GB2315804A - Programmable key and lock - Google Patents
Programmable key and lock Download PDFInfo
- Publication number
- GB2315804A GB2315804A GB9615898A GB9615898A GB2315804A GB 2315804 A GB2315804 A GB 2315804A GB 9615898 A GB9615898 A GB 9615898A GB 9615898 A GB9615898 A GB 9615898A GB 2315804 A GB2315804 A GB 2315804A
- Authority
- GB
- United Kingdom
- Prior art keywords
- lock
- security code
- key
- security
- key part
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00428—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00849—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed programming by learning
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/14—With a sequence of inputs of different identification information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
A programmable security lock which is programmed with a security code which controls the opening of a catch thereof, said lock comprising an electronic key part (A) which is programmed with a security code which corresponds to that of a lock part (B), in which the key part (A) is capable of opening the catch when it has been coupled to said lock part (B) and when comparison means has confirmed agreement of the security code.
Description
PROGRAMMABLE SECURITY LOCK
This invention relates to a programmable security lock. It relates particularly to a security lock and key system which can be programmed and reprogrammed as necessary with a security code to ensure that a given standard of security is maintained.
Background
Electronic locks and keys are well known, particularly as applied to vehicle locks. Such electronic locks require a power source to actuate the lock, after the key has been validated, to enable the opening of the lock. This is easily achieved in a vehicle since the vehicle battery is more than capable of powering a locking system. In a building provision of power to an electronic lock may be more difficult to achieve as additional wiring would be required and a power failure would also lead to failure of the lock. In other applications such as padlocks provision of power from an external source is very difficult. The use of batteries in the lock requires them to be replaced or recharged and this may not be convenient due to the location of the lock.
US patent no. 4,594,637 describes a digital electronic lock system in which the lock is actuated by a power supply contained in a small portable housing.
This housing also contains a keypad or other device to provide a code to cause the lock to open. GB patent 2,184,159 describes an electronic padlock which is powered by inductive coupling to a key. This device is also reprogrammable.
Such reprogrammable locks are also well known. Clearly security is much improved if the code in a lock can be altered periodically. The ability to reprogramme the lock gives the added benefit that if the keys are lost or stolen the lock does not need to be replaced, merely reprogrammed. This reprogramming is analogous to changing the combination of a combination lock, such locks are used in all manner of applications from briefcases to safes.
Reprogramming an individual lock is not a significant problem but reprogramming a number of locks may become time consuming task, especially if they are geographically distributed over a wide area.
Very well known are locks which are opened by a plurality of keys, it being normal to have several keys for one lock, and keys which open a plurality of locks. The most common situation with the latter application is to simply produce a number of identical locks which can then be opened by the same key.
The problem with this situation is that if a lock is replicated anyone with the appropriate key can open the lock and control of access is lost. Similarly if a key is stolen all the locks must be changed to ensure security. With any lock, having only one key can present problems as can having several keys. If only one key exists and this is lost then the lock cannot be opened. If several keys exist then security may be compromised and if the lock is used for safety reasons, to lock off an electricity supply for example, then an unsafe situation may be brought about. A further problem is that every lock and key arrangement requires a key, given the increasing use of locks for security and safety purposes, this inevitably leads to a profusion of keys which need to be managed and controlled.
Description
The present invention provides some solutions to the problems described above in a number of ways. All the previously described devices place the emphasis on the lock as the means of providing access control. Clearly the lock is the element of the arrangement which provides the physical barrier but, in general, it is the key which is transportable and the key which needs to be managed to maintain safe, secure access control. The present invention removes the dependence of the key on the lock and allows the key to be controlled.
Traditionally a lock is purchased with keys and in general further keys may be cut, with the exception of specialist locks for which only one key exists.
The present invention is a key which is reprogrammable and which can reprogramme the lock automatically or on the instruction of the operator, or after verification which may or may not require the intervention of the operator. The key contains a programmable or re-configurable device and some form of memory or means of storing the configuration, if this is not integral to the programmable or re-configurable device, as well as a power supply.
Similarly the lock would contain a memory or means of storing the configuration.
Throughout this description the term reprogrammable is used to indicate an electronic device which can be reprogrammed. Such an electronic lock and key system would work be means of exchanging an electronic code between the lock and key. It is also envisaged that the present invention could be achieved by mechanical means by having a key which can be re-configured. Such a mechanically re-configurable key could transfer a new configuration to a reconfigurable lock.
In normal operation the key would be inserted into, attached to, or in some other way connected to the lock and the lock would verify that the key is programmed or configured to open the lock. During the verification process the key would determine the current status of the code or configuration being used by the lock. If the key contains a newer code this would be programmed into the lock, after the lock has verified the key. Following this reprogramming the lock release mechanism would actuate allowing the lock to be opened. If the lock does not need reprogramming then the release mechanism would actuate after verification.
To enable the key to open several locks the key may contain a number of memory locations or configuration stores. The locks would all contain unique codes (or configurations) and would therefore not be copies of each other, but all could be opened by a correctly programmed or configured key.
All keys are a means of providing power to the lock to actuate the release of the locking mechanism. The act of inserting a conventional key into a mechanical lock achieves this. In the present invention the preferred system is for electro-mechanical actuation of the lock release mechanism but other methods such as mechanical, magnetic, inductive, and thermal may be used. For the electro-mechanical application the key may have a rechargeable power source integral to the key but other options such as a separate power pack, power from mains or from a vehicle battery, alternator or dynamo, or separate generator set have been considered. The power source would actuate the lock release through the key thus eliminating the need for a power source in the lock.
The code used for the validation of the key by the lock may contain many levels of coded data. Information about the owner of the key, its programme version and data versions may all be encoded. Many locks, especially padlocks are used in safety related applications. In these circumstances it is desirable to give people restricted access to certain areas at particular times or in particular circumstances. By encoding zone information into the key and lock it is possible to control which groups of locks a key will open.
All key holders may be granted access to the outer zone (zone 1 for example); a zone 1 key may also allow access to areas where there is no risk. Access to the next zone (zone 2 for example) may be restricted to certain personnel. A zone 2 key will allow access to zones one and two. This arrangement can be repeated any number of times providing a series of nested zones. An alternative arrangement is where access is restricted unless two or more people are present. In this case the zones may be exclusive, ie. a zone 1 key only opens zone one locks, a zone 2 key only zone 2 locks. This would ensure that to access zone 2, if zone 2 was inside a zone 1 perimeter, a zone one key and a zone 2 key would be needed.
A further safety related application is the situation where it is necessary to know exactly how many personnel are in a restricted area. By installing a gate, door or turnstile and issuing personnel with a key, the lock could count the number of personnel entering and leaving. The lock could also record which keys opened it and therefore the identification of the personnel could be determined. The lock could be provided with a display to indicate the number and/or identification of the personnel within the restricted area.
Another safety related application is to connect the lock to an electrical interlock. At present mechanical key switches are used for this, but the present invention allows this to be achieved entirely electronically. The lock (whether or not including some mechanical element) may also be connected to a central control system, computer network, telemetry system, or other arrangement so that the lock condition, open/closed, and any recorded parameters may be ascertained remotely. This facility and/or the interlock arrangement may be used to disable warning alarms on plant, equipment, property boundaries or buildings so that warnings or alarms are not caused by legitimate entry or unlocking.
It is necessary to provide a means for programming and reprogramming (or configuring/re-configuring) the key. This may be achieved by means provided as part of the key or as a separate programmer. For an integral programmer a key pad or other form of input device may be included as part of the key. In the case of a separate programmer the programmer may be a stand-alone device or as a device to be used in conjunction with a computer. Such a programmer may also act as a recharger for the key, if the key contains a rechargeable power source. The programmer, recharger or combined unit may be powered by mains electricity, the electric supply from a vehicle, a power source derived from a computer or other suitable source.
The reprogramming and/or recharging unit described above may also act as a key safe so that if the key is removed without proper validation (by password, application of another key or other means) then the key would be rendered invalid. The reprogramming and/or recharging unit may hold one or several keys at a time. This unit could be installed on a desk, wall, in a vehicle or be portable. The reprogrammer, whether a stand-alone unit or a computer peripheral, could also be used to store the details of the locks and keys currently in use. This would allow any number of keys to be programmed to suit the locks and allow keys to be set up to reprogramme the locks as and when required. The information held by the reprogrammer would need to be encrypted to protect against malicious use. The reprogrammer could also act as a system to store details about key and lock usage, this being down-loaded from the key.
The key may contain a display to allow the operator to monitor information about the lock, or for trouble-shooting purposes if the lock fails to open when expected. A key with a display could be used to display information stored by the lock such as when the lock was last operated, which key last operated it, how often the lock has been opened or closed, the zonal information for the lock, or any other parameter recorded by the lock. Such information may also be down loaded into the key, or into a portable computer, for later processing, storage or printing.
A description of the drawings will now be given. The drawings set out only one application of the present invention and in no way are intended to restrict the application of this invention to the drawings and the following description.
Figure 1 shows general arrangements of the key and lock barrel along with two padlock applications. Figure 1A shows the key in front and side elevation, and plan view, figure 1B shows an example of a lock barrel in sectional elevation, front elevation and plan. In figure 1A the key is shown with a slot which can locate on to the raised face of the lock and provide a mechanical as well as an electrical connection. The mechanical connection provides a means of rotating the lock barrel (fig 1B) after the release pins have been withdrawn.
The barrel could be built into a handle or lock body sized to suit standard fittings. Figure 1C shows a sectional view of the invention in a padlock, here solenoid (1) would retract after validation of the key by the electronics package (2). Spring (3) would open the hasp after retraction of the solenoid thus removing the need for any mechanical interaction between the key and lock, or on the part of the operator. Figure 1D shows a part section of an alternative arrangement where the pawl (5) holding the padlock in the closed position is mounted on the hasp (4) and held in the locked position by a spring between the pawl and hasp. To open the lock, electromagnet (6) would be energized after validation of the key. Provided that the hasp and pawl are magnetically permeable the pawl would be pulled in by the magnetic flux from the electromagnet.
Figure 2 shows a block diagram of the key and lock. Referring to figure 2A, which shows the key, the battery pack (1) is connected to the ancillary electronics package (2) which provides voltage regulation, a clock signal for the microcontroller, recharging control, and power and signal supply to the lock. This package also powers the microcontroller (3). The microcontroller provides signals to, and decodes signals from the lock via the ancillary electronics. After appropriate validation for the key by the lock the microcontroller would reprogramme the lock if necessary. Additional memory storage may be provided (4). Either the memory in the microcontroller or the additional memory will be of the EEPROM type (or other non-volatile type)
Power and signals are transferred to the lock via one, or a plurality of, connectors (5), two being shown in the figure.
The connectors (5) in figure 2A mate with the lock connectors (6) in figure 2B. Via these connectors power is provided to the lock electronics. These consist of ancillary electronics (7), a microcontroller (8) and additional memory (9) if required. Either the memory in the microcontroller or the additional memory will be of the EEPROM type (or other non-volatile type) to allow reprogramming by the key. On receiving power from the key the microcontroller would execute a programme and after an exchange of codes with the key would validate the key. If the key is validated the solenoid (10) would retract the locking pins (12) allowing the lock to be opened. The lock barrel in figure 2B is shown in a bezel (11) for mounting in a door or lock body.
In addition to the basic system described above the key and lock could contain a number of additional features. The key could contain a time limiting device such that it would fail to open the lock if not validated by a specific time.
The key could contain a keypad, fingerprint recognition system, or other personal identification or biometric system that would prevent lost or stolen keys being used by others. The key could count the number of locks opened or store an identifying number of the locks opened. It could also store the times and dates of opening. The lock could be of any type and may or may not require the use of mechanical action from the key (in addition the electromagnetic power provided by the key for actuation of the lock). Types include padlocks, door locks, locks integral to handles, window locks, gate locks. The lock could contain a power source to maintain an electronic clock or calendar such that the lock could record the times and dates of opening or closing.
Figure 3 shows a flow chart of one method of exchanging codes between the key and lock, carrying out validation and reprogramming the lock. After the key is connected to the lock the lock is powered up and begins a start-up sequence, at the end of which a code is transmitted to the key. This code may contain company information, the current lock code version, zone information, and other information needed by the key. On receipt of this information the key responds with a code which my be derived from some or all of the information received from the lock or may be derived by some other predetermined means, such as a pseudo-random number sequence, a time or date based system. When the lock receives this response it performs initial validation of the key. Invalid keys will be rejected and the lock will go into a timed sequence to prevent 'picking' of the lock. The length of time between retries may be controlled by the company and zone information, to prevent inadvertent use of the wrong key causing long time-outs. The current time-out state will be saved to a non-volatile store so that if the key is removed, thus removing the power, the time-out will be preserved. Thus on start-up the lock will carry on the time-out from where it was interrupted. Use of a key with the wrong initial response may cause this time-out period to be very long, a matter of hours or days so that picking the lock by trying random codes will be very time consuming.
Having performed the initial validation the lock will continue to transmit segments of the code and perform validation of responses received from the key until the key is validated. At this point the lock will transmit its current version code. If the key determines this to be out of date it will enter a programme sequence and reprogramme the lock. Once this is done the lock will open.
In the above arrangement the exchange of information is from the lock to the key with the key providing coded responses. Many combinations of data exchange have been considered including lock to key, key to lock, part form lock to key and part from key to lock, initiated by the key or bey the lock, by transmitting one part by one element (lock or key) and responding with the next part from the other element, the encrypted responses described above or any other arrangement. There may be circumstances where no one key can open a particular lock but two or more keys must be applied in succession before the lock will open. As described above these keys may also need a validating parameter, such as a code entered on a key pad or a biometric parameter such as a finger print or retina scan. This would ensure that not only is the key present but the key holder is also present.
Figure 4 shows a block diagram of an application for the invention in a security system. Here it is supposed that an area to be secured is split into three zones, one inside another; this may represent a building within a perimeter fence, for example. Each zone is secured with a different lock. The programming means is used to programme three keys (however, there need not be the same number of keys as locks or zones). The first key (key part 1) is programmed to open lock part 2 and lock part 3 thus allowing access to zones 2 and 3. Key part 2 is only programmed to open lock part 1 and key part 3 opens all locks and is therefore a master key. Clearly the user of key part 1 can only access zones 2 and 3 if one of the other key holders has granted access to zone 1. As an example, suppose that zone 1 is the perimeter fence of an industrial unit, zone 2 is the building and zone 3 is the office within the building. Key part 2 is programmed for the groundsman and only allows access to the grounds, key part 1 allows office staff access during normal hours when the perimeter gate is open and key part 3 allows the security staff access to all areas. Should any one of these key be lost, or if one is taken by an employee who leaves, the keys and locks can be reprogrammed to render the missing key ineffective.
Any number of zones, within the capability of the memory of one key part, could be configured and each key holder would only need one key. The zones could be arranged in any way, from completely separate to completely nested as in the above example but more typically would be a mixture of nested and separate zones.
Claims (9)
1 A programmable security lock which is programmed with a security code
which controls the opening of a catch thereof, said lock comprising an
electronic key part which is programmed with a security code which
corresponds to that of a lock part, in which the key part is capable of
opening the catch when it has been coupled to said lock part and when
comparison means has confirmed agreement of the security code.
2 A lock as claimed in Claim 1, in which the lock part includes an
electronic circuit having a security code memory and a catch release
mechanism, and which is energised only when the electronic key part is
coupled to said lock part.
3 A lock as claimed in Claim 2, in which the lock part electronic circuit
further includes a security code checking circuit capable of returning a
checking response to the electronic key part.
4 A lock as claimed in Claim 3, in which the electronic key part upon
receiving a checking response from the lock part is arranged to send an
acknowledgement signal to the lock part circuit.
5 A lock as claimed in Claim 3 or 4, in which the key part and the lock part
electronic circuits are capable of exchanging a series of checking signals
to ensure correct validation of the security code.
6 A lock as claimed in any one of Claims 1 to 5, in which the electronic key
part includes a memory capable of retaining the security code that has
been programmed into the key, the said memory being capable of being
programmed again to retain a new security code.
7 A lock as claimed in Claim 6, in which the electronic key part upon being
coupled to the said lock part is capable of programming the said new
security code into the lock part memory to replace the original security
code thus ensuring that the new security code will control the catch
opening.
8 A programmable security lock substantially as hereinbefore described with
reference to any one of the accompanying drawings.
9. A programmable security lock system, comprising a security lock as
claimed in any one of Claims 1 to 8 and programming means for
changing a stored security code in the said key part.
l0.A programmable security lock system, comprising a security lock as
claimed in any one of Claims 1 to 8, in which the system includes
separate zones having individual locks protecting access to the
different zones of the system, in which a particular key part has
memory means arranged to allow access to one or more of the said
zones.
.A programmable security lock system, substantially as hereinbefore
described.
9 A programmable security lock system, comprising a security lock as claimed
in any one of Claims 1 to 8 and programming means for changing a stored
security code in the said key part.
10 A programmable security lock system, substantially as hereinbefore
described.
Amendments to the claims have been filed as follows
CLAIMS 1. A programmable security lock which is programmed with a security
code which controls the opening of a catch thereof, said lock
comprising an electronic key part which is programmed with a
security code which corresponds to that of a lock part, in which
the key part is capable of opening the catch when it has been
coupled to said lock part and when comparison means has confirmed
agreement of the security code, in which the lock part includes an
electronic circuit having a security code memory and a catch
release mechanism, an electrical power supply for the lock being
provided by the electronic key part only at a time when the key
part is coupled to said lock part.
2. A lock as claimed in Claim 1, in which the lock part electronic
circuit further includes a security code checking circuit capable
of returning a checking response to the electronic key part.
3. A lock as claimed in Claim 1 or 2 in which the electronic key part
upon receiving a checking response from the lock part is arranged
to send an acknowledgement signal to the lock part circuit.
4. A lock as claimed in Claim 1,2 or 3, in which the key part and the
lock part electronic circuits are capable of exchanging a series
of checking signals to ensure correct validation of the security code.
5. A lock as claimed in any one of Claims 1 to 4, in which the
electronic key part includes a memory capable of retaining the
security code that has been programmed into the key, the said
memory being capable of being programmed again to retain a new
security code.
6. A lock as claimed in any one of Claims 1 to 5, in which the
electronic key part includes two or more memories capable of
retaining a security code, the said security codes being capable
of releasing the catch mechanisms of two or more differently coded
lock parts.
7. A lock as claimed in any one of Claims 1 to 6, in which the
electronic key part upon being couple to the said lock part is
capable of programming the said new security code into the lock
part memory to replace the original security code thus ensuring
that the new security code will control the catch opening.
8. A programmable security lock substantially as hereinbefore
described with reference to any one of the accompanying drawings.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9615898A GB2315804A (en) | 1996-07-29 | 1996-07-29 | Programmable key and lock |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9615898A GB2315804A (en) | 1996-07-29 | 1996-07-29 | Programmable key and lock |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB9615898D0 GB9615898D0 (en) | 1996-09-11 |
| GB2315804A true GB2315804A (en) | 1998-02-11 |
Family
ID=10797678
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB9615898A Withdrawn GB2315804A (en) | 1996-07-29 | 1996-07-29 | Programmable key and lock |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2315804A (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2839104A1 (en) * | 2002-04-29 | 2003-10-31 | Jacques Barnier | Key to operate electrically actuated lock or similar device, uses battery in head of key and contacts on key shaft to connect battery in key to release actuator contacts in lock |
| US7042334B2 (en) | 2003-01-31 | 2006-05-09 | General Electric Company | Methods for managing access to physical assets |
| US7061367B2 (en) | 2002-04-30 | 2006-06-13 | General Electric Company | Managing access to physical assets |
| US7123127B2 (en) | 2003-01-31 | 2006-10-17 | General Electric Company | System for managing physical assets |
| US9670694B2 (en) | 2007-04-12 | 2017-06-06 | Utc Fire & Security Americas Corporation, Inc. | Restricted range lockbox, access device and methods |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1980000091A1 (en) * | 1978-06-19 | 1980-01-24 | R Mosciatti | Door lock security system |
| WO1980002711A1 (en) * | 1979-06-05 | 1980-12-11 | Thelin Handel Id Select | Electronic lock with changeable opening code |
| WO1986000108A1 (en) * | 1984-06-15 | 1986-01-03 | Lowe & Fletcher Limited | Electronic lock and key |
| WO1986001360A1 (en) * | 1984-08-17 | 1986-02-27 | Computerized Security Systems, Incorporated | Microcomputer controlled locking system |
| GB2188762A (en) * | 1986-04-04 | 1987-10-07 | Philip Hall Bertenshaw | Secure data communication system |
| GB2259737A (en) * | 1991-09-19 | 1993-03-24 | Klidi Technology Corp | Remotely-operated self-contained electronic lock security system assembly |
| GB2260563A (en) * | 1991-07-23 | 1993-04-21 | Robin Toms | Security device |
-
1996
- 1996-07-29 GB GB9615898A patent/GB2315804A/en not_active Withdrawn
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1980000091A1 (en) * | 1978-06-19 | 1980-01-24 | R Mosciatti | Door lock security system |
| WO1980002711A1 (en) * | 1979-06-05 | 1980-12-11 | Thelin Handel Id Select | Electronic lock with changeable opening code |
| WO1986000108A1 (en) * | 1984-06-15 | 1986-01-03 | Lowe & Fletcher Limited | Electronic lock and key |
| WO1986001360A1 (en) * | 1984-08-17 | 1986-02-27 | Computerized Security Systems, Incorporated | Microcomputer controlled locking system |
| GB2188762A (en) * | 1986-04-04 | 1987-10-07 | Philip Hall Bertenshaw | Secure data communication system |
| GB2260563A (en) * | 1991-07-23 | 1993-04-21 | Robin Toms | Security device |
| GB2259737A (en) * | 1991-09-19 | 1993-03-24 | Klidi Technology Corp | Remotely-operated self-contained electronic lock security system assembly |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2839104A1 (en) * | 2002-04-29 | 2003-10-31 | Jacques Barnier | Key to operate electrically actuated lock or similar device, uses battery in head of key and contacts on key shaft to connect battery in key to release actuator contacts in lock |
| US7061367B2 (en) | 2002-04-30 | 2006-06-13 | General Electric Company | Managing access to physical assets |
| US7042334B2 (en) | 2003-01-31 | 2006-05-09 | General Electric Company | Methods for managing access to physical assets |
| US7123127B2 (en) | 2003-01-31 | 2006-10-17 | General Electric Company | System for managing physical assets |
| US9670694B2 (en) | 2007-04-12 | 2017-06-06 | Utc Fire & Security Americas Corporation, Inc. | Restricted range lockbox, access device and methods |
Also Published As
| Publication number | Publication date |
|---|---|
| GB9615898D0 (en) | 1996-09-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US4972182A (en) | Electronic security lock | |
| US6331812B1 (en) | Programmable electronic locking device | |
| US8487742B1 (en) | Electronic token and lock | |
| KR100611502B1 (en) | Key and lock | |
| US8274365B2 (en) | Smart lock system | |
| BR112017013997B1 (en) | MERCHANDISE SECURITY SYSTEM AND METHOD FOR PROTECTING AN THEFT-SUSCEPTIBLE MERCHANDISE | |
| PL181666B1 (en) | Electronic security system | |
| US20240119773A1 (en) | Access management for server racks | |
| US12414248B2 (en) | Electronic locks for server racks | |
| US20230380087A1 (en) | Data center security systems and devices | |
| GB2315804A (en) | Programmable key and lock | |
| US7242276B2 (en) | Method and system for unlocking doorway | |
| RU2740880C1 (en) | Locking system operation method and locking system for electromechanical lock devices | |
| US11849561B2 (en) | Data center security systems and devices | |
| US20250078592A1 (en) | Data center security systems and devices | |
| WO2023122159A2 (en) | Data center security systems and devices | |
| WO2003034348A1 (en) | A safe | |
| WO2002019277A1 (en) | Method and system for unlocking doorway | |
| MXPA97005614A (en) | Electronic device closing program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |