Claims
- 1. A security system, comprising:
- key means for gaining access to a location, including a memory having stored therein specific coded data including a security code and additional validation data specific to said key means, and selected command instructions related to access requirements specific to an authorized keyholder assigned to said key means; and
- controller means for controlling access to said location, including
- means for reading said coded data and command instructions from said key means,
- means for determining the validity of said key means based on the content of the coded data read from said key means,
- means for allowing access to said location upon determining said key means to be valid, and
- means for responding to command instructions read from a key means determined to be valid in order to provide a mode of access in accordance with said access requirements.
- 2. The security system of claim 1, wherein said controller means further includes means for writing coded data into the memory of said key means to control the subsequent use thereof.
- 3. The security system of claim 2, wherein the coded data written into said key means memory comprises data identifying the location at which said key means has been presented, said controller means further including means for determining a specific operating sequence of said key means by location, said validity determining means determining said key means to be invalid if presented to a location out of said sequence.
- 4. The security system of claim 2, wherein said means for reading comprises a key means reader at both an entrance and an exit of said location, said coded data written into the memory of said key means including information identifying the reader at which said key means was last used, said key means being determined invalid if said key means is presented to the same reader twice in succession.
- 5. The security system of claim 4, further comprising means for altering reader identifying information previously stored in said key means memory when said key means is determined to be valid.
- 6. The security system of claim 1, wherein said additional validation data includes a validation start date and expiration date, said controller means further including a memory and a clock, said key means being determined valid if said security code corresponds to a previously stored security code in said controller means memory and if the current date determined from said clock is within the period defined by said start and expiration dates.
- 7. The security system of claim 1, wherein said means for allowing access to said location includes means for deactivating a lock mechanism for a predetermined time period, said command instructions including a time extension command for altering the amount of time that said lock mechanism is deactivated.
- 8. The security system of claim 1, further comprising personal identification number (PIN) entry means for transmitting a PIN entered by a key means holder to said controller means, said entered PIN being compared with a previously stored PIN read from said key means memory as part of said validity determination, said command instructions including a PIN override instruction for causing said validity determining means to bypass said PIN comparison in determining whether said key means is valid.
- 9. The security system of claim 1, wherein said controller means further comprises means for automatically time controlling access to said location, said command instructions including an instruction for overriding said automatic time control means.
- 10. The security system of claim 1, wherein said specific coded data stored in said key means memory includes the name of an authorized holder of said key means.
- 11. The security system of claim 1, wherein said means for allowing access to said location comprises means for powering a lock relay to open a door, said controller means further including means for detecting whether said door is propped open or forced, and alarm means for generating an alarm when said door is detected to be propped open or forced.
- 12. A method of controlling access to a location, comprising the steps of:
- storing coded data including a security code and additional validation data and commands related to access requirements specific to an authorized keyholder, in a memory of a key, said additional validation data being specific to said key means;
- reading said coded data and commands from said memory; and
- determining the validity of said key based on the coded data read from said memory and allowing access to said location and responding to said commands to provide a mode of access in accordance with said access requirements when the key is determined to be valid.
- 13. The method of claim 12, further including the step of writing data into a valid key to control the subsequent use of the key after access has been allowed.
- 14. The method of claim 12, further including the step of altering the data stored in said key to control the subsequent use of the key after access has been allowed.
- 15. The security system of claim 7, wherein said time extension command causes said means for deactivating to increase the amount of time that said lock mechanism is deactivated.
- 16. A security system, comprising:
- a plurality of key means for gaining access to a plurality of locations, each of said plurality of key means including a memory having stored therein coded data specific to said key means and command instructions specific to said key means;
- a plurality of controllers interconnected by a communication line to a controller programmer, each of said controllers being positioned at a separate location for controlling access to said separate location, wherein each of said controllers comprises
- means for reading coded data from a memory of a key means presented thereto,
- a memory table storing a list of codes corresponding to specific key means authorized to have access to the location controlled by said controller,
- means for determining the validity of said presented key means by comparing coded data read therefrom with said list of codes in said memory table,
- means for allowing access to said location upon determining said presented key means to be valid, and
- means for executing command instructions read from said presented key means memory;
- wherein said controller programmer polls individual ones of said plurality of controllers for communication therebetween.
Parent Case Info
This is a continuation of application Ser. No. 537,724, filed Jun. 14, 1990 now abandoned.
US Referenced Citations (13)
Continuations (1)
|
Number |
Date |
Country |
Parent |
537724 |
Jun 1990 |
|