`Volkswagen Group of America, Inc., Petitioner
`
`1
`
`
`
`6,072,402
`Page 2
`
`US. PATENT DOCUMENTS
`
`5,124,696
`
`6/1992 Bosley .
`
`4,962,522 10/1990 Marian .................................. .. 379/105
`5,014,049
`5/1991 Bosley ............................... 340/825.31
`5,016,273
`5/1991 Hoff ........................................ .. 380/10
`
`5,020,135
`5/1991 Kasparian etal.
`455/76
`5,113,427
`5/1992 Ryoichietal.
`.................. .. 340/825.44
`
`5252965 10/1993 G‘dw‘““°”1"
`59478995
`12/1995 W9“°‘5‘°‘f°‘ 9‘ 91~~
`5519491
`4/1997 L9mbf°P°“19S 9‘ 91~~
`5,650,774
`7/1997 Drori.
`5,717,387
`2/1998 suman eta1..
`
`2
`
`
`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 1 of4
`
`204,270,6
`
`o_v_oO._E
` E2
`L7K
`91%.
`g—V
`
`E
`
`E30;
`
`
`
`mz<m_s__2m_z<:om_s_
`
`mm
`
`mm
`
`\m
`
`om
`
`E
`
`2
`
`2.
`
`zo_mm_s_mz<E
`
`sm:m>m
`
`mm:o:oz_m<m:o
`
`mmS%,_oo
`
`I‘
`
`2
`
`mm
`
`_U_H=H_
`
`_H__UU
`
`H=H=U
`
`DUB
`
`3
`
`
`
`
`
`
`
`
`U.S. Patent
`
`0
`
`4
`
`6,072,402
`
`
`
`m.,wo<#m:z_Znaam
`
`s_Em>m6.mm=son_mo<n_>mv_zo_mm_s_mz<E
`
`0oz:<zo_mmm:o:oz_m<m:o
`
`mz<m2
`
`
`pmEDUB
`
`2m_o<uEEz_0mmm%w.DUB%u9.ESn_s_oo
`
`xoo4
`
`2@z<:om2
`
`xoo4
`
`NF
`
`av
`
`4
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 3 of4
`
`6,072,402
`
`2m_z<:oms_
`>#_n5m
`
`X004
`
`meson
`
`E
`
`zo_mm_s_wz<E
`
`s_m:m>m
`
`Em_m:o_._oz_m<m:o
`
`5
`
`
`
`
`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 4 of4
`
`6,072,402
`
`FIG. 4
`
`62
`
`64
`
`-DEVICE
`60»
`
`O O
`
`D
`
`O
`
` RF
`TRANSMISSION
`SYSTEM
`
`
`
`CLEARINGHOUSE
`
`COMPUTER
`
`
`
`66
`
`6
`
`
`
`6,072,402
`
`1
`SECURE ENTRY SYSTEM WITH RADIO
`COMMUNICATIONS
`
`FIELD OF THE INVENTION
`
`The present invention relates to secure entry systems, and
`more particularly relates to the use of radio in such systems.
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`In the century since radio science was developed, radio
`signal transmission has found myriad applications. Some
`have been in the field of electronic security systems.
`A familiar example is a garage door opener. A radio
`transmitter is used to relay instruction signals to a receiver
`unit, causing the receiver unit to activate a door opening
`mechanism.
`
`More sophisticated access control devices operate in
`conjunction with a personal access card that
`includes a
`battery, a microprocessor, a receiver and a transmitter. The
`access control device periodically broadcasts an interroga-
`tion signal, which the card receives when it is brought into
`close proximity thereto. In response, the card transmits an
`RF reply signal to the access control device, authorizing
`access to the secured area. French patent publication 2,604,
`808 and European patent publication EP 393,784 are illus-
`trative of such systems.
`Radio data transmission is sometimes used in home
`
`security systems to relay data from motion, continuity,
`vibration or other detectors to a central monitoring unit.
`Radio frequency energy is sometimes used to convey
`operating power to an otherwise unpowered unit. U.S. Pat.
`No. 4,851,652, for example, illustrates a secure entry system
`in which a passive lock unit is powered from RF energy
`radiated from an associated key card. The lock also receives
`data from the key by modulation of the same RF energy.
`French patent publication 2,542,792 shows such a system in
`which a passive key is powered by an RF signal that is
`coupled to it by an associated lock.
`Radio is sometimes used outside the secure entry field to
`relay reprogramming instructions to remote units. U.S. Pat.
`Nos. 4,525,865 and 4,910,510, for example, disclose pagers
`and other radios whose operational characteristics can be
`reprogrammed remotely by radio. U.S. Pat. 5,020,135 dis-
`closes such a system that also features remote memory
`dumps and diagnostics from radio transceivers using radio
`signals. U.S. Pat. Nos. 4,543,955 and 4,958,632 disclose
`cardiac pacemakers and other implantable devices that can
`be reprogrammed via use of radio. U.S. Pat. No. 4,713,661
`discloses an annunciator system for buses wherein a
`sequence of bus stop information can be programmed into
`the system via radio. U.S. Pat. No. 5,016,273 discloses a
`videocassette recorder (VCR) that is equipped with a paging
`receiver to provide a number of features, including remote
`VCR programming.
`PCT published patent publication WO 90/13096 (which
`corresponds to U.S. application Ser. No. 07/338,718, filed
`Apr. 14, 1989) discloses a “very smart card”-type credit card
`that is equipped with a paging (radio) receiver, permitting
`the card to receive signals periodically reauthorizing its
`continued use. The disclosed card additionally includes a
`keyboard, microprocessor, a magnetic transducer (and/or
`external electrical contacts), and an LCD display.
`U.S. Pat. No. 4,766,746, assigned to the present assignee,
`teaches that locks and keys can be equipped with radio
`receivers to provide a secure entry system with remote
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`programming capabilities. In particular, U.S. Pat. No. 4,766,
`746 discloses a system in which radio is used to send disable
`instructions to key units and to send lockout list data or
`access codes to lock units.
`
`The present invention expands on the technology dis-
`closed in U.S. Pat. No. 4,766,746 and provides a number of
`additional features. These features will be more readily
`apparent from the following detailed description, which
`proceeds with reference to the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates a secure access system according to a
`first embodiment of the present invention.
`FIG. 2 illustrates a secure access system according to a
`second embodiment of the present invention.
`FIG. 3 illustrates a secure access system according to a
`third embodiment of the present invention.
`FIG. 4 illustrates a secure access system according to a
`fourth embodiment of the present invention.
`
`DETAILED DESCRIPTION
`
`First Embodiment
`
`Referring to FIG. 1, a first embodiment 10 of a secure
`entry system according to the present invention includes a
`lock (or other access control device) 12 having a cellular,
`paging, or other RF receiver 14 integrated therein. The lock
`may be a door lock at an industrial site, a real estate lockbox,
`or any other kind of access control device.
`A user who seeks access to the lock establishes commu-
`
`telephone, by a conventional
`nication (by a cellular
`telephone, or by some other communications link 16) to a
`clearinghouse 18. A series of voice prompts synthesized by
`a computer 20 at the clearinghouse and relayed to the user
`over the link 16 solicits the user to identify the lock 12 to
`which access is desired. (The lock is usually identified by a
`number, but in other embodiments is identified by more
`descriptive information.) The clearinghouse also requests
`the user’s Personal Identification Number (PIN number).
`This data may be provided by the user, for example, using
`a telephone’s Touch Tone pad 22.
`If the clearinghouse determines, by reference to a data-
`base 24, that the user should be authorized to access the
`identified lock, the clearinghouse causes a radio transmis-
`sion to the lock 12 to be made. The transmission, which may
`be via a system 26 such as a paging system, a cellular
`telephone system, or other RF carrier—depending on the
`type of receiver 14 with which the lock is equipped—
`authorizes an access by the user. Desirably, this authoriza-
`tion is valid only for a predetermined time period, such as 30
`minutes (the “window” period).
`The clearinghouse 18 also desirably reports back to the
`user regarding the action taken on the user’s request. In the
`preferred embodiment, the voice synthesizer reports to the
`user whether access permission is granted, as well as infor-
`mation about the window period. An exemplary report may
`be, “Your request for access authorization to lock 246 has
`been approved. Your window of authorization will end at
`3:15 pm.”
`Before terminating the communications link 16 with the
`user,
`the clearinghouse can relay any status information
`which should be provided to the user. Some of this status
`information can be lock-specific. For the case of a real estate
`lockbox system, for example, this lock-specific status infor-
`mation might include a change in price of the listed real
`
`7
`
`
`
`6,072,402
`
`3
`estate, a reminder to disable a burglar alarm, a notice that the
`owner or another real estate agent is at the house, etc. If the
`equipment with which the user has contacted the clearing-
`house is equipped with a video display, then graphical data
`specifically relating to the property can be provided from the
`clearinghouse to the user. This transmission is achieved by
`slow scan video transmission, or by such other video format
`as the bandwidth of the communications link between the
`
`user and the clearinghouse may permit.
`The clearinghouse can also relay status information to the
`user that is not lock specific. This information often relates
`to news regarding administration of the lock system.
`It will be recognized that the clearinghouse has knowl-
`edge of all accesses that it has authorized. Such data is
`desirably compiled in the database 24 at the clearinghouse
`and serves as an authorization log. However, since a user
`may request authorization to access a lock, but not actually
`do so, the authorization log is not necessarily an accurate
`indicator of actual accesses. Accordingly, an access log is
`also desirably compiled at the lock itself, as described below.
`As noted, the clearinghouse relays to the lock certain data,
`namely the fact that an user is coming, the identity of the
`user, and the time period during which the user is to be able
`to access the lock. By this arrangement, the lock needn’t be
`programmed with a list of authorized users, or even a list of
`disallowed users. Instead,
`the lock is configured to deny
`entry to everyone. The exception is the user identified by a
`radio transmission—and this user only for a predetermined
`period of time. Security is thereby enhanced.
`In the preferred embodiment, all of the locks in a system
`utilize common radio reception frequencies. Authorization
`data can be targeted to different units (or groups of units) by
`address data included in the authorization transmission. The
`
`use of addressed data packets, and a representative packet-
`based paging protocol employing such addressing, is dis-
`closed in U.S. Pat. Nos. 4,713,808 and 4,897,835. In other
`embodiments, targeting can be achieved by time division
`multiplexing (i.e. time slot protocol), wherein each receiver
`awakens in staggered brief intervals to listen for messages.
`Still further, both techniques can be used together. (The
`systems disclosed in U.S. Pat. Nos. 4,713,808 and 4,897,835
`employ both techniques.)
`locks (or
`Of course,
`in other embodiments, different
`groups of locks) can be fixedly tuned to different frequen-
`cies. Still further, a single lock receiver can be dynamically
`tuned among several frequencies in order to assure good
`signal reception. PCT publication WO 91-00676 discloses a
`suitable system of the latter type.
`the user must be
`When the user arrives at
`the door,
`identified to the lock. This can be accomplished by one of
`several identification means 28. In one, the user keys in a
`PIN number or other identifying data onto a keypad asso-
`ciated with the lock. In another, the user enters a PIN number
`or other identifying data onto a keypad of a key, and couples
`the key to the lock. In yet another,
`the user carries an
`identification tag that is remotely sensed by a proximity
`detector.
`(In some applications, heretofore limited to
`animals, it is desirable to surgically affix or implant the
`identification tag.) A variety of other physiological identi-
`fication means,
`including retinal scanners, voice print
`analyzers, and fingerprint sensors, could alternatively be
`used.
`
`In response to identification of the authorized user at the
`lock within the prescribed time period, a lock microproces-
`sor CPU 30 instructs a lock mechanism 32 to unlock. (The
`type of lock mechanism employed will obviously depend on
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`the particular application. The design of a lock mechanism
`to suit a particular application is well within the capabilities
`of one of ordinary skill in this art.) Data relating to the access
`is logged into a memory 34 (typically, but not always,
`associated with the lock) for subsequent analysis.
`Sometimes an authorized user may visit the lock 12, and
`be sensed by the lock’s identification means 28 (such as a
`proximity detector), but not actually access the secured area.
`In real estate lockbox systems, for example, this may occur
`when a visiting real estate agent and prospective buyer make
`an external inspection of the listed property and find it not
`to the buyer’s liking, prompting them to leave without
`actually gaining access to the lockbox. In an industrial site
`security system, a night watchman may check the perimeter
`of a secured building without going in.
`In such situations, it is often desirable to confirm actual
`entry of a person into the secured area, and log this fact into
`the access log memory. Often such confirmation can be
`obtained by a sensor associated 36 with the door to the
`secured area. Adoor latch, for example can be equipped with
`a sensor to indicate when the bolt is retracted. A door knob
`
`can be equipped with a capacitive sensor to sense its use. A
`real estate lockbox can be equipped with a sensor to confirm
`that the key compartment is actually opened. Such sensors
`can be implemented by those of ordinary skill in this art
`without undue experimentation.
`Other sensors 36 can be used to confirm the presence of
`a person within the secured area immediately following the
`expected entry. Such sensors are well known in the art and
`include motion detectors, door mat entry switches, break-
`beam optical sensors, etc.
`An element shared in common with all such approaches
`is that they involve participation by the user—participation
`that would not generally occur absent actual access.
`As noted, the data relayed by radio from the clearinghouse
`to the lock desirably includes data specifying a time window.
`A timer 38 in the lock (which timer can be implemented by
`circuitry or by appropriate programming of the CPU 30)
`checks that
`the access takes place within the specified
`window.
`
`(In the preferred embodiment, the time window begins at
`the time of the user/clearinghouse transaction.
`In other
`embodiments, however, it may be desireable to authorize a
`requested access well in advance, in which case the time
`window may not start for a matter of hours or days after the
`user/clearinghouse transaction.)
`In a variant of the illustrated embodiment, the clearing-
`house authorizes a particular user’s access for a variable
`time period. For example, the time period may last until 9:00
`p.m., regardless of when it begins, or it may last until
`another user is authorized to access the lock.
`
`As noted, it is conventional for secure access systems to
`record data relating to lock access. If the power supply 40
`(which may be a battery) at the lock permits, the lock can be
`equipped with a transmitter 42 to reports of lock accesses to
`a central station. (While FIG. 1 shows the transmitter and
`receiver circuits using separate antennas, it may be prefer-
`able to share a single antenna between both circuits.) In one
`such embodiment, access data is radio-forwarded in real
`time, as the accesses occurs. In another embodiment, a batch
`system is used, wherein access data accumulates in the lock
`memory 34 until a threshold number of entries is reached, at
`which time an RF transmission is made. As with other RF
`transmissions described herein, these transmissions can be
`made using a cellular telephone service, if desired.
`In other arrangements, of course, the data can be manually
`collected from the lock memory, such as by a key with
`
`8
`
`
`
`6,072,402
`
`5
`access log-reading capability. A number of such keys are
`disclosed in the electronic lock patents listed below.
`In yet other arrangements,
`the access log data is
`RF-transmitted to the clearinghouse, but programming
`instructions and authorization data are disseminated
`manually, such as by keys with programming capabilities,
`again as disclosed in the electronic lock patents listed below.
`The foregoing arrangement is particularly well suited for
`use in newly constructed houses. A lock 12 can be installed
`on the house during construction and can be used by the
`local real estate board in lieu of a keybox to admit authorized
`agents and prospective buyers. Thereafter, when the house is
`sold,
`the lock can remain on the door for use by the
`purchaser, if desired (or alternatively can be disabled). A
`purchaser might find it advantageous, for example, to let
`others admit themselves into the house, provided a record of
`such entries is maintained (which lock 12 would do). During
`this period, the purchaser would have exclusive rights to
`program the lock through the clearinghouse 18. When the
`house is later offered for sale, authorization to program the
`lock can again be extended to the local real estate board,
`again permitting the house to be shown by authorized
`agents.
`In some real estate lockbox situations, the house listed for
`sale is occupied by the present owner, who may not want
`interruptions at certain times (for example, when taking a
`bath). The preferred embodiment permits such a homeowner
`to call
`the clearinghouse and instruct, by Touch Tone
`commands, that no agents are to be authorized within a
`“privacy” period that is defined by the homeowner. Agents
`seeking authorization during the privacy period would be
`notified by the clearinghouse of the temporary inaccessibil-
`ity of the property.
`In a variant of the foregoing embodiment, the lockbox is
`equipped with a “privacy” button that can be pushed by the
`homeowner to effect an hour long privacy period. If the
`lockbox is equipped with a transmitter, this change in status
`can be relayed to the clearinghouse, which again provides
`the status information to inquiring agents.
`It will be recognized that one application of the foregoing
`radio authorized access control technology is implementa-
`tion of “Star-Trek”-type doors. Such doors are radio-
`programmed periodically with the identities of persons
`permitted to pass therethrough. A proximity sensor on one
`side of the door senses the identity of an approaching user,
`checks the door lock’s memory 34, and opens the door if the
`user is found to be authorized. A second sensor is desirably
`used on the opposite side of the door. This sensor confirms
`the passage of the person through the door, and can also
`sense the approach of persons from the other direction.
`Together, the two sensors provide redundant data confirming
`whether a person is entering or leaving the secured area.
`The door’s memory can be reprogrammed with updated
`authorization data daily, or at such other interval as may be
`appropriate. Auser’s authorization can remain valid until the
`lock is next radio-reprogrammed, at which time the user
`must be reauthorized if the user’s access rights are to
`continue.
`
`In the preferred form of the foregoing embodiment 10, the
`system is not limited to authorizing just a single key for a
`given lock at any given time. Instead,
`the system can
`authorize a plurality of keys for a given lock, either all for
`the same time window or for overlapping time windows.
`Second Embodiment
`FIG. 2 shows a second embodiment 44 of the invention
`
`which is similar to that shown in FIG. 1, except that the unit
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`with the RF communications capability is the key 46 rather
`than the lock 12‘. Thus, when a user’s request to access a
`particular lock 12‘ is verified by the clearinghouse 18‘, an
`authorizing (also known as enabling) signal is sent by radio
`to that user’s key 46. Data defining a time window is also
`desirably sent and limits the time period within which the
`key is effective. The enabling data enables the key only to
`access the lock requested through the clearinghouse.
`In this embodiment, a simpler lock 12‘ can be used—one
`that responds to any key (provided, of course, that the key
`has first received an enabling signal). System maintenance is
`thereby facilitated, since keys requiring maintenance can be
`more readily be transported to a maintenance facility than
`can locks.
`
`Although the interface between the key and lock is not
`particularly detailed in FIG. 2, a number of known interfac-
`ing techniques can be used. These techniques include opto-
`electronic coupling (such as disclosed in U.S. Pat. No.
`4,727,368 and others), RF coupling (such as disclosed in
`U.S. Pat. No. 4,851,652 and others),
`inductive coupling
`(such as disclosed in U.S. Pat. No. 4,766,746 and others),
`and direct electrical coupling (such as disclosed in U.S. Pat.
`No. 4,594,637 and others).
`In variations of this embodiment 44, of course, the lock
`can be quite sophisticated and can employ many or all of the
`features disclosed herein and in the patents cited below.
`Since the lock 12‘ in this second embodiment needn’t
`
`have its own power source (i.e. to power a receiver), the lock
`can be powered from the key. Illustrative techniques for
`powering a lock from a key are disclosed in U.S. Pat. Nos.
`4,594,637, 4,851,652, and in copending applications Ser.
`Nos. 07/740,424 and 07/790,642.
`Desirably, this second embodiment 44 includes provision
`for compiling an access log—preferably in addition to the
`authorization log maintained by the clearinghouse 18‘. In
`one form of the invention, such a log is maintained in a
`memory 48 in the key 46. Key-based access log systems are
`disclosed, by way of example, in U.S. Pat. No. 4,916,443
`and in copending applications Ser. Nos. 07/740,424 and
`07/790,642. Means for assuring that access log data is
`dumped periodically from the key memories are also dis-
`closed in these cited references.
`
`Again, if the key power supply 40‘ permits, the key can be
`provided with a transmitter 42‘ to relay access log data to a
`central station, either in real time or in batch fashion. In one
`form of the invention, the key uses rechargeable batteries
`and is connected to a recharger periodically. When the key
`is so connected, the radio transmission from the key takes
`place—taking advantage of the additional power available
`from the recharger’s power supply. If desired,
`the radio
`transmission circuitry and antenna can form a part of the
`recharger unit, with the data being transferred thereto over
`the same contacts that provide recharging power to the key.
`In another form of this embodiment, an access log can be
`maintained in a memory in the lock. Access log data stored
`in such a lock memory can be uploaded to a key using
`technology such as disclosed in U.S. Pat. Nos. 4,766,746,
`4,800,255, and in copending applications Ser. Nos. 07/740,
`424 and 7/790,642. A self-building database system, like
`that disclosed in U.S. Pat. No. 4,916,443, can also be
`advantageously incorporated in such an embodiment.
`Once access data has been uploaded from the lock
`memory to the key, it can be relayed to a central database in
`a variety of ways, such as acoustic data transmission, wired
`data transmission, etc., as disclosed in the just-noted patent
`references, as well as by the above-described radio tech-
`nique.
`
`9
`
`
`
`6,072,402
`
`7
`If desired, rather than enabling keys on an as-needed
`basis, the clearinghouse can make a daily (or hourly, etc.)
`transmission authorizing, for another day (or hour, etc.), all
`keys in the system whose users are in good standing with the
`system proprietor. If the authorization is valid only for an
`hour, the clearinghouse can effect a lockout from all locks
`between the hours of, say 9:00 p.m.
`to 6:00 a.m. by
`discontinuing the authorization transmissions between 8:00
`p.m. and 6:00 a.m.
`In embodiments employing paging transmissions to com-
`municate with keys, a key can be equipped with a signalling
`means 47 (such as a beeper, vibrator, and/or alphanumeric
`display) so that
`it can also serve a conventional pager
`function, in addition to serving as a key.
`Third Embodiment
`
`Athird embodiment 50 according to the present invention
`is shown in FIG. 3 and utilizes a cellular telephone 52 as the
`identification device.
`
`In this embodiment, a user operates the cellular telephone
`52 to call the clearinghouse 54 and request access to a
`particular lock 56. After suitable verification (by a PIN
`number or the like), the clearinghouse transmits an RF signal
`to the identified lock and causes it to briefly make itself
`susceptible to being unlocked (such as for 30 seconds).
`Within this interval, the user must perform some manual
`operation (such as pushing on a door) to complete the
`unlocking operation. If the manual operation is not com-
`pleted within the allotted period, the lock resecures itself.
`In a variation of this embodiment, the clearinghouse does
`not make an authorization transmission to the lock. Instead,
`it RF-transmits authorization data back to the cellular tele-
`
`phone in the form of audio tones. The user acoustically
`couples the telephone to the lock to transfer these tones to
`the lock to thereby authorize the requested access.
`In a further variation of this embodiment,
`the cellular
`telephone 52 does not transmit to the clearinghouse. Rather,
`its transmitted RF signal is received by the lock 56 itself, and
`the user operates the buttons on the telephone as he would
`buttons on a key card to gain access to the secured area.
`In one such embodiment, the lock transmits a verification
`request to the clearinghouse after receiving the direct RF
`request but prior to permitting the requested access. In a
`second such embodiment, the lock checks whether the user
`identified by the button operations is on a list of authorized
`users (or on a list of locked out users) maintained in a lock
`memory 58. In a third embodiment, the lock simply permits
`access without any verification checks.
`By all of these embodiments 50, the user needn’t carry an
`access card or similar device. Instead, the user relies exclu-
`sively on a cellular telephone. This aspect of this invention
`is believed to have particular promise in view of the growing
`ubiquity of cellular telephones, especially in professions
`such as real estate.
`
`While the foregoing description of the third embodiment
`has focused on the use of a cellular radio transmission to
`
`transmit access-related data to a lock, it will be recognized
`that a variety of other data can likewise be transmitted. For
`example, an authorized user can issue instructions through a
`cellular telephone causing the lock’s operating characteris-
`tics to be reprogrammed. In U.S. Pat. No. 4,766,746, and in
`copending application Ser. Nos. 07/740,424 and 07/790,642,
`for example, locks are disclosed that include a memory in
`which “characterization data” is stored. Any of the data in
`such a characterization memory (such as data determining
`daily disable times, timing constants, function enables, etc.)
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`can be altered by suitable instructions issued by a user and
`received by the lock via a radio transmission.
`
`Fourth Embodiment
`
`A fourth embodiment 60 according to the present inven-
`tion is shown in FIG. 4 and is described, by way of example,
`in the context of an access control device for a delivery truck
`62.
`
`Delivery trucks are opened several times during a single
`run, raising inventory control issues. In accordance with this
`embodiment of the invention, a delivery truck is equipped
`with an electronic access control device 64 that guards
`against unauthorized opening.
`In the illustrated embodiment, the delivery company calls
`a clearinghouse 66 and identifies the sequence of deliveries
`the truck is to make. Each possible destination is assigned an
`identification number, and the desired sequence is pro-
`grammed by entering (using a Touch Tone pad or the like)
`the numbers corresponding to the scheduled deliveries in
`their proper order. After suitable verification checks,
`the
`clearinghouse transmits to the targeted truck access control
`device 64 the authorized schedule of stops, which data is
`received and stored in a memory 68.
`When the truck arrives at its first delivery stop, the truck
`access control device 64 senses this fact by detecting an
`identification device 70 maintained at that location. The
`
`identification device may be a proximity card mounted at the
`loading dock, or may be an electronic key carried by a
`manager employed at the first delivery stop. If the detected
`identification device corresponds to the first expected stop
`that had earlier been programmed, the truck access control
`device unlocks, permitting access to the truck’s contents. A
`record of this access is logged in the access control device
`memory 68, providing data as to the time of the access and
`the location and/or identity of the accessing party.
`When the truck thereafter goes to its second stop, this
`process is repeated.
`If the truck visits an unauthorized location, the access
`control device will sense either the absence of an identifi-
`cation device, or will sense an identification device that does
`not correspond to an authorized stop. In either case, the
`access control device will block access to the truck’s con-
`tents.
`
`Although the access control device 64 is not particularly
`detailed in FIG. 4, it can take the same form as lock 12 of
`FIG. 1 (but with a lock mechanism adapted to secure the
`doors of a delivery truck).
`In the above-described first form 10 of the invention, a
`limited period of authorization (a “time window”) is some-
`times employed as an additional safeguard against unautho-
`rized accesses. Time windows can be employed in the FIG.
`4 form of the invention. However, due to foreseeably
`unpredictable delays in completing scheduled delivery runs,
`a different additional safeguard is more commonly used.
`That safeguard is to require that the truck make its scheduled
`deliveries in the order they are scheduled. If a delivery stop
`is made out of the programmed sequence, the access control
`device 64 will refuse to open.
`The route sequence can be modified at any time by new
`transmissions from the clearinghouse. Thus,
`if circum-
`stances make it impossible to complete the deliveries in the
`order scheduled, the driver can call the delivery company
`and ask that the schedule be suitably revised. The company
`can then call the clearinghouse and cause the access control
`device to be reprogrammed accordingly.
`
`10
`
`10
`
`
`
`6,072,402
`
`9
`In a preferred form of this embodiment, the truck security
`system is integrated with a satellite vehicle locator system,
`which may be of the sort disclosed in U.S. Pat. Nos.
`4,897,661, 4,897,642, 4,359,733 or 4,239,447.
`In another preferred form of this embodiment, the lock
`device transmits data back to a central station identifying the
`identification devices as it encounters them. By this
`arrangement, the truck can be tracked through its route.
`While the above-described form of the fourth embodi-
`
`ment provides the radio-equipped (and radio-
`programmable) lock on the truck, and radio-less identifica-
`tion devices at the various delivery stops, in other forms of
`this embodiment these elements can be transposed. That is,
`a radio-less lock on the truck can cooperate with radio-
`reprogrammable identification devices at the various deliv-
`ery stops to open the truck lock if the radio-reprogrammable
`identification devices have been suitably programmed.
`General Considerations
`
`In high security applications of the foregoing
`embodiments, the access control device can be configured to
`require the presence of two (or more) authorized users
`before permitting access to the secured area. If two different
`authorized users are not detected within a given period (such
`as 60 seconds),
`the lock will refuse to unlock. Another
`high-security variation requires a specific sequence of users.
`That is, a system can require that a predetermined user
`accesses the lock before any other users gain access. This is
`useful, for example, when a manufacturing facility desires
`that a manager be present in a given area before any other
`employees are admitted.
`A related variant is to require the presence of multiple
`users at multiple locations within some window of simul-
`taneity (such 5 seconds). This is useful, for example, in the
`start-up of very large machinery (such as a newspaper
`printing plant) which may require the presence of monitor-
`ing personnel at a variety of locations at a given time. Radio
`transmissions can be employed to confirm the presence of
`such persons at their respective stations at the moment of
`startup. If such persons are not detected, the machinery is
`locked from operating.
`In yet other high security applications, it is desirable to
`RF-preauthorize not just
`the key or the access control
`device, but rather to RF-preauthorize both.
`Many applications presently served by other security
`mechanisms can be more advantageously served by a secure
`entry system a