throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/003.6825A1
`(43) Pub. Date:
`Feb. 20, 2003
`Kim
`
`US 2003.0036825A1
`
`(54) MULTIWAY CONTROL SYSTEM FOR
`KEYSET
`
`(76) Inventor: Jong-Hae Kim, Glendale, CA (US)
`Correspondence Address:
`ERK M. ARNHEM
`P.O. BOX 46696
`LOS ANGELES, CA 90046 (US)
`Appl. No.:
`10/254,944
`Filed:
`Sep. 23, 2002
`Related U.S. Application Data
`(63) Continuation of application No. PCT/KRO1/00495,
`filed on Mar. 28, 2001.
`
`(21)
`(22)
`
`Publication Classification
`
`(51) Int. Cl." ....................................................... G06F 7700
`
`(52) U.S. Cl. .................................................................. 701/1
`
`(57)
`
`ABSTRACT
`
`This invention is related to a method and a System apparatus
`for replacing the conventional key with user's personal
`digital data which users are always carrying for the multi
`way control of a vehicle for a normal driving, an abnormal
`driving, an anti-carjacking, a keyleSS ignition and a key-free
`Valet parking, as well as the multi-way control of the keySet
`of a Safe, a filing cabinet, a lockable door, and a military
`armaments according to the digital data of user's input
`without installing a costly PC network Accordingly, the
`present invention also provides a System apparatus of the
`hotel door lock System which hotel guests make their own
`digital unlocking System utilizing their own personal card or
`password for replacing the existing key So that it does not
`need any special cards nor keys to carry extra.
`
`108
`
`CSPLAY
`
`
`
`REAL AM, CLOCK
`
`106
`
`CONTROL MEANS
`
`10
`
`
`
`
`
`
`
`
`
`MICROPHONE
`
`IPR2022-00602
`Apple EX1015 Page 1
`
`

`

`Patent Application Publication Feb. 20, 2003 Sheet 1 of 2
`
`US 2003/003.6825 A1
`
`
`
`$() {
`
`7 1 !
`
`?R?????T|| || || TONI(vs ||
`
`Z || ||
`
`| 0 ||
`
`*{{{{CO3HTÄSCHOSN3S
`
`?
`
`{{NOHJOHOHWN
`
`IPR2022-00602
`Apple EX1015 Page 2
`
`

`

`Patent Application Publication Feb. 20, 2003 Sheet 2 of 2
`
`US 2003/003.6825 A1
`
`
`
`BOSNES HOOG
`
`
`
`HOSNES 1\73SXANTH]
`
`2 ( 91-J
`
`
`
`| 22
`
`IPR2022-00602
`Apple EX1015 Page 3
`
`

`

`US 2003/0036825 A1
`
`Feb. 20, 2003
`
`MULTIWAY CONTROL SYSTEM FOR KEYSET
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`0001. This application is a continuation of co-pending
`International Application No. PCT/KR01/00495, filed Mar.
`28, 2001, which designated the United States. Furthermore,
`the International Application No. PCT/KRO1/00495 is a
`continuation in part of the International Application No.
`PCT/KR98/000151, filed Jun. 10, 1998, and the U.S. Pat.
`No. 5,885,142, filed Jul. 7, 1998.
`
`BACKGROUND OF THE INVENTION
`0002) 1. Field of the Invention
`0003. The present invention relates to a method and a
`System apparatus for enabling authorized access to Secure
`areas or Systems.
`0004 2. Description of the Related Art
`0005 The prior art mechanical keyset systems, used
`Since the Roman times, are Vulnerable and may be used by
`any unauthorized perSon. This may occur if the owner of the
`keySet System loses it, or if it is copied. In addition, a
`professional Such as a lockSmith for example, can easily
`open the mechanical keySet, rendering it insecure and use
`leSS.
`0006 Prior art access systems used with conventional
`vehicle, for example, have a critical inherent shortcoming in
`that the keySets do not recognize an authorized user nor can
`they generate warning for the unauthorized use of the
`vehicle. Accordingly, anyone who has a key for example,
`can drive the vehicle without any interruption, making it
`possible to car-act the vehicle or kidnap a driver or owner
`of the vehicle after taking the key by force. More impor
`tantly, once a kidnapping occurs, and the victim is forced
`into a vehicle's enclosed compartment, Such as for example,
`the trunk of a vehicle, the conventional access System cannot
`and does not recognized this unauthorized access nor can it
`initiate possible counter measures. Further more, anyone
`with Some expertise can drive any conventional vehicle
`because they can control the conventional key very easily
`with an unauthorized key, Special instruments, or by forced
`connection of ignition circuit.
`0007 Recently developed prior art immobilizing systems
`may Solve Some of the above problems, but the Systems are
`only applicable to new pre-market vehicles from car manu
`facturers. Existing after market vehicles can not use these
`Systems. Other electronic warning devices for Vehicles uti
`lizing IF or RF signals are very easily paralyzed by discon
`nection of the power Supply circuit, and are useleSS when the
`remote controller or RF card is stolen or copied, or when the
`ignition circuit is jump started by force connection.
`0008 Conventional keyset systems for doors, safes,
`office filing cabinets, or military armaments are Vulnerable
`to an unauthorized copy or usage. With conventional acceSS
`Systems a Safe or a filing cabinet may be accessed without
`authorization, eXposing the contents therein to an unautho
`rized perSon, without the keySet System recognizing its
`unauthorized usage, compromising Security.
`0009. Therefore, conventional keyset systems such as a
`dial combination System, a keypad System or a mechanical
`
`key System are not safe. Most prior art accessing Systems
`require an expensive PC network to control various keySet
`acceSS functions, and further need a special identification
`card, which is Vulnerable to unauthorized copy or usage.
`This also places additional burden on the users to carry
`individual special ID cards for different secure systems or
`areas that require authorized access, increasing the probabil
`ity of their loss.
`0010. In addition to carrying or using conventional access
`Systems for authorized access to Secure areas or Systems,
`most individuals also carry Several different personal digital
`data Systems. These may for example be in the form of a
`bank credit card, a club membership cards, a driver license
`or an ID card
`0011. The prior art does not address the need for a simple
`and Secure authorized access System that can be used to
`acceSS Various Secure Systems or areas. Therefore, there
`remains a long Standing and continuing need for an advance
`ment in the art that can Simplify authorized access to
`different Secure Systems and areas without the burden of
`having to carry and account for the numerous authorized
`acceSS System cards, personal digital data Systems, or other
`mechanical acceSS units Such as for example keys, that an
`individual must carry to access Secure Systems or areas.
`
`SUMMARY OF THE INVENTION
`0012. The present invention seeks to provide a method
`and an apparatus that enables authorized access to a multi
`tude of different Secure areas or Systems in a variety of ways.
`0013 The present invention further seeks to provide a
`method and an apparatus that enables authorized access to a
`multitude of different Secure areas or Systems that does not
`require any Specialty accessing mediums, Such as for
`example special ID cards.
`0014. The present invention also seeks to provide a
`method and an apparatus that enables authorized access to a
`multitude of different Secure areas or Systems that can use
`any personal digital data System to authorized access to
`various Secure areas or Systems.
`0015 The present invention further seeks to provide a
`method and an apparatus that enables authorized access to a
`multitude of different Secure areas or Systems that does not
`use an expensive PC network.
`0016. These goals are accomplished by providing a sys
`tem apparatus and a method that replaces conventional
`acceSS Systems with the user's personal digital data for
`authorized access to a multitude of Secure Systems or areas.
`0017. The present invention further seeks to provide a
`method and an apparatus that enables authorized access to a
`multitude of different Secure areas or Systems by replacing
`the conventional key with a user's personal digital data. The
`Secure areas or Systems controlled in a multiway, may
`include, but are not limited to, for example, a vehicle, a
`keySet for a Safe, an office filing cabinet, and military
`armamentS.
`0018. A significant advantage of the present invention is
`that users can control access to Secure areas or Systems, Such
`as for example vehicles, with their own digital data Systems
`that can be used for anti-caracking, a keyleSS ignition
`
`IPR2022-00602
`Apple EX1015 Page 4
`
`

`

`US 2003/0036825 A1
`
`Feb. 20, 2003
`
`System, a Valet parking unit (with valid time limited pass
`word) and an overall improved anti-theft of the vehicle.
`0.019 Another advantage of the invention is that it
`enables digital keySet Systems used with hotel doors to
`authorize access to users by the use of a guests entered
`passwords or the guests own personal digital data card.
`0020. Another aspect of the percent invention is that
`users can input data into the keySet System with personal
`digital data Sources Such as for example, bank credit cards,
`a club membership card or a drive license, or with digital
`data generated by a keypad, without the need for any special
`cards or tools to be carried by an individual just for com
`munication with CPU of the keyset system.
`0021 Another aspect of the present invention is that all
`usage of the keySet is automatically Stored and logged in the
`System memory chip of the key Set System.
`0022. Yet another aspect of the present invention is that
`all control functions are done by the system's own CPU in
`order to control any unauthorized access, without any
`expensive PC network.
`0023. In keeping with the principles of the present inven
`tion, a unique access authorization Systems is provided that
`enables an authorized user to access Secure Systems or areas
`without the use of any special identification cards or
`mechanical Systems. Users may control access to Secure
`areas or Systems by a personal digital data Source, a pass
`word, or both.
`0024. These and other objects, features, aspects, and
`advantages of the invention will be apparent to those skilled
`in the art from the following detailed description of pre
`ferred non-limiting embodiments, taken together with the
`drawings and the claims that follow.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0.025. It is to be understood that the drawings are to be
`used for the purposes of illustration only and not as a
`definition of the limits of the invention.
`0.026
`Referring to the drawings in which like reference
`number present corresponding parts throughout.
`0.027
`FIG. 1 is a block diagram of multiway control
`System for keySet according to the present invention.
`0028 FIG. 2 is a block diagram of multiway control
`System for keySet of vehicle according to the present inven
`tion.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`0029. Overcoming the limitations faced from the previ
`ous technology, and based on the full comprehension and
`expectation of the current situations and to clarify the
`possible barrierS faced in the future, the present invention
`provides technologies, method and System apparatus
`enabling to replace the conventional key with the user's own
`personal digital data that users carry by a form of a bank’s
`credit card or a club membership card. A Second ID data
`generator is also provided for increased Security, conve
`nience and 3-way control for controlling CPU of the keyset
`System Such as a vehicle, a Safe, an office filing cabinet, or
`
`military armaments, according to the digital data that users
`input, eliminating the inconveniences of carrying extra Spe
`cial card or key.
`0030. In the following description of the exemplary
`embodiment, reference is made to the accompanying draw
`ings shown by way of illustration of the Specific embodi
`ment by which the invention may be practiced. It is to be
`understood that other embodiments may be utilized as
`Structural changes may be made without departing from the
`Scope of the present invention.
`0031
`FIG. 1 illustrates the block diagram of a multiway
`control System for replacing the conventional keySet with
`user's identification data according to the present invention.
`According to the illustration of FIG. 1, the invention com
`prises the first digital data input means (101) for controlling
`CPU of the System; the Second digital data input means
`(102) for controlling CPU of the system in addition to the
`first digital data input means; a memory means (104)
`coupled to the CPU for memorizing the digital data that the
`first digital data input means and the Second digital data
`input means inputted; a control means (106) coupled to CPU
`for controlling the operation of keySet according to the
`control data signal from CPU of the system; a real time clock
`(105) for designating the time of each operation for memory
`means according to the control signal from CPU of the
`System; a plurality of Sensor means (111) for detecting
`unauthorized access to the keySet; a warning means (112) for
`warning according to the control signal from CPU of the
`system coupled to the sensor means; a CPU (103) of the
`system for controlling the above means and control means
`(106) to control the function of keyset system according to
`the preprogrammed instruction signal from the digital data
`input means (101, 102).
`0032 The first digital data input means (101) may com
`prise of at least one or more personal digital data input
`element including, but not limited to, for example, a mag
`netic card reader, an IC card reader, a RF card reader, or a
`living bionics instrument of user Such as a biometrics
`instrument.
`0033. The second digital data input means (102) may
`comprise of at least one or more digital data inputs includ
`ing, but not limited to, for example, a keypad System for
`input of any character including, but not limited to, for
`example, numbers, letters or Symbols.
`0034) The data entry device (101,102) may comprise of
`any input element including, but not limited to, for example,
`a card reader, a finger print Scanner, a Video image Scanner,
`a voice Scanner, a keypad System of numbers or letters, or
`any and all combinations thereof.
`0035) Furthermore, this system may additionally include
`a real time clock (105) for designating and storing the time
`of each operation, a telephone system (109) for communi
`cation and remote control of the System from outside or a
`distance, a recording device (114) for recording a message
`to deliver to police and other designations, a line Sensor
`(110) for detecting the disconnection of telephone line, a
`microphone device (113) for delivery of voice signal at the
`System to various designations through the telephone Sys
`tem, and a display means (108) for displaying the status of
`the System.
`0036) Alternatively, the telephone system (109) may be
`any communication device including, but not limited to, for
`
`IPR2022-00602
`Apple EX1015 Page 5
`
`

`

`US 2003/0036825 A1
`
`Feb. 20, 2003
`
`example, a wireleSS telephone System, IF communication
`System or RF communication System for the wireleSS com
`munication or any and all combinations thereof.
`0037 Now an explanation of the operation of the present
`invention will be described. User may select from a plurality
`of a user's identification data according to the System
`configuration for the digital data input means (101, 102).
`They may input personal digital data through the first digital
`data input means (101) and or the Second digital data input
`means (102) to register the user's identification to be used as
`a key to enable the System operation.
`0.038
`For example, the system may be equipped with a
`magnetic card reader as the first digital input mans (101) and
`a keypad as the second digital input means(102). With this
`combination, the users register their identification data
`through the first digital data input means (101) with their
`own personal card Such as a bank's credit card or a club
`membership card that users always carry and want to use as
`a key, and their passwords through the Second digital data
`input means (102). The CPU (103) receives the ID data
`Signal from the first digital data input means (101) and the
`Second digital input means (102) and stores the digital data
`Signals to the memory means (104). After the registering of
`user's digital identification data, when at a later time users
`input this data through the digital data input means (101,
`102), the CPU (103) receives the data and compares it to
`what was read, if the data matches, the CPU (103) orders the
`control means (106) to activate a keyset (107) as pro
`grammed. However, if the read data are not same as the data
`stored in the memory means (104), the CPU shows an error
`in the display means (108) and remains silent.
`0.039 According to the pre-programmed protocol of the
`CPU (103), there are several different ways to control the
`System, depending on the personal digital data read. For
`example, if users Stored their card only with the first digital
`data input means (101), users can control the System with
`card only. In addition, if users Stored their password only
`with the Second digital data input means (102), users can
`control the System with password only. Furthermore, users
`may store their digital data both through the first and the
`second digital data input means (101.102) together. This will
`enable the users to control the system with two kinds of data
`together, both a personal digital data System, Such as for
`example, a credit card and a password. Depending on the
`type of the digital data input (101,102) being used, users can
`control the System in three-(3) ways according to the user's
`choice. This provides enhanced Security Since intruders
`would not know how the authorized users stored their data.
`0040 Another aspect of the present invention is that the
`System may be controlled or activated in a variety of
`different operating modes. For example, two Sets of identi
`fication data may be entered into the memory (104) through
`the digital data input means (101,102), each used to activate
`the unit in different modes. For instance, the first set of
`identification data may be used to activate the System in a
`normal operating mode, whereas the Second Set may be used
`to activate the System in an emergency mode.
`0041) To illustrate, a user may store data from one credit
`card with the first ID data input means (101) and or a
`password with the second ID data input means (102), both
`as a first Set of data for activation of the System in normal
`operating mode. The user may further Store a Second Set of
`
`data, for example, from another credit card and or a pass
`word number for an emergency situation in case of forced
`hand over of his or her card or password to an intruder.
`0042. If user inputs any card or password used for an
`emergency situation, the CPU will recognize the Situation by
`the input data and will control the System as a programmed
`emergency protocol. Manufacturers of the System can make
`various kinds of programs for a variety of different operating
`modes for authorized access to Secure Systems or areas that
`include, but are not limited to, for example, limited or
`temporary mode of operation or access, emergency, kidnap
`ping, and So on.
`0043. A safe is one specific example where the present
`invention may be used. In case of a theft, when the owner is
`forced to open the Safe by intruders, and the emergency data
`are entered by card and or password, the CPU (103) checks
`the data by comparing it with the data in the memory means
`(104) and controls the System for an appropriate counter
`measure. These may include, but are not limited to, for
`example, making a call to police and other pre-arranged
`numbers with the telephone system (109), and the activation
`of the recorder (114) of the safe to send the recorded
`message for immediate rescue. The CPU (103) further
`controls the microphone (113) to Send all voice signals,
`which happen at Site of the Safe, to the recording device of
`the police for Supporting the continuous rescue operation
`through a telephone system (109). When the telephone line
`to the safe is disconnected or tampered, the line sensor (110)
`coupled to the CPU (103) immediately detects the situation
`and the CPU activates a high-powered siren instantly so that
`any attempt to remove the Safe after disconnecting the
`telephone line is not possible. The same principle of opera
`tion may be applied to instances of house intrusions.
`0044) Hotel door lock systems are another specific
`example where the present invention may be used. Most
`Hotel front desk offices issue a check-in card for a guest after
`appropriate information with respect to hotel room door lock
`address and check-out time and date is digitally Stored. Upon
`receipt of the check-in card, a guest may then input the data
`of the check-in card in the first ID data input means (101)
`and enter any password in the Second ID input means (102)
`within the pre-programmed time of the CPU (103). The CPU
`(103) is then enabled to recognizes the password entered by
`the guest, and Stores the data in the memory means (104) to
`permit the password to be use as a key until the check-out
`time that was input by the check-in card. Hotel guests may
`use their own card as the above method by inserting another
`card in the first digital data input means (101) within the
`pre-programmed time after taking out the check-in card. AS
`the preferred method, hotel guests may use their own card
`key or password to open the door. This would allow the use
`of hotel room doors by the password system rather than the
`card key System, reducing the burden of carrying extra
`check-in cards, or even personal digital data cards or keys.
`0045 Referring to FIG. 2, the present invention provides
`a multiway control function for a vehicle with user's iden
`tification input. The System comprises the ID data input
`means (202) for controlling the CPU of the system; the
`keypad means (201) for controlling CPU of the system in
`addition to the ID data input means; a memory means (204)
`for Storing the digital data that the user inputted; a control
`board (206) for controlling the electric functions of the
`
`IPR2022-00602
`Apple EX1015 Page 6
`
`

`

`US 2003/0036825 A1
`
`Feb. 20, 2003
`
`vehicle such as an ECU circuit (207), a distributor circuit
`(208), an ignition circuit (209), a power supply circuit (210),
`a power Steering circuit (211), a horn circuit (212), a lighting
`circuit (213) and an unlocking circuit for the trunk com
`portment of the vehicle according to the instruction signal
`from the CPU of the system, and a CPU (203) for controlling
`the System.
`0046) This system may additionally include a mobile
`communication System (225) for communicating between
`CPU (203) and outside designations with a GPS system
`(221), a microphone System (222) and camera system (223)
`for the visual communication; a door sensor (231) for
`detecting the opening of door; a driver seat Sensor (232) for
`detecting the absence of the driver; and a trunk Switcher
`(217) and diver's switcher (218) for activating the CPU
`(203) for driving at emergency situation mode as pre
`programmed.
`0047 Authorized users may register a personal digital
`identification data for normal driving, a Second personal
`digital identification data for an emergency situation, and
`another digital identification data for Valet parking through
`the data input means (201, 202) as described in the above
`method with respect to FIG. 1.
`0.048 Users can drive their vehicle with the normal
`driving card and or password in three-(3) ways as described
`above with respect to FIG. 1. For example, when users are
`forced to hand over the driving card and or password that
`was used as "key' to the vehicle to an intruder, the users give
`a card and or password used for emergency situation.
`0049 According to the pre-programmed protocol of the
`CPU (203), there are many different control methods that
`may be programmed by manufacturers in accordance with
`pre-programmed protocol of the CPU (203). If emergency
`data are entered through the data input means (201,202), the
`CPU will control the ignition system (209) of vehicle
`through the control board (206) to drive the vehicle in a
`normal manner for 20 Seconds only, and after 20 Seconds,
`the CPU commences control of all lighting system (213)
`(e.g. blinking), the horn (212) is accidentally operated, and
`the door of the trunk compartment (214) is automatically
`opened. The CPU then further controls the vehicle's engine
`to stop it by controlling the control board (206), which
`makes driving impossible. In the preferred operation, the
`vehicle moves for only 20 seconds driving distance from the
`accidental place where the intruder took the key by force.
`This is for the safety of the owner. Even if the owner is
`kidnapped and placed in the trunk compartment, the door of
`the trunk is automatically opened after a 20 Seconds drive for
`CSCC
`0050. This invention is also useful when the intruder
`forcedly opens the door of the vehicle during a temporally
`Stop situation. In that case if the door is opened, the door
`sensor (231) and the driver seat sensor (232) immediately
`detect the situation and Send an emergency Signal to the CPU
`(203) to turn off the engine through the control board (206)
`by disconnecting the power supply (210) of the vehicle. If
`the intruder further demands to drive the vehicle, the autho
`rized users can give the intruder a card and or a password
`used for emergency Situation for the emergency operation as
`described above.
`0051. Further more, if the authorized users are kidnapped
`and placed in the trunk compartment of the vehicle, they can
`
`be easily rescued because the trunk is automatically opened
`after a pre-programmed time, and also, a kidnapped perSon
`can control a trunk Switcher (217) for delivering a signal to
`CPU to drive the vehicle in emergency driving mode for
`rescue. In situations where the authorized users are forced by
`an intruder to drive, they can control the driver's switcher
`(208) for delivering a signal to CPU. The CPU (203)
`recognizes the Situation and drivers the vehicle in a pre
`programmed mode, Such as an emergency to pull up a
`bulletproof glass compartment between the guest Seat and
`the driver's Seat of the taxi, for example, and automatic lock
`of the door lock for the arrest of the intruder.
`0052. In addition to the above method, if the vehicle is
`additionally equipped with the mobile communication Sys
`tem (225) with GPS (221), microphone (222) and camera
`(223) for the communication, when emergency situation is
`detected, CPU (203) can control the communication system
`to Send a rescue message to pre-programmed designations
`and deliver the location data of the vehicle by GPS, and all
`audio and Video signal messages from the vehicle for
`tracing.
`0053 Another unique features of the present invention is
`the use of a card or password for Valet parking. When users
`want to Valet park, users insert their normal driving card or
`input their normal driving password in the data input means
`(201202). Once done, the users then insert and or input their
`Valet parking card or password within the time period
`programmed. The CPU (203) compares the signal inputted
`with the signal stored in the memory means (204), and if
`matched, CPU (203) permits the user to input a valid time
`for Valet parking Service by a signal of a display means (205)
`So that the user can input a certain valid time for Valet
`parking service with a keypad (202). The CPU will indicate
`by a signal that the Valet parking Service's valid time was
`Stored. Therefore, user can hand over the card or the
`password that the user Stored the operational valid time, to
`a Valet attendant So that the Valet attendant can drive the
`vehicle with a card or a password during the permitted time
`period only. The use of the card or the password is invalid
`after the valet service's valid time is passed by CPU.
`0054 As described, the significant advantage of the
`present invention is that it provides a System apparatus and
`a method for replacing the conventional key with a user's
`personal digital data that users always carry, eliminating the
`burden to carry or lose keys and the worries for memorizing
`or forgetting a complicated dial combinations of the con
`ventional System, as well as to provide the enhanced Security
`Standard by controlling the System with a digital data of
`user's choice in multiways.
`0055 Another aspect of the present invention is that users
`can control the vehicle in multiways with user's identifica
`tion entry for an anti-carjacking, a keyleSS ignition, a keyleSS
`Valet parking and an improved anti-thief of the vehicle by
`identification.
`0056 Yet another aspect of the present invention is to
`provide a new hotel door lock System that enables guests to
`use their own personal digital data Systems or password for
`unlocking hotel room doors to be free from the hotel key
`System and need not to carry anything extra for the entrance
`to a hotel room, providing the maximum convenience to the
`hotel guests.
`0057 While the above description contains many specif
`ics, these should not be construed as limitations on the Scope
`
`IPR2022-00602
`Apple EX1015 Page 7
`
`

`

`US 2003/0036825 A1
`
`Feb. 20, 2003
`
`of the invention, but rather as an exemplification of preferred
`embodiments thereof. Numerous variations and alternative
`embodiments are possible and will occur to those skilled in
`the art, without departing from the essential Spirit of this
`invention. Accordingly, the Scope of the invention should be
`determined not by the embodiments illustrated, but by the
`appended claims and their legal equivalents.
`
`What is claimed is:
`1: A System apparatus for replacing a key with a digital ID
`data of users for providing multiway control according to the
`ID data of user's input, for a keySet of a vehicle, a lockable
`door, a filing cabinet, a Safe and an armaments,
`comprising.
`a first ID data input means for entering user's first ID
`data to control the keySet System;
`a Second ID data input means for entering user's Second
`ID data to control the keyset system in addition to the
`first ID data input means,
`a memory means for Storing the digital data from the
`first ID data input means and the second ID data
`input means,
`a control processing unit (CPU) for controlling the
`System according to the data from the first ID data
`input means or the Second ID data input means,
`a control means coupled to the central processing unit
`for controlling the operation of a keySet System
`according to the instruction Signal from central pro
`cessing unit, and,
`a keySet System coupled to the control means for
`locking and unlocking of the System by the instruc
`tion signal from the control means.
`2: The System apparatus of claim 1, further comprising a
`real time clock means coupled to CPU for designating the
`real time of operation of the System by Storing the real time
`data in the memory means.
`3: The System apparatus of claim 1, further comprising a
`display means coupled to CPU for displaying the Status of
`the System operation.
`4. The System apparatus of claim 1, further comprising
`wire or wireleSS telephone System for receiving and trans
`mitting a message signal through telephone System, and for
`controlling the system from outside utilizing DTMF tone.
`5: The System apparatus of claim 1, further comprising RF
`communication System for communicating between the SyS
`tem and user.
`6: The System apparatus of claim 1, further comprising an
`IR receiving means coupled to CPU for communicating the
`System control data by IR means.
`7: The System apparatus of claim 4, further comprising a
`audio recording and playing means for recording message to
`deliver a designated address when the Security violation
`detected, a Sensor for detecting telephone line cut, Sensors
`for detecting shock and a heat attack, and a warning means
`coupled to CPU for warning in accordance with the Signal
`from the Said Sensors.
`8: The System apparatus of claim 7, further comprising a
`microphone coupled to the telephone System for receiving
`Sounds around the System to deliver the Sound to the
`designated receivers.
`
`9: The System apparatus of claim 7, further comprising an
`audio & Video image recorder coupled to CPU for recording
`the image and Sound of the intruders when the Security
`Violation detected.
`10: A System apparatus for controlling a vehicle in 3-ways
`comprising the 1st ID input means, the 2nd ID input means,
`and the 1st ID input means and the 2nd input means together,
`comprising,
`a first ID data input means for ente

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket