Claims
- 1. A lock apparatus configured to secure a first member to a second member, the lock apparatus comprising
a lock configured to move between a locked position blocking movement of the first member relative to the second member from the closed position and an unlocked position permitting the first member to move from the closed position, the lock having an encryption key, and a lock key, the lock and the lock key being configured to communicate information therebetween, the lock key having the encryption key, the lock being configured to encrypt the information into a first value, the lock key being configured to encrypt the information into a second value, at least one of the lock key and the lock being configured to compare the first and second values to determine if the lock key is authorized to move the lock from the locked position.
- 2. The lock apparatus of claim 1, wherein the lock has an identification code that is included in the information that is communicated and encrypted.
- 3. The lock apparatus of claim 1, wherein at least one of the lock and lock key is configured to generate variable data that is included in the information communicated and encrypted.
- 4. The lock apparatus of claim 1, wherein the lock key and lock generate a forward hash using the encryption key and communicated information.
- 5. The lock apparatus of claim 1, wherein the lock key has an identification code and the lock is configured to store the identification code.
- 6. The lock apparatus of claim 1, wherein the lock has an identification code and the lock key includes a table of accessible lock identification codes, the lock key is configured to receive the identification code of the lock and verify whether the identification code of the lock is in the table of accessible lock identification codes.
- 7. The lock apparatus of claim 1, wherein the lock and the lock key communicate using wireless communication.
- 8. A vending machine system configured to retain objects for distribution, the vending machine system comprising
a plurality of vending machines, each vending machine including a cabinet defining an interior region sized to receive the objects for distribution, a door coupled to the cabinet to move between an opened position permitting access to the interior region of the cabinet and a closed position blocking access to the interior region of the cabinet, and a lock configured move between a locked position blocking movement of the door from the closed position and an unlocked position permitting the door to move from the closed position, each lock of the plurality of vending machines having an access code, and a lock key configured to store the plurality of access codes of the locks of the plurality of vending machines to permit access to the plurality of vending machines.
- 9. The vending machine system of claim 8, wherein the lock key and at least one of the locks includes an encryption key, the lock key and said lock are configured to encrypt information based on the encryption key to generated values, at least one of said lock key and the locks is configured to compare the generated values to permit said lock to move to the opened position.
- 10. The vending machine system of claim 8, wherein the vending machines are configured to communicate the access codes to the lock key and the lock key is configured to record the communicated access codes.
- 11. The vending machine system of claim 10, wherein the lock key is configured to communicate the communicated access codes to a central station.
- 12. A method for unlocking a lock, the method comprising the steps of
providing a lock having an encryption key and a lock key having the encryption key, encrypting information with the lock using the encryption key to generate a first value, encrypting information with the lock key using the encryption key to generate a second value, and comparing the first value with the second value to determine if the lock should be opened.
- 13. The method of claim 12, wherein at least one of the lock and the lock key is configured to generate variable data which is encrypted in the encrypting steps to generate the first and second values.
- 14. The method of claim 12, wherein the lock includes an identification code and the lock key includes a table of identification codes, further comprising the step of comparing the identification code of the lock with the table of identifications codes to determine if the lock key has access rights to the lock.
- 15. The method of claim 12, wherein the lock has an identification code and the lock key has an identification code.
- 16. The method of claim 15, wherein the identification code of the lock is communicated to the lock key.
- 17. The method of claim 15, wherein the identification code of the lock key is communicated to the lock.
- 18. The method of claim 15, wherein the identification code of the lock is included in the information encrypted during the encryption steps.
- 19. The method of claim 15, wherein the identification code of the lock key is included in the information encrypted during the encryption steps.
- 20. The method of claim 12, wherein at least one of the lock and the lock key communicates the information that is encrypted during the encryption steps.
BACKGROUND OF THE INVENTION
[0001] This application claims priority to U.S. Provisional Patent Application No. 60/336,037, to Long, filed Nov. 2, 2001, the disclosure of which is expressly incorporated by reference herein.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60336037 |
Nov 2001 |
US |