WO2005083210A1 - An access control system - Google Patents

An access control system Download PDF

Info

Publication number
WO2005083210A1
WO2005083210A1 PCT/AU2005/000255 AU2005000255W WO2005083210A1 WO 2005083210 A1 WO2005083210 A1 WO 2005083210A1 AU 2005000255 W AU2005000255 W AU 2005000255W WO 2005083210 A1 WO2005083210 A1 WO 2005083210A1
Authority
WO
WIPO (PCT)
Prior art keywords
reader
relay module
communications
relay
door latch
Prior art date
Application number
PCT/AU2005/000255
Other languages
French (fr)
Inventor
Christopher Ian Blake
Karthik Sivaram
Original Assignee
Bqt Solutions (Australia) Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004901016A external-priority patent/AU2004901016A0/en
Application filed by Bqt Solutions (Australia) Pty Ltd filed Critical Bqt Solutions (Australia) Pty Ltd
Priority to AU2005217663A priority Critical patent/AU2005217663A1/en
Priority to US10/590,673 priority patent/US20080246583A1/en
Priority to GB0619074A priority patent/GB2427495B/en
Publication of WO2005083210A1 publication Critical patent/WO2005083210A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/14Coin-freed apparatus for hiring articles; Coin-freed facilities or services for fastenings for doors; for turnstiles
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Definitions

  • the present invention relates generally to security systems and in particular to access control systems.
  • BACKGROUND Existing controlled access systems utilize a controller in a secure area that is connected to a relay coupled to a door lock that is also in the secure area, Normally, the relay is on the controller.
  • the controller is coupled to a reader, where the reader is in an unsecured area.
  • Another configuration involves a reader with a relay in the same unit, where the relay is in the unsecured area,
  • Figs. 7A and 7B are block diagrams of each of these systems, respectively Fig. 7A illustrates a controller 740 with a relay on board in the secure area
  • the reader 730 is located in the unsecured area 710 and communicates with the controller 740, for example, using Wiegand communications.
  • the controller 740 with the relay is in turn coupled to a door latch 750 in the secure area 720;
  • the reader 730 sends an access number to the controller 740, which looks up the number in a database and deterrnines the access level that is appropriate. If access is granted, the controller 740 enables the relay to activate the door latch 750
  • Fig. 7B illustrates a reader 760 with the database and the relay on board the reader in the unsecured area 710, while the door latch 780 is in the secure area 720.
  • the reader 760 determines that access is to be granted, the reader 760 enables the relay on board the reader 760 to activate the door latch 780. Both of these systems have disadvantages.
  • the system of Fig. 7A involves use of controllers that makes the security systems expensive and the use of Wiegand communications, where Wiegand is a known format and therefore a weak link. Wiegand lines are a "weak link" in the sense that Wiegand formats are normally known formats, such as 26 bits.
  • a code generator is able to simulate sending codes to a controller if the reader is removed from the wall, for example, and Wiegand format signals may be sent down the Wiegand lines to defeat the system.
  • the system of Fig. 7B involves a relay on board the reader.
  • a 5V power supply for example may be used to activate the door relay from the unsecured area.
  • Fig. 8 is a block diagram of a general antipassback system 800 comprising a read only tag 810, a read only device 820, a control panel 830 and server software 840.
  • Antipassback is a feature of access control systems that ensures that cardholders/tag holders are required to properly enter and ejrit areas by using their card/tag. The cardholder must flash their card at the entry and the exit. If the person fails to flash their card upon exit (e.g. by mistake or by tailgating), the person is denied entry on the next occasion for having violated rules by exiting without flashing the card.
  • Fig. 8 is a block diagram of a general antipassback system 800 comprising a read only tag 810, a read only device 820, a control panel 830 and server software 840.
  • Antipassback is a feature of access control systems that ensures that cardholders/tag holders are required to properly enter and
  • step 9 is a flow diagram of the antipassback process 900 performed by the system 800 of Fig. 8.
  • a user flashes the read-only tag 810 to the readonly device 820 coupled to the control panel 830.
  • the control panel 840 contacts a server having server software.840 coupled to the control panel 830.
  • step 930 the antipassback state is checked (on the server/ control panel).
  • step 940 the antipassback state is updated.
  • a relay module for connection to a door latch in a secure area.
  • the relay module comprises a microcontroller decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code, and a relay coupled to the micro-controller switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match.
  • the relay module and the door latch may be a single module.
  • the micro-controller may enable the relay if the comparison indicates a correct match. If the relay is enabled, power runs through the door latch to unlock a door.
  • the relay module may further comprise at' least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader.
  • the buf ⁇ er protects the micro-controller from being damaged if a spike occurs in the communications between the reader and the relay module, he buffer may rectify any voltage level drop between the reader and the relay module.
  • a method of switching a door latch in a secure area comprises the steps of decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code, and switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match.
  • a micro -controller may implement the decrypting and comparing steps.
  • a relay coupled to the micro-controller may implement the switching step.
  • the relay module and the door latch may be a single module.
  • the micro-controller enables the relay if the comparison indicates a correct match. If the relay is enabled, power runs through the door latch to unlock a door.
  • the method may further comprise the step of receiving the encrypted communications from the reader.
  • At least one buffer coupled to the micro-controller may implement the receiving step.
  • the buffer protects the micro-controller from being damaged if a spike occurs in the communications between the reader and the relay module.
  • the buffer may rectify any voltage level drop between the reader and the relay module.
  • an access control system comprising: a reader located in an unsecured area for determining access rights in response to presentation of a card and generating encrypted communications; a relay module located in a secure area for receiving the encrypted communications from the reader, decrypting the encrypted communications, and comparing the decrypted communications to an expected code; a door latch coupled to the relay module, the door latch actuated by the relay module switching power if the comparison of the decrypted communications and the expected code indicates a correct match.
  • the generated encrypted communications comprises an access command for the relay module.
  • the door latch may be directly connected to the relay module,
  • the relay module and the door latch may be a single module.
  • the reader may comprise logic functions and a database residing in the reader.
  • the database may hold information including access times, users, hot-listing, holidays, and the like.
  • the reader may be autonomous if communications are cut or a master computer is brought down.
  • the reader may be a smartcard reader and the card may be a smartcard.
  • the sn artcard may implement an anti-passback feature.
  • the reader may be a biometric reader.
  • the relay module may be a storage relay module.
  • the relay module may comprise: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to the micro-controller for switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match.
  • the relay module may further comprise at least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader.
  • the communications maybe encrypted using 128-bit ABS. 3DES, DES, or skipjack.
  • a method of controlling access to a secure area comprises the steps of; determining access rights using a reader located in an unsecured area in response to presentation of a card and generating encrypted communications; receiving the encrypted communications from the reader using a relay module located in a secure area for, decrypting the encrypted communications, and comparing the decrypted communications to an expected code; actuating a door latch coupled to the relay module using the relay module by switching power if the comparison of the decrypted communications and the expected code indicates a correct match.
  • the generated encrypted communications may comprise an access command for the relay module.
  • the door latch may be directly connected to the relay module.
  • the relay module and the door latch may be a single module.
  • the reader may comprise logic functions and a database residing in the reader.
  • the database may hold information including access times, users, hot-listing, holidays, and the like.
  • the reader may be autonomous if communications are cut or a master computer is brought down.
  • the reader may be a smartcard reader, and the card may be a smartcard.
  • the smartcard may implement an anti-passback feature.
  • the reader may be a biometric reader.
  • the relay module may be a storage relay module.
  • the relay module may comprise: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to the micro-controller for switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match.
  • the relay module may further comprise at least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader.
  • the communications may be encrypted using 128-bit AES, 3DES, DES, or skipjack.
  • a metliod of providing antipassback in an access control system comprises the steps of: reading antipassback information from a read write smartcard presented to a read/write reader; checking permissions using the read/write reader; and updating the read/write smartcard with updated antipassback information using the reader.
  • a method of providing antipassback in an access control system comprises the steps of: reading antipassback information from a read write smartcard presented to a read/write reader; checking permissions using the read/write reader; and updating the read/write smartcard with updated antipassback information using the reader.
  • the method comprises the steps of: reading antipassback information from a read/write smartcard presented to a read/write reader; determining if the antipassback information passes an integrity check based on an entry/exit pattern; and if the antipassback information passes, the integrity check, writing updated antipassback information to the read/write smartcard and granting access.
  • the method may further comprise the step of, if the antipassback information fails to satisfy the integrity check, denying access.
  • the antipassback may able to be disabled.
  • the antipassback may be normalized so that a cardholder may proceed through an antipassback area without violating antipassback rules.
  • a database of readers may be updated with an antipassback flag.
  • Fig. 1 is a block diagram of an access control system in accordance with an embodiment of the invention
  • Fig. 2 is a block diagram of an access control system in accordance with another embodiment o f the invention
  • Fig. 3 is a block diagram illustrating operation of the embodiments of Figs. 1 and 2
  • Fig.4 is a block diagram illustrating the details of the relay module of Fig. 1
  • Fig. 5 is a block diagram illustrating the configuration of an access control system with several readers
  • Fig. 6 is a block diagram illustrating the configuration of an access control system with several readers using an RS485 hub
  • Figs. 1 is a block diagram of an access control system in accordance with an embodiment of the invention
  • Fig. 2 is a block diagram of an access control system in accordance with another embodiment o f the invention
  • Fig. 3 is a block diagram illustrating operation of the embodiments of Figs. 1 and 2
  • Fig.4 is a block diagram illustrating the details of the relay module of
  • FIGS. 7A and 7B are block diagrams illustrating operation of a controller with a relay on board and a reader with a relay on board, respectively;
  • FIG. 8 is a block diagram of a general antipassback system;
  • Fig. 9 is a flow diagram of the antipassback process performed by the system of Fig. 8;
  • Fig. 10 is a block diagram of an access control system with a relay module;
  • Fig. 11 is a block diagram of an access control system with a storage relay module;
  • Fig. 12 is a flow diagram the antipassback feature implemented in the access control system;
  • Fig. 13 is a detailed flow diagram of normal operation of the antipassback feature;
  • Fig. 14 is a detailed flow diagram of disabled operation of the antipassback feature;
  • Fig. 8 is a block diagram of a general antipassback system;
  • Fig. 9 is a flow diagram of the antipassback process performed by the system of Fig. 8;
  • Fig. 10 is a block diagram
  • the embodiments of the invention provide an access control system and software package.
  • the access control system includes the following functionality: remote reader updating, encrypted communications, a relay module, and the ability to incorporate biometrics on a smartcard. Any of a number of readers may be practiced, such as the BQT Solutions BT816, BT843, and BT910 readers.
  • the embodiments of the invention have a number of advantageous features, including encrypted communications.
  • the embodiments of the invention enable doors to be physically secured using a memory system that resides on a reader.
  • Fig, 1 is a block diagram of an access control system 100 in accordance with an embodiment of the invention comprising a smartcard reader 110, a relay module 120, and a door latch 130.
  • the door latch 130 and the relay module 120 are in the secure area, while the reader 110 is in the unsecured area.
  • a smartcard may be used with the reader 110 to gain access to the secure area, If the smartcard is authorized for access, the relay module 120 actuates the door latch.
  • Fig. 10 is a block diagram of an access control system 1000 with a relay module 1030.
  • a read/write card 1 10 can be presented to a read/write device 1020, which is coupled to server software 1040 and the relay module 1030.
  • Fig. 4 is a block diagram of a relay module 400, with which the embodiment of Fig. 1 may be practiced.
  • the relay module 400 comprises buffers 440, a micro-controller 442, and a relay 444.
  • the relay module 400 receives communications 420 from the reader, which are input to the buffers 440, ' which in turn are coupled to the micro-controller 442.
  • the micro-controller 442 operates the relay 444 in a conventional manner.
  • the relay 444 has an output to actuate the door latch 430.
  • the relay module 410 is the equivalent of a switch. If the relay module 410 receives the correct code from the reader, the relay module 410 throws the relay 444 that unlocks the door. '
  • the buffers 440 ensure that if a spike occurs in communications between the reader and the relay module 410, the micro-controller 442 is not damaged.
  • the buffers 440 also ensure that any voltage level lost between the reader and the relay module 410 is recovered.
  • the micro-controller 442 decrypts the encrypted communications from the reader and compares the decrypted communications to the code expected. If this is correct, the micro-controller 442 enables the relay 444.
  • the relay 444 switches power to actuate the door latch 430. If enabled, power runs through the door latch 430, unlocking the door, Fig, 3 illustrates operation of the access control system 300.
  • the reader 310 has a database on board and is located on the unsecured side. The reader 310 communicates with the relay module 320 using encrypted communications. If a user attempts to access the secure area using the reader 310, the reader 310 looks up the user data in the database and determines the access level. If the user is permitted access, the reader 310 sends an access command to the relay module 320 via the encrypted communications. In turn, the relay module 320 on the secure side activates the door latch 330.
  • Anti-Fassback provides anti-passback by placing an indicator or flag on a smartcard once a user has passed through an entry door. This ensures that the same smartcard cannot be used on the same entry reader 110 until the smartcard has been presented to the exit reader.
  • the flag is a composite bit field of the current entry status at different levels " (i.e., different sets of entry and exit doors). Thus, the corresponding flag bit (if unset) is set if entering a set of entry / exit doors, and is unset, if leaving the flag bit (if set). Any violation of this principle is an antipassback violation.
  • the anti-passback function is implemented on a controller, but in the embodiments of the invention is implemented partly on the reader 110 and partly on the smartcard.
  • Fig. 12 is a flow diagram the antipassback (APB) feature 1200 implemented in the access control system.
  • the user flashes the tag.
  • the reader reads the APB data from the card.
  • the reader checks permissions based on the read APB data.
  • the reader updates the tag with updated information.
  • Fig, 13 is a more detailed flow diagram of normal operation 1300 of the antipassback feature.
  • step 1310 the user flashes the tag to a reader.
  • step 1320 the reader reads the APB iiUOrmation from the tag.
  • step 1330 a check is made to determine if the APB information passes an integrity check based on entry/exit patterns. If step 1330 returns false (N.o), access is denied in step 1340. Otherwise, if decision step 1330 returns true (Yes), processing continues at step 1350.
  • step 1350 the reader updates APB information and write the information back to the tag/card.
  • step 1360 access is processed normally.
  • Fig. 14 is a more detailed flow diagram of disabled operation 1400 of the antipassback feature.
  • step 1410 the user flashes the tag to a reader.
  • decision step 1420 a check is made to determine if the APB feature is disable for the cardholder in the local database. If step 1420 returns true (Yes), processing continues at step 1470 and access is processed normally. Otherwise, if decision step 1420 returns false (No), processing continues at step 1430.
  • step 1430 the reader reads the APB information from the tag.
  • decision step 1440 a check is made to determine if the APB information passes an integrity check based on entry/exit patterns. If step 1440 returns false (No), access is denied in step 1450, Otherwise, if decision step 1440 returns true (Yes), processing continues at step 1460. In step 1460, the reader updates the APB information and writes the information back to the tag/card.
  • Fig. 1 is a more detailed flow diagram of normalized operation 1500 of the antipassback feature in a reader.
  • step 1510 the user flashes the tag to the reader.
  • step 1520 the reader reads the APB information from the tag.
  • decision step 1530 a check is made to determine if the APB normalize flag is set for the cardholder in a local database. If step 1530 returns true (Yes), processing continues at step 1560- In step 1560, the reader updates the antipassback information and writes the updated information back to the card/tag.
  • step 1 70 access is processed normally.
  • Fig. 1 is a detailed flow diagram of normalized operation 1600 of the antipassback feature as implemented in, the server.
  • step 1610 a user violates the antipassback feature (e.g., by tailgating another user). This results in the user not being granted access elsewhere, so in step 1620 the user notifies the system administrator about this circumstance.
  • step I630 the administrator activates the normalize APB feature for the user. For example, this may be done using a graphical interface requiring the administrator to click a software option.
  • step 1640 the software updates the database of all readers with the normalize APB flag for the user.
  • the normalize APB feature allows a user to proceed through any antipassback areas without violating the APB rules for a specified number of times, e.g. one time only. This can be used to allow a cardhol er who has violated APB rules to continue using the readers until the user normalizes the user's APB status.
  • Encrypted Communications The system 100 can ensure that communications between a master computer and the readers are encrypted.
  • the type of encrypted communication can be 128-bit AES, 3DES, DES, or skipjack. Other encryption techniques may be practiced as well.
  • the server may also provide interface management.
  • the readers can run offline. The reader operates even if the "server is down. The reader may store up to 20,000 transactions, however, other numbers of transactions may be stored without departing from the scope and spirit of the invention. For example, if a larger capacity memory- is used in the readers, larger numbers of transactions may be stored.
  • Communications Relay The relay module 120, 410 communicates using encryption (e.g., 128-bit AES, 3DES, DES or skipjack) with a corresponding reader 110. Upon receiving an activation code, the relay module 120, 410 activates the door strike 130, 430- This ensures that even with access to the power and communication wires at the back of the reader 110, access cannot be forced. Biometrics on Card
  • FIG.2 illustrates an access control system 200 in accordance with a further embodiment of the invention.
  • the access control system 200 comprises a biometric reader 210, a storage relay module (SRM) 220, and a door latch 230.
  • SRM storage relay module
  • the reader 210 can be integrated into the. access control system 200.
  • One smartcard can store all information needed for the access control system 200, as well as a biometric fingerprint template. If TitanTec BT910 readers are used throughout a facility, a biometric verification can be enforced before access is granted.
  • the database and interfacing to the master computer is done via the Storage Relay Module (SRM) 220.
  • SRM Storage Relay Module
  • the SRM 220 comprises an RS485 interface, me ory for a database, and standard relay module functions.
  • the SRM 220 has been designed to minimise changes to the BQT Solutions BT910.
  • the SRM is based on the BT816 reader, without Mifare.
  • the BT910 sends an encrypted access code and the SRM searches its database and, if a match is found, powers the door latch through its relay.
  • the SRM also communicates with software through an RS485 link. All database updates, functions, anti passback, etc., are kept on the SRM.
  • the BT 10 does not hold the database.
  • the SRM allows any reader that does not have a database, to be used in the embodiments of the invention.
  • Fig. 11 is a block diagram of an access control system 1100, A read write card 1110 is presented or flashed to a read write device 1120, which is coupled to a storage relay module 1130, In turn the SRM 1130 is coupled to software 1140.
  • Access Control Systems Fig. 5 shows one configuration of an access control system 500 in accordance with the embodiments of the invention. The details of the relay modules and the door lock are not depicted to simplify the drawing.
  • a number of readers 520 can be coupled together using RS 485 with a terminating resistor 510 at one end.
  • a converter 530 may be used to convert RS 4S5 to USB/Serial communications, and vice versa.
  • the converter 530 is coupled to the master computer or server 540 using RS 232 or USB communications.
  • the computer 540 has access control software installed in the computer 540 to interface with the readers 520.
  • a converter is used to enable communications from the computer via a serial interface (e.g., RS232 or USB) to readers on the network (e.g., RS485). Readers may be connected in parallel across an RS485 network, and a terminating resistor may be used on the end of each line to ensure goodRS485 communications.
  • Fig. 6 shows another configuration of an access control system 600 like that of Fig. 5, but using an RS485 hub 630.
  • the hub 630 has 8 spokes but other numbers of spokes may be practiced. Each spoke has up to 30 readers 620 coupled to it, and there is a terminating resistor 610 at the end of each sequence of readers 620.
  • the hub 630 is in mm coupled to a converter 640, which is coupled to the computer or server 650. While up to 30 readers are described with reference to the drawings, the number of readers may be much higher than 30.- An installer may be able to install more than 30 readers. It will be appreciated by those skilled in the art that other numbers of spokes and readers may be practiced without departing from the spirit and scope of the invention. ' By having a reader contain both smartcard reading capabilities and database abilities, the use of a controller is eliminated.
  • a relay module for connection to a door latch in a secure area, a method of switching a door latch in a secure area, an access control system, a method of controlling access to a secure area and a method of providing antipassback in an access controlsystem have been disclosed. While a number of specific embodiments have been described, it will be apparent to those skilled in the art in the view of the disclosure herein that modifications and substitutions may be made without departing from the scope and spirit of the invention.

Abstract

A method of switching a door latch (130, 230, 330, 430) in a secure area, a relay module (120, 220, 320), and an access control system are disclosed. Encrypted communications from a reader (110, 210, 310, 420) in an unsecured area are decrypted, and the decrypted communications are compared to an expected code. A micro-controller (442) may implement the decrypting and comparing steps. Power is switched to actuate the door latch (130, 230, 330, 430) if the comparison of the decrypted communications and the expected code indicates a correct match. A relay (444) coupled to the micro-controller (442) may implement the switching step. The relay module (120, 220, 320) and the door latch (130, 230, 330, 430) may be a single module. The method may further comprise the step of receiving the encrypted communications from the reader (110, 210, 310, 420). At least one buffer (440) coupled to the micro-controller (442) may implement the receiving step.

Description

AN ACCESS CONTROL SYSTEM
FIELD OF THE INVENTION The present invention relates generally to security systems and in particular to access control systems.
BACKGROUND Existing controlled access systems utilize a controller in a secure area that is connected to a relay coupled to a door lock that is also in the secure area, Normally, the relay is on the controller. The controller is coupled to a reader, where the reader is in an unsecured area. Another configuration involves a reader with a relay in the same unit, where the relay is in the unsecured area, Figs. 7A and 7B are block diagrams of each of these systems, respectively Fig. 7A illustrates a controller 740 with a relay on board in the secure area
720. The reader 730 is located in the unsecured area 710 and communicates with the controller 740, for example, using Wiegand communications. The controller 740 with the relay is in turn coupled to a door latch 750 in the secure area 720; In operation, the reader 730 sends an access number to the controller 740, which looks up the number in a database and deterrnines the access level that is appropriate. If access is granted, the controller 740 enables the relay to activate the door latch 750, Fig. 7B illustrates a reader 760 with the database and the relay on board the reader in the unsecured area 710, while the door latch 780 is in the secure area 720. If the reader 760 determines that access is to be granted, the reader 760 enables the relay on board the reader 760 to activate the door latch 780. Both of these systems have disadvantages. The system of Fig. 7A involves use of controllers that makes the security systems expensive and the use of Wiegand communications, where Wiegand is a known format and therefore a weak link. Wiegand lines are a "weak link" in the sense that Wiegand formats are normally known formats, such as 26 bits. A code generator is able to simulate sending codes to a controller if the reader is removed from the wall, for example, and Wiegand format signals may be sent down the Wiegand lines to defeat the system. The system of Fig. 7B involves a relay on board the reader. Thus, a 5V power supply for example may be used to activate the door relay from the unsecured area. Fig. 8 is a block diagram of a general antipassback system 800 comprising a read only tag 810, a read only device 820, a control panel 830 and server software 840. Antipassback is a feature of access control systems that ensures that cardholders/tag holders are required to properly enter and ejrit areas by using their card/tag. The cardholder must flash their card at the entry and the exit. If the person fails to flash their card upon exit (e.g. by mistake or by tailgating), the person is denied entry on the next occasion for having violated rules by exiting without flashing the card. Fig. 9 is a flow diagram of the antipassback process 900 performed by the system 800 of Fig. 8. In step 910, a user flashes the read-only tag 810 to the readonly device 820 coupled to the control panel 830. In step 920, the control panel 840 contacts a server having server software.840 coupled to the control panel 830. In step 930, the antipassback state is checked (on the server/ control panel). In step 940, the antipassback state is updated.
SUMMARY In accordance with an aspect of the invention, there is provided a relay module for connection to a door latch in a secure area. The relay module comprises a microcontroller decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code, and a relay coupled to the micro-controller switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match. The relay module and the door latch may be a single module. The micro-controller may enable the relay if the comparison indicates a correct match. If the relay is enabled, power runs through the door latch to unlock a door. The relay module may further comprise at' least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader. The bufϊer protects the micro-controller from being damaged if a spike occurs in the communications between the reader and the relay module, he buffer may rectify any voltage level drop between the reader and the relay module. In accordance with another aspect of the invention, there is provided a method of switching a door latch in a secure area. The method comprises the steps of decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code, and switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match. A micro -controller may implement the decrypting and comparing steps. A relay coupled to the micro-controller may implement the switching step. The relay module and the door latch may be a single module. The micro-controller enables the relay if the comparison indicates a correct match. If the relay is enabled, power runs through the door latch to unlock a door. The method may further comprise the step of receiving the encrypted communications from the reader. At least one buffer coupled to the micro-controller may implement the receiving step. The buffer protects the micro-controller from being damaged if a spike occurs in the communications between the reader and the relay module. The buffer may rectify any voltage level drop between the reader and the relay module. In accordance with a further aspect of the invention, there is provided an access control system, comprising: a reader located in an unsecured area for determining access rights in response to presentation of a card and generating encrypted communications; a relay module located in a secure area for receiving the encrypted communications from the reader, decrypting the encrypted communications, and comparing the decrypted communications to an expected code; a door latch coupled to the relay module, the door latch actuated by the relay module switching power if the comparison of the decrypted communications and the expected code indicates a correct match. The generated encrypted communications comprises an access command for the relay module. The door latch may be directly connected to the relay module, The relay module and the door latch may be a single module. The reader may comprise logic functions and a database residing in the reader. The database may hold information including access times, users, hot-listing, holidays, and the like. The reader may be autonomous if communications are cut or a master computer is brought down. The reader may be a smartcard reader and the card may be a smartcard. The sn artcard may implement an anti-passback feature. The reader may be a biometric reader. The relay module may be a storage relay module. The relay module may comprise: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to the micro-controller for switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match. The relay module may further comprise at least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader. The communications maybe encrypted using 128-bit ABS. 3DES, DES, or skipjack. In accordance with still a further aspect of the invention, there is provided a method of controlling access to a secure area. The method comprises the steps of; determining access rights using a reader located in an unsecured area in response to presentation of a card and generating encrypted communications; receiving the encrypted communications from the reader using a relay module located in a secure area for, decrypting the encrypted communications, and comparing the decrypted communications to an expected code; actuating a door latch coupled to the relay module using the relay module by switching power if the comparison of the decrypted communications and the expected code indicates a correct match. The generated encrypted communications may comprise an access command for the relay module. The door latch may be directly connected to the relay module. The relay module and the door latch may be a single module. The reader may comprise logic functions and a database residing in the reader. The database may hold information including access times, users, hot-listing, holidays, and the like. The reader may be autonomous if communications are cut or a master computer is brought down. The reader may be a smartcard reader, and the card may be a smartcard. The smartcard may implement an anti-passback feature. The reader may be a biometric reader. The relay module may be a storage relay module. The relay module may comprise: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to the micro-controller for switching power to actuate the door latch if the comparison of the decrypted communications and the expected code indicates a correct match. The relay module may further comprise at least one buffer coupled to the micro-controller for receiving the encrypted communications from the reader. The communications may be encrypted using 128-bit AES, 3DES, DES, or skipjack. In accordance with yet another aspect of the invention, there is provided a metliod of providing antipassback in an access control system, The method comprises the steps of: reading antipassback information from a read write smartcard presented to a read/write reader; checking permissions using the read/write reader; and updating the read/write smartcard with updated antipassback information using the reader. In accordance with still another aspect of the invention, there is provided a method of providing antipassback in an access control system. The method comprises the steps of: reading antipassback information from a read/write smartcard presented to a read/write reader; determining if the antipassback information passes an integrity check based on an entry/exit pattern; and if the antipassback information passes, the integrity check, writing updated antipassback information to the read/write smartcard and granting access. The method may further comprise the step of, if the antipassback information fails to satisfy the integrity check, denying access. The antipassback may able to be disabled. The antipassback may be normalized so that a cardholder may proceed through an antipassback area without violating antipassback rules. A database of readers may be updated with an antipassback flag.
BRIEF DESCRIPTION OF THE DRAWINGS A number of embodiments of the invention are described hereinafter with reference to the drawings, in which: Fig. 1 is a block diagram of an access control system in accordance with an embodiment of the invention; Fig, 2 is a block diagram of an access control system in accordance with another embodiment o f the invention; Fig. 3 is a block diagram illustrating operation of the embodiments of Figs. 1 and 2; Fig.4 is a block diagram illustrating the details of the relay module of Fig. 1; Fig. 5 is a block diagram illustrating the configuration of an access control system with several readers; Fig. 6 is a block diagram illustrating the configuration of an access control system with several readers using an RS485 hub; Figs. 7A and 7B are block diagrams illustrating operation of a controller with a relay on board and a reader with a relay on board, respectively; Fig. 8 is a block diagram of a general antipassback system; Fig. 9 is a flow diagram of the antipassback process performed by the system of Fig. 8; Fig. 10 is a block diagram of an access control system with a relay module; Fig. 11 is a block diagram of an access control system with a storage relay module; Fig. 12 is a flow diagram the antipassback feature implemented in the access control system; Fig. 13 is a detailed flow diagram of normal operation of the antipassback feature; Fig. 14 is a detailed flow diagram of disabled operation of the antipassback feature; Fig. 15 is a detailed flow diagram of normalized operation of the antipassback feature as implemented in a reader; and Fig; 16 is a detailed flow diagram of normalized operation of the antipassback feature as implemented in a server; and DETAILED DESCRIPTION The embodiments of the invention provide an access control system and software package. The access control system includes the following functionality: remote reader updating, encrypted communications, a relay module, and the ability to incorporate biometrics on a smartcard. Any of a number of readers may be practiced, such as the BQT Solutions BT816, BT843, and BT910 readers. The embodiments of the invention have a number of advantageous features, including encrypted communications. The embodiments of the invention enable doors to be physically secured using a memory system that resides on a reader. In particular, the logic functions and the database reside on the reader. The database is contained within the reader and holds access times, users, hot-listing, holidays, etc. The reader is autonomous if communications are cut or the master computer is brought down. The resulting relay module increases security as the relay module enables encrypted communications. Fig, 1 is a block diagram of an access control system 100 in accordance with an embodiment of the invention comprising a smartcard reader 110, a relay module 120, and a door latch 130. In this embodiment, the door latch 130 and the relay module 120 are in the secure area, while the reader 110 is in the unsecured area. A smartcard may be used with the reader 110 to gain access to the secure area, If the smartcard is authorized for access, the relay module 120 actuates the door latch. Importantly, communications 112 between the reader 110 and the relay module 120 are encrypted. Any of a number of encryption techniques hereinafter may be practiced. Fig. 10 is a block diagram of an access control system 1000 with a relay module 1030. A read/write card 1 10 can be presented to a read/write device 1020, which is coupled to server software 1040 and the relay module 1030. Fig. 4 is a block diagram of a relay module 400, with which the embodiment of Fig. 1 may be practiced. The relay module 400 comprises buffers 440, a micro-controller 442, and a relay 444. The relay module 400 receives communications 420 from the reader, which are input to the buffers 440, 'which in turn are coupled to the micro-controller 442. The micro-controller 442 operates the relay 444 in a conventional manner. The relay 444 has an output to actuate the door latch 430. The relay module 410 is the equivalent of a switch. If the relay module 410 receives the correct code from the reader, the relay module 410 throws the relay 444 that unlocks the door. ' The buffers 440 ensure that if a spike occurs in communications between the reader and the relay module 410, the micro-controller 442 is not damaged. The buffers 440 also ensure that any voltage level lost between the reader and the relay module 410 is recovered. The micro-controller 442 decrypts the encrypted communications from the reader and compares the decrypted communications to the code expected. If this is correct, the micro-controller 442 enables the relay 444. The relay 444 switches power to actuate the door latch 430. If enabled, power runs through the door latch 430, unlocking the door, Fig, 3 illustrates operation of the access control system 300. The reader 310 has a database on board and is located on the unsecured side. The reader 310 communicates with the relay module 320 using encrypted communications. If a user attempts to access the secure area using the reader 310, the reader 310 looks up the user data in the database and determines the access level. If the user is permitted access, the reader 310 sends an access command to the relay module 320 via the encrypted communications. In turn, the relay module 320 on the secure side activates the door latch 330. Anti-Fassback The embodiments of the invention provide anti-passback by placing an indicator or flag on a smartcard once a user has passed through an entry door. This ensures that the same smartcard cannot be used on the same entry reader 110 until the smartcard has been presented to the exit reader. The flag is a composite bit field of the current entry status at different levels "(i.e., different sets of entry and exit doors). Thus, the corresponding flag bit (if unset) is set if entering a set of entry / exit doors, and is unset, if leaving the flag bit (if set). Any violation of this principle is an antipassback violation. Normally, the anti-passback function is implemented on a controller, but in the embodiments of the invention is implemented partly on the reader 110 and partly on the smartcard. For software ease of use, the software has options to reset the antipassback status of the card (ignore and set) and to disable anti-passback for a particular cardholder- Both of these options are downloaded to the reader with the use of various status bits in a cardholder's permission record. Fig. 12 is a flow diagram the antipassback (APB) feature 1200 implemented in the access control system. In step 1210, the user flashes the tag. In step 1220, the reader reads the APB data from the card. In step 1230, the reader checks permissions based on the read APB data. In step 1240, the reader updates the tag with updated information. Fig, 13 is a more detailed flow diagram of normal operation 1300 of the antipassback feature. In step 1310, the user flashes the tag to a reader. In step 1320, the reader reads the APB iiUOrmation from the tag. In step 1330, a check is made to determine if the APB information passes an integrity check based on entry/exit patterns. If step 1330 returns false (N.o), access is denied in step 1340. Otherwise, if decision step 1330 returns true (Yes), processing continues at step 1350. In step 1350, the reader updates APB information and write the information back to the tag/card. In step 1360, access is processed normally. Fig. 14 is a more detailed flow diagram of disabled operation 1400 of the antipassback feature. In step 1410, the user flashes the tag to a reader. In decision step 1420, a check is made to determine if the APB feature is disable for the cardholder in the local database. If step 1420 returns true (Yes), processing continues at step 1470 and access is processed normally. Otherwise, if decision step 1420 returns false (No), processing continues at step 1430. In step 1430, the reader reads the APB information from the tag. In decision step 1440, a check is made to determine if the APB information passes an integrity check based on entry/exit patterns. If step 1440 returns false (No), access is denied in step 1450, Otherwise, if decision step 1440 returns true (Yes), processing continues at step 1460. In step 1460, the reader updates the APB information and writes the information back to the tag/card. Processing then continues at step 1470, in which access is processed normally. Thus, the disable operation 1400 of APB allows the APB feature to be disabled for the cardholder on all readers. Fig. 1 is a more detailed flow diagram of normalized operation 1500 of the antipassback feature in a reader. In step 1510, the user flashes the tag to the reader. In step 1520, the reader reads the APB information from the tag. In decision step 1530, a check is made to determine if the APB normalize flag is set for the cardholder in a local database. If step 1530 returns true (Yes), processing continues at step 1560- In step 1560, the reader updates the antipassback information and writes the updated information back to the card/tag. In step 1 70, access is processed normally. Otherwise, if decision step 1530 returns false (No), processing continues at decision step 1540. In step 1540, a check is made to determine if the APB information passes an integrity check based on entry/exit patterns. If step 1540 returns false (No), processing continues at step 1550 and access is denied. Otherwise, if step 1540 returns true (Yes), processing continues at step 1560. The corresponding process on the server is described hereinafter, Fig. 1 is a detailed flow diagram of normalized operation 1600 of the antipassback feature as implemented in, the server. In step 1610, a user violates the antipassback feature (e.g., by tailgating another user). This results in the user not being granted access elsewhere, so in step 1620 the user notifies the system administrator about this circumstance. In step I630, the administrator activates the normalize APB feature for the user. For example, this may be done using a graphical interface requiring the administrator to click a software option. In step 1640, the software updates the database of all readers with the normalize APB flag for the user. Thus, the normalize APB feature allows a user to proceed through any antipassback areas without violating the APB rules for a specified number of times, e.g. one time only. This can be used to allow a cardhol er who has violated APB rules to continue using the readers until the user normalizes the user's APB status. Encrypted Communications The system 100 can ensure that communications between a master computer and the readers are encrypted. The type of encrypted communication can be 128-bit AES, 3DES, DES, or skipjack. Other encryption techniques may be practiced as well. The server may also provide interface management. The readers can run offline. The reader operates even if the "server is down. The reader may store up to 20,000 transactions, however, other numbers of transactions may be stored without departing from the scope and spirit of the invention. For example, if a larger capacity memory- is used in the readers, larger numbers of transactions may be stored. Communications Relay The relay module 120, 410 communicates using encryption (e.g., 128-bit AES, 3DES, DES or skipjack) with a corresponding reader 110. Upon receiving an activation code, the relay module 120, 410 activates the door strike 130, 430- This ensures that even with access to the power and communication wires at the back of the reader 110, access cannot be forced. Biometrics on Card
Other embodiments of the invention can be practiced using biometrics. Fig.2 illustrates an access control system 200 in accordance with a further embodiment of the invention. The access control system 200 comprises a biometric reader 210, a storage relay module (SRM) 220, and a door latch 230. Through the use of the storage relay module 220, the reader 210 can be integrated into the. access control system 200. One smartcard can store all information needed for the access control system 200, as well as a biometric fingerprint template. If BanqueTec BT910 readers are used throughout a facility, a biometric verification can be enforced before access is granted. The database and interfacing to the master computer is done via the Storage Relay Module (SRM) 220. The SRM 220 comprises an RS485 interface, me ory for a database, and standard relay module functions. The SRM 220 has been designed to minimise changes to the BQT Solutions BT910. The SRM is based on the BT816 reader, without Mifare. The BT910 sends an encrypted access code and the SRM searches its database and, if a match is found, powers the door latch through its relay. The SRM also communicates with software through an RS485 link. All database updates, functions, anti passback, etc., are kept on the SRM. The BT 10 does not hold the database. The SRM allows any reader that does not have a database, to be used in the embodiments of the invention. The BT910 does not contain these functions and so is complemented by the SRM 220 to be able to work on the access control system. Fig. 11 is a block diagram of an access control system 1100, A read write card 1110 is presented or flashed to a read write device 1120, which is coupled to a storage relay module 1130, In turn the SRM 1130 is coupled to software 1140. Access Control Systems Fig. 5 shows one configuration of an access control system 500 in accordance with the embodiments of the invention. The details of the relay modules and the door lock are not depicted to simplify the drawing. A number of readers 520 can be coupled together using RS 485 with a terminating resistor 510 at one end. At the other end, a converter 530 may be used to convert RS 4S5 to USB/Serial communications, and vice versa. The converter 530 is coupled to the master computer or server 540 using RS 232 or USB communications. The computer 540 has access control software installed in the computer 540 to interface with the readers 520. A converter is used to enable communications from the computer via a serial interface (e.g., RS232 or USB) to readers on the network (e.g., RS485). Readers may be connected in parallel across an RS485 network, and a terminating resistor may be used on the end of each line to ensure goodRS485 communications. Fig. 6 shows another configuration of an access control system 600 like that of Fig. 5, but using an RS485 hub 630. In this embodiment, the hub 630 has 8 spokes but other numbers of spokes may be practiced. Each spoke has up to 30 readers 620 coupled to it, and there is a terminating resistor 610 at the end of each sequence of readers 620. The hub 630 is in mm coupled to a converter 640, which is coupled to the computer or server 650. While up to 30 readers are described with reference to the drawings, the number of readers may be much higher than 30.- An installer may be able to install more than 30 readers. It will be appreciated by those skilled in the art that other numbers of spokes and readers may be practiced without departing from the spirit and scope of the invention. ' By having a reader contain both smartcard reading capabilities and database abilities, the use of a controller is eliminated. Further, by using encrypted communications, the limitations of Wiegand communications is eliminated as a possible communication weak link, This allows small to medium sized companies to save while still obtaining an improved security system. A relay module for connection to a door latch in a secure area, a method of switching a door latch in a secure area, an access control system, a method of controlling access to a secure area and a method of providing antipassback in an access controlsystem have been disclosed. While a number of specific embodiments have been described, it will be apparent to those skilled in the art in the view of the disclosure herein that modifications and substitutions may be made without departing from the scope and spirit of the invention.

Claims

The claims defining the invention are as follows:
1. A relay module for connection to a door latch in a secure area, comprising: a micro-controller decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code; and a relay coupled to said micro-controller switching power to actuate said door latch if the comparison of said decrypted communications and said expected code indicates a correct match. 2. The relay module of claim 1 , wherein said relay module and said door latch are a single module. 3. The relay module of claim 1 , wherein said micro-controller enables said relay if the comparison indicates a correct match. 4. The relay module of claim 3, wherein if said relay is enabled, power runs through said door latch to unlock a door. 5. The relay module of claim 1, further comprising at least one buffer coupled to said micro-controller for receiving said encrypted communications from said reader. 6. The relay module of claim 5, wherein said at least one buffer protects said micro-controller from being damaged if a spike occurs in said communications between said reader and said relay module. 7. The relay module of claim 5, wherein said at least one buffer rectifies any voltage level drop between said reader and said relay modul . 8. A method of switching a door latch in a secure area, said method comprising the steps of: decrypting encrypted communications from a reader in an unsecured area and comparing the decrypted communications to an expected code; and switching power to actuate said door latch if the comparison of said decrypted communications and said expected code indicates a correct match.
9. The method of claim 8, wherein a micro-controller implements said decrypting and comparing steps. 10. The method of claim 9, wherein a relay coupled to said microcontroller implements said switching step. 11. The method of claim 10, wherein said relay module and said door latch are a single module. 12. The method of claim 9, wherein said micro-controller enables said relay if the comparison indicates a correct match. 13. The method of claim 12, wherein if said relay is enabled, power runs through said door latch to unlock a door. 14. The method of claim 8, further comprising the step of receiving said encrypted communications from said reader. 15. The method of claim 14, wherein at least one buffer coupled to said micro-controller implements said receiving step. 16. The method of claim 15, wherein said at least one buffer protects said micro-controller from being damaged if a spike occurs in said communications between said reader and said relay module. 17. The method of claim 15, wherein said at least one buffer rectifies any voltage level drop between said reader and said relay module. i8. An access control system, comprising: a reader located in an unsecured area for determining access rights in response to presentation of a card and generating encrypted communications; a relay module located in a secure area for receiving said encrypted communications from said reader, decrypting said encrypted communications, and comparing the decrypted communications to an expected code; a door latch coupled to said relay module, said door latch actuated by said relay module switching power if the comparison of said decrypted communications and said expected code indicates a correct match. 19. The access control system according to claim 18, wherein said generated encrypted communications comprises an access command for said relay module.
20. The access control system according to claim 18, wherein said door latch is directly connected to said relay module. 21. The access control system according to claim 20, wherein said relay module and said door latch are a single module. 22. The access control system according to claim 18, wherein said reader comprises logic functions and a database residing in said reader. 23. The access control system according to claim 22, wherein said database holds information including access times, users, hot-listing, holidays, and the like. 24. The access control system according to claim 22, wherein said reader is autonomous if communications are cut or a master computer is brought down. 25. The access control system according to claim 18, wherein said reader is a smartcard reader and said card is a smartcard. 26. The access control system according to claim 25, wherein said smartcard implements an anti-passback feature. 27. The access control system according to claim 18, wherein said reader is a biometric reader. 28. The access control system according to claim 18, wherein said rela module is a storage relay module. . 29. The access control system according to claim 18, wherein said relay module comprises: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to said micro-controller for switching power to actuate said door latch if the comparison of said decrypted communications and said expected code indicates a correct match. 30. The access control system according to claim 29, wherein said relay module further comprises at least one buffer coupled to said micro-controller for receiving said encrypted communications from said reader.
31. The access control system according to claim 18, wherein said communications are encrypted using 128-bit AES, 3DES, DES, or skipjack. 32. A method of controlling access to a secure area, said method comprising the steps of: determining access rights using a reader located in an unsecured area in response to presentation of a card and generating encrypted communications; receiving said encrypted communications from said reader using a relay module located in a secure area for, decrypting said encrypted communications, and comparing the decrypted communications to an expected code; and acmating a door latch coupled to said relay module using said relay module by switching power if the comparison of said decrypted cornmunications and said expected code indicates a correct match. 33. The method according to claim 32, wherein said generated encrypted communications comprises an access command for said relay module. 34. The method according to claim 32, wherein said door latch is directly connected to said relay module. 35. The method according to claim 34, wherein said relay module and said door latch are a single module. 36. The method according to claim 32, wherein said reader comprises logic functions and a database residing in said reader. 37. The method according to claim 36, wherein said database holds information including access times, users, hot-listing, holidays, and the like, 38. The method according to claim 36, wherein said reader is autonomous if communications are cut or a master computer is brought down. 39. The method according to claim 32, wherein said reader is a smartcard reader and said card is a smartcard. 40. The method according to claim 39, wherein said smartcard implements an anti-passback feature. 41. The method according to claim 32, wherein said reader is a biometric reader,
42. The method according to claim 32, wherein said relay module is a storage relay module. 43. The method according to claim 32, wherein said relay module comprises: a micro-controller for decrypting encrypted communications from a reader in an unsecured area and for comparing the decrypted communications to an expected code; and a relay coupled to said micro-controller for switching power to actuate said door latch if the comparison of said decrypted communications and s id expected code indicates a correct match. 44. The method according to claim 43, wherein said relay module further comprises at least one buffer coupled to said micro-controller for receiving said encrypted communications from said reader. 45. The method according to claim 32, wherein said communications are encrypted using 128-bit AES, 3DES, DES, or skipjack. 46. A method of providing antipassback in an access control system, said method comprising the steps of: reading antipassback information from a read/write smartcard presented to a read/write reader; checking permissions using said read write reader; and updating said read/write smartcard with updated antipassback information using said reader. 47. A method of providing antipassback in an access control system, said method comprising the steps of: reading antipassback information from a read/write smartcard presented to a read write reader; determining if said antipassback information passes an integrity check based on an entry/exit pattern; and if the antipassback information passes the integrity check, writing updated antipassback information to said read write smartcard and granting access.
48. The method according to claim 47, further comprising the step of, if the antipassback information fails to satisfy the integrity check, denying access. 49. The method according to any one of claims 46 to 48, wherein said antipassback is able to be disabled. 50. The method according to any one of claims 46 to 49, wherein said antipassback is able to be normalized so that a cardholder may proceed through an antipassback area without violating antipassback rules, 51. The method according to claim 50, wherein a database of readers is updated with an antipassback flag.
PCT/AU2005/000255 2004-02-27 2005-02-28 An access control system WO2005083210A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU2005217663A AU2005217663A1 (en) 2004-02-27 2005-02-28 An access control system
US10/590,673 US20080246583A1 (en) 2004-02-27 2005-02-28 Access Control System
GB0619074A GB2427495B (en) 2004-02-27 2005-02-28 An access control system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2004901016 2004-02-27
AU2004901016A AU2004901016A0 (en) 2004-02-27 An Access Control System

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US10/598,136 A-371-Of-International US7697990B2 (en) 2004-02-20 2005-02-21 Method and apparatus for detection and treatment of respiratory disorder by implantable device
US12/712,856 Continuation US9050024B2 (en) 2004-02-20 2010-02-25 Method and apparatus for detection and treatment of respiratory disorder by implantable device

Publications (1)

Publication Number Publication Date
WO2005083210A1 true WO2005083210A1 (en) 2005-09-09

Family

ID=34891651

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/000255 WO2005083210A1 (en) 2004-02-27 2005-02-28 An access control system

Country Status (3)

Country Link
US (1) US20080246583A1 (en)
GB (1) GB2427495B (en)
WO (1) WO2005083210A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2230619A1 (en) * 2009-03-19 2010-09-22 Shining Union Limited Microelectronic lock system
US8009013B1 (en) * 2007-09-21 2011-08-30 Precision Control Systems of Chicago, Inc. Access control system and method using user location information for controlling access to a restricted area
US8203426B1 (en) 2007-07-11 2012-06-19 Precision Edge Access Control, Inc. Feed protocol used to report status and event information in physical access control system
EP3131066A1 (en) * 2015-08-11 2017-02-15 Honeywell International Inc. Heterogeneous clustered anti-pass back host processing system and method

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1941466B1 (en) * 2005-10-27 2015-12-02 International Business Machines Corporation System and method for dynamically managing badge access
TWI393023B (en) * 2008-11-28 2013-04-11 Univ Shu Te Data confidentiality design method
US20120068815A1 (en) * 2010-09-21 2012-03-22 Honeywell International Inc. System and Method for Automatically Updating, Backing Up or Restoring Access Control Systems
CN102956065B (en) * 2012-10-25 2014-12-03 江西方迪科技有限公司 Locker controlling method and locker controlling system
US10515493B2 (en) * 2014-12-05 2019-12-24 Avigilon Corporation Method and system for tracking and pictorially displaying locations of tracked individuals
US10922747B2 (en) * 2016-04-28 2021-02-16 10F Pursuit LLC System and method for securing and removing over-locks from vacant storage units
US11094152B2 (en) * 2016-04-28 2021-08-17 10F Pursuit LLC System and method for applying over-locks without requiring unlock codes
US10475115B2 (en) * 2017-09-20 2019-11-12 Bradford A. Minsley System and method for managing distributed encrypted combination over-locks from a remote location
US10614650B2 (en) * 2017-09-20 2020-04-07 Bradford A. Minsley System and method for managing distributed encrypted combination over-locks from a remote location
US11663650B2 (en) * 2017-09-20 2023-05-30 DaVinci Lock LLC System and method for transmitting unlock codes based on event triggers
US11416919B2 (en) * 2017-09-20 2022-08-16 DaVinci Lock LLC System and method for retrieving an unlock code via electronic messaging
US11538098B2 (en) * 2017-09-20 2022-12-27 DaVinci Lock LLC System and method for randomly generating and associating unlock codes and lock identifiers
US10755500B2 (en) * 2017-11-06 2020-08-25 Moca System Inc. Access control system and access control method using the same
KR102151843B1 (en) * 2017-11-06 2020-09-04 주식회사 모카시스템 Sub reader and sub reader control method
CN111833473B (en) * 2020-07-27 2022-04-29 江苏电子信息职业学院 Attendance management machine for enterprise management

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2118614A (en) * 1982-04-16 1983-11-02 Leonard Joseph Genest Method of code changing for electronic lock
US4758835A (en) * 1985-08-21 1988-07-19 Vdo Adolf Schindling Ag System for the locking and/or unlocking of a security device
RU2043476C1 (en) * 1992-12-09 1995-09-10 Виталий Сергеевич Новиков Electronic lock
US5459305A (en) * 1991-09-20 1995-10-17 Eriksson; Lennart Method and system for decentralized individual attendance data and control
US5467080A (en) * 1992-08-11 1995-11-14 Smh Management Services Ag Security arrangement intended for opening and/or closing of doors in particular for an automotive vehicle
JP2000357212A (en) * 1999-06-15 2000-12-26 Matsushita Electric Works Ltd Contactless id system and data registration and deletion method for this system
JP2001243430A (en) * 2000-02-29 2001-09-07 Matsushita Electric Works Ltd Method for updating id data in id system and method for updating registered or dleted card
EP1178168A1 (en) * 2000-08-04 2002-02-06 U-Code, Inc. Electromechanical lock with different sequences of operation in relation to keying in different access codes
JP2004316201A (en) * 2003-04-15 2004-11-11 Mitsubishi Electric Corp In-and-out management device
JP2005023680A (en) * 2003-07-03 2005-01-27 Mitsubishi Electric Corp Apparatus for managing entry into/exit from room

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4634846A (en) * 1984-05-22 1987-01-06 American District Telegraph Company Multimode programmable stand-alone access control system
EP0536286B1 (en) * 1990-06-14 1999-09-01 Medeco Security Locks, Inc. Distributed database security system
US6218955B1 (en) * 1996-02-07 2001-04-17 Harrow Products, Inc. Infrared link for security system
FR2828755B1 (en) * 2001-08-14 2004-03-19 Atmel Nantes Sa DEVICE AND METHOD FOR RECOGNIZING AT LEAST ONE PERSON, CORRESPONDING ACCESS CONTROL DEVICE AND SYSTEM AND APPLICATION
US7649726B2 (en) * 2004-08-16 2010-01-19 National Instruments Corporation Protection circuit for general-purpose digital I/O lines

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2118614A (en) * 1982-04-16 1983-11-02 Leonard Joseph Genest Method of code changing for electronic lock
US4758835A (en) * 1985-08-21 1988-07-19 Vdo Adolf Schindling Ag System for the locking and/or unlocking of a security device
US5459305A (en) * 1991-09-20 1995-10-17 Eriksson; Lennart Method and system for decentralized individual attendance data and control
US5467080A (en) * 1992-08-11 1995-11-14 Smh Management Services Ag Security arrangement intended for opening and/or closing of doors in particular for an automotive vehicle
RU2043476C1 (en) * 1992-12-09 1995-09-10 Виталий Сергеевич Новиков Electronic lock
JP2000357212A (en) * 1999-06-15 2000-12-26 Matsushita Electric Works Ltd Contactless id system and data registration and deletion method for this system
JP2001243430A (en) * 2000-02-29 2001-09-07 Matsushita Electric Works Ltd Method for updating id data in id system and method for updating registered or dleted card
EP1178168A1 (en) * 2000-08-04 2002-02-06 U-Code, Inc. Electromechanical lock with different sequences of operation in relation to keying in different access codes
JP2004316201A (en) * 2003-04-15 2004-11-11 Mitsubishi Electric Corp In-and-out management device
JP2005023680A (en) * 2003-07-03 2005-01-27 Mitsubishi Electric Corp Apparatus for managing entry into/exit from room

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DATABASE WPI Week 199621, Derwent World Patents Index; AN 1996-207824 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8203426B1 (en) 2007-07-11 2012-06-19 Precision Edge Access Control, Inc. Feed protocol used to report status and event information in physical access control system
US8009013B1 (en) * 2007-09-21 2011-08-30 Precision Control Systems of Chicago, Inc. Access control system and method using user location information for controlling access to a restricted area
EP2230619A1 (en) * 2009-03-19 2010-09-22 Shining Union Limited Microelectronic lock system
EP3131066A1 (en) * 2015-08-11 2017-02-15 Honeywell International Inc. Heterogeneous clustered anti-pass back host processing system and method
US10009346B2 (en) 2015-08-11 2018-06-26 Honeywell International Inc. Heterogeneous clustered anti-pass back host processing system and method

Also Published As

Publication number Publication date
US20080246583A1 (en) 2008-10-09
GB2427495B (en) 2008-05-28
GB0619074D0 (en) 2006-11-15
GB2427495A (en) 2006-12-27

Similar Documents

Publication Publication Date Title
US20080246583A1 (en) Access Control System
US6643783B2 (en) Multi-level secure computer with token-based access control
JP2004528655A (en) Frequency method
US5768379A (en) System for the checking of limited access to authorized time slots renewable by means of a portable storage device
EP1168137A1 (en) Smart card reader with usb interface for connection to personal computers and the like
JPH06501324A (en) Smart card validation device and method
US9111084B2 (en) Authentication platform and related method of operation
KR100654857B1 (en) Authentication smart card system and controlling method thereof using multi - biometric informations
US6256616B1 (en) System for identifying the user of postal equipment
WO2001020463A1 (en) Security arrangement
CN105320859A (en) Right control method and apparatus
US20030014642A1 (en) Security arrangement
GB2446912A (en) Access control having antipassback
JPH10154131A (en) File access management system
EP0982687A1 (en) Method for preventing or detecting fraud in an identification system
AU2005217663A1 (en) An access control system
JP2917670B2 (en) Electric lock control device
KR100653033B1 (en) Method of controling enter and leave using the wireless commuincation terminal
KR200188799Y1 (en) Apparatus for controlling entrance
RU2260840C2 (en) Protection means
JPH10252327A (en) Key system with id, night safe device, and rent safe system
JPH1069435A (en) Ic card
JP3169462B2 (en) Data entry machine for door lock system
JP2871042B2 (en) Access control device
RU2180453C1 (en) Method and device for protection against unauthorized access to data processing facilities residing on guarded area

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 0619074.8

Country of ref document: GB

Ref document number: 0619074

Country of ref document: GB

Ref document number: 2005217663

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2005217663

Country of ref document: AU

Date of ref document: 20050228

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2005217663

Country of ref document: AU

122 Ep: pct application non-entry in european phase
WWE Wipo information: entry into national phase

Ref document number: 10590673

Country of ref document: US