • A red and a green indicator LED, represented by block 97 are each coupled to the MUX 60 by the bus 96. The LED's-are used by the microprocessor 66 to signal whether authorization has-been granted or denied.
  • The microprocessor 66 is coupled to a feature memory-98 and to a program memory 100 by the bus 64. The program memory 100 stores the instructions for the microprocessor 66 and-the feature memory 98 stores data indicating which options are in effect for the microprocessor 66.
  • Referring to Figure 3, there is shown a circuit diagram for the isolation board 54 in Figure 2. The data lines 28 are coupled to the collector and emitter of a transistor 106 in the optical isolator 102. The light emitting diode 108 of the optical isolator 102 is coupled across the TX data lines 58. When the current is flowing in the TX data lines 58, the LED 108 is energized and emits light causing the transistor 106 to assume one of its two switching states. The opposite state is assumed when the LED 108 is de-energized.
  • The enable lines 26 are coupled through a noise suppression circuit 110 to the LED 112 of an optical isolator 116. The transistor 114 of the optical isolator has its collector and emitter coupled to the RX data lines 56. In the preferred embodiment, the optical isolator 116 is a Monsanto MCT2. The optical isolator 102 is a Monsanto 4N33.
  • The details of the circuit of the switch and relay board 62 are given in Figures 4 A and B which are a logic diagram of that board. The RX data line 56 is coupled to the data input D1 of the multiplexer 60A. A resistor 59 couples a +5 volt supply to the line 56 to positively clamp it at a logic 1 level except where the transistor 114 on the isolation board clamps the line 56 to ground potential. - The other data inputs of the multiplexer 60A are coupled to other data channels. For example the card reader coil circuit 74 is coupled to the Dφ input of the multiplexer 60A by a line 57. The coil detect signal line 57 carries the data from each coil in the card reader coil circuit 74 -as it-is addressed by the microprocessor 66. The out switch 46 and the in switch 49 are coupled to the D2 and D3 inputs respectively by the lines 118 and 120.
  • The address inputs 122 of the multiplexer 6DA are coupled to the Aφ-2 address lines of the bus 64. The output 63 of the multiplexer 60A is coupled to the D7 data line of the bus 64. The microprocessor 66 controls which of the data inputs are coupled to the data output 63 by the address- it supplies on the address lines 323 The chip select input 126 is coupled to the address lines in the bus 64 of the microprocessor 66 through a decoder on the reader CPU board to be discussed more fully below. The microprocessor--66-can enable the multiplexer 60A by writing the proper address on the address lines driving the decoder coupled to the line 126 (not shown).
  • A multiplexer 60B has- its data output coupled to the D7 data line 63. The data inputs of the multiplexer 60B are coupled to various data channels. The XO data input is coupled by the line 128 to a "tamper" switch (not shown). The tamper switch is physically situated so as to change states when the faceplate of the card reader is removed causing an alarm message to be transmitted to the controller 20. The X1 data input is coupled to a "card in" switch (not shown). The "card in" switch is situated so as to change states when a card is inserted in the card slot. By periodically checking the condition of these two switches, the microprocessor 66 can tell whether tampering is occurring or whether there is a card to be read in the card slot.
  • There are three groups of eight switches on the switch and relay board 62. A time offset group of switches 136 is comprised of 8 switches 136A-B which are used to set a binary number representing the number of minutes of time offset at the local card reader. In those cases where the local card reader is in a different time zone than the central controller 20, the switches 136 are set for the number of minutes by which the local time at the card reader differs from- the time at the central controller.
  • A second group of switches 138 has several purposes. The switches 138A-D are used to set the amount of time that the unlock signal on the lines 34 to the door latch device causes the door latch to remain unlocked. The switches 138A-D also determine the time of energization of a No Go relay 166 and the time the red and green LEDs (not shown) in the block 97 in Figure 2 are energized -during certain times in the operation. The switch 138E.is used to signal whether a 12 hour or 24 hour time display format - is desired. The switch 138F is used to enable and disable the buffer RAM 80 as an option. The switches 138G and H are not used.
  • The switches 140 are used by the customer to set the system code. The system code is one of-the items of data which is magnetically stored on each cardholder's card. When the card reader makes the authorization decision locally without consulting the central controller 20, it is the system code stored on the switches 140A-E which is compared to the system code on the cardholder's card to determine if authorization will be granted.
  • The switches 136, 138 and 140 are individually addressable by the microprocessor 66 through the multiplexers 60A and 60B and a decoder 140. The decoder 140 has address inputs 142 coupled to the address lines in the bus 64. The address supplied on the lines 142 is converted in the BCD to decimal decoder 140 to a logic zero signal on one of the output lines 0-6 which comprise a bus 144. Each of lines in the bus 144 is coupled to one terminal of a plurality of switches -in the switch groups 136, 138 and 140. When the group address appears on the address lines 142, one of the outputs in the bus 144 goes low thereby- activating that group. The other terminal of each switch is coupled to the cathode of a diode which has its anode coupled to one of the XO-X3 inputs of the multiplexer 60B via the lines 132, 134, 130, 128, 146 or 148. All of -the XD-X3 inputs are also coupled to a + 5 volt supply through the resistors 150,152,154 and 156. The XO-X3 inputs will be held in a--logic one condition except if the line coupling that input is also coupled to a group of switches of which-one has been enabled by a logic zero from the decoder 140 and the switch is closed.
  • The groups of switches coupled to the XO-X3 inputs of the'multiplexer 60B intersert with the groups connected to the bus 144 such that for. any particular output of the decoder 140 which has been enabled, and for any particular input of the multiplexer 60B which has been enabled, only one switch is coupled to both enabled lines. Thus - the - microprocessor 66 can individually read each switch in the groups 136, 138 and 140 by changing the address signals on the address lines of the bus 64.
  • The multiplexer 60B has its inhibit line grounded by the line 158 and its disable input held high by connection through a resistor 160 to a +5 volt supply. The disable input is pulled low to take the D7 output out of the high impedance state when the signal CSSW is true on the line 162. The line 162 is coupled to a decoder on the reader CPU board 67 which is coupled to address and control lines of the microprocessor 66 in the bus 64.
  • Data to be transmitted to the microprocesser 66 is placed on the Tx data line 58 by a driver 70. The driver 70 also has several other outputs. For example, the output line 164 can be connected to an optional No Go relay 166. When the line 164 is grounded by the driver 70, a +5 volt supply coupled to the other terminal of the coil of the No Go relay 166 causes current to flow through the relay coil, thereby energizing it and causing the electrical conditions on the lines 168 coupled to the relay contacts to change.
  • In the preferred embodiment, the decoder 140 is a 74145 type TTL decoder such as made by Signetics, the MUX 60A is a 74LS 251 type multiplexer such as is made by Texas Instruments, the MUX 60B is a MC14512, (CMOS type decoder such as is made by Motorola, and the driver 70 is an NE590 type amp driver such as made by Signetics.
  • An output line 96 from the driver 70 is coupled to the GO LED (not shown) to energize it when authorization to access has been granted. An output line 72 from the driver 70 is coupled to a terminal of the coil of a GO Relay 71. When the driver 70 grounds the line 72, a +5 volt supply coupled to the other terminal of the relay coil energizes the coil, causing the relay contacts to change the condition on the lines 34 coupled to the door locking device.
  • The driver 70 has a data input, the Do data bit on the line 68, and it has address inputs on the lines 172. The address inputs 172 are coupled to the microprocessor 66 by the bus 64. The address at these inputs determines which of the outputs of the driver 70 will be coupled to the data input 68. The microprocessor 66 can thus write a logic 0 or 1 to any of the outputs of the driver 70 by controlling the address on the lines 172 and the data on the data input line 68 which is coupled to data bit zero of the bus 64. The chip enable and clear inputs are coupled to decoder 250 of Figure 6C and a gate 282 in Figure 6B by the signal lines CSOUT and RST.
  • Referring to Figure 5, there is shown a circuit diagram of the RAM buffer and power fail detect board. The RAM buffer 80 has address lines 174 which are coupled to the address lines of the microprocessor 66 in the bus 64. Data inputs and outputs 176 are also coupled to the microprocessor 66 data lines in the bus 64. A write enable line 178 is coupled to a control line- in the bus 64 from the microprocessor 66 to control whether the RAM buffer 80 is reading or writing data through the data lines 176 to the address specified on the lines 174.
  • A chip select line 180 is coupled to a decoder 86. The decoder 86 has a VMA signal input line 184 coupling one input of a NOR gate 182 to a VMA control line of the microprocessor 66 in Figure 6B. The VMA signal is true when there is a valid memory address on the address lines 174. Because the other input to the NOR gate 182 is grounded, the NOR gate 182 serves as an inverter with the output on the line 186 false when a valid memory address is present on the address lines 174. The resistor 188 couples a positive voltage supply to the VMA input of the gate 182 to hold it at logic one except when VMA is false. The VMA signal on the line 184 is a control signal from the CPU 66 which indicates when a valid memory address exists on the address lines of the CPU. A NOR gate 190 has one input coupled to the output of the NOR gate 182 and the other input coupled to a CSRAMφ signal from a decoder 248 in Figure 6C. The CPU 66 can cause CSRAMφ to be true, i.e., logic zero, and can assert VMA on the line 184. This causes two logic 0's at the inputs of the NOR gate 190 and a logic 1 appears on the line 194. This logic 1 is inverted in a NOR gate 196 and appears as a logic 0 on the line 198.
  • A NOR gate 200 serves to gate a power fail detect signal on a line 202 from a power fail detector 84 through to the chip select input at pin 18 of the RAM buffer 80 if power fails. When power has not failed, however, the signal on the line 198 controls whether the RAM 80 is selected or deselected. Normally, the signal from the power fail detector 84 on a line 20 is a logic 0 indicating no power failure. When the signal on the line 198 is a logic 0, the RAM 80 is selected because the signal on the line 204 is a logic 1 which is inverted by a NOR gate to assert the CS signal on the line 180 at logic zero thereby enabling the RAM buffer 80 to read and write data.
  • A RST signal on a line 208 comes from a reset circuit on the reader CPU board which will be described below.
  • The RST signal is a logic 0 at power up but becomes .logic 1 1.2 seconds later as will be explained in connection with Figure 6B. A NOR gate 210 inverts this signal such that its output line 212 which is coupled to one input of a NOR gate 214 is normally low after power has been on for 1.2 seconds.
  • The NOR gate 214 has its other input coupled to the output of a comparator 222 in the power fail detect circuit 84. The comparator 222 has its inverting input 224 coupled to a voltage reference of approximately .5.3 volts when the power has not failed. The line 224 is held at this reference level by the voltage divider effect of the resistors 228 and 226 which couple a +12 volt D.C. supply of line power to ground.
  • The non-inverting input 230 of the comparator 222 is coupled to a 3.6 volt reference source derived from battery power. This reference voltage is generated by a resistor 232 which couples a battery 82 (not shown) to ground through a zener diode 234. The zener has a 3.6 volt breakdown voltage, and has its cathode coupled to the line 230. The comparator 222 has a resistor 236 coupled between the output and its non-inverting input to provide positive feedback. The output on the line 216 will be a logic 0 as long as the power has not failed. When the power fails, the battery reference on the line 230 exceeds the voltage on the line 224, and the output on the line 216 rises to a logic 1 level indicating power has failed.
  • The logic 1 on the line 216 with the logic zero on the line 212 causes the NOR gate 214 to lower its output on the line 218 to a logic zero. This 0 on the line 218 is inverted to a 1 on the line 202 by the NOR gate 220 which causes the output of the gate 200 to change to a 0, thereby deselecting the buffer 80_ if it was in a selected condition. When the RAM buffer 80 is deselected, no data may be written into or read out of the buffer. The power input 238 of the RAM buffer 80 will be coupled through any known switching mechanism 240 to the battery 82 (not shown) via a line 242 upon power failure.
  • Referring to Figures 6A, 6B, and 6C, there is shown a circuit diagram of the reader CPU board. The microprocessor 66 is coupled to a feature memory 98 by data lines 240 and address lines 242. The feature memory contains data regarding which options are incorporated into the card reader. The microprocessor 66 is also coupled to a program memory 100 by the data lines.240 and the AJd-A4 address lines 242. The enable inputs of the memories 100 and 98 are coupled via the lines 244 and 246 to the microprocessor's address lines'242 through decoders 248 and 250, respectively, in Figure 6C. A clock 252 generates timing signals for the IRQ and NMI inputs on the lines 254 and 256, respectively. The details of the construction and operation of the clock and of the feature and program memories will be appreciated by those skilled in the art. Any mechanism which generates signals periodically on the lines 254 and 256 will suffice for purposes of the invention.
  • The microprocessor 66 executes the instructions which are stored in the program memory 100. Within the program, which will be described below, there are certain subroutines which accomplish various housekeeping routines. The IRQ and NMI inputs on the lines 254 and 256 cause vectoring to certain of these subroutines. For example, the IRQ line 254, when asserted true, will cause the program control of the microprocessor 66 to be vectored to a routine which reads all the switches described herein.
  • When the NMI line 256 is asserted true, the microprocessor 66 is vectored to a transmit routine which transmits data-to the central-controller 20 via the Tx data lines 58 and data lines 28.
  • The microprocessor 66 must be reset to the beginning of the program upon the initial application of power to the circuit. - A power on reset -circuit 254 accomplishes this purpose. - A comparator 256 has its non-inverting input 258 coupled to a reference voltage defined by a resistive voltage divider comprised of the resistors 262 and 264 coupling the power supply to ground. The inverting input 260 is coupled to one terminal of a capacitor in an RC circuit comprised of a resistor 266 and a capacitor 268. When the power is first turned 'on, the capacitor 268 acts as an initial short to ground and the voltage on the line 258 will exceed the voltage on the line 260, and the output of the comparator 256 on the line 270 will be a logic 1. The line 270 is coupled to the input of a NOR gate 272 which acts as an inverter. The resistors 274 and 276 serve as a voltage divider to hold the line 270 in a logic 1 condition except when the comparator 256 asserts the line 270 low.
  • The logic 1 at power up on the line 270 is inverted once in the NOR gate 272 and again in a NOR gate 278 to become the PONCLR signal on the line 280.
  • As the voltage on the capacitor 268 rises, it exceeds the voltage on the line 258 at a time determined by the values of the resistor 266 and the capacitor 268. When this happens, the 1 on the output line 270 changes to a 0 and line 280 follows suit. The initial 1 on the line 280 is communicated to the reset line 284 of the CPU 66 as a 0 by passage through a NOR gate 282. The other input to the NOR gate 282 is a line 286 from a deadman reset circuit 288. The line 286 is normally a logic 0 except when there is a problem, as will be described below. With the line 286 normally logic 0, the initial logic 1 on the line 280 is inverted by the NOR gate 282 and resets the microprocessor - 66 to the beginning address of the program. Thereafter,- the line 280 goes -to a logic 0 and - stays there.
  • The deadman reset circuit 288 serves to reset the microprocessor 66 in case there is a software problem. Normally, the deadman reset circuit 288 will attempt-to reset the microprocessor 66 periodically unless the software gives a trigger signal "D/M trigger" on the line 290. Thus if for some reason the signal D/M trigger does not occur, program control is lost, and the deadman reset circuit will cause the program counter to be reset to the beginning program location.
  • The manner in which the deadman reset function is accomplished is through the use of two retriggerable monostable multi-vibrators 292 and 294. The one shot 292-- has its B and clear (RD2) inputs coupled to a +5 volt source through a resistor 296 and are therefore always in a logic 1 state. The 0 output on the line 298 is normally low until a negative transition occurs on the D/M trigger line 290, at which time the 0 output line 298 goes to a logic 1 state for a time determined by the values of the resistor 300 and the capacitor 302 coupled to the external RC circuit terminals. However,the pulse time established by the resistors 300 and 302 is longer than the period of the D/M trigger signal. Thus, the output line 298 will not return to zero after the initial trigger pulse because the D/M trigger signal on the line 90 continues to retrigger the one shot 292.
  • The signals on the lines 298 and 280 are coupled to the inputs of a NOR gate 304.' The output line 306 of the NOR gate 304 is coupled to the clear input of the one shot 294. The B input of the one shot 294 is held in a logic 1 condition by connection to a +5 volt supply through the resistor 296. The A input of the one shot 294 is coupled by a line 308 to the clock 252 and carries a 600 hertz-clock signal.
  • After the initial power up period, the NOR gate 304 will have a logic 0 at-the input coupled to the line 280 and a logic 1 at the line 298 input unless the D/M trigger signal on the line 290 does not occur. The output line 306 will remain in a-logic 0 state at all times which causes the one shot 294 to ignore all signals at the A and B inputs. However, if the D/M trigger signal on the line 290 fails to occur on schedule, indicating some problem with the program execution, the one shot 292 will time out and enable the one shot 294. The clock signal on the line 308 will then trigger the one shot .294 causing a logic 0 to 1 transition on the line 286. This causes the line 284 to drop from logic 1 to 0 and resets the microprocessor 66.
  • Referring to Figure 6C, there is shown a logic diagram of the decoder circuitry which forms part of the decoder 86 in Figure 2. The decoder chip- 248 has its select inputs coupled to the AI2-AI4 lines of the address bus 242 of the microprocessor 66. The G1 enable input 310 is coupled to the φ2 output from the microprocessor 66 which is the clock signal for the rest of the system. The G2A enable input low by virtue of being coupled to a logic 1 through a resistor 312 and an inverter 314. The G2B input is coupled to the power on clear signal PONCLR on the line 280.
  • The decoder 250 has its A and B select inputs coupled to the address bus 242 and its C select input coupled to the R/W signal from the microprocessor 66. The G1 enable input is coupled to the φ2 clock signal from the microprocessor 66, and the G2A enable signal is connected to the Yφ output from the decoder 248. The G2B enable input is coupled to the A7 line of the address bus 242 from the microprocessor 66.
  • Both the decoders 248 and 250 are 74L5138 one of eight decoders such as are manufactured- by Texas Instruments. The outputs of the two decoders 248 and 250 are coupled to the various chip select inputs in the system as labelled in Figure 6C. -By writing the proper addresses on the address lines 242, the microprocessor 66 can enable any chip in the system needed for a particular operation.
  • Turning to Figure 7 there-is shown a logic diagram of the CCM/COM board 90 in Figure 2. A plurality of alarm contacts are connected-to the board by a plurality of wire pairs together comprising the bus 30. Each pair in the bus 30 is energized by connection of one of the lines through one of the resistors 313-320 to- a 5-volt power supply. The other line from the pair is coupled through a parallel RC noise suppression circuit to the anode of the diode in one of the-optical-isolators 321-328. The diodes are energized as long as the external contacts coupled to the wire pairs are closed.
  • The transistors in the optical isolators have their collectors coupled to a +5-volt regulated power supply through one of the resistors in the resistor block 329. The collectors are also coupled to the data channels of a multiplexer 330 which is typically a 14512B type multiplexer such as is made by-Motorola. The data input of the multiplexer is coupled to the D7 data line 63 of the microprocessor 66. The select inputs 332 are coupled to the AO-A2 address lines of the microprocessor 66 such that the microprocessor can individually read each external contact condition through the D7 data line 63.
  • The microprocessor 66 is programmed to periodically check the condition of each of the external contacts coupled to the bus 30. After the contact is read, the microprocessor 66 operates on a flag to indicate the status of the alarm contact corresponding to that flag. The flags are address positions in a RAM memory 334 which can be a 6116 type CMOS static RAM such as is made by Hitachi. The address inputs of the RAM 334 are coupled to the address lines 242 of the-microprocessor 66, and the data I/O ports of the RAM 334 are coupled to the- data lines 240 of the microprocessor 66. The R/W input line 335 of the RAM 334 is coupled to the R/W control signal from the microprocessor 66 to control the direction of the data flow on the data lines 240.
  • The chip select input line 336 of the RAM 334 is coupled to the Y3 output of a decoder 338 which has its A' and B select inputs coupled to the VMA control signal line 184 and A11 address line respectively of the microprocessor 66. The enable input signal CSRAMO on the line 192 for the decoder 338 is coupled to a chip select output from the decoder 248 in Figure 6C such that the microprocessor 66 can enable the RAM 334 by enabling the decoder 338 and writing the proper bit on the A11 line of the address bus.
  • Only two outputs from the decoder 338 are used so only one address bit is needed to specify which output is active. The other output on the line 342 is coupled to the chip select input 342 of a relay driver 344. This driver 344 has three address inputs 346 which are coupled to the address lines of the microprocessor 66. The relay driver also has a data line 348 coupled to the buffered Do data line of the microprocessor 66 through a 74L504 buffer 349 on Figure 6C. The relay driver 344 has an output 350 which is coupled to the coil of a COM relay 352. When the microprocessor 66 selects the relay driver 344, and writes the proper address on the lines 346, the line 348 will control the state of the line 350, thereby controlling the state of the relay contacts 354.
  • Turning to Figures 8A and 8B there is shown a logic diagram of the circuitry of the delayed transmission buffer 88 of Figure 2. A battery backup circuit 356 in Figure 8Bserves-to protect the -information in the RAM chips shown in Figure 8B. Each of the RAM chips is a 6116LP-4 CMOS static RAM such as is manufactured by Hitachi. The +5-volt line supply voltage on the line 358 normally causes a forward bias on the diode 360 and the +5 volt signal is thus coupled to the output line 362. However, when the power fails, the positive voltage on the line 364 from the battery 366 exceeds the voltage on the line 358 which causes a reverse bias on the diode 360. The diode 368, however, will be forward biased such that the battery power will be coupled to the line 362 to keep the information in the RAM intact.
  • A series of decoders 370-372 are coupled to the A11 line of the address bus 242. These decoders are 74L5139 one of four decoders in the preferred emboiment. The decoders have outputs 373-378 which are coupled. to the chip select inputs of the 6 RAM chips of Figures 8B through a power fail detect circuit 382. Each decoder has its B enable input coupled to the VMA output 184 from the microprocessor 66 to enable the decoder to read the A11 bit when the decoder has been enabled. The decoders 370-372 are enabled by enable signals on the lines 379-381 coupled to the decoder 248 in Figure 6C. A power fail circuit 382 senses when the line power represented by the voltage on the line 358 has failed by comparing the voltage at node 386 maintained by the line to the voltage at a node 388 maintained by the battery 366. A comparator 390 changes the state of its output 392 when the battery voltage at the node 388 exceeds the line voltage at the node 386. The comparator is a National LM311 in the preferred embodiment.
  • The chip select signals on the lines 373-378 are individually coupled through 74L532 OR gates 393-398 to the chip select inputs of the RAM chips in Figure 8B. Each chip select input is also coupled through the OR gates 393-398 to the output 392 from the comparator 390 such that when the comparator finds a failure of line power, all the RAM chips in Figure 8B will be deselected so as to maintain the integrity of the data.
  • The connections and functioning- of the RAM chips of Figure 8B will be apparent to those skilled in the art. Data from the microprocessor 66 is input and output on the lines 240 to- and from the addresses on the lines 242.
  • Turning now to Figure 9 there is shown a flow diagram of the steps taken by the card reader in performing-a time and attendance function. In this function, the card reader reads cards and locally authorizes entry or departure based upon the system code on the card without consulting the central controller and stores the data for each transaction with the local time for later reporting to the central controller.
  • In an initiatization step 410, the microprocessor CPU 66 clears the RAM 80 on powerup. Thereafter, the CPU 66 transfers on the path 412 to the executive routine 414 where several housekeeping functions are performed. One of these functions is to check for the presence of a card in the card slot. This function is represented by the transfer on the path 417 to the state 413 where the card switch is checked via the line 130 and the MUX 60B in Figure 4 to determine if there is a card in the card slot. If no card is in the slot, the CPU returns to the executive routine 414 by the path 416. In the executive routine, certain basic tasks are performed. For example, the CPU checks whether a command from the central controller 20 has been received, whether a poll from the central controller needs to be acknowledged or whether there is a request for time from the local controller. Periodically, the CPU returns to the state 413.
  • If a card was found in the card slot, the CPU transfers to a decision state 418 along the path 420 to determine if the system code on the card in the slot matches the system code set on the switches 140 in Figure 4. To do this, the CPU 66 individually addresses the reading coils in the card reader 74 in Figure 2 via the bus 64. The data from each coil is transferred to the CPU 66 via the coil detect-line- 57, MUX 60A, D7 line 63 and the bus 64 in Figure 2.
  • If there is no match, the CPU 66 transfers to a no authorization state 422 via the path 424. In this state, the CPU causes the display 40 in Figure 2 for a preset--. time to blink--in a manner known-to those -skilled in the- art and turns on the red LED in the LED block 97 in Figure 2 for a preset time via the line 96, the driver 70, the Dφ line 68 and the bus 64. The CPU 66 then returns the executive state 414 via the path 423.
  • If the system code matches, the CPU 66 transfers to a buffer full decision state 424 via a path 426 to determine if there is room in the RAM buffer 80 in Figure 2 to store the present transaction. If the buffer is full, the CPU transfers to a state 427 via a path 428 to ignore the card and display a message on the display 40 in Figure 2 indicating that the buffer is full. The CPU then transfers back to the executive state 414 by the path 430.
  • If the buffer is not full, the CPU transfers to an authorization state 432 by a path 434. In the authorization state the CPU performs 5 tasks. First the ID code from the magnetic card is stored in the buffer 80 along with the time of day in states 436 and 438. Then the Go relay 71 in Figure 2 is energized for a preset time via the bus 64, the Do data bit line 68, the address line AO-2 and the driver 70. The Go relay is energized for the time set by the switches 138 in Figure 4 so they must be read via the multiplexer 60B and the D7 data bit line 63.
  • Finally, the green LED in the LED block 97 in Figure 2 is turned on for a preset time via the line 96 and the CPU displays a "Go" message in the display 40 as represented by the states 442 and 444. The CPU 66 then returns to the- executive state 414 via the path 446.
  • Turning to Figure 10 there is shown a flow diagram of the steps which are taken to transmit the data in the buffer 80 to the central controller 20. The steps of Figure 10 are taken eaeh time -a poll signal comes in from the controller 20. The CPU normally operates in an executive mode symbolized by the state 441 in Figure 10. The executive jumps to various subroutines which perform housekeeping and command - scan functions as mentioned earlier. These subroutines are symboliz by the state 443. One of the functions is to periodically-check for the presence of a poll signal from the controller 20 in Figure 1. The poll signal is sent periodically to each card reader in the system via the enable pair 26 coupled that card reader. The check for the presence of a poll signal is symbolized by the state 447 in Figure 10. If no poll has been received, the CPU returns to its other housekeeping functions in the state 443 via the path 449.
  • If a poll has been received, the CPU will check an internal counter which is incremented each time a transaction is stored in the buffer 80. This operation is symbolized by the block 451 in Figure 10. If the count is non-zero, then, the CPU knows that there is data in the buffer 80 which needs to be transmitted to the central contoller 20. Transfer is then made to a state 448 by a path 450. If the count is zero, the CPU returns to its other functions because there is no data to transmit. This transfer is symbolized by the path 453.
  • In the state 448, the CPU determines if the buffer option data is present in the feature memory 98 in Figure 2. If the feature is present, the CPU will retrieve the data for one transaction from the buffer 80 and transmit it to the central controller 20. This operation is symbolized by the state 454 in Figure 10 and is accomplished by addressing one of the transactions in the buffer 80 and reading the data there by the bus 64. The data is then converted to serial format in the CPU 66 and sent via the Dφ data bit line 68 to the driver 70 in Figure 2. The driver then places the data on the Tx data lines 58 and it is sent through the optical isolator board 54 onto the data line 28 to the central controller 20. The CPU then returns to the executive routine via the path 456.
  • If the buffer option is not present, the CPU 66 will transfer to a state 460 by a path 458 where it checks for the presence of a card in the card slot. If there is a card in the card reader, the card data will be read by the CPU 66, converted to serial format and transmitted to the central controller 20. This step is symbolized by the block 462. Control is then returned to the executive.
  • If there is no card in the reader, the CPU will transfer to the state 464 via the path 466 to determine if there is a time request pending. The card readers which have the time and attendance function keep the local time but periodically request the time from the central controller so as to synchronize the local time with the central controller time. If there is a time request pending, the card reader will ask the time of the central controller 20 as symbolized by the state 466 and return to the executive via the path 468.
  • If no time request is pending, the CPU will acknowledge the poll as symbolized by the state 470 and return to the executive routine by the path 472.
  • Turning to Figure 11, there is shown a flow diagra- of the time offset routine performed by the CPU 66 to keep track of the local time from the central controller time when the central controller is in a different time zone from that of the reader.
  • The first step in the process is to read the offset switches 136 in Figure 4 through the MUX 60B. The value of those switches is stored in RAM at a specific address. This is done 600 times per second in the state 474.
  • Next, the CPU 66 converts the data in the RAM switch data address to minutes and hours of offset. The data from the 8th switch determined whether the offset is positive or negative while the first 7 switches provide a binary number representing up to 127 minutes of offset. Any number of switches could be used, however. This is symbolized by the states 476 and 478.
  • Finally, the local time is offset in a state 480 and stored in a local buffer offset time address. Control is then returned to the executive routine.
  • Referring to Figure 12 there is shown a flow diagram for the steps taken by the CPU 66 in handling transactions during a degraded mode when communication with the central controller 22 is lost. The block 415 symbolizes the executive routine. The background block 443 symbolizes all the routine housekeeping checks and functions that the card reader does when it is not doing one of the foreground routines to handle certain conditions the CPU discovers during the executive routine. Part of the normal executive routine is to check for the periodic appearance of a poll signal from the central controller. This check is symbolized by the block 490. This function is implemented by the CPU 66 in determining whether a poll signal has arrived in the preceding 30 seconds. If a poll signal has arrived during the last 30 seconds, then there is no degraded mode and the CPU 66 determines what type of command has been received, if any, and processes the command as symbolized by the block 492. Control is then returned to the executive routine by the path 494.
  • If a poll signal has not arrived during the preceding 30 seconds, the card reader CPU 66 knows that something is wrong and enters the degraded mode. This is symbolized by the path 496. The first step is to determine if there is a card in the reader slot. This step is symbolized by the block 500. If there is not a card in the reader, control is returned to the executive background loop 443 as symbolized by the path 498.
  • If there is a card in the reader, the CPU-66 addresses the feature memory 98 in Figure 2 to determine if the buffer option is present. This is symbolized by the-block 502 in Figure 12.
  • If the buffer option is not present, then no storage of transactions during the degraded mode will occur. However, it is still possible to authorize or deny access to a card holder based upon the system-code that is on his card without storing the I.D. code and time of day in a buffer. To determine whether or not to do this, the CPU 66 must again address the feature memory 98 to determine whether the degraded mode option is present. This operation is symbolized by the block 504 in Figure 12. If the degraded mode option is not in effect, the CPU returns to the background loops 443 by the path 506.
  • If the degraded mode option is present, the CPU reads the system code on the magnetic card in the reader slot via the card reader coils 74 and then reads the switches 140 in Figure 4. The CPU 66 compares the system code on the card to the system code on the switches for a match. This comparison is symbolized by the block 508 in Figure 12. -
  • If there is no match, the CPU 66 turns on the red LED for a time set by the switches on the switch and relay board 62 in Figure 2. This indicates no authorization as symbolized by the state 510. The CPU 66 then addresses the feature memory 98 to determine if the no go option is in effect, as symbolized by the state 512. If it is not in effect, the CPU 66 returns to the background loops 443 via the path 514. If the option is in effect, the CPU addresses the no go relay 166 in Figure 4 through the driver 70 by placing the proper address on the lines 172 and writing a logic 1 on the buffered Dφ data bit line 68. The no go relay 166 is thereby energized for a time set by the switches on the switch and relay board 62, and whatever external device that is coupled to the no go relay contacts through the lines 167 will be signalled that an unauthorized person has attempted an entry. This operation is symbolized by the-block 516 in Figure 12.
  • If the system code on the switches match that on the card, the CPU 66 energizes the green LED in the LED block 97 of Figure 2 for a predetermined time..The. CPU 66 also energizes the go relay -71 in Figure 4 for a time set by-the switches 138. This is done in a similar manner to that just described for the no go relay. This operation is symbolized by the block 518 in Figure 12. Control is then returned to the background loops 442 via the path 520.
  • Returning to the state 502 in Figure 12, if the buffer option is present, the CPU 66 checks its internal counter to determine if the buffer 88 in Figure 2 is .full of transaction data. This is symbolized by the block 528 in Figure 12. If the buffer is full, the CPU 66 ignores the card and transfers back to the background loops 443 as - symbolized by the path 531 through the state 522.
  • If the buffer is not full, the CPU 66 will read the system code switches in Figure 4 and the system code data on the card and compare them as symbolized by the block 530. If there is no match, the red LED in the LED block 97 in Figure 2 will be turned on for a time as symbolized by a transfer to the state 510 via the path 532 in Figure 12. Processing from the state 510 will continue as previously described.
  • If the system code does match, the CPU will store the I.D. code from the card along with the local time in the delayed transmission buffer 88 of Figure 2 as symbolized by the block 533. The green LED and Go relay are then energized for a preset time in state 518.
  • The buffer 88 is unloaded one transaction at a time when communications are restored. Referring to Figure 13, there is shown a flow diagram of the manner in which the CPU unloads the buffer. During the executive background routine, the CPU 66-continually checks for the presence of a poll signal from the central controller. When a poll finally arrives, the reader knows that-communications have been restored. This monitoring function is symbolized by the block 540 in Figure 13. If no poll has arrived, the CPU returns to its other background functions as symbolized by-the path 542.
  • If a poll has arrived, the CPU-66 will check to see if any higher priority messages are waiting to be sent as symbolized by the block 544. If there is such a message, it is sent, as symbolized by the block 546, and control is returned to the background routine of the executive.
  • If no higher priority message is waiting, the CPU 66 will determine if there are any transactions stored in the buffer waiting to be sent as symbolized by the .block 548. This is done by consulting the internal counter in the CPU 66 to determine how full the buffer 88 is. If no data, is in the buffer 88, the CPU determines whether there is a time request pending as symbolized by the block 550. If there is, the CPU 66 moves to the state 552 to request the time from the central controller and then returns to the executive routine. If there is no time request pending, the CPU 66 will acknowledge the poll in a state 554 and return to the executive routine.
  • Returning to the state 548 in Figure 13, if there are transactions in the buffer 88 to be sent, the CPU 66 will retrieve one transaction data group, format it for serial transmission and transmit it in the manner previously discussed, using the Dφ data bit line 68, the driver 70, the address lines AO-2, the Tx data lines 58 and the isolation board 54. The format for the transmission in the preferred embodiment is a header identifying the type of reader with the data, followed by a condition code indicating the type of transaction that has been retrieved. Following the condition code, the I.D. data from the card is sent along with the time of day when the _ transaction occurred. These steps are symbolized by the block 556. Any format, for transmission will - do, - however. Control is then returned to the executive routine.
  • Turning now to Figure 14, there is shown a flow diagram of the steps the card reader CPU 66 takes in monitoring the alarm -contacts connected to the lines 30 from the CCM/COM board 90. The routine illustrated in Figure 14 is executed by the CPU 600 times per second and is intended to sense the condition of the flags which symbolize the state of the alarm contacts. The first step is to read a CCM flag N to determine the last state of the flag. This step is symbolized by the block 560 in Figure 14. To do this the CPU 66 picks the address for the flag N in the RAM 334 of Figure 7 and writes that address on the lines 242 after selecting the RAM with the All and VMA lines coupled to the decoder 338 to drive the line 336 low. The R/W input of the RAM 334 is'driven to the read state by the microprocessor 66 in Figure 6A.
  • There are four possible states for the flag symbolizing the state of its corresponding alarm contact. The flag can show "open and reported", "closed and unreported", "open and unreported" or "closed and reported". One 8 bit byte is used to symbolize these states.
  • If the flag shows "closed and reported", the CPU 66 must know whether the alarm contact N has changed status since its last state as indicated by the flag N. Therefore, the CPU 66 causes the alarm contact N to be read. This step is represented by the transfer on the path 561 to the block 566 and is physically accomplished by selecting the contact N address and writing that address to the multiplexer 330 on the lines 332 in Figure 7. The CPU 66 also enables the multiplexer 330 in any known manner utilizing the CSCCM signal connected to pin 15 of the multiplexer 330. The CSCCM signal can be generated by decoders coupled to the address bus of the CPU 66 or in any other known manner. With the address on the lines 332 set, the multiplexer 330 will select the one of its outputs XO-X7 for connection to the D7 line coupled to the CP U 66 data bus 64. The CPU 66 can then read the desired contact through one of the optical isolators 321-328.
  • If the alarm contact N is open, the CPU 66 knows that - the alarm contact has changed its status since the last time it was read and that this fact must be reported. Therefore the CPU changes the state of-the flag N to an "open and unreported" status. This- operation is symbolized by the transfer on the path 567 to-the block 568 in Figure 14.' Because the status- of the alarm contacts has changed, the CPU 66 must update one bit of the status word that is kept in RAM to indicate the status of the alarm contacts. The status word has one bit for each alarm contact, and the bit for 'contact N is changed to indicate the most current status. This operation is symbolized by the transfer to the block 570 on the path 569.
  • After the status word has been updated, the CPU 66 is ready to move on to read the next flag. To do this, N must be incremented. This step is represented by the path 571 to the block 572. After N is incremented, the CPU 66 must know whether it has completed reading all the flags and contacts. To do this, the CPU compares the value of N after it has been incremented to the total number of alarm contacts connected to the lines 30 in Figure 2. In the preferred embodiment, this number is 7, but it can be any number depending upon how much hardware is available. This comparison operation is represented by the block 574 in Figure 14. If N is less than or equal to 7, the CPU returns to the state 560 by the path 576. If, however, N is greater than 7, the flag reading task is finished and the CPU 66 returns to the executive routine as symbolized by the block 578.
  • If the flag N had been in the "open and reported" state, the CPU would again like to know if there has been any chanqe of status of the alarm contact associated with the flag N. To determine this, the CPU 66 reads the contact N. This operation is symbolized by the path 582 to the state 584.
  • If the contact N is open, there has been no change from its last status and the CPU 66 is ready to read the next flag. N will be incremented and processing continues as previously described. This operation is symbolized by the path 586 to the state 572 previously discussed.
  • If the contact N'is closed, the CPU 66 knows there has been a change in status since the last check. Accordingly, the CPU 66 must set the flag N to indicate the contact N is now closed and unreported. This operation is symbolized by the transfer on the path 588 to the state 90 in Figure 14.
  • Because there has been a change in the status of one of the alarm contacts, the status word must be updated. This operation is symbolized by the transfer on the path 592 to the state 570. Processing then continues as previously described.
  • Returning to the state 566, if after reading flag N and finding its status to be "closed and reported", the CPU 66 then reads the contact N and finds that it is still closed, there has been no change in the alarm contact condition since the last reading. Thus there is no need to change the flag status and there is no need to change the status word. Accordingly, the CPU 66 merely increments N as symbolized by the transfer on the path 567 to the state 572. Processing then continues as previously described.
  • If in-the state 560, the CPU 66 determines the flag N is either "closed and unreported" - or "open and unreported", there is no need to read the alarm contact because the central controller has not yet been notified of the change in status of the alarm contact which caused the flag to be set in either of these two states. Since notification is the first priority, the CPU 66 will merely update the__status word to indicate the new status and continue reading the other flags. This operation is symbolized by the transfer on the path 600 to the previously described state 570.
  • Referring to Figure 15, there is shown a flow diagram of the steps taken by the CPU in reporting the changing conditions on the alarm contacts coupled to the lines 30 to the central controller 20 in Figure 1. The routine shown in Figure 15 is periodically executed when program control of the CPU 66 is transferred from the background tasks of the executive routine represented by the block 602 to the routine of Figure 15.
  • The first step is for the CPU 66 to read the flag N to determine if it has been reported or is currently in an unreported status. If the alarm contact N change in status has not yet been reported as indicated by an unreported status of the flag N, then the CPU 66 sends a CCM message to the central controller 20 reporting the changed condition of the alarm contacts N. These operations are represented by the block 604 where the flag N is read and the transfer on the path 606 to the block 608 where the CCM message is transmitted to the central controller. Referring to Figure 2, the CCM message is transmitted by formulation of the serial format message inside the CPU 66 and placing it on the Dφ data bit line 68 to drive the driver 70. The address bit lines AO-A2 are held by the CPU 66 at the address which connects the Dφ data bit line to the Tx data lines 58. The serial data CCM message then passes through the optical isolators on the isolation board 54 and over the data lines 28 to the central controller 20 in Figure 1.
  • The next step after transmitting the CCM message is for the CPU 66 to determine if the flag is open or closed to determine whether to change- the flag to a "closed and reported status" or an "open and reported status". This step is represented by the transfer to the state 612 by the path 610.
  • If the flag is open, the CPU 66 transfers to the state 614 by the path 613 to change the flag status to "open and reported". Control is then transferred to the state 602 by the path 616. If the flag is closed, the CPU 66 must change the flag to indicate that the condition has now been reported. The CPU 66 then changes the flag status to- "closed and reported" status. This is represented by a transfer to -the state 620 on the path 618. Control is then returned to the state 602 by a path 622. From the state 602 processing continues. The CPU 66 then transfers to the state 604 where flag N is again read. This time, the flag N will show that it has been reported so the CPU 66 will increment N. This is represented by the transfer to the state 624 by the path 642. The CPU 66 then compares the value of N to the maximum number of flags to be read as represented by a transfer on a path 626 to a state 628. If N is less than the maximum number of flags in the system, control is transferred back to the executive via a path 630. The next time the executive jumps to the routine of Figure 15, the CPU 66 will read flag N + 1.
  • If N is equal to the maximum number of flags in the system, the CPU 66 is finished reading all the flags and need only determine whether the central controller 20 has requested the CCM status word. This determination is represented by a transfer to the state 634 by the path 632. If the central controller 20 has not requested the CCM status word, control is transferred back to the executive via the path 636. If the central controller has requested the CCM status word, the status word is sent as represented by transfer to the state 640 on the path 638. Thereafter, control is returned to the executive_via the path 642.
  • Referring to Figure 16 there is shown a flow diagram of the steps taken by the central controller 20 in Figure 1 to process messages from the card readers regarding changes in the status of the alarm-contacts. The blocks 620, 622 and 624- representr individual readers in the system which are coupled to the central controller 20. Each reader has its own data lines, such as data line 28 for the reader N, upon which data is transmitted from the reader to the central controller 20. The controller 20 is also coupled to each reader by enable lines, such as the enable line 26 coupled to the reader N, upon which commands are sent from the controller 20 to the reader.
  • As represented by the blocks 620, 622 and 624, each reader formulates and sends a number of messages to the central controller.
  • The messages received by the central controller 20 are deciphered to determine what type of message it is and what is the data in the message. This operation is_ symbolized by the block 626.
  • One of the questions asked by the controller is whether or not the received message is a CCM message. This decision is represented by the block 628.
  • If the message is a CCM message, the controller must determine from the data in the message which alarm contact has changed. This determination is represented by the block 630. The reason for this determination is that the controller may not be programmed by the user to do anything in response to changes in certain alarm contacts. What the controller does in response to a change in status of a particular alarm contact is user programmable. The controller keeps a table of user programmable entries. The table can have an entry for each alarm contact in the system or it may only have entries for some of the alarm contacts. This table is called the CRO table, which stands for-- Conditioned Response Option. A typical table entry would include the alarm contact number, the contact condition, the reader location, the condition response location, a CRO override command and time limitation-data.
  • The controller,- after -deciphering the CCM message, must consult the CRO table to determine if there is an- entry for that alarm contact. If there is, the controller will examine the contact condition code, the alarm contact number, and the reader location data in the CCM message to determine if-it matches the entry in the CRO table. This operation is symbolized by the block 632 in Figure 16.
  • The time zone data in the CRO table can be user- programmed to only allow the specified conditioned response if the CCM message for the contact in question comes in within the time parameter. Alternatively, the time zone may be unlimited if the user programs the appropriate code, such that the conditioned response will occur any time a message matching the CRO entry comes into the controller. This operation is symbolized by the block 634.
  • If there is a CRO table entry and the CCM message comes in within the time parameters of the CRO table entry, the controller will send a CRO command to the location specified in the CRO table entry. This could be to the reader coupled to the CCM contact which changed to cause the CCM message in question, or it could be to some other reader location in the system. This operation is symbolized by the block 636. The CRO response message is sent to a buffer which holds messages to be sent to particular readers until their turn for transmission over the enable lines come up. The messages are sent on a first come, first serve basis. This message buffering and the periodic polling function of the central controller are represented by the block 638. -The messages are sent on one of the enable pairs 640.
  • The central controller also searches the CRO table for other entries-regarding the same alarm contact. That is, the central controller may send one or more CRO responses to one or more locations in the system in response to a change on an alarm contact. The CRO response can be any of the reader commands associated with the- other reader functions such as "go off line"- or *send CCM status word". In particular, it may be a command to energize a COM relay anywhere in the system. This "energize COM relay", command, when received by the CPU 66 in the reader, causes it to address the relay 352 in Figure 7 through the address lines 346 after selecting the driver 344 using the line 342 and the decoder 338. The coil of the relay 352 is then connected to the Dφ data bit line 348 from the CPU 66 in Figure 2 such that the CPU 66 can energize the relay coil by writing a logic zero on the line 348. This changes the state of the relay contact 354 which notifies an external device coupled to the relay contacts 354 by the lines 38 that some action is needed. The external device can be a fire alarm, sprinkler system, telephone dialer or any other device.
  • After the CRO message is sent, the central controller continues on with processing all the incoming messages. This is symbolized by the transition on the path 642 to the state 644. The same would be true if there were either no CRO table entry corresponding to the CCM message or if the CCM message were outside the time zone set by the CRO table entry. These two transitions are represented by the paths 646 and 648, respectively, to the state 644. The central controaller then sends data to be printed regarding any or all of the incoming messages to a printer as represented by the block 650. The central controller may send a message to the printer regarding the CCM message if desired.
  • This concludes the description of the system of the improved card reader. Below there is listed the machine language in hexadecimal notation, implementing the preferred embodiment of the flow diagrams of Figures 9-16. Appendix A is the machine language for the flow diagrams of Figures 9-11. Appendix B is the machine language for the flow diagrams of Figures 12-13. Appendix C is the machine language for the flow diagrams of Figures 14-16.
  • Appendix A
  • (c) Copyright 1982 Rusco Electronic Systeras a division of Figge International, Inc. -- all rights reserved.
    Figure imgb0001
    Figure imgb0002
    Figure imgb0003
    Figure imgb0004
  • Appendix B
  • (c) Copyright 1982 Rusco Electronic Systems a division of Figge International, Inc. -- all rights reserved.
    Figure imgb0005
    Figure imgb0006
    Figure imgb0007
    Figure imgb0008
    Figure imgb0009
    Figure imgb0010
  • Appendix C
  • (c) Copyright 1982 Rusco Electronic Systems a division of Figge International, Inc.--all rights reserved.
    Figure imgb0011
    Figure imgb0012
    Figure imgb0013
    Figure imgb0014
    Figure imgb0015

Claims (14)

1. A card reader for use in a security system having a central controller, which controller keeps the time of day, said card reader comprising:
a reader circuit for reading data stored on a card;
a time reader for determining the time of day;
a memory for storing said data read from said card and said time of day;
an authorization circuit in said reader for authorizing or refusing authorization based upon the data on said card and for causing said data read from said card and said time of day to be stored in said storage means at a first time; and
a sending circuit for causing said transceiver to send said data read from said card and said stored time of day data from said memory to said central controller at a second time controlled by said central controller.
2. An apparatus as defined in Claim 1 wherein said sending circuit causes only data from one card reading transaction to be sent from said memory to said central controller upon a signal from said central controller..
3. An apparatus as defined in Claim 1 wherein said time reader comprises synchronization circuit for synchronizing the local time at the reader with the time at said central controller.
4. An apparatus as defined in Claim 3 wherein said time reader further comprises an offset circuit for offsetting the local time kept in said card reader from the time kept by said central controller.
5. An apparatus as defined in Claim 1 wherein said card contains at least two data items and an access in circuit said card reader is enabled by one of said data items.
6. An apparatus as defined in Claim 5 wherein said memory stores the other of said data items.
7. An apparatus as defined in Claim 1 further comprising an access circuit for controlling physical access to an area and said authorization circuit for communicating with said access circuit for granting or denying access to said area based upon the data on said card.
8. An apparatus as defined in Claims 7 wherein said access circuit selectively provides access to a controlled location based upon one of the items of data read from said card.
9. An apparatus as defined in Claim 8 or 5 wherein said access circuit generates a first signal if access is to be provided and a second signal if access is to be denied.
-- 10. An apparatus as defined in Claim 9 additionally comprising:
disable circuit for disabling said access circuit in response to said second signal.
11. A method of operating a card reader in a security system having a central controller and plural remote card readers, comprising:
reading card data at a first rate determined by the frequency of card insertions at said reader;
storing said card data in a memory at said reader; and
transmitting said card data from said memory to said central controller at a second rate determines by said controller.
12. A card reader for use in a security system having a central controller which keeps the time of day, said card reader comprising:
a card reader circuit for reading data stored on a card;
a time keeping circuit for keeping the local time at said card reader synchronized with the time at said central controller but offset from it by a predetermined amount, and
a memory for storing the data read from said cards by said card reader circuit and for storing said local time at the time the card was read.
13. An apparatus as defined in Claim 12 further comprising an access circuit for controlling physical access to an area and an authorization circuit communicating with said access circuit for granting or denying access to said area based upon said data read from said card.
14. An apparatus as defined in Claim 12 further comprising a transmitter for communicating data stored in said memory to said central controller at a predetermined time.
EP83304918A 1982-08-27 1983-08-25 Card reader for security system Withdrawn EP0107291A3 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US41230282A 1982-08-27 1982-08-27
US412302 1982-08-27

Publications (2)

Publication Number Publication Date
EP0107291A2 true EP0107291A2 (en) 1984-05-02
EP0107291A3 EP0107291A3 (en) 1986-01-22

Family

ID=23632458

Family Applications (1)

Application Number Title Priority Date Filing Date
EP83304918A Withdrawn EP0107291A3 (en) 1982-08-27 1983-08-25 Card reader for security system

Country Status (3)

Country Link
EP (1) EP0107291A3 (en)
JP (1) JPS59108142A (en)
CA (1) CA1207869A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987003721A1 (en) * 1985-12-09 1987-06-18 Ncr Corporation Data processing method and apparatus
FR2626997A1 (en) * 1988-02-09 1989-08-11 Sgs Thomson Microelectronics System for searching for people in a set of premises
EP0450647A2 (en) * 1990-04-05 1991-10-09 Mitsubishi Denki Kabushiki Kaisha Numerically controlled machine tool management system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0230479U (en) * 1988-08-16 1990-02-27
JPH02229375A (en) * 1989-02-28 1990-09-12 Sanyo Electric Co Ltd Building management device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
EP0016276A2 (en) * 1979-03-13 1980-10-01 Kronos, Inc. Method of and apparatus for time clock recording

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
EP0016276A2 (en) * 1979-03-13 1980-10-01 Kronos, Inc. Method of and apparatus for time clock recording

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TN NACHRICHTEN TELEFONBAU UND NORMALZEIT, vol. 75, 1974, pages 16-22, Dreieich, DE; H. FUHRMANN et al.: "Fernsprechen und Datenverkehr - ein gemeinsames Kommunikationssystem" *
TN NACHRICHTEN TELEFONBAU UND NORMALZEIT, vol. 77, 1976, pages 23-28, Dreieich, DE; A. DEUTSCHMANN et al.: "Tenodat 7000 - Ein rechnergesteuertes Datenerfassungssystem" *
TN NACHRICHTEN TELEFONBAU UND NORMALZEIT, vol. 84, 1982, pages 47-56, Dreieich, DE; W.D. HAASS et al.: "Zeiterfassung und Zutrittskontrolle mit dem TN-Datensystem Tenodat 9020" *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987003721A1 (en) * 1985-12-09 1987-06-18 Ncr Corporation Data processing method and apparatus
FR2626997A1 (en) * 1988-02-09 1989-08-11 Sgs Thomson Microelectronics System for searching for people in a set of premises
EP0450647A2 (en) * 1990-04-05 1991-10-09 Mitsubishi Denki Kabushiki Kaisha Numerically controlled machine tool management system
EP0450647A3 (en) * 1990-04-05 1992-07-08 Mitsubishi Denki Kabushiki Kaisha Numerically controlled machine tool management system
US5248924A (en) * 1990-04-05 1993-09-28 Mitsubishi Denki K.K. Numerically controlled machine tool management system
US5391968A (en) * 1990-04-05 1995-02-21 Mitsubishi Denki Kabushiki Kaisha Numerically controlled machine tool management system

Also Published As

Publication number Publication date
JPS59108142A (en) 1984-06-22
EP0107291A3 (en) 1986-01-22
CA1207869A (en) 1986-07-15

Similar Documents

Publication Publication Date Title
US4538056A (en) Card reader for time and attendance
US4816658A (en) Card reader for security system
EP0137767B1 (en) Improved card reader for security system
US5475378A (en) Electronic access control mail box system
US4634846A (en) Multimode programmable stand-alone access control system
US3866173A (en) Access control system for restricted area
US6879243B1 (en) Electronically-controlled locker system
US4698630A (en) Security system
US4218690A (en) Self-contained programmable terminal for security systems
EP0104767B1 (en) Card reader for security system
US3742453A (en) Automatic hotel security system using coded magnetic card
US20160371904A1 (en) Security device with offline credential analysis
US4812627A (en) Time clock system
WO1998025000A1 (en) Programmable lock and security system therefor
US4544832A (en) Card reader with buffer for degraded mode
EP0107291A2 (en) Card reader for security system
GB1602307A (en) Security systems having remote terminals system for monitoring integrity of communication lines in
EP0105594A2 (en) Card reader for security system
AU569030B2 (en) Improved card for security system
JP2916338B2 (en) Access control device
CZ9901655A3 (en) Circuit arrangement of entry into protected areas
JP2572506B2 (en) Access control system
JPH0333379A (en) Admistration system for rental room
JPH0792845B2 (en) Time recorder
JPH06207481A (en) Building management device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): BE DE FR GB IT

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): BE DE FR GB IT

17P Request for examination filed

Effective date: 19860715

17Q First examination report despatched

Effective date: 19870206

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: FIGGIE INTERNATIONAL INC. (DELAWARE CORPORATION)

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19910301

RIN1 Information on inventor provided before grant (corrected)

Inventor name: YOUNG, JORGE A.

Inventor name: KHANDWALA, BHUPENDRA J.