EP0122244B1 - A lock system - Google Patents

A lock system Download PDF

Info

Publication number
EP0122244B1
EP0122244B1 EP84850102A EP84850102A EP0122244B1 EP 0122244 B1 EP0122244 B1 EP 0122244B1 EP 84850102 A EP84850102 A EP 84850102A EP 84850102 A EP84850102 A EP 84850102A EP 0122244 B1 EP0122244 B1 EP 0122244B1
Authority
EP
European Patent Office
Prior art keywords
card
lock
time
data
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
EP84850102A
Other languages
German (de)
French (fr)
Other versions
EP0122244A2 (en
EP0122244A3 (en
Inventor
Bengt Olenfalk
Göran Witt
Anders Sarberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BESAM SECURITY AB
Original Assignee
BESAM SECURITY AB
BESAM SECURITY AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=20350718&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP0122244(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by BESAM SECURITY AB, BESAM SECURITY AB filed Critical BESAM SECURITY AB
Priority to AT84850102T priority Critical patent/ATE34796T1/en
Publication of EP0122244A2 publication Critical patent/EP0122244A2/en
Publication of EP0122244A3 publication Critical patent/EP0122244A3/en
Application granted granted Critical
Publication of EP0122244B1 publication Critical patent/EP0122244B1/en
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time

Definitions

  • the present invention relates to a lock system, and in particular to a lock system intended for locking rooms to which a limited number of persons are permitted access over spaced periods of time.
  • Such rooms may include hotel rooms, safes and drink cabinets placed in hotel rooms for use by guests, and also a diversity of storage facilities placed at the disposal of selected persons for a limited period of time, such as dress- changing rooms, banks and post offices.
  • lock systems which, instead of conventional keys, incorporate the use of magnetic cards, on which a digital code can be magnetically registered, and locks which include an electrically operable locking mechanism, a magnetic-card reading means, a memory in which a digital code can be stored, and means for making a comparison between the digital code read by the card reader from the magnetic card, serving as the "key", and the code stored in the memory, whereupon the locking mechanism is unlocked, provided that there is agreement between the two codes compared.
  • lock system a key card is provided with magnetically registered data including a lock identification allotted to a specific lock, a validity time for the card and a randomly selected ligitimacy code allotted individually to the card, and each lock comprises a locking mechanism having electrically actuable means for unlocking the same, a magnetic-card reader arranged to receive a card of the aforementioned kind and to read the data registered thereon, a memory containing said lock-identification data and capable of storing card data of the aforementioned kind, comparison means for comparing the data stored in said memory with data read from said card by means of said magnetic-card reader and for acting upon the locking mechanism in response to said comparison, and a programming unit for entering data into said memory and for changing the data content of said memory.
  • lock systems for hotel rooms and similar applications it should preferably be possible to issue cards to members of the hotel staff, for example cleaning personnel and hotel security personnel, which cards can be used for opening the locks to a given number of specific rooms only on certain weekdays and/or during certain times of the day.
  • the central card issuing unit which is normally located in the reception of the hotel, must comprise a data store in which all the legitimacy codes of all issued current cards are kept stored. Otherwise, it is not possible to issue any new cards, which can be used for opening and reprogramming the individual locks. This creates a very serious problem, especially if the synchronisation between the card data stored in the central unit and the card data stored in the individual locks is lost or if the legitimacy codes stored in the central unit are for some reason lost. In such situations it will not be possible to issue any new cards capable of opening the locks of the system.
  • the object of the present invention is to provide an improved lock system of the aforementioned kind, which has an improved utility and provides a more simple way of issuing new cards at any time, without any central data store for the legitimacy codes of previously issued cards being required.
  • the lock system according to the invention affords several important advantages. For examples, it is possible to establish accurately the validity time of each card in real time, not only with respect to an initial date and a final date but also with respect to those days and those times of day on which the card can be used within the interim period. Thus, it is possible to issue a card which can be used only on certain weekdays and/or during certain times of the day, while at the same time it is possible to establish a total card validity time, i.e. a first and a last day of validity. It is also possible to issue a card long beforehand, i.e.
  • a new card can be issued at any time for any given lock, even if the validity time of a previously issued card for the same lock has not yet expired, and the system does not require, for this purpose, any central data store in which the legitimacy codes of previously issued cards are stored.
  • lock system according to the invention is described, by way of example, with respect to its use in a hotel, although it will be understood that a lock system according to the invention can also be used to the same advantage for many other types of institution, and that the magnetic cards serving as keys can be of another kind with respect to the different usages for which they are legitimized.
  • Figure 1 illustrates schematically and by way of example a conventional magnetic card 1, which can be used as a "key" in a lock system according to the invention and which is provided with, for example, a strip 2 of magnetisable material on which data, preferably in digital form, can be magnetically registered.
  • the magnetic registration, or the writing of data into the card is effected by means of a separate, conventional programming or write-in apparatus (not shown in detail) which is suitably placed in the reception facilities of the hotel.
  • the aforementioned programming or write-in apparatus can be arranged to issue or to program different types of card.
  • the aforementioned programming or write-in apparatus can be arranged to issue or to program different types of card.
  • three main types of card namely: guest cards, which are intended for issue to hotel guests, and to afford each guest access to only one given room during all times of the day for a specific, selectable period of time, validity time;
  • service cards which are intended for cleaning personnel and other personnel, and which afford access to a given floor, during a certain time of day, for example between 8.00 and 17.00, and/or on certain days of the week, for example all weekdays, and for a given validity time, i.e. from a first validity day to a final validity day;
  • master cards intended for the hotel security staff or management, which afford access to all rooms in the hotel or in a certain part of the hotel at all times of the day for a given validity time, i.e. from a first validity day to a final validity day.
  • the data registered magnetically on the card, preferably in digital form, by means of the programming or write-in apparatus may comprise the following information:
  • the programming or write-in apparatus is designed so that when issuing or programming a card, the operator is able to determine the type of card concerned, the system identification, the lock identification, and the validity time, but not the legitimacy code randomly selected by the apparatus itself.
  • the apparatus is designed so that it can only be operated by selected, authorized personnel, which may have varying grades of authorization, such that, for example, the system identification can only be determined and changed by a few people, which may also apply to the issue of a master card, for example.
  • the lock illustrated in the block schematic of Fig. 2 includes a conventional magnetic card reader 3, for example a reader of the Magdat-type MSC-170-IR, or the Ericsson-type KDT 30201, into which a magnetic card 1 according to Figure 1 can be inserted, and which reads the data magnetically registered on the card.
  • the lock also includes a conventional locking mechanism 4 which can be operated electrically between a locked and an unlocked state.
  • the lock includes a legitimacy comparator 8, a time comparator 9 and a programming unit 10, the functional purpose of which will be made apparent hereinafter.
  • the lock may also incorporate a position sensor 5, for example in the form of a microswitch, which detects the position of a lock bolt in the lock mechanism 4.
  • the memory 6, which is suitably of the direct access type, is suitably arranged to store digital data. This data can be changed with the aid of the programming unit 10.
  • the aforementioned system identification and the lock identification pertaining to said lock are always stored in the memory.
  • the aforesaid items of data are entered into the memory 6 before the lock is installed by, temporarily connecting the lock to the aforementioned programming or write-in apparatus from which the system identification and lock identfica- tion is obtained, and entering said data into the memory 6 through the programming unit 10.
  • the legitimacy comparator 8 is arranged to receive from the card reader 3, the data or information registered on the magnetic card fed to the card reader 3, and to compare this data with data stored in the memory 6.
  • the time comparator 9 is designed to be able to make a mutual comparison between the real time given by the real time clock of said lock, the time-information read from an inserted card by the card reader 3, and time-information stored in the memory 6.
  • a guest card of the kind aforedescribed i.e. a card bearing registered data concerning the type of card, system identification, validity time, and a randomly selected legitimacy code.
  • a microprocessor (not shown in detail) incorporated in the lock and being, for example, of the aforementioned kind designated AIM65 from Rockwell instructs the time comparator 9 to compare the validity time read from the card with the real time given by the real-time clock 7, and further instructs the legitimacy comparator 8 to compare the system identification and the lock identification in the data read from the card with the system-identification data and the lock-identification data previously stored in the lock memory 6.
  • the programming unit 10 is ordered to store all the data registered on the card in a site in memory 6 intended herefor, and actuates the lock mechanism, to open the lock. If, on the other hand, one of the comparisons shows a negative result, the lock remains locked and no further action takes place. Thus, the lock cannot be opened with a guest card unless the card is intended for the location and the lock in question, and unless it is presented to the lock within the validity time registered on the card.
  • the time comparator 9 is instructed to compare the time given by the real-time clock 7 with the validity time stored as described above in the site in the memory 6 reserved for guest-card date. If the result of this comparison is positive, i.e. the validity time stored in the memory has not yet expired, the legitimacy comparator8 is instructed to comparethewhole of the data read from the card with the data stored in the aforesaid manner in the memory 6, in the site reserved forthe guest-card data. If the comparison shows agreement between the two sets of data, the legitimacy comparator 8 actuates the lock mechanism 4, to open the lock.
  • the programming unit 10 is instructed to erase the validity time stored in the memory 6, wherefore the subsequent comparison made by the legitimacy comparator 8, as described above, between the data registered on the guest card and the guest-card data stored in the memory 6 will also give a negative result, whereby the lock is not opened. Consequently, the card can not be used to open the lock, when the validity time registered on the card has expired.
  • a guest may decide to vacate his/her room earlier than was initially intended, i.e. before the validity time of the card issued to the guest has expired. Similar circumstances may occur with other types of institutions or established organizations. In such cases, in order to enable a new guest to enter the room, it is necessary to issue a card which will be accepted by the lock, despite the fact that the memory 6 of the lock has stored therein data relating to a guest card whose validity time has not yet expired.
  • the procedure adopted differs from that taken with the aforescribed guest card, insomuch asthe new master card is not given a special override code.
  • the lock is so designed that the legitimacy comparator 8 accepts such a new master card, provided with a longer validity time than the validity time previously registered in the memory 6 of said master card, and in conjunction therewith substitutes the master card data previously stored in said memory with the data found registered on the new master card.
  • the data registered on a service card contains no randomly selected legitimacy code, but only data referring to system identification, lock identification, i.e. identifications of those locks or rooms to which the service card has access, and a validity time.
  • the lock functions in the above-described manner, with the exception that none of the data registered in the service card is stored in the memory 6 of the lock.
  • the legitimacy comparator 8 solely checks the system-identification data and the lock-identification data on the card with the system and lock identification data stored in the memory 6, while the time-comparator 9 checks the card validity-time with the real time given by the real-time clock 7.
  • a lock system is designed to enable the system identification to be changed, by issuing a new master card which contains both the old and the new system identification, and also a special operation code.
  • the lock detects said operation code and the programming unit 10 in the lock is ordered to replace the old system-identification data stored in the lock memory 6 with the new system-identification data registered on the new master card.
  • the position sensor 5 of the lock illustrated in Figure 2 may be arranged to sense a special position for a lock bolt in the lock mechanism 4, to which the lock bolt may be moved manually by the hotel guest from inside the door.
  • the position sensor 5 acts upon the legitimacy comparator 8 in a manner such that said comparator no longer accepts, for example, a service card, but only master cards and guest cards. This function can be employed when a guest does wish to be disturbed.
  • the safe lock can be designed so thatthe position sensor 5 is constantly activated, whereupon the safe can only be opened with a guest card and a master card.
  • the position sensor 5 may also be arranged to act upon the legitimacy comparator 8 in a manner such that the comparator will not accept a guest card provided with an override code of the aforementioned kind.
  • the magnetic card 1 can be reprogrammed and used a repeated number of times, simply by presenting the card to the aforedescribed programming and write-in apparatus each time the card is to be renewed.
  • the programming and write-in apparatus is advantageously designed to record therein the number of times an individual card has been renewed and fresh data registered therein. In this way, it is possible to estimate when a card has been used so many times that there is danger of it being worn to such an extent as to render the card unserviceable and unreliable.

Abstract

The invention relates to a lock system for rooms which are to be made exclusively accessible to different uses over different periods of time, for example hotel rooms. The keys of the system comprise magnetic cards which are provided with magnetically registered data, which for each card includes lock-identification data valid for a given lock or a given group of locks, a validity time expressed in real time and a randomly selected legitimacy code. Each lock includes an electrically actuable lock mechanism (4), a magnetic-card reader (3), a memory (6) for the storage of data, a real-time clock (7), a programming unit (10), a legitimacy comparator (8), and a time comparator (9). The memory (6) has stored therein the lock-identification data valid for the lock. When a magnetic card is introduced for the first time into the card reader (3) of a lock, the legitimacy comparator (8) compares the lock-identification data registered on the card with the lock-identification data stored in the memory (6), and the time comparator (9) compares the validity time registered on the card with the real time given by the real-time clock (7). If these comparisons show agreement, the lock opens and the programming unit (10) is instructed to store into the memory the validity time and the legitimacy code registered on the card. When a magnetic card is later introduced to the card reader (3) the time comparator compares the real time given by the real-time clock (7) with the validity time in the card data stored in the memory and the legitimacy comparator (8) compares the data registered on the card with the data stored in the memory (6) of the lock, and the lock is opened when agreement is found between the data compared. If the comparison made by the time comparator (9) show disagreement, the time comparator compares the validity time registered on the card with the real time given by the real-time clock (7) and the legitimacy comparator (8) compares the lock-identification data registered on the card with the lock-identification data stored in the memory and, if these comparisons show agreement, the lock is opened and the programming unit (10) is used to replace the card data already stored in the memory (6) with the data registered on the card.

Description

  • The present invention relates to a lock system, and in particular to a lock system intended for locking rooms to which a limited number of persons are permitted access over spaced periods of time. Such rooms may include hotel rooms, safes and drink cabinets placed in hotel rooms for use by guests, and also a diversity of storage facilities placed at the disposal of selected persons for a limited period of time, such as dress- changing rooms, banks and post offices.
  • Conventional locks and keys are not totally satisfactory security devices for such rooms, since the keys can be readily copied or stolen. Moreover, the holder of a key is often prone to either misplace it, or to forget to return it when his allotted period has expired. In order to safeguard against unauthorized entry into a room of which the key is missing, it is necessary, each time, to replace the lock. Such measures are too costly and time consuming to be practical in reality. Neither are mechanical nor electrical combination locks fully satisfactory for the aforesaid purposes, since such locks require the combination to be changed when the room served by the lock changes hands, this task being time consuming and requiring the employment of personnel. The person to whom the room has been allocated or let is also liable to forget the correct combination.
  • Consequently, in respect of rooms of the aforesaid kind there is an express need for a lock system which is practical in use, while affording the security desired.
  • In this regard there have been proposed in recent times lock systems which, instead of conventional keys, incorporate the use of magnetic cards, on which a digital code can be magnetically registered, and locks which include an electrically operable locking mechanism, a magnetic-card reading means, a memory in which a digital code can be stored, and means for making a comparison between the digital code read by the card reader from the magnetic card, serving as the "key", and the code stored in the memory, whereupon the locking mechanism is unlocked, provided that there is agreement between the two codes compared. Since in lock mechanisms of this kind it is a relatively simple matter to change the code registered on the card, and also a relatively simple matter to change the content of the lock memory, such a lock system affords, in principle, an essential advantage sought for in lock systems for use in the aforesaid respect, namely that it is relatively easy to render a key unusable for opening the lock and to replace the key with one which is functional in this respect.
  • One previously known lock system of this kind is described in for instance EP-A-43270, in which lock system a key card is provided with magnetically registered data including a lock identification allotted to a specific lock, a validity time for the card and a randomly selected ligitimacy code allotted individually to the card, and each lock comprises a locking mechanism having electrically actuable means for unlocking the same, a magnetic-card reader arranged to receive a card of the aforementioned kind and to read the data registered thereon, a memory containing said lock-identification data and capable of storing card data of the aforementioned kind, comparison means for comparing the data stored in said memory with data read from said card by means of said magnetic-card reader and for acting upon the locking mechanism in response to said comparison, and a programming unit for entering data into said memory and for changing the data content of said memory.
  • This prior art lock system as also other similar lock systems previously suggested and known in the art are encumbered with many disadvantages, however, both with respect to their practical use and to their reliability against unauthorized opening of the locks. This is particularly true when these prior art lock systems are used for hotel rooms for instance, where it must be possible to authorize a guest to open a given lock for a specific limited period of time, but the guest may loose his card or decide to leave the hotel before the end of said period of time, wherefore it should be possible in a simple manner to issue a new card for opening the same lock before the expiration of said specified period of time. Further, in lock systems for hotel rooms and similar applications it should preferably be possible to issue cards to members of the hotel staff, for example cleaning personnel and hotel security personnel, which cards can be used for opening the locks to a given number of specific rooms only on certain weekdays and/or during certain times of the day.
  • In the lock system disclosed in EP-A-43270, - however, it is not possible to issue a card in advance, i.e. before the beginning of its intended validity time, and neither is it possible to issue a card which can be used for opening a given lock or a number of given locks only on certain weekdays and/or during certain times of the day. Furthermore, this lock system, just as other previously suggested lock systems of a similar kind, have the very serious disadvantage that the legitimacy code registered on a new card issued for a .given lock must have a given predetermined relationship, expressed by a predetermined mathematical formula, to the legitimacy code registered on the previous card issued for the same lock, if the newly issued card is to be useable for opening the lock concerned. This means that the central card issuing unit, which is normally located in the reception of the hotel, must comprise a data store in which all the legitimacy codes of all issued current cards are kept stored. Otherwise, it is not possible to issue any new cards, which can be used for opening and reprogramming the individual locks. This creates a very serious problem, especially if the synchronisation between the card data stored in the central unit and the card data stored in the individual locks is lost or if the legitimacy codes stored in the central unit are for some reason lost. In such situations it will not be possible to issue any new cards capable of opening the locks of the system.
  • The object of the present invention is to provide an improved lock system of the aforementioned kind, which has an improved utility and provides a more simple way of issuing new cards at any time, without any central data store for the legitimacy codes of previously issued cards being required.
  • This object is achieved with the lock system according to the present invention, which is characterized by the features set forth in the accompanying claims.
  • The most significant features of the lock system according to the invention reside in:
    • that the validity time registered on each card is expressed in real time;
    • that each lock includes a real-time clock;
    • that the comparison means in each lock includes a legitimacy comparator and a time comparator; and
    • that the time comparator uses the real time given by the real-time clock in the lock together with the validity time included in card data already stored in the memory of the lock or the validity time registered on a card inserted in the lock in order to establish, in co-operation with the legitimacy comparator which compares the legitimacy code and the lock identification registered on the inserted card with the legitimacy code and the lock identification stored in the memory of the lock, whether the inserted card is already previously authorized to open the lock at the specific time it is inserted in the lock or whether it is a newly issued card which is authorized to replace a previously issued card, the validity time of which may be expired or still running.
  • The lock system according to the invention affords several important advantages. For examples, it is possible to establish accurately the validity time of each card in real time, not only with respect to an initial date and a final date but also with respect to those days and those times of day on which the card can be used within the interim period. Thus, it is possible to issue a card which can be used only on certain weekdays and/or during certain times of the day, while at the same time it is possible to establish a total card validity time, i.e. a first and a last day of validity. It is also possible to issue a card long beforehand, i.e. long before the first day of its validity period Further, a new card can be issued at any time for any given lock, even if the validity time of a previously issued card for the same lock has not yet expired, and the system does not require, for this purpose, any central data store in which the legitimacy codes of previously issued cards are stored.
  • The lock system according to the invention affords many other advantages, as will become apparent when reading the following description, which is made with reference to a preferred embodiment of a lock system according to the invention, illustrated in the accompanying drawing, in which
    • Figure 1 illustrates schematically a magnetic card serving as a "key"; and
    • Figure 2 is a block schematic view of a lock incorporated in said lock system.
  • Since the various members and components incorporated in the lock are such which are either generally commercially available or which can be readily constructed by one skilled in the art with the aid of the functional data given in the following description with regard to said components and members, the lock in Figure 2 has simply been illustrated in its block schematic form.
  • In the following, the lock system according to the invention is described, by way of example, with respect to its use in a hotel, although it will be understood that a lock system according to the invention can also be used to the same advantage for many other types of institution, and that the magnetic cards serving as keys can be of another kind with respect to the different usages for which they are legitimized.
  • Figure 1 illustrates schematically and by way of example a conventional magnetic card 1, which can be used as a "key" in a lock system according to the invention and which is provided with, for example, a strip 2 of magnetisable material on which data, preferably in digital form, can be magnetically registered. The magnetic registration, or the writing of data into the card is effected by means of a separate, conventional programming or write-in apparatus (not shown in detail) which is suitably placed in the reception facilities of the hotel.
  • The card programming or write-in apparatus includes a real-time clock and a microprocessor, e.g. AIM 65 from Rockwell, which is programmed to determine the date registered on an inserted card 1.
  • In a lock-system according to the invention intended for hotel use, the aforementioned programming or write-in apparatus can be arranged to issue or to program different types of card. For example, there may be found three main types of card, namely: guest cards, which are intended for issue to hotel guests, and to afford each guest access to only one given room during all times of the day for a specific, selectable period of time, validity time;
  • service cards, which are intended for cleaning personnel and other personnel, and which afford access to a given floor, during a certain time of day, for example between 8.00 and 17.00, and/or on certain days of the week, for example all weekdays, and for a given validity time, i.e. from a first validity day to a final validity day;
  • master cards, intended for the hotel security staff or management, which afford access to all rooms in the hotel or in a certain part of the hotel at all times of the day for a given validity time, i.e. from a first validity day to a final validity day.
  • In the described embodiment of the invention the data registered magnetically on the card, preferably in digital form, by means of the programming or write-in apparatus, may comprise the following information:
    • type of card, i.e. whether a guest card, a service card or a master card;
    • system identification, i.e. a code which is unique to the lock system in question, e.g. the hotel, and which may comprise a plurality of check digits or check totals in the digital data registered on the card;
    • lock identification, i.e. information disclosing which lock or locks, i.e. hotel room(s), the card is legitimized to open;
    • validity time, including information concerning both the total validity time, i.e. the first and the final day of validity, and the days of the week and times of day to which the functionability of the card is restricted;
    • individual legitimacy code, which may comprise a multi-digit number selected at random, said number containing so many digits as to render the risk of several cards containing the same individual legitimacy code highly improbable. In a lock system intended for hotels for example, not all cards need be provided with such randomly selected individual code. For example, only the guest cards and master cards need be provided with such a code, while in service cards the code may be omitted.
  • The programming or write-in apparatus is designed so that when issuing or programming a card, the operator is able to determine the type of card concerned, the system identification, the lock identification, and the validity time, but not the legitimacy code randomly selected by the apparatus itself. Naturally, the apparatus is designed so that it can only be operated by selected, authorized personnel, which may have varying grades of authorization, such that, for example, the system identification can only be determined and changed by a few people, which may also apply to the issue of a master card, for example.
  • The lock illustrated in the block schematic of Fig. 2 includes a conventional magnetic card reader 3, for example a reader of the Magdat-type MSC-170-IR, or the Ericsson-type KDT 30201, into which a magnetic card 1 according to Figure 1 can be inserted, and which reads the data magnetically registered on the card. The lock also includes a conventional locking mechanism 4 which can be operated electrically between a locked and an unlocked state. Also incorporated in the lock is a memory 6, for example a direct access store of the type designated Fujitse MB8414E, and a real-time clock 7, for example of the kind designated MM 58174 from National Semiconductor. In addition hereto, the lock includes a legitimacy comparator 8, a time comparator 9 and a programming unit 10, the functional purpose of which will be made apparent hereinafter. The lock may also incorporate a position sensor 5, for example in the form of a microswitch, which detects the position of a lock bolt in the lock mechanism 4.
  • The memory 6, which is suitably of the direct access type, is suitably arranged to store digital data. This data can be changed with the aid of the programming unit 10. The aforementioned system identification and the lock identification pertaining to said lock are always stored in the memory. The aforesaid items of data are entered into the memory 6 before the lock is installed by, temporarily connecting the lock to the aforementioned programming or write-in apparatus from which the system identification and lock identfica- tion is obtained, and entering said data into the memory 6 through the programming unit 10.
  • The legitimacy comparator 8 is arranged to receive from the card reader 3, the data or information registered on the magnetic card fed to the card reader 3, and to compare this data with data stored in the memory 6.
  • The time comparator 9 is designed to be able to make a mutual comparison between the real time given by the real time clock of said lock, the time-information read from an inserted card by the card reader 3, and time-information stored in the memory 6.
  • The functional mode of the lock will be described hereinafter, first which reference to a guest card of the kind aforedescribed, i.e. a card bearing registered data concerning the type of card, system identification, validity time, and a randomly selected legitimacy code.
  • When a guest card of this kind is first inserted into the card reader 3, so that data registered on the card is transferred to the legitimacy comparator 8, the reader first determines that the card inserted is a guest card. A microprocessor (not shown in detail) incorporated in the lock and being, for example, of the aforementioned kind designated AIM65 from Rockwell instructs the time comparator 9 to compare the validity time read from the card with the real time given by the real-time clock 7, and further instructs the legitimacy comparator 8 to compare the system identification and the lock identification in the data read from the card with the system-identification data and the lock-identification data previously stored in the lock memory 6. If these comparisons show that the real time given by the clock 7 lies within the validity time registered on the card, and that the system and lock identification data stored in the memory 6 agree with the system and lock identification data registered on the card, the programming unit 10 is ordered to store all the data registered on the card in a site in memory 6 intended herefor, and actuates the lock mechanism, to open the lock. If, on the other hand, one of the comparisons shows a negative result, the lock remains locked and no further action takes place. Thus, the lock cannot be opened with a guest card unless the card is intended for the location and the lock in question, and unless it is presented to the lock within the validity time registered on the card.
  • When the same guest card is again introduced to the card reader 3, the time comparator 9 is instructed to compare the time given by the real-time clock 7 with the validity time stored as described above in the site in the memory 6 reserved for guest-card date. If the result of this comparison is positive, i.e. the validity time stored in the memory has not yet expired, the legitimacy comparator8 is instructed to comparethewhole of the data read from the card with the data stored in the aforesaid manner in the memory 6, in the site reserved forthe guest-card data. If the comparison shows agreement between the two sets of data, the legitimacy comparator 8 actuates the lock mechanism 4, to open the lock. It will be evident from this that it is not possible to open the lock with the aid of any other guest card, even though said card should have a still current validity time and contain both the relevant system identification data and the lock identification data relevant to the lock in question. This other guest card will namely have a different randomly selected legitimacy code to that stored in the memory 6 of said lock in the site for guest-card data.
  • If the validity time stored in the memory 6 in the site for guest-card data has expired, when a guest-card is inserted into the card reader 3, this will be discovered at the comparison made by the time comparator 9, as described above, between said validity time and the time given by the real-time clock 7. When this comparison gives a negative result, the programming unit 10 is instructed to erase the validity time stored in the memory 6, wherefore the subsequent comparison made by the legitimacy comparator 8, as described above, between the data registered on the guest card and the guest-card data stored in the memory 6 will also give a negative result, whereby the lock is not opened. Consequently, the card can not be used to open the lock, when the validity time registered on the card has expired.
  • If the validity time for the previously valid guest card has expired, and a newly issued guest card is inserted into the card reader 3, the comparisons described in the foregoing paragraph will of course also in this case give negative results. The time comparator 9 is then instructed to compare the time given by the real-time clock 7 with the validity time registered on the new guest card, and the legitimacy comparator 8 is instructed to check the system identification data and lock identification data registered on the new guest card in the aforedescribed manner. If all of these checks give positive results, the programming unit 10 is instructed to store the data registered in the new guest card in the site reserved for guest-card data in the memory 6, and to open the lock mechanism 4. Thus, the person possessing the new guest card is able to open the lock, provided that the validity time of the previously valid card has expired, and at the same time the data on the new guest card is stored in the memory 6 so that the new guest card can be used for future opening of the lock.
  • As will be understood, in the case of a hotel a guest may decide to vacate his/her room earlier than was initially intended, i.e. before the validity time of the card issued to the guest has expired. Similar circumstances may occur with other types of institutions or established organizations. In such cases, in order to enable a new guest to enter the room, it is necessary to issue a card which will be accepted by the lock, despite the fact that the memory 6 of the lock has stored therein data relating to a guest card whose validity time has not yet expired. This is readily achieved in the lock system according to the invention by simply issuing the new guest in such cases with a guest card containing data which includes a separate so- called override-code, which is detected by the legitimacy comparator 8 of the lock, whereupon the lock is opened and the data contained in the new guest card replaces the data pertaining to the earlier card in the lock memory 6, always provided, of course, that the aforedescribed checks relating to the system and the lock identification data and to the validity time of the new guest card give positive results. Those guest cards provided with an override code are given consecutive numbering by the programming or write-in apparatus, so that only the card last issued with an override function is valid for use.
  • The lock-functions in respect of a master card of the aforedescribed kind in the same manner as that described above with reference to a guest card, with the exception that the lock identification data registered in the master card is constructed so that the master card will be accepted by a plurality of locks, for example by all the locks in a hotel or by all the locks within a given part thereof. When wishing to issue a new master card which is to replace an existing master card whose validity time has not expired, the procedure adopted differs from that taken with the aforescribed guest card, insomuch asthe new master card is not given a special override code. Instead, it is ensured, in accordance with a preferred embodiment of the invention, that when programming the new master card, it obtains a validity time which extends beyond the validity time of the earlier master card. Thus, the lock is so designed that the legitimacy comparator 8 accepts such a new master card, provided with a longer validity time than the validity time previously registered in the memory 6 of said master card, and in conjunction therewith substitutes the master card data previously stored in said memory with the data found registered on the new master card.
  • The data registered on a service card contains no randomly selected legitimacy code, but only data referring to system identification, lock identification, i.e. identifications of those locks or rooms to which the service card has access, and a validity time. Thus, in the case of a service card the lock functions in the above-described manner, with the exception that none of the data registered in the service card is stored in the memory 6 of the lock. Thus, in respect of a service card, the legitimacy comparator 8 solely checks the system-identification data and the lock-identification data on the card with the system and lock identification data stored in the memory 6, while the time-comparator 9 checks the card validity-time with the real time given by the real-time clock 7.
  • For security reasons it may be necessary to be able to change the system identification common to all locks in a system, for example a hotel. As previously mentioned, the system-identification data has originally been stored in the lock memory 6, by temporarily connecting the lock, prior to its installation, to the programming or write-in apparatus. In order to obviate the necessity of carrying out a similar procedure when changing the system-identification for the system, a lock system according to a preferred embodiment of the invention is designed to enable the system identification to be changed, by issuing a new master card which contains both the old and the new system identification, and also a special operation code. When this new master card is inserted into a lock, the lock detects said operation code and the programming unit 10 in the lock is ordered to replace the old system-identification data stored in the lock memory 6 with the new system-identification data registered on the new master card.
  • In a preferred embodiment of the invention the position sensor 5 of the lock illustrated in Figure 2 may be arranged to sense a special position for a lock bolt in the lock mechanism 4, to which the lock bolt may be moved manually by the hotel guest from inside the door. Upon manual actuation of the lock bolt in this way, the position sensor 5 acts upon the legitimacy comparator 8 in a manner such that said comparator no longer accepts, for example, a service card, but only master cards and guest cards. This function can be employed when a guest does wish to be disturbed. If the hotel room is furnished with a safe, in which a guest's valuables can be kept, the safe lock can be designed so thatthe position sensor 5 is constantly activated, whereupon the safe can only be opened with a guest card and a master card. In this respect, the position sensor 5 may also be arranged to act upon the legitimacy comparator 8 in a manner such that the comparator will not accept a guest card provided with an override code of the aforementioned kind.
  • So that the locks will not be effected by a power failure, the locks of a lock system according to the invention are suitably supplied with power from individual batteries. When a lock is taken out of operation or removed from the system, e.g. for repair, change of batteries, or to change a whole lock, the repaired or new lock can be readily made operable, by connecting it temporarily to the programming or write-in apparatus, such as to insert the requisite system and lock identification data into the memory of said lock. At the same time, the clock 7 of the lock is synchronised with the real-time clock in the programming apparatus.
  • As will be understood it is possible to incorporate many further functions in a lock system according to the invention, and that such a system can be designed in various ways for different purposes of use.
  • Although not expressly mentioned in the aforegoing, it will be understood that the magnetic card 1 can be reprogrammed and used a repeated number of times, simply by presenting the card to the aforedescribed programming and write-in apparatus each time the card is to be renewed. In this respect, the programming and write-in apparatus is advantageously designed to record therein the number of times an individual card has been renewed and fresh data registered therein. In this way, it is possible to estimate when a card has been used so many times that there is danger of it being worn to such an extent as to render the card unserviceable and unreliable.

Claims (5)

1. A lock system including at least one lock and at least one key for unlocking the lock, in which
the key comprises a card (1) provided with magnetically registered data (2), said data including a lock identification allotted to the lock, a validity time for the card and a randomly selected legitimacy code allotted individually to the card,
the lock includes a locking mechanism (4) having electrically actuable means for unlocking the same, a magnetic-card reader (3) arranged to receive a card (1) of the aforementioned kind and to read the data registered thereon, a memory (6) containing said lock-identification data and capable of storing card data of the aforementioned kind, comparison means (8, 9) for comparing the data stored in said memory (6) with data read from said card by means of said magnetic-card reader (3) and for acting upon the locking mechanism (4) in response to said comparison, and a programming unit (10) for entering data into said memory (6) and for changing the data content of said memory, characterized in that
the validity time for the card registered on the card is expressed in real time;
the lock includes a real-time clock (7);
said comparison means of the lock includes a legitimacy comparator (8) and a time comparator (9);
and in that upon insertion of a card of the aforementioned kind in the card reader (3),
a) the time comparator (9) is arranged to compare the real time given by the real-time clock (7) with the validity time in the card data stored in the memory (6) and the legitimacy comparator (8) is arranged to compare the data registered on said card with the card data stored in the memory (6), the locking mechanism (4) being caused to take its unlocked state if all said comparisons are in agreement and thus indicating legitimate subsequent use of the card;
b) whereas, if the comparison made by the time comparator (9) between the real time given by the real-time clock (7) and the validity time in the card data stored in the memory (6) indicates disagreement, or no card data is stored in the memory (6), thus indicating that the lock is not currently programmed to be opened by any card with a running and unexpired validity time, the time comparator (9) is arranged to compare the validity time registered on said card with the real time given by the real-time clock (7), and the legitimacy comparator (8) is arranged to compare the lock-identification data registered on said card with the lock-identification data stored in the memory (6), and if these comparisons are in agreement, thus indicating that the card is used legitimately and for the first time, the lock mechanism (4) is caused to take its unlocked state and the programming unit (10) is caused to remove any card date already stored in the memory and to store the data registered on said card in the memory (6).
2. A lock system according to claim 1, characterized in that the data registered on the card may also include a separate override code, which the legitimacy comparator (8) in the lock is arranged to detect, when the card is introduced to the magnetic-card reader (3), in which case, if the aforementioned comparison made by the time comparator (9) between the real time given by the real-time clock (7) and the validity time stored in the memory (6) results in agreement, whereas the aforesaid comparison made by the legitimacy comparator (8) between the data registered on the card and the card data stored in the memory (6) indicates disagreement, thus indicating that the lock is already programmed to be opened by a different card having a running and unexpired validity time, the time comparator (9) is arranged to compare the validity time registered on the first mentioned card with the real time given by the real-time clock (7), and the legitimacy comparator (8) is arranged to compare the lock-identification data registered on said first mentioned card with the lock-identification data stored in the memory and, if these comparisons are in agreement, thus indicating that said first mentioned card is used legitimately for the first time and is authorized to replace said different card, the lock mechanism (4) is caused to take its unlocked state and the programming unit (10) is caused to replace the card data previously stored in the memory (6) with the card data registered on said first mentioned card.
3. A lock system according to claim 1 or claim 2 and including a plurality of locks, characterized in that mutually different locks have mutually different lock-identification codes stored in their memories and also a system-identification code common for the whole of the system; in that all the magnetic cards intended for unlocking respective locks in the system also contain said system identification in the data registered on the card, the legitimacy comparators (8) in respective locks being arranged to compare the system-identification code registered on an inserted card with the system-identification code stored in the memory (6) of said lock in the same manner as the comparison between the lock identification code registered on an inserted card and the lock-identification code stored in the memory of said lock.
4. A lock system according to claim 3, characterized in that it includes at least one further magnetic card, whose registered data contains, in addition to said system identification, a validity time expressed in real time and a randomly selected legitimacy code, also a lock identification which is so formed as to coincide with lock identification data stored in the memories in a pre-determined number of the locks incorporated in the system, so that said card can be used for unlocking said pre-determined number of locks.
5. A lock system according to claim 3, characterized in that it includes at least one further magnetic card, whose registered data includes said system identification, a lock identification valid for a given lock or a number of given locks in the system, and a validity time expressed in real time, but no randomly selected legitimacy code, but merely a code which identifies this type of additional card, wherewith the legitimacy comparator (8) incorporated in a lock is arranged, when said additional card is introduced to the card reader (3) of said lock, to detect said code identifying said card type, wherewith the legitimacy comparator is arranged to compare the system and lock identification data registered on the card with the system and lock identification data registered in the memory (6) of the lock, and the time comparator (9) of said lock is arranged to compare the validity time registered on the card with the real time given by the real-time clock (7) and, when all the comparisons are in agreement with another, to cause the lock mechanism (4) to take an unlocking state.
EP84850102A 1983-04-08 1984-03-30 A lock system Expired EP0122244B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT84850102T ATE34796T1 (en) 1983-04-08 1984-03-30 LOCK SYSTEM.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE8301957 1983-04-08
SE8301957A SE8301957D0 (en) 1983-04-08 1983-04-08 Locking system

Publications (3)

Publication Number Publication Date
EP0122244A2 EP0122244A2 (en) 1984-10-17
EP0122244A3 EP0122244A3 (en) 1985-03-27
EP0122244B1 true EP0122244B1 (en) 1988-06-01

Family

ID=20350718

Family Applications (1)

Application Number Title Priority Date Filing Date
EP84850102A Expired EP0122244B1 (en) 1983-04-08 1984-03-30 A lock system

Country Status (6)

Country Link
EP (1) EP0122244B1 (en)
JP (1) JPS59199972A (en)
AT (1) ATE34796T1 (en)
CA (1) CA1217546A (en)
DE (1) DE3471712D1 (en)
SE (1) SE8301957D0 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6842105B1 (en) 1985-10-16 2005-01-11 Ge Interlogix, Inc. Dual mode data logging
WO2006021047A1 (en) * 2004-08-27 2006-03-02 Honeywell Limited An access control system and a method of access control
US8232860B2 (en) 2005-10-21 2012-07-31 Honeywell International Inc. RFID reader for facility access control and authorization
US8351350B2 (en) 2007-05-28 2013-01-08 Honeywell International Inc. Systems and methods for configuring access control devices
US8598982B2 (en) 2007-05-28 2013-12-03 Honeywell International Inc. Systems and methods for commissioning access control devices
US8707414B2 (en) 2010-01-07 2014-04-22 Honeywell International Inc. Systems and methods for location aware access control management
US8787725B2 (en) 2010-11-11 2014-07-22 Honeywell International Inc. Systems and methods for managing video data
US8878931B2 (en) 2009-03-04 2014-11-04 Honeywell International Inc. Systems and methods for managing video data
US9019070B2 (en) 2009-03-19 2015-04-28 Honeywell International Inc. Systems and methods for managing access control devices
US9280365B2 (en) 2009-12-17 2016-03-08 Honeywell International Inc. Systems and methods for managing configuration data at disconnected remote devices
US9344684B2 (en) 2011-08-05 2016-05-17 Honeywell International Inc. Systems and methods configured to enable content sharing between client terminals of a digital video management system

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2580715B1 (en) * 1985-04-23 1991-09-20 Ferco Int Usine Ferrures CODING DEVICE OF AN ELECTROMECHANICAL HANDLING DEVICE CONTROLLED BY A CODE
GB8517347D0 (en) * 1985-07-09 1985-08-14 Lowe & Fletcher Ltd Operating security device & data carriers
GB2178211B (en) * 1985-07-22 1989-08-09 City Wheels Ltd Control system
JPS62148781A (en) * 1985-12-21 1987-07-02 松下電工株式会社 Unlocking system by card
JPH0697475B2 (en) * 1986-02-21 1994-11-30 オムロン株式会社 Electronic cash register
NO300045B1 (en) * 1990-12-03 1997-03-24 Trioving As Time controlled electrically controlled locking system
NL9300566A (en) * 1993-03-31 1994-10-17 Nedap Nv Access granting system with decentralized authorizations.
FR2722596A1 (en) * 1994-07-13 1996-01-19 France Telecom SYSTEM FOR CONTROLLING ACCESS LIMITED TO AUTHORIZED AND RENEWABLE TIME PLACES USING A PORTABLE MEMORY MEDIUM
FR2738436B1 (en) * 1995-03-06 1997-11-21 Novella Carmelo PORTABLE ELECTRONIC KEY ACCESS CONTROL SYSTEM
DE19518957C1 (en) * 1995-05-23 1996-11-21 Leicher Gmbh & Co Safety deposit box operating system
DE19527597C2 (en) * 1995-07-28 1999-01-21 Good Night Inn Motel Managemen System and method for the temporary activation of energy of at least one electrical or electronic device
IES950815A2 (en) * 1995-10-18 1995-12-27 Canmoy Holdings Ltd A resource controller
FR2760874B1 (en) * 1997-03-11 2000-10-13 Fdi Matelec Sa NOUCEN
FR2773405B1 (en) * 1998-01-08 2000-09-29 France Telecom METHOD AND SYSTEM FOR CONTROLLING ACCESS TO A RESOURCE LIMITED TO CERTAIN TIME RANGES
CA2240881C (en) * 1998-06-17 2007-12-04 Axs Technologies Inc. Shared intelligence automated access control system
FR2786903B1 (en) * 1998-12-03 2002-11-15 France Telecom METHOD AND SYSTEM FOR CONTROLLING ACCESS TO A RESOURCE LIMITED TO CERTAIN TIME RANGES FROM A DYNAMIC COUNTER
US6809628B1 (en) 1999-03-29 2004-10-26 Aaron Bensimon Personal or personalizable device for the conditional use of electric or electronic appliances, method of use
EP2332386A4 (en) 2008-09-30 2014-07-23 Honeywell Int Inc Systems and methods for interacting with access control devices
US9894261B2 (en) 2011-06-24 2018-02-13 Honeywell International Inc. Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US10362273B2 (en) 2011-08-05 2019-07-23 Honeywell International Inc. Systems and methods for managing video data
WO2013020165A2 (en) 2011-08-05 2013-02-14 HONEYWELL INTERNATIONAL INC. Attn: Patent Services Systems and methods for managing video data
US10523903B2 (en) 2013-10-30 2019-12-31 Honeywell International Inc. Computer implemented systems frameworks and methods configured for enabling review of incident data
AU2018241628B2 (en) 2017-03-31 2022-03-17 Basf Se Pyrimidinium compounds and their mixtures for combating animal pests
WO2018219797A1 (en) 2017-06-02 2018-12-06 Basf Se Substituted oxadiazoles for combating phytopathogenic fungi
KR20200112816A (en) 2017-12-20 2020-10-05 피아이 인더스트리스 엘티디. Preparation and use of fluorine alkyl compounds

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2129136A5 (en) * 1971-03-16 1972-10-27 Ho Boehme Inc
JPS533797A (en) * 1976-06-30 1978-01-13 Nippon Keibi Hosho Kk Safety locking system
CA1101513A (en) * 1976-11-08 1981-05-19 Leonard J. Genest Security system
JPS5851593B2 (en) * 1979-03-05 1983-11-17 オムロン株式会社 How to unlock using a card
US4238805A (en) * 1979-09-12 1980-12-09 The Mead Corporation Ink jet printer startup and shutdown procedure
US4385231A (en) * 1980-06-27 1983-05-24 Omron Tateisi Electronics Co. Unlocking system for use with cards
JPS57130679A (en) * 1981-02-02 1982-08-13 Itoki Kosakusho Chamber managing system facilitating alteration of chamber entering condition
JPS6019394B2 (en) * 1981-09-28 1985-05-16 オムロン株式会社 Card type automatic locking device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6842105B1 (en) 1985-10-16 2005-01-11 Ge Interlogix, Inc. Dual mode data logging
WO2006021047A1 (en) * 2004-08-27 2006-03-02 Honeywell Limited An access control system and a method of access control
US8232860B2 (en) 2005-10-21 2012-07-31 Honeywell International Inc. RFID reader for facility access control and authorization
US8941464B2 (en) 2005-10-21 2015-01-27 Honeywell International Inc. Authorization system and a method of authorization
US8351350B2 (en) 2007-05-28 2013-01-08 Honeywell International Inc. Systems and methods for configuring access control devices
US8598982B2 (en) 2007-05-28 2013-12-03 Honeywell International Inc. Systems and methods for commissioning access control devices
US8878931B2 (en) 2009-03-04 2014-11-04 Honeywell International Inc. Systems and methods for managing video data
US9019070B2 (en) 2009-03-19 2015-04-28 Honeywell International Inc. Systems and methods for managing access control devices
US9280365B2 (en) 2009-12-17 2016-03-08 Honeywell International Inc. Systems and methods for managing configuration data at disconnected remote devices
US8707414B2 (en) 2010-01-07 2014-04-22 Honeywell International Inc. Systems and methods for location aware access control management
US8787725B2 (en) 2010-11-11 2014-07-22 Honeywell International Inc. Systems and methods for managing video data
US9344684B2 (en) 2011-08-05 2016-05-17 Honeywell International Inc. Systems and methods configured to enable content sharing between client terminals of a digital video management system

Also Published As

Publication number Publication date
SE8301957D0 (en) 1983-04-08
JPS59199972A (en) 1984-11-13
EP0122244A2 (en) 1984-10-17
ATE34796T1 (en) 1988-06-15
EP0122244A3 (en) 1985-03-27
DE3471712D1 (en) 1988-07-07
CA1217546A (en) 1987-02-03

Similar Documents

Publication Publication Date Title
EP0122244B1 (en) A lock system
EP0043270B1 (en) Unlocking system for use with cards
CA1101513A (en) Security system
US5670940A (en) Electronic lock system with occupancy block
EP0548963B1 (en) Locking system
JPS60195280A (en) Electronic lock controller
NO300045B1 (en) Time controlled electrically controlled locking system
WO2001042598A1 (en) Key control system for electronic locks
JP5274197B2 (en) Digital key box
US4727975A (en) Use-control system
GB2126647A (en) Recodable electronic locks
US7242276B2 (en) Method and system for unlocking doorway
US7337469B2 (en) Method and system for unlocking doorway
EP0250101B1 (en) Electronic locking devices
JP2008191729A (en) Information rewriting system for authentication stored in information storage medium
JPS62119668A (en) Card processing system
JPS5921423B2 (en) Unlocking equipment using a card
JPH0666058A (en) Lock system for hotel guest room
JPS6046233B2 (en) Key and lock management device
EP0246903B1 (en) A method for clearing unlocking key codes in an electronic locking device
JP3615787B2 (en) Home delivery storage rocker system
JPS5883776A (en) Lock system
JPS58120972A (en) Room-entry control in hotel
WO2002019277A1 (en) Method and system for unlocking doorway
JPH0656414U (en) Storage

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): AT BE CH DE FR GB IT LI NL SE

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): AT BE CH DE FR GB IT LI NL SE

17P Request for examination filed

Effective date: 19850907

17Q First examination report despatched

Effective date: 19860703

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: BESAM SECURITY AKTIEBOLAG

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE FR GB IT LI NL SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Effective date: 19880601

Ref country code: LI

Effective date: 19880601

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 19880601

Ref country code: CH

Effective date: 19880601

Ref country code: BE

Effective date: 19880601

Ref country code: AT

Effective date: 19880601

REF Corresponds to:

Ref document number: 34796

Country of ref document: AT

Date of ref document: 19880615

Kind code of ref document: T

REF Corresponds to:

Ref document number: 3471712

Country of ref document: DE

Date of ref document: 19880707

ET Fr: translation filed
REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

26 Opposition filed

Opponent name: OY WAERTSILAE AB

Effective date: 19890301

PLBN Opposition rejected

Free format text: ORIGINAL CODE: 0009273

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: OPPOSITION REJECTED

27O Opposition rejected

Effective date: 19940110

EAL Se: european patent in force in sweden

Ref document number: 84850102.9

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19990308

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19990318

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 19990319

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 19990322

Year of fee payment: 16

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000330

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000331

EUG Se: european patent has lapsed

Ref document number: 84850102.9

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20000330

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001130

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010301