Security system with security access database distributed among individual access devices
First Claim
Patent Images
1. A security system, comprising:
- key means for gaining access to a location, including a memory having stored therein specific coded data including a security code and additional validation data specific to said key means, and selected command instructions related to access requirements specific to an authorized keyholder assigned to said key means; and
controller means for controlling access to said location, includingmeans for reading said coded data and command instructions from said key means,means for determining the validity of said key means based on the content of the coded data read from said key means,means for allowing access to said location upon determining said key means to be valid, andmeans for responding to command instructions read from a key means determined to be valid in order to provide a mode of access in accordance with said access requirements.
0 Assignments
0 Petitions
Accused Products
Abstract
An electronic security system includes a controller for controlling access to a location through activation of a lock mechanism in response to coded data and command instructions read from a key or card containing an electronic memory. The key memory data includes information specific to the keyholder which is decoded and acted upon by the controller. The controller memory can be reduced in size while still allowing the use of a large number of keys, by distributing a larger amount of data to the key memories. The controller is also capable of writing and altering key memory data in real time to control the subsequent use of the key.
-
Citations
16 Claims
-
1. A security system, comprising:
-
key means for gaining access to a location, including a memory having stored therein specific coded data including a security code and additional validation data specific to said key means, and selected command instructions related to access requirements specific to an authorized keyholder assigned to said key means; and controller means for controlling access to said location, including means for reading said coded data and command instructions from said key means, means for determining the validity of said key means based on the content of the coded data read from said key means, means for allowing access to said location upon determining said key means to be valid, and means for responding to command instructions read from a key means determined to be valid in order to provide a mode of access in accordance with said access requirements. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 15)
-
-
12. A method of controlling access to a location, comprising the steps of:
-
storing coded data including a security code and additional validation data and commands related to access requirements specific to an authorized keyholder, in a memory of a key, said additional validation data being specific to said key means; reading said coded data and commands from said memory; and determining the validity of said key based on the coded data read from said memory and allowing access to said location and responding to said commands to provide a mode of access in accordance with said access requirements when the key is determined to be valid. - View Dependent Claims (13, 14)
-
-
16. A security system, comprising:
-
a plurality of key means for gaining access to a plurality of locations, each of said plurality of key means including a memory having stored therein coded data specific to said key means and command instructions specific to said key means; a plurality of controllers interconnected by a communication line to a controller programmer, each of said controllers being positioned at a separate location for controlling access to said separate location, wherein each of said controllers comprises means for reading coded data from a memory of a key means presented thereto, a memory table storing a list of codes corresponding to specific key means authorized to have access to the location controlled by said controller, means for determining the validity of said presented key means by comparing coded data read therefrom with said list of codes in said memory table, means for allowing access to said location upon determining said presented key means to be valid, and means for executing command instructions read from said presented key means memory; wherein said controller programmer polls individual ones of said plurality of controllers for communication therebetween.
-
Specification