G07C9/20

System and method for facilitating access to a secured area

In one aspect, a portable electronic device is provided for accessing a secured area to deliver a package therein. The portable electronic device includes a sensor configured to detect an indicium of the package and communication circuitry configured to communicate a message to a server computer associated with the package upon the sensor detecting the indicium. The communication circuitry is further configured to receive delivery information from the server computer, the delivery information including at least a location of the secured area. The portable electronic device further includes a processor operatively coupled to the sensor and the communication circuitry. The processor is configured to cause, via the communication circuitry, the movable barrier operator to open a movable barrier associated with the secured area.

Radio frequency antenna and system for presence sensing and monitoring
11704955 · 2023-07-18 · ·

A wireless device system employs short-range wireless communication to require the proximity of a user device to a defined area prior to communicating a request or notification to the wireless user device. The system authenticates a request and the proximity of the user to or within the defined area prior to transmitting a command, request, or notification to the user or a third party. Additionally, the system uses an access node configured to shape the radiation pattern of short-range wireless communications to better determine the position of a user proximate in or around a defined area.

Radio frequency antenna and system for presence sensing and monitoring
11704955 · 2023-07-18 · ·

A wireless device system employs short-range wireless communication to require the proximity of a user device to a defined area prior to communicating a request or notification to the wireless user device. The system authenticates a request and the proximity of the user to or within the defined area prior to transmitting a command, request, or notification to the user or a third party. Additionally, the system uses an access node configured to shape the radiation pattern of short-range wireless communications to better determine the position of a user proximate in or around a defined area.

Secured, Sub-Rack Network Rack Building Block

A cargo rack is usable to store electronic devices, such as servers, while the electronic devices operate. The cargo rack has a telescoping enclosure with one or two doors for selectively closing either or both ends of the enclosure. The cargo rack also includes an onboard electronic system. The electronic system includes a programmable controller and an access control system for selectively locking or unlocking the door or doors of the enclosure. The access control system includes a security interface at which access credentials may be presented from outside the enclosure for recognition by electronics within the enclosure.

Secured, Sub-Rack Network Rack Building Block

A cargo rack is usable to store electronic devices, such as servers, while the electronic devices operate. The cargo rack has a telescoping enclosure with one or two doors for selectively closing either or both ends of the enclosure. The cargo rack also includes an onboard electronic system. The electronic system includes a programmable controller and an access control system for selectively locking or unlocking the door or doors of the enclosure. The access control system includes a security interface at which access credentials may be presented from outside the enclosure for recognition by electronics within the enclosure.

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

RULES ENGINE FOR COMMUNICATION ROUND TRIPS OPTIMIZATION OF KERNEL-IN-CLOUD PAYMENT TRANSACTION

A thin client may be utilized to facilitate data exchanges between two devices (e.g., a remote computer and a portable device). In some embodiments, the two devices may utilize differing communications protocols. The thin client may further be configured with a rules engine that determines one or more actions to be performed in response to one or more stimuli. The thin client may manage the processing flow between the two devices according to one or more predefined rules that are interpretable by the rules engine. The rules may be pushed to the thin client via any suitable device enabling the functionality of the thin client to be configured and/or modified without having to update the hardware and/or software of the thin client.

Secure container for package delivery

A method includes transmitting, by a handler device associated with a package handler, a message to an access control system requesting access to a secure container secured by an electronic lock mechanism; determining, by the access control system, whether the package handler is authorized to access the secure container based on the received message; transmitting, by the access control system, an unlock command to the secure container in response to a determination that the package handler is authorized to access the secure container; and unlocking the electronic lock mechanism of the secure container in response to successful authentication of the unlock command.

Impeding unauthorized network infiltration at remote critical infrastructure facilities

A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.

Proximity detection and authentication method and system

The method includes one or more turnstiles using a non-secure ranging process to detect a proximity of one or more mobile computing devices carried by respective users. The method also includes one of the turnstiles, on making a proximity determination in respect of a first of said mobile computing devices, commencing a secure authentication process to authenticate a user carrying the first mobile computing device. The method further includes, in response to a determination that the user carrying the first mobile computing device has been authenticated, allowing the user carrying the first mobile computing device to pass through the turnstile.