System and method for key control in an electronic locking system
First Claim
1. A method for use with an electronic locking system, comprising the steps of:
- selecting at least one key having a memory to have access to at least one lock having a memory in order to form a dataset of key to lock relationships;
transferring the dataset of key to lock relationships to the memory of at least one key;
presenting the key to at least one of the locks;
transferring at least a portion of the dataset of key to lock relationships from the key to the memory of the lock in order to update the memory of the lock;
updating the memory of the key to reflect the update to the lock; and
transferring at least a portion of the memory of the key to a database in order to update the database to indicate completion of the update to the memory of the lock.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and a method for use with an electronic locking system is provided. At least one key is selected in order to have access to at least one lock. This key to lock relationship is transferred to a memory of the key. The key is presented to the lock and at least a portion of the key to lock relationship from the key is transferred to a memory of the lock. This transfer updates the memory of the key to lock relationships in the lock. The update of the memory in the lock is noted in the memory of the key. The key may then be placed in communication with a computer so that at least a portion of the memory of the key is transferred to a database in the computer. This transfer updates the database in order to reflect the fact that the memory of the lock has been updated and completed.
45 Citations
26 Claims
-
1. A method for use with an electronic locking system, comprising the steps of:
-
selecting at least one key having a memory to have access to at least one lock having a memory in order to form a dataset of key to lock relationships; transferring the dataset of key to lock relationships to the memory of at least one key; presenting the key to at least one of the locks; transferring at least a portion of the dataset of key to lock relationships from the key to the memory of the lock in order to update the memory of the lock; updating the memory of the key to reflect the update to the lock; and transferring at least a portion of the memory of the key to a database in order to update the database to indicate completion of the update to the memory of the lock. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for use with an electronic locking system, comprising the steps of:
-
modifying a dataset of key to lock relationships in order to create a modification log having at least one key being added or deleted to at least one lock; transferring the modification log to a memory of at least one key; presenting the key to at least one lock; reading the modification log by the lock and updating the memory of the lock to reflect any addition or deletion of keys to the lock as indicated in the modification log, the modification log read by the lock being in the memory of the key; updating the modification log in the memory of the key to indicate the updating of the memory of the lock was completed; and reading the modification log from the memory of the key and updating a database to reflect that the update to the memory of the lock was completed. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. An electronic lock system, comprising:
-
a lock having a microprocessor based control circuit; a lock memory in communication with the microprocessor based control circuit of the lock, the lock memory having a listing of keys that have access to the lock stored therein; a key having a key memory, the key configured for communication with the lock memory such that data being transferable to and from the key memory and lock memory, the key memory having a modification log stored therein containing additions and deletions of keys to the lock; a computer having a database with a listing of keys that have access to a listing of locks, the computer configured for communication with the key; wherein the modification log is created by the computer, transferred to the key memory, and at least a portion of the modification log transferred to the lock memory to update the listing of keys that have access to the locks; wherein the modification log in the key memory is updated to reflect the update to the lock memory; and wherein at least a portion of the updated modification log in the key memory is transferred to the computer in order to verify completion of an update to the listing of keys that have access to a listing of locks. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification