Apparatus and method for controlled access to a secured location
First Claim
1. A method for allowing access to a secured location, comprising the steps of:
- generating a signal containing encoded information identifying an access code only for a particular secured location and an identification number for a particular person authorized to access that location;
the access code in the encoded information being a present access code;
the encoded information also containing a new access code for the next authorized access to the secured location;
entering that encoded information into a portable terminal carried by the person seeking access to the secured location;
transferring the portable terminal with the entered encoded information to the secured location;
comparing the present access code in the encoded information with an access code previously stored at the secured location to verify that the access code in the encoded information is the same as the access code at the secured location;
comparing the identification number in the encoded information with a current identification number of the person seeking access to the secured location to verify that the current identification number is the same as the identification number in the encoded information; and
thengranting access to the secured location only if the verifications are true; and
thenin response to granting access, replacing the access code previously stored at the secured location with the new access code contained in the encoded information, so that the new access code becomes stored at the secured location for comparison with a subsequent present access code the next time access to the particular secured location is sought.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for authorizing access to a secured device, such as an automated teller machine (ATM) or a pay telephone, without a key or combination for the secured device, and without a fixed communication link extending to the device. An encoded access message is produced which identifies a present access code previously stored at the secured device, the personal identification number (PIN) of a technician, and the identification number of a particular portable terminal. The technician manually enters the encoded access message and a PIN into the terminal, which verifies the identification number of the terminal and the manually-entered PIN against information encoded in the access message. If that information is authenticated, the portable terminal is connected to the secured device. The encoded access message is transferred from the terminal to the secured device, which compares an access code previously stored at that device with information contained in the access message. The proper PIN also is re-entered. Access is granted only if all information is verified by information in the encoded access message. If access is allowed, the access code at the secured device is replaced by a new access code from the encoded access message, and that new access code is stored for the next authorized access to the particular secured device.
297 Citations
24 Claims
-
1. A method for allowing access to a secured location, comprising the steps of:
-
generating a signal containing encoded information identifying an access code only for a particular secured location and an identification number for a particular person authorized to access that location; the access code in the encoded information being a present access code; the encoded information also containing a new access code for the next authorized access to the secured location; entering that encoded information into a portable terminal carried by the person seeking access to the secured location; transferring the portable terminal with the entered encoded information to the secured location; comparing the present access code in the encoded information with an access code previously stored at the secured location to verify that the access code in the encoded information is the same as the access code at the secured location; comparing the identification number in the encoded information with a current identification number of the person seeking access to the secured location to verify that the current identification number is the same as the identification number in the encoded information; and
thengranting access to the secured location only if the verifications are true; and
thenin response to granting access, replacing the access code previously stored at the secured location with the new access code contained in the encoded information, so that the new access code becomes stored at the secured location for comparison with a subsequent present access code the next time access to the particular secured location is sought.
-
-
2. A method for allowing a particular person access to a selected one of plural automated teller machines (ATMs) by means of a portable terminal, comprising the steps of:
-
generating an encoded access message containing information identifying an access code previously stored at the selected ATM, and a personal identification number (PIN) for the particular person; entering the encoded message in the portable terminal apart from the ATM; entering the PIN in unencoded form in the portable terminal; comparing the entered PIN with the PIN contained in the encoded message previously entered into the portable terminal to authorize an access only if the PINs bear a predetermined relation to each other; and
thenestablishing data communication between the portable terminal and an ATM, and transferring the access message in encoded form from the portable terminal to the ATM; comparing the access code contained in the encoded message with the access code previously stored at the ATM to verify that the access code in the encoded message is the same as the access code at the selected ATM; re-entering the PIN in unencoded form into the portable terminal; comparing the re-entered PIN with the PIN contained in the encoded message communicated to the ATM from the terminal; and granting access to the ATM only if the same access codes are present and the re-entered PIN bears a predetermined relation to the PIN in the encoded message communicated to the ATM. - View Dependent Claims (3, 4, 5)
-
-
6. A method for allowing a particular person to access a secured location, comprising the steps of:
-
generating information including a unique original access code previously stored at the secured location, a new access code for the secured location, and an identification number for the particular person; encrypting the encoded information; transferring the encrypted information to the secured location; decrypting the encrypted information; comparing the original access code in the decrypted information with the access code previously stored at the secured location to verify that a predetermined relation exists therebetween; allowing access to the secured location only if the verification is true; and replacing the access code stored at the secured location with the new access code in the decrypted information, in response to allowing access, so that the new access code is stored at the secured location for comparison when attempting the next access.
-
-
7. Apparatus for obtaining selective access to a cash-receiving device having a receptacle for receiving a removable cash box and a closure for preventing unauthorized access to the receptacle, comprising:
-
means associated with the device to receive and store an access code required for the next access to the device; a portable terminal separate from the device for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the device; means associated with the portable terminal for entering an unencoded PIN; means associated with the portable terminal for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message; data transfer means selectively operative to transfer the encoded access message to the device only in response to the certain logic state; means associated with the device for comparing the access code in the access message with an access code stored at the device and providing an authorization signal allowing access to the receptacle only in response to a predetermined relation between the access codes; an encoded label associated with each cash box to identify that cash box; and a scanner associated with the portable terminal to scan the label on each cash box removed from a device and on each empty cash box installed in the device, whereby signals identifying the removed and installed cash boxes are stored in the portable terminal. - View Dependent Claims (8, 9)
-
-
10. A method for allowing access to a secured location, comprising the steps of:
-
generating a signal containing encoded access information identifying an access code for a particular secured location and an identification number for a particular person authorized to access that location; transferring the encoded information to the secured location by entering that encoded information into a portable terminal carried by the person seeking access to the secured location; entering the current identification number into the terminal; comparing the identification number in the encoded information with the identification number entered into the terminal; erasing the encoded access information from the terminal if a predetermined relation between the identification numbers is not presented by the comparison; comparing the access code in the encoded information with an access code previously stored at the secured location to verify that the access code in the encoded information is the same as the access code at the secured location; comparing the identification number in the encoded information with a current identification number of the person seeking access to the secured location to verify that the current identification number is the same as the identification number in the encoded information; and
thengranting access to the secured location only if the verification are true. - View Dependent Claims (11, 12, 13)
-
-
14. Apparatus for obtaining selective access to a secured location, comprising:
-
means associated with the secured location to receive and store an access code required for the next access to the secured location; terminal means separate from the secured location for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the location; means associated with the terminal means for entering an unencoded PIN; means associated with the terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message; data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state; means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes; and the terminal means is operative in response to the certain logic state to erase the unencoded PIN previously entered in the terminal means, whereby the terminal means cannot transfer the unencoded PIN to the secured location.
-
-
15. Apparatus for obtaining selective access to a secured location, comprising:
-
means associated with the secured location to receive and store an access code required for the next access to the remote location; terminal means separate from the secured location for receiving an access message containing in encoded from an access code and a personal identification number (PIN) for a certain person authorized to access the location; means associated with the terminal means for entering an unencoded PIN; means associated with terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message; data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state; means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes; and the secured location includes means responsive to re-entry of an unencoded PIN at the entry means of the terminal to compare the re-entered PIN with the PIN in the encoded access message transferred to the secured location and to provide the access authorization signal only in response to a predetermined relation between the PINs in addition to the predetermined relation between access codes.
-
-
16. Apparatus for obtaining selective access to a pay telephone having a receptacle for receiving a removable coin box and a door for preventing unauthorized access to the receptacle, comprising:
-
means associated with the telephone to receive and store an access code required for the next access to the telephone; terminal means separate from the telephone for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the telephone; means associated with the terminal means for entering an unencoded PIN; means associated with the terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message; data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state; means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes; a solenoid latch associated with the door and operative only in response to the authorization signal to release the door for access to the receptacle; and a circuit connected to a telephone line for the telephone and operative in response to the authorization signal to temporarily supply the solenoid ringing current on the telephone line, whereby the solenoid operates to unlatch the door in response to ringing current on the telephone line during the temporary connection.
-
-
17. A method for allowing a particular person access to a selected one of plural secured devices by means of a terminal, comprising the steps of:
-
generating an encoded access message containing information identifying an access code previously stored at the selected secured device, and a personal identification number (PIN) for the particular person; entering the PIN in unencoded form in the terminal; entering the encoded message in the terminal apart from the secured device; comparing the entered PIN with the PIN contained in the encoded message previously entered into the terminal to authorize an access only if the PINs bear a predetermined relation to each other, and then establishing data communication between the terminal and a particular secured device, and transferring the access message in encoded form from the terminal to the secured device; comparing the access code contained in the encoded message with the access code previously stored at the secured device to verify that the particular secured device is the selected secured device; re-entering the PIN in unencoded form into the terminal; comparing the re-entered PIN with the PIN contained in the encoded message communicated to the secured device from the terminal; and granting access to the selected secured device only if the comparison of access codes verified that the particular secured device is the selected secured device and the re-entered PIN bears a predetermined relation to the PIN in the encoded message communicated to the secured device.
-
-
18. A method for allowing a particular person access to a selected one of plural secured devices by means of a terminal, comprising the steps of:
-
generating an encoded access message remote from the secured device, the access message containing information identifying an access code previously stored at the selected secured device and a personal identification number (PIN) for the particular person; transferring the encoded message to the selected secured device; decoding the encoded message to obtain the access code and PIN in unencoded form; supplying the PIN of the person in unencoded form to the selected secured device; comparing the supplied PIN with the PIN obtained by decoding the encoded message transferred to the selected secured device to authorize an access only if the PINs bear a predetermined relation to each other; and
thencomparing the access code obtained by decoding the encoded message transferred to the secured device with the access code previously stored at the secured device to verify the identity of the selected secured device; granting access to the selected secured device only if the comparison of access codes verifies that the particular secured device is the selected secured device and the supplied PIN bears a predetermined relation to the PIN in the encoded message communicated to the secured device; and erasing the access message if the predetermined relation is not presented by the comparison.
-
-
19. A method for allowing a person to access a secured location, comprising the steps of:
-
generating an encrypted message containing information identifying an access code for a particular secured location and an identification number for a particular person authorized to access that location; entering the encrypted message into a portable terminal carried by the person seeking access to the secured location; entering into the terminal an identification number for that person; decrypting the message within the portable terminal to obtain the identification number; comparing the identification number in the message with the identification number entered into the portable terminal; if a predetermined relation between the identification numbers is presented by the comparison, establishing data communication between the portable terminal and the secured location; and
thendecrypting the message to obtain the access code; comparing the access code in the decrypted message with an access code previously stored at the secured location to verify that the access code in the message is the same as the access code at the secured location; and granting access to the secured location only if the verification is true. - View Dependent Claims (20, 21, 22)
-
-
23. A method for allowing a person to access a secured device, comprising the steps of:
-
generating a message containing information identifying an access code for a particular secured device, a terminal number for a certain terminal, and an identification number for a particular person authorized to access that device; entering the message into a terminal operatively associated with a terminal number; entering into the terminal an identification number for that person; comparing the identification number in the message with the identification number entered into the terminal; comparing the terminal number in the message with the terminal number associated with the terminal; if predetermined relations occur between the identification numbers and between the terminal numbers in response to the comparisons, establishing data communication between the terminal and the secured device, otherwise terminating the attempted access; once the data communication is established, comparing the access code in the message with an access code previously stored at the secured device to verify that the access code in the message is the same as the access code at the secured device; and granting access to the secured device only if the access code verification is true. - View Dependent Claims (24)
-
Specification