G07C9/20

HOLOGRAPHIC BARCODE TARGET GENERATOR
20220413435 · 2022-12-29 ·

Authentication systems, devices, and methods are provided, which may use a scanner configured to capture an image of an authentication pattern in a predetermined target area; and a hologram generator configured to project a holographic target onto free space in the target area. Moreover, there may be provided a controller configured to process the image and output a determination of whether the authentication pattern meets a predetermined criterion.

AUTOMATED RECREATIONAL VEHICLE PARK
20220414800 · 2022-12-29 · ·

An automated vehicle park includes a site, a utility supply at the site, and an automated access control system to control access to the site by a guest. The automated access control system is configured to receive an access request associated with the site, determine if the access request is valid, and if the access request is valid, provide access to the utility supply at the site.

AUTOMATED RECREATIONAL VEHICLE PARK
20220414800 · 2022-12-29 · ·

An automated vehicle park includes a site, a utility supply at the site, and an automated access control system to control access to the site by a guest. The automated access control system is configured to receive an access request associated with the site, determine if the access request is valid, and if the access request is valid, provide access to the utility supply at the site.

METHODS AND SYSTEMS FOR ACCESS CONTROL
20220406111 · 2022-12-22 ·

A method of requesting access through a door may involve: causing a mobile computing device to receive an identifier of the door; and causing the mobile computing device to transmit an access request to an access-control system, the access request comprising data representing at least the identifier of the door and an access code. A method of controlling access through a door may involve: receiving an access request from a mobile computing device, the access request comprising data representing at least an identifier of the door and an access code; and in response to the request, allowing access through the door. Systems are also disclosed.

Method for Unlocking a Lock Using Real-Time Wireless Power Supply
20220398882 · 2022-12-15 ·

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

Aggregator of identification devices
11526593 · 2022-12-13 · ·

A personal identification device for physical access control systems, including: at least one reader capable of reading data from an identification badge, the data including at least identification data; a processing unit; a data storage member; at least one wireless communication module; and an internal battery arranged to supply power to the components of the device. The processing unit is arranged for: acquiring data from at least one identification badge by way of the reader; storing the acquired data in the data storage member; if the acquired data are encrypted, decrypting the data; and transmitting at least a portion of the acquired data, via the wireless communication module and on request from a reader external to the device.

Automatic physical access

Physical access to secure areas is automatically performed based on presence or detection of a wireless device. A unique identifier of a wireless cellular device, for example, may be pre-authorized for occupants, employees, and tenants of a building. Contractors and vendors may also have their wireless cellular devices pre-approved for access. When the wireless cellular device is detected by a network serving the secure area, its unique identifier may be compared to databases or lists of approved cellular devices. Physical access may thus be automatically granted, based on possession of a recognized cellular device.

Automatic physical access

Physical access to secure areas is automatically performed based on presence or detection of a wireless device. A unique identifier of a wireless cellular device, for example, may be pre-authorized for occupants, employees, and tenants of a building. Contractors and vendors may also have their wireless cellular devices pre-approved for access. When the wireless cellular device is detected by a network serving the secure area, its unique identifier may be compared to databases or lists of approved cellular devices. Physical access may thus be automatically granted, based on possession of a recognized cellular device.

Physical access control system and method
11521450 · 2022-12-06 · ·

An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.

Anti-shoplifting system
11521447 · 2022-12-06 ·

The invention utilizes an existing cash register that, in processing the purchases, establishes an identifier (i.e. date stamp, barcode, QR code) on the receipt. This code is then used at an exit portal to trigger the opening of a barrier allowing the purchaser to leave the building. In the preferred embodiment, an image of the customer is taken on entering and leaving the building and facial recognition is made for the purpose of later apprehension or for future denial of entry into the store.