Access control system
First Claim
Patent Images
1. An access system, comprising:
- at least one lock configured to receive instructions from at least one key and to energize a lock mechanism to unlock the at least one lock;
the at least one key configured for communicating over a primary wireless communication path with a computer via a first transmitter and a first antenna and to communicate with the at least one lock over a secondary wireless path via a second transmitter and a second antenna, the at least one key being authorized to unlock the at least one lock absent a de-authorizing instruction received over the primary wireless communications path from the computer and absent a determination that the at least one key has not been in contact with the computer over the primary wireless communication path during and/or lasting a predetermined period of time; and
the computer disposed at a remote location from the at least one key, the computer configured to communicate with the at least one key over the primary wireless communication path, the computer further configured to receive usage data from the at least one key, and to send de-authorization instructions to the at least one key.
2 Assignments
0 Petitions
Accused Products
Abstract
An access device for a system having at least one lock that is configured to receive instructions and to energize a lock mechanism to unlock the at least one lock and a computer is disposed at a remote location from the at least one lock and the access device. The computer is connected to a primary wireless communication path. The access device comprises at least one key configured for communicating with the computer via the primary wireless communication path and to communicate with the lock over a secondary wireless communications path and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction from the computer.
53 Citations
40 Claims
-
1. An access system, comprising:
-
at least one lock configured to receive instructions from at least one key and to energize a lock mechanism to unlock the at least one lock; the at least one key configured for communicating over a primary wireless communication path with a computer via a first transmitter and a first antenna and to communicate with the at least one lock over a secondary wireless path via a second transmitter and a second antenna, the at least one key being authorized to unlock the at least one lock absent a de-authorizing instruction received over the primary wireless communications path from the computer and absent a determination that the at least one key has not been in contact with the computer over the primary wireless communication path during and/or lasting a predetermined period of time; and the computer disposed at a remote location from the at least one key, the computer configured to communicate with the at least one key over the primary wireless communication path, the computer further configured to receive usage data from the at least one key, and to send de-authorization instructions to the at least one key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of controlling access utilizing at least one lock configured to receive instructions, and to provide input to a lock mechanism to unlock the at least one lock, comprising:
-
setting at least one key as authorized to unlock the at least one lock absent a de-authorizing instruction from a computer over a primary wireless communication path; using the at least one key to send an instruction to unlock the at least one lock; storing authorization data concerning the at least one key on the computer located remote from the at least one key and the at least one lock; detecting a failure of the at least one key if the at least one key is not in contact with the computer over the primary wireless communication path during and/or lasting a predetermined period of time; de-authorizing the at least one key based on the detected failure; storing access information concerning the at least one lock on the computer located remote from the at least one lock and the at least one key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An access device for a system having at least one lock that is configured to receive instructions from at least one key and to energize a lock mechanism to unlock the at least one lock based on the received instructions, and a computer disposed at a remote location from the at least one lock, the computer being connected with a primary wireless communication path, the access device comprising:
at least one key configured to communicate with the computer via the primary wireless communication path and to communicate with the at least one lock over a secondary wireless communication path, wherein the at least one key is authorized to unlock the at least one lock absent a de-authorizing instruction from the computer and absent a determination that the at least one key has not been in contact with the computer over the primary wireless communication path during and/or lasting a predetermined period of time. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
Specification