Access control system for unlocking a lock module, and method thereof

ABSTRACT

The present invention relates to an access control system, an access object and a method for access control. The access control system comprises an access request receiving device being configured and operable for receiving an access object; the access request receiving device comprising an emitter configured and operable for irradiating the access object with a radiation having a wavelength in the range of about 10″12 and 10″9 m and a detector configured and operable for detecting a response signal from the irradiated access object; a control circuit being configured and operable to receive the response signal from the access request receiving device and process the response signal to identify spectral features indicative of an XRF signature of the access object; wherein the control circuit is adapted to generate an unlocking signal for switching a module device between a locked state and an unlocked state upon identification of the XRF signature.

TECHNOLOGICAL FIELD

The present invention generally provides a novel technique for accesscontrol and key control.

BACKGROUND

Advanced access control methods for selective restriction of access relyon a piece of information (e.g. a PIN number, biometric identificationdata) which is presented to a reader at an access point. In suchsystems, the information/code is inputted via a keypad or it may becarried by a physical media such as swipe cards, RFID devices which areread by a reader installed at the point of access. The same types ofsystems and method are used in systems and methods for preventingunauthorized duplication of keys.

US Patent Application No. 2014/0145823 to Aase is directed to accesscontrol systems that utilize Near Field Communications (NFC)-enableddevices. The disclosed system enables an NFC device to be remotelychecked-in to the access control system. The NFC device operates in aread/write mode rather than a card emulation mode when interacting withRFID readers of the access control system.

U.S. Pat. No. 8,408,851 to Hadad is directed to a method for duplicatinga key including receiving a key identification code indicative of keycuts in an original key, and duplicating the original key by forming keycuts in a duplicate key in response to the key identification code,wherein authorization to form the key cuts is restricted by means of averification code that must be passed before forming the key cuts ispermissible. The authorization to form the key cuts may be restricted invarious ways, such as to a group of users, a geographic location of auser, or a group of key blanks. The authorization to form the key cutsmay be restricted as a function of a physical characteristic of theoriginal key. As another alternative, authorization to form the key cutsmay be restricted as a function of whether the original key is a masterkey or a slave key.

X-ray fluorescence (XRF) marking is a technique used to detect andpossibly quantify chemical material elements and/or compositionsconstituents which can serve for marking an object. Theparameters/identity of the object can then be identified based on thedetected materials.

Counterfeiting and supply chain diversion of materials, are phenomenaimpacting many fields. Many materials of inferior quality, including butnot limited to raw materials, electronics, polymers and pharmaceuticalsare counterfeited by manufacturers and enter the supply chain, often bycopying labeling associated with “brand” companies. To this end, thereare various techniques known in the art which utilize XRF marking toidentify object/materials and determine their source/manufacturer/ownerand/or various parameter and thereby enabling to discern between theoriginal materials/goods and counterfeit materials/goods. Since chemicalmakeup of the original and counterfeited materials may be similar, sometechniques utilize additive XRF markers (such as compositions ofmaterials having specific a-priory known XRF signature), which arespecifically added to the object to enable identification of the objectand/or certain parameters thereof such as its source.

For example, U.S. Pat. No. 8,590,800 discloses a method ofauthenticating and/or identifying an article containing a chemicalmarking agent, which is substantially inseparably enclosed in a markeras a carrier and contains selected chemical elements and/or compounds inthe form of marker elements, in concentrations based on a predeterminedencryption code, which method comprises the steps of: i) qualitativelyand/or quantitatively identifying the marker elements of the chemicalmarking agent, and ii) comparing the values identified in step (i) withthe predetermined encryption code.

U.S. Pat. No. 8,864,038 discloses a material tracing technique forencoding information in a material. The technique includes storinginformation to be encoded in the material, generating a number based onthe information, determining an amount of at least one tracer to beincorporated into the material corresponding to the number, andincorporating the determined amount of the at least one tracer into thematerial. Decoding information encoded in the material includesmeasuring an amount of the at least one tracer, in some embodimentsafter tracer activation, determining a number corresponding to themeasured at least one tracer, and decoding the number to obtaininformation associated with the material.

U.S. Pat. No. 7,999,659 discloses a method for access control to atleast one memory area of a passive and/or backscatter-based transponder.In the method for access control, depending on an identificationselection criterion, a first or at least one second identificationwithin the transponder is activated, the activated identification uponan appropriate request by reader unit is transmitted to the unit, the atleast one memory area of the transponder is divided into memory blockswith a settable size, access control information is assigned to arespective memory block, and read and/or write access to a specificmemory block is released or blocked depending on the associated accesscontrol information and the identification selection criterion.

U.S. Pat. No. 8,571,254 discloses an authentication system including ameasuring portion that radiates terahertz waves to a portable medium forauthentication including materials having a characteristic oscillationfrequency in a terahertz frequency band, measures a spectrum, andoutputs a measurement spectrum that is a measurement result; acharacteristic spectrum database which stores a characteristic spectrumof the materials; a discriminating portion that discriminates thematerials that are included in the portable medium for authenticationbased on the measurement spectrum and the characteristic spectrum, andoutputs a discrimination result.

General Description

The present invention relates to a novel access control technique.According to this technique, there is provided an access control systemcomprising an access request receiving device being configured andoperable for receiving an access object; the access request receivingdevice comprising an emitter configured and operable for irradiating theaccess object with a radiation having a wavelength in the range of about10⁻¹² and 10⁻⁹ m and a detector configured and operable for detecting aresponse signal from the irradiated access object; a control circuitbeing configured and operable to receive the response signal from theaccess request receiving device and process the response signal toidentify spectral features indicative of an XRF signature of the accessobject; wherein the control circuit is adapted to generate an unlockingsignal for switching a module device between a locked state and anunlocked state upon identification of the XRF signature. The accessrequest receiving device may be configured as X-ray fluorescence (XRF)reader, configured for reading access objects marked by XRF. In thefollowing X-ray fluorescence (XRF) is used to refer to the emission ofcharacteristic “secondary” (or fluorescent) X-rays from a material thathas been excited by a primary X-ray or gamma-ray radiation. The termfluorescence refers absorption of radiation of a specific energyresulting with the re-emission of radiation of a different energy(typically lower).

The lock module is commonly used to hold lids, doors or other closureelements of boxes, safes, cabinets, doorways and other framed structuresin closed and/or locked positions, and further typically is used toprovide some measure of security against unauthorized or inadvertentaccess. The lock module may be an electrical, mechanical orelectromechanical lock.

The technique of the present invention is associated with an accessobject (e.g. a key, an access card, a ticket) with one or more compoundsthat are appended to the access object and which may be detected or readby x-ray fluorescence (XRF). The access object may be metallic keys orkey blanks, with or without plastic parts (such as handles, grips orcovers), plastic cards, or paper cards/tickets. The novel access controltechnique of the invention is highly generic, insensitive to objectmaterials and structure and thus permits verification of authenticity ofa great variety of such objects, e.g., metallic keys or key blanks, withor without plastic parts (such as handles, grips or covers), plasticcards, or paper cards/tickets. The access object may be associated withpersonnel for which access should be granted or denied.

In some embodiments, the module device is a lock module operable betweenan unlocked state and a locked state and vice versa.

In some embodiments, at least one of the access request receiving deviceand the control circuit are at least partially disposed within the lockmodule.

In some embodiments, the access request receiving device is configuredsuch that a distance between the access object received by the accessrequest receiving device and the access request receiving device doesnot exceed 1 cm.

In some embodiments, the access control system further comprises aradiation absorbing element configured and operable to prevent emissionof the radiation out of the access control system.

In some embodiments, the access control system further comprises ahousing, wherein the control circuit, the access request receivingdevice, and the lock module are housed in the housing.

In some embodiments, the control circuit comprises a memory in which XRFsignatures for the lock module are stored.

In some embodiments, the access control system further comprises adatabase for storing XRF signatures to which the control circuitincludes access.

In some embodiments, the lock module includes a motor mechanicallycoupled to a latch mechanism for locking and unlocking the latchmechanism, thereby switching the lock module between the unlocked andlocked state.

In some embodiments, the control circuit comprises a coupling memberconfigured and operable to control the motor.

In some embodiments, the access control system further includes aprocessor coupled to the access control system. The processor isconfigured for modifying XRF signatures list associated with user accessstored within the control circuit. The processor may be a part of theaccess control system or may be external to said access control systemproviding communication between the database and the lock module andmodification/addition of signatures if required by the user.

In some embodiments, the lock module is adapted to secure a door.

In some embodiments, the lock module is integrated within a door.

In some embodiments, the lock module is adapted to fit within anaperture formed in a door for a standard mechanical lock.

In some embodiments, the access control system is connectable to anetwork with a host computer. The host computer is external to thecontrol circuit.

In some embodiments, the access control system further comprises anaccess object having an XRF signature corresponding to a certain lockmodule.

In some embodiments, the access object is a key comprising a codedphysical or electrical pattern for opening the lock module. The databaseincludes data indicative of the coded physical or electrical patterncorresponding to a certain XRF signature.

In some embodiments, the control circuit is adapted to receive from thedatabase, the data indicative of a correspondence between the codedpattern and the XRF signature, to thereby determine a match between theXRF signature and the pattern and upon determining the match switchingthe lock module between the unlocked and locked state.

In some embodiments, the access object comprises a first codable partadapted for carrying a coded physical or electrical patterncorresponding to a lock module, and a second codable part carrying atleast one XRF marker embedded therein and defining the XRF signature tobe matched with the lock module.

In some embodiments, the module device is an access object duplicationassembly adapted to enable duplication of the coded physical orelectrical pattern in the first codable part, upon receiving theunlocking signal generated by the control circuit.

According to another broad aspect of the present invention, there isprovided an access object comprising a first codable part adapted forcarrying a coded physical or electrical pattern corresponding to a lockmodule, and a second codable part carrying at least one XRF markerembedded therein and defining an XRF signature to be matched with thelock module to enable unlocking the lock module based on a matchingbetween the coded physical or electrical pattern and the XRF signature.

In some embodiments, the access object comprises at least one of keys,key blanks, locks, access cards, access badges, tickets, and Iddocuments such as passports, identification cards.

In some embodiments, the access object comprises a metallic key havingplastic grip, wherein the metallic key and the plastic grip has the sameXRF signature.

In some embodiments, the XRF signature includes information about atleast one of a depth of key cuts defining a key combination, physicalcharacteristic of the key, configuration of a key profile.

In some embodiments, the access object is to be used with an accesscontrol system is defined above.

According to another broad aspect of the present invention, there isprovided a method for access control comprising: irradiating an accessobject with radiation having a wavelength in the range of about 10⁻¹² to10⁻⁹ m; detecting a response signal from the irradiated access object;identifying in the response signal spectral features indicative of anXRF signature; and; generating an unlocking signal for switching amodule device between a locked state and an unlocked state uponidentification of the XRF signature.

In some embodiments, the method comprises enabling access uponidentification of the XRF signature.

In some embodiments, the method comprises switching a lock modulebetween an unlocked state and a locked state and vice versa.

In some embodiments, the method comprises modifying a XRF signatureslist associated with user access.

In some embodiments, the method comprises securing a door.

In some embodiments, the method comprises receiving data indicative of acorrespondence between a coded pattern carried by the access object andthe XRF signature, to thereby determine a match between the XRFsignature and the pattern.

In some embodiments, the method comprises preventing unauthorized keyduplication upon identification of the XRF signature.

According to another broad aspect of the present invention, there isprovided a key duplication machine applying the method as defined above.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to better understand the subject matter that is disclosedherein and to exemplify how it may be carried out in practice,embodiments will now be described, by way of non-limiting example only,with reference to the accompanying drawings, in which:

FIG. 1a is a schematic block diagram of an access system of the presentinvention;

FIG. 1b is a schematic illustration of an access object of the presentinvention;

FIG. 1c is a schematic illustration of a lock module of the presentinvention;

FIG. 2 is a flow chart of a method for access control according to someembodiments of the present invention; and;

FIG. 3 is a flow chart of a method for preventing unauthorized keyduplication according to some embodiments of the present invention.

DETAILED DESCRIPTION OF EMBODIMENTS

Reference is made to FIG. 1a representing a block diagram of the accesscontrol system of the present invention. The system comprises a lockmodule 302 an access request receiving device 304 and a control circuit306. The access request receiving device 304 and/or the control circuit306 may be integrated or not within the lock module 302. The accessrequest receiving device 304 is configured and operable for receiving anaccess object and comprises an emitter 304 a comprising and operable forirradiating the access object with a radiation having a wavelength inthe range of about 10⁻¹² and 10⁻⁹ m and a detector 304 b configured andoperable for detecting a response signal from the irradiated accessobject. The access request receiving device 304 may be an XRF reader ofany type known in the art such as disclosed for example in U.S.Provisional patent application No. 62/142,100 or in U.S. Provisionalpatent application No. 62/396,412 assigned to the assignee of thepresent invention which is incorporated herein by reference or in U.S.Pat. No. 6,501,823. Although for the sake of clarification, theradiation emitter 304 a and the radiation detector 304 b are representedas two separate physical elements, they can be integrated in the samephysical element or in the same housing. To be enable to identify theXRF signature, the system 10 is configured such that, when the accessobject is inserted within the access request receiving device 304, thedistance between the access object and the access request receivingdevice 304 does not exceed 1 cm. It should also be appreciated that theemitter and the detector can be placed anywhere at a certain distancefrom the access object to be inserted, on the lock module, on the wallnext to the lock module, in elevators without a lock, gate controllers,etc.

The control circuit 306 is configured generally as acomputing/electronic utility including inter alia such utilities as datainput and output utilities 306A, 306B, memory 306C, and data processormodule 306D. As will be described more specifically further below, thecontrol circuit 306 is configured to receive and process the responsesignal emitted by the XRF coded access object and identify spectralfeatures indicative of an XRF signature of the respective XRF codedaccess object. For example, the XRF signature may include informationabout the depth of the key cuts that define the key combination (such asto lift pins to a shear line in cylinder lock), as well as otherinformation regarding a physical characteristic of the key, such as butnot limited to, the configuration of the keyway profile. The informationincluded in the XRF signature can be associated with the manufacturerand/or manufacturing process, for example date of manufacturing, serialnumber, client or destination of the object, date of shipment, type ofkey/access object, but it can also include more detailed information onthe cutting process as suggested above.

The control circuit 306 may be a portable XRF analyzer. It should benoted that the access request receiving device 304 may be also portableand/or handheld device. In this configuration, the access requestreceiving device 304 is spaced-apart from the lock module 302. Theaccess object is then interrogated by the access request receivingdevice 304 at some location which can be distant from the lock moduleand the response signal authenticating the access object is transmittedto the lock module 302 via wired/wireless connection or via acommunication network. In some embodiments, the access control system isconnectable to a communication network with a host computer, which hostcomputer is external to the control circuit 306. Alternatively, theportable access request receiving device 304 can be also attached to thelock module 302 by using a coupling member of any type. The controlcircuit 306 is configured and operable to control access at an accesspoint and for key control purposes. The control circuit 306 may beintegrated within the lock module 302 or may be a separate elementcommunicating with the access request receiving device 304 via wire orwireless communication. If the control circuit 306 is integrated withinthe lock module 302, identification of the access object does notrequire or employ any type of electronic components, circuitry orantenna. It is not shown in details, but should be appreciated thatsignal exchange and communication is enabled between the modules of thesystem by virtue of appropriate wiring or wirelessly. For example, theaccess request receiving device 304 and the control circuit 306 can beconnected by IR (Infra-Red), RF (radio frequency including Bluetooth) orcable control. If the access request receiving device 304 and thecontrol circuit 306 are integrated in the same physical housing, the XRFsignature is stored in the control circuit 306. Access in such anembodiment is determined at the particular access point withoutcommunicating with additional system. It should be noted that suchconfiguration maximizes security i.e. such system cannot be hacked byeavesdropping to the communication between the different components ofthe system.

The system 10 is configured to be used with an access object configuredto be identifiable by XRF, such that upon examination by XRF analysis,authenticity of the access object may be verified and access to anaccess point may be allowed or denied. For example, the access objectcomprises an authentic key for which access should be allowed, having apreselected XRF signature. The XRF coded access object is incorporatedin a general coding system wherein the identification of the accessobject is determined according to the preselected signature. Accessrules and restrictions, as well as authorizations for various operations(e.g. duplication of a key) depend on the preselected signature of theaccess object. The preselected signature of the access objects can beused at the same time for a number of purposes, for example accesscontrol, key control and prevention of unauthorized duplication. Theaccess object may be any object which is used for access or anycomponent of an access control or key control system, such objects maybe, for example, keys, key blanks, locks, access cards, access badges,tickets, and Id documents such as passports, identification cards. Forexample, the access object may be a commonly used metallic key which mayor may not include plastic parts such as grips or covers. The accessobject may a card or an access badge (e.g. a plastic card or papercard). For example, the access object may comprise a metallic key havingplastic grip or cover, may be marked by the same XRF signature on bothits metallic surface and its plastic surface. Although the markingcomposition may be different for the different parts of the accessobject, the access object may include in addition to the markers othermaterials such as binders etching agents configured for marking theaccess object. The plastic surface may be a polymeric material made ofthermoplastic polymer or thermosettic polymer. The plastic surface maybe of one uniform polymer, or a blend of polymers, or a blend ofco-polymers. The plastic surface may be made by casting or injectionmolding, or by Machining (CNC, engraving) vacuum casting, 3D printing,or vacuum forming. The polymeric matrix could be pure polymer, or withadditives such as non-organic powders, fillers, pigments, flameretardants, with or without dispersant agents, with or without wettingagents, with or without surfactant agents, with or without stabilizedagents, with or without anti-oxidant agents, with or without anti-uvagents. The access object may include additional identification and/orsecurity features.

In some embodiments, the access object comprises a region carrying atleast one XRF marker embedded therein and defining the XRF signature tobe matched with the lock module. The presence of few XRF markersdefining the XRF signature on the access object does not impedeadditional identification and/or security features if any. The accessobject may include together with the XRF signature, additionalinformation in a magnetic or biometric form.

In some embodiments, the access object includes a marking composition asdescribed for example in U.S. provisional patent application No.62/290,146 which is incorporated herein by reference.

Reference is made to FIG. 1b illustrating an embodiment of the presentinvention in which the access object 312 is a key comprising a codedphysical or electrical pattern for opening the lock module, wherein thecoded physical or electrical pattern corresponds to a certain XRFsignature. It should be noted that the certain XRF signature does notnecessarily correspond to a single key/access object but may correspondto a group of keys/access objects. The XRF signature can also containinformation which restricts access to some access objects (which wouldotherwise open the lock module) under certain conditions. For example,the information restricts access to some access objects according to aspecific time period (e.g. day/night). The data indicative of suchcorrespondence/matching is stored in a database external to internal tothe system. The control circuit is then adapted to receive from thedatabase, the data indicative of the correspondence between the codedpattern and the XRF signature, to thereby determine a match between theXRF signature and the pattern and upon determining the match switchingthe lock module between the unlocked and locked state. The access objectcomprises a first codable part 312 a adapted for carrying the codedphysical or electrical pattern corresponding to the lock module, and asecond codable part 312 b carrying at least one XRF marker embeddedtherein and defining the XRF signature to be matched with the lockmodule. The first and second codable parts may be separate or partiallyoverlapping or completely overlapping physical regions of the accessobject. The matching between the coded physical or electrical patternand the XRF signature enables unlocking the lock module 302.

The lock module 302 may be integrated within the access point.

The lock module 302 is associated with at least one matching accessobject enabling access to the access point. The access point may be adoor or a passage to be accessed.

In an embodiment, the XRF signatures which allow access at an accesspoint/lock module or a plurality of access points may be stored in adatabase 308 which may be managed or controlled by a host computer isexternal to the control circuit 306 or by the control circuit 306.Alternatively, the XRF signatures (e.g. codes associated with a lockmodule/access point) may be stored only in the lock module 302 or accesspoint. The restriction on access for an access object or a group ofaccess objects associated with an XRF signature can be controlled viathe host computer. For example, access at a particular access point foran XRF signature may tightened or eased for a (pre or post defined)period of time.

In an embodiment, the access control system 10 comprises a radiationabsorbing element 310 configured and operable to prevent emission of theX ray or gamma ray radiation out of the access control system 10.

Reference is made to FIG. 1c illustrating an example of a lock module ofthe present invention. Although for the sake of illustration, a lockmodule 302 to be integrated in a door is shown, it should be appreciatedthat other embodiments may comprise a lock mechanism external to a dooror on a doorjamb. The lock module 302 may be electrical, mechanical orelectromechanical. The lock module 302 is thus configured to beintegrated in a door lock assembly useful to secure the door to a doorjamb or other suitable fixed structure. The door can be any variety ofdoors used in residential, business, etc. applications that can be usedto close off passageways, rooms, access areas, etc. The lock module 302is capable of being actuated with a handle in a known fashion. It shouldbe appreciated that the handle may be replaced with any other similarmechanism known in the art (e.g., knob). However the handle may only beengaged with the lock module if a valid XRF signature is read at thecontrol circuit.

The lock module 302 may enclose a turnable lock cylinder and a lockingmechanism which normally prevents turning of the lock cylinder withregard to the lock body and which can be moved by the access object intoa releasing position allowing turning of the lock cylinder. In someembodiments, the lock module includes a control circuit configured andoperable to receive a response signal from the access request receivingdevice and process the response signal to identify spectral featuresindicative of an XRF signature. The control circuit is coupled to thelock module for switching the lock module between the unlocked andlocked state upon identification of the XRF signature. Therefore, thecontrol circuit is configured as an identification and control devicefor receiving and identifying the XRF signature from the access objectas well as an electric operating device switching the lock modulebetween the unlocked and locked state. In some embodiments, the controlcircuit comprises a coupling member attached thereto and having a freeposition and a coupling position in which it couples the lock cylinderwith the movement of the access object for opening the lock, wherebywhen there is a match with the XRF signature of the access object, thecontrol circuit activates the lock module to guide the coupling memberto its coupling position. The coupling member may located and may be incooperation with a guiding groove having a guiding surface which thecoupling member affects in its coupling position thereby turning thelock cylinder when the access object is turned in the lock module.

As can be seen in FIG. 1c , in a specific and non-limiting example, thelock module 302 comprises a latch 2 provided for locking and unlockingthe access point in its closed state with respect to a main frame. Thelock module 302 shown includes a lock casing 1, in which a latch 2 isslidably mounted. A cylinder 5 is applied to the lock module 302 withits corresponding latch 2. A cam is secured to one end of the cylinder 5inside the casing 1 and coacts with the latch 2 to release aspring-loaded catch device mounted on the latch 2 and displace the latch2 between projecting and withdrawn positions. The catch device operatesin well-known manner to retain the latch 2 in these two positions. Thelatch 2 can move in to and out of the door jamb when securing the door.The latch 2 can move from a retracted position to an extended positionand can include a dead position in which, for example, the latch 2resists being retracted when tampered through force applied to thelatch. The latch 2 can be moved based upon a force imparted through anyone or a combination of a motor internal to the lock module 302 and anaccess object. The lock module 302 can include a latch driving mechanisminterposed between the latch 2 and the motor such that when the motorimparts a force the latch driving mechanism is moved which consequentlyimparts a motion to the latch 2. A force can be transmitted via therotor to the latch driving mechanism of the latch 2 whether through aturn of the key.

Specifically, the cylinder 5 may be an electromechanical cylinderassembly including an electronic module comprising a knob 4 beingcoupled to the body of the cylinder 5 and a rotor. The cylinder 5 has ahole used to receive an access object which can be used to manipulatethe latch 2 to secure the door. The cylinder 5 is thus formed with a keyslot having a complex cross-sectional shape as is well known inconventional mechanically operated cylinder locks. The electronic moduleformed by the knob 4 and rotor are axially fixed with respect to thebody of the cylinder 5 and with the ability to rotate freely. The freerotation of the assembly formed by the knob 4 and the rotor without theactuation of the lock is carried out. The cylinder 5 is retained by aplunger of a solenoid device. On energization of the solenoid, thecylinder 5 can be turned by the key so that the latch 2 is driven in orout (according to the direction of turning) by the cam.

The lock module 302 may also comprise a battery mounted on abattery-holder. The lock module 302 may thus also comprise a poweredmodule also useful in manipulating the latch 2. The powered module caninclude an energy source, an appropriate motor for activating the latch,associated electronic controls useful in activating the latch, etc.

The control circuit is included inside the knob 4, which also acts as anemitter irradiating the access object. The key slot actually opens on tothe surface of the cylinder and this permits the radiation of the key bythe emitter 4. The control circuit may engage a motor to drive the latch2.

The different parts of the lock module can be in communication with eachother using a variety of mechanisms. Though not depicted, in someembodiments a cabling can be used to connect the control circuit to thelatch such that drive signals useful to extend or retract the latch canbe transmitted. For example, a cable can be used to provide power to themotor from a battery device stored in the lock module and/or convey asignal, such as an actuation signal for the motor, from the controlcircuit. Other types of technologies can also be used in lieu of, or inaddition to, such as but not limited to I button, Body Comm, Smart card,etc. Not all embodiments need include the cabling depicted. The cablingcan include one or more conductors to convey power, data signals, etc.

Reference is now made to FIG. 2 which is a schematic illustration of amethod, generally referenced 100, for access control according to someembodiments of the invention. In step 102, which is carried at an accesspoint, an access object for enabling access at the access point isirradiated with an x-ray or gamma-ray radiation (i.e. primaryradiation). In step 104, the signal emitted from the access object inresponse to the x-ray or gamma-ray irradiation signal is detected. Thedetection may be carried out by an XRF analyzer which includes the X-rayemitter irradiating the x-ray or gamma-ray radiation in step 102 or by aseparate XRF reader. Optionally, in some embodiments, step 106 iscarried out in order improve accuracy of the XRF signature subsequentlyobtained in step 108 as will be described below. In step 108, theidentification of spectral features indicative of the XRF signatureallows to determine the presence of XRF signature (e.g. authenticatingsignals) in the received response x-ray signal to thereby determine theauthenticity of the access object. The step 108 of identification ofspectral features indicative of the XRF signature may include thefollowing processing step: analyzing the power of the response signal atone or more frequencies associated with the marking and therebyauthenticating the object by determining if the response signal includesmarking. The analysis may include for example performing spectralanalysis to determine the power spectra of the response signal in acertain frequency band overlapping with the frequencies of the marking,and/or is may be specifically designed to detect/determine the power ofthe response signal at the specific one or more frequencies of themarking.

In other embodiments, the identification of the XRF signature mayinclude processing the detected XRF response signal, or the enhancedresponse signal (being the detected XRF response signalfiltered/processed as will be described below), and determining theamounts/concentration (e.g., in ppm) of the XRF markers includedtherein. For example, the control circuit is also configured to comparethe measured concentrations with the concentrations derived from thepreselected signature which is stored in the database, and determine itsauthenticity accordingly.

In step 110, access is allowed or denied according to the presence ofthe XRF signature in the response x-ray signal.

If the received access object(s) are determined to be authorized accessobjects (e.g., the access object is valid and useable for the emitterduring the time at which the access was read by the access requestreceiving device), then the control circuit will open the lock module orengage the lock mechanism with the handle, thereby allowing a user toopen the lock module. If the received access objects are not determinedvalid (or were determined to be invalid), then the control circuit maynot perform any action or the control circuit may proactively indicatethat the access object(s) were invalid. For instance, the controlcircuit may sound an alarm, send a notification to security personnel,store information in an activity log about the invalid access objects,light an indicator, etc.

In some embodiments, in step 106, the received x-ray signal is processedin order to reduce noise and/or clutter (radiation from foreignmaterials in the vicinity of the metallic object) caused, for example,by back-scattering, instrumental noise of the detection device andforeign materials in the vicinity of the access object. This processingstep may also include amplifying and/or enhancing the received signalsrelatively to the background. However, naïve filtration of thebackground and/or the noise, for example by using common methods such asquasi-Gaussian spectroscopy amplifier and Gaussian filtering may alsosignificantly reduce all or part of the authentication signals. Hence,more advanced signal processing methods should be employed. For example,the received x-ray signal may be processed using statistical methodssuch as time series analysis as disclosed for example in U.S.provisional patent application No. 62/142,100 which is incorporatedherein by reference.

In some embodiments, step 102 comprises irradiating the object withx-ray or gamma-ray radiation to read and identify the XRF signature ofthe access object for controlling access at an access point and for keycontrol purposes (e.g. preventing unauthorized key duplication as willbe described below).

Method 100 may be used as an added security measure for preventingunauthorized access, additionally, it may be used as a measure foradding flexibility in controlling and managing access. For example, aset of keys or other access objects associated which one or more lockmodules or access points, includes a plurality of subsets of accessobjects each marked with a different XRF signature wherein each subsetof access objects is provided with a different access permits. Forexample, a subset of access object may enable access only at certainhours of the day (e.g. during the day time but not at night) while adifferent subset enable may enable access at different hour or at alltime.

In an embodiment, both the lock module or access point and the accessobject are marked with XRF signature. The XRF signatures of the accessobject and the lock module/access point may be identical or matching. Inan embodiment of method 100 the XRF signatures of both the access objectand the lock module/access point are read (for example, by a portableXRF analyzer) and access is allowed if these XRF signatures match.

In addition to access control purposes, the access object can be usedalso for preventing unauthorized duplication. Reference is now made toFIG. 3 which is a schematic illustration of a method, generallyreferenced 200, for preventing unauthorized duplication of a key using akey blank. According to method 200, the access object to be duplicatedand/or the key blank used for duplication, may be marked by XRFsignature, and duplication would be permitted according to whether theXRF signature is identified by XRF analysis. The access object to beduplicated (hereinafter the key) may be marked by a first XRF signature,and the key blank may be marked by a second or the same XRF signature.In step 202, the access object and/or the key blank are irradiated byx-ray or gamma-ray radiation. In step 204, a first response x-ray signalarriving from the access object and a second response x-ray signalarriving from the key blank are detected. Both steps 102 and 104 may becarried out by a single device such as an XRF analyzer which includesboth an x-ray or gamma ray emitter and a detector. The emitter emittingthe x-ray or gamma-ray radiation and the detector detecting the responsesignals may be incorporated in a key duplication assembly. Optionally,in some embodiments step 206 is carried out in order to improve theaccuracy of the XRF signature subsequently obtained in step 208described below. In step 206, at least one of the first x-ray responsesignal and the second x-ray response signal is processed so as toimprove the SNR and/or SCR of the x-ray signals obtained in step 204.The processing may include for example statistical processing, such astime series analysis for removing at least one of the trend and/orperiodic components from the spectral profile (e.g. from the powerspectrum) of the detected x-ray response signals, and is similar to theprocessing method of step 106 in method 100. It should be noted thatsuch processing aimed at improve the accuracy of the XRF signature byimproving the SNR and/or SCR of the x-ray signals previously obtainedcan also be performed in the processing method of step 106 in method100. In step 208 the first XRF signature of the access object isidentified in the first response x-ray signal or, in the case step 206is carried out, in the enhanced response signal. The identification ofthe XRF signature is similar to the identification method of step 108 inmethod 100. Alternatively, or additionally the second XRF signature ofthe key blank is identified in the second response x-ray signal or, ifstep 206 is carried out, in the second enhanced response signal.Subsequently, authorization to duplicate the key using the key blank isprovided according presence of the first and second XRF signatures intheir respective response x-ray signals or enhanced response signals.Since the XRF signature is carried by the access object itself, induplicating an access object according to method 200 there is no needfor additional information to be presented or inputted to theduplication assembly (e.g. a code that is punched in using a keypad, orcarried by swipe card or a memory device).

In some embodiments, the access control system comprises a module devicebeing an access object duplication assembly adapted to enableduplication of the coded physical or electrical pattern in the firstcodable part (illustrated in FIG. 1b ), upon receiving an unlockingsignal generated by the control circuit.

In some embodiments only the key blank is interrogated and examined byXRF analysis and duplication of the key is permitted only if the keyblank carries an appropriate XRF signature. Such a mode of operation maybe suitable for verifying that only suitable key blanks are used forduplicating preselected key types (e.g. manufactured by specificmanufacturers).

In some embodiments only the access object is interrogated and examinedby the XRF analysis and duplication is selectively restricted inaccordance with the XRF signature carried by the access object. Forexample, within a set of access objects associated with a lockmodule/access point a subset may be marked by a preselected XRFsignature which enables duplication, whereas the rest of the set is notmarked or alternatively marked by a different XRF signature for whichduplication is not permitted.

The invention claimed is:
 1. An access control system comprising: anaccess request receiving device being configured and operable forreceiving an access object being capable of carrying a coded patterncorresponding to at least one lock module and a XRF signature; saidaccess request receiving device comprising an emitter configured andoperable for irradiating said access object with a radiation having awavelength in the range of about 10⁻¹² and 10⁻⁹ m and a detectorconfigured and operable for detecting a response signal from theirradiated access object; a lock module operable between an unlockedstate and a locked state and vice versa a control circuit beingconfigured and operable to receive the response signal from the accessrequest receiving device and process the response signal to identifyspectral features indicative of an XRF signature of said access object;wherein said control circuit is adapted to receive data indicative of acorrespondence between said coded pattern and said XRF signature tothereby determine whether a match exists between said XRF signature andsaid coded pattern, and upon determining said match to generate anunlocking signal for switching said lock module between a locked stateand an unlocked state.
 2. The access control system of claim 1, whereinat least one of said access request receiving device and said controlcircuit are at least partially disposed within the lock module.
 3. Theaccess control system of claim 1, further comprising a radiationabsorbing element configured and operable to prevent emission of saidradiation out of said access control system.
 4. The access controlsystem of claim 1, further comprising a housing, wherein said controlcircuit, said access request receiving device, and said lock module arehoused in said housing.
 5. The access control system of claim 1, whereinsaid lock module includes a motor mechanically coupled to a latchmechanism for locking and unlocking the latch mechanism, therebyswitching said lock module between the unlocked and locked state.
 6. Theaccess control system of claim 5, wherein said control circuit comprisesa coupling member configured and operable to control said motor.
 7. Theaccess control system of claim 1, further including a processor coupledto said access control system, the processor being configured forcommunicating with said lock module and for modifying XRF signatureslist associated with user access stored within said control circuit. 8.The access control system of claim 1, wherein said lock module isintegrated within a door.
 9. The access control system of claim 8,wherein said lock module is adapted to fit within an aperture formed ina door for a standard mechanical lock.
 10. The access control system ofclaim 1, further comprising an access object having an XRF signaturecorresponding to a certain lock module.
 11. The access control system ofclaim 10, wherein said access object is a key comprising a codedphysical or electrical pattern for opening said lock module; and saiddatabase includes data indicative of said coded physical or electricalpattern corresponding to a certain XRF signature.
 12. The access controlsystem of claim 10, wherein said access object comprises a first codablepart adapted for carrying a coded physical or electrical patterncorresponding to a lock module, and a second codable part carrying atleast one XRF marker embedded therein and defining said XRF signature tobe matched with said lock module.
 13. The access control system of claim10, further comprising an access object duplication assembly adapted toenable duplication of said coded physical or electrical pattern in saidfirst codable part, upon receiving said unlocking signal generated bysaid control circuit.
 14. An access object comprising a first codablepart adapted for carrying a coded physical or electrical patterncorresponding to a lock module, and a second codable part carrying atleast one XRF marker embedded therein and defining an XRF signature tobe matched with said lock module to enable unlocking said lock modulebased on a matching between said coded physical or electrical patternand said XRF signature, wherein said XRF signature includes informationabout at least one of a depth of key cuts defining a key combination,physical characteristic of the key, configuration of a key profile. 15.The access object of claim 14, further comprising at least one of keys,key blanks, locks, access cards, access badges, tickets, and Iddocuments such as passports, identification cards.
 16. An access objectcomprising: a first codable part adapted for carrying a coded physicalor electrical pattern corresponding to a lock module; a second codablepart carrying at least one XRF marker embedded therein and defining anXRF signature to be matched with said lock module to enable unlockingsaid lock module based on a matching between said coded physical orelectrical pattern and said XRF signature; at least one of keys, keyblanks, locks, access cards, access badges, tickets, and Id documentssuch as passports, identification cards; and a metallic key havingplastic grip, wherein the metallic key and the plastic grip has the sameXRF signature.
 17. A method for access control comprising: irradiatingan access object with radiation having a wavelength in the range ofabout 10⁻¹² to 10⁻⁹ m; detecting a response signal from the irradiatedaccess object; identifying in the response signal spectral featuresindicative of an XRF signature; and generating an unlocking signal forswitching a lock module between a locked state and an unlocked stateupon identification of said XRF signature, wherein the method furthercomprises at least one of: enabling access upon identification of theXRF signature; switching a lock module between an unlocked state and alocked state and vice versa; modifying a XRF signatures list associatedwith user access; securing a door; receiving data indicative of acorrespondence between a coded pattern carried by said access object andsaid XRF signature, to thereby determine a match between said XRFsignature and said pattern; upon identification of the XRF signaturecomprising preventing unauthorized key duplication.