The present invention relates to locks, and more particularly to controllers used with electronic lock systems, the programming of such controllers and the methods of operating such locks.
Certain locks include a latch or bolt movably disposed within a door and engageable with a strike in a frame to secure the door thereto. Some of these locks are electromechanical and include either a clutch mechanism to removably connect at least one handle with the latch/bolt or a movable blocking member used to releasably prevent handle rotation (and thereby latch retraction) or directly restrain the latch or bolt. These electromechanical locks generally include an actuator for displacing the clutch or moveable “block” and a controller configured to operate the actuator when receiving an authorized “unlock” signal from an appropriate input device. Other locks are “electromagnetic” and include an electromagnet that magnetically engages with a metallic plate so as to secure a door within a frame. Typically, an actuator (e.g., a relay or other switch) controls power to the magnet and a controller is configured to operate the actuator when receiving an authorized “unlock” signal.
With both the electromechanical and electromagnetic locks, the controller must be able to determine when an input is authorized. Typically, these controllers store a “list” or file of codes/values that indicate authorized users, and will operate the associated actuator when a particular input matches at least one stored code/value.
In one aspect, the present invention is a lock system comprising a lock adjustable between a locked configuration and an unlocked configuration and at least one input device configured to generate user input, each user input having a value. A controller is operatively connected with the lock, is coupled with the input device so as to receive user input, and has a memory with at least first and second data files, the first file having at least one stored value. The controller is configured to receive first and second user inputs and to compare the first input value with the at least one first file value. Further, the controller is configured to store a particular second input value within the second data file when a particular value of the first input corresponds with at least one value in the first file.
In another aspect, the present invention is a method of managing a plurality of lock assemblies. The method comprises the steps of: providing a plurality of the lock assemblies, each lock assembly including a lock adjustable between a locked configuration and an unlocked configuration, and an input device configured to generate user input, and a controller operatively connected with the lock, coupled with the input device so as to receive user input, having a memory with at least first and second data files; storing at least one first value into each lock first data file; inputting first and second user values into at least one the lock controllers; and storing the second user value in the controller second data file when the first user value corresponds with at least one value stored in the controller first data file such that the controller adjusts the lock to the unlocked configuration whenever the second user value is subsequently inputted to the controller.
In another aspect, the present invention is again a lock system comprising a lock adjustable between a locked configuration and an unlocked configuration and at least one input device configured to generate user input, each user input having a value. A controller is operatively connected with the lock and coupled with the input device so as to receive user input. The controller includes a database having at least one record with first and second fields, the first field having a value. Further, the controller is configured to receive first and second user inputs and to compare the first input value with the first field value and to store the second input value within the second field when the particular first input value corresponds with the first field value.
In an even further aspect, the present invention is also a lock system for a door disposed within a frame, the lock system comprising a lock adjustable between a locked configuration and an unlocked configuration and at least one input device configured to receive user input, each user input having a value. A controller is operatively connected with the lock and coupled with the input device so as to receive user input and has a memory with at least first and second data files, the first data file having at least one value.
The controller is configured to receive two user inputs and to compare the value of a predetermined one of the two inputs with the at least one first file value and to store the value of the other one of the two inputs within the second file when the particular value of the one input corresponds with one first file value.
In yet another aspect, the present invention is again a method of managing a plurality of lock assemblies, the method comprising the following steps: providing a plurality of the lock assemblies, each lock assembly including a lock adjustable between a locked configuration and an unlocked configuration, and an input device configured to generate user input, and a controller operatively connected with the lock, coupled with the input device so as to receive user input, and having a memory with at least first and second data files; providing a programming device having a memory with a set of values; copying the set of values from the programming device memory into the lock controller first data file of each one of the locks; inputting first and second user values into at least one the lock controllers; and storing the second user value in the controller second data unit when the first user value corresponds with at least one of the set of values stored in the controller first data file such that the controller adjusts the lock to the unlocked configuration whenever the second user value is subsequently inputted to the controller.
The foregoing summary, as well as the detailed description of the preferred embodiments of the present invention, will be better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, there is shown in the drawings, which are diagrammatic, embodiments that are presently preferred. It should be understood, however, that the present invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:
Certain terminology is used in the following description for convenience only and is not limiting. As used herein, the words “connected” and “coupled” are each intended to include direct connections between two members without any other members interposed therebetween, indirect connections between members in which one or more other members are interposed therebetween, and operative or functional connections in which a physical connection may or may not exist. Also, the word “program” as used herein includes any and all types of computer programs, software, series of instructions, etc., that a computer can interpret and execute. Further, as used herein, the term “file” is intended to encompass any and all types of data entities, information units, etc., and collections of such data entities/information units, storable in electronic, electromagnetic, or any other appropriate storage media, and is in no manner limited to any specific data/information structure, device, etc. The terminology includes the words specifically mentioned above, derivatives thereof, and words of similar import.
Referring now to the drawings in detail, wherein like numbers are used to indicate like elements throughout, there is shown in
As best indicated in
Additionally upon the determination of match between the particular first input value VI1 and at least one first data file value VF1n, the controller 16 is further configured to adjust the associated lock 12 to the unlocked configuration, thus enabling a user to “open” the associated door 1. Thereafter, the controller 16 adjusts the lock 12 to the unlocked configuration whenever subsequently receiving a second input I2 with the specific value VI2 that has been stored or written into the second data file F2 (i.e., as stored value VF2). In other words, once the second input value VI2 has been stored within the controller memory 18, the associated lock 12 may be operated solely by receipt of that particular second input I2, for example, from a key unit 22, entered through a keypad 30 (described below), or by any other appropriate means (e.g., retinal scan). Furthermore, each controller 16 is preferably constructed such that the lock 12 is nonadjusted (i.e., the associated door 1 remains locked) whenever the controller 16 subsequently receives a first input I1 having the particular value VI1. That is, the controller 16 preferably “ignores” each particular first input value VI1, which has been previously received and used to write a second input value VI2 into the second data file F2, whenever that first input value VI1 is subsequently entered into the controller 16.
Alternatively, the controller 16 may be configured to adjust the lock 12 to the unlocked configuration only when subsequently receiving both a first input I1 with the particular value VI1 and a second input I2 with the associated value VI2, i.e., both input values VI1 and VI2 are required to open the lock 12. As a further alternative, the controller 16 may be set or “programmed” to operate the lock 12 whenever separately receiving either one of the particular first input value VI1 or the associated second input value VI2.
As generally indicated in
Additionally, the memory 18 of each controller 16 preferably further has a third data file F3 and each controller 16 is further configured to create and store a value or “event entry” VF3 in the third data file F3 upon the occurrence of certain events associated with a lock 12 or/and door 1. Preferably, such events include at least the following items: 1) adjustment of the lock 12 to the unlocked configuration; 2) adjustment of the lock 12 to the locked configuration; and 3) opening of a door 1 associated with the lock 12 while the lock 12 remains in the locked configuration (i.e., door forced open), and may include any other events associated with the a particular door/lock that are desired to be tracked or monitored. Preferably, each event entry VF3 includes 1) a value or code identifying the specific lock 12 or door 1; 2) the date of occurrence of the particular event (e.g., MM(DD/YYYY); 3) the time of event occurrence (e.g., HH:MM:SS); 4) a code representing the particular event; and 5) a value/code representing a particular user (e.g., pin code) when the event involves an authorized use of the lock 12. By generating the event entries VF3n, the controller 16 provides an “audit trail” to the system administrator of the operating history of a particular lock 12 and/or door 1. Thereby, the administrator is able to monitor authorized access to the doors 1 controlled by the lock system 10, is provided with notice of any lock tampering, is able to track specific lock users, etc.
Referring now to
Referring to
Alternatively, either or both of the two preferred input devices 26, 28 may another type of input apparatus, such as for example, a magnetic card reader, a wireless transceiver, a fingerprint scanner, a retinal scanner or other optical scanner, or any other appropriate device configured to receive and/or extract one or more unique “key codes” CKn from a key device (e.g., a magnetic code from a card stripe, a fingerprint image from a user's finger, etc.) and to generate a corresponding electrical signal providing the user input I1 or I2. As a further alternative, each lock assembly 11 may include only a single input device 14 coupled with each controller 16, preferably a keypad 30, and configured to generate both the first and second user inputs I1, I2. In such a case, the first and second inputs I1, I2 may each include one or more key-generated electrical signals corresponding to a separate one of a pair of pin codes CPn1, CPn2, respectively, assigned to each user and entered through the keypad 30, as discussed above.
Furthermore, the lock system 10 preferably further comprises at least one and preferably a plurality of the key units 22, at least one key unit 22 being provided or “assigned” to each intended user of at least a portion of the lock system 10, i.e., authorized to access one or more doors 1. Each key unit 22 has stored data corresponding with one second user input I2, most preferably a key code CK, and is capable of communicating with the input device(s) 14 associated with each controller 16. Preferably, the key unit(s) 22 are each configured to communicate with the second input device 28, most preferably the iButton reader 32, of at least one of the lock assemblies 11. As such, the key units 22 preferably each include an iButton 34 with a memory 35 and is engageable with the iButton reader 32, as best shown in
Referring to
With the preferred pin code format, each authorized user may be assigned a specific pin code CP corresponding to one of the authorization values VAn, such that the user may enter the code CP into one or more keypads 30 to thereby “enroll” in the associated controller 16, as discussed above and in further detail below. Preferably, the programming device 40 transfers the code files FC/values VAn to the controllers 16 by means of a data transfer device 46 (described below), but may alternatively be directly communicable therewith (e.g., by interconnectable ports, wireless transceivers, etc.).
Still referring to
Referring to
With the above preferred structure, the lock control system 10 of the present invention is intended to basically operate as follows. An administrator of the lock system 10, such as a school staff member, a building security manager, etc., uses the programming device 40 to create at least one set FC of code values VAn, then copies at least one set code set FC into the controller 16 of each one of the doors 1 of the system 10 by means of the transfer device 46 (or computer 45). Each user of the system 10, e.g., students, employees, etc., is provided with a separate pin code CP corresponding to one authorization value VAn that has been entered into the controllers 16 associated with the specific doors 1 for which the particular user is intended to have access. Each user is also either provided with a key unit 22 having a stored code CKn providing a specific second input I2 when engaged with a second input device 28 (e.g., iButton reader 32) or is instructed to use a presently owned or possessed key unit 22 having a unique code that is receivable or extractable by the particular second input device(s) 28 of the lock control system 10. For example, the lock control system 10 may include an input device(s) 28 configured to read or process conventional credit card(s), such that the user merely uses one of their currently possessed credit cards to enroll in the lock system 10, or the inputted device(s) 28 may include one or more scanners configured to “read” at least one user physical feature, such as fingerprints or retinas. In the preferred structure depicted in the drawing figures, the user then “visits” each authorized door 1 and first enters the pin code CP into the preferred keypad 30, then engages the particular key unit 22 (e.g., iButton 34, credit card, etc.) with the second input device 28 (e.g., iButton reader 32, etc.). However, with a lock system 10 having one or more other types of input devices 14 (e.g., a single card reader, a keypad and a fingerprint scanner, etc.), the user enters the first and second inputs I1, I2 as appropriate.
With the preferred construction, each controller 16 receives a first input I1 corresponding to the pin code CP and compares the first input value VI1 with the plurality of values VI1 in the controller first data file F1. For each controller 16 associated with an authorized door 1 (i.e., access authorized for that user), the first input I1 corresponds with one of the values VF1n in the first file F1, such that the controller 16 then copies the value VI2 of the second input I2 (generated by the key unit code CKn) into the second data file F2. Thereby, the specific key unit 22 (and thus the particular user) is “enrolled” into the lock controller 16, such that future access through the associated door 1 is permitted to the user by merely presenting the key unit 22 (i.e., iButton 34), without the necessity of providing the pin code CP (i.e., first input I1). However, as discussed above, the controller 16 may alternatively be configured to thereafter require both entry of the pin code CP through the keypad 30 and the key code CK through the iButton reader 32. Furthermore, if the user attempts to enter the pin code CP and/or key device code CK into a controller 16 associated with an unauthorized door 1, the controller 16 will compare the pin code first input I1 with the first data file values VF1n and/or the key code second input I2 with the second data file values VF2n. When a match or match(es) are not found, the controller 16 will not copy the key code CK into the second data file F2 and will not adjust the lock 12 to the open configuration.
Having described the basic elements and operation above, these and other aspects of the lock control system 10 of the present invention are described in detail below.
Referring now to
Referring to
With the electromagnetic lock 54, the lock 54 includes an electromagnet 58 magnetically engageable with a metallic plate 60 (see
Although exemplary electromechanical locks 50 and electromagnetic locks 54 are described above, it is within the scope of the present invention to use the lock control system 10 with any other appropriate type of locks 12. For example, the lock control system 10 may be used with an alarm system (not shown) controlling access through one or more doorways each secured by one or more purely mechanical locks (none shown), such that a user is “enrolled” in the alarm system as described herein for authorized access through a door 1 so as to be capable of alternatively disabling or arming the alarm system through an input device(s) 14. The lock system 10 of the present invention is in no manner limited to any particular type of lock or lock application.
Referring to
Additionally, the microprocessors 70 and memory chips 72 are preferably disposed generally proximal to the lock 12, for example within a housing 73 (
Referring now to
Furthermore, each record Rn of the controller database D also preferably includes a third field f3 having either a first, second, third or fourth attribute value A1, A2, A3, A4, respectively. The controller 16 is configured to separately adjust the third field f3 of each record Rn to any one of the four attribute values A1, A2, A3, A4, and preferably to enable an administrator to select and adjust the specific attribute An for each user record Rn to control the user's manner of access, as follows. The controller 16 preferably operates the lock 12 such that the lock 12 is adjusted to the open configuration under one of the following circumstances:
However, the controller 16 is also configured such that the lock 12 is nonadjusted (i.e., remains locked) when the third field f3 of a particular record Rn is set to the fourth attribute value A4, even upon receipt of any of the following: a first input value VI1 corresponding with the record first field value Vf1n, a second input value VI2 corresponding with the record second field value Vf2n, or both first and second input values VI1, VI2 corresponding with the record first and second field values Vf1n, Vf2n, respectively. As such, when the third field f3 of any record Rn is set to the fourth attribute value A4, the controller 16 denies or prevents access to the user associated with the particular record Rn, even when the user presents an authorized pin code CP or/and an authorized key unit 22. By providing the records Rn with the third field f3, each controller 16 has the flexibility to require different access conditions for different users, to change the access conditions for a particular user, and to deny access to a previously authorized user.
Referring particularly to
Alternatively, the database first table T1 may further include a fourth field (not shown) for each user record, the fourth field containing one or more event entries VF3n. With this data structure, one event record value VF3n is written into the fourth field of a particular user's record Rn whenever that user performs an authorized activity (e.g., unlocks or locks a door). However, such a data structure would require other means to record the occurrence of unauthorized activity (e.g., forced entry of door 1), as such actions would not likely be readily identified with a specific user.
It will be appreciated by those skilled in the art that changes could be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present invention as defined in the appended claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US06/06510 | 2/24/2006 | WO | 00 | 8/24/2007 |
Number | Date | Country | |
---|---|---|---|
60656269 | Feb 2005 | US |