Movatterモバイル変換


[0]ホーム

URL:


US3857018A - Controlled access systems - Google Patents

Controlled access systems
Download PDF

Info

Publication number
US3857018A
US3857018AUS00422753AUS42275373AUS3857018AUS 3857018 AUS3857018 AUS 3857018AUS 00422753 AUS00422753 AUS 00422753AUS 42275373 AUS42275373 AUS 42275373AUS 3857018 AUS3857018 AUS 3857018A
Authority
US
United States
Prior art keywords
card
user
information
gate
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US00422753A
Inventor
R Stark
R Beachem
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BUSINESS ELECTRONICS Inc
Original Assignee
BUSINESS ELECTRONICS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BUSINESS ELECTRONICS IncfiledCriticalBUSINESS ELECTRONICS Inc
Priority to US00422753ApriorityCriticalpatent/US3857018A/en
Application grantedgrantedCritical
Publication of US3857018ApublicationCriticalpatent/US3857018A/en
Anticipated expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A security system for use either as a means for establishing credit or for limiting access to restricted areas. The system operates with a card having a variable 20 by 20 row and column matrix as its internal configuration. The system may be programmed to read any number of digits in the matrix, in any combination and in any sequence. This feature allows the owner of the system to create unique card codes and to change these codes at any time. Programming is accomplished simply by closing a key switch and positioning the proper sequence of numbers on an input keyboard. The authorized holder of an identification card is assigned a unique keyboard number for his card depending on the owner''s program. Each cardholder must then use his input number which is based on his card''s internal configuration. In addition, further programming of this system provides eight levels of control. This feature allows a single installation to have up to eight increasing levels of security with no change in the card''s unique configuration. Cards may be coded for entry to one area only, to all eight areas or to any intermediate number of areas. Similarly, credit ranges can be established in the same manner. Provision is also made to selectively lock out individual cardholders.

Description

DR 9 7' 1l United Stat:
[ CONTROLLED ACCESS SYSTEMS [75] Inventors: Richard M. Stark, Long Lake;
Ronald G. Beachem, Mound, both of Minn.
[73] Assignee: Business Electronics, Inc.,
Minneapolis, Minn.
[22] Filed: Dec. 7, 1973 [21] Appl. No.: 422,753
52] US. Cl. 235/6L7 B, 340/149 A [51] Int.Cl G06k 5/00,H04q 3/00 [58] Field of Search 235/6l.7 B, 61.7 R;
[56] References Cited UNITED STATES PATENTS 3,593,291 7/l97l Carter 235/6l.7 B
3,655,947 4/1972 Yamamoto et al 235/6l.7 B
3,76l,682 9/1973 Barnes 235/617 B Primary Examiner.Daryl W. Cook Attorney, Agent, or Firm-Dorsey, Ma'rquart, Windhorst, West & Halladay [5 7] ABSTRACT A security system for use either as a means for estab- Dec. 24, 1974 lishing credit or for limiting access to restricted areas. The system operates with a card having avariable 20 by 20 row and column matrix as its internal configuration. The system may be programmed to read any number of digits in the matrix, in any combination and in any sequence. This feature allows the owner of the system to create unique card codes and to change these codes at any time. Programming is accomplished simply by closing a key switch and positioning the proper sequence of numbers on an input keyboard. The authorized holder of an identification card is assigned a unique keyboard number for his card depending on the owners program. Each cardholder must then use his input number which is based on his card's internal configuration. In addition, further programming of this system provides eight levels of control. This feature allows a single installation to have up to eight increasing levels of security with no change in the cards unique, configuration. Cards may be coded for entry to one area only, to all eight areas or to any intermediate number of areas. Similarly, credit ranges can be established in the same manner. Provision is also made to selectively lock out individual cardholders.
15 Claims, 7 Drawing Figures INSERT INSERT CARD CARD
CARD
N0 AT BOTTOM YES 1 NO'S READ INSERT DATA REJECT INSERT 2| DATA REJECT ACCEPT OUTPUT GATE CARD SOLENOID REMOVE CARD DOOR KEY svmcu PAIENIED 3. 857. 018
HEET 10F 6 Eli PATENTED 056241974 3,857. 018
SHEET 2 OF 6 '4 INSERT CARD INSERT CARD N0 AT BOTTOM YES CORRECT No SECURITY YES W INSERT DATA I5 REJECT INSERT qfzl DATA REJECT ACCEPT OUTPUT GATE I9 I8 26 l REMOVE CARD OPEN CARD SOLENOID DOOR EY SWITCH CONTROLLED ACCESS SYSTEMS BACKGROUND OF THE INVENTION Due to the advent of a cashless society and increased necessity for security controls, plastic and metallic numbered/cards are being used ever increasingly for purposes of identification. It is also an actively changing field of art in that owners of card systems are attempting to use more and more sophisticated type apparatus to prevent fraud or unauthorized entry while others, either through contests or'for illegal purposes, are increasingly more active in attempts to break the codes or systems used on credit cards and the like.
Initially cards used only embossed numbers on the surface of the card which were mechanically reproduced on a document or were read with mechanical linkages. It is believed that the art then moved to magnetically sensitive strips of tape which, although they cannot be readily duplicated with the naked eye, were read and reproduced with suitable electronic equipment. Other efforts in the field have used apertures in the card or apertures hidden in the card, again sensitive and susceptible to reproduction with the use of X-ray or other suitable equipment. Most recent advances have combined numbers on the card with code numbers memorized by the user, said user numbers being directly related to the number on the card, related to a random combination of the numbers on the card or variably related to a random combination of the numbers on the card depending on a key number which repositions the digits in different combinations.
In these systems, however, each card uses one fixed card number and the card number is a limiting factor for security. For example, with a six digit number and a three digit secret number there are only eighteen three number groupings with six arrangements of each three number grouping or a-total or maximum of 108 possibilities which may be utilized for each card number.
SUMMARY OF THE INVENTION The invention disclosed herein represents the very latest in electronic security control. It has been designed to eliminate the shortcomings of existing systems, and provide maximum security at minimum cost. All components and circuitry are contained in the single wall mounted control unit, with a sturdy, tamperproof chassis.
Access or credit is restricted to those persons with a properly encoded identification card and knowledge of a unique keyboard number for their card. Identification cards may be laminated plastic with an internal encoding pattern which is not vulnerable to heat, chemicals or electromagnetic force.
The invention is available with eight levels of control. This feature allows a single installation to have up to eight increasing levels of securitywith no change in the cards unique configuration. Cards may be coded for entry to one area only, to all eight areas, or to any intermediate number of areas. Should a user attempt to enter a secure area beyond his authorized level, a remote alarm is sounded, and the card is retained. Similarly, credit ranges can be established in the same manner.
The invention may be programmmed by the system owner to read any number of digits of a multiple row and column matrix, in any combination and in any sequence. This feature allows the owner to create unique codes for the users and to change these codes at any time. Programming is accomplished simply by closing a key switch and pushing a sequence of numbers on the input keyboard.
Each cardholder is then assigned and must use an input number which is based on his cards internal configuration. it is not possible to decipher the number by opening a card since the user never knows what all the digits are, which digits are being read, nor the order of reading. The encoding technique allows for a total of several thousand possible number combinations per card.
Provision is also made to selectively lock out individual cardholders. This feature provides a convenient means to locate and retain stolen credit cards or to deny access to discharged employees still holding a valid identification card. The employees number is entered by the system owner into a location in the memory bank. This memory bank is scanned each timme a card is inserted. When a number entered by an unauthorized user of the system matches a number in memory, the card is retained, and a remote alarm is activated. Unauthorized members are entered into memory by a simple key-in procedure similar to the programming method. Turning the properkey enables the credit manager or personnel director or other authorized operator to enter the unauthorized number using the same input keyboard. That number remains in memory until it is removed or replaced.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an exemplary matrix showing a possible in ternal configuration of an identification card;
FIG. 2 is a simplified flow diagram of the operational steps'of the invention; and
FIG. 3 consisting of FIGS. 3a 3d, is a schematic diagram showing the logical techniques which are utilized to accomplish the purposes of the invention.
DESCRIPTION OF THE PREFERRED EMBODIMENT As explained in more detail below, operation of the invention is accomplished with three codes. The three codes utilized are: (l) a column code; (2) a row code; and (3) a users code number.
As sketched in FIG. 1 a 20 by 20 matrix is provided which is read by the system to create a distinct number to be associated with a card. One embodiment which may be utilized'employs an opaque insert implanted in the card which is cut or slotted to provide translucent areas which may be read with infrared readers. It should be understoodthat there is no limit in the size of the matrix, its extent being a choice of design. The
infrared reader registers either the opaque or translucent portions of the interior of the card which can be converted into an on or off representation to be read in binary.
Which vertical rows'on the card are to be read can be randomly selected and locked in with either a keyboard or by internal wiring (e.g.,vertical rows 4, 5, l and 2). This is referred to as the column program."
The horizontal rows are also selected by the system owner in any order or in any sequence on the keyboard and locked in (e.g., 2, 5, 7 and 3). Thereafter a programmed number must be punched in by the cardholder in the order selected before the machine will operate to accept the card.
In other words, suppose the column code is as indicated above, 4,5, l and 2, and the system owner selects a row code of 2, 5, 7 and 3. Also assume that the binary representation cut into the interior of the card is as shown in FIG. 1. Each card utilized will be coded differently, thus'providing distinct information. However, since each card will be coded for the entire matrix the information contained on the card will be nondiscrete without the use of the system. A user or cardholder would have to enter thenumber 2, l, l, 5 before the system would accept him as the cardholder. A sketch of the matrix as shown in FIG. 1 shows why.
The cardholders program number is obtained as follows:
Row 2,Column 4 has a Column has a 0Column 1 has a 1Column 2 has a 0 Binary No. 0010 is decimal 2Row 5,Column 4 has a 0Column 5 has a 0Column 1 has a 0Column 2 has a 1 Binary No. 0001 is a decimal 1 Row' 7,Column 4 has a 0Column 5 has a 0Column 1 has a 0Column 2 has a 1 Binary No. 0001 is decimal 1Row 3,Column 4 has a 0Column 5 has a 1-Column 1 has a 0Column 2 has a 1 Binary No. 0101 is decimal 5 Thus, the cardholders number is 2115. A variation can be made in either the column code or the row code, or the cardholders code number or any combination thereof. Also, if the card is lost or stolen, it cant be used since whoever has it will not know the programmed number;
While an infrared reader is currently utilized to read an insert'impregnated in a plastic card it should be obvious that the same type matrix can be impressed on a magnetic tape strip.
FIG. 2 is a simplified flow diagram of the operational steps of the invention. As the user approaches the control unit, aninsert card light 13 is energized indicating the unit is in the ready condition.--When a card is inserted properly at 14, theinsert card light 13 is deener gized and the keycode number lamp 15 is energized. Improper card insertion results in card rejection. As the card is being insertedoptical readers 16 determine whether or not the card has been fully inserted and whether or not a specified number of digits have been read, for example, seven digits. In addition,logical programming 17 determines from other information obtained from the card a security or credit level to determine whether the cardholder is in the correct area.
If less than seven numbers were read, a card solenoid 1.8 is energized to enable the cardholder to remove thecard 19 forreinsertion. If the cardholder is not in an authorized security area the card is rejected 20 and thereject lamp 21 is energized.
If the'card has been properly utilized the cardholder may now insert data on aninput keyboard 22. Logical gating and acomparator 23 initially match the cardholders memorized key number with a programmed, unfixed and random number read from the card and then compares the number with unauthorized numbers in arandom access memory 24. If the cardholderss memorized number and the programmed card number do not match or if the cardholders key number is unauthorized, the card is rejected at 20 and thereject lamp 21 is energized.
It the cardholder enters the proper code and the code is not retained as an unauthorized code in thememory 24, all inputs to master ANDgate 26 are enabled, thedoor 27 releases, the acceptindicator 28 is energized and the card is ejected by thecard solenoid 18. In the event an improper code is entered, the cardholder has two additional chances to key in the proper number. Should he fail, this is noted by acounter 25, the card is retained and 'a remote alarm is sounded. At this point, the card can only be removed by a security guard or other authorized persons holding a key to release the card withkey switch 29.
The above operations are accomplished electronically in the following manner. As shown in FIG. 3, the system is programmed to read from a 20 by 20 matrix impregnated in a card, seven digits in four bit binary and one three bit digit for the security code. Thecolumn program 31 is shown as internally wired. It should be understood, however, that thecolumn program 31 may be constructed in the same manner as the row code program described below and that variations can be made in the matrix configuration or the number of digits read and-still be within the intention and scope of the invention as claimed.
Referring to the schematic diagram shown in FIG. 3, information in the interior of the card is read with the utilization of lightsensitive transistors 43 through 51. On each of seven passes thesetransistors 43 through 49 are capable of detecting four binary bits which represent a decimal number plus three binary bits which represent a security code. In addition,transistors 50 and 51 detect insertion of the card and the bottom of the card. a
When the card is inserted, top optical reader 50 is activated. The signal is amplified withamplifier 53 and is utilized to enable thecard storage memory 54, the lock outmemory 56, thekeyboard storage memory 58, the third time counting circuit 60, to partially enable thedoor relay gate 26 and to serve as a master clear for other circuits as explained more fully below.
Thecard storage memory 54 is enabled throughamplifier 53,lines 66, 67 and 68, which is the initial high signal on ANDgate 72.. As explained below, as each additional four bit number is read the second input sig nal to ANDgate 72 goes high activating the one shot 74 to load the data into thecard storage memory 54.
Thekeyboard storage memory 58 is enabled throughamplifier 53,lines 66, 76 throughinverter 77 andOR gate 78, the output of which is fed byline 82 to counter 83. The normally low signal fromamplifier 53 clears thecounter 83. When the signal goes high it is inverted withinverter 77, disabling theOR gate 78 and this enabling thecounter 83. As shown in FIG. 3 the output ofcounter 83 is decoded bydecimal decoder 84 and controls theclockgating 86 and 88, respectively. The clock gating output is then in condition to receive either code numbers through thekeyboard 22 or row codes to be stored inmemory 91, respectively, depending on whether or not row codekey switch 92 is in an open or closed position.
Similarly, the lock-out memory 56 is enabled throughamplifier 53,lines 66, 76,94, 95, ORgate 98,inverter 102, the output of which is fed throughline 104 toclear counters 108 and 112. The output ofcounters 108 and 112 are utilized to sequentially step through thelockout memory 56 so that if a number located in therandom access memory 56 compares equally'witha number entered on thekeyboard 22, theforbiddden light 114 is energized and the number is rejected.
The third time counting circuit is enabled by clearingcounter 25 throughamplifier 53,lines 66, 76, 94, 120 to counter 25. This clear signal also clears flip-flop 122, the output of which is fed through an OR gate to both thereject light 21 and thethird time light 123 throughlines 124, 126 and 128, respectively As shown, thedoor relay gate 27 is partially enabled through amplifier'53, lines 66, 76, 94, 120 and 134 which is one of the seven inputs to ANDgate 26, the output of which, when the other conditions are met, energizesdoor relay 27.
As the card is inserted,optical readers 43 through 49 read seven columns. The columns read in the twenty by twenty matrix which makes up the interior of the card are determined by the column orY matrix program 31 which is variable to read any'seven of the twenty columns of the matrix. The output pulses from the seven columns are amplified withamplifiers 143 through 149 with the amplified signal being stored inlatches 153 through 159. The output of thelatches 153 through 156 are then gated into thescratch pad memory 54 as explained below.
When the card is between rows there are not bit signals, thus each of the inputs to ORgate 164 will be low. The low output of ORgate 164 is then inverted withinverter 168 creating the second high input signal to the ANDgate 72. The output from ANDgate 72 energizes oneshot 74 which increments counter 171. The output ofcounter 171 is decoded bydecimal decoder 174 and sets upoutput gates 176 so that the immediately preceding number is stored in the correct position in the card number storage memory'54. The' output of one of the top optical reader which when it goes high, clears each oflatches 153 through 159 to enable them to read the next number.
The bottomoptical reader 51 turns off when the card is fully inserted. The output of bottomoptical reader 51 is amplified byamplifier 191 and fed to ANDgate 193 alongline 196 and ANDgate 194 alonglines 196 and 197, respectively. If there were not seven card numbers read, a flip-flop 213 is set and thecard release solenoid 18 is energized. This is accomplished as follows.
The output of the bottom optical reader is fed into an ANDgate 193, the other input to which is the L-7 or last output fromoutput gates 176 fromcounter 171. Thus, if thecounter 171 has counted seven numbers and the bottom has been reached, the output of ANDgate 193 will be high which sets flip-flop 199.- The output of flip-flop 199 is connected to inverter 202 bylines 203, 204, 206 and 208 and the inverted or low input is fed into ANDgate 194 along with the high input from the bottom optical reader. Thus, the output of the ANDgate 194 remains low, flip-flop 213 is not set, and thecard return solenoid 18 is not energized. If, however, seven numbers have not been counted, L-7 will remain low, thus the output of ANDgate 193 will remain low and flip-flop 199 will not be set. lts output will therefore remain low. The output ofinverter 202 will then be high and when it is combined with the output of the bottom optical reader at ANDgate 194, it will setflipflop 213, the output of which is fed to ORgate 216 byline 218. This will activate the card return solenoid 18 to return the card. It should be noted that thecard return solenoid 18 is activated by each of the inputs to theOR gate 216 which comprise akey release switch 29, a remote release button 224, as well as the output of ANDgate 26 which will return the card after the card has been accepted and thedoor relay 27 has been energized.
' The acceptedcard signal 28 is connected toOR gate 216 from the output of ANDgate 26 bylines 228 and 229. If seven numbers were read thesecurity level comparator 232 is checked and if the security level is greater than the number assigned to the cardholder, anunauthorized light 240 is energized at the guard station, thedoor relay 27 is disabledand thereject light 21 is energized-This is accomplished in the following manner.
Optical readers 47 through 49 read bits corresponding to the security level of the cardholder. Only one row is read and by electrical connection this can be any row L-l through L-7, that row being selected by connection of the onenumber memory 241 to one of the outputs L-l through L-7 ofoutput gates 176. The output of thesecurity code memory 241 is compared with an assignedsecurity level 243 having eight levels of security designated 0 through 7. Thesecurity level 243 and the number inmemory 241 is compared withcomparator 232 and the output of thecomparator 232 is fed to an ANDgate 234. Thecomparator 232 is set so that if the cardholders security code entered into thememory 241 indicating the highest security level he can enter is less than the assigned security level setting 243 the output of thecomparator 232 will go high. This output is fed to an ANDgate 234 throughline 236. The other input to the ANDgate 234 is the output of the flip-flop 199 which is set when seven numbers have been read and the card has tripped the bottomoptical reader 51. If both inputs are high the output of the AND gate 234is fed through adriver 238 to a circuit which energizesanunauthorized light 240. In addition, the output of the ANDgate 234 is fed throughline 242 to anOR gate 244. The output of the OR gate is fed through a driver 246'to the reject lighting circuit and thereject light 21 is energized. The output of the ANDgate 234 is also fed throughlines 242 and 248 to aninverter 250 and the inverted signal, being a low signal, is then inputted to ANDgate 26 which prevents all inputs signals from being high, thus disabling the output of ANDgate 26, thereby preventing thedoor relay 27 from being energized;
In addition to the foregoing, if there is a positive indication that seven numbers were read, the clock circuit is partially enabled, theinsert card light 13 is deenergized and the insert data light 15 is energized providing there was no reject or accept signal. The clock circuit is partially enabled from the output of flip-flop 199 throughlines 203, 204, and 251 which is fed to ANDgate 252, discussed below. Theinsert card light 13 is deenergized due to the signal fed from the output of flip-flop 199 throughlines 203, 204, 206, 208 throughinverter 202, the low output frominverter 202 being fed throughline 254 throughdriver 258 to extinguish theinsert card light 13. Finally, the insert data light is energized due to the signal from flip-flop 199 being fed to ANDgate 260 throughlines 203, 204 and 206. The other two inputs to AND gate. 260 are inverted signals from thereject light 21 and the reenergization cirand thus the third signal throughline 206 indicating that the bottom has been reached and seven numbers were read, energizes theinsert data light 15.
After the insert data light 15 has been lit, information can be fed into the circuit through thekeyboard 22. Thekeyboard 22 is utilized for three purposes. By a cardholder, to enter the cardholders memorized code number, and by the owner of the apparatus, to change the row code numbers and to enter forbidden numbers in therandom access memory 56 which will prevent certain persons with a card from gaining access through the system. As noted above, modification of the circuit in the manner of the row code program may be made to enable the system owner to program thecolumn matrix 31 as well. Thekeyboard 22 is keyed with a four digit decimal number which is decoded with a decimal tobinary decoder 272 and stored inmemory 58. It will be entered in either thecode number memory 58, or the rowcode number memory 91. As indicated on the drawing and explained below, numbers may be keyed into the random access forbiddennumber memory 56 through thecode number memory 58. if the row codekey switch 92 is on, therow code memory 91 is enabled and thecode number memory 58 is disabled. This is accomplished by feeding a positive signalthrough the row codekey switch 92 intoclock gating circuit 88 throughlines 282, 283. Thecode number memory 58 is'then disabled due toinverter 285 which disables the clock gating 86 throughline 287. Conversely, if therow code switch 92 is off, thenumber memory 58 is enabled and the rowcode number memory 91 is disabled in the same manner.
At the end of the fourth number keyed into thekeyboard 22, thekeyboard 22 is disabled and theinternal oscillator 288 is enabled. Thekeyboard 22 is disabled with the use of inhibitline 290. As each number is entered into thekeyboard 22 the output of the decimal tobinary decoder 272 is fed to ORgate 293 throughlines 294 through 297. The output of theOR gate 293 fires a oneshot 299, the output of which is fed to counter 83. The output ofcounter 83 is decoded bydecimal decoder 84 and when the fourth digit has been entered, the signal online 303 is fed back withline 290 to the one shot-299 to inhibit further counting. Theinternal oscillator 288 is enabled in a similarmanner. Asline 303 registers the entry of the fourth digit throughkeyboard 22, the signal is fed online 306 to ANDgate 252. Since all other inputs are now high, including the varying output ofoscillator 288 which is fed to the ANDgate 252 throughline 310, the output of the ANDgate 252 varies as theoscillator 288 varies. The output of the ANDgate 252 is connected throughline 312 to counter 316. The oscillator pulses are counted, decoded withdecimal decoder 318 and used as clock signals, CK-l through CK-4, to gate in the card number and keyboard number throughoutput gating circuits 322 and 324. To assure that only four clock signals are received the fourth clock pulse is fed directly back to the AND gate along line 351 through inverter 353. The low output from the inverter disables the AND gate and thus no further oscillations are counted or decoded.
To obtain the random row code the numbers retained in the sevennumber memory 54 are not directly gated by the clock. Note also that each number of the user's secret number is compared individually with the numher in the sevennumber memory 54 according to the four number program contained in therow code memory 91.
The first clock signal clocksoutput gating circuits 322 and 324 throughlines 331, 332 and 333. The four bits which constitute the firstof the users four numbers from thecode number memory 58 appear at the input of thecomparator 336. The output ofoutput gating 324 is dependent on the first number in therow code memory 91. That number determines which of row code one (RC-1) through row code seven (RG7) will be enabled. The particular row code enable is then fed to theoutput gating 341 associated with the sevennumber memory 54. The four binary bits of that number are then gated to comparator 336'. If the two numbers are not equal the output ofcomparator 336 goes high which sets a flip-flop 343, the output of which disables thedoor relay 27 and energizes thereject light 21. This is accomplished withline 345 which feeds the output of the flip-flop 343 to ORgate 244 to energize thereject light 21. In addition, the high output online 345 is fed withline 347 toinverter 349 which creates a low input to ANDgate 26, thereby disabling the ANDgate 26 to preventdoor relay 27 from being energized. Each of the four digits in thecode number memory 58 are compared to the selected four numbers in the sevennumber memory 54 according to the row code con- 21 is energized in the manner described.
As explained above, thekeyboard 22 may only be used three times. Each of the first two uses of thekeyboard 22 are stored in the twoplace counter 25 by registering each of the first two occurences of the fourth clock pulse, the output of the counter being connected to ANDgate 358. The fourth clock pulse is also fed directly overlines 350, 368 and 369 to partially enable ANDgate 26 and is connected to ANDgate 358 throughlines 355 and 360. Therefore, the third time clock four occurs, the ANDgate 358 is enabled and the high output then sets flip-flop 122 which is fed overlines 124, 126 to ORgate 244 to energize thereject light 21. In addition, the high output of flip-flop 122 is' fed overlines 124, 128 to thethird time light 123 and is fed overlines 124 and 334 toinverter 366 which disables ANDgate 26 so that thedoor relay 27 cannot be energized.
Finally, a fourth clock pulse without a reject indicates that the two numbers are equal and enables the random access counting and gating circuit to begin the check for unauthorized numbers. This is accomplished throughlines 368, 371 to ANDgate 375. -A second input to the ANDgate 375 is from the zero detectcircuit 377 which reads thecounter 108, 112 outputs. Although thecounters 108, 112 initially are cleared thus indicating a zero state, the zero detectcircuit 377 is internally latched and is not enabled until a digit appears in thecounters 108, 112. The low output of the zero detection circuit is inverted withline 379 andinverter 380 to enable AND 375.
The third input to the ANDgate 375 is theoscillator 288 output which is fed to the ANDgate 375 alonglines 382 and 383. Since the output of the ANDgate 375 will oscillate this output is fed alonglines 386, 387, 388, 389, 390. Therefore, ANDgate 375 gates in theinternal oscillator 288 alongline 386 to increment thecounters 108, 112 withline 389. The oscillator pulses are also utilized to commmandtherandom access memory 56 to read with inputs alongline 390. Thus each of the 64 sixteen bit words are clocked into thecomparator 391. Since the contents of the four four bit code numbers are retained inmemory 58 and are also inputted to the comparator alonglines 392 through 399, thecomparator 391 sequentially compares the users code number with each of the forbidden numbers contained intherandom access memory 56.
If the users code number is contained in therandom access memory 58, thecomparator 391 output will go high and is fed withline 402 to ANDgate 403 which sets a flip-flop 405. The output of the flip-flop 405 energizes the forbidden light 1 14 withdriver 409. In addition, thereject light 21 is energized, the output of the flip-flop 405 being connected to ORgate 244 withline 412, and thedoor relay 27 is disabled withinverter 415, yielding a low signal and thus disabling AND gate If no equal condition is detected between the users code number and the numbers contained in therandom access memory 56, the address counters again read zero after the 64th word is read. When it reaches zero the zero detect 377 output goes high, this signal being inverted withinverter 380 which disablesgate 375. This signal is also fed alonglines 379, 417 to ANDgate 26 which is the last enabling signal for the ANDgate 26 and the door would now open if all other signals were true. The accept light 28 would be energized. In addition, thecard return solenoid 18 would be energized. This is accomplished by the output of ANDgate 26 being fed to ORgate 216 alonglines 228 and 229, the output of ORgate 216 being-utilized to energizecard return solenoid 18 withdriver 406.
To puta number into therandom access memory 56, the memorykey switch 424 is closed which enables the memory address .counters 108, 112. The high output through memorykey switch 424 is fed throughlines 436, 437, 438 to clear twotime counter 442. The counter initially has a low output which is inverted byinverter 444 and fed to the input of ANDgates 446, 448 alonglines 450 and 451, 454, respectively. The second enabling inputs to ANDgates 446 and 448 from the memory key switch is fed alonglines 436, 437, 456 to the input of ANDgates 446, 448 alonglines 458 and 460, respectively.
The desired address forrandom access memory 26 is then keyed into thekeyboard 22.
The first address digit is entered intoaddress counter 108 as follows. The decimal number is converted to four bit binary by decimal tobinary decoder 272 and loaded into fournumber memory 58. At the time the entry of the first number is fed alongline 297 to ORgate 293 which fires a oneshot 299. The output of the one shot is counted bycounter 83 and decoded bydecimal decoder 84 which creates a clocking signal NL-l fromclock gating circuit 86. The clocking signal NL-l causes the four binary digits contained in the first number location inmemory 58 to be read on the four outputs N-l through N-4 ofoutput gating circuit 322. Since there are only 64 locations inrandom access memory 56, only the first three binary digits or N-l through N-3 are fed to the input ofcounter 108. The NL-l clock signal is also fed to the input of ANDgate 446 which is the last enable for that AND gate. Consequently, the output of ANDgate 446 is fed alonglines 462 and 463 and used as the command signal to enter the three bit binary number into thecounter 108. in addition, the output is fed alonglines 462 and 465 to ORgate 467 to counter 442 indicating the first number has been entered.
In the same manner the second number entered into thekeyboard 22 is clocked intocounter 112 through ANDgate 448 with the use of output NL-2 fromclock gating circuit 86. The output of ANDgate 448 is also fed to thecounter 442 alonglines 469 and 480 to ORgate 467 to the twobit counter 442. Sincecounter 442 is only a two bit counter with the entry of the second number, the output goes high, is inverted withinverter 444, and disables ANDgates 446 and 448 throughlines 450 and 451 and 454, respectively.
Thekeyboard 22 is then cleared with a clear button on thekeyboard 22 and the desired four digit number is keyed in. The four bits are stored in fournumber memory 58, the contents of which is fed to the input of therandom access memory 56, alonglines 392 through 395, N-l through N-4. At the completion of the fourth number, a oneshot 478 is enabled from thedecimal decoder 84 alonglines 303, 306, 438 to ANDgate 440, the second input to which is the closed memorykey switch 424. The output of the one shot is fed along line 480' to command therandom access memory 56 to write and retainthe four digit sixteen bit word in the address location indicated by the address memory counters 108, 112 in therandom access memory 56.
In general, while we have described a specific embodiment of our invention, it is to be understood that this is for purposes of illustration only and that various modificationscan be made within the scope of the invention.
We claim as our invention:
1. A system for security control of a desired operation comprising:
a series of identification cards having individually distinct but nondiscrete information as a part of each card;
means for programming said system with a system program to read a random selection ofinformation 2. The system ofclaim 1 wherein the nondiscrete information associated with the identification cards is impregnated in the identification cards.
3. The system ofclaim 1 wherein the nondiscrete information associated with the identification cards is affixed to the surface of the identification cards.
4. The system ofclaim 1 wherein the nondiscrete information associated with the identification cardsis arranged in a matrix configuration.
5. The system ofclaim 4 wherein the system can be programmed to read selected rows of the matrix in any order to establish a number to identify a user of the card.
6. The system ofclaim 4 wherein the system can be programmed to read selected columns of the matrix in any order to establish a number to identify a user of the card.
7. The system ofclaim 4 wherein the system can be programmed to read selected rows and columns of the matrix in any order to establish a number to identify a user of the card.
8. The system ofclaim 1 wherein the desired operation is to identify the user of the card for the purpose of providing credit thereto.
9. The system ofclaim 1 wherein the desired operation is to identify the user of the card for the purposes of controlling access to secured areas.
10. The system ofclaim 1 further comprising security level means for establishing various levels of security for the desired operation and wherein a portion of the nondiscrete information associated with the identification cards is related to the maximum level of security that the user may be permitted to obtain.
11. The system ofclaim 1 wherein the memorized in- 12 formation are numbers used to identify the user and further comprising storage means for storing numbers identifying users who will not be permitted to perform the desired operation;
means for comparing the memorized number with the stored numbers to determine whether or not they are identical; and
means for preventing the desired operation if the memorized number and the stored number are identical.
12. The system ofclaim 1 wherein the memorized information is a number and each digit of the users memorized number is sequentially compared with each digit of a number selected by the system program from information associated with the identification card.
13. The system ofclaim 10 wherein the system may be programmed to obtain a multiple digit number having an identification component and a security level component from the nondiscrete information impregnated in each identification card.
14. The system ofclaim 10 wherein the desired operation can be accomplished at various levels of security and wherein the system may be programmed to obtain a multiple decimal digit number for identification of the user and a multiple octal digit number to determine at which security level the user may perform the 'de sired operation.
15. The system ofclaim 14 wherein the system may be programmed to ignore all but one octal digit of the multiple octal digit number, the octal digit number being used to establish the maximum of eight levels of security that the user will be permitted to perform the desired operation.

Claims (15)

1. A system for security control of a desired operation comprising: a series of identification cards having individually distinct but nondiscrete information as a part of each card; means for programming said system with a system program to read a random selection of information from the cards; input means for entering the system program and for enabling a user to enter memorized information into the system; information sensing means to read the random selection of information in accordance with the system program; means for comparing the memorized information to the randomly selected information obtained from the cards to determine whether or not they are identical; and means for implementing the desired operation if the memorized information and the randomly selected information are identical.
US00422753A1973-12-071973-12-07Controlled access systemsExpired - LifetimeUS3857018A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US00422753AUS3857018A (en)1973-12-071973-12-07Controlled access systems

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US00422753AUS3857018A (en)1973-12-071973-12-07Controlled access systems

Publications (1)

Publication NumberPublication Date
US3857018Atrue US3857018A (en)1974-12-24

Family

ID=23676216

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US00422753AExpired - LifetimeUS3857018A (en)1973-12-071973-12-07Controlled access systems

Country Status (1)

CountryLink
US (1)US3857018A (en)

Cited By (50)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3984658A (en)*1975-09-261976-10-05Cannon John WProgrammable card actuated lock
US4095739A (en)*1977-08-261978-06-20A-T-O Inc.System for limiting access to security system program
US4097727A (en)*1977-09-011978-06-27A-T-O Inc.Circuit for controlling automatic off-line operation of an on-line card reader
US4114140A (en)*1977-04-251978-09-12Engineered Systems, Inc.Verification checking system
US4216375A (en)*1979-03-121980-08-05A-T-O Inc.Self-contained programmable terminal for security systems
US4250533A (en)*1979-05-211981-02-10Nelson Avi NSecurity system
FR2528197A1 (en)*1982-06-081983-12-09Grafeille Jean Marie METHOD OF CONTROLLING THE USE OF RESERVED DOCUMENTS, DOCUMENTS AND DEVICES FOR ITS IMPLEMENTATION
FR2581464A1 (en)*1985-05-031986-11-07Bertin & CieMethod and device for establishing and checking the authenticity of a document, and corresponding document
US4675515A (en)*1986-03-041987-06-23Lucero James LDrive-through credit card payment device
US4727975A (en)*1984-08-241988-03-01Schulte-Schlagbaum AktiengesellschaftUse-control system
US4887292A (en)*1985-12-301989-12-12Supra Products, Inc.Electronic lock system with improved data dissemination
US4896246A (en)*1985-12-301990-01-23Supra Products, Inc.Electronic lock with energy conservation features
US4912310A (en)*1984-11-051990-03-27Yoshitaka UemuraMethod of and system for issuing cards
US4914732A (en)*1985-10-161990-04-03Supra Products, Inc.Electronic key with interactive graphic user interface
US4915205A (en)*1985-08-061990-04-10Sovereign Technical Services Ltd.Apparatus for dispensing and receiving rented articles
US4916443A (en)*1985-10-161990-04-10Supra Products, Inc.Method and apparatus for compiling data relating to operation of an electronic lock system
US4929880A (en)*1985-12-301990-05-29Supra Products, Inc.Electronic lock system with battery conservation features
US4947163A (en)*1985-10-161990-08-07Supra Products, Inc.Electronic security system with configurable key
US4988987A (en)*1985-12-301991-01-29Supra Products, Inc.Keysafe system with timer/calendar features
US5021776A (en)*1988-07-111991-06-04Yale Security Inc.Electronic combination of lock with changeable entry codes, lock-out and programming code
US5210873A (en)*1990-05-251993-05-11Csi Control Systems International, Inc.Real-time computer system with multitasking supervisor for building access control or the like
US5245652A (en)*1985-10-161993-09-14Supra Products, Inc.Secure entry system with acoustically coupled telephone interface
EP0863491A1 (en)*1997-03-031998-09-09BRITISH TELECOMMUNICATIONS public limited companySecurity check provision
US5822771A (en)*1993-05-141998-10-13Fujitsu LimitedSystem for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US5836010A (en)*1995-03-141998-11-10Samsung Electronics Co., Ltd.Personal computer using chip-in card to prevent unauthorized use
US5946660A (en)*1997-01-081999-08-31Chas-Tech, Inc.Automated storage system
GB2306458B (en)*1995-10-181999-12-29David Brian JohnsonImprovements relating to vending apparatus and the like
GB2338816A (en)*1995-10-181999-12-29David Brian JohnsonAccess mechanism for vending or like machines
US20010014167A1 (en)*1997-03-032001-08-16Maurice M GiffordSecurity check provision
US20030231103A1 (en)*2002-06-142003-12-18Fisher Scott R.Electronic lock system and method for its use with card only mode
US20050168320A1 (en)*1985-10-162005-08-04General Electric CompanyElectronic real estate lockbox system
US20050206499A1 (en)*2004-03-192005-09-22Fisher Scott RElectronic lock box with multiple modes and security states
WO2006021047A1 (en)*2004-08-272006-03-02Honeywell LimitedAn access control system and a method of access control
US7009489B2 (en)2002-06-142006-03-07Sentrilock, Inc.Electronic lock system and method for its use
US7086258B2 (en)2004-03-192006-08-08Sentrilock, Inc.Electronic lock box with single linear actuator operating two different latching mechanisms
US20070275759A1 (en)*2006-05-242007-11-29Pasi KemppinenMemory card removal guard
US8232860B2 (en)2005-10-212012-07-31Honeywell International Inc.RFID reader for facility access control and authorization
US8351350B2 (en)2007-05-282013-01-08Honeywell International Inc.Systems and methods for configuring access control devices
US8598982B2 (en)2007-05-282013-12-03Honeywell International Inc.Systems and methods for commissioning access control devices
US8707414B2 (en)2010-01-072014-04-22Honeywell International Inc.Systems and methods for location aware access control management
US8787725B2 (en)2010-11-112014-07-22Honeywell International Inc.Systems and methods for managing video data
US8878931B2 (en)2009-03-042014-11-04Honeywell International Inc.Systems and methods for managing video data
US9019070B2 (en)2009-03-192015-04-28Honeywell International Inc.Systems and methods for managing access control devices
US9280365B2 (en)2009-12-172016-03-08Honeywell International Inc.Systems and methods for managing configuration data at disconnected remote devices
US9344684B2 (en)2011-08-052016-05-17Honeywell International Inc.Systems and methods configured to enable content sharing between client terminals of a digital video management system
US9704313B2 (en)2008-09-302017-07-11Honeywell International Inc.Systems and methods for interacting with access control devices
US9894261B2 (en)2011-06-242018-02-13Honeywell International Inc.Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US10038872B2 (en)2011-08-052018-07-31Honeywell International Inc.Systems and methods for managing video data
US10362273B2 (en)2011-08-052019-07-23Honeywell International Inc.Systems and methods for managing video data
US10523903B2 (en)2013-10-302019-12-31Honeywell International Inc.Computer implemented systems frameworks and methods configured for enabling review of incident data

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3593291A (en)*1969-01-241971-07-13Thomas W SullivanAutomatic identification system and method
US3655947A (en)*1968-09-191972-04-11Omron Tateisi Electronics CoIdentification system
US3761682A (en)*1971-10-071973-09-25Docutel CorpCredit card automatic currency dispenser

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3655947A (en)*1968-09-191972-04-11Omron Tateisi Electronics CoIdentification system
US3593291A (en)*1969-01-241971-07-13Thomas W SullivanAutomatic identification system and method
US3761682A (en)*1971-10-071973-09-25Docutel CorpCredit card automatic currency dispenser

Cited By (67)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3984658A (en)*1975-09-261976-10-05Cannon John WProgrammable card actuated lock
US4114140A (en)*1977-04-251978-09-12Engineered Systems, Inc.Verification checking system
US4095739A (en)*1977-08-261978-06-20A-T-O Inc.System for limiting access to security system program
US4097727A (en)*1977-09-011978-06-27A-T-O Inc.Circuit for controlling automatic off-line operation of an on-line card reader
US4216375A (en)*1979-03-121980-08-05A-T-O Inc.Self-contained programmable terminal for security systems
US4250533A (en)*1979-05-211981-02-10Nelson Avi NSecurity system
FR2528197A1 (en)*1982-06-081983-12-09Grafeille Jean Marie METHOD OF CONTROLLING THE USE OF RESERVED DOCUMENTS, DOCUMENTS AND DEVICES FOR ITS IMPLEMENTATION
EP0097110A3 (en)*1982-06-081984-05-30Michel Bonnaval-LamotheMethod of testing the use of reserved documents, documents and devices for carrying it out
US4774513A (en)*1982-06-081988-09-27Michel Bonnaval-LamotheProcess for controlling the use of documents and documents and means for implementing this process
US4727975A (en)*1984-08-241988-03-01Schulte-Schlagbaum AktiengesellschaftUse-control system
US4912310A (en)*1984-11-051990-03-27Yoshitaka UemuraMethod of and system for issuing cards
FR2581464A1 (en)*1985-05-031986-11-07Bertin & CieMethod and device for establishing and checking the authenticity of a document, and corresponding document
US4915205A (en)*1985-08-061990-04-10Sovereign Technical Services Ltd.Apparatus for dispensing and receiving rented articles
US4947163A (en)*1985-10-161990-08-07Supra Products, Inc.Electronic security system with configurable key
US5245652A (en)*1985-10-161993-09-14Supra Products, Inc.Secure entry system with acoustically coupled telephone interface
US4914732A (en)*1985-10-161990-04-03Supra Products, Inc.Electronic key with interactive graphic user interface
US20050168320A1 (en)*1985-10-162005-08-04General Electric CompanyElectronic real estate lockbox system
US4916443A (en)*1985-10-161990-04-10Supra Products, Inc.Method and apparatus for compiling data relating to operation of an electronic lock system
US4929880A (en)*1985-12-301990-05-29Supra Products, Inc.Electronic lock system with battery conservation features
US4988987A (en)*1985-12-301991-01-29Supra Products, Inc.Keysafe system with timer/calendar features
US4896246A (en)*1985-12-301990-01-23Supra Products, Inc.Electronic lock with energy conservation features
US4887292A (en)*1985-12-301989-12-12Supra Products, Inc.Electronic lock system with improved data dissemination
US4675515A (en)*1986-03-041987-06-23Lucero James LDrive-through credit card payment device
USRE34872E (en)*1986-03-041995-03-14Lucero; James L.Drive-through credit card payment device
US5021776A (en)*1988-07-111991-06-04Yale Security Inc.Electronic combination of lock with changeable entry codes, lock-out and programming code
US5210873A (en)*1990-05-251993-05-11Csi Control Systems International, Inc.Real-time computer system with multitasking supervisor for building access control or the like
US6067640A (en)*1993-05-142000-05-23Fujitsu LimitedSystem for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US5822771A (en)*1993-05-141998-10-13Fujitsu LimitedSystem for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US5836010A (en)*1995-03-141998-11-10Samsung Electronics Co., Ltd.Personal computer using chip-in card to prevent unauthorized use
GB2338816A (en)*1995-10-181999-12-29David Brian JohnsonAccess mechanism for vending or like machines
GB2306458B (en)*1995-10-181999-12-29David Brian JohnsonImprovements relating to vending apparatus and the like
GB2338816B (en)*1995-10-182000-03-15David Brian JohnsonAccess mechanism for vending apparatus gaming machines and the like
US5946660A (en)*1997-01-081999-08-31Chas-Tech, Inc.Automated storage system
WO1998039740A1 (en)*1997-03-031998-09-11British Telecommunications Public Limited CompanySecurity check provision
US20010014167A1 (en)*1997-03-032001-08-16Maurice M GiffordSecurity check provision
US6907135B2 (en)1997-03-032005-06-14British Telecommunications Public Limited CompanySecurity check provision
US20050147279A1 (en)*1997-03-032005-07-07British Telecommunications Plc.Security check provision
EP0863491A1 (en)*1997-03-031998-09-09BRITISH TELECOMMUNICATIONS public limited companySecurity check provision
US7424135B2 (en)1997-03-032008-09-09British Telecommunications, PlcSecurity check provision
US20030231103A1 (en)*2002-06-142003-12-18Fisher Scott R.Electronic lock system and method for its use with card only mode
US7193503B2 (en)2002-06-142007-03-20Sentrilock, Inc.Electronic lock system and method for its use with a secure memory card
US20050264400A1 (en)*2002-06-142005-12-01Sentrilock, Inc.Electronic lock system and method for its use with a secure memory card
US6989732B2 (en)2002-06-142006-01-24Sentrilock, Inc.Electronic lock system and method for its use with card only mode
US7009489B2 (en)2002-06-142006-03-07Sentrilock, Inc.Electronic lock system and method for its use
US20050206499A1 (en)*2004-03-192005-09-22Fisher Scott RElectronic lock box with multiple modes and security states
US7420456B2 (en)2004-03-192008-09-02Sentri Lock, Inc.Electronic lock box with multiple modes and security states
US7086258B2 (en)2004-03-192006-08-08Sentrilock, Inc.Electronic lock box with single linear actuator operating two different latching mechanisms
WO2006021047A1 (en)*2004-08-272006-03-02Honeywell LimitedAn access control system and a method of access control
US8941464B2 (en)2005-10-212015-01-27Honeywell International Inc.Authorization system and a method of authorization
US8232860B2 (en)2005-10-212012-07-31Honeywell International Inc.RFID reader for facility access control and authorization
US20070275759A1 (en)*2006-05-242007-11-29Pasi KemppinenMemory card removal guard
US7764977B2 (en)*2006-05-242010-07-27Nokia CorporationMemory card removal guard
US8351350B2 (en)2007-05-282013-01-08Honeywell International Inc.Systems and methods for configuring access control devices
US8598982B2 (en)2007-05-282013-12-03Honeywell International Inc.Systems and methods for commissioning access control devices
US9704313B2 (en)2008-09-302017-07-11Honeywell International Inc.Systems and methods for interacting with access control devices
US8878931B2 (en)2009-03-042014-11-04Honeywell International Inc.Systems and methods for managing video data
US9019070B2 (en)2009-03-192015-04-28Honeywell International Inc.Systems and methods for managing access control devices
US9280365B2 (en)2009-12-172016-03-08Honeywell International Inc.Systems and methods for managing configuration data at disconnected remote devices
US8707414B2 (en)2010-01-072014-04-22Honeywell International Inc.Systems and methods for location aware access control management
US8787725B2 (en)2010-11-112014-07-22Honeywell International Inc.Systems and methods for managing video data
US9894261B2 (en)2011-06-242018-02-13Honeywell International Inc.Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US9344684B2 (en)2011-08-052016-05-17Honeywell International Inc.Systems and methods configured to enable content sharing between client terminals of a digital video management system
US10038872B2 (en)2011-08-052018-07-31Honeywell International Inc.Systems and methods for managing video data
US10362273B2 (en)2011-08-052019-07-23Honeywell International Inc.Systems and methods for managing video data
US10863143B2 (en)2011-08-052020-12-08Honeywell International Inc.Systems and methods for managing video data
US10523903B2 (en)2013-10-302019-12-31Honeywell International Inc.Computer implemented systems frameworks and methods configured for enabling review of incident data
US11523088B2 (en)2013-10-302022-12-06Honeywell Interntional Inc.Computer implemented systems frameworks and methods configured for enabling review of incident data

Similar Documents

PublicationPublication DateTitle
US3857018A (en)Controlled access systems
US3866173A (en)Access control system for restricted area
US4801787A (en)IC card identification system having first and second data identification functions
US3862716A (en)Automatic cash dispenser and system and method therefor
US3694810A (en)Electronic security systems for multi-roomed buildings
US5089692A (en)Electronic lock
US5097505A (en)Method and apparatus for secure identification and verification
US3742453A (en)Automatic hotel security system using coded magnetic card
US4095739A (en)System for limiting access to security system program
US5058161A (en)Method and apparatus for secure identification and verification
US4079605A (en)Optical key reader for door locks
US5067155A (en)Method and means to limit access to computer systems
US4298792A (en)Locking apparatus for preventing unauthorized access
US4879455A (en)Self-verifying transaction cards
US3587051A (en)Electronic combination switching device
US3740530A (en)Apparatus and method for verification of a credit card
US3639906A (en)Key identification system having key code control
HK64385A (en)Electronic security device
WO1994028659A1 (en)Method and apparatus for improved security using access codes
US5233658A (en)Method and means to limit access to computer systems
EP0310603A1 (en)Method and apparatus for verifying identity.
US4755815A (en)Electronic identification device
US4992785A (en)Installation for controlling and monitoring the different coded locks of an assembly
EP0416792A2 (en)Access control devices and systems incorporating such devices
JPS58500203A (en) safety system

[8]ページ先頭

©2009-2025 Movatter.jp