Patent classifications
G06K7/08
Wireless reader device with wiegand interface and methods
A control system includes a reader device including a transceiver for scanning scan for ephemeral ID signals, for detecting an ephemeral ID signal from a smart-device of a user not permanently associated with the user, for outputting to the smart device, reader data, in response to the ephemeral ID signal, and for receiving from the smart-device a first authorization server token, a processor coupled to the transceiver for determining whether the first token is valid, and for determining user data in a payload portion of the first token, a transmitter for transmitting the user data to a peripheral control unit, wherein a data protocol is selected from a group consisting of: Wiegand and OSDP, and the peripheral control unit for directing a peripheral device to perform a user-perceptible action in response to the user data.
Barcode-reading system
This patent specification describes a barcode-reading enhancement accessory for a mobile device having a barcode-reading capability. The accessory may include an outer case and an inner carriage. A mobile device is encased in the inner carriage, and the combination of the inner carriage and the mobile device is accommodated in the outer case. The inner carriage is configured to accommodate a mobile device of a particular size such that a mobile device of a different size may be accommodated in the outer case using a different inner carriage. The accessory may also include an optic system to fold an optical path of a field of illumination of a light source of the mobile device and/or a field of view of a camera of the mobile device.
Item tracking system
A computer-implemented method includes determining that a group of items left a space together based on RFID exit times and determining that at least one item of the group of items left the space without authorization by evaluating transactions that took place within a first time period before the at least one item left the space. A single investigation file is automatically created that includes the group of items that left the space together.
FRAUD DETECTION SYSTEM AND METHOD
A system and method is described for detecting a foreign object such as a skimmer placed adjacent to a bezel for a magnetic card reader device, as used in automatic teller machines and gas pumps. At least two sensors are mounted adjacent to the bezel. Each sensor provides a signal that varies when a skimmer is mounted adjacent to the bezel. A controller receive measurement signals from the sensors, and generates an alarm signal when the measurement signals differ from associated predetermined baseline signals by at least associated predetermined thresholds. The alarm signal indicates that a foreign object has been detected adjacent the bezel. The sensors may be capacitive, time of flight, spectral, radar, and/or inductive. The capacitive sensors may include three or more plates, forming multiple capacitive pairs, each capacitive pair effectively forming a separate sensor.
CARD READER AND TRANSACTION APPARATUS
A card reader includes a front wall where a card insertion slot opens, a conveyance path extending from the insertion slot toward a back side, a conveyance mechanism configured to convey a card inserted into the insertion slot along the conveyance path, a magnetic head configured to read information from the card conveyed by the conveyance mechanism, and a recess recessed from the front wall toward the back side and configured to expose inside both sides of a rear end of the card conveyed to the back side along the conveyance path.
CARD READER AND TRANSACTION APPARATUS
A card reader includes a front wall where an insertion slot opens, a conveyance path extending from the insertion slot toward a back side, a magnetic head configured to read information from a card conveyed along the conveyance path, a conveyance mechanism configured to convey the card inserted into the insertion slot along the conveyance path, an entry sensor configured to detect that the card has been inserted into the insertion slot, and a controller. The controller performs an insertion monitoring start instruction step to start monitoring insertion of the card by the entry sensor upon receipt of an initialization command transmitted from a higher-level device and a carry-in start instruction step to start carry-in of the card by the conveyance mechanism when the entry sensor detects the insertion of the card.
Configuration of a transaction in a contactless electronic device
A method of configuring a contactless communication device is provided. The contactless communication device includes integrated circuits hosting at least two applications compatible with different communication protocols or the same communication protocol and using different communication parameters and a contactless communication circuit. The method includes stopping, by the contactless communication circuit, the transmission of answers of the contactless communication device to requests transmitted by a proximity coupling reader during a transaction initiated by the reader to cause the initiation by the reader of a new transaction.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO PHYSICAL SPACE
Disclosed systems and methods relate to a smart access control reader for an access control system. According to embodiments, a method can include installing the smart access control reader to the access control system by connecting the smart access control reader to the access control system via wiring of the access control system. The method can also include receiving, by the smart access control reader, one or more first credentials for authenticating one or more users by the access control system. The method can further include determining, by the smart access control reader, that the one or more first credentials are authorized. Moreover, the method can include transmitting, by the smart access control reader, a second credential to an access control panel of the access control system, in response to a request by a first user to access an area monitored by the access control system.
Communication system using a random code as an encryption code
A communication system using a random code as an encryption code is disclosed. A first terminal transfers a request to the second terminal for providing a random code (rKey). The random code is used to encrypt commands in the proceeding communication process instead of using a master key (mKey) so as to avoid that the master key (mKey) is captured. The safety in data transmission is promoted greatly. In practical use, the encryption way can be used to a door access system which includes a mobile phone, a card reader, a door access controller, and a server program (such as ACX server program). The communication system using a random code as an encryption code assures that the communications between these devices are highly safe.
Barcode reading system having a legacy mobile client function, a non-legacy mobile client function, and a relay function
A barcode reading application includes an image capture function for controlling a white light source and a camera of a mobile device to capture an image of a barcode in a target area. The barcode reading application also includes a decoder function for receiving the image of the barcode and generating decoded data representing data encoded in the barcode. The barcode reading application also includes a non-legacy mobile client function for transmitting the decoded data to a non-legacy system. The barcode reading application also includes a legacy mobile client function for transmitting the decoded data to an intermediate server, which then provides the decoded data received from the legacy mobile client function to a legacy system. The barcode reading application also includes a relay function for determining whether the decoded data is intended for the legacy system or the non-legacy system.