This disclosure relates generally to electronic access control systems, and, more particularly, to electro-mechanical locks, electro-mechanical keys, devices and systems therefor, and functionality and methods of use of such locks, keys, devices, and systems.
Reliable and secure electronic access control systems that incorporate electronic lock cylinders and electronic keys have been designed and manufactured. U.S. Pat. No. 6,474,122, filed Feb. 13, 2001, (hereinafter, “the '122 patent”) describes such a system and is hereby incorporated by reference in its entirety into this disclosure. The '122 patent describes an electronic locking system manufactured and sold under the brand name CyberLock by Videx, Inc., in Corvallis, Oreg.
The electronic locking system described in the '122 patent comprises electronic lock cylinders for retrofitting conventional tumbler pin type or other common lock cylinders, such conventional lock cylinders sometimes referred to simply as “cores” or “cylinder cores.” The electronic cylinders replace standard mechanical lock cylinders and are installed without wiring, easily converting existing lock hardware into a full-featured access control system. Videx, Inc. has designed over 280 different electro-mechanical lock cylinder configurations for various types of locks—for locking doors, cabinets, cash boxes, trucks, gates, narcotic boxes, safes, vending machines, cell tower sites, traffic control boxes, server cabinets, padlocks, and other locks having a cylinder core or similar type of replaceable or interchangeable core.
The electronic locking system is a key-centric access control system designed to address security, accountability, and key control requirements throughout a business or other organization. The system uses electronic, programmable keys, or smart or intelligent keys which may be programmed by software to incorporate access permissions for each key user. Keys may be programmed to work only during specific hours, and only for the locks each person is allowed to access. Because the intelligent keys restrict access and cannot be duplicated, the need to re-key a facility is eliminated. If a key is lost or stolen, pre-programmed keys with authorizations set to expire may simply be left to expire, posing no risk exposure thereafter. If the lost key has an unacceptably long or no expiration time frame, the locks may be reprogrammed so that the lost key is no longer recognized.
The electronic locking system may be used to monitor key usage and track lock entry activity. Each time a key is used, a record of that event is stored in both the lock and the key. Access granted and access denied events are both recorded. Key management software may be used to assign keys, set expirations, add new cylinders, monitor staff and contractors, create access schedules, generate audit trails and custom reports, and so on.
As with any access control system, numerous aspects and features in the keys, particularly engineered lock cylinders, installation/application specific software, or other parts of the particular system may require configuration for the particular needs of the application. Various options for increased security features such as tamper resistance and key retention may be needed, for example. A particular application may require, for example, keys that are programmable using only certain types of communicators. Or a particular application may require lock cylinders with more or less sensitivity in the design of various tamper resistance features to address the environment within which the cylinders are installed. The increased number of options in key and lock designs, however, increases system complexity and costs. Further, new security features are needed to address increasingly complex customer requirements and to address new demands of the locks, keys, software, and other system components not previously contemplated or experienced.
What is needed, therefore, are improved electronic access control systems that incorporate security features that address customer and application-specific requirements.
For a more complete understanding of the present invention, the drawings herein illustrate examples of the invention. The drawings, however, do not limit the scope of the invention. Similar references in the drawings indicate similar elements.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the preferred embodiments. However, those skilled in the art will understand that the present invention may be practiced without these specific details, that the present invention is not limited to the depicted embodiments, and that the present invention may be practiced in a variety of alternate embodiments. In other instances, well known methods, procedures, components, and systems have not been described in detail.
Although the preferred embodiments may be implemented in a wide variety of configurations involving different types of electronic keys, lock cylinders, or software, collectively referred to as components comprising an electronic access control system, the following detailed description discloses the preferred embodiments principally in the context of an exemplary lock cylinder 100, as illustrated in
The electronic lock cylinder may be any of a wide variety of electronic lock cylinders manufactured to the dimensional standards of the mechanical lock it replaces.
Exemplary dimensions for the lock pin 207 and solenoid plunger 311 shown in
The present inventor discovered that tampering attempts whereby rotational forces are applied to the cylinder core along with attempts to get the solenoid plunger to move forward toward the cylinder nose, and, thereby into a non-lock pin blocking orientation, are substantially frustrated by incorporating a region of increased height over which the lock pin must pass in order for the lock pin to clear the rearmost end of the plunger. Sharp longitudinal forces applied to the nose end of the cylinder core may cause longitudinal movement of the plunger as well as longitudinal movement of the anti-tamper plug 312. When the anti-tamper plug 312 moves forward (i.e. left), it preferably moves into a lock pin blocking orientation preventing the lock pin 207 from moving downward. With plunger 311, anti-tamper plug 312, and other components formed and configured/arranged as shown in
The aforementioned increased diameter/increased height (or uphill) region is a separable aspect that may be used in other applications beyond electronic lock cylinders, such as those that use one or more solenoid and solenoid plunger wherein the plunger provides a blocking function to block another member such as a lock pin. The increased height (or uphill) shaped lock pin blocking member may be used for anti-tampering in other applications where the lock pin blocking member is designed, in normal/typical operation, to move away from its blocking position/orientation before starting movement of the lock pin away from the lock pin's locked orientation.
In preferred embodiments, the case assembly 1101 comprises a plastic body with faceted edges and sides, which the present inventor discovered advantageously provides a visual effect of the key assembly having a smaller size (in thickness, width, and length) than achieved using non-faceted (i.e. smooth, rounded features) surfaces comprising the body. A metallic key tip end (not numbered) is preferably used at the front or nose or key tip end of the body assembly 1101. The present inventor found that using a metallic key tip end offers improved resilience and durability, and provides improved key tip 820 surfaces which are used for torque delivery when the key is operated with a lock cylinder. In preferred embodiments, the outside surfaces of the key tip 820 are used to deliver torque for rotating a lock cylinder such as the lock cylinder 100, with the outer surfaces of key tip 820 applying torque to the radially outward surfaces of the key tip channel 120.
In at least one preferred embodiment, the case assembly 1101 comprises fiberglass reinforced nylon with a brass key tip 820; the key 800 dimensions are 2.72″ H (801)×1.37″ W (803)×0.69″ D (805); the key 800 weight is 1.1 oz; the operating temperature range is 32 to 122 degrees F., zero to 50 degrees C.; the power supply comprises a rechargeable lithium ion polymer battery; recharging of the battery may be by way of the key tip/pins 1103 or the key USB port 1011; charging time is approximately 2 hours for a fully depleted battery; battery capacity is measured and can be viewed each time the key communicates with CyberAudit software; optional email notifications of battery status are available; internal memory supports an audit trail of over 10,000 events; memory is non-volatile; all information stored in the key's memory is retained regardless of battery charge; complete depletion of the battery may require docking the key for clock restart; communication with the key is by way of any compatible CyberLock Communicator (via the key tip/pins 1103) or via the key's USB port 1011; and the key incorporates LED light and beeper operation/status indicators.
The electronic key described herein, in preferred embodiments, operates with electronic lock cylinders (sometimes referred to in the industry as e-cylinders) substantially as described in U.S. Pat. No. 6,474,122, filed Feb. 13, 2001, (i.e. the '122 patent) which is incorporated by reference herein. The '122 patent and its family of patents describes the operation of substantially similar electronic locks and electronic keys, and improvements described herein are each separable aspects which may be separately incorporated (one or more improvement described herein at a time) into particular electronic lock cylinders and/or particular electronic keys.
The keys shown in and described with respect to
In preferred embodiments, the electronic key 800 comprises dual means for contact-based (i.e. non-wireless) communications. The present inventor determined that contact-based communications improves the security of the access control system comprising contact-based electronic keys and electronic locks, with some higher security applications requiring the use of systems that do not incorporate wireless communications means, such as, for example, IRDA communications for programming/authorizing/downloading electronic keys. In preferred embodiments, the electronic key 800 incorporates dual contact-based communication means via contact pins 1103 for contact-based communication with an electronic cylinder, as described in the '122 patent, as well as a micro-USB connector 1111/micro-USB receptacle 1011 for contact-based communication with a computer or other programming/authorizing/downloading system. Dual communications, in some embodiments, includes communication between an electronic key and an electronic cylinder via the CyberKey Port (i.e. through the key tip pins 1103) and/or via full speed USB 2.0 (i.e. through the USB connector/receptacle 1111, 1011). In preferred embodiments, the electronic key 800 comprises dual connectors, via the CyberKey Tip and micro USB type ‘B’ receptacle 1011.
The dual connector/dual communications equipped electronic key 800 preferably maintains compatibility with all versions of CyberLock electronic cylinders, CyberKey downloaders (i.e. USB Station, Web Station, Mini-Keyport with Web Authorizer, Flex Mini-Keyport with Flex Hub, Flex WR with Flex Hub, V1 Vault/single key box, V20 Vault/20 key cabinet, etc.), and CyberLock software (i.e. CyberAudit Web, etc.).
Also in preferred embodiments, the rechargeable battery 1109 may be charged via the key tip pins 1103 and/or via the USB connector/receptacle 1111, 1011. In some embodiments, the key 800 may be recharged using a standard mini-USB-to-12v USB car adapter/car charger (for charging the key in a car), or using a standard mini-USB-to-USB cord (for charging the key from a laptop or other computer), or using any compatible device capable of providing power to the key via its USB port.
In existing systems using electronic keys and electronic locks, access schedule/access profile information contained in a particular key is not modified when the key comes into contact with and communicates with a lock. That is, in current systems reading a lock does not modify access schedules. The present inventor discovered a method of using an electronic lock cylinder such as electronic lock 100 (or access point or device such as a CyberPoint electronic monitor) to provide access profile information to a key such that when the key touches the lock, the lock gives the key a new access profile.
As an example, an electrician with a key touches a particular lock cylinder with the key, and if the key is authorized for the lock then the lock provides the key with new access schedule/access profile information. The new access profile may, for instance, provide access to certain electrical boxes for a predetermined period of time, say 8 hours, or between certain hours, such as between 7 am and 6 pm. In this way, the electrician is able to use the key for authorized access to a lock, and the lock then provides the key with a new access profile—i.e. access profile comprising, for example, encrypted access codes, a list of locks the key may access, schedules of authorized dates and times the key may access locks (or particular locks), and a begin-end date range during which the key will operate. The electrician is then limited to access according to the new access profile read into the key.
In this fashion, a sequence of authorized access may be implemented. In the above example, after the electrician's key is effectively reprogrammed with new authorizations by touching the first lock, the electrician's key may be authorized for a particular (second) new set of locks. Touching one of those locks may in turn provide the electrician's key with yet another access profile, for example, providing access to a third set of locks. Thus, the electrician's access to various locks may be sequenced from one group/set to another. Likewise, access may be sequenced in terms of access times, dates, particular locks, combinations of times, dates, locks, etc., or any single parameter or combination of parameters comprising the key's access profile information.
In one embodiment, the access point or lock capable of providing an authorized key with new access profile information might be programmed to do so only for a period of time, for example, after initial access by an authorized key. Or the lock may be programmed to provide a key with a new access profile on a predetermined date, within a predetermined window of time, and/or after a predetermined number of accesses or attempted accesses with the key. For example, a key may be authorized to access a particular lock between 7:30 am and 8:00 am, the lock programmed to provide the key with a new access profile to effectively deactivate the key following any attempted access outside of the 7:30 am to 8:00 am time window.
In preferred embodiments, an electronic lock cylinder (or any CyberLock electronic cylinder) may be configured/programmed so as to change the personality—i.e. access profile —of an authorized key. The method preferably comprises: a key with a first access profile touching a lock; the lock providing the key with a new (second) access profile if the key is authorized by the first access profile to access the lock; and if the second access profile is provided to the key, the key is subsequently limited to its new (second) access profile for subsequent use thereafter. In this way, the lock modifies the authorizations or personality of the key.
In one embodiment, programming instructions resident in a key are modified so that the key is susceptible to receiving a new access profile from a lock, and programming instructions resident in the lock are modified so that when an authorized key is presented having suitably modified programming to receive a new access profile, the lock provides the new access profile to the key.
The present inventor further discovered that an electronic cylinder such as lock cylinder 100 (or any CyberLock cylinder) may be programmed to turn an electronic key such as electronic key 800 (or any CyberKey smart key) into a master key (or CyberLock Grand Master key) by touching the key to the specially programmed cylinder. The specially programmed cylinder may be used instead of having to hold onto a Grand Master key or another key with master key-like authorizations, for use in emergencies such as when authorized keys are lost. Instead of locking away a Grand Master or other similarly configured key, a specially programmed cylinder, for example, a specially programmed CyberPoint non-locking type cylinder may be used to convert a presented key into a master key. The specially programmed cylinder may comprise an electronic cylinder, as described above, capable of providing a key with a new access profile, in this case, an access profile enabling the key to behave as a master key.
In one embodiment, the programming code in the key is changed so that the key can have multiple states, switchable when the key comes into contact with a pre-programmed, specially programmed cylinder. The key may comprise a table or structure that would include the multiple states for the key. The structure in the key preferably accommodates and manages both multiple lock lists and multiple indices. The indices may represent particular predetermined states of the key, predetermined lock lists, predetermined or programmably assignable access profiles, or other features, characteristics, and/or attributes for the key.
In a preferred embodiment, a virgin key (i.e. a key not yet programmed, or an unprogrammed key, or blank key, or key put into an unprogrammed state) touching a control CyberPoint (non-locking) electronic cylinder would cause the key to become a Grand Master (or simply, master) key after receiving from the cylinder the appropriate programming instructions; and a Grand Master (or master) key touching a virgin (unprogrammed) lock would program it so as to be accessible to the (now, master) key.
In one embodiment, existing infrared capable CyberKey smart keys may be upgraded so as to provide the above described behavior (i.e. capability of becoming a master key) by using code space currently occupied by IRDA (infrared) code to instead provide the capability of allowing a lock (or a cylinder such as cylinder 100 or a non-locking cylinder such as the CyberPoint cylinder) adapted with programming instructions to program a key.
The terms and expressions which have been employed in the forgoing specification are used therein as terms of description and not of limitation, and there is no intention in the use of such terms and expressions of excluding equivalence of the features shown and described or portions thereof, it being recognized that the scope of the invention is defined and limited only by the claims which follow.
This application claims the benefit of U.S. Provisional Application No. 61/719,743, filed Oct. 29, 2012.
Number | Name | Date | Kind |
---|---|---|---|
2690070 | Spain | Sep 1954 | A |
3485068 | Bennett | Dec 1969 | A |
3599455 | Pilvet | Aug 1971 | A |
3604231 | Buschi | Sep 1971 | A |
3733863 | Toepfer | May 1973 | A |
4012931 | Harunari | Mar 1977 | A |
4446709 | Steinbach | May 1984 | A |
4771620 | Kleinhany | Sep 1988 | A |
4961328 | Mundhenke | Oct 1990 | A |
5216909 | Armoogam | Jun 1993 | A |
5542274 | Thordmark et al. | Aug 1996 | A |
5791181 | Sperber et al. | Aug 1998 | A |
5839307 | Field et al. | Nov 1998 | A |
6474122 | Davis | Nov 2002 | B2 |
6604394 | Davis | Aug 2003 | B2 |
6615625 | Davis | Sep 2003 | B2 |
6895792 | Davis | May 2005 | B2 |
7076976 | Goldman | Jul 2006 | B1 |
7698916 | Davis | Apr 2010 | B2 |
8186194 | Field et al. | May 2012 | B2 |
8276414 | Luo | Oct 2012 | B2 |
20060096344 | Lee | May 2006 | A1 |
Number | Date | Country | |
---|---|---|---|
61719943 | Oct 2012 | US |