You are on page 1of 11

United States Patent (19) 11 Patent Number: 4,646,080

Genest et al. 45 Date of Patent: Feb. 24, 1987


54 METHOD OF CODE CHANGING FOR control system which includes one or more keys en
ELECTRONICLOCK coded at a central console with a function information
75 Inventors: Leonard J. Genest, 1061 Tropic La., code, a key identification information code, an opera
Santa Ana, Calif. 92705; James F. tion select information code and a two-field key combi
Calvagna, Anaheim, Calif. nation information code and one or more locks having
at least one memory level in which a lock identification
73) Assignee: Leonard J. Genest, Santa Ana, Calif. information code and a lock combination information
21 Appl. No.: 611,221 code are stored. A key is initially inserted into a selected
22 Filed: May 17, 1984 lock and the data from the key is transferred to the lock.
The lock identification information code is first con
51) Int. Cl. .............................................. G08C 13/00 pared with the key identification information code. If
52 U.S.C. ............................... 340/825.31; 361/172; there is no correspondence, power to the lock is turned
70/278; 340/825.3 off for a set period of time. If the identification informa
58 Field of Search ................ 361/171, 172; 340/542, tion codes correspond, a test field of the key combina
340/825.31, 825.32, 825.33, 825.3; 307/10 AT; tion information code is compared with the lock combi
70/277,278 nation information code. If these correspond, the lock
56) References Cited opens. If the identification information codes corre
U.S. PATENT DOCUMENTS spond but the test field of the key combination informa
tion code and the lock combination information code do
3,622,991 1 1/1971 Lehrer et al. .................. 340/825.31 not, then the operation select information code is used
3,800,284 3/1974 Zucker et al. . to select from a predefined set of operations (logical
3,821,704 6/1974 Sabsay . and/or arithmetic and/or other). The operation selec
3,860,911 1/1975 Hinman .
3,926,021 12/1975 Genest et al. . tion is then performed on an operand field of the key
4,157,534 6/1979 Schachter ....................... 340/825.31 combination information code. This results in a com
4,213,118 7/1980 Genest et al. . puted combination information code which is compared
4,218,690 8/1980 Ulch. with the lock combination information code. If this
4,392,133 7/1983 Lundgren. comparison is successful, the test field of the key combi
4,396,914 8/1983 Aston . nation information code is stored in the lock in place of
4,511,946 4/1985 McGahan ........................... 361/172 the lock combination information code and the lock
Primary Examiner-Ulysses Weldon opens.
Attorney, Agent, or Firm-Nilsson, Robbins, Dalgarn,
Berliner, Carson & Wurst
57 ABSTRACT
A combination changing method is used in an access 10 Claims, 5 Drawing Figures
90

SELECT OPERATION BASED ON


KEY OPERATION SELEC INF
COOE
READ FUNCTION INFORMATION
COOE. D. INF CODE WoFELD
COMBINATIONNECODE 8
OPERATION SELECT N. coe
froM CODEDKEY

GENERATE A COMPUTED COMB.


INF CODE FROM OPERAND FED
OFKEY COMB.INF. CODEACCORO
SELECT MEMORYLEVE BASED NG TO SELECTED OPERATION
ONFUNCTION INFCODE

DOES DOES
SELECTED COMPUTE COMB. NO
OCKD INF.Code (NFCODECOMPARE WITH
COMPARE WITHKEY SELECTED LOCK
INE CODE COMB, NF
CODE
86 POWER
DOWN
96 ENTERWAL
STORE TESTFIELD OF KEY COMB.
NF, CODEN PLACE OF SELECTED
LOCK COMB.INFCODE
DOES
SELECTED
LOCKCOM.B. iNFCODECOM
PARE WITH TEST FELD OF
KEY COMBINFCOE
U.S. Patent Feb. 24, 1987 4,646,080

SENTO 3.GO
U.S. Patent Feb. 24, 1987 Sheet 3 of 4 4,646,080

LNOOTlOH.

|TBAETI

EX\CHOWE
f=
LTOENSI |-
AHOWE'W

O
U.S. Patent Feb. 24, 1987 Sheet 4 of 4 4,646,080

Ny/. SELECT OPERATION BASED ON


KEY OPERATION SELECT NF.
90

CODE
READ FUNCTION INFORMATION
CODE. D. INF CODE TWO-FIELD
COMBINATION INF CODE &
OPERATION SELECT NF. CODE
FROM CODED KEY
92

82 GENERATE A COMPUTED COMB.


NF. CODE FROM OPERAND FELD
OF KEY COMB, INF CODE ACCORD
SELECT MEMORY LEVEL BASED NG TO SELECTED OPERATION
ON FUNCTION INF CODE

84 S4

DOES DOES
SELECTED NO
COMPUTED COMB.
NF.CODE COMPARE WITH NO
LOCK D (NF. CODE
COMPARE WITHKEY SELECTED LOCK
ID (NFCODE COMB, NF,
CODE f
86 POWER
DOWN
YES
96. YES INTERVAL O
STORE TEST FIELD OF KEY COMB.
(NF. CODE IN PLACE OF SELECTED
LOCK COMB. NF. CODE
88
DOES
SELECTED
LOCK COMB, NF CODE COM NO
PARE WITH TEST FIELD OF
KEY COMB.INFCODE

YES

F.G. 4
4,646,080
1 2
key unlock combination does not correspond to the
METHOD OF CODE CHANGING FOR combination code stored in the lock, the authorization
ELECTRONICLOCK code from the key is compared with the combination
code from the lock. If correspondence occurs then the
BACKGROUND OF THE INVENTION 5 key unlock combination code is transferred to the lock
This invention relates to methods of operating a secu and stored in place of the previously stored combination
rity system and more particularly to a method for open code.
ing and changing the combination of specific security Yet another combination changing system is dis
devices in the security system. closed in Genest et al., U.S. Pat. No. 4,213, 18, wherein
Numerous electronic security lock systems have been O each code combination stored in a lock has a first and
developed wherein specific locks are operable in re second field and each key card contains a code combi
sponse to a key coded with combination information. nation having a first and second field. When the key is
Such coded keys are inserted into a lock which reads inserted into the lock the two fields of the stored combi
and compares that information with prestored combina 5
nation code and the combination code from the key are
tion information in the lock. If correspondence exists, compared and the lock opens if correspondence exists.
then the lock opens. If correspondence does not exist then the second field of
However, quite typically, in order to change the lock the stored combination code and the first field of the
combination information, the individual lock combina key combination code are compared. If there is corre
tions in each door must be reset manually by changing spondence at this stage an appropriate signal is gener
switches or electrical connections before a new coded 20 ated to store the two fields of the key combination code
key will operate the lock. in the lock memory in place of the two fields of the
Several different approaches have been tried. For stored combination code thereby updating the combina
example, in one type of electronic lock system, a central tion of the lock.
console is electrically connected to each of the individ In Aston, U.S. Pat. No. 4,396,914, a new combination
ual door locks. The central control unit is then used to 25 code is generated in a lock using information from the
remotely set and change the combination information key and from the lock. A combination code on the key
for the individual locks as well as to sense a combination
code on a key inserted into the lock. However, such is compared to the lock combination code. If there is a
systems are vulnerable to system failure since a failure match, the lock opens. If there is not a match, the new
of the central console will cause all of the locks to be 30 combination code is generated by inverting selected bits
come inoperable. Furthermore, such systems require of the lock combination code, according to information
that each individual lock be electrically wired to the on the key. If there is a match, the new combination
central control unit resulting in greatly increased ex code replaces the lock combination code and the lock
pense particularly when retrofitting older buildings. opens.
In another type of electronic lock system, combina 35 Genest et al., U.S. Pat. No. 3,926,021 (reissued as U.S.
tion information of the lock can be changed or other Pat. No. Re29,846), exemplifies, along with other of the
wise replaced by information on the coded key inserted above patents, the use of differing keys (e.g., guest,
into the lock. For example, in Hinman et al., U.S. Pat. maintenance and master) to address different parts of
No. 3,860,911, a coded key actuated automatic code the lock memory. Ulch et al., U.S. Pat. No. 4,218,690,
changing system is described whereby each lock unit 40 and Lundgren, U.S. Pat. No. 4,392,133 are also of some
includes a key decoder with a functionally assigned pair limited, peripheral interest.
of registers containing prestored combination codes. The present invention employs key information for
The first register of the pair stores a current combina use in making an operation selection, from a number of
tion code. The other register of the pair stores a next or available alternative selections, which is then carried
change combination code. When a key coded with both 45 out in a security device in order to determine whether
the current and the change combination codes is in combination information in the device should be
serted, the current combination code carried by the key changed and the device should be opened. This feature
is compared with the data stored in each register. If a and other significant features provide important incre
comparison is made with the first register or the second ments of additional security.
register an appropriate access enable signal is provided. 50
SUMMARY OF THE INVENTION
In addition, if a comparison is made with the second
register the change combination code in the second A method of operating an electronic security device
register is transferred to the first register thus becoming having multiple memory levels includes the steps of
the current combination code; and a new next combina storing a lock combination information code in each of
tion code, also on the key, generated in and provided 55 the multiple memory levels, applying a key operation
for the key in a control console, is inserted in the second select information code and a key combination informa
register. A somewhat similar code changing system is tion code to the security device, and selecting one of the
disclosed in Zucker et al., U.S. Pat. No. 3,800,284, in memory levels having stored therein a lock combina
which combination codes are generated in the locks in tion information code. Combination information from
correspondence with codes generated in the central 60 the selected lock combination information code is com
station. pared with combination information from the key com
Still another code changing system is disclosed in bination information code, and a first opening compare
Sabsay, U.S. Pat. No. 3,821,704 (reissued as U.S. Pat. signal is generated when such combination information
No. Re. 29,259), wherein the key includes an unlock from the selected lock combination information code
combination code and an authorization code and each 65 corresponds to such combination information from the
lock has stored therein a combination code. If the key key combination information code. The security device
unlock combination corresponds to the combination is opened if the first opening compare signal is gener
code in the lock, then the lock opens. However, if the ated. If, in response to such comparing, the first opening
4,646,080 4.
3
compare signal is not generated, an operation selection spond to the data stored in the central console 10 for
is made from a set of predefined operations, based upon that particular lock 12.
the key operation select information code, and this op Referring to FIGS. 2A and 2B, the operational ele
eration selection is applied to combination information ments and interconnections required to enable the elec
from the combination code information to generate a tronic lock to operate in accordance with the method of
computed combination information code. This com the invention is illustrated. Each such lock 12 includes a
puted combination information code is then compared key reader 20, and a lock bolt assembly 24 which is
with information from the combination code informa operable to mechanically move a bolt to allow access
tion, and a second opening compare signal is generated ing to an area secured by the lock bolt assembly 24.
if there is correspondence. The security device is 10 Although the electronic processor 22 will preferably be
opened if the second opening compare signal is gener a special purpose processing unit having the necessary
ated. memory and processing logic, as has generally become
The operation selection may include one or more a conventional approach in electronic lock systems,
arithmetic operations and/or logical operations and/or various functional blocks have been illustrated in FIGS.
other operations. 15 2A and 2B to facilitate explanation of the method in
accordance with the invention.
BRIEF DESCRIPTION OF THE DRAWINGS Each lock 12 is provided with one or more memory
A complete understanding of the present invention levels, each for storing an identification information
code and a combination information code. Each mem
and of the above and other advantages thereof may be 20 ory level represents a different level of access for that
gained from a consideration of the following detailed particular lock. For example, the level 0 identification
description taken in conjunction with the accompany information code and combination information code
ing drawings in which: may be common to all locks in a hotel so that data on a
FIG. 1 is a simplified block diagram of a security coded key which corresponds to the identification in
system in connection with which the method of the 25 formation code and combination information code data
present invention may be used. stored in the level 0 memories will open any lock in the
FIGS. 2A and 2B are a functional block diagram of a hotel. Similarly, the identification information code and
security device interconnected to operate in accordance the combination information code stored in the next
with the method of the present invention. level may be common to a group of rooms so that a key
FIG. 3 is an illustration of data coded on the key and 30 card with data corresponding to the data in a second
read into the security device of FIG. 2. level of memory will open any of the rooms in that
FIG. 4 is a simplified flow chart illustrative of the group. Still another level of memory in the lock may
method in accordance with the invention. contain an identification information code and a combi
DETALED DESCRIPTION nation information code which is unique to that lock. A
35 key card with corresponding identification information
The present invention is a method for changing the code and combination information code data will there
lock combination of one or more locks for securing fore open only one lock in the hotel.
limited access areas such as the rooms in a hotel. In Of course, each lock may have any number of mem
general, each limited access area will have a lock which ory levels where each memory level contains data
is operable in response to a coded key electronically 40 which if matched by the data from a coded key will
read by the lock. Data from the coded key is compared enable the lock to open.
with data stored in the lock and a decision is made as to Turning again to FIGS. 2A and 2B, the operation of
whether the lock should be opened or not. Electronic the method in accordance with the invention may be
lock systems of the general type which are particularly described as follows: Initially, an identification informa
adaptable to the use of the method of the present inven 45 tion code and a combination information code is stored
tion include the systems disclosed in U.S. Pat. No. in each of the memory levels of the processor 22 with
3,926,021 (reissued as U.S. Pat. No. Re. 29,846), U.S. corresponding data being stored in the central console.
Pat. No. 4,213,118 and U.S. Pat. No. 4,283,710. For example, a level 0 identification information code is
Systems in connection with which the method of the stored in a memory 50 and a level 0 combination infor
present invention will be useful may be represented as 50 mation code is stored in a memory 52, a level 1 identifi
shown in FIG. 1. Specifically, such systems include a cation information code is stored in a memory 54 and a
central console 10 which generates and stores all of the level 1 combination information code is stored in a
combination information codes, identification informa memory 56 and so forth with the level N identification
tion codes, function information codes and operation information code stored in a memory 58 and the level N
select information codes required for each of a plurality 55 combination information code stored in a memory 60.
of locks 12. Each lock 12 stores an identification infor When a coded key 14 is inserted into the lock, a key
mation code and a combination information code for reader 20 reads the data from the coded key 14 and
each of a plurality of memory levels in the lock. The transfers that data to a suitable holding register 62. The
central console transfers the required data for a selected particular key reader and the coded key may be an
lock to a coded key 14 such as a key card or other 60 optical, magnetic, electronic or mechanical system
electronic storage device which is given into the posses without departing from the spirit of the invention. Such
sion of the individual or individuals authorized to have card reading systems are well known and will therefore
access to a limited access area secured by one of the not be further described herein.
locks 12. The coded keys 14 may be encoded in any of Control logic and timing 64 is coupled to the holding
a number of different ways either by the central console 65 register 62 and to various of the other operational ele
10 or by some external coding mechanism which coop ments in the functional diagram of FIG. 2. Although
erates with the central console 10 so that the data stored single leads are illustrated from such control logic and
on a coded key 14 for a particular lock 12 will corre timing 64 to various operational elements and from
4,646,080
5 6
various operational elements to the control logic and the location addressed. Such storage locations contain
timing, it will be appreciated that each line may repre operation information codes for various operation alter
sent several leads to carry signals providing the opera natives which may be performed on the operand field of
tion as described herein. the key combination information code.
The control logic and timing 64, through its coupling An operator logic and memory 72 is set (in effect,
to the holding register 62 or key reader 20 senses when programmed) to provide the differing alternatives
the key reader has completed reading the coded key 14 which may be selected by the different operation infor
and transferring the data to the holding reqister 62. The mation codes stored in the operation select memory 70
control logic and timing 64 then receives the function storage locations. Each selection might be one or any
information code data from the holding register and 10 number of arithmetic, logical or other operations. For
based upon that function information code, selects the example, one selection might be the addition of the
particular memory level from which the lock identifica operand field of the key combination information code
tion information code and the lock combination infor to a stored number, its subtraction from a stored number
mation code will be obtained for comparison with the or its division or multiplication by a stored number
key identification information code and a test field of 15 (with a possible truncation of overflow bits in some
the key combination information code stored in the cases). Another selection might be the rotation (circu
holding register 62. For example, if the function code lar) of the operand field bits a set number of positions to
has a value of one, then the control logic and timing 64 the left or right. A third selection might be the inversion
may be set (in effect, programmed) to select or other
wise address the level 0 identification and combination 20 of certain of the operand field bits. Another selection
might incorporate two or all three of these in a selected
information codes. On the other hand, if the function order or a number of the first group in a selected order,
information code has a value of two, then the control etc. As may be appreciated, the availability of alterna
logic and timing 64 may be set to select or otherwise tives, selected in accordance with an operation select
address the level 1 identification and combination infor
mation codes. Other values of the function information 25 information code provided on the coded key 14 pro
code will similarly cause the control logic and timing 64 ducessystem.
a substantial measure of added security for the
to address other memory levels for comparison with the The control logic and timing 64 thus generates signals
key identification and key combination information which enable the operation selection in accordance
codes in the holding register 62.
After a particular memory level has been selected the 30 with the operation information code from the operation
selection memory 70, the transfer of the operand field of
control logic and timing 64 enables the lock identifica the key combination information code, on which the
tion information code from that memory level to be selection is to be performed, from the holding register
transferred to an identification code comparator 66 62 to the operator logic and memory 72 and the perfor
where it is compared with the key identification infor mance of the operation selection. The resulting com
mation code from the holding register 62. If the selected 35
lock identification information code corresponds to the puted combination information code is then transferred
key identification information code an ID compare ittoisa compared computed combination code comparator 74 where
with the selected lock combination infor
signal is generated and sensed by the control logic and mation code (from the selected memory level). If the
timing 64. If an ID compare signal (which could, e.g.,
involve a change in level, e.g., a pulse, along the electri 40 computed combination information code corresponds
cal connection or other indication) is not received by to the selected lock combination information code a
the control logic and timing 64 the control logic and second opening compare signal (which could, e.g.,
timing 64 will power down the lock 12 for a period of again, involve a change in level, e.g., a pulse, along the
time. electrical connection or other such indication) is sent to
On the other hand, if there is correspondence be 45 the control logic and timing 64 which then causes the
tween the selected lock identification, information code test field of the key combination information code to be
and the key identification information code the control transferred to the selected memory level from the hold
logic and timing 64 will transfer the lock combination ing register 62, and replaces the selected lock combina
information code from the same selected memory level tion information code with the test field of the key
to a test combination code comparator 68 where it is 50 combination information code. In addition, the control
compared with the test field of the key combination logic and timing 64 enables the lock bolt assembly 24 to
information code from the holding register 62. If the open.
selected lock combination information code corre By way of specific illustration, if the function infor
sponds to the test field of the key combination informa mation code read from the coded key 14 is a one, then
tion code then a first opening compare signal (which 55 the control logic and timing 64 enables the lock identifi
could, e.g., again involve a change in level, e.g., a pulse, cation information code from the level 0 memory 50 to
along the electrical connection or other such indication) be transferred to the identification code comparator 66.
will be generated by the test combination code compar The control logic and timing 64 also enables the key
ator and sensed by the control logic and timing 64 identification information code from the holding regis
whereupon an open lock signal (which could well, e.g., 60 ter 62 to be transferred to the identification code com
be the same type of indication just noted for the opening parator 66. If the two identification information codes
compare signal) will be transferred to the lock bolt are found to correspond, the control logic and timing 64
assembly 24 enabling the lock bolt assembly 24 to open. enables the lock combination information code from the
If the first opening compare signal is not generated the level 0 memory 52 to be transferred to the test combina
control logic and timing will generate a signal which 65 tion code comparator 68 and further enables the test
enables the operation select information code to address field of the key combination information code from the
one of a number of storage locations in an operation holding register 62 to be transferred to the combination
selection memory 70, such code, of course, determining code comparator 68.
4,646,080
7
If the test field of the key combination information the lock combination information code to be selected.
code and the selected lock combination information Similarly, by way of further illustration, if the operation
code correspond then the control logic and timing sends selection to be performed in the lock is a shift (in circu
a signal to the lock bolt assembly 24 enabling the lock lar fashion) of the bits of the operand field two bits to
bolt assembly 24 to open. If correspondence does not 5 the right, then the operation performed by the central
exist then the control logic and timing 64 enables the console to generate the operand field will be a shift (in
selection of an operation information code from the circular fashion) of the bits of the lock combination
operation selection memory 70 by the operation select information code two bits to the left.
information code, the operation selection in the opera Referring to FIG. 4, a flow chart of the above
tor logic and memory 72 in accordance with the opera 10 described method is illustrated. Specifically, the lock is
tion information code, and the transfer of the operand turned on upon the insertion of a coded key into the
field of the key combination information code to the lock's reader (block 80). Thereafter, the function infor
operator logic and memory. The operation selection, mation code, identification information code, two-field
made from a pre-defined set of alternative selections, is combination information code and operation select in
then applied to the operand field to generate a com 15 formation code are read from the coded key and stored
puted combination information code. The computed in the holding register as illustrated in block 82. The
combination information code is then compared with particular memory level is then selected based upon the
the selected lock combination information code in the function information code in block 84. The lock proces
computed combination code comparator 74 as previ sor then compares the identification information code
ously described. If correspondence occurs then the test 20 from the selected memory level of the lock with the
field of the key combination information code is stored identification information code from the coded key. If
in the level 0 combination code memory and the lock correspondence does not exist, then the lock power is
bolt is opened. This storing of the test field, of course, turned off for a set period of time. If correspondence
changes the lock combination information code for that does exist, then the processor compares the lock combi
memory level to such test field. 25 nation information code from the selected memory
It will be appreciated, of course, that the operand level of the lock with the test field of the key combina
field of the key combination information code must be tion information code from the coded key (block 88). If
computed by the central console prior to being stored correspondence exists, then the lock opens. However, if
on the coded key 14 to assure that a correspondence correspondence does not exist, then additional steps are
will occur when the computed combination information 30 undertaken to determine whether the lock is to open
... code is compared with the lock combination informa and the combination information code in the selected
tion code to be selected in the lock by the key. Such memory level of the lock is to be changed. Accord
computation by the console, of course, must be based on ingly, in block 90, an operation selection is made in the
the operation selection which will be caused by the key lock from the predefined set of alternative selections,
operation select information code which the console 35 based on the key operation select information code; and
also provides. in block 92, a computed combination information code
By way of illustration, when it is desired to generate is generated by applying the operation selection to the
a new combination information code for a particular operand field of the key combination information code.
level in a particular lock, the central console, typically, The computed combination information code (as tem
. . first generates in a random way, a test field portion for 40 porarily stored in a suitable scratch pad memory loca
... a key combination information code. tion) is then compared with the selected lock combina
The console will then provide an operation selection tion information code (block 94). If correspondence
from those available in the lock (information on which does not exist, then the lock power is turned off for a set
is stored in the console) and generate an operation select period of time. However, if correspondence does exist,
information code for the key, which will carry out this 45 then the test field of the key combination information
selection. The console then applies to the existing lock code is stored in the selected memory level of the lock
combination information code to be selected (which is in place of the selected lock combination information
also stored in the central console) what might be conve code (block 96) and, also, the lock opens.
niently termed the “reverse' or “inverse' of the opera As a final matter, it is noted that, in FIG. 3, typical
tion selection which is to be carried out in the lock. The 50 hexadecimal lengths for various key information codes
result will be the operand field of the key combination are shown. In accordance with this, a "digit', as re
information code. The operation select information ferred to therein, is four bits in length, as in conven
code and the two fields of the key combination informa tional hexadecimal fashion. Such code lengths, of
tion code are then stored on the key (with the other course, can readily be varied in accordance with vary
information codes). The coded key may then be inserted 55 ing requirements.
in the key reader and the data transferred to the holding What is claimed is:
register 62 as previously described. The operator logic 1. A method of operating an electronic security de
and memory 72 in the lock, at the appropriate time, will vice having multiple memory levels, comprising the
then apply the operation selection to the operand field stipes of:
and provide a computed combination information code 60 (a) storing a lock combination information code in
which will correspond to the selected lock combination each of the multiple memory levels;
information code. (b) applying a key operation select information code
By way of specific illustration, if the operation selec and a key combination information code to the
tion to be performed by the operator logic and memory security device:
72 is an addition of a certain number to the operand field 65 (c) selecting one of the memory levels having stored
of the key combination information code, then the oper therein a lock combination information code;
ation performed by the central console to generate the (d) comparing combination inforamation from the
operand field will be a subtraction of that number from selected lock combination information code with
4,646,080
10
combination information dependent upon the key from the lock combination information code corre
conbination information code and generating a first sponds to said combination information dependent
opening compare signal if said combination infor upon the key combination information code;
mation from the selected lock combination infor (c) opening the secutity device if the first opening
mation code corresponds to said combination infor compare signal is generated;
mation dependent upon the key combination infor (d) selecting, based upon the key operation select
mation code; information code, from a set of predefined opera
(e) opening the security device if the first opening tions for transforming combination to a plurality of
compare signal is generated; alternative new combination information codes;
(f) selecting, based upon the key operation select 10 (e) applying the operation selection to information
information code, from a set of predefined opera from the key combination information code to
tions for transforming combination information to generate a new, computed combination informa
a plurality of alternative new combination informa tion code if, in response to said comparing of said
tion codes: comparing step, the first opening compare signal is
(g) applying the operation selection to information 15 not generated;
from the key conbination information code togen (f) comparing the new, computed combination infor
erate a new, computed combination information mation code with information from the lock combi
code if, in response to said comparing of said com nation information code and generating a second
paring step, the first opening compare signal is not opening compare signal if the computed combina
generated; 20 tion information code corresponds to said informa
(h) comparing the new, computed combination infor tion from the lock combination information code;
mation code with information from the selected and
lock combination information code and generating (g) opening the security device if the second opening
a second opening compare signal if the computed compare signal is generated.
combination information code corresponds to said 25 6. The electronic security device operating method of
information from the lock combination information claim 5 comprising the additional step of:
code; and storing combination information dependent upon the
(i) opening the security device if the second opening key combination information code in the security
compare signal is generated. device memory in place of the lock combination
2. The electronic security device operating method of 30 information code if the second opening compare
claim 1 comprising the additional step of: signal is generated.
storing combination information dependent upon the 7. The electronic security device operating method of
key combination information code in the selected claim 5 wherein:
memory level in place of the selected lock combi (h) said key combination information code includes
nation inforamtion code if the second opening 35 first and second code fields:
compare signal is generated. (i) in said comparing step (b), combination informa
3. The electronic security device operating method of tion dependent upon said first code field is com
claim 1 wherein: pared with the lock combination information code;
(j) said key combination information code includes (j) in said applying step (e), said operation selection is
first and second code fields; 40 applied to said second code field to generate the
(k) in said comparing step (d), combination informa new, computed combination information code; and
tion dependent upon said first code field is com (k) in said comparing step (f), the new, computed
pared with the selected lock combination informa combination information code is compared with
tion code. the lock combination information code.
(l) in said applying step (g), said operation selection is 45 8. The electronic security device operating method of
applied to said second code field to generate the claim 7 comprising the additional step of:
new, computed combination information code; and storing combination information dependent upon the
(m) in said comparing step (h), the new, computed first field of the key combination information code
combination information code is compared with in the security device memory in place of the lock
the lock combination information code. 50 combination information code if the second open
4. The electronic security device operating method of ing compare signal is generated.
claim 3 comprising the additional step of: 9. A method of operating an electronic security de
storing combination information dependent upon the vice having a memory in which is stored a lock combi
first field of the key combination information code nation information code and a lock identification infor
in the selected memory level in place of the se 55 mation code, comprising the steps of:
lected lock combination information code if the (a) applying a key operation select information code,
second opening compare signal is generated. a key combination information code and a key
5. A method of operating an electronic security de identification information code to the security de
vice having a memory in which is stored a lock combi vice;
nation information code, comprising the steps of: 60 (b) comparing the lock identification information
(a) applying a key operation select information code code with information dependent upon the key
and a key combination information code to the identification information code and generating an
security device; identification compare signal if the lock identifica
(b) comparing combination information from the lock tion information code corresponds to the informa
combination information code with combination 65 tion dependent upon the key identification informa
information dependent upon the key combination tion code;
information code and generating a first opening (c) comparing combination information from the lock
compare signal if said combination information combination information code with combination
4,646,080 12
11
information dependent upon the key combination (c) selecting one of the memory levels having stored
information code if the identification compare sig therein a lock combination information code and a
nal is generated and generating a first opening com lock identification information code:
pare signal if said combination information from (d) comparing the selected lock identification infor
the lock combination information code corre mation code with information dependent upon the
sponds to said combination information dependent key identification information code and generating
upon the key combination information code; an identification compare signal if the selected lock
(d) opening the security device if the first opening
identification information code corresponds to the
information dependent upon the key identification
compare signal is generated; 10 information code;
(e) selecting, based upon the key operation select (e) comparing combination information from the
information code, form a set of predefined opera selected lock combination information code with
tions for transforming combination information to combination information dependent upon the key
a plurality of alternative new combination informa combination information code if the identification
tion codes; 15 compare signal is generated and generating a first
(f) applying the operation selection to information opening compare signal if said combination infor
from the key combination information code to mation from the selected lock combination infor
generate a new, computed combination informa mation code corresponds to said combination infor
tion code if the identification compare signal is mation dependent upon the key combination infor
20 mation code:
generated and the first opening compare signal is (f) operning the security device if the first opening
not generated; compare signal is generated;
(g) comparing the new, computed combination infor (g) selecting, based upon the key select information
mation code with information from the lock combi code, from a set of predefined operations for trans
nation information code and generating a second 25 forming combination information to a plurlaity of
opening compare signal if the computed combina alternative new combination information codes;
tion information code corresponds to said informa (h) applying the operation selection to information
tion from the lock combination information code; from the key combination information code to
and generate a new, computed combination informa
(h) opening the security device if the second opening 30 tion code if the identification compare signal is
compare signal is generated. generated and the first opening compare signal is
10. A method of operating an electronic security not generated;
device having multiple memory levels, comprising the (i) comparing the new, computed combination infor
mation code with information from the selected
steps of: 35 lock combination information code and generating
(a) storing a lock combination information code and a a second opening compare signal if the computed
lock identification information code in each of the combination information code corresponds to said
multiple memory levels; information from the lock combination information
(b) applying a key operation select information code, code; and
a key combination information code and a key 40 (j) opening the security device if the second opening
identification information code to the security de compare signal is generated.
k sk k sk k
vice;

45

50

55

60

65

You might also like