Patent classifications
G07C9/00174
ELECTRONIC LOCK CONFIGURED TO RECEIVE WIRELESS POWER TRANSMISSIONS
An electronic lock is configured to receive a wireless power transmission from a portable electronic device such as a tablet or smartphone. The electronic lock can also be configured to simultaneously receive a data transmission from the smartphone requesting operation of a lock actuator of the electronic lock. Power from the wireless power transmission can be used to electrically power the microprocessor and the lock actuator.
Configurable remote control system and method for a marine vessel
A remote control system for a marine vessel includes at least one fob and a configuration control system configured to detect available devices on the marine vessel to be controlled remotely for the marine vessel, generate a list of available functions for at least one user-selectable fob command based on the detected available devices, present the list of available functions to the user via a fob configuration user interface such that the user can select one or more functions in the list of available functions, identify a system command associated with each selected function so as to configure a set of system commands based on the user-selected functions, and store the user-configured set of system commands in association with the fob identification and the selected fob command. The system further includes a helm transceiver module to effectuate activation/deactivation of the available devices based on the user-configured set of system commands.
METHOD AND VEHICLE DOOR LOCK SYSTEM FOR MANAGING ACCESS TO THE VEHICLE
A vehicle door lock system includes: a door lock; a vehicle event sensor; and a processing circuitry, the processing circuitry is configured to cause the vehicle door lock system to generate first triggering event data, indicative of a first triggering event detected by the vehicle event sensor, caused by a movement of an object onto, or in the vicinity of, the vehicle, at a first time, obtain, from a portable electronic device, second triggering event data, indicative of a second triggering event caused by a movement of the portable electronic device, at a second time, determine if the first triggering event and the second triggering event both occurs within a predetermined time period by comparing the first triggering event data and the second triggering event data.
Proximity Detection System for Request Processing
A request is processed by a control device based on a detected proximity of a client device to the control device. The control device, which is intermediate to the client device and a beacon device, runs application software that receives the request generated using a client application running at the client device. The beacon device, upon receipt of an indication that the control device received the request, transmits a signal to detect a proximity of the client device to the control device. The application software receives data indicative of a response to the signal from the beacon device. The application software allows the request upon a determination that the data reflects the response is received. Alternatively, the application software allows the request upon a determination that the data indicates that the proximity of the client device to the control device satisfies a threshold.
REMOTE CAMERA-ASSISTED ROBOT GUIDANCE
Methods, systems, and apparatus for remote camera-assisted robot guidance are disclosed. A method includes obtaining images of objects approaching a door of a property; identifying candidate paths to the door based on the images of the objects approaching the door of the property; determining movement capabilities of the objects; storing the candidate paths to the door labeled by the movement capabilities of the objects that took the paths; determining capability information for a robot at the property that indicates movement capabilities of the robot; selecting, from the candidate paths, a path for the robot to take to the door based on the movement capabilities of the robot and the labels of the candidate paths; and providing guidance information to the robot that guides the robot to the door along the selected path.
SYSTEM AND METHOD UTILIZING MULTIPLE VIRTUAL PRESENCE DEVICES
A virtual presence system and method integrates multiple virtual presence technologies, including the ability to enable a user to experience a remote location through a plurality of different types of virtual presence devices. The different types of virtual presence devices might include virtual presence robots, as well drones, land vehicles, devices arranged to be worn by a human, and other virtual presence devices, all of which are accessible through a single website hosted on a server that provides links to the different types of virtual presence devices at selectable locations through a hierarchical query database that stores geographic coordinates, types, and features of the virtual presence devices, GIS to analyze and display geographic information, and communication methods, together with IP addresses and/or aliases that enable the devices to be accessed and controlled. The virtual presence system and method may optionally also utilize virtual reality headsets and haptic feedback devices designed to worn by users for a more immersive experience.
ELECTRONIC LOCK WITH FACIAL AUTHENTICATION FEATURES
An electronic lock includes an interior subassembly including a manual turnpiece, a control circuit, and a motor actuatable by the control circuit, and an exterior subassembly including a facial authentication circuit operatively connected to the control circuit. The electronic lock includes a latch operatively connected to the interior subassembly, the latch being engageable by the manual turnpiece or the motor to move the electronic lock between a locked state and an unlocked state. The facial authentication circuit includes at least one camera and is configured to generate an authentication signal to the control circuit, and wherein, at least in part in response to the authentication signal, the control circuit is configured to actuate the motor to move the electronic lock between the locked state and the unlocked state.
Impeding unauthorized network infiltration at remote critical infrastructure facilities
A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.
Automatic emergency door unlock system
In some implementations, systems and techniques are described to automatically unlock a front door of a property in response to detecting an alarm signal indicating an emergency at or near a property. Data indicating occurrence of an emergency condition at a property is initially obtained. A lock configuration for an electronic lock of the property is determined. An unlock instruction is generated for the electronic lock based on the determined lock configuration for the electronic lock. The unlock instruction is transmitted to the electronic lock such that, when the unlock instruction is received by the electronic lock, the electronic lock is unlocked according to the unlock instruction.
Systems and methods for location identification and tracking using a camera
Systems and methods for location identification and tracking of a person, object and/or vehicle. The methods involve: obtaining, by a computing system, a video of a surrounding environment which was captured by a portable camera coupled to the person, object or vehicle; comparing, by the computing system, first images of the video to pre-stored second images to identify geographic locations where the first images were captured by the portable camera; analyzing, by the computing system, the identified geographic locations to verify that the person, object or vehicle is (1) traveling along a correct path, (2) traveling towards a facility for which the person, object or vehicle has authorization to enter, or (3) traveling towards a zone or secured area internal or external to the facility for which the person, object or vehicle has authorization to enter; and transmitting a notification from the computing system indicating the results of the analyzing.