1. Field of the Disclosure
This disclosure relates to the field of electronic access control and, more particularly, to electronic access control systems and methods that provide for improved energy efficiency.
2. Description of the Related Art
Lock and key sets are used in a variety of applications, such as in securing file cabinets, facilities, safes, equipment, and the like. Some traditional mechanical lock and key sets can be operated without the use of electrical energy. However, mechanical access control systems and methods can be costly and cumbersome to administer. For example, an administrator of a mechanical access control system may need to physically replace several locks and keys in a system if one or more keys cannot be accounted for.
Electronic lock and key systems have also been used for several years, and some have proven to be reliable mechanisms for access control. Electronic access control systems can include an electronic key that is configured to connect to a locking mechanism via a key interface. In at least some electronic access control systems, the electronic key can be used to operate the locking mechanism via the key interface. Existing electronic access control systems suffer from various drawbacks.
An object of some embodiments disclosed herein is to provide an electronic key that is capable of functioning as a storage device for digital files. Furthermore, some embodiments provide an electronic key configured to function as a memory card reader. Some electronic key embodiments provide a single connector that interfaces with both an electronic lock and a computer system. Some embodiments provide an energy-efficient technique for operating an electronic locking mechanism. Some electronic lock embodiments include a low power electronic latch that secures a bolt. Some embodiments disclosed herein provide an improved electronic locking system that provides a convenient way to charge a power source for the locking system. Some embodiments disclosed herein provide an electronic locking system that employs user-supplied mechanical force to generate power to operate an electronic lock and/or to operate an electronic key.
An object of some embodiments is to provide for easier administration of an electronic access control system. An object of some embodiments is to provide an electronic access system that provides for simplified electronic lock operation by using program logic to evaluate one or more criteria, conditions, or events. Some embodiments enable an access control system administrator to replace existing locks in doors, pad locks, or locks in remote locations with electronic locks that do not require a wired electrical connection in order for the lock to be powered. Some embodiments enable a single electronic key to replace multiple mechanical keys.
One embodiment provides a rechargeable electronic key for use with an electronic lock. The electronic key includes a memory device; a private identifier for the electronic key stored in the memory device, the private identifier being accessible to the electronic lock but not readily accessible to a user of the electronic key; a key controller configured to electrically connect to a lock controller associated with the electronic lock; a power management circuit configured to electrically connect to a power source; and a rechargeable battery. The power management circuit is configured to supply energy from the rechargeable battery to other components of the electronic key, to supply energy from the rechargeable battery to the electronic lock when the electronic key is engaged with the electronic lock, and to recharge the rechargeable battery when the power management circuit is connected to the power source.
In another embodiment, an electronic access control system is provided. The electronic access control system includes an electronic lock and an electronic key. The electronic lock includes a bolt; a lock memory; key access information stored in the lock memory; a key connector; and a piezoelectric latch configured to secure the bolt in a fixed position when the piezoelectric latch is in a first state and to allow the bolt to move between a locked position and an unlocked position when the piezoelectric latch is in a second state. The electronic key includes a key memory; a private identifier stored in the key memory, the private identifier being accessible to the electronic lock but not readily accessible to a user of the electronic access control system; a lock connector disposed on the key housing, the lock connector being configured to electrically connect to the key connector of the electronic lock; and a battery. The battery is configured to provide energy to actuate the piezoelectric latch between the first state and the second state when the lock connector of the electronic key is inserted into the key connector of the electronic lock, if it is determined that the private identifier, or the public and private identifiers, is present in the key access information stored in the lock memory.
In another embodiment, an electronic access control system having switchable power states is provided. The electronic access control system includes an electronic key. The electronic key includes a key housing; a first connector disposed on the key housing, the connector having a key power supply pin and a key ground pin, and the first connector being configured to electrically connect to a digital bus associated with the electronic lock; a microcontroller; a battery; and a switching device connected between the battery and the power supply pin of the first connector and configured to allow energy to flow from the battery to the power supply pin of the first connector when the electric potential on the first connector side of switching device is less than the electric potential on the battery side of the switching device. In some embodiments, the electronic access control system includes an electronic lock. The electronic lock can include a lock chassis; a lock controller; and a second connector having a lock ground pin. The lock ground pin is electrically connected to the lock chassis, and the second connector is configured to electrically connect to the first connector. The key ground pin is isolated from ground when the first connector is not connected to the second connector. The key ground pin connects to the lock chassis, and the battery of the electronic key supplies electrical energy to the electronic access control system, when the first connector is connected to the second connector.
In yet another embodiment, an electronic access control system is provided. The electronic access control system includes an electronic lock and an electronic key. The electronic lock includes a lock chassis; a lock controller with nonvolatile memory; and a lock USB connector having a lock ground pin and a lock power supply pin. The lock ground pin is connected to the lock chassis. The electronic key includes a key controller; a key memory; a public identifier stored in the key memory, the public identifier being readily accessible to a user of the electronic access control system; a private identifier stored in the key memory, the private identifier being accessible to the electronic lock but not readily accessible to a user of the electronic access control system; a key USB connector disposed on the key housing, the key USB connector having a key power supply pin and a key ground pin, and the key USB connector being configured to electrically connect to the lock USB connector of the electronic lock; and a circuit comprising a battery and a diode connected between the battery and the key power supply pin. The key ground pin is isolated from the key USB connector such that, when the key USB connector is inserted into the lock USB connector, the key ground pin connects to the lock USB chassis and the battery of the electronic key supplies energy to the electronic access control system.
A further embodiment provides an electronic lock that generates electrical energy for the electronic lock and an electronic key. The electronic lock includes a lock memory; key access information stored in the lock memory; a key connector having a power supply pin; a generator configured to be driven by movement of the electronic key when the electronic key is used in the key connector; a lock circuit; and a latch electrically connected to the lock circuit, the latch being configured to actuate between a locked state and an unlocked state when an identifier associated with the electronic key is present in the key access information stored in the lock memory. The generator is configured to at least partially power the lock circuit and the electronic key.
In a further embodiment, an electronic key for use with an electronic lock and for storing digital files is provided. The electronic key includes a key memory; a private identifier for the electronic key, the private identifier being accessible to the electronic lock but not readily accessible to the user of the electronic key; a digital bus connector, the digital bus connector being configured to electrically connect to a digital bus associated with the electronic lock, and the digital bus connector being configured to electrically connect to a digital bus associated with a computer system having a microprocessor, a main memory, and an operating system; and a microcontroller configured to allow the computer system to access the key memory as a mass storage device.
An additional embodiment provides an electronic key for use with an electronic lock. The electronic key includes a socket for a solid state non-volatile memory device; a microcontroller having a non-volatile memory; a public identifier for the electronic key stored in the non-volatile memory of the microcontroller, the public identifier being readily accessible to a user of the electronic key; a private identifier for the electronic key stored in the non-volatile memory of the microcontroller, the private identifier being accessible to the electronic lock but not readily accessible to the user of the electronic key; and a digital bus connector disposed on the key housing, the digital bus connector being configured to electrically connect to a digital bus associated with the electronic lock.
In an embodiment, an electronic access control system with a streamlined user interface is provided. The electronic access control system includes an electronic lock, a first electronic key, and a second electronic key. The electronic lock includes a lock memory configured to store key access information; a lock identifier; a lock controller comprising program code for comparing a key identifier to the key access information stored in the lock memory; and a lock bus connector. The first electronic key includes a first memory device; a lock configuration file comprising key access information for configuring the electronic lock; a first private identifier for the first electronic key, the first private identifier being accessible to the lock controller but not readily accessible to a user of the first electronic key; a first key controller comprising program code for providing key access information to the electronic lock when first predetermined criteria are met, program code for accessing the electronic lock when second predetermined criteria are met, and program code for erasing the electronic lock when third predetermined criteria are met; and a first digital bus connector configured to electrically connect to the lock bus connector. The second electronic key includes a second memory device; a second private identifier for the second electronic key, the second private identifier being accessible to the lock controller but not readily accessible to a user of the second electronic key; a second key controller comprising program code for accessing the electronic lock without user input when fourth predetermined criteria are met; and a second digital bus connector configured to electrically connect to the lock bus connector.
For purposes of summarizing the invention, certain aspects, advantages and novel features have been described herein. Of course, it is to be understood that not necessarily all such aspects, advantages or features will be embodied in any particular embodiment. Moreover, it is to be understood that not necessarily all such advantages or benefits may be achieved in accordance with any particular embodiment of the invention. Thus, for example, those skilled in the art will recognize that the invention may be embodied or carried out in a manner that achieves one advantage or group of advantages as taught herein without necessarily achieving other advantages or benefits as may be taught or suggested herein.
A general architecture that implements the various features of the invention will now be described with reference to the drawings. The drawings and the associated descriptions are provided to illustrate embodiments of the invention and not to limit the scope of the invention. Throughout the drawings, reference numbers are reused to indicate correspondence between referenced elements.
Systems and methods which represent various embodiments and example applications of the present disclosure will now be described with reference to the drawings.
For purposes of illustration, some embodiments are described in the context of access control systems and methods incorporating a type of Universal Serial Bus (USB) connection. The USB connection can be configured to comply with one or more USB specifications created by the USB Implementers Forum, such as, for example, USB 1.0, USB 1.1, USB 2.0, USB On-The-Go, Inter-Chip USB, MicroUSB, USB Battery Charging Specification, and so forth. The present invention is not limited by the type of connection which the systems and methods employ. At least some of the systems and methods may be used with other connections, such as, for example, an IEEE 1394 interface, a serial bus interface, a parallel bus interface, a magnetic interface, a radio frequency interface, a wireless interface, a custom interface, and so forth. At least some of the figures and descriptions, however, relate to embodiments using a USB interface. The system may include a variety of uses, including but not limited to access control for buildings, equipment, file cabinets, safes, doors, padlocks, etc. It is also recognized that in other embodiments, the systems and methods may be implemented as a single module and/or implemented in conjunction with a variety of other modules. Moreover, the specific implementations described herein are set forth in order to illustrate, and not to limit, the invention. The scope of the invention is defined by the appended claims.
The access control system as contemplated by at least some embodiments generally includes an electronic lock and an electronic key. The electronic lock and the electronic key are configured to communicate with each other via an interface. The electronic lock can include, for example, a bolt, an electronic latch, nonvolatile memory, a key interface or connector, a microcontroller, a generator, one or more gears, a switching regulator, lock configuration information, key access information, an access log, program modules, other mechanical components, and/or other circuits. In some embodiments, the electronic latch includes, for example, a piezoelectric latch or another type of energy-efficient latch or actuator. Two or more functional components of the lock can optionally be integrated into a single physical component. For example, the memory of the lock may be embedded on the same integrated circuit as the microcontroller.
In some embodiments, the electronic key can include, for example, a key housing, a memory device, one or more key identifiers, lock configuration files containing key access information for a lock, a microcontroller, a lock interface or connector, a power source, a memory card slot, program modules, other mechanical components, and/or other circuits. Some embodiments of the electronic key can also include a battery, a battery charger, a digital bus connector, circuitry to detect when the electronic key is connected to another device, a second memory integrated with the microcontroller, a storage device controller, a file system, and/or program logic for determining what actions perform in response to conditions or events.
In some embodiments, the access control system includes an application program for creating a domain file and/or lock configuration files that can be stored on a computer or on electronic keys. In some embodiments, the access control system can be subdivided into domains so that key access information for groups of electronic locks and keys to be managed more efficiently. For example, a domain file can include access control information for all locks and keys in a domain, while a lock configuration file can contain access control information for a single lock in the domain.
In the embodiment shown in
A second domain 122 of the access control system 100 includes locks 130, 132, 134, 136 associated with a second controlled access environment, such as, for example, a workplace. The second domain 122 includes a master key 124 that has administrative privileges for all of the locks 130, 132, 134, 136 in the second domain 122. The second domain 122 also includes slave keys 126, 128 that have access privileges to some of the locks. Keys in the access control system 100 illustrated in
In some embodiments, each of the domains 102, 122, 138 is associated with a domain file. The domain file can contain information associated with a domain of the access control system 100, including, for example, key users and locks in a domain. One or more lock configuration files can also be associated with each domain. In some embodiments, a lock configuration file contains key access information associated with an electronic lock. An example interface 1000 for modifying such information is shown in
The flowchart in
In the embodiment shown in
After the lock configuration files containing key access information are transferred to the master key, the master key can be used to program locks in the domain of the master key (206). For example, in some embodiments, the master key can be configured to program or reprogram a lock when a public identifier and a private identifier of the master key match identifiers contained in the key access information stored on the lock, when a lock identifier matches the file name of a lock configuration file on the master key, and when a connector on the master key is inserted into the lock. A private identifier of the master key can also be copied to the lock at the time that the lock is programmed or at some earlier time. The private identifier is not visible to a person and is not available to the admin application. In some embodiments, when a slave key with a public identifier present in the key access information of a lock is inserted into the lock after the lock has been programmed, the slave key copies a private identifier for the slave key to the lock (207). The lock adds the private identifiers of the keys that have access privileges to the key access information stored in the lock when the keys are first inserted into the lock, after the lock is programmed or reprogrammed.
In some embodiments, a lock in a domain can be configured to update its key access information when a master key for the domain is inserted into the lock and when the master key has a more recent revision of the key access information contained in the lock configuration file. For example, if a first master key in a domain is updated by the admin application but a second master key in the domain does not, then the first master key will update locks with new key access information while the second master key will not be allowed to reprogram the locks in the domain with the old key access information until the second master key is updated with newer key access information.
In some embodiments, a master key may be allowed to include key access information for more than one domain. In some embodiments, the admin application is configured such that it does not allow a lock to be present in different domains on the same master key.
In some embodiments, the lock is optionally configured to reset when certain criteria (such as, for example, predetermined criteria) are satisfied (208). In some embodiments, master keys in a domain have lock erase privileges for locks in the domain. In some embodiments, a master key can be configured to erase key access information from a lock when the master key is inserted into the lock after key access information is deleted using the admin application from the lock configuration file on the master key. In some embodiments, an administrator can use the admin application to remove all key access privileges from a lock configuration file. In some embodiments, if the lock configuration file associated with a lock is deleted from a master key, then the lock treats the master key as a slave key. As long as the lock configuration file is missing, the lock grants the master key access privileges only. This can reduce the risk of unintentionally erasing a lock if files are erased mistakenly.
In the embodiment shown in
In some embodiments, locks are programmed during manufacturing with an identifier (such as, for example, a public identifier). Master keys and slave keys can be programmed during manufacturing with a public identifier and a private identifier. The private identifier can be configured to be inaccessible to the admin application and to persons in order to increase the security of the access control system.
In the embodiment shown in
The battery 330 can be any suitable rechargeable battery, such as, for example, a lithium-ion battery, and can be configured to provide a suitable electric potential, such as, for example, 3.7 volts. The battery 330 is placed between a ground, such as Pin 4 of the USB connector, and a diode 332. The electronic key can also include a detection circuit. For example, a reference integrated circuit or a Zener diode derived from the power bus feeding 316 (or Pin 1) can be provided to a reference input for comparator 312. The diode 332 can be, for example, a Schottky diode, an energy efficient diode, or another type of diode. In some embodiments, another type of switching device can be used in place of the diode 332. The diode 332 is oriented to allow current to flow from the battery 330 to Pin 1 of the USB connector. Pin 1 of the USB connector is also connected to the electrical input 316 of the microcontroller 302, an input of the comparator 312 (for example, through a voltage splitter circuit including resistors 310 and a connection to ground), and the battery charger 328. The output of the detection circuit (for example, the output of the comparator 312) can be connected to a computer mode interrupt or reset 314 of the key microcontroller.
In the embodiment shown in
When the USB connector on the key is plugged into a lock, Pin 1 of the USB connector attaches to the electrical power interface 326 of the lock. In this state, the electric potential on Pin 1 is substantially equal to the electric potential of a terminal of the battery 330 less any voltage drop across the diode 332, and the diode 332 is closed or “on.” The battery 330 provides power to both the electronic key and the electronic lock. Pin 3 of the USB connector attaches to the clock signal generated by the lock microcontroller 320 and/or clock interface 324. The clock signal is routed from a pin on a lock interface 306, for example, to assist in data communications between the lock and key. In some embodiments, when the electronic key is connected to a lock, a USB transceiver 304 is disabled on the key microcontroller 302. However, the USB transceiver 304 can share data and/or clock pins with the lock interface module to decrease connector pin count and to allow a USB connector to be used for both connections.
In computer connection mode, the USB transceiver 304 can be enabled and the lock interface 306 can be inactive or disabled. In some embodiments, the USB connector has four pathways or pins: a power supply pin (Pin 1), a data with clock recovery pin (Pin 2), a data and clock pin (Pin 3), and a ground pin (Pin 4). The D− pin (Pin 2) and D+ pin (Pin 3) are used to transmit differential data signals with encoding that the USB transceivers use to recover a clock. The computer can supply USB data with clock recovery encoding via pins 352, 354 of the computer's USB interface. The USB transceiver 304 can assist in communications between the key and the computer 350. In some embodiments, the microcontroller 302 provides instructions to the battery charger 328 for charging the battery 330 while in the computer connection mode. For example, the battery charger 328 can be a Linear Tech LTC4065L from Linear Technology of Milpitas, Calif., a battery charger for a lithium ion battery, or another suitable battery charger.
The lock PCB 514 and/or the key PCB 518 shown in
If it is determined that the key is plugged into a lock, the operating system 704 runs a lock mode application 710. The lock mode application includes program logic for handling communications with a lock interface 712 and with a file system 714. For example, if the lock mode application 710 determines, via the lock interface 712, that a lock includes outdated key access information, the lock mode application 710 can use the file system 714 to obtain updated key access information from a storage device 716. The file system 714 can implement, for example, FAT, FAT32, NTFS, UFS, Ext2, HFS, HFS Plus, or another suitable file system implementation. The lock mode application can also be configured to access information from a second key memory embedded in the microcontroller of the key, for example.
If it is determined that the key is plugged into a computer system, the operating system 704 loads a USB Mass Storage Device module 706 (a “USB storage module”). The USB Mass Storage Device protocol, created by the USB Implementers Forum, allows the storage 716 to be accessed directly by an operating system on a computer. The operating system 704 communicates with a computer system via the USB storage module 706 and a USB-PC interface 708. The modules and program logic on the electronic key allow it to operate as both an access control device and as a USB storage device.
The analysis (806) can also include determining whether the lock's key access information is expired or if the key has administrative privileges. In some embodiments, if the key access information in the lock is expired and if the key has administrative privileges, the lock sends lock information (such as, for example, a lock identifier) to the key. In response, the key can load the lock's new key access information by using the lock identifier to search for the lock configuration file stored in the keys memory. For example, the name of the lock configuration file can include the lock identifier.
The key compares the lock's key access information revision date with a key access information revision date stored in the key's lock configuration file (810). By comparing the dates instead of comparing the key access information in the lock with the key access information in the lock configuration file, the key can save energy, hasten access to the lock, and hasten reprogramming. If the key access information needs to be updated, or if the lock does not have key access information, the key instructs the lock to update or program the key access information in the lock (816). The lock may also read and store the private identifier of the key. After the key access information is updated or programmed, the lock proceeds to update an access log (808). If the key access information in the lock configuration file is not revised (for example, if the key access information in the lock configuration file matches the key access information stored in the lock's memory), the lock proceeds directly to update an access log (808). If the key does not have a lock configuration file for the lock it is plugged into, the lock can be configured to treat the key as slave key and update the access log (808) without making any updates to the lock's key access information (KAI).
If the master key loads the lock configuration file (810) and determines that the KM in the lock configuration file has no key users (for example, if the file shows that no keys have access privileges), then the master key can send a signal to the lock to erase its KM (812). The analysis (806) can also include determining whether a key is accessing the lock for the first time. If it is the first access for the key, then the lock updates the key's private identifier in the lock memory's KAI. If the lock erases its key access information (812), then the lock proceeds to grant access (820) and then power down the lock (822).
In some embodiments, the lock and/or the key maintains an access log. If the lock does not have an access log, and if the key access information is successfully updated or programmed, then the lock proceeds to access the lock (820) by, for example, actuating a latch. If the lock does maintain an access log, then the lock can send an access log to the key for storage as an access log file (818) before proceeding to access the lock (820). If the key information does not match the key access information, or if the lock does not successfully update or program its key access information and there is no access log, or if the access log is not successfully updated, then the lock proceeds to power down (822) without granting access. The lock also powers down (822) after a successful access (820). After the lock powers down, the key powers down and leaves the lock mode (814). The process ends when the key is removed from the lock (824).
If a new domain file will not be created, the admin application attempts to open a domain file from the computer or from the key (910). In some embodiments, the admin application prompts the user to locate a domain file. The admin application may also search for one or more domain files in a location on the computer or on the key. The admin application may prompt the user to enter a password associated with the domain file, if any (912). If the password does not match, then the admin application can default to creating a new domain file (908). After creating a domain file or getting a password match, the admin application displays administration options for an access control system (914) and receives input from the user indicating what changes should be made to the domain file and/or lock configuration files. The changes can include, for example, assigning or editing locks in the domain (919), editing keys (such as, for example, slave keys or master keys) or key users in the domain (918) and other domain-specific key access information such as linking a public key identifier to a key user's alias name (918) and a lock identifier to a lock's alias name (919). In some embodiments, the domain file is a file that enables the admin application to manage and to link the lock configuration files for each lock (920). The lock configuration files contain key access information for each lock that determines what keys have access privileges for locks in the domain. Lock configuration files can also be used by the master key to program locks. In some embodiments, the access log is a separate file that can store the number of accesses, time of access, date of access, and optionally other access data. The access log can be stored in a memory of a lock and can be transferred to a file on a master key when the master key accesses the lock. Changes are written to the domain file and lock configuration files, and the process 900 ends when the domain file and/or lock configuration files are closed (916).
The interface 1000 also includes a locks portion 1004 that shows a list of locks in the domain. A user can identify locks by a lock alias, by a lock identifier, or, optionally, by other lock properties. In some embodiments, the locks portion 1004 includes interface elements for viewing lock access logs, adding locks to the domain, removing locks from the domain, changing a lock alias, and/or other functionality.
The interface 1000 includes lock configuration file portions 1006, 1008 that show a list of keys that have access privileges for locks in the domain. The lock configuration file portions 1006, 1008 provide interface elements that allow a user to create and/or modify lock configuration files containing key access information for individual locks. The lock associated with each lock configuration file portion can be identified by lock identifier and/or lock alias. Each portion 1006, 1008 identifies keys that have access privileges for a lock by key alias, key type, other identifiers, and/or other lock configuration file properties. In some embodiments, the lock configuration file portions 1006, 1008 include interface elements for deleting key access privileges, adding key access privileges, updating a lock configuration file, and/or other functionality. Interface elements can include buttons, hyperlinked text, selection lists, pull-down menus, check boxes, text input boxes, radio buttons, etc.
It is recognized that the term “module” may include software that is independently executable or standalone. A module can also include program code that is not independently executable. For example, a program code module may form at least a portion of an application program, at least a portion of a linked library, at least a portion of a software component, or at least a portion of a software service. Thus, a module may not be standalone but may depend on external program code or data in the course of typical operation.
Although systems and methods of electronic access control are disclosed with reference to preferred embodiments, other embodiments will be apparent to those of ordinary skill in the art from the disclosure herein. Moreover, the described embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Rather, a skilled artisan will recognize from the disclosure herein a wide number of alternatives for the exact ordering the steps, how an electronic key is implemented, how an electronic lock is implemented, or how an admin application is implemented. Other arrangements, configurations, and combinations of the embodiments disclosed herein will be apparent to a skilled artisan in view of the disclosure herein and are within the spirit and scope of the inventions as defined by the claims and their equivalents.
This application is a continuation of U.S. patent application Ser. No. 11/863,095, filed Sep. 27, 2007, titled “Energy-Efficient Electronic Access Control”, the entire contents of which are incorporated by reference herein and made a part of this specification.
Number | Date | Country | |
---|---|---|---|
Parent | 11863095 | Sep 2007 | US |
Child | 13269255 | US |