Device and process for limiting access to authorized users
First Claim
1. A device for limiting access to authorized users, comprising:
- (a) a control device, comprising a memory for storing a preset secret code and a preset user code; and
(b) a key device, comprising a transponder having a memory for storing the secret code and the user code which is transferred by said control device in a secret code area, wherein the transponder emits as information the user code which has been encoded according to the secret code;
(c) a first comparison device in said control device which permits access only when it detects agreement between the information received from said transponder comprising said user code encoded according to said secret code and with said user code stored in said control device; and
(d) a second comparison device coupled with a locking device in said key device which permit overwriting of said secret code stored in said memory of said key device only if said comparison device first detects agreement between the user code already stored in said key device and the user code transferred from said control device.
2 Assignments
0 Petitions
Accused Products
Abstract
A device for limiting access to authorized users, for example, a vehicle access limiting device, includes a control device and a key device. The control device has memory wherein a preset user code and a preset secret code are stored. The key device has a transponder which includes a memory for storing the user code and the secret code transferred from the control device. The transponder emits the user code which has been encoded with the transferred secret code. The control device includes a comparison device which allows access only when the encoded user code emitted by the transponder agrees with preset information stored in the control device. The key device also includes a comparison device which prevents overwriting of the taught secret code unless it also receives the taught user code. In the event of failure of the control device, a second control device with a new user code and a new secret code can be used with the key device, after which the second control device teaches the key device the new user code and the new secret code.
22 Citations
13 Claims
-
1. A device for limiting access to authorized users, comprising:
-
(a) a control device, comprising a memory for storing a preset secret code and a preset user code; and (b) a key device, comprising a transponder having a memory for storing the secret code and the user code which is transferred by said control device in a secret code area, wherein the transponder emits as information the user code which has been encoded according to the secret code; (c) a first comparison device in said control device which permits access only when it detects agreement between the information received from said transponder comprising said user code encoded according to said secret code and with said user code stored in said control device; and (d) a second comparison device coupled with a locking device in said key device which permit overwriting of said secret code stored in said memory of said key device only if said comparison device first detects agreement between the user code already stored in said key device and the user code transferred from said control device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A process for limiting access to authorized users in an access limiting device, comprising a control device wherein a preset secret code and a preset user code are stored, and a key device having a transponder which exchanges data bidirectionally with said control device, said process comprising the steps of:
-
(a) transferring the secret code and user code from the control device to the key device wherein they are stored; (b) encoding the transferred user code in the key device according to the secret code; (c) emitting the encoded user code from the transponder to the control device; (d) comparing the encoded user code received from the transponder in the control device with preset information fixed in the control device, and, if it agrees, allowing access to the access limiting device; and (e) if the control device is replaced with a second control device having a second secret code, comparing the user code transferred by said second control device with the user code already stored in said key device and, if they agree, permitting the secret code already stored in said key device to be overwritten with said second secret code of said second control device. - View Dependent Claims (12, 13)
-
Specification