Security code activated access control system
First Claim
1_9. ] A system for access control comprising:
- a user interface having means to generate key codes and add user codes whereby issuing a security code with user defined parameters, a control device having;
an input device for entering security codes, a multitude of key codes stored in memory equivalent to key codes generated by said database and, a controller with programming having means to compare key codes inputted, to key codes in memory and, when equal, interpret the user code whereby performing a required output relative to the user code parameters.
0 Assignments
0 Petitions
Accused Products
Abstract
An access control system that utilizes security codes (500), a database (430), and a control device (20) is disclosed. Each security codes (500) is comprised of a unique key code (502) that provides security in addition to a use code (503) that is used to convey specific user defined functions. The use code (503) may be determined by the security code requester (400) at the time of security code (500) charge out from the database (430). The database (430) controls the issuance of security codes (500) and the control device (20) validates the key code (502) within the security code (500) against key codes (502) within control device (20) memory and if valid, performs an action based on the validation of the use code (503) parameters. As the key codes (502) that are within the control device (20) memory are used, the control device (20) then self-regenerates the key codes (502) in order to extend the control device (20) service life indefinitely. The database (430) and the control device (20) have security code (500) activities that are synchronized, though the two operate independently and are not electronically connected. The system provides a secure interface for obtaining access authority from the database (430). Security code requesters (400) contact the database (430) and request security codes (500) in order to activate a specific control device (20). After database (430) issuance, the security codes (500) are then input by the security code user (420) at the control device (20) location and activates the control device (20) if the key code (502) matches the key code (502) within the control device (20) and the use code (503) parameters are validated by the control device (20). The control device (20) and the database (430) key codes (502) are synchronized. This allows an unlimited supply of security codes (500) to be issued by the database (430) and used by the control device (20).
58 Citations
209 Claims
-
1_9. ] A system for access control comprising:
-
a user interface having means to generate key codes and add user codes whereby issuing a security code with user defined parameters, a control device having;
an input device for entering security codes, a multitude of key codes stored in memory equivalent to key codes generated by said database and, a controller with programming having means to compare key codes inputted, to key codes in memory and, when equal, interpret the user code whereby performing a required output relative to the user code parameters.
-
-
2_9. ] The system as set forth in claim 1, wherein said use codes are defined by user input via a user interface.
-
3_9. ] The system as set forth in claim 2, wherein said user input may be selected from a group consisting of personnel identification, time based, multiple use, single use, location based, or limits set for a peripheral device.
-
4_9. ] The system as set forth in claim 1, wherein the database may reside on a computing device selected from a group consisting of a personal computer, a handheld computing device, or a server.
-
5_9. ] The system as set forth in claim 1, wherein said key codes and said use codes are cryptically embedded within said security code.
-
6_9. ] The system as set forth in claim 1, said database further includes a software program and algorithm having means to regenerate key codes to new key codes after being issued.
-
7_9. ] The system as set forth in claim 1, said database further includes a software program having means to accept input of transaction specific data associated with each security code issuance.
-
8_9. ] The system as set forth in claim 1, wherein said input device being selected from a group consisting of a keypad, a card reader, a barcode reader, a radio frequency transmitter, an infrared transmitter or an auxiliary input device.
-
9_9. ] The system as set forth in claim 8, wherein said auxiliary input device being selected from a group consisting of relays, switches, sensors, potentiometers, gauges or controls.
-
10_9. ] The system as set forth in claim 1, the access control device further including a software program having means to archive security codes after use.
-
11_9. ] The system as set forth in claim 10, the software program further including an algorithm having means to regenerate key codes to new key codes equal to newly regenerated key codes in the database.
-
12_9. ] The system as set forth in claim 1, said access control device further including a software program having means to limit the amount of key codes in memory available for comparison to the inputted security codes from the total amount of security codes in memory.
-
13_9. ] The system as set forth in claim 1, the access control device further including a software program having means to recognize valid security codes inputted when said security codes are inputted in a different sequential order than issued from the database.
-
14_9. ] The system as set forth in claim 1, the access control device further including a software program having means to interpret the user defined parameters of the inputted use code and perform a function relative to the user code parameters.
-
15_9. ] A method for access control comprising:
-
utilizing a computer program and database to obtain a unique key code, add a use code comprised of user defined parameters and provide the resulting security code to an access control user, said access control user inputs the security code into an access control device via an input device, said access control device having key codes stored in memory equivalent to said key codes stored on the database, said access control device compares inputted key codes to those in memory and if valid, interprets the use code portion of the security code to perform a required output.
-
-
16_9. ] The method as set forth in claim 15, wherein said user defined parameters may be selected from a group consisting of, personnel identification, start time, stop time, elapsed time, multiple use, single use, location of use, or limits set for a peripheral device.
-
17_9. ] The method as set forth in claim 15, the database further including a software program and algorithm with means to regenerate key codes to new key codes after being issued.
-
18_9. ] The method as set forth in claim 15, the access control device further including software program having means to limit the amount of key codes in memory available for comparison to inputted security codes from the total amount of key codes in memory.
-
19_9. ] The method as set forth in claim 15, the access control device further including a software program and algorithm having means to archive used security codes and regenerate key codes to new key codes equal to newly regenerated key codes in the database.
-
20_9. ] The method as set forth in claim 15, the access control device further including a software program having means to recognize valid security codes inputted when said security codes are inputted in a different sequential order than issued from the database.
Specification