throbber
US007012503B2
`
`(19) United States Patent
`Nielsen
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,012,503 B2
`Mar. 14, 2006
`
`(54) ELECTRONIC KEY DEVICE A SYSTEM AND (56)
`A METHOD OF MANAGING ELECTRONIC
`KEY INFORMATION
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`(75) Inventor; Ernst Lykke Nielsen, Kgjge (DK)
`
`-
`.
`'
`(73) Asslgnee' Bordlng Data A/S’ Glostrup (DK)
`
`6/1987 Genest ..................... .. 235/487
`4,677,284 A *
`5/1989 Clark et a1. .......... .. 340/825.31
`4,829,296 A
`5/1990 Stapley et a1. .............. .. 70/277
`4,926,665 A
`3/1995 Saliga ......... ..
`235/382.5
`5,397,884 A
`5,473,318 A * 12/1995 Martel . . . . . . .
`. . . . .. 340/5.23
`
`5,668,876 A *
`
`9/1997 Falk et a1. ................ .. 380/271
`
`.
`_
`(*) Notlce-
`
`.
`.
`.
`.
`igggftigoeirtlg?sglilrrnaeglife$111153“;
`
`5,905,446 A
`5,909,199 A *
`
`5/1999 Benore et a1. ....... .. 340/825.34
`6/1999 Borgstahl a a1. .... .. 340/825.22
`
`U.S.C. 154(b) by 270 days.
`
`(Continued)
`
`(21) Appl. N0.:
`
`10/129,963
`
`FOREIGN PATENT DOCUMENTS
`
`(22) PCT Filed:
`
`Nov. 30, 2000
`
`DE
`
`196 44 237
`
`4/1998
`
`(86) PCT N0.:
`
`PCT/DK00/00655
`
`(§2)37(14)(C]))(a1t)e’_ Ma 21 2002
`’
`'
`y
`’
`
`(Continued)
`Primary Examiner—Michael Horabik
`Assistant Examiner—Nam Nguyen
`(74) Attorney, Agent, or Firm—Jacobson Holman PLLC
`
`(87) PCT Pub. N0.: WO01/40605
`
`(57)
`
`ABSTRACT
`
`PCT Pub. Date: Jun. 7, 2001
`
`65
`(
`)
`
`-
`-
`-
`D t
`t
`P bl
`P
`nor u lea Ion a a
`US 2002/0180582 A1
`D60 5, 2002
`_
`_
`_
`_
`_
`Forelgn Apphcatlon Prlorlty Data
`(30)
`Nov. 30 1999 (DK) ............................. .. 1999 01714
`’
`(51) Int (1
`(200601)
`G05B 19/00
`(200601)
`G061: 7/00
`(200601)
`G08B 29/00
`(200601)
`H04B 1/00
`(52) US. Cl. ................... .. 340/5.6; 340/561; 340/564;
`340/565
`340/5 6
`(58) Field of Classi?cation Search
`340/561, 5.62, 5.64, 5.65, 5.66, 5.7, 5.23,
`340/5.1; 70/63, 168, 277; 109/59, 64; 455/557
`See application ?le for complete search history.
`
`An ef?cient method and a system for controlling access to a
`location secured by a lock mechanism controlled by a lock
`control unit, Which may provide a high degree of ?exibility
`and a high level of security. The method includes the steps
`of storing a ?rst access code in the lock control unit, the ?rst
`access Code being indicative of a predetermined access right
`to the location, and storing a plurality of access codes
`including a second access code in an electronic key device.
`Using the electronic key device, access to the location is
`requested by initiating transmission of the second access
`code to the lock control unit Where the transmitted second
`access code is compared With the ?rst access code and, if the
`?rst a‘fcess Code Corresponds_ to 1h? §8C0nd access C0de>
`operation of the lock mechamsm is initiated. The user can
`edit and rearrange the plurality of access codes to obtain
`access to a plurality of locations.
`
`38 Claims, 14 Drawing Sheets
`
`access code
`management
`system
`
`211
`
`communications
`network
`
`225
`
`communication
`unit
`
`222
`
`\
`
`.
`recewer
`
`lllllll.
`
`231
`
`lock control
`interface
`
`Lock
`mechanism
`
`UniKey Exhibit 1005, Page 1
`
`

`

`US 7,012,503 B2
`Page 2
`
`US. PATENT DOCUMENTS
`
`340/5 61
`8/1999 Chin
`5 942 985 A *
`5,964,877 A * 10/1999 Victor et a1. .............. .. 713/202
`6,038,666 A *
`3/2000 Hsu et a1. ................. .. 713/186
`*
`6,097,306 A
`8/2000 Leon et a1.
`340/5.1
`.
`6,359,547 B1 *
`3/2002 Denlson et a1. .......... .. 340/5.73
`*
`6,484,260 B1
`11/2002 Scott et a1. ............... .. 713/186
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`EP
`FR
`WO
`WO
`WO
`W0
`WO
`
`W0
`
`0 410 024
`
`0 810 559
`2 738 436
`93/14571
`94/01963
`95/25391
`96/O1542
`97/22772
`
`98/25000
`
`1/1991
`
`12/1997
`3/1997
`7/1993
`1/1994
`9/1995
`1/1996
`6/1997
`
`6/1998
`
`DE
`
`197 48 054
`
`5/1999
`
`* cited by examiner
`
`UniKey Exhibit 1005, Page 2
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 1 0f 14
`
`US 7,012,503 B2
`
`mobile
`phone
`
`lock at
`subscriber's
`residence
`
`newspaper
`
`service
`staff
`
`FIG. 1b
`
`access
`
`UniKey Exhibit 1005, Page 3
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 2 0f 14
`
`US 7,012,503 B2
`
`209
`
`FIG. 2C]
`...|||IIIIIIIIIHHHHHIH
`
`receiver
`
`22602
`
`\
`227 226 /
`
`O
`0
`
`222
`
`0000
`000 0
`226b//8
`Memory
`/
`224 223
`lock control /
`interface
`
`221 \
`
`CPU
`
`Lock
`231 / mechanism
`
`m a a m
`
`s w a way n s
`mmm
`at am
`
`1 2
`
`FIG. 2b
`
`225
`
`w
`
`m n r
`
`communications
`network
`
`24-1
`
`mu 2\0 m
`mm m m 2
`/ %\ loi m
`.m m
`n MM /
`
`6 2
`
`M oooo 0W 2 m m 0000 m mm km
`0000 m m." m a
`02mm Lm
`
`UniKey Exhibit 1005, Page 4
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 3 0f 14
`
`US 7,012,503 B2
`
`FIG. 2c
`
`225
`
`_
`
`_
`
`unit
`
`2 2 5
`\
`A‘
`cOmmunication O
`0000 0000 0000
`
`access code
`management
`system
`21 1
`
`communications
`network
`
`222 \
`221 \\ CPU
`lock control
`interface
`
`Memory‘
`
`/
`2 2 3
`
`224
`
`23 1
`
`Lock
`mechanism
`
`FIG. 4
`
`412
`41 1
`410
`/
`/
`/
`validity daily access Number of
`period
`periods
`allowed
`entries
`
`413
`/
`report
`attributes
`
`
`
`
`
`
`
`
`
`401 \ Access Lock control Key device Administrator Type of access Access 402 ____ \ ------------------------- __ \ 404 ------------------------- _. \
`
`
`
`
`
`
`
`
`
`
`
`code ID
`
`unit ID
`
`ID
`
`ID
`
`rights
`
`code
`attributes
`
`----------------------- "
`
`\405 " ~_
`
`access
`
`right
`
`access
`
`conditions
`
`7”
`
`'
`
`‘
`
`'
`
`\ T
`407
`408
`
`\
`409
`
`UniKey Exhibit 1005, Page 5
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 4 0f 14
`
`US 7,012,503 B2
`
`FIG. 3
`352
`/
`
`351
`/
`
`353
`/
`
`administrator
`
`access right owner
`
`access right grantee
`
`383
`/
`enerate access
`g
`codes
`
`' / 384
`
`store access right
`data
`
`v / 385
`transfer access
`code to lock control
`unit
`
`v / 386
`
`transfer access
`code to ke device
`y
`
`/ 389
`'09 atFcess da'ta and ‘
`deliver services
`
`t
`
`Start
`
`)
`
`‘y / 38 1
`
`define access rights
`
`382
`v /
`authmise
`administration of
`access codes
`
`/ 387
`
`receive access
`
`'
`
`Code on key
`device
`
`l L
`388
`access location
`
`/39O
`
`~ receive services
`
`‘
`
`1
`
`stop )
`
`UniKey Exhibit 1005, Page 6
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 5 0f 14
`
`US 7,012,503 B2
`
`FIG. 50
`
`504
`
`Electronic Key Device
`
`\ Look No. 175
`
`/_ 501
`
`Control
`Unit \
`
`XR/
`RCVR
`\— 505
`
`Memory\
`
`31M \
`Card
`
`\J
`
`ROM ff" T‘
`
`\\
`
`\
`
`506
`
`/
`
`\
`5070 \507b
`
`507
`
`RAM/EPROM
`
`UniKey Exhibit 1005, Page 7
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 6 0f 14
`
`US 7,012,503 B2
`
`FIG. 5b
`
`Electronic. Key Device
`
`Lock No. 175
`
`/
`
`501
`
`Control
`Unit
`
`\- 505
`
`Memory \
`
`‘
`
`ROM \xd
`
`—- 508
`
`\\
`506 _/ 5070
`
`\ \ \— 507
`507b
`
`RAM/EPROM
`
`UniKey Exhibit 1005, Page 8
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 7 0f 14
`
`US 7,012,503 B2
`
`FIG. 60
`
`601
`/
`
`key device
`
`/ 621
`
`lock control unit
`
`694
`
`(enter accessj
`
`codes
`v / 695
`
`697
`
`(enter access;
`
`codes
`v
`
`/698
`
`enter access codes
`
`enter access codes
`
`‘7
`
`/ 696
`
`store access codes
`
`@
`
`687
`
`( access control )
`
`‘y /688
`transfer access code
`to object
`
`692
`/
`store log data :
`
`sir;
`
`/ 699
`
`V
`
`store access codes
`
`V
`stop )
`
`(
`
`689
`/
`verify access
`code
`
`access
`code
`valid?
`
`No
`
`Y
`is /690
`operate lock
`#
`: store log data
`I
`
`691
`
`UniKey Exhibit 1005, Page 9
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 8 0f 14
`
`US 7,012,503 B2
`
`FIG. 6b
`
`601
`/
`
`61 1
`/
`
`621
`/
`
`.
`
`key devlce
`
`access code
`
`management system
`
`lock control umt
`
`-
`
`access code
`
`(
`
`transfer
`
`681
`
`3
`
`/
`receive and store
`access code
`
`‘
`‘
`
`—-—-————I-
`
`/
`v
`transfer access code
`to lock control unit
`685
`/
`/ 684
`transfer access code _> receive and store
`to key devlce
`access code
`
`.
`
`-
`
`687
`
`( access control )
`
`688
`v /
`transfer access code
`to object
`
`689
`/
`_ verify access
`code
`
`679
`/
`store log data ‘
`
`operate lock
`Jr
`send log data
`l
`
`693
`
`UniKey Exhibit 1005, Page 10
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 9 0f 14
`
`US 7,012,503 B2
`
`601
`/
`
`key device
`
`FIG. BC
`611
`/
`access code
`management system
`
`621
`/
`
`lock control unit
`
`672
`
`contact access code
`management system
`
`identify user device
`
`/674
`
`select access code
`
`,673
`‘y
`display available
`access codes
`
`‘y
`
`/ 675
`
`/ 676
`
`677
`/
`
`.
`activate access code
`
`contact lock control
`.
`un|t
`
`e
`
`contact key
`.
`device
`
`/ 688
`transfer access code i
`to lock control unit
`‘
`L
`
`689
`/
`verify access
`code
`
`'
`
`operate lock
`
`679
`/
`store log data 1
`
`693
`t
`send log data
`J
`
`@
`
`UniKey Exhibit 1005, Page 11
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 10 0f 14
`
`US 7,012,503 B2
`
`management
`system
`
`‘é
`9;,
`
`(II
`0
`o
`O.
`0
`
`721
`
`FIG. 7 b
`
`access code
`
`71 1
`
`access code
`management
`
`key device
`
`re uest
`q
`
`701
`
`721
`
`lock
`control
`unit
`
`UniKey Exhibit 1005, Page 12
`
`

`

`U.S. Patent
`
`Mar. 14, 2006
`
`Sheet 11 0f 14
`
`US 7,012,503 B2
`
`key device
`
`management
`
`FIG. 7d
`
`key device
`
`access code
`management
`
`UniKey Exhibit 1005, Page 13
`
`

`

`U
`
`4,
`1
`
`Sheet 12 0f 14
`
`US 7,012,503 B2
`
`s“ ‘8
`
`a \
`
`n “a Illlllllll\\\\\\ w and 00x
`
`P ~.\\\, ?u
`
`t -\ III \\\
`
`Q0 06
`
`m J 88 338 . M a/ ‘R
`
`rill \\\
`
`'4 \\
`
`W l
`
`2 _LI
`
`6 G
`
`0
`
`key device
`
`management
`
`UniKey Exhibit 1005, Page 14
`
`

`

`US. Patent
`
`Mar. 14, 2006
`
`Sheet 13 0f 14
`
`US 7,012,503 132
`
` ..:o_mm_Emcm:m38wwmoommmmuoo888mMm_.m239:mm2288m528%?mm$339mmuoo383mmmuoo388mNB7wm.92.m:mm.32.2‘.mmuou38anmmmuoommwuomFumma--.2:85.“EmmKm5%.m\_.35m38mmwoom._/Emmmowmuoummmoom
`
`
` unmm£30.:239:m2mmcanoemo.M6:50x02mmm/mmmmm¢owmmmm.th23—009.mfiwmmm5238..
`
`
`
`...a,...............mm.....................mam.....................
`
`.................................:3...............................
`
`I.
`
`-----—-- -----—--~-----.-—-----—------------__—---_-_----------———l
`
`UniKey Exhibit 1005, Page 15
`
`UniKey Exhibit 1005, Page 15
`
`
`

`

`US. Patent
`
`Mar. 14, 2006
`
`Sheet 14 0f 14
`
`US 7,012,503 132
`
`6:80xoo.
`
`2:38
`
`
`
`muoowmwoom
`
`c0285.?
`
`235E
`
`muoommmuom
`
`8389
`
`0:69:
`
`mum
`
`52.8$8888EKw
`32:38
`
`228E
`
`mnoommmoom
`
`o-------------------J
`
`250888
`
`SE.m:
`
`wnoo3.88.
`
`REES
`
`228E
`
`onowwwoom
`
`Co_mm_Emcm.=
`
`253E
`
`mom.vmw
`
`239:m2
`
`gm.o_.._
`
`32:38,
`
`2.69:
`
`_———-- ------—------------------—— ----—————----—-------- -q—n-n-l
`
`m
`
`M
`
`
`
`225:.8.38:63
`
`
`
`238.:835m
`
`Cwohm
`
`muoo388
`
`2062838“
`
`230E
`
`38$88
`
`cozflmcmm
`
`225E
`
`EmEmmmcmEmEm.8388
`
`iw
`
`225E
`
`$3931)}
`
`mrw
`
`5502oothE
`
`3.0%m
`
`__—_—____—__—-_-—_-_-__-_—--------J
`
`UniKey Exhibit 1005, Page 16
`
`UniKey Exhibit 1005, Page 16
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`US 7,012,503 B2
`
`1
`ELECTRONIC KEY DEVICE A SYSTEM AND
`A METHOD OF MANAGING ELECTRONIC
`KEY INFORMATION
`
`This is a nationalization of PCT/DK00/00655 ?led Nov.
`30, 2000 and published in English.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The invention relates to a method of controlling access to
`a location, Where access to the location is restricted by a lock
`mechanism. Further the invention relates to an access con
`trol system Which alloWs suppliers of goods or services to
`access a location, Which Would otherWise prevent delivery
`of the goods or the services. Further the invention relates to
`an electronic key device, a lock control unit and a computer
`system for use in such a system, a storage module for use in
`such an electronic key device, and a method of managing a
`predetermined access right to a location.
`2. Description of the Related Art
`Particularly in blocks of ?ats or companies it is common
`that a number of outer or front doors or intermediate doors
`must be passed before getting to a point of service, such as
`an apartment door, a mailbox, a service station or a meter for
`appliances, an area to be cleaned, etc. For example in case
`of delivery of neWspapers, the delivery man often has to gain
`access to a stairWay in order to be able to deliver the
`neWspapers at the locked private doors or put them into the
`letter boxes. It frequently causes great difficulties to the
`delivery men to ?nd the correct keys in a large bundle of
`keys, and the locks are frequently exchanged Without the
`delivery company being informed of this. For reasons of
`security it is also more and more common to lock doors or
`gates to backyards, residential areas or company properties,
`Where for example refuse containers may be placed, so that
`the refuse collection ?rms have a problem quite similar to
`the ?rms Which deliver neWspapers. It Will be appreciated
`that similar problems are faced by:
`postmen
`cleaning companies
`emergency physicians
`home help and other care Workers
`policemen
`?remen
`artisans
`caretakers/superintendents
`and others.
`Some of the above service providers require access on a
`daily basis, such as postmen, some may require access at
`certain time periods, such as on certain Weekdays or at
`certain times of the day, for example a neWspaper delivery
`man may require access betWeen 6 am. and 9 am. Further
`more, different services/deliveries may require different
`access rights, for example ?remen, security companies or
`police may require access to all facilities, While a mailman
`only requires access to a mailbox.
`International patent application WO 93/14571 discloses a
`secure entry system utilising a cellular telephone as an
`electronic key device. In this prior art system a user operates
`the cellular telephone to transmit RF signals to a lock,
`alloWing a user to operate the buttons on the telephone as he
`Would buttons on a key card to gain access to the secured
`area. The lock checks Whether the user identi?ed by the
`button operations is on a list of authorised users maintained
`in the lock memory.
`
`10
`
`15
`
`25
`
`35
`
`40
`
`45
`
`55
`
`65
`
`2
`storing a ?rst access code in the ?rst storage means, the
`?rst access code being indicative of a predetermined access
`right to the location;
`storing a second access code in a second storage means;
`using an electronic key device for requesting access to the
`location by initiating transmitting the second access code
`from the second storage means to the lock control unit;
`comparing the transmitted second access code With the
`?rst access code stored in the ?rst storage means; and
`
`SUMMARY OF THE INVENTION
`
`if the ?rst access code corresponds to the second access
`code, initiating operating the lock mechanism.
`Consequently, it is an advantage of the invention that a
`plurality of different access codes to different buildings may
`be stored and related to one or more electronic key devices,
`providing a ?exible Way of customising an access right
`pro?le for each electronic key device.
`It is another advantage of the invention that each lock
`control unit may be provided With a speci?c set of valid
`access codes for that particular lock control unit. Therefore,
`a high degree of advanced functionality may be imple
`mented by the method according to the invention, such as
`different security levels for a given building, self-destructive
`access codes, conditioned access codes, access codes for
`limited periods of times, etc.
`It is a further advantage of the invention that the access
`right pro?le of individual electronic key devices and lock
`control units may be changed on short notice or in regular or
`random time intervals in order to increase the security of the
`access control.
`Hence, it is a problem of the above prior art system that
`it requires a manual entering of some sort of user identi?
`cation code alloWing the lock to check Whether the identi?ed
`user is on the list of authorised users. HoWever, a manual
`entering of such a code is a lengthy process, in particular if
`the code is suf?ciently long in order to provide suf?cient
`security. The entering of the code requires some time and, in
`particular, in case of erroneous entering of a code, access
`may be denied requiring a repetition of the manual entering.
`Thus an object of the invention is to provide an ef?cient
`method and a system for controlling access to a location
`secured by a lock mechanism controlled by a lock control
`unit, Which may provide a high degree of ?exibility and a
`high level of security.
`This is achieved When a method of controlling access to
`a location secured by a lock mechanism controlled by a lock
`control unit including ?rst storage means comprising the
`steps of
`storing a ?rst access code in the ?rst storage means, the
`?rst access code being indicative of a predetermined access
`right to the location;
`storing a second access code in a second storage means of
`an electronic key device;
`using the electronic key device for requesting access to
`the location by transmitting the second access code from the
`electronic key device to the lock control unit;
`comparing the transmitted second access code With the
`?rst access code stored in the ?rst storage means; and
`if the ?rst access code corresponds to the second access
`code, initiating operating the lock mechanism is character
`ised in that
`the method further comprises the step of storing a plu
`rality of access codes for a plurality of respective locations
`
`UniKey Exhibit 1005, Page 17
`
`

`

`US 7,012,503 B2
`
`3
`in the second storage means, enabling a user to initiate
`transmitting a selected one of the stored access codes to the
`lock control unit.
`Consequently, it is an advantage of the invention that a
`plurality of different access codes to different buildings may
`be stored and related to one or more electronic key devices,
`providing a ?exible Way of customising an access right
`pro?le for each electronic key device.
`It is another advantage of the invention that each lock
`control unit may be provided With a speci?c set of valid
`access codes for that particular lock control unit. Therefore,
`a high degree of advanced functionality may be imple
`mented by the method according to the invention, such as
`different security levels for a given building, self-destructive
`access codes, conditioned access codes, access codes for
`limited periods of times, etc.
`It is a further advantage of the invention that the access
`right pro?le of individual electronic key devices and lock
`control units may be changed on short notice or in regular or
`random time intervals in order to increase the security of the
`access control.
`A location according to the invention may be a physical
`location, such as a building, an area, or some other residen
`tial, industrial, commercial or of?ce facility, Where access to
`the location is controlled by a lock mechanism, such as a
`physical lock at a door, a WindoW, a gate or the like. Access
`to the location may be controlled at a single point of entry
`or at a plurality of access points. Furthermore, a location
`may also be a part of a building, area, etc., and, according
`to the invention, access to different parts of a location may
`be controlled individually, such as at an outer gate, a front
`door, Within an elevator granting access at all or selected
`?oors, at doors to individual apartments, of?ces, sections,
`rooms, storage facilities, such as draWers, safes, etc. The
`location may be stationary, such as a building, or mobile
`such as a vehicle, a container, a ship, or the like.
`Furthermore, the location may also be an installation,
`such as a control unit of industrial facility, an electric meter,
`a computer system or the like, Where access to the location
`is controlled by a lock mechanism, such as a physical lock
`at a control box, or an electronic lock, such as a hardWare
`lock of a computer. The term access to a location may also
`comprise user access to a computer or computer program
`Where access is controlled by a softWare lock mechanism
`restricting access to a softWare application, to stored data,
`communications facilities, or the like.
`An access right according to the invention may be the
`right to interact With a location. Examples of access rights
`include the right to enter a building, an area, a facility, etc.,
`the right to operate a machine, a device, a vehicle, a
`computer, etc., the right to open or close a door, a WindoW,
`a container, a box, etc., and the right to receive or deliver
`goods, data information, etc., as long as the access right can
`be controlled by a lock mechanism.
`An access right may have certain attributes specifying
`properties of the access right. Examples of such properties
`include one or more validity periods, a security level, an
`identi?cation of related lock control units and/or electronic
`key devices, a passWord, a number of times the access right
`is valid, or any other attribute specifying a property of the
`access right.
`When the electronic key device is a mobile communica
`tions device, the method may be implemented With standard
`devices, Which may be used for regular communications
`purposes.
`
`10
`
`15
`
`25
`
`35
`
`40
`
`45
`
`55
`
`65
`
`4
`When the electronic key device comprises the second
`storage means, the transmission of the second access code to
`the lock control unit may be based upon a short range, fast
`communications channel.
`Consequently, in a preferred embodiment the method
`further comprises the step of transmitting the second access
`code from the electronic key device to the lock control unit.
`It is an advantage of this embodiment that the direct com
`munication is fast and does not need to involve an additional
`communications netWork provider.
`When the step of transmitting the second access code
`from the second storage means to the lock control unit
`comprises the step of transmitting the access code via
`Wireless data communication, a fast and convenient inter
`face betWeen the electronic key device and the lock control
`unit may be provided Without the need of physical contact.
`In a preferred embodiment of the invention the Wireless
`data communication utilises infrared data communication. It
`is an advantage of this embodiment that the communication
`may be based upon reliable standard components Which are
`available as part of many devices, such as mobile phones,
`personal digital assistants, or the like.
`When the second storage means is a removable storage
`module adapted to be removably inserted into the electronic
`key device, a standard device may be easily adapted for the
`use according to the invention and access codes may be
`transferred to the electronic key device by insertion of a
`suitable storage module.
`When the method further comprises the step of transmit
`ting, via a communications netWork, at least one access code
`from an access code management system to a selected one
`of the electronic key device and the lock control unit, access
`codes may be generated and maintained at a central com
`puter system and transmitted to the electronic key device or
`the lock control unit. It is an advantage of the invention that
`an access code may be transmitted to a plurality of electronic
`key devices and lock control units substantially simulta
`neously. Hence, a synchronisation betWeen lock control
`units and electronic key devices may be ensured at all times.
`When the method further comprises the steps of sending
`a request from the electronic key device to an access code
`management system comprising the second storage means;
`and transmitting the second access code from the access
`code management system to a selected one of the electronic
`key device and the lock control unit, the access codes do not
`need to be stored in the electronic key device and storage
`space in the electronic key device may be saved. It is another
`advantage of the invention that the use of access codes may
`be supervised and tracked by a central access code manage
`ment system.
`When the method further comprises the step of storing a
`plurality of access codes for a plurality of respective loca
`tions in the second storage means, one electronic key device
`may be used for a plurality of locations Without reducing the
`level of security.
`When the method further comprises the step of storing a
`plurality of valid access codes corresponding to a plurality
`of respective access rights in the ?rst storage means, differ
`ent types of access rights may be provided via the same lock
`control unit. This may include different security levels or
`different types of interaction or access at the location.
`When the method further comprises the step of storing in
`a third storage means information about attempts to access
`the location, a high degree of visibility about the use of the
`access codes may be provided as Well as the basis for
`additional services.
`
`UniKey Exhibit 1005, Page 18
`
`

`

`US 7,012,503 B2
`
`5
`When the access right comprises a ?rst attribute specify
`ing a property of the predetermined access right, and
`Wherein the ?rst access code comprises information about
`the ?rst attribute, access codes With additional functionality,
`such as self-destructive access codes, etc., may be generated.
`In a preferred embodiment of the invention the predeter
`mined access right has a validity period and the ?rst access
`code comprises information about the validity period.
`When the method further comprises the step of invalidat
`ing the ?rst access code, an access code may be replaced by
`a neW access code, for eXample in cases of misuse or loss of
`an electronic key device.
`As mentioned above the invention further relates to an
`access control system for controlling access to a location
`being secured by a lock mechanism, the access control
`system comprising
`an electronic key device including ?rst transmitting
`means adapted to transmit a ?rst control signal indica
`tive of a request for granting a predetermined access
`right; and
`a lock control unit including ?rst receiving means adapted
`to receive said ?rst control signal from the electronic key
`device, ?rst processing means adapted to perform a veri?
`cation of the received request, and control means adapted to
`initiate operating the lock mechanism depending on the
`result of the veri?cation;
`the system being characterised in that
`the electronic key device further comprises ?rst storage
`means adapted to store a plurality of access codes identify
`ing a plurality of predetermined access rights, enabling a
`user to initiate transmitting a selected one of the stored
`access codes to the lock control unit.
`As the above system and its preferred embodiments
`correspond to the method and its preferred embodiments
`described above and in the folloWing, and since it comprises
`corresponding advantages, not all of these advantages Will
`be described again.
`When the electronic key device further comprises ?rst
`input means for receiving data items identifying predeter
`mined access rights, a plurality of access codes for a
`plurality of locations or access rights may be input, edited,
`rearranged, or the like.
`When the electronic key device further comprises second
`input means for receiving data items input by a user, the data
`items identifying predetermined access rights, access codes
`may be input by the user.
`When the electronic key device further comprises third
`input means adapted to receive input from a user indicating
`a selection of a ?rst one of the plurality of access rights
`stored in the ?rst storage means; and display means for
`displaying information about at least one of the plurality of
`access rights stored in the ?rst storage means, a user
`interface is provided to the user for selecting a desired access
`right from a plurality of stored access rights.
`When the data items stored in the ?rst storage means
`comprise access codes for predetermined access rights, the
`lock control unit may compare received access codes With a
`plurality of stored access codes.
`Consequently, in a preferred embodiment of the invention
`a selected one of the ?rst and second control signals com
`prises a ?rst access code for the requested access right.
`In a further preferred embodiment of the invention the
`lock control unit further comprises second storage means
`adapted to store a plurality of data items corresponding to a
`plurality of access codes for respective predetermined access
`rights; and Wherein the ?rst processing means is adapted,
`upon receipt of the ?rst control signal, to compare the ?rst
`
`15
`
`25
`
`35
`
`40
`
`45
`
`55
`
`65
`
`6
`access code received via the ?rst control signal With at least
`one of the plurality of access codes stored in the second
`storage means.
`It is an advantage of the invention that it provides a high
`level of security.
`In yet another preferred embodiment of the invention the
`electronic key device is a portable communications device.
`When the ?rst receiving means is adapted to receive the
`?rst control signal, the ?rst control signal indicative of the
`request for granting the requested access right may be
`transmitted directly from the electronic key device to the
`lock control unit.
`In yet another preferred embodiment of the invention the
`?rst control signal is a Wireless data communications signal.
`In yet another preferred embodiment of the invention the
`?rst transmitting means is an infrared communications port.
`When the lock control unit further comprises fourth input
`means for receiving data items corresponding to access
`codes granting predetermined access rights, access codes
`and other related data corresponding to a plurality of access
`rights, such as different security levels, time constraints, etc.
`may be stored and easily changed in the lock control unit.
`When the lock control unit further comprises ?fth input
`means for receiving data items input by a user, the data items
`corresponding to access codes granting predetermined
`access rights, an authorised user may input, edit, or delete
`access codes stored in the lock control unit, possibly after
`providing a passWord or another security veri?cation.
`Alternatively or additionally, When the system further
`comprises computer means including
`third storage means adapted to store a plurality of data
`items corresponding to respective predetermined access
`rights and including respective access codes;
`?rst communications means adapted to transmit at least
`one access code to a selected one of the electronic key
`device and the lock control unit; and
`the selected one of the electronic key device and the lock
`control unit further comprises second communications
`means adapted to receive the transmitted at least one access
`code, access codes may be transmitted from a central access
`code management system. This may be done in response to
`a speci?c request for an access right or in order to store one
`or more access codes in the electronic key device or in the
`lock control unit.
`In yet another preferred embodiment of the invention a
`selected one of the electronic key device and the lock control
`unit further comprises third communications means for
`transmitting, to the computer means, an information signal
`indicative of information about the corresponding transmit
`ted or received request for granting the requested access
`right.
`It is an advantage of the invention that information about
`electronic key devices, access codes, access right grantees,
`the use of access codes, etc, may be acquired and maintained
`at a central service to provide optimal transparency and
`security to the access right oWner.
`In a preferred embodiment of the invention the ?rst
`communications means is adapted to transmit a second
`control signal to the lock control unit initiating invalidation
`of at least one access code.
`In a preferred embodiment of the invention the requested
`access right comprises a ?rst attribute specifying a property
`of the requested access right, and Wherein the ?rst access
`code comprises information about the ?rst attribute.
`In a preferred embodiment of the invention the requested
`access right has a validity period, and the ?rst access code
`comprises information about the validity period.
`
`UniKey Exhibit 1005, Page 19
`
`

`

`US 7,012,503 B2
`
`7
`The invention further relates to a lock control unit for use
`in a system described above and in the following, Wherein
`the lock control unit comprises
`?rst receiving means adapted to receive a control signal
`indicative of a request for granting a requested access right,
`?rst processing means adapted to perform a veri?cation of
`the received request, and control means adapted to initiate
`operating a lock mechanism depending on the result of the
`veri?cation.
`The invention further relates to an electronic key device
`for use in a system described above and in the following, the
`electronic key device including ?rst transmitting means
`adapted to transmit a ?rst control signal indicative of a
`request for granting a predetermined access right;
`Wherein the electronic key device further comprises
`?rst storage means adapted to store access codes identi
`fying a plurality of predetermined access rights, enabling a
`user to initiate transmitting a se

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket