Access Control System
First Claim
1. An access system, comprising:
- at least one lock configured to receive instructions and to energize a lock mechanism to unlock the at least one lock;
at least one key configured for communicating over a primary wireless communication path and to communicate with the least one lock over a secondary wireless path, and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction received over the primary wireless communications path; and
,a computer disposed at a remote location from the at least one key and configured to communicate with the at least one key over the primary wireless communication path, the computer sending authorization/deauthorization instructions and receiving usage data to and from the at least one key.
2 Assignments
0 Petitions
Accused Products
Abstract
An access device for a system having at least one lock that is configured to receive instructions and to energize a lock mechanism to unlock the at least one lock and a computer is disposed at a remote location from the at least one lock and the access device. The computer is connected to a primary wireless communication path. The access device comprises at least one key configured for communicating with the computer via the primary wireless communication path and to communicate with the lock over a secondary wireless communications path and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction from the computer.
61 Citations
42 Claims
-
1. An access system, comprising:
-
at least one lock configured to receive instructions and to energize a lock mechanism to unlock the at least one lock; at least one key configured for communicating over a primary wireless communication path and to communicate with the least one lock over a secondary wireless path, and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction received over the primary wireless communications path; and
,a computer disposed at a remote location from the at least one key and configured to communicate with the at least one key over the primary wireless communication path, the computer sending authorization/deauthorization instructions and receiving usage data to and from the at least one key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of controlling access utilizing at least one lock configured to receive instructions and to provide input to a lock mechanism to unlock the at least one lock, comprising:
-
using at least one key authorized to unlock the at least one lock absent a de-authorizing instruction from the computer over a primary wireless communication path; using the at least one key to send an instruction to unlock the at least one lock; storing authorization data concerning the at least one key on a computer located remote from the at least one key and the at least one lock; storing access information concerning the at least one lock on the computer located remote from the at least one lock and the at least one key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. An access device for a system having at least one lock that is configured to receive instructions and to energize a lock mechanism to unlock the at least one lock and a computer disposed at a remote location from the at least one lock, the computer being connected with a primary wireless communication path, the access device comprising:
at least one key configured for communicating with the computer via the primary wireless communication path and to communicate with the lock, and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction from the computer. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
Specification