Prismatic lock and key security

ABSTRACT

Methods and apparatus for lock and key security, the lock including a light receptacle, a scatter pattern detecting module, and a locking mechanism, the key including a light source and a prism, the lock and key security including receiving, in the light receptacle of the lock, light transmitted by the light source in the key through the prism; identifying, by the scatter pattern detecting module, a scatter pattern of the received light; comparing, by the scatter pattern detecting module, the scatter pattern to a unique preauthorized pattern for operating the lock; if the scatter pattern matches the unique preauthorized pattern, switching, by the scatter pattern detecting module, the current locking state of the locking mechanism; and if the scatter pattern does not match the unique preauthorized pattern, maintaining the current locking state of the locking mechanism.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application of and claims priorityfrom U.S. patent application Ser. No. 12/247,700, filed on Oct. 8, 2008.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The field of the invention is data processing, or, more specifically,methods and apparatus for lock and key security.

2. Description of Related Art

The development of the EDVAC computer system of 1948 is often cited asthe beginning of the computer era. Since that time, computer systemshave evolved into extremely complicated devices. Today's computers aremuch more sophisticated than early systems such as the EDVAC. Computersystems typically include a combination of hardware and softwarecomponents, application programs, operating systems, processors, buses,memory, input/output devices, and so on. As advances in semiconductorprocessing and computer architecture push the performance of thecomputer higher and higher, more sophisticated computer software hasevolved to take advantage of the higher performance of the hardware,resulting in computer systems today that are much more powerful thanjust a few years ago.

Computer systems today are incorporated in some manner into manydifferent devices and systems including, for example, televisions,telephones, security devices, global positioning satellite devices, andso on. Computer system technology for lock and key security, that is,security systems in which a lock is engaged and disengaged by aparticular key, however, is currently lacking. A typical hardware-basedkey may be easily replicated for tampering with a lock and typicalhardware-based locks are easily picked. Even some computer system basedlocks, such as those implemented in hotel chains, are capable of being‘hacked’ or bypassed by one with sufficient knowledge of computersystems.

SUMMARY OF THE INVENTION

Methods and apparatus for lock and key security, the lock including alight receptacle, a scatter pattern detecting module, and a lockingmechanism, the key including a light source and a prism, the lock andkey security including receiving, in the light receptacle of the lock,light transmitted by the light source in the key through the prism;identifying, by the scatter pattern detecting module, a scatter patternof the received light; comparing, by the scatter pattern detectingmodule, the scatter pattern to a unique preauthorized pattern foroperating the lock; if the scatter pattern matches the uniquepreauthorized pattern, switching, by the scatter pattern detectingmodule, the current locking state of the locking mechanism; and if thescatter pattern does not match the unique preauthorized pattern,maintaining the current locking state of the locking mechanism.

The foregoing and other objects, features and advantages of theinvention will be apparent from the following more particulardescriptions of exemplary embodiments of the invention as illustrated inthe accompanying drawings wherein like reference numbers generallyrepresent like parts of exemplary embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 sets forth a line drawing of an example system for lock and keysecurity according to embodiments of the present invention.

FIG. 2 sets forth a flow chart illustrating an exemplary method for lockand key security according to embodiments of the present invention.

FIG. 3 sets forth a flow chart illustrating a further exemplary methodfor lock and key security according to embodiments of the presentinvention.

FIG. 4 sets forth a flow chart illustrating a further exemplary methodfor lock and key security according to embodiments of the presentinvention.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Exemplary methods and apparatus for lock and key security in accordancewith the present invention are described with reference to theaccompanying drawings, beginning with FIG. 1. FIG. 1 sets forth a linedrawing of an example system for lock and key security according toembodiments of the present invention. Lock and key security as the termis used in this specification refers to security mechanisms configuredaccording to embodiments of the present invention in which a lock isoperated with a key. That is, for lock and key security systems, a usermay lock or unlock the security system by way of a key. Systems for lockand key security configured according to embodiments of the presentinvention may provide security for a variety of objects in a variety ofapplications including, for example, in doors of a building, windows,vaults, safes, cars, and in other applications as will occur to readersof skill in the art.

The system of FIG. 1 includes a key (102) capable of operating a lock(104). The key (102) in the example of FIG. 1 is depicted with a cutawayview such that the objects, devices, and mechanisms included in the key(102) are visible in FIG. 1. The example key (102) of FIG. 1 is a ‘key’in the sense that it is capable of operating a lock (104). The examplekey (102) of FIG. 1 includes a prism (110) and a light source (106). Aprism (110) is a transparent optical element that refracts light Theprism (110) in the example of FIG. 1 is depicted as a triangular prismfor clarity of explanation only, not for limitation. Readers of skill inthe art will immediately recognize that a transparent optical element ofany shape and any material that refracts light may be configured forlock and key security in accordance with embodiments of the presentinvention The example prism (110) of FIG. 1, for example, may beimplemented with shattered glass where the shattered glass provides aunique scatter pattern when light (108) is transmitted through it.

A scatter pattern is a pattern of light produced when the light istransmitted through the prism and formed in dependence uponcharacteristics of the prism. That is, when light travels through theprism, characteristics of the prism cause the light to bend, refract,reflect, change speed, separate into bands of differing wavelengths, andso on as will occur to readers of skill in the art. Such characteristicsof a prism that produces a scatter pattern of light may include theprism's flaws, shape, material composition, angles, and so on as willoccur to readers of skill in the art.

A prism implemented with shattered glass may provide a ‘unique’ scatterpattern according to embodiments of the present invention with respectto other pieces of shattered glass. Characteristics of prisms whichaffect light and characteristics of scatter patterns are differentbetween different pieces of shattered glass. As such, transmitting lightfrom the same light source through two different pieces of shatteredglass will produce two unique scatter patterns. When only one keyproduces a particular unique scatter pattern for which a lock isconfigured to operate, the possibility of tampering with the lock isreduced, as no other prism, or nearly no other prism, is capable ofrecreating the unique scatter pattern.

The example key (102) of FIG. 1 also includes a light source (108). Thelight source (106) in this example of FIG. 1 is configured to transmitlight (108) through the prism (102) into a light receptacle (122) of alock (104) in order to switch the locking state of a locking mechanism(120). The light source (106) may be any source of light capable oftransmitting light through a prism in such a way as to produce a scatterpattern (112). The light source (106) in the example of FIG. 1 may beimplemented as a visible-spectrum light source or a laser light source.Typical visible-spectrum light sources provide light consisting ofmultiple different wavelengths of light such that when the light istransmitted through a prism the multiple different wavelengths areseparated in the resulting scatter pattern. Laser light by contrast istypically, but not always, a single wavelength that produces a scatterpattern of that single wavelength when transmitted through a prism.

Although the example key (102) of FIG. 1 includes only a light source(106) and prism (110), readers of skill in the art will immediatelyrecognize that such keys configured for lock and key security accordingto embodiments of the present invention may include additional devices,objects, and circuitry, such as for example, one or more buttons foractivating a light source (106) in the key (102), integrated circuitsfor controlling the operation of a light source (106) in the key, powersources for the light source, additional light sources, multipledifferent types of light sources in the key, additional prisms formultiple light sources, and others. Keys for lock and key securityaccording to embodiments of the present invention may be implemented inany many ways, such as for example, in a pen light configuration or in aplastic key fob device similar to fobs used to operate common car alarmand locking systems. A key (102) according to embodiments of the presentinvention may be configured to operate a lock without contact betweenthe lock and key other than the scatter pattern of light transmitted bythe key. The key and light receptacle of the lock may alternatively beconfigured such that the key is inserted into the light receptacle ofthe locking mechanism fitted for such a purpose so as to insure aprecise and accurate alignment of the scatter pattern transmitted by thekey.

As mentioned above, the system of FIG. 1 also includes a lock (104). Theexample lock (104) in the system of FIG. 1 includes a locking mechanism(120), a light receptacle (122) and a scatter pattern detecting module(116). A locking mechanism is any aggregation of hardware and softwarecapable of restricting access when engaged and enabling access whendisengaged. Examples of locking mechanisms include a locking pin andactuator, a motor and deadbolt, an electromagnet and armature plate, andso on as will occur to readers of skill in the art.

A light receptacle (122) is an aggregation of computing hardware andsoftware, configured to receive light (108) transmitted by the lightsource (106) in the key (102) through the prism (110). The example lightreceptacle (122) of FIG. 1 may be implemented as a charge-coupled device(‘CCD’), a complementary metal-oxide-semiconductor (‘CMOS’) active-pixelsensor, or as another light-sensing device as will occur to readers ofskill in the art. A CCD includes a photoactive region and an analogshift register, that enables analog signals, electric charges affectedby light received in the photoactive region, to be transported throughsuccessive stages, capacitors, controlled by a clock signal. CCDs aremost widely used for serializing parallel analog signals, namely inarrays of photoelectric light sensors. An active-pixel sensor is animage sensor consisting of an integrated circuit containing an array ofpixel sensors, each pixel containing a photodetector and an activeamplifier. A CMOS active-pixel sensor is an active-pixel sensor producedby a CMOS fabrication process. CMOS active-pixel sensors are commonalternatives to CCDs in digital cameras. Readers of skill in the artwill recognize that, in addition to CCDs and CMOS active pixel sensors,light receptacles configured for lock and key security in accordancewith embodiments of the present invention may be implemented with anytype of image sensor capable of receiving light transmitted by a lightsource through a prism of a key.

A scatter pattern detecting module (116) is an aggregation of computerhardware and software configured to operate generally for lock and keysecurity according to embodiments of the present invention. The scatterpattern detecting module (116) may include one or more computerprocessors (not shown in FIG. 1) operatively coupled through a highspeed memory bus to Random Access Memory (‘RAM’) (not shown in FIG. 1)and EEPROM (156) or so-called Flash RAM. The scatter pattern detectingmodule (116) of FIG. 1 is operatively coupled for data communications tothe light receptacle through a data communications bus (114) and to thelocking mechanism through a communications link (118). The datacommunications bus may be any high speed bus such as a PeripheralComponent Interconnect (‘PCI’) bus, a PCI external (‘PCIe’) bus, a SmallComputer System Interface (‘SCSI’) bus, a Universal Serial Bus (USW),and others that may occur to readers of skill in the art. Thecommunications link (118) may be implemented as a data communicationsbus similar to that connecting the scatter pattern detecting module(116) to the light receptacle, or may be as on wire or two wire link,such as an Inter-Integrated Circuit (‘I²C’) link, capable of carryingcurrent for activating a motor, an actuator, or some other electromechanical device in the locking mechanism.

The scatter pattern detecting module (116) in the example of FIG. 1operates generally for lock and key security according to embodiments ofthe present invention by identifying, by the scatter pattern detectingmodule (116), a scatter pattern (112) of the light received in the lightreceptacle (122) and comparing, by the scatter pattern detecting module(116), the scatter pattern (112) to a unique preauthorized pattern (124)for operating the lock (104). A preauthorized pattern (124) is a datastructure that includes information specifying characteristics of ascatter pattern that is preauthorized to operate the lock (104). Thescatter pattern detecting module (116) may compare the characteristicsof the preauthorized pattern (124) to characteristics of the receivedscatter pattern (112) to determine whether the two patterns match. Insome embodiments, for example, the scatter pattern detecting module maycompare values of light intensity of regions (111) of the scatterpattern (112) with values of light intensity of corresponding regions ofthe preauthorized pattern (124). If the scatter pattern (112) matchesthe unique preauthorized pattern (124) the scatter pattern detectingmodule (116), switches the current locking state of the lockingmechanism (120). That is, if the current locking state is ‘locked,’ thescatter pattern detecting module switches the locking state to‘unlocked,’ disengaging the locking mechanism (120) and if the currentlocking state is ‘unlocked,’ the scatter pattern detecting module (116)switches the locking state to ‘locked,’ engaging the locking mechanism(120). If the scatter pattern (112) does not match the uniquepreauthorized pattern (124), however, the scatter pattern detectingmodule (116) maintains the current locking state of the lockingmechanism.

Readers of skill in the art will recognize that in a lock and keysecurity system configured according to embodiments of the presentinvention, such as the example lock and key security system of FIG. 1, ascatter pattern (112) may be represented in various forms electricallyand in computer memory as data. When received by a light receptacle(122) of a lock (104), for example, a scatter pattern may be representedby a set of voltage levels or current levels in capacitors orphotodetectors of a light sensor. When the scatter pattern is identifiedby the scatter pattern detecting module (116) it may be represented by adata structure, such as one or more tables, in non-volatile memory, suchas Electrically Erasable Programmable Read-Only Memory (‘EEPROM’) (156).

The arrangement of light sources, prisms, light receptacles, lockingmechanisms, scatter pattern detecting modules, and other devices andmechanisms making up the exemplary system illustrated in FIG. 1 are forexplanation, not for limitation. Systems useful for lock and keysecurity according to various embodiments of the present invention mayinclude additional devices, light sources, prisms, computer hardware, DCmotors, stepper motors, actuators, locking pins, deadbolts, lightsensors, and so on, not shown in FIG. 1, as will occur to those of skillin the art. Various embodiments of the present invention may beimplemented on a variety of hardware platforms in addition to thoseillustrated in FIG. 1.

For further explanation, FIG. 2 sets forth a flow chart illustrating anexemplary method for lock and key security according to embodiments ofthe present invention. The lock (104) in the example of FIG. 2 includesa light receptacle (122), a scatter pattern detecting module (116), anda locking mechanism (120), and the key (102) in the example of FIG. 2includes a light source (106) and a prism (110). The method of FIG. 2includes transmitting (202) by the key (102) light (108) into the lightreceptacle (122) of the lock (104). In the method of FIG. 2,transmitting (202) by the key (102) light (108) into the lightreceptacle (122) of the lock (104) is carried out by transmitting (210)the light (108) from the light source (106) through the prism (110). Asmentioned above, the light source (106) may be implemented as a laserlight source of a single wavelength, a visible-spectrum light source ofmultiple wavelengths, or some other light source as may occur to readersof skill in the art, such as an infrared light source and the like. Alsoas mentioned above, the prism (110) in the example of FIG. 2 may beimplemented with shattered glass. Such a prism implemented withshattered glass provides a unique scatter pattern, unique with respectto other prisms of shattered glass, when light is transmitted throughthe prism.

The method of FIG. 2 also includes Receiving (204), in the lightreceptacle (122) of the lock (104), light (108) transmitted by the lightsource (106) in the key (102) through the prism (110). Receiving (204),in the light receptacle (122) of the lock (104), light (108) transmittedby the light source (106) in the key (102) through the prism (110). Asmentioned above with respect to FIG. 1, the light receptacle (122) maybe implemented with a CCD, a CMOS active-pixel sensor, another type ofactive-pixel sensor, or any other image sensor as may occur to readersof skill in the art.

The method of FIG. 2 also includes identifying (206), by the scatterpattern detecting module (116), a scatter pattern (112) of the receivedlight (108). Identifying (206), by the scatter pattern detecting module(116), a scatter pattern (112) of the received light (108) may becarried out in various ways including for example, detecting values oflight intensity greater than predetermined threshold, locations of thelight having such values of light intensity, and wavelengths of thelight received in the light receptacle at the locations.

The method of FIG. 2 also includes comparing (208), by the scatterpattern detecting module (116), the scatter pattern (112) to a uniquepreauthorized pattern (124) for operating the lock (104). If the scatterpattern (112) matches the unique preauthorized pattern (124), the methodof FIG. 2 continues by switching (212), by the scatter pattern detectingmodule (116), the current locking state (216) of the locking mechanism(120). Switching (212) the current locking state (216) of the lockingmechanism (120) may be carried out in various was in dependence upon theimplementation of the locking mechanism. When the locking mechanism(120) is implemented as a deadbolt engaged by an actuator, for example,the scatter pattern detecting module (116) may switch the currentlocking state (216) by alternating the voltage level, from a logic highto low or low to high, of a signal wire connecting the scatter patterndetecting module (116) to the locking mechanism (120). When the lockingmechanism (120) is implemented as an electromagnet locking mechanismwith an armature plate, the scatter pattern detecting module may switch(212) the current locking state of the locking mechanism (120) bysending a data communications message to microcontroller for theelectromagnet locking mechanism instructing the microcontroller toswitch the current locking state. These are but two examples describedhere for clarity of explanation only, not limitation. Readers of skillin the art will recognize that there are many different ways to carryout switching the current locking state of a locking mechanism (120) inaccordance with embodiments of the present invention, as many in fact asthere are implementations of the locking mechanism itself, and each suchway is well within the scope of the present invention. If the scatterpattern (112) does not match the unique preauthorized pattern (124), themethod of FIG. 2 continues by maintaining (214) the current lockingstate of the locking mechanism (120), that is, by not switching thecurrent locking state (216) of the locking mechanism (120).

For further explanation, FIG. 3 sets forth a flow chart illustrating afurther exemplary method for lock and key security according toembodiments of the present invention. The method of FIG. 3 is similar tothe method of FIG. 2, including as it does, receiving (204) light (108)transmitted by the light source (106) in the key (102) through the prism(110); identifying (206) a scatter pattern (112) of the received light(108); comparing (208) the scatter pattern (112) to a uniquepreauthorized pattern (124) for operating the lock (104); if the scatterpattern (112) matches the unique preauthorized pattern (124), switching(212) the current locking state (216) of the locking mechanism (120);and if the scatter pattern (112) does not match the unique preauthorizedpattern (124), maintaining (214) the current locking state of thelocking mechanism (120).

The method of FIG. 3 differs from the method of FIG. 2, however, inthat, in the method of FIG. 3 comparing (208) the scatter pattern (112)to a unique preauthorized pattern (124) for operating the lock (104)includes comparing (314) values of light intensity (304) of the scatterpattern (112) with values of light intensity (310) of the preauthorizedpattern (124). Comparing (314) values of light intensity (304) for thescatter pattern (112) with values of light intensity (310) thepreauthorized pattern (124) may be carried out in various ways. In themethod of FIG. 3, for example, comparing (314) values of light intensity(304) for the scatter pattern (112) with values of light intensity (310)the preauthorized pattern (124) may be carried out by comparing (316)average values of light intensity (304) for particular regions of thescatter pattern (112) with average values of light intensity (310) forparticular regions of the preauthorized pattern (124) where the regionsof the scatter pattern (112) correspond in location (302, 308) to theregions of the preauthorized pattern (124). Also in the method of FIG. 3comparing (314) values of light intensity (304) for the scatter pattern(112) with values of light intensity (310) for the preauthorized pattern(124) may include comparing (318) wavelengths of light (306) for thescatter pattern (112) with wavelengths (312) of light for thepreauthorized pattern (124). That is, in addition to comparing values oflight intensity, the scatter pattern detecting module may also comparewavelengths of the scatter patterns. Readers of skill in the art willrecognize that these example ways of comparing (208) the scatter patternto a unique preauthorized pattern for operating the lock (104) areseveral among many possible ways and each such way of comparing scatterpatterns is well within the scope of the present invention.

For further explanation, FIG. 4 sets forth a flow chart illustrating afurther exemplary method for lock and key security according toembodiments of the present invention. The method of FIG. 4 is similar tothe method of FIG. 2, including as it does, receiving (204) light (108)transmitted by the light source (106) in the key (102) through the prism(110); identifying (206) a scatter pattern (112) of the received light(108); comparing (208) the scatter pattern (112) to a uniquepreauthorized pattern (124) for operating the lock (104); if the scatterpattern (112) matches the unique preauthorized pattern (124), switching(212) the current locking state (216) of the locking mechanism (120);and if the scatter pattern (112) does not match the unique preauthorizedpattern (124), maintaining (214) the current locking state of thelocking mechanism (120).

The method of FIG. 4 differs from the method of FIG. 2, however, in thatthe method of FIG. 4 includes specifying (404) by a manufacturer (402)of the lock (104), the unique preauthorized scatter pattern (124). A‘manufacturer’ as the term is used here refers to a business, company,group, agents of such businesses, companies, and groups, and anyindividual capable of assembling, selling, testing, programming,constructing, or producing the lock (104). A manufacturer may alsoinclude a vendor of the lock. In the method of FIG. 2, specifying theunique preauthorized scatter pattern (124) includes storing (406), innon-volatile computer memory (410) of the scatter pattern detectingmodule (116) as the preauthorized scatter pattern (124), a sourcescatter pattern (408) identified by the scatter pattern detecting module(116) in dependence upon light (108) received in the light receptacle(122) where the light (108) is light transmitted by the light source(106) in the key (102) through the prism (110) at the behest of themanufacturer (402). A source scatter pattern (408) as the term is usedhere is a scatter pattern produced by a key authorized to operate thelock. The manufacturer (402) of the lock, may select any key (102) assuch an authorized key, use that selected key to transmit light throughthe prism (110) of the key into the light receptacle (122) producing asource scatter pattern, and store that source scatter pattern as theunique preauthorized scatter pattern (124). The manufacturer may storethe source pattern in non-volatile memory (410) of the scatter patterndetecting module (116) such as Electrically Erasable ProgrammableRead-Only Memory (‘EEPROM’).

In view of the explanations set forth above, readers will recognize thatat least one benefit of lock and key security according to embodimentsof the present invention includes reducing the risks of lock tamperingby providing a key which is difficult, if not impossible, to recreate,copy, or mimic. Specifically keys configured according to embodiments ofthe present invention with a prism of shattered glass provide increasedsecurity compared to lock and key systems of the prior art as no otherprism, or nearly no other prism, of shattered glass is capable ofproducing the same unique scatter pattern produced by the key.

It will be understood from the foregoing description that modificationsand changes may be made in various embodiments of the present inventionwithout departing from its true spirit. The descriptions in thisspecification are for purposes of illustration only and are not to beconstrued in a limiting sense. The scope of the present invention islimited only by the language of the following claims.

What is claimed is:
 1. A method comprising: receiving, in a lightreceptacle of a lock, light transmitted by a light source throughshattered glass forming a prism in a key, wherein the transmission ofthe light through the shattered glass forms a unique scatter pattern independence upon physical characteristics of the shattered glass;identifying the scatter pattern of the received light; and comparing thescatter pattern to a unique preauthorized pattern for operating thelock.
 2. The method of claim 1 wherein comparing the scatter pattern toa unique preauthorized pattern for operating the lock further comprises:comparing values of light intensity of the scatter pattern with valuesof light intensity of the preauthorized pattern.
 3. The method of claim2 wherein comparing values of light intensity for the scatter patternwith values of light intensity the preauthorized pattern furthercomprises: comparing average values of light intensity for each of aplurality of regions of the scatter pattern with average values of lightintensity for each of a plurality of regions of the preauthorizedpattern, the plurality of regions of the scatter pattern correspondingin location to the plurality of regions of the preauthorized pattern. 4.The method of claim 2 wherein comparing values of light intensity forthe scatter pattern with values of light intensity for the preauthorizedpattern further comprises: comparing wavelengths of light for thescatter pattern with wavelengths of light for the preauthorized pattern.5. The method of claim 1 wherein the light source comprises a laserlight source.
 6. The method of claim 1 wherein the light sourcecomprises a visible-spectrum light source.
 7. The method of claim 1further comprising specifying by a manufacturer of the lock, the uniquepreauthorized scatter pattern including: transmitting toward the lock,at the behest of the manufacturer, light by the light source in the keythrough the shattered glass forming the prism thereby generating asource scatter pattern; identifying, by the scatter pattern detectingmodule of the lock, the source scatter pattern; and storing the sourcescatter pattern as the preauthorized scatter pattern in non-volatilecomputer memory of the scatter pattern detecting module.
 8. An apparatuscomprising: a key comprising a light source and shattered glass forminga prism; and a lock comprising: a locking mechanism; a light receptacleconfigured to receive light transmitted by the light source in the keythrough the shattered glass forming the prism, wherein the transmissionof the light through the shattered glass forms a unique scatter patternin dependence upon physical characteristics of the shattered glass; ascatter pattern detecting module operatively coupled for datacommunications to the light receptacle and the locking mechanism, thescatter pattern detecting module configured to: identify the scatterpattern of the received light transmitted by the light source in the keythrough the shattered glass forming the prism; and compare the scatterpattern to a unique preauthorized pattern for operating the lock.
 9. Theapparatus of claim 8 wherein the light receptacle further comprises acharge-coupled device (‘CCD’).
 10. The apparatus of claim 8 wherein thelight receptacle further comprises a complementarymetal-oxide-semiconductor (‘CMOS’) active-pixel sensor.
 11. An apparatuscomprising a lock and a key, the lock comprising a light receptacle, ascatter pattern detecting module, and a locking mechanism, the keycomprising a light source and shattered glass forming a prism, theapparatus further comprising a computer processor and a computer memoryoperatively coupled to the computer processor, the computer memoryhaving disposed within it computer program instructions that whenexecuted by the computer processor cause the apparatus to carry out thesteps of: receiving, in the light receptacle of the lock, lighttransmitted by the light source in the key through the shattered glassforming the prism, wherein the transmission of the light through theshattered glass forms a unique scatter pattern in dependence uponphysical characteristics of the shattered glass; identifying, by thescatter pattern detecting module, the scatter pattern of the receivedlight; and comparing, by the scatter pattern detecting module, thescatter pattern to a unique preauthorized pattern for operating thelock.
 12. The apparatus of claim 11 wherein the light source comprises alaser light source.
 13. The apparatus of claim 11 wherein the lightsource comprises a visible-spectrum light source.