throbber
VWGoA - Ex. 1002
`Volkswagen Group of America, Inc., Petitioner
`
`1
`
`

`
`6,072,402
`Page 2
`
`US. PATENT DOCUMENTS
`
`5,124,696
`
`6/1992 Bosley .
`
`4,962,522 10/1990 Marian .................................. .. 379/105
`5,014,049
`5/1991 Bosley ............................... 340/825.31
`5,016,273
`5/1991 Hoff ........................................ .. 380/10
`
`5,020,135
`5/1991 Kasparian etal.
`455/76
`5,113,427
`5/1992 Ryoichietal.
`.................. .. 340/825.44
`
`5252965 10/1993 G‘dw‘““°”1"
`59478995
`12/1995 W9“°‘5‘°‘f°‘ 9‘ 91~~
`5519491
`4/1997 L9mbf°P°“19S 9‘ 91~~
`5,650,774
`7/1997 Drori.
`5,717,387
`2/1998 suman eta1..
`
`2
`
`

`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 1 of4
`
`204,270,6
`
`o_v_oO._E
` E2
`L7K
`91%.
`g—V
`
`E
`
`E30;
`
`
`
`mz<m_s__2m_z<:om_s_
`
`mm
`
`mm
`
`\m
`
`om
`
`E
`
`2
`
`2.
`
`zo_mm_s_mz<E
`
`sm:m>m
`
`mm:o:oz_m<m:o
`
`mmS%,_oo
`
`I‘
`
`2
`
`mm
`
`_U_H=H_
`
`_H__UU
`
`H=H=U
`
`DUB
`
`3
`
`
`
`
`
`
`

`
`U.S. Patent
`
`0
`
`4
`
`6,072,402
`
`
`
`m.,wo<#m:z_Znaam
`
`s_Em>m6.mm=son_mo<n_>mv_zo_mm_s_mz<E
`
`0oz:<zo_mmm:o:oz_m<m:o
`
`mz<m2
`
`
`pmEDUB
`
`2m_o<uEEz_0mmm%w.DUB%u9.ESn_s_oo
`
`xoo4
`
`2@z<:om2
`
`xoo4
`
`NF
`
`av
`
`4
`
`
`
`
`

`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 3 of4
`
`6,072,402
`
`2m_z<:oms_
`>#_n5m
`
`X004
`
`meson
`
`E
`
`zo_mm_s_wz<E
`
`s_m:m>m
`
`Em_m:o_._oz_m<m:o
`
`5
`
`
`
`

`
`U.S. Patent
`
`Jun. 6,2000
`
`Sheet 4 of4
`
`6,072,402
`
`FIG. 4
`
`62
`
`64
`
`-DEVICE
`60»
`
`O O
`
`D
`
`O
`
` RF
`TRANSMISSION
`SYSTEM
`
`
`
`CLEARINGHOUSE
`
`COMPUTER
`
`
`
`66
`
`6
`
`

`
`6,072,402
`
`1
`SECURE ENTRY SYSTEM WITH RADIO
`COMMUNICATIONS
`
`FIELD OF THE INVENTION
`
`The present invention relates to secure entry systems, and
`more particularly relates to the use of radio in such systems.
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`In the century since radio science was developed, radio
`signal transmission has found myriad applications. Some
`have been in the field of electronic security systems.
`A familiar example is a garage door opener. A radio
`transmitter is used to relay instruction signals to a receiver
`unit, causing the receiver unit to activate a door opening
`mechanism.
`
`More sophisticated access control devices operate in
`conjunction with a personal access card that
`includes a
`battery, a microprocessor, a receiver and a transmitter. The
`access control device periodically broadcasts an interroga-
`tion signal, which the card receives when it is brought into
`close proximity thereto. In response, the card transmits an
`RF reply signal to the access control device, authorizing
`access to the secured area. French patent publication 2,604,
`808 and European patent publication EP 393,784 are illus-
`trative of such systems.
`Radio data transmission is sometimes used in home
`
`security systems to relay data from motion, continuity,
`vibration or other detectors to a central monitoring unit.
`Radio frequency energy is sometimes used to convey
`operating power to an otherwise unpowered unit. U.S. Pat.
`No. 4,851,652, for example, illustrates a secure entry system
`in which a passive lock unit is powered from RF energy
`radiated from an associated key card. The lock also receives
`data from the key by modulation of the same RF energy.
`French patent publication 2,542,792 shows such a system in
`which a passive key is powered by an RF signal that is
`coupled to it by an associated lock.
`Radio is sometimes used outside the secure entry field to
`relay reprogramming instructions to remote units. U.S. Pat.
`Nos. 4,525,865 and 4,910,510, for example, disclose pagers
`and other radios whose operational characteristics can be
`reprogrammed remotely by radio. U.S. Pat. 5,020,135 dis-
`closes such a system that also features remote memory
`dumps and diagnostics from radio transceivers using radio
`signals. U.S. Pat. Nos. 4,543,955 and 4,958,632 disclose
`cardiac pacemakers and other implantable devices that can
`be reprogrammed via use of radio. U.S. Pat. No. 4,713,661
`discloses an annunciator system for buses wherein a
`sequence of bus stop information can be programmed into
`the system via radio. U.S. Pat. No. 5,016,273 discloses a
`videocassette recorder (VCR) that is equipped with a paging
`receiver to provide a number of features, including remote
`VCR programming.
`PCT published patent publication WO 90/13096 (which
`corresponds to U.S. application Ser. No. 07/338,718, filed
`Apr. 14, 1989) discloses a “very smart card”-type credit card
`that is equipped with a paging (radio) receiver, permitting
`the card to receive signals periodically reauthorizing its
`continued use. The disclosed card additionally includes a
`keyboard, microprocessor, a magnetic transducer (and/or
`external electrical contacts), and an LCD display.
`U.S. Pat. No. 4,766,746, assigned to the present assignee,
`teaches that locks and keys can be equipped with radio
`receivers to provide a secure entry system with remote
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`programming capabilities. In particular, U.S. Pat. No. 4,766,
`746 discloses a system in which radio is used to send disable
`instructions to key units and to send lockout list data or
`access codes to lock units.
`
`The present invention expands on the technology dis-
`closed in U.S. Pat. No. 4,766,746 and provides a number of
`additional features. These features will be more readily
`apparent from the following detailed description, which
`proceeds with reference to the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates a secure access system according to a
`first embodiment of the present invention.
`FIG. 2 illustrates a secure access system according to a
`second embodiment of the present invention.
`FIG. 3 illustrates a secure access system according to a
`third embodiment of the present invention.
`FIG. 4 illustrates a secure access system according to a
`fourth embodiment of the present invention.
`
`DETAILED DESCRIPTION
`
`First Embodiment
`
`Referring to FIG. 1, a first embodiment 10 of a secure
`entry system according to the present invention includes a
`lock (or other access control device) 12 having a cellular,
`paging, or other RF receiver 14 integrated therein. The lock
`may be a door lock at an industrial site, a real estate lockbox,
`or any other kind of access control device.
`A user who seeks access to the lock establishes commu-
`
`telephone, by a conventional
`nication (by a cellular
`telephone, or by some other communications link 16) to a
`clearinghouse 18. A series of voice prompts synthesized by
`a computer 20 at the clearinghouse and relayed to the user
`over the link 16 solicits the user to identify the lock 12 to
`which access is desired. (The lock is usually identified by a
`number, but in other embodiments is identified by more
`descriptive information.) The clearinghouse also requests
`the user’s Personal Identification Number (PIN number).
`This data may be provided by the user, for example, using
`a telephone’s Touch Tone pad 22.
`If the clearinghouse determines, by reference to a data-
`base 24, that the user should be authorized to access the
`identified lock, the clearinghouse causes a radio transmis-
`sion to the lock 12 to be made. The transmission, which may
`be via a system 26 such as a paging system, a cellular
`telephone system, or other RF carrier—depending on the
`type of receiver 14 with which the lock is equipped—
`authorizes an access by the user. Desirably, this authoriza-
`tion is valid only for a predetermined time period, such as 30
`minutes (the “window” period).
`The clearinghouse 18 also desirably reports back to the
`user regarding the action taken on the user’s request. In the
`preferred embodiment, the voice synthesizer reports to the
`user whether access permission is granted, as well as infor-
`mation about the window period. An exemplary report may
`be, “Your request for access authorization to lock 246 has
`been approved. Your window of authorization will end at
`3:15 pm.”
`Before terminating the communications link 16 with the
`user,
`the clearinghouse can relay any status information
`which should be provided to the user. Some of this status
`information can be lock-specific. For the case of a real estate
`lockbox system, for example, this lock-specific status infor-
`mation might include a change in price of the listed real
`
`7
`
`

`
`6,072,402
`
`3
`estate, a reminder to disable a burglar alarm, a notice that the
`owner or another real estate agent is at the house, etc. If the
`equipment with which the user has contacted the clearing-
`house is equipped with a video display, then graphical data
`specifically relating to the property can be provided from the
`clearinghouse to the user. This transmission is achieved by
`slow scan video transmission, or by such other video format
`as the bandwidth of the communications link between the
`
`user and the clearinghouse may permit.
`The clearinghouse can also relay status information to the
`user that is not lock specific. This information often relates
`to news regarding administration of the lock system.
`It will be recognized that the clearinghouse has knowl-
`edge of all accesses that it has authorized. Such data is
`desirably compiled in the database 24 at the clearinghouse
`and serves as an authorization log. However, since a user
`may request authorization to access a lock, but not actually
`do so, the authorization log is not necessarily an accurate
`indicator of actual accesses. Accordingly, an access log is
`also desirably compiled at the lock itself, as described below.
`As noted, the clearinghouse relays to the lock certain data,
`namely the fact that an user is coming, the identity of the
`user, and the time period during which the user is to be able
`to access the lock. By this arrangement, the lock needn’t be
`programmed with a list of authorized users, or even a list of
`disallowed users. Instead,
`the lock is configured to deny
`entry to everyone. The exception is the user identified by a
`radio transmission—and this user only for a predetermined
`period of time. Security is thereby enhanced.
`In the preferred embodiment, all of the locks in a system
`utilize common radio reception frequencies. Authorization
`data can be targeted to different units (or groups of units) by
`address data included in the authorization transmission. The
`
`use of addressed data packets, and a representative packet-
`based paging protocol employing such addressing, is dis-
`closed in U.S. Pat. Nos. 4,713,808 and 4,897,835. In other
`embodiments, targeting can be achieved by time division
`multiplexing (i.e. time slot protocol), wherein each receiver
`awakens in staggered brief intervals to listen for messages.
`Still further, both techniques can be used together. (The
`systems disclosed in U.S. Pat. Nos. 4,713,808 and 4,897,835
`employ both techniques.)
`locks (or
`Of course,
`in other embodiments, different
`groups of locks) can be fixedly tuned to different frequen-
`cies. Still further, a single lock receiver can be dynamically
`tuned among several frequencies in order to assure good
`signal reception. PCT publication WO 91-00676 discloses a
`suitable system of the latter type.
`the user must be
`When the user arrives at
`the door,
`identified to the lock. This can be accomplished by one of
`several identification means 28. In one, the user keys in a
`PIN number or other identifying data onto a keypad asso-
`ciated with the lock. In another, the user enters a PIN number
`or other identifying data onto a keypad of a key, and couples
`the key to the lock. In yet another,
`the user carries an
`identification tag that is remotely sensed by a proximity
`detector.
`(In some applications, heretofore limited to
`animals, it is desirable to surgically affix or implant the
`identification tag.) A variety of other physiological identi-
`fication means,
`including retinal scanners, voice print
`analyzers, and fingerprint sensors, could alternatively be
`used.
`
`In response to identification of the authorized user at the
`lock within the prescribed time period, a lock microproces-
`sor CPU 30 instructs a lock mechanism 32 to unlock. (The
`type of lock mechanism employed will obviously depend on
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`the particular application. The design of a lock mechanism
`to suit a particular application is well within the capabilities
`of one of ordinary skill in this art.) Data relating to the access
`is logged into a memory 34 (typically, but not always,
`associated with the lock) for subsequent analysis.
`Sometimes an authorized user may visit the lock 12, and
`be sensed by the lock’s identification means 28 (such as a
`proximity detector), but not actually access the secured area.
`In real estate lockbox systems, for example, this may occur
`when a visiting real estate agent and prospective buyer make
`an external inspection of the listed property and find it not
`to the buyer’s liking, prompting them to leave without
`actually gaining access to the lockbox. In an industrial site
`security system, a night watchman may check the perimeter
`of a secured building without going in.
`In such situations, it is often desirable to confirm actual
`entry of a person into the secured area, and log this fact into
`the access log memory. Often such confirmation can be
`obtained by a sensor associated 36 with the door to the
`secured area. Adoor latch, for example can be equipped with
`a sensor to indicate when the bolt is retracted. A door knob
`
`can be equipped with a capacitive sensor to sense its use. A
`real estate lockbox can be equipped with a sensor to confirm
`that the key compartment is actually opened. Such sensors
`can be implemented by those of ordinary skill in this art
`without undue experimentation.
`Other sensors 36 can be used to confirm the presence of
`a person within the secured area immediately following the
`expected entry. Such sensors are well known in the art and
`include motion detectors, door mat entry switches, break-
`beam optical sensors, etc.
`An element shared in common with all such approaches
`is that they involve participation by the user—participation
`that would not generally occur absent actual access.
`As noted, the data relayed by radio from the clearinghouse
`to the lock desirably includes data specifying a time window.
`A timer 38 in the lock (which timer can be implemented by
`circuitry or by appropriate programming of the CPU 30)
`checks that
`the access takes place within the specified
`window.
`
`(In the preferred embodiment, the time window begins at
`the time of the user/clearinghouse transaction.
`In other
`embodiments, however, it may be desireable to authorize a
`requested access well in advance, in which case the time
`window may not start for a matter of hours or days after the
`user/clearinghouse transaction.)
`In a variant of the illustrated embodiment, the clearing-
`house authorizes a particular user’s access for a variable
`time period. For example, the time period may last until 9:00
`p.m., regardless of when it begins, or it may last until
`another user is authorized to access the lock.
`
`As noted, it is conventional for secure access systems to
`record data relating to lock access. If the power supply 40
`(which may be a battery) at the lock permits, the lock can be
`equipped with a transmitter 42 to reports of lock accesses to
`a central station. (While FIG. 1 shows the transmitter and
`receiver circuits using separate antennas, it may be prefer-
`able to share a single antenna between both circuits.) In one
`such embodiment, access data is radio-forwarded in real
`time, as the accesses occurs. In another embodiment, a batch
`system is used, wherein access data accumulates in the lock
`memory 34 until a threshold number of entries is reached, at
`which time an RF transmission is made. As with other RF
`transmissions described herein, these transmissions can be
`made using a cellular telephone service, if desired.
`In other arrangements, of course, the data can be manually
`collected from the lock memory, such as by a key with
`
`8
`
`

`
`6,072,402
`
`5
`access log-reading capability. A number of such keys are
`disclosed in the electronic lock patents listed below.
`In yet other arrangements,
`the access log data is
`RF-transmitted to the clearinghouse, but programming
`instructions and authorization data are disseminated
`manually, such as by keys with programming capabilities,
`again as disclosed in the electronic lock patents listed below.
`The foregoing arrangement is particularly well suited for
`use in newly constructed houses. A lock 12 can be installed
`on the house during construction and can be used by the
`local real estate board in lieu of a keybox to admit authorized
`agents and prospective buyers. Thereafter, when the house is
`sold,
`the lock can remain on the door for use by the
`purchaser, if desired (or alternatively can be disabled). A
`purchaser might find it advantageous, for example, to let
`others admit themselves into the house, provided a record of
`such entries is maintained (which lock 12 would do). During
`this period, the purchaser would have exclusive rights to
`program the lock through the clearinghouse 18. When the
`house is later offered for sale, authorization to program the
`lock can again be extended to the local real estate board,
`again permitting the house to be shown by authorized
`agents.
`In some real estate lockbox situations, the house listed for
`sale is occupied by the present owner, who may not want
`interruptions at certain times (for example, when taking a
`bath). The preferred embodiment permits such a homeowner
`to call
`the clearinghouse and instruct, by Touch Tone
`commands, that no agents are to be authorized within a
`“privacy” period that is defined by the homeowner. Agents
`seeking authorization during the privacy period would be
`notified by the clearinghouse of the temporary inaccessibil-
`ity of the property.
`In a variant of the foregoing embodiment, the lockbox is
`equipped with a “privacy” button that can be pushed by the
`homeowner to effect an hour long privacy period. If the
`lockbox is equipped with a transmitter, this change in status
`can be relayed to the clearinghouse, which again provides
`the status information to inquiring agents.
`It will be recognized that one application of the foregoing
`radio authorized access control technology is implementa-
`tion of “Star-Trek”-type doors. Such doors are radio-
`programmed periodically with the identities of persons
`permitted to pass therethrough. A proximity sensor on one
`side of the door senses the identity of an approaching user,
`checks the door lock’s memory 34, and opens the door if the
`user is found to be authorized. A second sensor is desirably
`used on the opposite side of the door. This sensor confirms
`the passage of the person through the door, and can also
`sense the approach of persons from the other direction.
`Together, the two sensors provide redundant data confirming
`whether a person is entering or leaving the secured area.
`The door’s memory can be reprogrammed with updated
`authorization data daily, or at such other interval as may be
`appropriate. Auser’s authorization can remain valid until the
`lock is next radio-reprogrammed, at which time the user
`must be reauthorized if the user’s access rights are to
`continue.
`
`In the preferred form of the foregoing embodiment 10, the
`system is not limited to authorizing just a single key for a
`given lock at any given time. Instead,
`the system can
`authorize a plurality of keys for a given lock, either all for
`the same time window or for overlapping time windows.
`Second Embodiment
`FIG. 2 shows a second embodiment 44 of the invention
`
`which is similar to that shown in FIG. 1, except that the unit
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`with the RF communications capability is the key 46 rather
`than the lock 12‘. Thus, when a user’s request to access a
`particular lock 12‘ is verified by the clearinghouse 18‘, an
`authorizing (also known as enabling) signal is sent by radio
`to that user’s key 46. Data defining a time window is also
`desirably sent and limits the time period within which the
`key is effective. The enabling data enables the key only to
`access the lock requested through the clearinghouse.
`In this embodiment, a simpler lock 12‘ can be used—one
`that responds to any key (provided, of course, that the key
`has first received an enabling signal). System maintenance is
`thereby facilitated, since keys requiring maintenance can be
`more readily be transported to a maintenance facility than
`can locks.
`
`Although the interface between the key and lock is not
`particularly detailed in FIG. 2, a number of known interfac-
`ing techniques can be used. These techniques include opto-
`electronic coupling (such as disclosed in U.S. Pat. No.
`4,727,368 and others), RF coupling (such as disclosed in
`U.S. Pat. No. 4,851,652 and others),
`inductive coupling
`(such as disclosed in U.S. Pat. No. 4,766,746 and others),
`and direct electrical coupling (such as disclosed in U.S. Pat.
`No. 4,594,637 and others).
`In variations of this embodiment 44, of course, the lock
`can be quite sophisticated and can employ many or all of the
`features disclosed herein and in the patents cited below.
`Since the lock 12‘ in this second embodiment needn’t
`
`have its own power source (i.e. to power a receiver), the lock
`can be powered from the key. Illustrative techniques for
`powering a lock from a key are disclosed in U.S. Pat. Nos.
`4,594,637, 4,851,652, and in copending applications Ser.
`Nos. 07/740,424 and 07/790,642.
`Desirably, this second embodiment 44 includes provision
`for compiling an access log—preferably in addition to the
`authorization log maintained by the clearinghouse 18‘. In
`one form of the invention, such a log is maintained in a
`memory 48 in the key 46. Key-based access log systems are
`disclosed, by way of example, in U.S. Pat. No. 4,916,443
`and in copending applications Ser. Nos. 07/740,424 and
`07/790,642. Means for assuring that access log data is
`dumped periodically from the key memories are also dis-
`closed in these cited references.
`
`Again, if the key power supply 40‘ permits, the key can be
`provided with a transmitter 42‘ to relay access log data to a
`central station, either in real time or in batch fashion. In one
`form of the invention, the key uses rechargeable batteries
`and is connected to a recharger periodically. When the key
`is so connected, the radio transmission from the key takes
`place—taking advantage of the additional power available
`from the recharger’s power supply. If desired,
`the radio
`transmission circuitry and antenna can form a part of the
`recharger unit, with the data being transferred thereto over
`the same contacts that provide recharging power to the key.
`In another form of this embodiment, an access log can be
`maintained in a memory in the lock. Access log data stored
`in such a lock memory can be uploaded to a key using
`technology such as disclosed in U.S. Pat. Nos. 4,766,746,
`4,800,255, and in copending applications Ser. Nos. 07/740,
`424 and 7/790,642. A self-building database system, like
`that disclosed in U.S. Pat. No. 4,916,443, can also be
`advantageously incorporated in such an embodiment.
`Once access data has been uploaded from the lock
`memory to the key, it can be relayed to a central database in
`a variety of ways, such as acoustic data transmission, wired
`data transmission, etc., as disclosed in the just-noted patent
`references, as well as by the above-described radio tech-
`nique.
`
`9
`
`

`
`6,072,402
`
`7
`If desired, rather than enabling keys on an as-needed
`basis, the clearinghouse can make a daily (or hourly, etc.)
`transmission authorizing, for another day (or hour, etc.), all
`keys in the system whose users are in good standing with the
`system proprietor. If the authorization is valid only for an
`hour, the clearinghouse can effect a lockout from all locks
`between the hours of, say 9:00 p.m.
`to 6:00 a.m. by
`discontinuing the authorization transmissions between 8:00
`p.m. and 6:00 a.m.
`In embodiments employing paging transmissions to com-
`municate with keys, a key can be equipped with a signalling
`means 47 (such as a beeper, vibrator, and/or alphanumeric
`display) so that
`it can also serve a conventional pager
`function, in addition to serving as a key.
`Third Embodiment
`
`Athird embodiment 50 according to the present invention
`is shown in FIG. 3 and utilizes a cellular telephone 52 as the
`identification device.
`
`In this embodiment, a user operates the cellular telephone
`52 to call the clearinghouse 54 and request access to a
`particular lock 56. After suitable verification (by a PIN
`number or the like), the clearinghouse transmits an RF signal
`to the identified lock and causes it to briefly make itself
`susceptible to being unlocked (such as for 30 seconds).
`Within this interval, the user must perform some manual
`operation (such as pushing on a door) to complete the
`unlocking operation. If the manual operation is not com-
`pleted within the allotted period, the lock resecures itself.
`In a variation of this embodiment, the clearinghouse does
`not make an authorization transmission to the lock. Instead,
`it RF-transmits authorization data back to the cellular tele-
`
`phone in the form of audio tones. The user acoustically
`couples the telephone to the lock to transfer these tones to
`the lock to thereby authorize the requested access.
`In a further variation of this embodiment,
`the cellular
`telephone 52 does not transmit to the clearinghouse. Rather,
`its transmitted RF signal is received by the lock 56 itself, and
`the user operates the buttons on the telephone as he would
`buttons on a key card to gain access to the secured area.
`In one such embodiment, the lock transmits a verification
`request to the clearinghouse after receiving the direct RF
`request but prior to permitting the requested access. In a
`second such embodiment, the lock checks whether the user
`identified by the button operations is on a list of authorized
`users (or on a list of locked out users) maintained in a lock
`memory 58. In a third embodiment, the lock simply permits
`access without any verification checks.
`By all of these embodiments 50, the user needn’t carry an
`access card or similar device. Instead, the user relies exclu-
`sively on a cellular telephone. This aspect of this invention
`is believed to have particular promise in view of the growing
`ubiquity of cellular telephones, especially in professions
`such as real estate.
`
`While the foregoing description of the third embodiment
`has focused on the use of a cellular radio transmission to
`
`transmit access-related data to a lock, it will be recognized
`that a variety of other data can likewise be transmitted. For
`example, an authorized user can issue instructions through a
`cellular telephone causing the lock’s operating characteris-
`tics to be reprogrammed. In U.S. Pat. No. 4,766,746, and in
`copending application Ser. Nos. 07/740,424 and 07/790,642,
`for example, locks are disclosed that include a memory in
`which “characterization data” is stored. Any of the data in
`such a characterization memory (such as data determining
`daily disable times, timing constants, function enables, etc.)
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`can be altered by suitable instructions issued by a user and
`received by the lock via a radio transmission.
`
`Fourth Embodiment
`
`A fourth embodiment 60 according to the present inven-
`tion is shown in FIG. 4 and is described, by way of example,
`in the context of an access control device for a delivery truck
`62.
`
`Delivery trucks are opened several times during a single
`run, raising inventory control issues. In accordance with this
`embodiment of the invention, a delivery truck is equipped
`with an electronic access control device 64 that guards
`against unauthorized opening.
`In the illustrated embodiment, the delivery company calls
`a clearinghouse 66 and identifies the sequence of deliveries
`the truck is to make. Each possible destination is assigned an
`identification number, and the desired sequence is pro-
`grammed by entering (using a Touch Tone pad or the like)
`the numbers corresponding to the scheduled deliveries in
`their proper order. After suitable verification checks,
`the
`clearinghouse transmits to the targeted truck access control
`device 64 the authorized schedule of stops, which data is
`received and stored in a memory 68.
`When the truck arrives at its first delivery stop, the truck
`access control device 64 senses this fact by detecting an
`identification device 70 maintained at that location. The
`
`identification device may be a proximity card mounted at the
`loading dock, or may be an electronic key carried by a
`manager employed at the first delivery stop. If the detected
`identification device corresponds to the first expected stop
`that had earlier been programmed, the truck access control
`device unlocks, permitting access to the truck’s contents. A
`record of this access is logged in the access control device
`memory 68, providing data as to the time of the access and
`the location and/or identity of the accessing party.
`When the truck thereafter goes to its second stop, this
`process is repeated.
`If the truck visits an unauthorized location, the access
`control device will sense either the absence of an identifi-
`cation device, or will sense an identification device that does
`not correspond to an authorized stop. In either case, the
`access control device will block access to the truck’s con-
`tents.
`
`Although the access control device 64 is not particularly
`detailed in FIG. 4, it can take the same form as lock 12 of
`FIG. 1 (but with a lock mechanism adapted to secure the
`doors of a delivery truck).
`In the above-described first form 10 of the invention, a
`limited period of authorization (a “time window”) is some-
`times employed as an additional safeguard against unautho-
`rized accesses. Time windows can be employed in the FIG.
`4 form of the invention. However, due to foreseeably
`unpredictable delays in completing scheduled delivery runs,
`a different additional safeguard is more commonly used.
`That safeguard is to require that the truck make its scheduled
`deliveries in the order they are scheduled. If a delivery stop
`is made out of the programmed sequence, the access control
`device 64 will refuse to open.
`The route sequence can be modified at any time by new
`transmissions from the clearinghouse. Thus,
`if circum-
`stances make it impossible to complete the deliveries in the
`order scheduled, the driver can call the delivery company
`and ask that the schedule be suitably revised. The company
`can then call the clearinghouse and cause the access control
`device to be reprogrammed accordingly.
`
`10
`
`10
`
`

`
`6,072,402
`
`9
`In a preferred form of this embodiment, the truck security
`system is integrated with a satellite vehicle locator system,
`which may be of the sort disclosed in U.S. Pat. Nos.
`4,897,661, 4,897,642, 4,359,733 or 4,239,447.
`In another preferred form of this embodiment, the lock
`device transmits data back to a central station identifying the
`identification devices as it encounters them. By this
`arrangement, the truck can be tracked through its route.
`While the above-described form of the fourth embodi-
`
`ment provides the radio-equipped (and radio-
`programmable) lock on the truck, and radio-less identifica-
`tion devices at the various delivery stops, in other forms of
`this embodiment these elements can be transposed. That is,
`a radio-less lock on the truck can cooperate with radio-
`reprogrammable identification devices at the various deliv-
`ery stops to open the truck lock if the radio-reprogrammable
`identification devices have been suitably programmed.
`General Considerations
`
`In high security applications of the foregoing
`embodiments, the access control device can be configured to
`require the presence of two (or more) authorized users
`before permitting access to the secured area. If two different
`authorized users are not detected within a given period (such
`as 60 seconds),
`the lock will refuse to unlock. Another
`high-security variation requires a specific sequence of users.
`That is, a system can require that a predetermined user
`accesses the lock before any other users gain access. This is
`useful, for example, when a manufacturing facility desires
`that a manager be present in a given area before any other
`employees are admitted.
`A related variant is to require the presence of multiple
`users at multiple locations within some window of simul-
`taneity (such 5 seconds). This is useful, for example, in the
`start-up of very large machinery (such as a newspaper
`printing plant) which may require the presence of monitor-
`ing personnel at a variety of locations at a given time. Radio
`transmissions can be employed to confirm the presence of
`such persons at their respective stations at the moment of
`startup. If such persons are not detected, the machinery is
`locked from operating.
`In yet other high security applications, it is desirable to
`RF-preauthorize not just
`the key or the access control
`device, but rather to RF-preauthorize both.
`Many applications presently served by other security
`mechanisms can be more advantageously served by a secure
`entry system a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket