Electronic access control device

ABSTRACT

An electronic access control device is disclosed comprising two microprocessors. The first microprocessor receives a wirelessly transmitted that is compared to a stored access code. If those two codes match, the first microprocessor transmits a special communication code to the second microprocessor. The second microprocessor opens the lock if the transmitted communication code matches a stored communication code.

RELATED APPLICATIONS

This application is a continuation-in-part of co-pending U.S. patentapplication Ser. No. 10/885,998, filed Jul. 7, 2004, now U.S. Pat. No.7,482,907 which is a continuation of co-pending U.S. patent applicationSer. No. 10/024,945, filed Dec. 19, 2001, now U.S. Pat. No. 6,977,576which is a continuation of U.S. patent application Ser. No. 08/760,062,filed Dec. 4, 1996, and issued as U.S. Pat. No. 6,359,547, which is acontinuation-in-part of U.S. patent application Ser. No. 08/339,555,filed Nov. 15, 1994, and issued as U.S. Pat. No. 5,617,082.

This application is also a continuation-in-part of co-pending U.S.patent application Ser. No. 10/329,626, filed Dec. 26, 2002, now U.S.Pat. No. 6,900,720 which claims the benefit of U.S. Provisional PatentApplication Ser. No. 60/344,221, filed Dec. 27, 2001.

FIELD OF THE INVENTION

This invention relates generally to access control devices for vendingmachines, and more particularly to an electronic access control devicefor a vending machine, or the like, wherein the device is controlled byone or more microprocessors and can be operated by a wireless electronickey.

BACKGROUND OF THE INVENTION

An electronic access control device, such as an electronic combinationlock or an electronic alarm system, allows the user to activate ordeactivate the access control without the use of the conventional keyand mechanical lock mechanism. With the development of microprocessorintegrated circuits, it is becoming common to implementmicroprocessor-based control circuitry in electronic access controldevices. Electronic access control devices are known, for example, fromU.S. Pat. No. 5,021,776. In this device, and other common electronicaccess control devices, a microprocessor is used in combination with akeypad and an electrically programmable read only memory (EPROM). Themicroprocessor compares the combination entered in the keypad by theoperator with the combination stored in the EPROM. If the twocombinations match, the microprocessor opens the lock.

There are problems associated with previous electronic access controldevices. One area of problems concerns the manufacture of the devices,including the difficulty in programming the non-volatile memory, such asthe EPROM, for storing the access code and other useful information forthe operation of the device. EPROMs, which usually require parallelprogramming, interrupt the manufacturing process in that they restrictwhen the manufacturer can program the device. A manufacturer wouldprefer to program the access code into the EPROM as the last step in themanufacturing process. However, with parallel EPROMs, burning in thecode after the device has manufactured is difficult. After the device issoldered together, the manufacturer must contend with integrated circuitpin clips and must worry about interference with other circuitry on themanufactured device. Further, manufacturing, with known electronicaccess control devices, requires many pin connections which increasemanufacturing cost.

Related to the problems associated with the pin connections of themicroprocessor integrated circuit (IC) is the concern of devicereliability and ease of use. When the device contains a significantnumber of pin connections, the reliability of the device decreases.Further, serial access to the EPROM to determine the electronic accesscode is easier than parallel access in terms of pin connections. Whenthe user forgets or loses the access code in the EPROM, a locksmithcould plug into the device and retrieve the access code serially withoutbreaking into the safe. However, with parallel EPROMs, serial access isnot available.

One common problem associated with previous electronic locks is theirpotential vulnerability to tampering. A conventional electronic lockreceives an access code via an input device such as a keypad orelectronic key reader, verifies the access code, and then energizes asolenoid, relay, motor, or the like to open the lock. This arrangementis vulnerable to tampering because if the control circuit is somehowbroken in or removed, one can open the lock by “hot-wiring” the controllines for activating the lock-opening mechanism.

Another technically challenging problem is related to the need toprovide electrical energy to power the operation of the electronicaccess control device. For many applications, it is desirable to use aportable or alternative energy source, such as a battery, to power theaccess control device. A battery, however, has a rather limited amountof electrical energy stored therein. Thus, in many applications it isimportant to reduce the power consumption of the control circuit andperipheral devices of the access control device to extend the servicelife of the batteries.

For instance, it is typical to use a solenoid-operated lock in anelectronic lock. The consumed by the solenoid in opening the lock isquite significant. Thus, the battery can be rapidly drained by therepeated operation of the solenoid. As another example, it is common toinclude a low-battery detection circuit in an electronic lock to providea warning signal to the user when the battery voltage falls below apredetermined level. The operation of the low-battery detection circuit,however, also consumes electrical energy and contributes to the drainingof the battery.

Some electronic locks are provided with electronic keys. When anelectronic key is presented to a key reader of an associated electroniclock, it transmits an access code to the electronic lock. By using anelectronic key, the user does not have to enter manually the access codeby means of a keypad. In certain applications, a remote control unit isused which has a radio transmitter to send the access code to the lockwithout direct electrical contact with the electronic lock.

Although electronic keys are a convenient feature, they have theirassociated problems. One problem is related to the unauthorized use ofthe keys. For example, many hotels provide safes equipped withelectronic locks in their hotel rooms. Such safes typically allow thehotel guests to set their own access codes. In cases where the hotelguests forget the access codes they set, the hotel management has tosend someone with a master key which has a master access code storedtherein to open the safes. There is a danger that such a master key maybe used for unauthorized opening of other safes in the hotel.

Another problem associated with the use of an electronic key or awireless access code transmitter is that the key or the transmitter maybe lost easily, or the user may simply forget to bring the key ortransmitter. This problem is especially serious if the electronic accesscontrol device does not provide other means, such as a keypad, forentering the access code.

Vending machines are widely used in various locations as automated meansfor selling items such as soft drinks, snacks, etc. Traditional vendingmachines are equipped with mechanical locks, which can be unlocked witha corresponding mechanical key to open the door of the machine to allowreloading of goods and collection of money.

One significant problem with conventional vending machines is thedifficulties in managing the distribution and usage of the keys toensure the security of the locks on the vending machines. The process ofcollecting money from the vending machines scattered at different placesis a very manpower-intensive operation that requires many employees togo into the field with numerous mechanical keys for operating the lockson the vending machines. It requires a considerable amount of attentionand efforts to manage and track the distribution of the keys to thefield workers to keep the keys secure.

Moreover, the mechanical keys and lock cores of vending machines are apoint of attack for vandals. The keys can be lost or copied easily, andthe stolen or copied keys may then be used by an unauthorized person toaccess the machines, and it is difficult to discover such misuses andsecurity breaches. Also, a skilled vandal can easily pick or drill-outthe lock core tumblers and measure the key cuts of the lock coretumblers to re-produce a like key and compromise the security. In theevent a security breach is identified, the mechanical lock cores of theaffected vending machines typically have to be manually replaced, whichis a time-consuming and very costly process. Furthermore, mechanicalkeys and locks are devices that cannot be partially limited in operationthey operate indefinitely if in use. Also, they do not have the abilityto record access operation attempts of their operation.

SUMMARY OF THE INVENTION

It is a general object of the present invention to develop an electronicaccess control device which is easier to manufacture and more reliableto operate, and provides improved security to prevent tampering orunauthorized access.

It is an object of the present invention to provide an electronic accesscontrol device with a non-volatile memory for storing an access codethat permits the manufacturer of the device to easily insert the accesscode into the device and then read out the code for verification.

It is an object of the present invention to provide an electronic accesscontrol device that provides significantly enhanced security and reducedvulnerability to tampering as compared to previous electronic locks.

It is an object of the present invention to develop an electronic accesscontrol device which has fewer total components and pin connections forsmaller device area and greater reliability.

It is another object of the present invention to develop an electronicaccess control device with a solenoid-operated lock which has reducedpower consumption by reducing the power used in operating the solenoid.

It is a related object of the present invention to develop an electronicaccess control device that has an improved low-battery detection circuitwhich has minimized energy consumption.

It is another more specific object of the present invention to providean electronic access control system with a master key for a plurality ofremote electronic locks that effectively prevents the unauthorized useof the master key.

The present invention accomplishes these and other objects and overcomesthe drawbacks of the prior art. First, there is provided an electronicaccess control device which reduces the number of pin connectionsrequired to manufacture, to read, to program, and to operate the device.The device multiplexes the inputs and outputs of the microprocessor ICso that a single pin can function as an input in one mode and an outputin another. The microprocessor determines, based on the mode ofoperation, whether a pin functions as an input or an output.

The electronic access control device of the present invention has acommunication port connected to selected pins of the microprocessor ICfor accessing the non-volatile memory for storing an access code.Through the communication port, the manufacturer can interact with themicroprocessor to store an access code into the non-volatile memory andretrieve the access code for verification. By virtue of the provision ofthe communication port, the factory-programmed access code can be savedinto the non-volatile memory after the control circuitry is completelyassembled.

In one embodiment, the electronic access control device has amicroprocessor IC with a plurality of pins, a keypad for inputtinguser-entered access codes and a non-volatile memory, such as an EEPROM,external of the microprocessor for storing an access code. At least oneof the IC pins is connected to both the keypad and the non-volatilememory for receiving the user-entered code from the keypad andtransferring data between the IC and the memory.

In accordance with the object of the invention to reduce thevulnerability to tampering, the present invention provides an electronicaccess control device which has two microprocessors. The firstmicroprocessor is preferably disposed close to the user interface suchas a keypad or an electronic key reader. The second microprocessor ispreferably disposed close to the lock mechanism and substantiallyshielded from external access. When the first microprocessor receives auser-entered code, it compares the entered code to a stored access code.If those two codes match, the first microprocessor transmits a specialcommunication code to the second microprocessor. The second IC opens thelock if the transmitted communication code matches a storedcommunication code. Since the second IC is well protected from externalaccess, the risk of tampering by hard-wiring is significantly reduced.

This dual-microprocessor arrangement is advantageously used in a voiceactivated access control system which has a first microprocessor circuithaving speech recognition capability, and a second microprocessorcircuit which carries out a commanded operation when receiving a correctcommunication code from the first microprocessor circuit. The firstmicroprocessor circuit may include a transmitter for wirelesstransmission of the communication code.

The present invention also provides an effective solution to the problemassociated with the intensive need for power of the solenoid. In thepresent invention, the electronic access control device pulses the powerto the solenoid so that the overall power consumption in operating thesolenoid is lower. Thus, the battery has a longer life and the lock hasan increased number of accesses.

In accordance with a related aspect of the present invention, theelectronic access control device employs a low-battery detection circuitthat is turned off and therefore consumes no electrical power when themicroprocessor is in the sleep mode. The low-battery detection circuituses a combination of a voltage divider and a transistor to compare thebattery voltage and the regulated voltage for determining whether thebattery voltage is low, and uses another transistor in series with thevoltage divider to selectively turn the current through the voltagedivider on and off. When the current through the voltage divider is off,the low-voltage detection circuit does not consume electrical energy.

In the case of an electronic access control system with a master key anda plurality of remote electronic locks, the present inventioneffectively prevents unauthorized use of the master key. In accordancewith the present invention, the master key has a master access code anda number of access stored therein. Each of the remote electronic lockhas a key reader to communicating with the master key. When anelectronic lock detects in the key a correct master access code and anumber of access that is at least one, it opens the associated lock anddecrements the number of access in the key by one.

In view of the foregoing, the present invention can provide a vendingmachine with a field-programmable electronic lock. The electronic lockcan learn a key code from a corresponding electronic key. Alternatively,the electronic lock can learn that it should be accessed by anelectronic switch controlled by a mechanical lock that can be openedwith an associated mechanical key. The electronic lock has a learningprocess activation device that is accessible only when the door of thevending machine is in the open position. Using the learning processactivation device, a service person sets the electronic lock in alearning mode, in which the electronic lock receives a key codetransmitted from an electronic key, and stores the key code in anon-volatile memory for future access control of the vending machine. Inthe case where the lock access is to be controlled by the switch-lockcombination, during the learning process the electronic lock controllerreceives an electronic closure signal from the switch. The lock thuslearns that it is to open the door of the vending machine in response ofthe switch signal in lieu of reception of key codes from electronickeys.

The key-learning process in accordance with the invention allowselectronic locks in vending machines to be easily and inexpensivelyprogrammed in the field. Thus, the electronic locks do not have to bemanufactured with pre-defined permanent key codes and are not tied toany specific electronic keys for field use. There is no need to replaceany physical part of the electronic lock in this key-learning process tolearn a new key code and/or replacing an old key code. In contrast,mechanical locks conventionally used on vending machines have lock coresthat have to be manufactured for specific keys, and once manufacturedthe lock cores cannot be changed. If the mechanical key is lost, theentire lock cores have to be replaced. More than one electronic key canpossess a given keycode. The electronic lock on a vending machine canallow more than one keycode to be learned into the lock and used toaccess the lock.

The use of the field-programmable electronic locks for vending machinesprovides an effective way to reduce theft and fraud in terms ofunauthorized access to the machines. The electronic keys provide agreater level of key security compared to mechanical keys, as theycannot be copied as easily as conventional mechanical keys. The use ofnon-contact wireless data communication between the key and the lockprevents breeches of security associated with vandals measuring keycuts, copying keys and picking locks. The use of data encryption in thewireless communications between the key and the lock prevents the keycode from being copied by electronic monitoring and eavesdropping. Thedata transmission between the key and lock may be implemented in theinfrared range to provide close-proximity highly directionalcommunication of secure codes to further prevent eavesdropping of thesecurity codes and to prevent accidental unlocking of locks.

The use of programmable electronic locks on vending machines and theassociated electronic keys also provides advantages in terms ofsignificant reduction in the costs associated with managing thedistribution of the keys for unlocking the machines and the monitoringof the usage of the keys. Key IDs in addition to the key codes used inaccessing the lock may be used to distinguish keys having the same keycodes. Customized access limitations may be programmed by a supervisorinto the electronic keys to restrict when and how they can be used toaccess the vending machines. Each key may also be programmed with aspecific list of lock IDs identifying the electronic locks on vendingmachines that the key is allowed to unlock.

In accordance with one aspect of the invention, a history of accessattempts may be stored in each of the electronic key and the electroniclock for audit purposes. The key may store the access history each timeit is used to access an electronic lock on a vending machine. Likewise,each electronic lock on a vending machine may store audit data regardingthe access attempts directed to it. The audit data may be transferredfrom the electronic lock to the electronic key during an unlockingoperation, and the audit data of different vending machines collected byan electronic key can be later downloaded to a computer for analysis.

In accordance with another aspect of the invention, the electronic lockmay accept more than one type of keys and corresponding key codes. Thedifferent key types may be associated with different levels of securityof the unlocking operations and the type of data transmitted between thekey and lock during the unlocking operations.

In accordance with another aspect of the invention, the electronic lockin a vending machine can work in conjunction with an electroniccommunication device in the vending machine that is in wirelesscommunication with a home base to accomplish many of the same accesscontrol, auditing, and additionally some inventory and money settlementprocesses.

These and other features and advantages of the invention will be morereadily apparent upon reading the following description of the preferredembodiment of the invention and upon reference to the accompanyingdrawings wherein:

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a perspective view showing an electronic access control devicehaving a keypad;

FIG. 2 is a block diagram of the electronic access control device ofFIG. 1;

FIG. 3 is the schematic of the electronic access control device;

FIG. 4 is the flow chart at power-up of the device;

FIG. 5 is the flow chart of the device in normal operation;

FIG. 6 is a block diagram of a remote access control device;

FIG. 7 is a schematic of the input electronics of the remote accesscontrol device of FIG. 6;

FIG. 8 is a schematic of another embodiment of the electronic controlaccess device which has a non-volatile memory sharing certain pins of amicroprocessor with a keypad;

FIG. 9 is a functional block diagram showing an embodiment of anelectronic access control device having two microprocessorscommunicating with each other to provide enhanced security of thedevice;

FIGS. 10A and 10B are schematic views together showing an application ofthe dual-microprocessor configuration of FIG. 9 in an electroniccombination lock;

FIG. 11 is a functional block diagram showing an application of thedual-microprocessor configuration of FIG. 9 in an ignition controlsystem for a motorcycle;

FIG. 12 is a functional block diagram showing an application of thedual-microprocessor configuration of FIG. 9 in a voice controlled accesscontrol device;

FIG. 13 is a functional block diagram showing another embodiment of thevoice controlled access control device;

FIG. 14 is a functional block diagram showing another embodiment of thevoice controlled access control device which has a central controlstation and remote devices;

FIG. 15 is a schematic view showing an electronic access control systemwhich has a master key for opening a plurality of remote electroniclocks;

FIG. 16 is a schematic view of an electronic alarm system for a bicyclewhich has a remote control unit mounted in a riding helmet and anelectronic alarm mounted on the bicycle;

FIG. 17 is a schematic view of a vending machine and an electronic keyfor opening an electronic lock inside the vending machine;

FIG. 18 is a perspective view of an electronic lock assembly mounted ona door of a vending machine;

FIG. 19 is a block diagram showing electronic circuit components of anelectronic lock used in a vending machine;

FIG. 20 is a block diagram showing electronic circuit components of anelectronic key;

FIGS. 21A and 21B are schematic diagrams showing key codes stored in thememories of an electronic key and an electronic lock, respectively;

FIG. 22 is a schematic diagram showing the transmission of data betweenan electronic lock on a vending machine and an electronic key during asimplified unlocking process;

FIG. 23 is a schematic diagram showing communications between anelectronic lock on a vending machine and an electronic key during anunlocking process that has higher security than the process in FIG. 22;

FIG. 24 is a schematic diagram showing communications between anelectronic lock on a vending machine and an electronic key during anunlocking process similar to that FIG. 23 but with a step of checkingthe lock ID for access control;

FIG. 25 is a schematic diagram showing a computer used to programoperational limitations into an electronic key;

FIG. 26 is a schematic diagram showing the downloading of audit datafrom vending machines to an electronic key; and

FIG. 27 is a schematic diagram showing an example of audit data uploadedfrom a vending machine to an electronic key.

FIG. 28 is a flowchart showing the key code learning process of anembodiment of the electronic lock;

FIG. 29 is a flowchart showing an operation by an embodiment of theelectronic key to back up the time and date for restoring the clock ofthe key in case of a faulty or removed battery;

FIG. 30 is a flow chart showing an operation by the electronic key torecord the number of power-up of the key to prevent tampering by batteryremoval;

FIG. 31 is a schematic block diagram showing an embodiment of a vendingmachine that has a communication device that is interfaced to theelectronic lock and in wireless communications with a home base foraccess control and auditing purposes;

FIG. 32 is a schematic diagram showing vending machines accessible by anelectronic key that has a narrow wireless signal transmission pattern toavoid accidental opening of the vending machines; and,

FIG. 33 is a functional block diagram showing an embodiment of anelectronic access control device having two microprocessorscommunicating with each other and wherein the device wirelesslycommunicates with an electronic key.

While the invention is susceptible of various modifications andalternative constructions, certain illustrated embodiments hereof havebeen shown in the drawings and will be described below. It should beunderstood, however, that there is no intention to limit the inventionto the specific forms disclosed, but, on the contrary, the invention isto cover all modifications, alternative constructions and equivalentsfalling within the spirit and scope of the invention as defined by theappended claims.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring to the drawings, there is shown in FIG. 1 an illustrativeelectronic access control device 10 having a keypad 11, light emittingdiodes (LEDs) 12 and 13, and a mechanical lever arm 14. In thisillustration, the device is used as a lock for an office safe. Thedevice can also be applied to various applications including locks forvending machines or amusement games.

The main components of the electronic access code device are shown inFIG. 2 which include a keypad 11, a microprocessor 14, an access codeinput and output 15, an acoustic output (a piezo ceramic bender, ModelNo. KB1-1541) 16, LEDs 12 and 13, a voltage regulator (LM2936Z-5.0) 17,a battery 18, an electromechanical driver output 19, an oscillator 20,and a reset circuit 21. Inputs to the device may take the form of athumbprint scan, a retinal scan, or a magnetic strip input which maywork in conjunction with a keypad or as a sole means of input. Outputsmay take the form of an alpha-numeric display which may work inconjunction with an acoustic output or an LED or as a sole means ofoutput.

The manufacturers which provide microprocessors applicable to the deviceinclude: Micro-Chip (PIC 16C54, PIC 16C57, PIC 16C71, PIC 16C76);Motorola (MC68HC705J1, MC68HC705K1, MC69HC705P6, MC68HC705P8,MC68HC705P9); National Semiconductor (COP 820C); SGS-Thomson (ST 6210);Texas Instruments (370C311); Zilog (Z84C01).

A more detailed schematic of the device is shown in FIG. 3, highlightingthe reduced pin configuration and the serial access to the electricallyprogrammable read only memory (EPROM) 22. Several of the pins on themicroprocessor 14 are multiplexed and perform multiple functions, attimes used as inputs and at times used as outputs; thereby, the pinconfiguration is able to use only 9 pins for the keypad input, theacoustic output, and the EPROM 22 reading and writing. For example, the12 keypad entries are shown in rows and columns. Each keypad entry in arow is connected to the corresponding pin. For example, keypads “3”,“6”, and “9” are connected to pin R1. Each keypad entry in the samecolumn is connected to a corresponding pin as well. For example, keys“3”, “0”, “1”, and “2” are all connected to pin C3.

The multiplexing of the keypad allows for input of twelve differentinputs (“0” through “9”, PROG, and CLR) using a four by threeconfiguration, as shown in FIG. 4 and FIG. 5. In particular, there arefour rows and three columns in this configuration. In accordance withanother embodiment, a keypad with four different inputs allows for aslittle as a two by two configuration through multiplexing the inputs.

The following example will illustrate the multiplexing with respect tothe keypad 11. Normally, in sleep mode, pins R1, R2, R3 and R4 arewaiting for an input. When, for example, the keypad “3” is input, pinR1, which keypad “3” is connected to, is triggered signifying to themicroprocessor 14 that an interrupt has occurred. The microprocessor 14then executes an interrupt in the software program and changes one ofthe four pins (R1, R2, R3 and R4) into an output whereby a logic high issent to the R1 pin. When a keypad is pressed, it acts as a shortcircuit; thus, when the microprocessor 14 sends out a logic high, itthen senses pins C1, C2 and C3 to determine exactly which keypad in therow has been pressed. In this case, where keypad “3” is input, C3 ishigh. Pressing keypad “3” acts as a short circuit so that when R1 issent high, there is a direct electrical connection between pin R1 and C3via keypad “3”. Thus, the microprocessor 14 can determine that keypad“3” was pressed based on R1 and C3 both being logic high.

Another example of using multiple functions as connected to a single pinis the acoustic output 16. The acoustic output 16 is connected, via atransistor, to pin C2. Pin C2 is also connected to keypads “CLR”, “4”,“5”, and “6”. When the microprocessor 14 sends an audible signal output,pin C2 acts as an output. When the microprocessor is sensing the keypadinput, C2 acts as an input.

A further example of multiple functions as connected to a single pin isthe EPROM 22 sensing function. The EPROM 22, as shown in FIG. 3, is partof the microprocessor 14. The DATA line (bidirectional in that the lineis able to input data to write and output data to read) and CLOCK lineof the EPROM 22 are connected to C1 and C2, respectively. Pins C1 and C2are connected to the keypad as well. When the PROGRAM signal is input,C1 and C2 function. as inputs when writing to the memory location in theEPROM and function as outputs when reading from the memory location inthe EPROM 22. Through this arrangement, the manufacturer may seriallyprogram the device with the access code. The microprocessor 14 usesregisters 56 to transmit the incoming serial data into parallel data forthe EPROM 22 to input. Further, the end user may read the EPROM 22access code serially as well. In reading the EPROM 22, only three pinsmust be accessed (PROGRAM, DATA, and GROUND). The microprocessor 14 usesregisters 56 to transmit the outgoing parallel data from the EPROM 22 toserial form for output.

It will be appreciated that by installing a communication port, namelythe access code I/O 15, in the microprocessor-based control circuit, themanufacturer of the device can access the EPROM by interacting with themicroprocessor 14 via the communication port. By virtue of thisarrangement, the manufacturer can program the access code into the EPROMas the last step in the manufacturing process, i.e., after the controlcircuit has been fully assembled. Thus, there is no longer the need touse a EPROM that is pre-programmed with access codes, or to attempt toinput the access code into the EPROM by means of pin clips or the likeduring the manufacturing process. This ability to program the EPROMafter the completion of the control circuit imparts significantflexibility, efficiency, and reliability to the manufacturing process.

The operation of the electronic access code device is shown in flowchartform in FIG. 4 and FIG. 5. FIG. 4 shows the initialization sequence ofthe device upon power-up 24. The microprocessor, which contains an EPROM22 and a random access memory (RAM) 23, checks to see if there is anaccess code stored 25 in the EPROM 22. The microprocessor 14 performsthis operation by checking if a proprietary bit sequence is set, whereinthe particular sequence of bits signifies that the EPROM 22 has a storedaccess code. If the bit sequence is present, the EPROM 22 contains theaccess code, whereby the microprocessor 14 waits for input from thekeypad or waits for an external read signal 26 from the microprocessor14.

If the bit sequence is not present, the EPROM 22 does not contain theaccess code in its memory. The microprocessor 14 must then wait for theexternal program signal 28 which signifies that the access code is beingwritten to the EPROM 22. The external program signal, as shown in FIG.3, is labeled PROGRAM and is connected to pin 104 and pin IRQ of themicroprocessor 14. In this mode, when the PROGRAM signal is toggled,this signifies that the access code is being burned into the EPROM 22.The microprocessor 14 then uses the CLOCK and DATA lines to clock in thedata thereby reading the access code. Then, the microprocessor 14 storesthe access code into memory 30. The microprocessor 14 subsequently setsthe proprietary bit sequence on the EPROM 22 signifying that the EPROM22 contains the access code. Finally, the microprocessor 14 waits forinput from the keypad or waits for an external read signal 26 from themicroprocessor 14.

The EPROM 22 can also be used to store features other than the accesscode. It can be used to determine such things as: (1) the amount of timethe solenoid 31 is to be energized upon opening the lock; (2) the numberof key presses in the access code; (3) the option of disabling thepermanent access code temporarily when a new-access code is stored inRAM 23; (4) the device serial number; and (5) the date and time thedevice was manufactured or put in service. These features allow themanufacturer to deliver to an original equipment manufacturer (OEM)customer a generic electronic lock assembly. The OEM customer may thencharacterize all the specific lock features at the OEM customerfacility.

As shown in FIG. 5, after the power-up initialization routine, themicroprocessor waits for an entry from the keypad 32. Several functionsare available based on the keypad entry. If the program key (PROG key)is first pressed, the operator wishes to input an additional access code33. In this mode, the microprocessor 14 inputs the next five numbersfrom the keypad 34, 35, 36, 37, and 38. The comparator 57, within themicroprocessor 14, compares the two numbers and checks if the inputnumber matches the access code 39 from the EPROM 22 which is stored inRAM 23. If the two numbers match, this signifies that the operator knowsthe access code in the EPROM 22 and therefore has clearance to input anadditional access code 40. Thus, the microprocessor accepts the nextfive numbers from the keypad as the additional access code 41, 42, 43,44, and 45, and stores the new access code 46 in RAM 23. The operatormay then input either the access code from the EPROM 22 or theadditional access code to open the lock. The operator may repeat thisprocedure and place additional access codes into RAM 23. The additionalaccess codes will be stored in RAM 23 until the power is removed fromthe microprocessor 14 at which time the RAM 23 memory will be lost.

An alternate mode of using the PROG key is to disable the permanentaccess code in the EPROM 22 temporarily when a new access code isentered into RAM 23. After the PROG key is hit, the microprocessor 14inputs the next five numbers 34, 35, 36, 37 and 38. The comparator 57,within the microprocessor 14, compares the input number with thepermanent access code 39 from EPROM 22. If the two numbers match, themicroprocessor 14 inputs a second access code 41, 42, 43, 44, 45. Inthis alternative, when the microprocessor 14 stores in RAM 23 the newaccess code 46, it disables access to the permanent access code in RAM23. Therefore, until the battery 18 is turned off, the only access codeavailable is the new access code stored in RAM 23.

If an operator enters the PROG key at any time other than at the firstkeypad entry from sleep mode, the microprocessor will display the errormessage 47 by sounding the acoustic output 16 through pin C2 and the LED13.

If a number from the keypad 11 is first entered while in sleep mode 48,the microprocessor 14 waits until another four numbers are entered 49,50, 51, and 52, from the keypad 11. The microprocessor 14 then comparesthe number entered from the keypad 11 with the access code 53 stored inRAM 23. If the numbers match, the microprocessor 14 energizes thesolenoid 31 at the output 54. The microprocessor 14 can also energize aDC motor, an electromechanical relay, or a solid-state relay. If thenumbers do not match, the error message is sent 47 by sounding theacoustic output at pin C2.

If the clear key on the keypad is entered at any time in the operationof the device, the microprocessor 14 waits 5 seconds before going backinto sleep mode and waiting for the next keypad entry.

One feature of the device is a lockout of keypad operations. If themicroprocessor 14 receives three consecutive operations which generateerror messages 47, the microprocessor 14 will disable operation of thedevice for two minutes. Any attempt to operate the device in the twominute lockout period will generate an error message 47.

An additional feature of the system is a requirement that a digit mustbe entered within a specified time. Otherwise, the microprocessor 14will send an error message 47 if there is a five second lapse betweenkeypad entries.

A further feature of the system is the modulated voltage across thesolenoid 31. When the correct access code is input 53 from the keypad11, the microprocessor 14 energizes the solenoid 31. The microprocessor14 must supply sufficient power to the solenoid to unlock the lock(i.e., the solenoid must push the plunger in against the coil to openthe lock). This involves two different operations. First, the solenoid31 must physically push the plunger against the coil. Second, thesolenoid 31 must keep the plunger pushed against the coil for thespecified time in which to keep the lock unlocked.

The first operation (pushing the plunger) is very energy intensive. Thesolenoid 31 must exert kinetic and potential energy to physically movethe plunger against the coil. The second operation (maintaining theposition of the plunger) is less energy intensive. The solenoid 31 mustexert only potential energy in terms of keeping the plunger compressedagainst the coil. The device, in order to unlock the lock, supplies theentire battery power necessary for the solenoid 31 to pull the plungerin against the coil. The microprocessor 14 accesses the timer 55, withinthe microprocessor 14, whereby the timer indicates when to reduce thepower. Once the plunger is pulled in, the microprocessor 14 modulatesthe voltage to the solenoid 31. This reduces the current into thesolenoid while the solenoid plunger is held in since the entire DCcurrent is not required to keep the plunger in the closed positionrelative to the coil. This in turn reduces the total amp-hours ofcurrent out of the battery during an access cycle, and the total numberof accesses to the device increases.

By way of example, the solenoid 31 requires 300 milliamps of current topull the plunger in. The microprocessor 14 accesses the timer 55,waiting 0.5 seconds to do that operation. The microprocessor 14 thendrops the solenoid current to 150 milliamps. This current is sufficientfor the solenoid 31 to keep the plunger flush against the coil. Themicroprocessor 14 accesses the timer 55 again, waiting for the timer 55to indicate that three seconds have passed, supplying the lower currentto allow the user to open the door. In this manner, the microprocessor14 uses approximately ½ as much power in the modulated mode.

FIG. 6 highlights another aspect of the invention, the remote operationof the electronic access code device using a battery. The device can beintegrated with other electronic devices forming a system of electroniclocks. At the center of the system is a central control station wherebyeach of the devices may be accessed.

The accessed device is designed for low power consumption so that it mayoperate on a battery for an extended period of time. The remote accessdevice is normally in a sleep mode. In other words, the device is not inactive operation. The remote device can “wake-up” from the low powersleep mode in a variety of ways. One method is for the circuitry in thesleep mode device to sense the incoming signal. When the signal is sent,the remote device resumes normal operation. Another method is for thecircuitry in the sleep mode device periodically to resume normaloperation and sense if there is an incoming signal. If the incomingsignal is sent, the circuitry is able to receive the bitstream data thatcontains the access code. The circuitry thus remains in a low-powersleep-mode condition for the majority of the time, dissipating lowpower, while no signal is received. The device may then be powered by abattery.

The remote electronic access code device is divided into two parts: theinput electronics 60 and the processing electronics 64. The processingelectronics 64 contains a microprocessor, an access code input andoutput, an acoustic output, light emitting diodes (LED), a voltageregulator, and an electromechanical driver output. Thus, the remotedevice is similar to the microprocessor in processing the input accesscode, as shown in FIG. 1, except the access code may be input in severalways. In this embodiment, the data stream is input serially into themicroprocessor 14 so that a variety of serial inputs may be connected tothe input of the microprocessor 14. For example, the access code may beinput using a traditional keypad 11 transmitting data in serial mode.Moreover, the data may be input serially using an electromagnetic signalinput from the radio frequency (RF), optical frequency or infraredfrequency bands. Thus, the microprocessor 14, in this configuration, mayaccept the input from any one of this inputs.

The input electronics 60 accepts the code sent from the central control.The method of transmitting the code may take several forms including anelectromagnetic signal (such as a RF signal sent by an RF serialbitstream transmitter, or an infrared signal) or a data line (telephoneline).

When an RF signal is used, the central station transmits a signal via atransmit antenna 63 (transducer that sends radiated electromagneticfields into space). The radiated waves containing the RF signal containsthe bitstream access code which is sent to the input electronics 60. Theinput electronics 60 contains the RF wake-up 61 and the RF decodecircuitry 62. In one embodiment, the RF wake-up circuit 61 is ordinarilyin a low power sleep-mode. However, for a 10 millisecond period every 1second, the RF wake-up circuit 61 senses for an RF bitstream signal. Ifan RF bitstream signal exists, it remains awake and receives the entireRF bitstream signal. The RF wake-up circuit 61 then sends a wake-upenable signal to the RF decode circuit 62. The RF decode circuit 62, viathe antenna 63, translates it into a series of bits and then sends thedigital bitstream signal to the processing electronics 65 to determineif the digital bitstream signal contains the access code.

In another embodiment, the RF wake-up circuit 61 remains in low powersleep mode until it senses the RF signal. The RF signal, in thisembodiment, contains a low carrier frequency way and a high frequency RFbitstream superimposed on the low frequency carrier wave. When the RFwake-up circuit 61 senses, via the antenna 66, that there is a signaltuned to the low frequency carrier Wave, the RF wake-up circuit 61 sendsa wake-up enable signal to the RF decode circuit 62. The RF decodecircuit 62 then accepts the RF bitstream access code signal, andtranslates it into a series of bits for the microprocessor 14.

FIG. 7 shows the schematic of the input electronics 60 wherein the RFwake-up circuit 61 periodically wakes up from a low power sleep mode andsenses if there is an incoming RF signal. The RF wake-up circuit 61consists of two low-power CMOS inverter gates, INV1 and INV2, a CMOStransistor Q3, resistors, and a capacitor. The two inverters INV1 andINV2 are configured in an oscillator configuration in a ratio of 1 to100. In other words, the oscillator will switch on for 1/100 of asecond. At this time, the CMOS transistor Q3 will turn on and supply thebattery power to the RF decode circuitry 62. The RF decode circuitry 62will only draw battery power for 1/100 of the time, and thus the batterywill last 100 times longer than if the battery were permanentlyconnected to the RF decode circuitry 62.

The RF decode circuitry 62 consists of two bipolar junction transistorsQ1, Q2, two Operational Amplifiers, OP1 and OP2, and resistors,capacitors, inductors and diodes connected to these components. The RFinput signal is referred to as an on-off keying of high frequency burstsfor set time frames. In the present invention, the frequency is set at320 MHz. A burst of frequency is detected by the Q1 and Q2 transistorswith their circuits tuned to the correct frequency (320 MHz in thisexample). The RF decode circuitry 62 then senses the data bitstream sentin the form of digital 1 data signal and digital 0 dead band of nofrequency. Thus, a train of on and off frequency pulses would bereceived by the antenna, conditioned and amplified by Q1 and Q2 of theRF decode circuitry 62, and converted to bitstream 1 and 0 digitalsignals by the two operational amplifier signal conditioners OP1 andOP2.

Typically, the operator of the control unit 59 which contains the RFtransmitter will enable the RF transmitter with a transmit button 58 tosend an RF on-off keying pulse for approximately one second. The RFsignal being transmitted is a digital bitstream conditioned to an RFon-off keying signal which takes about two milliseconds in which totransmit one complete signal. The control unit 59 then repeats thesignal over and over for the duration that the RF transmitter isenabled. In order for the receiver to detect one complete bitstream fromthe transmitter, the RF signal only needs to be sampled for twomilliseconds during which the transmitter is enabled and transmitting.If the RF transmitter is enabled for one second, the transmittedbitstream signal takes 1/500 of a second to be transmitted and isrepeated 500 times over the entire one second. The receiver is enabledfor 1/100 of a second every second, and will have the opportunity tosample and detect a signal that is 1/500 of a second in duration,transmitted 500 times over one second. After the 1/100 of a second, theoscillator, formed by INV1 and INV2, will switch Q3 off, and the batterypower to the RF decode circuitry will be shut off. Only the oscillatorcircuit (INV1 and INV2) will dissipate battery power at a small rate ofless than 100 micro-amps.

If less power dissipation by the RF decode circuitry 62 is required, thedecode circuitry power duty cycle can be reduced by increasing theoscillator frequency to more than 100 to 1 and thus decreasing the RFdecode circuitry 62 sample rate. In order to ensure the RF decodecircuitry 62 will be enabled long enough to detect the entiretransmitter digital bitstream, the lock CPU would wait for the beginningof the bitstream signal which is received by the RF decode circuitry 62when the circuitry was enabled and conditioned through OP 1, and thenwould send an output enable signal back to Q3 to override the oscillatorand keep the RF decode circuitry 62 enabled with battery power until thelock. CPU has received the correct amount of bitstream data from thetransmitter through the decode circuitry. Thereafter, the lock CPU woulddisable the Q3 transistor and the RF decode circuitry and let theoscillator go back to its low rate of sampling.

The processing electronics 64 remains in sleep-mode low currentoperation until a valid on-off keying frequency signal is received whilethe RF decode circuitry is enabled and a digital bitstream signal issent to the lock microprocessor 65. Upon transferring the bitstreamsignal, the microprocessor 14, within the processing electronics,compares the input code with the access code in the comparator. Ifcorrect, the solenoid, DC motor, electromechanical relay, or solid-staterelay is activated. After this operation, the microprocessor 14 sends adisable signal to the RF wake-up circuit to assume a low power mode.

FIG. 8 shows the schematic of another embodiment of the electronicaccess control device which also multiplexes the inputs and outputs ofthe pins of the microprocessor to reduce the number of pins required.The microprocessor 81 used in this embodiment is preferably theMC68HRC705J1A integrated circuit (IC) manufactured by Motorola. Asillustrated in FIG. 8, the input devices include a keypad 11 and anelectronic key reader 82.

In this embodiment, instead of using an EPROM internal of themicroprocessor as in the case of the embodiment of FIG. 3, an EEPROM 84external of the microprocessor 81 is used to store the programmed accesscode as well as other useful information. The EEPROM 84 used in thisembodiment is preferably the 93LC46 IC manufactured by Microchip.Alternatively, a FLASH read-write memory, or any other type of suitablememory, may be used. To effectively use the limited number of pins ofthe microprocessor 81, the pins are multiplexed such that the keypad 11and the EEPROM 84 share several communication pins. As illustrated inFIG. 8, pins 16 (PA2), 17(PA1), 18 (PA0) of the microprocessor 81 areconnected to pins 4, 3, and 2 of the EEPROM 84, respectively. These pinsof the microprocessor 81 are also connected to the keypad 11 forreceiving access codes entered by means of the keypad. Pin 3 (PB5) ofthe microprocessor 81 is connected to pin 1 of the EEPROM. In thisconfiguration, pins 1-4 of the EEPROM 84 are used, respectively, forchip select, data in, data out, and clock.

In accordance with an aspect of the present invention, themicroprocessor-based control circuit further includes a low-batterydetection circuit 68 that does not consume electrical power except whena low-battery detection is in progress. As illustrated in FIG. 8, theaccess control device is powered by a battery pack 70 which includes oneor more batteries. The output of battery pack is connected to a voltageregulator 72 which provides a regulated voltage for operating thecontrol circuit. The low-voltage detection circuit 68 includes a voltagedivider 74 which has its input end connected to the output of thebattery pack 70 (which in the illustrated case is after an isolatingdiode 71). The voltage divider 74 is connected in series with atransistor 76 to ground. The base of the transistor 76 is connected (viaa resister 77) to pin 6 (PB2) of the microprocessor 81. When Pin 6 ofthe microprocessor 81 is set high, the transistor 76 is turned on,thereby allowing current to flow through the voltage divider 74. Whenpin 6 is set low, the transistor 76 is turned off, and the currentthrough the voltage divider is cut off. In that case, the output voltageof the voltage divider 74 will be pulled up to that of the batteryvoltage minus the voltage drop across the diode 71.

The output end of voltage divider 74 is connected to the base of asecond transistor 80. The input end of the transistor 80 is connected tothe output of the voltage regulator 72, while the output end of thetransistor 80 is connected to pin 15 (PA3) of the microprocessor 81.Normally pin 6 of the microprocessor would stay low, and both thetransistor 76 and the transistor 80 would be turned off. When a batteryvoltage test is performed, pin 6 is switched to the high (“1”) state toturn on the transistor 76, and the state of pin 15 is sensed by themicroprocessor 81 to determine the on/off state of the transistor 80. Ifthe battery voltage is sufficiently high, the output of the voltagedivider 74 would be high enough to turn the transistor 80 off. On theother hand, if the battery voltage is low, the output of the voltagedivider would be low enough to turn the transistor 80 on, and pin 15would be switched to the high state.

In accordance with an important aspect of the present invention, thereis provided an electronic access control device that providessubstantially enhanced security and reduced vulnerability to tamperingby using two microprocessors. FIG. 9 shows generally the functionalblock diagram of such a device. As illustrated in FIG. 9, the controldevice has a first microprocessor 90 and a second microprocessor 92. Thefirst microprocessor 90 is connected to an input device 94 for receivinga user-entered control signal signifying a demand to operate anelectronic device 98. The second microprocessor 92 controls a drivercircuit 96 for energizing the electrical device 98 to effect a desiredoperation. The electrical device 98 may be, for example, a solenoid,motor, relay, or the like for opening a lock, or, as will be describedin greater detail below, the ignition relay of a motorcycle. The firstmicroprocessor 90 may be positioned close to the input device 94, whilethe second microprocessor 92 may be located close to the electricaldevice 98 and is preferably well shielded from external access. The twomicroprocessors are connected by a two-way communication link 100.

As will be described in greater detail below, the user-entered controlsignal may be, for example, an access code entered using a keypad orelectronic key, the operation of an electronic ignition switchcontrolled by a mechanical lock, or a voice command entered through avoice sensor such as a microphone. Once a user-entered control signal isreceived, the first microprocessor 90 determines whether the demand tooperate the electrical device 98 should be transmitted to the secondmicroprocessor 92. If the demand is to be transmitted, the firstmicroprocessor 90 sends a special communication code to the secondmicroprocessor 92 via the communication link 100. The secondmicroprocessor 92 compares the transmitted communication code with apreset communication code stored in a non-volatile memory 102. If thetransmitted code matches the stored code, the second microprocessor 92activates the driver circuit 96 to energize the electrical device 98.

It will be appreciated that this dual-microprocessor configurationsignificantly reduces the vulnerability of the device to tampering. Evenif a tamperer may gain access to the first microprocessor, it isintended that the second microprocessor is well shielded and thereforecannot be reached easily. Since the second microprocessor responses onlyto a correct communication code, the tamperer will not be able to usethe trick of “hot-wiring” to activate the driver circuit 96.

Moreover, even if the circuit containing the first microprocessor issomehow replaced by another similar microprocessor circuit for which thecorrect control signal is already known, that new microprocessor isunlikely to know the communication code specific to the secondmicroprocessor 92. In this way, the two microprocessors function as twoindividual gate keepers. Even if the first microprocessor could besomehow bypassed, the second microprocessor would not activate thedriver circuit without receiving the correct communication code.

The microprocessors can also be programmed to implement the“code-hopping” or “rolling-code” scheme used in some existing electronicaccess control devices to further improve the security of the device. Insuch a scheme, the preset code stored in the non-volatile memory 102 isused as a seed, and the communication codes stored in the first andsecond microprocessors are changed as a function of the number of codetransmission according to a predefined algorithm based on the seed code.The changes of the communication codes in the two microprocessors aresynchronized so that the they remain in operative relationship.

FIGS. 10A and 10B illustrate an application of the dual-microprocessorconfiguration in an electronic lock. In this embodiment, the controlcircuit has two halves connected by a cable. The first half, which isshown in FIG. 10A, contains a first microprocessor 110. The second half,shown in FIG. 10B, contains a second microprocessor 112. Pin 11 (PA7) ofthe first microprocessor 110 is connected to pin 18 (PA0) of the secondmicroprocessor 112 via the cable 115 and the mating connectors 114 and116 to establish a two-way serial communication channel between the twomicroprocessors.

The electronic lock has a keypad 11 and an electronic key reader 82 asinput devices which are connected to the first microprocessor 110. Thesecond microprocessor 112 controls a energizing circuit 118 forenergizing a solenoid 120 to open the lock. When the firstmicroprocessor 110 receives an access code via either the keypad 11 orthe key reader 82, it compares the entered access code with an accesscode stored in its memory. If the entered code matches the stored accesscode, the first microprocessor 110 transmits a communication code to thesecond microprocessor 112 via the communication channel described above.The second microprocessor 112 then compares the received communicationcode with a preset communication code stored in an EEPROM 122. If thetwo communication codes match, the second microprocessor 112 activatesthe energizing circuit 118 to energize the solenoid 120 to open thelock.

The correct access code and communication code are preferably stored inthe EEPROM 122. During initial power-up, i.e., when the battery is firstattached to the electronic lock, the second microprocessor 112 transmitsthe access code and the communication code to the first microprocessor110, which then stores the codes in its memory (which may be volatile)for subsequent operation.

The dual-microprocessor configuration illustrated in FIG. 9 can also beadvantageously used in other types of applications. For example, FIG. 11shows an electronic ignition control system for a motorcycle. In thisembodiment, the device contains a first microprocessor 126 and a secondmicroprocessor 128 which are connected by a cable 130. A three-positionignition switch 132 is connected to the first microprocessor 126, whichmay be located close to the ignition switch. The second microprocessor128 is connected to an ignition relay 134 and an accessory relay 138,and is preferably disposed close to the ignition mechanism of themotorcycle and well protected from external access.

In this arrangement, the ignition switch 132 serves as the input device,and the position of the ignition switch is used as the user-enteredcontrol signal. The first microprocessor 126 monitors the switchposition. When the ignition switch 132 is turned to the “accessory”position 135, the first microprocessor 126 transmits a communicationcode together with a switch-position code corresponding to that switchposition to the second microprocessor 128. The second microprocessor 128compares the transmitted communication code with a preset communicationcode stored in a non-volatile memory 138 which has been programmed atthe factory. If the two codes match, the second microprocessor 128determines from the switch-position code that the switch is set at theaccessory position and closes the accessory relay 136.

Similarly, when the ignition switch 132 is turned to the “ignition”position 133, the first microprocessor 126 transmits a communicationcode and a switch-position code corresponding to the ignition positionto the second microprocessor 128. The second microprocessor 128 comparesthe transmitted communication code with the preset communication code.If the two codes match, the second microprocessor 128 determines fromthe switch-position code that the switch is set at the ignition positionand accordingly closes the ignition relay 134 and the accessory relay136 to start the engine.

It will be appreciated that due to this dual-microprocessor arrangement,this ignition control system cannot be “hot-wired” to start the engineof the motorcycle like conventional motorcycle ignition control systems.This system is also not susceptible to tampering by replacing theassembly of the ignition switch 132 and the first microprocessor 126with another such assembly for which an ignition key has been obtained.

FIGS. 12-14 show another advantageous application of thedual-microprocessor configuration of FIG. 9 which utilizes speechrecognition to control the operation of an electronic access controldevice. As illustrated in FIG. 12, the access control device uses aspeech recognition microcomputer integrated circuit (IC) 1200 to processvoice commands given by a user. The speech recognition IC 1200 iscapable of not only recognizing the commands given but also the voice ofthe speaker. In other words, the IC is capable of speaker dependentrecognition, allowing the user to customize the words to be recognized.Such an IC may be, for example, the RSC-164 microcomputer of SentryCircuits, Inc.

In the embodiment shown in FIG. 12, the speech recognition IC 1200 has amicrophone 1202 connected thereto for receiving voice commands from auser. In this embodiment, the combination of the voice recognition IC1200 and the microphone 1202 serves generally the function of the inputdevice 94 of FIG. 9. An optional keypad 11 may also be used for enteringan access code. After receiving a voice command, the speech recognitionIC 1200 analyzes the voice command to recognize the command and thevoice pattern of the speaker. If the voice recognition IC 1200recognizes the voice pattern to be that of an authorized user, ittransmits a command code corresponding to the command received to thefirst microprocessor 190. The first microprocessor 190 transmits anoperation code corresponding to the command and a communication codestored in its memory to the second microprocessor 192 via abidirectional communication link 180. The second microprocessor 192compares the transmitted communication code with a preset communicationcode which is stored in a non-volatile memory 194. If the twocommunication codes match, the second microprocessor 192 activates thedriver circuit 196 to energize an electrical device 198 to carry out theoperation specified by the operation code.

FIG. 13 shows another embodiment of the voice controlled access controldevice. In this embodiment, the voice recognition IC 1200, which is amicrocomputer in itself, is used to serve the function of the firstmicroprocessor 190 of FIG. 12. Upon receiving a voice command throughthe microphone 1202, the voice recognition IC 1200 recognizes thecommand and analyzes the voice pattern of the speaker. If the voicerecognition IC 1200 determines that the speaker is an authorized user,it transmits an operation code and a communication code stored in itsmemory 1201 to the second microprocessor 192. If the transmittedcommunication code matches a preset communication code, the secondmicroprocessor 192 executes the command by activating the driver circuit196.

FIG. 14 shows another embodiment of the voice operated access controldevice which includes a central control station 1220 and one or moreremote devices in the arrangement shown generally in FIG. 6. The centralcontrol station 1220 may be formed as a hand-held remote control unitwhich can be conveniently carried and handled by the user. Forillustration purposes, two remote devices 1212A, 1212B are shown, eachof which has its own unique identification code. The identificationcodes are stored in the memories 1216A, 1216B of the microprocessors1228A, 1228B of the respective remote devices. The central controlstation 1220 has a voice recognition IC 1200 coupled to a microphone1202 for receiving and recognizing a voice command. If the voice patternof the speaker matches a voice pattern stored in the voice recognitionIC 1200, the voice recognition IC transmits a command code correspondingto the given command to a central microprocessor 1222. The command codemay contain a code to indicate which remote device is to be contacted.Alternatively, the determination of which remote device is to becontacted may be made by the central microprocessor according to thecommand code provided by the voice recognition IC 1200.

The central microprocessor contains a memory 1224 which has theidentification codes for the remote devices stored therein. Afterreceiving the command code, the central microprocessor 1222 sends outthrough the transmitter circuit 1226 a bitstream signal which containsthe identification code of the remote device to be addressed and anoperation code indicating the operation to be performed. In thepreferred embodiment, the bitstream signal is transmitted at a radiofrequency (RF). Other suitable transmission bands may also be used.

The remote devices 1212A, 1212B preferably are normally in the sleepmode and can wake up in the ways described in conjunction with FIG. 6.In the illustrated embodiment, each remote device has a wake-up circuit1230A, 1230B and a radio frequency decode circuit 1232A, 1232B. Afterreceiving the bitstream signal from the central control station 1220,the radio frequency decode circuit of each remote device converts thereceived RF signal into a computer-compatible binary code which includesthe identification code and the operation code. Each remote device thencompares the received identification code with its own identificationcode. If the codes match, the remote device carries out the specifiedoperation.

This voice-activated remote access control system finds manyapplications in different settings. For example, as illustrated in FIG.14, the remote access control device 1212A is connected to a filecabinet 1240 and a desk 1242 in an office for locking and unlocking thecabinet drawers and desk drawers. By way of example, when the user givesthe voice command “lock desk,” the central control station 1220 receivesthe command through the microphone 1202. If the speaker's voice isrecognized, the central control station 1220 sends out a bitstreamsignal to cause the remote unit 1212A to operate a lock mechanism 1241in the desk 1240 to lock the desk drawers. As another exampleillustrated in FIG. 14, the remote device 1212B is used to control amotor 1243 in a tool chest 1244 to lock and unlock the doors and drawersof the tool chest.

In accordance with the object of the present invention to prevent theunauthorized use of electronic keys, there is provided an electronicaccess control system which has a plurality of remote electronic locksand a master key that has a number of access programmed therein. Asillustrated in FIG. 15, the access control system includes a mastercontrol device 140 for programming a master access code and the desirednumber of access into the master key 142. In the illustrated embodiment,the master control device 140 is a personal computer which has aninterface device 144, such as a key reader, for communicating with themaster key. The master key 142 contains a non-volatile memory whichincludes an access code storage 146 for storing the master access codespecific to the control system, and a counter 148 for storing the numberof access allowed. Also shown in FIG. 15 is an electronic lock 150 whichcan be opened by the master key. The electronic lock has a controlcircuit based on a microprocessor 151 and a key reader 152 forcommunicating with the master key. When the master key 142 is presentedto the key reader 152, the microprocessor 151 of the electronic lockreads the access code stored in the master key and compares that code toa preset master access code stored in its memory. If the two codesmatch, the control circuit reads the number of access stored in themaster key. If the number of access is one or greater, themicroprocessor 151 energizes the solenoid 154 to open the lock 156. Inconjunction with the opening of the lock, the microprocessor 151 of theelectronic lock 150 decrements the number of access stored in thecounter 148 of the master key by one. Thus, if the number of access inthe counter 148 is initially set to one, after the opening of the lockthe counter is reduced to zero, and the master key cannot be used toopen another lock.

In this way, by limiting the number of times the master key 142 can beused to open locks, the unauthorized use of the master key iseffectively prevented. For instance, in the setting of a hotel, it isnecessary to have a mater key for opening the electronic locks installedin the safes in the hotel rooms. If a hotel guest forgets the accesscode for the safe in his room, the master key can be programmed with thenumber of access set to one, and used to open that safe. Since thenumber of access will be reduced to zero after the lock is opened, themaster key cannot be subsequently used to open the safe in another room.The use of the master key is thus strictly controlled.

In accordance with another aspect of the invention, there is provided analarm system for a bicycle or a similar manually powered vehicle. Asillustrated in FIG. 15, this alarm system includes a remote control 160mounted in the helmet 162 of the rider of the bicycle 166, and anelectronic alarm 164 mounted on the bicycle. The remote control 160 hasa transmitter 168 for the wireless transmission of a communication codeand other types of control signals to the alarm 164 on the bicycle,which has a receiver 170 for receiving the transmitted signals.

In the preferred embodiment, the remote control 160 has a button 172which when pushed transmits a control signal including the communicationcode to the alarm 164 on the bicycle to activate or deactivate thealarm. Alternatively, the helmet may be equipped with a keypad forentering an access code by the user. After receiving the access code,the remote control compares the entered access code with a preset accesscode and transmits the control signals to the electronic alarm on thebicycle when the two access codes match.

The alarm 164 includes a motion detector 174 for sensing the movement ofthe bicycle 166. If movement of the bicycle is detected by the motiondetector 174 when the alarm has been activated, the electronic alarm 164emits audio and/or visual warning signals to deter the potential theft.A timer 176 is included in the electronic alarm 164 to stop the warningsignals after a predetermined amount of time has elapsed.

This bicycle alarm system which has a remote control 172 mounted in theriding helmet 162 has many advantages. Combining the remote control withthe riding helmet provides significant convenience to the rider becausethere is no need to carry the remote control separately. Moreover,because the remote control is integrated in the helmet of the rider, therider is less likely to lose or misplace the remote control.Furthermore, because the remote control is required to deactivate thealarm system, combining the remote control with the helmet provides anincentive for the rider to wear the helmet when riding the bicycle. Inthis way, the bicycle alarm system of the present invention contributesto the safety of the rider and helps the rider to obey the law requiringthe bicycle rider to wear a helmet.

In view of the many possible embodiments to which the principles of thisinvention may be applied, it should be recognized that the embodimentsdescribed herein with respect to the drawing figures are meant to beillustrative only and should not be taken as limiting the scope of theinvention. Therefore, the invention as described herein contemplates allsuch embodiments as may come within the scope of the following claimsand equivalents thereof.

What is claimed is:
 1. A battery-powered electronic-access controldevice comprising: memory containing at least one stored code; acommunication port for entering an input code to access thebattery-powered electronic-access control device; a circuit generatingan activation signal; a first processor configured to receive an inputcode, the first processor being active for a first period of time inresponse to the activation signal, the first processor receiving theinput code from the communication port; a second processor separate fromthe first processor and being activated for a second period of time, thesecond processor being configured to generate a driver output signal toactivate a lock actuator in response to the input code matching one ofthe at last one stored code; wherein the first processor and the secondprocessor become deactivated after the first period of time and thesecond period of time, respectively, the deactivated mode causing thefirst processor and the second processor to operate at lower powerconsumption rates than when the first processor and the second processorare activated; and a low battery detection circuit that correlates areference voltage to a voltage associated with a battery, and whereinthe low battery detection circuit is either disabled, selectivelyenabled or initiated for applying the reference voltage and forcorrelating the voltage associated with the battery in the awake mode,the low-battery detect circuit having an enabled mode distinct from theactive mode of the first or the second processor.
 2. A battery-poweredelectronic-access control system comprising: memory containing at leastone stored code; a communication port for entering an input code toaccess the battery-powered electronic-access control system; a circuitcapable of generating a wake-up signal, the circuit comprising at leasta first processor, wherein the first processor is configured to receivean input code; wherein the first processor is capable of operating in anawake mode for a period of time in response to receiving the wake-upsignal from the circuit, and a sleep mode after the period of time,wherein the sleep mode causes the first processor to operate at a lowerpower consumption rate than when the processor is in the awake mode; asecond processor being separated from the first processor and enteringan awake mode distinguishable from the awake mode for the firstprocessor, the second processor configured to generate a driver outputsignal to activate a driver circuit to activate a lock actuator inresponse to the input code matching one of the at least one stored code;a communication port operatively connected to one of either the firstprocessor or the second processor, the connected processor receiving awrite signal through the communication port, and in response to thewrite signal, enters a program mode of operation, receives a codethrough the communication port, and stores the code into the memory toform the one of the at least one stored code when the first processor orthe second processor is in the awake mode, and wherein one of either thefirst processor or the second processor enters the sleep modethereafter; a low-battery detection circuit for measuring a voltageassociated with the battery, the detection circuit having a disabled andan enabled mode and operating at a lower power consumption rate in thedisabled mode than in the enabled mode, and being selectively enabled,disabled or initiated by either the first processor or the secondprocessor when in the awake mode, the low-battery detect circuit enabledmode being distinct from the awake mode of the first or secondprocessor, and; wherein the first processor generates a signal to thesecond processor to determine if the input code matches one of the atleast one stored codes.
 3. A battery-powered electronic-access controlsystem comprising: memory containing a stored access code; a firstcircuit for receiving an electromagnetic signal including an input code,the first circuit having an enabled mode for receiving theelectromagnetic signal and decoding the electromagnetic signal into adigital signal comprising the input code, and a disabled mode, whereinthe first circuit operates at a lower power consumption in the disabledmode than when the first circuit is in the enabled mode; a secondcircuit capable of being awakened to obtain the input code via theelectromagnetic signal, the second circuit comprising a first processoroperatively connected to the first circuit, the first processor havingan awake mode and a sleep mode, the first processor being capable ofentering the sleep mode for a period of time, and the sleep mode causesthe first processor to operate at a lower power consumption rate thanwhen the processor is in the awake mode; and a third circuit comprisinga second processor separated from the first processor and from the firstcircuit and capable of entering an awake mode distinguishable from theawake mode of the first processor and distinguishable from the enabledmode of the first circuit, the second processor being capable ofentering a sleep mode causing the second processor to operate at a lowerpower consumption rate than during the awake mode; an authorizationsignal to activate a lock actuator being generated by the third circuitin response to the input code matching the stored access code; acommunication port operatively connected to one of either the firstprocessor or the second processor, wherein the connected processorreceives a program signal through the communication port, and inresponse to the program signal enters a program mode of operation,receives a code through the communication port from a device remote tothe battery-powered electronic-access control stores the code into thememory to form the stored access code when one of either the firstprocessor or the second processor is in the awake mode, and wherein oneof either the first processor or the second processor enters asleep-mode at a time thereafter; and wherein the second processordetermines if the input code matches the stored access code.
 4. Abattery-powered electronic-access control system comprising: memorycontaining at least one stored code; a communication port for enteringan input code to access the battery-powered electronic-access controlsystem; a circuit for generating an activation signal, the circuitcomprising a first processor configured to receive an input code;wherein the first processor is activated for a first period of time inresponse to the activation signal, the first processor receiving theinput code from the communication port; a second processor separate fromthe first processor and entering an awake mode distinguishable from theawake made of the first processor, the second processor being activatedfor a second period of time and being configured to generate a driveroutput signal to activate a lock actuator in response to the input codematching one of the at least one stored code; wherein the firstprocessor and the second processor become deactivated after the firstperiod of time and the second period of tie, respectively, thedeactivated mode causing the first processor and the second processor tooperate at a lower power consumption rate than when the first processorand the second processor are activated; a communication port operativelyconnected to one of either the first processor or the second processor,wherein one of either the first processor or the second processorreceives a program signal through the communication port, and inresponse to the program signal enters a program mode of operation,receives a code through the communication port from a device remote tothe battery-powered electronic-access control system, stores the codeinto the memory to form one of the at least one stored code when one ofeither the first processor or the second processor is in the awake mode,and enters a sleep mode at a time thereafter; and, wherein a drivecircuit provides a first power state and a second power state to drivethe lock actuator, a lower non-zero power output being provided to drivethe lock actuator in the second power state then in the first powerstate, the drive circuit first power state and second power state beingdistinguishable from the awake mode of the first or second processorand; the first processor generates a signal to either enable or wake upthe second processor to determine if the input code matches one of theat least one stored code.
 5. A battery-powered electronic-access controlsystem comprising: memory containing at least one stored code; at leasttwo communication ports for entering at least a portion of an input codeto access the battery-powered electronic-access control system; acircuit capable of generating a wake-up signal, the circuit comprising afirst processor configured to receive an input code, in response to afirst key being depressed on a keypad, comprising the first key and atleast one subsequent keypad entry, the at least two communication portsand at least one additional communication port configured to process thewake-up signal to determine the first processor shall enter an awakemode of operation; wherein the first processor is capable of operatingin an awake mode for a period of time in response to receiving thewake-up signal from the circuit, and a sleep mode after the period oftime, wherein the sleep mode causes the first processor to operate at alower power consumption rate than when the first processor is in theawake mode, a second processor being separated from the first processorand entering an awake mode distinguishable from the awake mode for thefirst processor, the second processor configured to generate a driveroutput signal to activate a lock actuator in response to the input codematching one of the at least one stored code; and a communication portoperatively connected to one of either the first processor or the secondprocessor, then connected processor receiving a write signal through thecommunication port, and in response to the write signal, enters aprogram mode of operation, receives a code through the communicationport, and stores the code into the memory to form the at least onestored code when one of either the first processor or the secondprocessor is in the awake mode, and one of either the first processor orthe second processor enters the sleep mode at a time thereafter; whereinthe first processor generates a signal to either enable or wake up thesecond processor to determine if the input code matches the at least onestored code; and wherein the processor, being in the awake mode,disables operation of the battery powered electronic access-controldevice for a pre-determined period of time if the processor has receiveda pre-determined number of invalid input codes consecutively enteredthrough the communication port configured to receive the input code, andbeing in the sleep-mode sometime thereafter.
 6. A battery-poweredelectronic-access control system comprising: a first processor and asecond processor, each processor having an enabled mode and a disabledmode, wherein a current drained from a battery is less during thedisabled mode than when in the enabled mode; a receiver circuit forreceiving an electromagnetic signal and decoding the electromagneticsignal into a digital signal including an input code, the circuit havingan enabled mode for receiving the input code and a disabled mode,wherein the receiving circuit operates at a lower power consumption inthe disabled mode than when the first circuit is in the enabled mode; acircuit for sensing a signal of radio frequency and having an outputthat indicates detection of a remote device capable of transmitting anelectromagnetic signal; wherein the first processor is in the enabledmode and obtains an input code transmitted via the electromagneticsignal, and the first processor enters a disabled mode thereafter, thesecond processor being separated from the first processor enters adisabled mode thereafter, the second processor being separated from thefirst processor and from the receiver circuit and temporarily enableddistinguishably from the enabled mode of the first processor anddistinguishable from the receiver circuit, the second processor receivesthe input code from the first processor and compares the input code toan authorization code for authorizing operation of a system comprisingone of either a latch or an alarm; operatively connected to one ofeither the first processor or the second processor, the first processoror the second processor being programmed to receive a write signal thecommunication port, and in response to the write signal, one of eitherthe first processor or the second processor enters a program mode ofoperation, receives a code through the communication port from a deviceremote to the battery-powered electronic-access control system, andstores the code in a memory to form a stored code when one of either thefirst processor or the second processor is in the enabled mode, andenters the disabled mode at a time thereafter; wherein the firstprocessor communicates a signal to either enable or wake up the secondprocessor to compare the input code to the authorization code.
 7. Abattery-powered electronic-access control system comprising: memorycontaining a stored access code; a first circuit comprising one ofeither a timer or an oscillator having an output comprising a pluralityof duty cycles; a second circuit for sensing an electromagnetic signalthat is periodically enabled for time t1 and disabled for time t2 duringat least one of the duty cycles, wherein the disabled mode causes thesecond circuit to operate at a lower power consumption than the enabledmode; a third circuit capable of being enabled to obtain the input codevia the electromagnetic signal and decoding the electromagnetic signalinto a digital signal comprising the input code, the third circuitcomprising a first processor operatively connected to the secondcircuit, the first processor having an enabled mode and a disabled mode,wherein the first processor is capable of entering the disabled modeafter a period of time, wherein the disabled mode causes the firstprocessor to operate at a lower power consumption rate than during theenabled mode; and a fourth circuit comprising a second processorseparated from the first processor, the second processor being capableof entering an enabled mode distinguishable from the enabled mode of thefirst processor, and distinguishable from the enabled mode of the secondcircuit, and a disabled mode, wherein the disabled mode causes thesecond processor to operate at a lower power consumption rate thanduring the enabled mode; an authorization signal being generated by thethird circuit in response to the input code matching the stored accesscode; a communication port operatively connected to one of either thefirst processor or the second processor, wherein one of either the firstprocessor or the second processor receives a program signal through thecommunication port, and in response to the program signal enters aprogram mode of operation, receives a code through the communicationport from a device remote to the battery-powered electronic-accesscontrol system, stores the code into the memory to form the storedaccess code when one of either the first processor or the secondprocessor is in the enabled mode, and wherein the first processor or thesecond processor enters the disabled mode at a time thereafter; whereinthe first processor communicates a signal to either enable or wake upthe second processor to determine if the input matches the stored accesscode.
 8. A battery-powered electronic-access control system comprising:a first processor and a second processor, each processor having anenabled mode and a disabled mode, wherein a current drained from abattery is less during the disabled mode than in the enabled mode; acircuit comprising one of either a timer or an oscillator and having anoutput for activating the first processor, wherein the first processorsenses a signal received from an one of either an antenna or a receivercircuit and includes an output for indicating detection of a remotedevice capable of transmitting an electromagnetic signal; a receivercircuit for receiving an electromagnetic signal and decoding theelectromagnetic signal into a digital signal including an input code,the circuit having an enabled mode for receiving the input code and adisabled mode, wherein the receiving circuit operates at a lower powerconsumption in the disabled mode than when the first circuit is in theenabled mode; wherein the first processor is in the enabled mode andobtaining an input code transmitted via the electromagnetic signal, thefirst processor entered a disabled mode thereafter, the second processorbeing separated from the first processor and the receiver circuit andtemporarily enabled distinguishably from the enabled mode of the firstprocessor and temporarily enabled distinguishably from the enabled modeof the receiver circuit, the second processor receives the input codefrom the first processor and compares the input code to an authorizationcode for authorizing operation of a system comprising one of either alatch or an alarm; a communication port operatively connected to one ofeither the first processor or the second processor, the first processoror the second processor being programmed to receive a write signalthrough the communication port, and in response to the write signal, oneof either the first processor or the second processor enters a programmode of operation, receives a code through the communication port from adevice remote to the battery-powered electronic-access control system,and stores the code into a memory to form a stored code when the firstprocessor or the second processor is in the enabled mode, and enters thedisabled mode at a time thereafter; wherein the first processorcommunicates a signal to either enable or wake up the second processorto compare the input code to the authorization code.
 9. Abattery-powered electronic-access control system comprising: a circuithaving a portion deactivated during a first time period, a portion ofthe circuit activated during a second time period, a portion of thecircuit enabled for sensing an electromagnetic signal, a portion of thecircuit being enabled for an extended time period that is greater thanthe second time period for receiving an input code via anelectromagnetic signal and decoding the electromagnetic signal into adigital signal comprising an input code, a portion of the circuitcomprising a first processor being in the enabled mode and obtaining theinput code transmitted via the electromagnetic signal, the firstprocessor entering a disabled mode thereafter; a second processor beingtemporarily enabled distinguishably from the enabled mode of the firstprocessor and enabled distinguishably from the enabled mode of theportion of the circuit being enabled for the extended period of time,the second processor receives the input code from the first processorand compares the input code to an authorization code for authorizingoperation of a system comprising one of either a latch or an alarm; acommunication port operatively connected to one of either the firstprocessor or the second processor, one of either the first processor orthe second processor being programmed to receive a write signal throughthe communication port, and in response to the write signal, one ofeither the first processor or the second processor enters a program modeof operation, receives a code through the communication port from adevice remote to the battery-powered electronic-access control system,and stores the code into a memory to form a stored code when one ofeither the first processor or the second processor is in the enabledmode, and enters the disabled mode at a time thereafter; wherein thefirst processor communicates a signal to either enable or wake up thesecond processor to compare the input code to the authorization code.10. A battery-powered electronic-access control system comprising: afirst processor and a second processor, each processor having an enabledmode and a disabled mode, wherein a current drained from a battery isless during the disabled mode than in the enabled mode; a circuit foractivating the first processor, wherein the first processor senses asignal received from an antenna and includes an output for indicatingdetection of a remote device capable of transmitting an electromagneticsignal; a receiver circuit for receiving an electromagnetic signal anddecoding the electromagnetic signal into a digital signal including aninput code, the circuit having an enabled mode for receiving the inputcode and a disabled mode, wherein the receiving circuit operates at alower power consumption in the disabled mode than when the first circuitis in the enabled mode; wherein the first processor is in the enabledmode, obtains the input code transmitted via the electromagnetic signal,and enters a disabled mode thereafter; a circuit portion beingresponsive to the input code, wherein the circuit portion increases thecurrent drained from the battery and decreases the current drained fromthe battery after receiving the input code; wherein the second processoris separated from the first processor and from the receiver circuit andenters an enabled mode distinguishable from the enabled mode for thefirst processor and distinguishable from the enabled mode of thereceiver circuit, the second processor receiving the input code from thefirst processor and comparing the input code to an authorization codefor authorizing operation of a system comprising one of either a latchor an alarm; a communication port operatively connected to one of eitherthe first processor or the second processor, one of either the firstprocessor or the second processor being programmed to receive a writesignal through the communication port and, in response to the writesignal, one of either the first processor or the second processor entersa program mode of operation, receives a code through the communicationport from a device remote to the battery-powered electronic-accesscontrol system, and stores the code into a memory to form a stored codewhen one of either the first processor or the second processor is in theenabled mode, and enters the disabled mode sometime thereafter; whereinthe first processor communicates a signal to either enable or wake upthe second processor to compare the input code to the authorizationcode.
 11. A method for accessing an electronic device comprising thesteps of: enabling a receiver circuit powered by a battery andincreasing the power drain by the battery during a first time period,sensing an electromagnetic signal and decoding the electromagneticsignal into a digital signal comprising an input code, and disabling thereceiver circuit and decreasing the power drain of the battery;generating a signal to indicate detection of a device capable ofproviding an electromagnetic signal; obtaining the input codetransmitted by the electromagnetic signal by a temporarily enabled firstprocessor powered by a battery during a second time period, anddisabling the first processor to decrease the power drain of the batteryby the first processor; enabling a second processor powered by a batteryand separate from the first processor during a third time period, thethird time period being distinguishable from the first and the secondtime periods; comparing the input code to an authorization code by thesecond processor for authorizing operation of a device comprising one ofeither a latch or an alarm; providing an output to the device if theinput code matches the authorization code; and decreasing the currentdrained from the battery by the second processor after comparing theinput code.
 12. A method for actuating an electronic device comprisingthe steps of: temporarily enabling and disabling a circuit comprising afirst processor during each of a plurality of cycles wherein the circuitis enabled during a first time period during each of the cycles;temporarily enabling and disabling a receiver circuit for receiving anelectromagnetic signal and decoding the electromagnetic signal into adigital signal comprising an input code; obtaining an input codetransmitted via a communication port; temporarily enabling a secondprocessor separate from the first processor and separate from thereceiver circuit in response to receipt of the input code during asecond time period, the second time period being distinguishable fromthe first time period; comparing the input code to an authorization codefor authorizing operation of a device comprising one of either a latchor alarm; sensing a signal for enabling a circuit as the input code isbeing obtained; and providing a signal to the device when the input codematches the authorization code.
 13. A battery-powered electronic-accesscontrol system comprising: memory containing a stored access code; afirst circuit for sensing an electromagnetic signal including an inputcode, a second circuit capable of being enabled to obtain the input codevia the electromagnetic signal, the second circuit comprising a firstprocessor operatively connected to the first circuit, the firstprocessor having an enabled mode and a disabled mode, the firstprocessor being capable of entering the disabled mode for period oftime, and the disabled mode causes the first processor to operate at alower power consumption rate than when the processor is in the enabledmode; and a third circuit comprising a second processor separated fromthe first processor and capable of entering an enabled modedistinguishable from the enabled mode of the first processor, the secondprocessor being capable of entering a disabled mode causing the secondprocessor to operate at a lower power consumption rate than during theenabled mode; an authorization signal generated by the third circuit inresponse to the input code matching the stored access code; and whereinthe first and the second processors having a bi-directionalcommunication port, the bi-directional port of the first processoroperatively connected to the bi-directional port of the secondprocessor, the first processor capable of both receiving data andtransmitting data with the second processor through the bi-directionalports during the enabled modes of operation.
 14. A battery-poweredelectronic-access control system comprising: memory containing a storedaccess code; a first circuit capable of generating a wake-up signal inresponse to a first key being depressed on a keypad used in entering aninput code comprising the first key and at least one subsequent keypadentry; the first circuit comprising a first processor, the firstprocessor having an awake mode and a sleep mode, the first processorbeing capable of entering the sleep mode for period of time, and thesleep mode causes the first processor to operate at a lower powerconsumption rate than when the processor is in the awake mode; a secondcircuit comprising a second processor separated from the first processorand capable of entering an awake mode, the second processor beingcapable of entering a sleep mode causing the second processor to operateat a lower power consumption rate than during the awake mode; a signalto activate a lock actuator being generated by the second circuit inresponse to the input code matching the stored access code; an inputport operatively connected to one of either the first processor or thesecond processor, wherein the connected processor receives a programsignal through the communication port, and in response to the programsignal enters a program mode of operation, receives a code through thecommunication port from a device remote to the battery-poweredelectronic-access control, stores the code into the memory to form thestored access code when one of either the first processor or the secondprocessor is in the awake mode, and wherein one of either the firstprocessor or the second processor enters a sleep-mode at a timethereafter; and wherein the first and the second processors having abi-directional communication port, the bi-directional port of the firstprocessor operatively connected to the bi-directional port of the secondprocessor, the first processor capable of both receiving data andtransmitting data with the second processor through the bi-directionalports during the awake modes of operation.
 15. The access control systemof claim 3 wherein the enabled mode of the first circuit isdistinguishable from the awake mode of the second circuit.
 16. Theaccess control system of claim 3 wherein the first circuit transitionsto the enabled mode via a signal from the first processor.
 17. Theaccess control system of claim 3 wherein a circuit senses a particularfrequency of the electromagnetic signal and the enabled mode of thefirst circuit is entered or extended.
 18. The access control system ofclaim 6 wherein the enabled mode of the receiver circuit isdistinguishable from the enabled mode of the first processor.
 19. Theaccess control system of claim 6 wherein the receiver circuittransitions to the enabled mode via a signal from the first processor.20. The access control system of claim 6 wherein a circuit senses aparticular frequency of the electromagnetic signal and the enabled modeof the receiver circuit is entered or extended.
 21. The access controlsystem of claim 7 wherein the enabled mode of the second circuit isdistinguishable from the enabled mode of the third circuit.
 22. Theaccess control system of claim 7 wherein the second circuit transitionsto the enabled mode via a signal from the first processor.
 23. Theaccess control system of claim 7 wherein a circuit senses a particularfrequency of the electromagnetic signal and the enabled mode of thereceiver circuit is entered or extended.
 24. The access control systemof claim 8 wherein the enabled mode of the receiver circuit isdistinguishable from the enabled mode of the first processor.
 25. Theaccess control system of claim 8 wherein the receiver circuittransitions to the enabled mode via a signal from the first processor.26. The access control system of claim 8 wherein a circuit senses aparticular frequency of the electromagnetic signal and the enabled modeof the receiver circuit is entered or extended.
 27. The access controlsystem of claim 9 wherein the enabled mode of the circuit enabled forthe extended period of time is distinguishable from the enabled mode ofthe first processor.
 28. The access control system of claim 9 whereinthe circuit enabled for sensing the electromagnetic signal transitionsto the enabled mode via a signal from the first processor.
 29. Theaccess control system of claim 9 wherein a circuit senses a particularfrequency of the electromagnetic signal and the enabled mode of thecircuit enabled for sensing the electromagnetic signal is entered orextended.
 30. The access control system of claim 10 wherein the enabledmode of the receiver circuit is distinguishable from the enabled mode ofthe first processor.
 31. The access control system of claim 10 whereinthe receiver circuit transitions to the enabled mode via a signal fromthe first processor.
 32. The access control system of claim 10 wherein acircuit senses a particular frequency of the electromagnetic signal andthe enabled mode of the receiver circuit is entered or extended.
 33. Theaccess control system of claim 11 wherein the enabled mode of thereceiver circuit is distinguishable from the enabled mode of the firstprocessor.
 34. The access control system of claim 11 wherein thereceiver circuit transitions to the enabled mode via a signal from thefirst processor.
 35. The access control system of claim 11 wherein acircuit senses a particular frequency of the electromagnetic signal andthe enabled mode of the receiver circuit is entered or extended.
 36. Theaccess control system of claim 12 wherein the enabled mode of thereceiver circuit is distinguishable from the enabled mode of the firstprocessor.
 37. The access control system of claim 12 wherein thereceiver circuit transitions to the enabled mode via a signal from thefirst processor.
 38. The access control system of claim 12 wherein acircuit senses a particular frequency of the electromagnetic signal andthe enabled mode of the receiver circuit is entered or extended.