. "In summary, during these operations, the controller 256 determines whether the user has an authorized key and whether any alarm or other conditions are present." . . .