G07C1/32

DISARMING SURVEILLANCE SYSTEMS FOR AUTHORIZED PERSONS
20220028195 · 2022-01-27 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes authenticating a user as an authorized person with permission to enter a property and, in response to authenticating the user, causing a compartment of a lockbox to open. The method includes providing a notification to a surveillance system indicating the user has been authenticated and accessed the compartment of the lockbox.

DISARMING SURVEILLANCE SYSTEMS FOR AUTHORIZED PERSONS
20220028195 · 2022-01-27 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes authenticating a user as an authorized person with permission to enter a property and, in response to authenticating the user, causing a compartment of a lockbox to open. The method includes providing a notification to a surveillance system indicating the user has been authenticated and accessed the compartment of the lockbox.

Container, method, and system for enabling offline access control and for enabling offline sensor data transmission

In a method and system for opening a container having a lock device, a mobile terminal exchanges data with the lock device using near-field data transmission and exchanges data with a server using far-filed data transmission. The mobile terminal stores container reconfiguration data and container operating data, which include at least time data and access data. The server generates new container reconfiguration data in response to receiving the container operating data from the mobile terminal and transmits the new container reconfiguration data to the mobile terminal using the far-field data transmission. The new container reconfiguration data are then transmitted from the mobile terminal to the lock device using the near-filed transmission.

CONTAINER, METHOD, AND SYSTEM FOR ENABLING OFFLINE ACCESS CONTROL AND FOR ENABLING OFFLINE SENSOR DATA TRANSMISSION

In a method and system for opening a container having a lock device, a mobile terminal exchanges data with the lock device using near-field data transmission and exchanges data with a server using far-filed data transmission. The mobile terminal stores container reconfiguration data and container operating data, which include at least time data and access data. The server generates new container reconfiguration data in response to receiving the container operating data from the mobile terminal and transmits the new container reconfiguration data to the mobile terminal using the far-field data transmission. The new container reconfiguration data are then transmitted from the mobile terminal to the lock device using the near-filed transmission.

Disarming surveillance systems for authorized persons
11080956 · 2021-08-03 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes authenticating a user as an authorized person with permission to enter a property and, in response to authenticating the user, causing a compartment of a lockbox to open. The method includes providing a notification to a surveillance system indicating the user has been authenticated and accessed the compartment of the lockbox.

Disarming surveillance systems for authorized persons
11080956 · 2021-08-03 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes authenticating a user as an authorized person with permission to enter a property and, in response to authenticating the user, causing a compartment of a lockbox to open. The method includes providing a notification to a surveillance system indicating the user has been authenticated and accessed the compartment of the lockbox.

Team monitoring

A solution for providing premises monitoring whereby monitoring devices (cameras, e.g.) are connected to a network and, upon detecting motion within their field of view, send a notification to a smartphone app. The smartphone app provides indications of a location of a particular monitoring device triggering the event notification, a time/date of the event, and a type of event. A user of the smartphone app may receive a real-time video stream from the monitoring device, and may interact with a person who triggered the event using the smartphone's speaker and microphone in conjunction with a speaker and/or a microphone integrated with the monitoring device. A button of the smartphone app enables an event to be escalated to a monitoring center, and if an event is not reviewed by a user within a certain time threshold the event may be configured to be automatically escalated to the monitoring center.

DISARMING SURVEILLANCE SYSTEMS FOR AUTHORIZED PERSONS
20210287464 · 2021-09-16 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes receiving an indication that an authorized user has unlocked an onsite device associated with a property. The method includes, in response to receiving the indication, deactivating one or components of a surveillance system installed at the property and storing a log comprising an identity of the authorized user and a timestamp when the authorized user accessed the property.

DISARMING SURVEILLANCE SYSTEMS FOR AUTHORIZED PERSONS
20210287464 · 2021-09-16 ·

Deactivating one or more components of a surveillance system in response to authenticating an authorized person is disclosed and described. A method includes receiving an indication that an authorized user has unlocked an onsite device associated with a property. The method includes, in response to receiving the indication, deactivating one or components of a surveillance system installed at the property and storing a log comprising an identity of the authorized user and a timestamp when the authorized user accessed the property.

Employee mobile device storage apparatus and timekeeping system
11017357 · 2021-05-25 · ·

A mobile device storage and tracking system includes a mobile device storage unit having a housing and a plurality of storage spaces. Responsive to a user input that is indicative of a particular user, a control positions a respective storage space at a door, whereby the user can store a mobile device at that respective storage space. After the user stores the mobile device at that respective storage space, the door is closed. When that user again provides the user input, the control positions the respective storage space at the door and the user can access the mobile device at that respective storage space. The control monitors and records, for each particular user during a work shift, the amount of time that the particular user's mobile device is at the storage space and the amount of time that the particular user's mobile device has been removed from the storage space.