EP0816600A2 - Système à clé unique - Google Patents

Système à clé unique Download PDF

Info

Publication number
EP0816600A2
EP0816600A2 EP97500112A EP97500112A EP0816600A2 EP 0816600 A2 EP0816600 A2 EP 0816600A2 EP 97500112 A EP97500112 A EP 97500112A EP 97500112 A EP97500112 A EP 97500112A EP 0816600 A2 EP0816600 A2 EP 0816600A2
Authority
EP
European Patent Office
Prior art keywords
key
lock
code
personal
cylinder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP97500112A
Other languages
German (de)
English (en)
Other versions
EP0816600A3 (fr
Inventor
Juan José Garcia-Egocheaga Manzano
Gerardo Aranguren Aramendia
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
De Gestion De Bienes De Equipo Electrico Sl (sgb) Soc
Original Assignee
De Gestion De Bienes De Equipo Electrico Sl (sgb) Soc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from ES9601474A external-priority patent/ES2115539B1/es
Application filed by De Gestion De Bienes De Equipo Electrico Sl (sgb) Soc filed Critical De Gestion De Bienes De Equipo Electrico Sl (sgb) Soc
Publication of EP0816600A2 publication Critical patent/EP0816600A2/fr
Publication of EP0816600A3 publication Critical patent/EP0816600A3/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Definitions

  • This invention concerns an electronic locking system comprising an electronic lock and key incorporating codes that permit different locks to be opened with a single key, and a codifier which is the essential element for managing key authorizations.
  • the lock has an electronic circuit for identifying keys and a mechanism controlling movement of the lock bolts.
  • the key is what triggers the action mechanism of the lock and includes an electronic circuit incorporating an access code.
  • DE-36128 describes a locking device of the type outlined above, in which the different components include fixed identification codes.
  • ES-2073403 describes an electronic security lock designed so that the security code can be changed by means of a "code copy" control device installed in the door and which is operated by the user. In both cases, however, the design of the lock, codifier and system in general is entirely different from the system described above.
  • the purpose of the present invention is to provide a locking system of the type described, but where the key incorporates a number of codes corresponding to an identical number of locks. Under this system, only one key is needed to open all the locks for which it is authorized.
  • Another aim of the invention is to provide a locking system in which the lock can incorporate time and date restrictions limiting the access of particular keys.
  • Another aim of the invention is to develop a system in which the lock is of the same shape and size as traditional locks, so that the new system can be easily and quickly installed in place of an old lock, with one cylinder as well as with two.
  • the locking system consists of a lock, two types of key (a personal and an original key), and a codifier.
  • the lock has an electronic circuit that stores an access code plus the identification codes of each personal key together with their restrictions.
  • the lock also includes an action device that operates on the lock cylinder to enable or prevent turning. The device is controlled by the electronic circuit, which activates it when a key inserted in the lock possesses the lock code and has access permission for that date and time.
  • Each key has an electronic circuit in which is stored the access code of one or more locks with time restrictions.
  • the codifier contains an electronic circuit that is used to give, withdraw or modify personal key authorizations, imposing time and/or date restrictions, which can be different for each key.
  • the codifier also keeps track of authorized keys and communicates this information to the locks, as well as setting their time and date.
  • Figures 1 and 2 show the top and bottom sides of a traditionally shaped key, on which has been drawn a possible configuration and layout of the electronic component of the key forming part of the locking system of this invention.
  • Figure 3 corresponds to the diagram of the electronic component of the key shown in figures 1 and 2.
  • Figure 4 shows a cross section of a lock forming part of the locking system concerned in the invention.
  • Figures 5 and 6 show a possible configuration of the electronic circuit of the lock.
  • Figure 7 gives a diagram of the circuit incorporated into the lock in figure 4.
  • Figure 8 shows a perspective drawing of a codifier used to manage the key codes.
  • Figure 9 corresponds to the electronic circuit of the codifier shown in figure 6.
  • Figure 10 shows the diagram of the codifier of figure 6.
  • Fig. 11 shows a lock as per the present invention in diametral section.
  • Fig. 12 is a similar section to Fig. 11, showing a slight variation in execution.
  • Figs. 13 and 14 correspond to a close-up of detail A of Fig. 11.
  • Figs. 15 and 16 are transversal sections of the lock, cut along A-A and B-B respectively, as per Figs. 13 and 14.
  • the electronic component of the keys involved in the locking system of the invention can adopt the configuration shown in figures 1 and 2.
  • This electronic assembly consists of a microprocessor 1, which may be replaced by a specific application integrated circuit with equivalent features,an EEPROM 2, a printed double-sided circuit, indicated in general by reference number 3, which includes three contacts corresponding to the data signal 4, the synchronous clock 5 and the negative power supply 6.
  • the points of contact in the key area serve to allow communications with the lock or the codifier.
  • the communication established through them is a two-wire cascade synchro: a synchro signal line generated by the lock or the codifier serving as masters and a two-way data line.
  • the key also includes a surface mounted push button 8 (switch with a single stable position) and a battery 9 (e.g. a 3-volt lithium battery) with a battery holder 10 on the weld side of the printed circuit.
  • the circuit includes several passive discrete elements 11 constituting the RC circuit of the pulse generator, or pull-up resistances.
  • the layout shown here is modified for manufacturing purposes by introducing the integrated circuits without encapsulation and the discrete elements built using hybrid circuit techniques in the printed circuit.
  • Figure 4 shows, in cross section, a lock which can, in principle, be of the same size and shape as traditional locks to ensure their easy substitution without requiring changes in the other components of the door lock.
  • the example shown in figure 4 corresponds to a "Europerfil" lock, although it is applicable to locks of all shapes and types.
  • a number of traditional elements are preserved, such as the housing 12 in which is mounted the cylinder 13, which produces the turning of the cam 14, which may or may not be of the monoblock variety.
  • the housing 12 incorporates protection devices, such as the hard metal drilling-proof pins 16.
  • the key insertion groove 17 has a lateral key guide 18 making it impossible to remove the key once it has been turned.
  • the cylinder 13 has five perforations, two of them corresponding to contacts 4 and 5 of the key, figure 1. Another of the perforations, referenced with number 20, is a zero volt contact and corresponds to contact 6 of the key, figure 1, are data input/output perforations.
  • the fourth perforation, referenced with number 21, corresponds to the mechanical recovery device for blockade pin 22, which is the fifth perforation.
  • the first three are simple electric contact pieces which must be insulated from the cylinder and are therefore introduced into the perforations with a covering sleeve which also, due to the narrowing in the part of the key insertion groove, keeps it from emerging more than 1 mm, the amount necessary to exert pressure on the key and establish communication with it. These contacts do not keep the cylinder from turning. When the cylinder is in the non-turning position, the contacts 19 and 20 are in contact with contacts 23 which carry their signals to the data transmission wire 24 leading to the electronic circuit 25. The entire assembly is monitored by this electronic circuit.
  • the power used by the assembly is provided by batteries 26 in non-electrified doors, or by a small uninterrupted power supply unit in the case of electrified doors, connected to the main supply.
  • the power needed to turn the cylinder 13 is provided by the user's hand as it turns the key in the lock.
  • Electrified doors can be opened by a traditional system consisting of a solenoid or electric motor.
  • a battery is used, as shown in the drawing there is a low-charge indicator 27 that lights up when the battery charge falls below, e.g. 20%. Both the battery and the low-charge indicator are on the inside of the lock, aimed towards the inside of the dwelling, and the battery is changed through the side of the lock facing the inside of the dwelling as well.
  • the batteries do not necessarily have to be located inside the lock, but may be on the indoor side of the door, thus allowing for larger batteries with higher capacity and longer duration.
  • the cylinder blockade pin is activated by a solenoid or motor on receiving the necessary signal from the electronic circuit 25. If the system has a motor 28, it only does a half turn, due to the presence of a mechanical stop, causing the pin 22 to rise or fall.
  • the motor axis and the pin are connected to each other by means of a traditional shaft and hand wheel system. If the lock battery is too low to work, the necessary energy is supplied by the key, once inserted into the lock and the switch 8, figure 1, turned on, yielding three volts through the metal part of the key.
  • the assembly comprising contact 23, the mechanical recovery of the pin 31, the electric motor 28, the blockade pin and shaft system 22, and the transmission wire 24 leading to the electronic circuit, should be mounted as a package and fitted up into the lock through the lid 32 located on the underside.
  • the contacts 19, 20 and the pivot 21 should be mounted with the cylinder removed.
  • the electronic circuit of the lock may be configured as shown in figures 5 and 6, following the diagram in figure 7.
  • the circuit includes a microprocessor 33 or a specific application integrated circuit, in addition to an EPROM.
  • the circuit also includes one or two 3-volt (e.g. lithium) batteries 34, with a holder 35 placed on the weld side of the printed circuit 36.
  • the layout presented here can be changed for manufacturing purposes by introducing the integrated circuits without encapsulation and the discrete elements built using hybrid circuit techniques in the printed circuit.
  • the lock may optionally be connected to a computer.
  • a connection to the serial port of the computer must be added to the electronic circuit.
  • the program can be developed so that authorized key and restrictions data are stored in the computer, and information is relayed in real time on openings and attempted openings for data validation and presence control.
  • the lock can also transmit messages and/or trigger alarms according to the instructions it receives.
  • Figure 8 shows a possible configuration of a codifier fitted with two inputs 45 and 46 for the original and personal keys, respectively, each with its corresponding reading devices.
  • the codifier also has a display 47, a connection to the computer serial port 48 and four buttons 49 for authorizations, deauthorizations, modifications and confirmation.
  • the codifier adapts to the simplest operation of the assembly, which only involves processing the code and not the restrictions or personalized control of the personal keys authorized. To develop these latter functions, the codifier must be connected to a computer so that they can be performed through it.
  • the codifier is also option is for the codifier to be provided with an electronic circuit and a keyboard so that it can be operated directly.
  • codifier In an even simpler development of the codifier, it is possible to use a computer keyboard and its larger screen capacity to perform the codifier's functions, in which case the physical configuration of the codifier is reduced to the inputs for the two keys and to the serial port connection with the computer.
  • the electronic circuit of the codifier can have the configuration shown in figure 9 with the diagram shown in figura 10.
  • the electronic components comprising this circuit are: a microcontroller-type microprocessor 50, a liquid crystal screen module 51, keys for function selection using the keyboard 52, power supply from a power outlet using a system based on an external AC/DC converter and an internal voltage regulator and connector for DC input 53, a driver and transceiver for adapting to voltages and line negative logic 54, a connector 55 for the serial line to the computer, a double-sided printed circuit with two areas of three contacts in gold corresponding to the synchronous clock 56, the data signal 57, and the negative power supply 58, each of whose areas is used for the contact of one of the keys (the original and the personal key), and various passive discrete components 59 for pulse generation and pull up.
  • the features of the invention make it possible to have a single key system for opening numerous locks with a single key containing the electronic access code of each of the locks for which access permission has been granted.
  • the locking assembly of the invention consists of the electronic keys, the electronic locks and a codifier. The operation of each of these elements and its relation to the other elements is explained below.
  • the original key is where a single code is stored corresponding to the lock to which it belongs and for which it provides backup, written in the EPROM by means of the codifier. It can also store five more codes corresponding to codes that are obsolete but that serve to update the codes in personal keys. Another octet is reserved for generating the lock initialization code. A final octet of the EPROM is reserved for different pointers indicating the update status of the data.
  • This key opens the lock to which it belongs. When it is inserted in the lock, the key points 4 and 5 come into electric contact with the points 19 of the lock.
  • the communication used in this case between the key and the lock is an SPI-type cascade synchro reduced to two wires.
  • the communication is defined as follows:
  • Opening process following a given communication protocol based on the above communications, if the current code of the key coincides with that of the lock, the electronic circuit of the lock sends a series of electrical pulses to the motor 38 which acts by sliding the blockade pin 22, freeing the cylinder 12.
  • the motor 38 acts by sliding the blockade pin 22, freeing the cylinder 12.
  • Code change process the original key is also used to change the code of the lock. This is an electronic operation, based on another specific electronic protocol.
  • the key is inserted and contact is made between the points 4, 5 and 19, if the key has a lock code electronically identified as an old code, the lock asks the key for the new code and changes it in its EPROM.
  • the key also notes that the code has been changed and permits its use from that moment on for opening or for copying the code to other personal keys.
  • the battery inside the key has been provided to take over when the battery inside the lock fails to supply it with power. That is, normally the key battery is not in operation. Only when the lock fails to open, due apparently to lack of electric power supply, does the user press the switch on the grip of the key to provide the lock with power from the key battery.
  • a lock can restrict the time, days of the week and days of the year in which a given key can have access to it. This means using a restricted lock and an original key for locks with restrictions.
  • Original keys for restricted locks contain all the elements and possibilities of ordinary original keys plus the following characteristics:
  • Each key is identified by its code and can contain restrictions of three types: a time-of-day access window, a day-of-week access window and a day-of-year access window.
  • these windows can be interrelated to impose restrictions.
  • the key In addition to performing the functions described above, transfers all the information stored in its serial EPROM to the serial EPROM of the restricted lock.
  • the key By communicating with the codifier, the key enables the codifier to write in its EPROM all data concerning restrictions in the format indicated (see codifier section).
  • the personal key stores the codes to which access has been allowed.
  • Each code consists of 64 bits organized into 8 bytes.
  • the first byte is saved without encoding while the seven remaining bytes are encoded with a specific algorithm based on the individual code of each key, introduced during the manufacture of the microcontroller.
  • an indexed list is stored in the internal EPROM of the microcontroller.
  • the first place scanned is the immediately inferior position in the internal EPROM, followed by a search in the external EPROM.
  • the logical level is defined by the original Philips 12C standard: two wires, one for data and the other for the controller clock for the microcontroller.
  • the data signal has a pull-up resistance to permit recognition logic, etc.
  • the basic protocol is as defined for the serial EPROM adopted by most manufacturers, including Philips, Xicor, Atmal, Microchip, etc.
  • the higher protocol comprises: writing of 8 byte pages for recording new codes; random readings of 1 to 4 bytes, or of 1 to 8 bytes, in the process of searching for a code for its identification on opening, or its inclusion in the recording, respectively; the sequential reading of 4 bytes in the process of identification.
  • the key makes it possible to unlock the doors for which it is authorized (hundreds of doors).
  • the personal key can carry numerous authorizations. Each authorization is given by the owner of the lock in question or by its supervisor, and can be given with time and/or date restrictions. In addition, the owner of the lock can deauthorize a given personal key (see codifier section).
  • the communication used in this case is a cascade synchro type SPI but reduced to two wires.
  • the communication is defined as follows:
  • the lock will not open. If one of the codes is correct, it activates the motor and eliminates the obstacle keeping the key from turning in the lock, as described in the lock description above.
  • Communication with the codifier is based on the same standard and type of communication, varying only in the higher communication protocol, which must perform the following operations: the reading of the individual code of the key, the erasure of one code and the writing of another new one (see codifier functions).
  • Personal keys are identified with an individual code for each personal key. During the manufacturing process, each key is given a code that identifies it with a sufficient number of bits to distinguish it from the rest. As this code exists merely for identification or distinction purposes, a small number of bits suffices. For example, with 24 bits 16,777,216 different keys can be made. This code is electronically recorded and can never be changed or altered.
  • the battery has been provided for times when the lock is left without power supply due to failure of the battery located inside the lock. That is, the key battery is ordinarily not working. Only when the lock fails to open and it is suspected that this must be due to lack of electric power, is the switch pressed on the grip of the key, thus providing electric power to the lock from the key battery.
  • the restrictions system can be designed in two ways. The first, described above, concerns authorization restrictions given by the codifier and controlled and stored in the lock. In these cases, when the locks are not connected to a computer, the restrictions are conveyed to the lock through the original key, as outlined above. An alternative procedure is described below in which the authorizations, together with their restrictions, are stored in the personal key. In these cases, once the code has been checked and okayed, the lock checks the time and/or date restrictions to see whether the current time and date, which is known by the lock, are within the authorized range. If they are, the lock proceeds to activate the motor or solenoid, unblocking the cylinder to permit opening. In this case, which is the one we shall describe now, the system is as follows:
  • an authorization may introduce restrictions on the times of day for which each personal key has access, the days of the week for which access is authorized, or the days of the year for which entry is permitted. This entails programming the lock to check the restrictions contained in the personal key.
  • the personal key for restricted locks contains all the elements and possibilities of the personal key plus the following features:
  • Each personal key is identified by its code and contains restrictions of the three types defined above: time-of-day access window, day-of-week access window and day-of-year access window. These windows can be related to impose restrictions using the pointers.
  • the personal key when the personal key interacts with the lock, in addition to the functions described above, it also checks time restrictions so that if the current date and hour are within the permitted range, the lock will give the order to open.
  • the key When the personal key interacts with the codifier, the key allows the latter to write in its EPROM all the data concerning restrictions in the format described above (see codifier section).
  • the lock carries stored inside a unique code composed of 8 bytes in the EPROM of the microcontroller.
  • the basic operation consists of checking the code of a key, whether original or personal, and enabling access if the key is correct.
  • communication commences with transmission from the lock, which asks for identification of the type of key. If the identification is correct, it sends part of the enciphered code together with various control words. On receiving this communication, the key must search among its codes for one that matches the characteristics of the part of the code received and then send the remainder of the code, which is likewise enciphered. In case various codes match the first part of the code sent by the lock, the operation is repeated until all the codes have been run through or the correct one is found.
  • the microcontroller of the lock goes into sleep phase and does not enable opening of the lock. If one of the codes is correct, it activates the motor and eliminates the obstacle keeping the key from turning in the lock. Following a given communication protocol based on the communication described above, if the current code of the key coincides with that of the lock, the electronic circuit of the lock sends a series of electric impulses to the motor 28, which acts by sliding the blockade pin 22, thus freeing the cylinder 13. When the hand turns the key in the lock, this turns the cylinder 13, which moves the cam 14 as in traditional locks, thus activating the opening mechanisms of the door.
  • the pivot 21 On insertion of the key, the pivot 21 which in its resting position against the top of the key insertion groove 17 and is pushed down to the bottom of the groove by insertion of the key is moved. After being pushed down some 2.5 mm, the pivot is positioned so that it no longer keeps the cylinder from turning, but presses an L-shaped piece 29 whose end runs along the axis of the shaft of the blockade pin and presses a spring 30 so that when the key is withdrawn, the L-shaped piece 29 tends to rise, thus allowing the blockade pin to rise and enter the cylinder, blocking it. In this way recovery of the blockade pin is achieved by both an electric and mechanical system.
  • the key inserted is an original key, it can also modify the code stored in the lock and introduce a new one. This is useful in cases of security risk due to a lost key or any other reason.
  • the key inserted is identified as an original key, a check is made to see that its current code is correct. If it is, opening is enabled. In this case, on inserting the original key and making contact between the points 4, 5 and 19, if the key has a lock code electronically identified as an old code, the lock asks the key for the new code and changes it in its EPROM.
  • the lock may incorporate three optional elements: electricity from the main power supply, restricted access and real time communication with a computer.
  • a small uninterrupted supply circuit consisting of:
  • These elements are located on the printed circuit and introduced in a metal box with two connectors: the 220 volt input from the main power supply and the 3-volt output. As long as there is electrical power, the rectifier elements supply power to the lock. In the absence of power supply, the battery takes over supplying electricity.
  • a lock can introduce restrictions on the time of day when each key can open the lock, on the days of the week on which a key has access or on the days of year on which access is authorized. This entails using a restricted lock and an original key for locks with restrictions. Restricted locks contain all the elements and possibilities of normal locks, plus the following features:
  • Each personal key is identified by its code and can contain restrictions of three types: a time-of-day access window, a day-of-the-week access window, and a day-of-the-year access window. These windows can be related with the pointers to impose restrictions similar to the following examples: Code: 2A 56 F3 20 AB C6 E9 16
  • It also has an integrated circuit for the real time clock that keeps permanent track of the minute, hour, day of the week, day of the month, month and year. It is operated by means of a software-controlled 12C line from the microcontroller.
  • the lock When the lock operates with this option, in addition to the functions described above, on insertion of the key following the above procedure, and after checking that the key possesses the lock's code, it checks the restrictions database to see if opening is permitted at the present time. To do this, it asks for the key code and searches in the corresponding register to see if opening is authorized for the present moment. The time and date are obtained from the real time clock. To keep the real time clock in operation, it is necessary for this option to include electrification of the lock from the main power supply.
  • the key inserted in the lock is an original key, in addition to the functions described above, it checks to see if there are restriction data to be transferred. If there are data to be transferred, it permits the data to be copied from the original key to the lock, for which purpose it uses the SPI communication between the original key and the lock, and the 12C communication between the microcontroller and the serial EPROM of the lock, both of which have been described in the corresponding sections.
  • serial line control algorithms for the following functions: to transmit a code by serial line and receive clearance confirmation.
  • the code of the key requesting access is sent to the computer, which says whether the key has access or not.
  • the computer can perform a range of operations: it can simply check whether the key has access, check whether at the current moment (time and date) it has access permission, perform presence control functions, perform security functions triggering alarms or other similar functions based on the information supplied through the key and the lock.
  • the microcontroller 50 When the codifier receives electric power, the microcontroller 50 initializes all the elements and enters a loop for random number generation. This loop can only be exited by interruption generated by pressing one of the keys 49 or by reception of data through the serial line 48.
  • Pressing this key accesses a subprogram that performs the following operations: it checks to see that an original key 45 and a personal key 46 have been introduced in the slots. If either is missing or incorrect, an error occurs and is notified on screen 47.
  • the key check is performed by sending a given code from the microcontroller 50 through the contacts 56 and 57 which connect with the key contacts 4 and 5. If the keys are correct it reads the old codes of the original key and asks the personal key if it possesses any of them, i.e. if at a previous time it has had access to the lock and whether it is now trying to update that access. If the personal key has any of the codes, they are erased. The space of the freed memory is eliminated and a new access index to the external EPROM is generated.
  • the personal key looks for the right location for the new code, opens up space in the memory, writes the new data and generates a new access index to the EPROM. This entire process occurs at the program or electronic level and is not reflected in the physical elements.
  • the original key is inserted in the slot 45 and its points 4 come into contact with the reading devices.
  • the personal key is inserted and its points 4 come into contact with the reading devices. In this way, the circuits of the two keys and the electronic circuit make contact.
  • the code contained in the original key will be available for passing to the personal key by giving the command to do so.
  • the user must then use the menu to answer whether s/he wishes to include restrictions. If not, the "Confirm” command is given and only the code is recorded in the EPROM of the personal key. If “s” were pressed instead, using the codifier's, the computer's, or its own keyboard, the next step would be to type in the restrictions (see Codifier logic). Once finished, the user types "Confirm” to record (i) in the memory of the personal key the code and its restrictions, and (ii) in the codifier memory the authorized key code, the name of the person to whom it belongs and the restrictions imposed. This information is recorded in both EPROMs.
  • the lock cylinder is conceived as a single cylinder which goes from one end of the lock to the other or a two-part cylinder, one corresponding to the outer part of the lock, (13) and the other to the interior part (66) which is shown here by way of example.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
EP97500112A 1996-07-02 1997-07-01 Système à clé unique Withdrawn EP0816600A3 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
ES9601474 1996-07-02
ES9601474A ES2115539B1 (es) 1996-07-02 1996-07-02 Sistema de llave unica.
ES9701333 1997-06-18
ES9701333A ES2135330B1 (es) 1996-07-02 1997-06-18 Mejoras introducidas en el objeto de la patente 9601474, presentada el 2 de julio de 1996, relativa a un sistema de llave unica.

Publications (2)

Publication Number Publication Date
EP0816600A2 true EP0816600A2 (fr) 1998-01-07
EP0816600A3 EP0816600A3 (fr) 2000-09-20

Family

ID=26154975

Family Applications (1)

Application Number Title Priority Date Filing Date
EP97500112A Withdrawn EP0816600A3 (fr) 1996-07-02 1997-07-01 Système à clé unique

Country Status (2)

Country Link
EP (1) EP0816600A3 (fr)
ES (1) ES2135330B1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000068536A1 (fr) * 1999-05-06 2000-11-16 Assa Abloy Ab Dispositif a cle et verrou
US7591160B2 (en) 2004-03-11 2009-09-22 Keso Ag Electromechanical lock cylinder
FR3119411A1 (fr) * 2021-02-04 2022-08-05 Cogelec Procédé de fonctionnement d’un système de contrôle d'accès
EP4358043A1 (fr) * 2022-10-18 2024-04-24 dormakaba Schweiz AG Procédé de mise en service d'un dispositif de verrouillage électromécanique

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4534194A (en) * 1981-03-16 1985-08-13 Kadex, Incorporated Electronic lock system
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
GB2172928A (en) * 1985-03-25 1986-10-01 Dusung Precision Co Electronic lock and key
EP0278906A1 (fr) * 1987-02-09 1988-08-17 R. Berchtold Ag Dispositif de fermeture électromécanique
US5083122A (en) * 1989-02-21 1992-01-21 Osi Security Devices Programmable individualized security system for door locks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2106668B1 (es) * 1994-11-18 1998-06-01 Azbe B Zubia S A Perfeccionamientos introducidos en cilindros de cierre electronicomecanico.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4534194A (en) * 1981-03-16 1985-08-13 Kadex, Incorporated Electronic lock system
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
GB2172928A (en) * 1985-03-25 1986-10-01 Dusung Precision Co Electronic lock and key
EP0278906A1 (fr) * 1987-02-09 1988-08-17 R. Berchtold Ag Dispositif de fermeture électromécanique
US5083122A (en) * 1989-02-21 1992-01-21 Osi Security Devices Programmable individualized security system for door locks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
M]LLER: "schliessanlagen ihre organisation-funktion-sicherheit" W & S WIRTSCHAFTSTECHNIK UND SICHERHEITSTECHNIK., no. 1/2, 1 January 1992 (1992-01-01), pages 29-32, XP000256862 HEIDELBERG DE *
PHILLIPS: "kaba nova : a self-contained system with no hardwiring" LOCKSMITH LEDGER INTERNATIONAL, vol. 49, no. 5, 1 April 1989 (1989-04-01), pages 62-64, XP000007785 H PUBLISHING CO US *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000068536A1 (fr) * 1999-05-06 2000-11-16 Assa Abloy Ab Dispositif a cle et verrou
US7099474B1 (en) 1999-05-06 2006-08-29 Assa Abby Ab Key and lock device
CZ304736B6 (cs) * 1999-05-06 2014-09-17 Assa Abloy Ab Zařízení klíče a zámku
US7591160B2 (en) 2004-03-11 2009-09-22 Keso Ag Electromechanical lock cylinder
FR3119411A1 (fr) * 2021-02-04 2022-08-05 Cogelec Procédé de fonctionnement d’un système de contrôle d'accès
EP4039922A1 (fr) 2021-02-04 2022-08-10 Cogelec Procédé de fonctionnement d'un système de contrôle d'accès
EP4039923A1 (fr) 2021-02-04 2022-08-10 Cogelec Procédé de fonctionnement d'un système de contrôle d'accès
EP4358043A1 (fr) * 2022-10-18 2024-04-24 dormakaba Schweiz AG Procédé de mise en service d'un dispositif de verrouillage électromécanique
WO2024083877A1 (fr) * 2022-10-18 2024-04-25 Dormakaba Schweiz Ag Procédé de fonctionnement d'un dispositif de verrouillage électromécanique

Also Published As

Publication number Publication date
ES2135330A1 (es) 1999-10-16
EP0816600A3 (fr) 2000-09-20
ES2135330B1 (es) 2000-05-16

Similar Documents

Publication Publication Date Title
US5552777A (en) Mechanical/electronic lock and key
EP0527886B1 (fr) Systeme de securite electronique
US5823027A (en) Electrical/mechanical access control systems and methods
US6000609A (en) Mechanical/electronic lock and key therefor
HU221771B1 (hu) Programozható elektronikus zárszerkezet, elektronikus kulcs és biztonsági zárhoz való zárhenger
US6840072B2 (en) Electronic token and lock core
US6374653B1 (en) Mechanical/electronic lock and key therefor
US6005487A (en) Electronic security system with novel electronic T-handle lock
US5541581A (en) Electronic combination lock security system
US6384711B1 (en) Electronic lock in cylinder of standard lock
EP0635182B1 (fr) Systeme de securite electronique
US4972182A (en) Electronic security lock
US5540069A (en) Electronic and mechanical lock and key therefor
EP0816600A2 (fr) Système à clé unique
CA2157480C (fr) Systeme de securite electronique a mecanisme de verrouillage electronique a tourne-a-gauche
RU2798997C1 (ru) Самопрограммируемая система и способ контроля доступа для электромеханических замковых устройств

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIC1 Information provided on ipc code assigned before grant

Free format text: 7E 05B 49/00 A, 7E 05B 47/06 B, 7E 05B 47/00 B

AKX Designation fees paid
REG Reference to a national code

Ref country code: DE

Ref legal event code: 8566

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20010321