Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ELECTRONIC SECURITY APPARATUS AND SYSTEM
Document Type and Number:
WIPO Patent Application WO/2002/031296
Kind Code:
A1
Abstract:
A security apparatus (10) includes a microcomputer (12) and associated memory (14). The memory stores access codes (28) that are compared with codes input via a keypad (16). Where the input code matches a stored access code then access is provided to a device protected by the security apparatus. The access codes are generated according to an algorithm. The input codes are generated in accordance with the same algorithm, but are allocated by a remote server. The security apparatus can be attached to a device such as a delivery box. In an alternative embodiment, the secure apparatus can be used as a meter for example, such as a parking meter or to provide pre-purchased allocations of utility commodities such as electricity.

Inventors:
BERTONCINI ANGELA (AU)
SPADACCINI NICOLAS (AU)
MILLER DAVID JOHN (AU)
GREEN CLIFFORD ROBERT (AU)
Application Number:
PCT/AU2001/001292
Publication Date:
April 18, 2002
Filing Date:
October 15, 2001
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DELIVEREEZ PTY LTD (AU)
BERTONCINI ANGELA (AU)
SPADACCINI NICOLAS (AU)
MILLER DAVID JOHN (AU)
GREEN CLIFFORD ROBERT (AU)
International Classes:
A47G29/14; G07C9/00; G07F7/10; (IPC1-7): E05B49/00
Domestic Patent References:
WO1995017739A11995-06-29
Foreign References:
US4100534A1978-07-11
EP1108630A22001-06-20
Attorney, Agent or Firm:
WRAY & ASSOCIATES (Western Australia 6000, AU)
Download PDF:
Claims:
The Claims Defining the Invention are as Follows :
1. An electronic security apparatus, comprising: user input means for receiving an access code entered by a user; storage means for storing data indicative of a first sequence of access codes; and processor means arranged to compare the entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence.
2. An electronic security apparatus according to claim 1, wherein the user input means comprises a keypad.
3. An electronic security apparatus according to claim 2, where the keypad includes a section formed from a puncturable resilient material, and electric contacts provided behind said section, said electrical contacts being connected to a power circuit of said electronic security apparatus.
4. An electronic security apparatus according to any one of claims 1 to 3, wherein the processor means is arranged to remove the entered access code from the first sequence of access codes after a predetermined delay.
5. An electronic security apparatus according to any preceding claim, wherein the processor means is arranged to include the further access code at an end of the first sequence of access codes.
6. An electronic security apparatus according to any preceding claim, wherein the storage means also stores a counter value, said processor means being responsive to the counter value in producing each further access code in accordance with an algorithm, said processor means further arranged to increment the counter value after producing each further access code.
7. An electronic security apparatus according to any preceding claim, wherein the storage means also stores a second sequence of access codes, said processor means being arranged to move unused access codes preceding the entered access code in the first sequence, to the second sequence, and to generate a further access code for the first sequence, for each such access code moved.
8. An electronic security apparatus according to claim 7, wherein the second sequence is formed as a stack, said processor means being arranged to move access codes from the first sequence and insert them at one end of the stack forming the second sequence, and to remove access codes from the other end of the stack if said second sequence if full.
9. An electronic security apparatus according to any one of claims 6 to 9, wherein the storage means further stores a key value, said processor means being responsive to said key value and said counter value in producing further access codes in accordance with said algorithm.
10. An electronic security apparatus according to any preceding claim, wherein the processor means is arranged to calculate data from the entered access code.
11. An electronic security apparatus according to claim 10. wherein the processor means is arranged to include said data in the prescribed output.
12. An electronic security apparatus according to claim 11, wherein said apparatus includes an output device, said data being displayed on the output device by the processor means.
13. An electronic security apparatus according to any preceding claim, wherein said processor means is arranged to execute a further program in response to said data.
14. A secure delivery acceptance system, comprising: a container having an electrically operated lock provided thereon, said lock operating under control of an electronic security apparatus according any of claims 1 to 9 ; and server means responsive to requests for access codes for said container, said requests including information identifying said container, said server means being responsive to said request to generate and provide an access code for said container, wherein said server means maintains a server sequence for each container corresponding to said first sequence to each container.
15. An electronic security apparatus according to claim 14, wherein the server is arranged to generate access codes in batches, and to randomly allocate the access code from the batch of access codes in the server sequence.
16. A system for remotely allocating access codes for a secure device, comprising: a secure apparatus comprising user input means for receiving an access code entered by a user, storage means for storing data indicative of a first sequence of access codes, and processor means arranged to compare entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence; and a server means remote from the secure apparatus and responsive to requests for access codes for said apparatus, said requests including information identifying said apparatus, said server means being responsive to said request to generate and provide an access code for said apparatus, wherein said server means maintains a server sequence for each apparatus corresponding to said first sequence of each apparatus.
17. A system as claimed in claim 16, wherein the user input means comprises a keypad.
18. A system as claimed in claim 17, wherein the keypad includes a section formed from a puncturable resilient material, and electric contacts provided behind said section, said electrical contacts being connected to a power circuit of said electronic security apparatus.
19. A system according to any one of claims 16 to 18, wherein the processor means is arranged to remove the entered access code from the first sequence of access codes after a predetermined delay.
20. A system according to any of claims 16 to 19, wherein the processor means is arranged to include the further access code at an end of the first sequence of access codes.
21. A system according to any of claims 16 to 20, wherein the storage means also stores a counter value, said processor means being responsive to the counter value in producing each further access code in accordance with an algorithm, said processor means further arranged to increment the counter value after producing each further access code.
22. A system according to any of claims 16 to 21, wherein the storage means also stores a second sequence of access codes, said processor means arranged to move unused access codes preceding the entered access code in the first sequence to the second sequence and to generate a further access code for the first sequence for each such access code moved.
23. A system according to claim 22, wherein the second sequence is formed as a stack, said processor means being arranged to move access codes from the first sequence and insert them at one end of the stack forming the second sequence, and to remove access codes from the other end of the stack if said second sequence if full.
24. A system according to any of claims 16 to 23, wherein the storage means further stores a key value, said processor means being responsive to said key value and said counter value in producing further access codes in accordance with said algorithm.
25. A system according to any of claims 16 to 24, wherein said server is arranged to embed data in said access code, whereby said processor means is arranged to produce a prescribed output if a portion of the entered access code matches an access code.
26. A system according to any of claims 16 to 25, wherein the processor means is arranged to calculate data from the entered access code. More preferably, the processor means is arranged to include said data in the prescribed output.
27. A system according to claim 26, wherein said device includes an output device, said data being displayed on the output device by the processor means.
28. A system according to claim 26 or claim 27, wherein said processor means is arranged to execute a further program in response to said data.
29. A method for remotely allocating access codes for a secure device, the secure device comprising: a secure apparatus comprising user input means for receiving an access code entered by a user, storage means for storing data indicative of a first sequence of access codes, and processor means arranged to compare entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence; and a server means remote from the secure apparatus and responsive to requests for access codes for said apparatus, said requests including information identifying said apparatus, said server means being responsive to said request to generate and provide an access code for said apparatus, wherein said server means maintains a server sequence for each apparatus corresponding to said first sequence of each apparatus.
30. A method according to claim 29, including the further step of billing the user for the step of allocating the access code.
31. A method according to claim 30, wherein the bill is included in a user's account.
32. A method according to any one of claims 29 to 31, wherein payment is made to the owner of the secure device, or commodity or service.
33. A method according to any one of claims 29 to 32, wherein payment is made on the basis of codes issued.
Description:
Electronic Security Apparatus and System Field Of The Invention This invention relates to an electronic security apparatus that has utility in applications where access-code authorization may be required. Such applications include electronic locks, building access systems, secure delivery containers, and metering devices such as electronic parking meters.

Background Art Electronic security apparatus are commonly used in a variety of situations, which include electronic locks and access systems for buildings or other secure environments.

One example of an electronic security system is disclosed in the US Patent 4,847,614, which describes an electronic remote control and an electronic receiver. The electronic receiver is provided in a motor vehicle and includes a circuit for generating a code word and for comparing a received code word to the generated code word.

The electronic remote control circuit is a physically separate device typically carried by the owner of the motor vehicle. The electronic remote control circuit includes a code word generator of the same form as that provided in the receiver. The electronic remote control circuit, upon activation by the user, transmits the generated code word to the receiver.

The receiver compares the received code word with the generated code word and if the two are in agreement, unlocks the vehicle. The electronic remote control and receiver described in US Patent 4,847,614 also discloses the use of code stepping, in which both the remote control and the receiver generate a different code word after each transmits/receive operation.

The electronic security system described in US Patent 4,847,614 provides a useful solution where a small number of known people will be accessing the secured item. However, where a range of different people may access the secured item, systems requiring a physical remote control or key become cumbersome, particularly in applications such as secure delivery boxes, where a delivery agent will make delivery to many secure delivery boxes, and many delivery agents may each require access to each secure delivery box.

Another example of a security system is described in UK Patent Application GB 2,280,709 in which a building security system includes a code-operated safe accessible from outside a building. The security system includes a keypad through which a user wishing to gain access to the safe enters an access code that is compared with a stored access code in the security system. If the two codes are in agreement, the security unlocks the safe for access by the user.

The security system described in UK Patent Application GB 2,280,709 is connected to a remote monitoring system from which the access code can be reprogrammed and from which users request an access code to gain entry to the safe. In use, the safe is intended to store keys to the building and other information that may be of assistance to emergency services. As such, a single access code is all that is required and wiring the security system to a remote site is commonplace for such security systems. However, for other applications such as secure delivery boxes, wiring the security system to a remote site would be unduly cumbersome.

US Patent 5,979,750 describes a computerised delivery acceptance system in which a computer control unit checks entered access codes against a stored access code and provides access to the delivery compartment if the codes are in agreement. US Patent 5,979,750 also describes the use of an automatic deletion of access codes once they are used in order to prevent illegitimate use of the access code at a later date. The computer control unit is programmed either via a keypad, via a telephone line connected to the computer control unit or via a radio wave interface. Although the delivery acceptance system

described in US Patent 5,979,750 provides a useful delivery system, the requirement that the computer is programmed either manually via a keypad by the owner of the delivery system, or by telephone or radiowave limits the placement and application of the delivery system. Manual programming via the keypad will become cumbersome for the owner of the delivery system, whereas connection to a telephone line or via a radio frequency interface renders the delivery system susceptible to interception by third parties who may then use the reprogrammed codes to illegitimately gain access to the delivery system.

Disclosure Of The Invention In accordance with the first aspect of this invention, there is provided an electronic security apparatus, comprising: User input means for receiving an access code entered by a user; Storage means for storing data indicative of a first sequence of access codes; Processor means arranged to compare entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence.

Preferably, the user input means comprises a keypad.

More preferably, the keypad includes a section formed from a puncturable resilient material, and electric contacts provided behind said section, said electrical contacts being connected to a power circuit of said electronic security apparatus.

Preferably, the processor means is arranged to remove the entered access code from the first sequence of access codes after a predetermined delay.

Preferably, the processor means is arranged to include the further access code at an end of the first sequence of access codes.

Preferably, the storage means also stores a counter value, said processor means being responsive to the counter value in producing each further access code in accordance with an algorithm, said processor means further arranged to increment the counter value after producing each further access code.

Preferably, the storage means also stores a second sequence of access codes, said processor means arranged to move unused access codes preceding the entered access code in the first sequence to the second sequence and to generate a further access code for the first sequence for each such access code moved.

Preferably, the second sequence is formed as a stack, said processor means being arranged to move access codes from the first sequence and insert them at one end of the stack forming the second sequence, and to remove access codes from the other end of the stack if said second sequence if full.

Preferably, the storage means further stores a key value, said processor means being responsive to said key value and said counter value in producing further access codes in accordance with said algorithm.

Preferably, the processor means is arranged to calculate data from the entered access code. More preferably, the processor means is arranged to include said data in the prescribed output.

Preferably, said apparatus includes an output device, said data being displayed on the output device by the processor means.

Preferably, said processor means is arranged to execute a further program in response to said data.

In accordance with a second aspect of this invention, there is provided a secure delivery acceptance system, comprising: A container having an electrically operated lock provided thereon, said lock operating under control of an electronic security apparatus according the first aspect of this invention; And server means responsive to requests for access codes for said container, said requests including information identifying said container, said server means being responsive to said request to generate and provide an access code for said container, wherein, said server means maintains a server sequence for each container corresponding to said first sequence to each container.

Preferably, the server is arranged to generate access codes in batches, and to randomly allocate the access code from the batch of access codes in the server sequence.

In accordance with a third aspect of this invention, there is provided a system for remotely allocating access codes for a secure device, comprising: A secure apparatus comprising user input means for receiving an access code entered by a user, storage means for storing data indicative of a first sequence of access codes, and processor means arranged to compare entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence; and

server means remote from the secure apparatus and responsive to requests for access codes for said apparatus, said requests including information identifying said apparatus, said server means being responsive to said request to generate and provide an access code for said apparatus, wherein said server means maintains a server sequence for each apparatus corresponding to said first sequence of each apparatus.

Preferably, the user input means comprises a keypad.

More preferably, the keypad includes a section formed from a puncturable resilient material, and electric contacts provided behind said section, said electrical contacts being connected to a power circuit of said electronic security apparatus.

Preferably, the processor means is arranged to remove the entered access code from the first sequence of access codes after a predetermined delay.

Preferably, the processor means is arranged to include the further access code at an end of the first sequence of access codes.

Preferably, the storage means also stores a counter value, said processor means being responsive to the counter value in producing each further access code in accordance with an algorithm, said processor means further arranged to increment the counter value after producing each further access code.

Preferably, the storage means also stores a second sequence of access codes, said processor means arranged to move unused access codes preceding the entered access code in the first sequence to the second sequence and to generate a further access code for the first sequence for each such access code moved.

Preferably, the second sequence is formed as a stack, said processor means being arranged to move access codes from the first sequence and insert them at

one end of the stack forming the second sequence, and to remove access codes from the other end of the stack if said second sequence if full.

Preferably, the storage means further stores a key value, said processor means being responsive to said key value and said counter value in producing further access codes in accordance with said algorithm.

Preferably, said server is arranged to embed data in said access code, whereby said processor means is arranged to produce a prescribed output if a portion of the entered access code matches an access code.

Preferably, the processor means is arranged to calculate data from the entered access code. More preferably, the processor means is arranged to include said data in the prescribed output.

Preferably, said device includes an output device, said data being displayed on the output device by the processor means.

Preferably, said processor means is arranged to execute a further program in response to said data.

According to a fourth aspect of the present invention, there is provided a method for remotely allocating access codes for a secure device, the secure device comprising: a secure apparatus comprising user input means for receiving an access code entered by a user, storage means for storing data indicative of a first sequence of access codes, and processor means arranged to compare entered access code with the first sequence of access codes, and to produce a prescribed output if the entered access code matches one of the access codes, and to subsequently remove the entered access code from the first sequence of access codes, and generate a further access code and include it in the first sequence; and

a server means remote from the secure apparatus and responsive to requests for access codes for said apparatus, said requests including information identifying said apparatus, said server means being responsive to said request to generate and provide an access code for said apparatus, wherein said server means maintains a server sequence for each apparatus corresponding to said first sequence of each apparatus.

Preferably, the method includes the further step of billing the user for the step of allocating the access code.

Preferably, the bill is included in a user's account.

Preferably, payment is made to the owner of the secure device, or commodity or service.

Preferably, payment is made on the basis of codes issued Brief Description Of The Drawings Two embodiments of this invention will now be described, by way of example, with reference to the accompanying drawings, in which: Figure 1 shows an electronic security apparatus according to the first embodiment of the invention; Figure 2 illustrates a system for the secure delivery of articles incorporating the electronic security apparatus shown in figure 1; Figure 3 shows a secure parking meter system in accordance with the second embodiment of the invention; and Figure 4 is a schematic illustration of the front face of a secure parking meter used in the system of Figure 3

Best Mode (s) For Carrying Out The Invention The embodiment is directed towards an electronic security apparatus, and a method for secure delivery of articles is in the electronic security apparatus.

The electronic security apparatus 10 of the embodiment is shown in figure 1, and comprises a microcomputer 12 and associated memory 14, and an input keypad 16 connected to the microcomputer 12. The security apparatus 10 is designed for use in situations where many people may require access to a device protected by the electronic security apparatus 10 as described herein below.

To this end, the memory 14 stores: A user code 18 and a slave code 20 A key value 22, which is unique to the particular electronic security apparatus 10 A counter value 24 A first sequence 26 of access codes 28. The first sequence 26 also includes a flag 30 associated with each access code 28.

A second sequence 32 of access codes 28. The second sequence 32 also includes a flag 30 associated with each access code 28. The second sequence 32 is implemented as a stack as will be described in more detail below.

In the embodiment, the first sequence 26 stores one hundred access codes 28 and the second sequence 32 can store two hundred access codes 28. It should be appreciated that even other embodiments, other sizes for the first and second sequences 26 and 32 may be used as needed.

When the electronic security apparatus is manufactured, the counter value 24 is initialised to a value of one. When power is applied to the security apparatus 10, the microcomputer 12 first checks whether the counter value 24 is less than the size of the first sequence 26,100 in this embodiment. If the counter value 24 is less than the size of the first sequence 26, the microcomputer 12 knows that the unit is performing its first initialisation and that the first sequence 26 is empty.

The microcomputer 12 then proceeds to generate access codes 28 and store them in the first sequence 26 until the first sequence 26 is full.

The microcomputer 12 references the key value 22 and the counter value 24 in producing each access code 28 according to an algorithm. Any suitable algorithm can be used, which preferably provides a low occurrence of repetitious access codes, so that a larger number of access codes must be produced before any duplicate access codes are generated. After each access code 28 is produced and stored in first sequence 26, the microcomputer 12 increments the counter value 24. Since the counter value 24 is referenced by the microcomputer 12 in evaluating the algorithm to produce an access code, incrementing the counter value 24 will produce a different access code each time.

Once the initial access codes have been generated to fill the first sequence 26, the security apparatus is ready for operation.

In use, the security apparatus is provided in a container or other area were restricted access to the container or area is desired. As such, the electronic security apparatus can be used in a wide variety of applications, ranging from secure delivery boxes, lockers and the like to building access panels and so forth.

The embodiment will be described with reference to the electronic security apparatus being used in a secure delivery box.

When a person wishes to gain access to the delivery box secured by the electronic security apparatus, the person enters an access code on the keypad

16. Upon receiving the entered access code, the microcomputer 12 compares the entered access code with the access codes 28 in the first sequence 26 and the second sequence 32. The microcomputer 12 looks through the first and second sequences 26 and 32 from old to new; thus, the microcomputer 12 first searches the second sequence 32 from the end 32B to the end 32A, and then from the end of the first sequence 26 to its beginning. In this manner, if duplicate access codes 28 are present in the sequences 26 and 32, the oldest matching access code is found first.

If the microcomputer 12 determines that the entered access code is contained in the first or second sequence 26 or 32, the microcomputer 12 sets the flag 30 corresponding the matched access code in the sequence 26 or 32 and produces an output signal corresponding to a successful access code entry. This output signal can be used to activate an electro-mechanical lock to provide access to the delivery box, to unlock a door and so forth.

The matched access code 28 and corresponding flag 30 are retained in the sequence 26 or 32 for a predetermined time after the flag 30 is set by the microcomputer 12. This allows, for example, a deliverer sufficient time to utilise the matched access code several times when making a delivery, if, for example, serval trips to the delivery box are required or the deliverer forgets to deposit all of the articles on the first attempt.

After the predetermined time has expired, the matched access code is deleted from the sequence 26 or 32.

If the entered access code matches an access code 28 in the first sequence 26, any access codes in the first sequence 26 that were above the matched access code are moved by the microcomputer 12 from the first sequence 26 to the second sequence 32. Since the second sequence 32 is a stack, the moved access codes are pushed on to one each 32a of the second sequence 32. If the second sequence 32 becomes full, overflow access codes are deleted from the other end 32b of the stack.

The second sequence 32 acts as a reserve list in order to prevent the first sequence 26 from becoming filled with stale access codes, while still allowing deliverers who are delayed or late to use their access code.

The remaining access codes in the first sequence 26 are moved to the top of the first sequence 26, thereby creating several empty spaces at the end of the first sequence 26 for further access codes. The microcomputer 10 then generates new access codes using the key value 22 and the counter value as described above to fill the empty spaces in the first sequence 26. The counter value 24 is incremented by the microcomputer 12 each time a further access is generated.

Thus, the first sequence 26 always contains a full list of access codes that are available.

If the entered access code by the person at the keypad 16 does not match any of the access codes in the first or second sequences 26 and 32, the microcomputer 12 then compares whether the entered access code matches a slave code 20 or the user code 18. If so, the microcomputer 12 again generates an output corresponding to a successful entry of an access code.

If the entered access code matches the slave code 20, the microcomputer 12 also increments a slave counter 34. If the slave counter 34 reaches a user- programmable limit as described below, the microcomputer 12 will no longer accept the slave code 20.

The access codes 28 in the first and second sequences 26 and 32 are automatically generated by the microcomputer 12 and the owner of the delivery box does not necessarily know the value of those access codes. To provide the owner of the delivery box with entry to the box, the owner is provided with a user code 18 that is user-programmable via the keypad 16.

A slave code 20 is also provided which is user-programmable. The slave code 20 allows the owner of the delivery box to provide a friend or neighbour with a code to access the delivery box, for instance whilst the owner is on holiday, without having to reveal their user code 18. As such, the owner is able to set a

number of times the slave code 20 will be accepted before the microcomputer 12 ceases to accept it.

In the event that the electronic security apparatus 10 loses power, a provision is provided on the keypad 16 for the supply of power to the security apparatus 10 through the keypad 16. This can be implemented in a number of ways, however in the embodiment it is implemented by means of a section 36 of the keypad 16 that is filled with a resilient, waterproof material such as silicone. Behind the section 36, electrical contacts (not shown) are provided, such that service personal can push pins through the resilient material and make contact with the electrical contacts to provide power to the security apparatus.

One example of the electronic security apparatus 10 in use will now be described with reference to figure 2. The example concerns use of the electronic security apparatus in a delivery box, shown in figure 2 at 50. The delivery box 50 may be secured to the owner's residence to receive deliveries of products ordered from retailers.

For instance, the owner may browse a website stored on a retailer's web server 52 using their computer 54. When the user finds a product or products they wish to order from the retailer, they transmit an electronic order from their computer 54 to the retailer's server 52 via the Internet 56 in known manner. In addition to providing typical details concerning the order, such as the products, the delivery address, credit card details and the purchaser's name, the owner of the delivery box 50 also provides their delivery box number, a unique serial number assigned to the delivery box 50 and unrelated to the key value 22.

Upon receiving the order, the retailer's server 52 processes the order. Upon determining the presence of a delivery box number, the retailer's server 52 contacts an access code server 58 and requests and access code for the delivery box 50.

The access code server 58 maintains a database 60, which maintains a table of serial numbers and corresponding key values 22 of each delivery box. The

access server 58, upon validating the request from the retailer's server 52, accesses the database 60 and returns an access code to the retailer's server 52.

To enable the access server 58 to generate valid access codes for each delivery box 50, the access code server 58 also stores which algorithm are used by each delivery box where multiple algorithms are used, or simply stores the algorithm used by all delivery boxes if only one algorithm is used.

The access code server 58 also maintains in the database 60 a table of which access codes have been allocated for each delivery box. This allows the access code server 58 to allocate a new access code for each request and to maintain synchronisation with the delivery box.

To offer increased security against attempts to determine the access code sequence, the access code server 58 is arranged to allocate access codes randomly from a subset of the available access codes. For example, the access code server 58 is arranged to allocate a code randomly from the first ten available access codes for a particular delivery box. When all ten access codes have been allocated, the access code server 58 then allocates codes randomly from the next block ten, and so forth. Note that in other embodiments, other allocations systems may be adopted. Random allocation is possible where the access codes are generated in batches, with the allocation occurring from that batch. Each batch is generated by the microcomputer 12-as described above -so that for example, a batch of new codes would be generated each time the counter value 24 reaches a predetermined value, rather than generating a new access code each time the counter is incremented. For example, batches of ten access codes could be generated each time the counter reaches a decade.

The retailer, upon receipt of the access code from the access code server 58 is enable to effect delivery of the goods to the delivery box 50 by entering the access code to the electronic security apparatus 10.

Advantageously, if the owner of the box 50 suspects that the delivery box has been illegitimately accessed and that the security of the current access codes 28 stored in the first and second sequences 26 and 32 have been compromised, the

owner can contact the access code server 58 and request a reset of the access codes.

It will be apparent that the electric security apparatus of the first embodiment provides a flexible security device offering access for multiple people, and offers intelligent management of access codes to accommodate delayed or late deliveries. Further, a system for secured delivery of articles is possible by using the electronic security apparatus, however, it will be appreciated that both the secure delivery method and the electronic apparatus is capable of being used in situations other than that disclosed in the embodiment above.

For instance, where the delivery of products to the delivery box 50 is effected by an organization other than the retailer, the above method may be varied such that the retailer provides the access code to the delivery organization or alternatively that the deliverer requests an access code directly from the access code server 58.

The second embodiment is directed towards a secure parking meter system, as shown in Figure 3.

The parking meter system comprises a computer server 100 and a secure parking meter 102. The secure parking meter 102 operates in the same general manner as the electronic security apparatus 10 described in relation to the first embodiment with the following differences. In this embodiment, the secure parking meter 102 is not used to gain access to an enclosure or delivery box, but instead is used to verify codes representing parking permits and to display the remaining time on the parking permit. In the embodiment described herein, the secure parking meter 102 is located within the vehicle, although it could alternatively be located at a parking location.

In practice, when a user wishes to park their vehicle 104, the user contacts the computer server 100 via any convenient mechanism, such as the Internet or telephone. Telephone access is particularly convenient, since it allows the user

to access the computer server 100 via a mobile telephone whilst in the car park where they wish to park their vehicle.

The user accesses the computer server 100 and enters the serial identification number of their secure parking meter 102, and the length of time required, shown in Figure 3 as arrow A.

The computer server 100 receives this information and produces an access code, which is sent to the user. In a similar manner to the access code server 58 of the first embodiment the computer server 100 maintains a list of access codes for each secure parking meter 102 and is able to calculate subsequent access codes. In the embodiment the computer server 100 selects an access code for the user's secure parking meter 102 and embeds into the access code data corresponding to the area number 106 and the length of time required to produce a final access code that is communicated to the user, shown in Figure 3 as arrow B. This communication can be using any convenient mechanism, such as by email where the user accesses the computer server 100 via the Internet or via SMS or by speaking the final access code where the user contacts the computer server 100 by a mobile phone or land-line telephone.

After issuing the final access code, the computer server 100 bills the user for the cost of the parking ticket and makes payment to the relevant parking authority, such as a city council 108, shown in Figure 3 as arrow C. Conveniently, where the user accesses the computer server 100 by telephone, the computer server 100 is arranged to communicate with the user's telephone carrier company to have the cost of the parking permit added to their telephone bill 110, shown in Figure 3 as arrow D. As an alternative, the cost can be added to any other suitable account, such as another utility, credit card, or other approved account.

When the user receives the final access code, they enter the access code into the secure parking meter 102, shown in Figure 3 as arrow E. The secure parking meter 102 extracts the embedded data from the access code and the original access code and confirms that the entered access code is a valid code. If so,

the secure parking meter 102 displays the remaining time and commences countdown of the time.

Figure 4 is a schematic illustration of the secure parking meter 102. To use the secure parking meter 102, the user first presses a code button 110, then enters the access code, followed by the code button 110 again. The secure parking meter 102 is then charged. The user can then switch the secure parking meter 102 on, by pressing a"Zone On"button 112, and entering the area code 106, followed by the"Zone On"button 112 again. The area code 106 is used to define the unit cost of the time in that zone. So for example, parking in Zone 1 may cost $2 per hour, whereas Zone 2 may cost $3 per hour.

If the user wishes to suspend, or interrupt, the operation of the secure parking meter 102, for example, because he has purchased more than the amount of time that he wishes to use on this occasion, then he simply presses the"Off' button 114. Thus, a user can purchase a large amount of time-say 30 hours- but can use it in shorter periods of, for example, one-hour sessions. The timer is started again by entering the area code 106 once more, and then pressing the "Zone On"button 112 once more. This can be repeated until the purchased time allocation expires. If the user is parking in a different zone with a different area code, then the area code 106 entered when use of the parking meter 102 is resumed will be different from that entered initially.

If required, the secure parking meter 102 can be provided without the manual on/off/interrupt facility.

Additionally, verification of time displays on the secure parking meter 102 can be provided as follows. The computer server 100 includes a checksum into the final access code that is provided to the user. The checksum can be changed periodically such as hourly, daily, weekly, or monthly, according to the desired security. The checksum is stored in the secure parking meter 102 for the duration of the current parking period.

When a parking inspector walks past the car 104, they can see the remaining time on the secure parking meter 102, and can elect to interrogate the secure

parking meter 102 for its checksum in order to determine whether the meter 102 is displaying time remaining from a valid access code. In the embodiment, the parking inspector uses a handheld device that includes a means of communicating with the secure parking meter 102, for example an infra-red port.

To provide a secure interrogation system, the secure parking meter 102 will not accept consecutive interrogations, but will wait for a set period-say 1 minute, between checksum requests. This reduces the chances of people trying to find out the checksum via a stolen parking unit.

Further, the parking inspector's unit does not send or receive the actual checksum. The parking inspector's unit sends out a random number (say 6 or 8 or more digits), which is received by the secure parking meter 102. This number is then processed by the secure parking meter 102 through a further algorithm which uses the random number and the checksum-to produce a two or three digit number as the response to the parking inspector's unit.

The parking inspector's unit then checks that this two or three number is the correct response, given that his unit knows the valid checksum. Alternatively, the parking inspector's unit may have a list of random numbers and corresponding correct replies downloaded to his unit-so his unit doesn't have a specific checksum either.

By giving only a small number of digits in reply-say two or three, it is more difficult to determine the checksum by repeatedly interrogating a secure parking meter 102. Two or three digits are also sufficient to catch the vast majority of false checksums.

The checksum time period will restrict the user to use of the paid time within that period.

The above verification system minimises the use of fake parking meters that could otherwise be used instead of the secure parking meter 102. It also stops people tampering with their secure parking meter 102 to make the display register remaining time, when they haven't input a code at all ! In this scenario,

the inspector could determine that they do not have a valid code, and issue a parking ticket.

This embodiment provides a convenient mechanism for obtaining parking permits without requiring complex parking meter machines or ticket vending machines with the incumbent problems of those existing machinery. Further, the system offers increased convenience for the user since the parking permit may be obtained ahead of time or from within the vehicle 104. Further, the user is not required to carry loose change in order to pay for the parking meter.

Further, the system allows areas to be designated for paid parking on a temporary basis without the need for the installation of meters, ticket vending machines or immediate cash collection.

Further, it will be appreciated that the electronic security apparatus of the invention does not require a communication link to a server, providing a more flexible solution than previously available.

The same principle for the secure parking meter could also be applied to other forms of secure meters for the supply of other commodities/services, such as secure meters for the supply of utility services such as gas or electricity, or for other services such as pay TV, Internet or the like. The user will purchase blocks of the appropriate commodity-for example time, or kilowatt-hours-which will be embedded in the access code. The user inputs the access code into the meter, which will then display the amount of the purchased commodity available-in the same way as described with reference to the secure parking meter 102. The operation of the meter could be interrupted in the same way. Payment for the cost of the commodity is then made by the server 100 to the owner of that commodity or service.

The secure meter could be attached to a conventional meter i. e. retrofitted, to act as a switch to the conventional meter-that is, switching the conventional meter on when the secure meter is switched on, and switching the conventional meter

off when the secure meter is switched off. Alternatively, the meter can be used as a stand-alone unit.

Other alternatives to the embodiments described herein, can also be provided.

For example, payment could be made to the owner of the computer server for each code issued.

Throughout the specification, unless the context requires otherwise, the word "comprise"or variations such as"comprises"or"comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.