Patent classifications
G07C2209/02
Mobile key enrollment and use
A computer system performs techniques related to enrolling and using a secure credential. In some embodiments, a computer system provides user interfaces for enrolling a secure credential on the computer system. In some embodiments, a computer system provides user interfaces for inviting a user account to use a secure credential.
Biometric ticketing
In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric. Ticketing information may be ascertained based on the identification. The ticketing information may be provided, actions may be performed using the ticketing information, and so on. In some implementations, a checkpoint device receives biometric data from a person. A digital representation of the biometric data is used to obtain an identifier from an identification system. The digital representation of the biometric data may not be included in the identifier. The identifier is used by to obtain ticketing information from a ticketing system. The person may be allowed or denied entry into a ticketed area based on the ticketing information.
BIOMETRIC IDENTIFICATION DEVICE AND METHODS OF USE
A removable card-enabled BPID Security Device integrates a removable card reader with a biometric authentication component to provide secured access to electronic systems. The device allows for an individual to insert a removable card into an aperture in the physical enclosure of the BPID Security Device, allowing the removable card and the BPID Security Device to electronically communicate with each other. The BPID Security Device is based on a custom application specific integrated circuit that incorporates removable card terminals, such that the BPID Security Device can communicate directly with an inserted removable card. In an alternative embodiment of the invention, the BPID Security Device is based on a commercial off-the-shelf microprocessor, and may communicate with a commercial off-the-shelf microprocessor removable card receiver using a serial, USB, or other type of communication protocol. The device allows for enrolling a user's credentials onto the BPID Security Device and for authenticating an individual using the BPID Security Device.
METHOD FOR OPERATING A LOCK DEVICE
A method for operating a lock device includes installing a lock device application (lock APP) into a mobile device. A first identification information and a second identification information are inputted into the mobile device under guidance of the lock APP The lock APP can be connected with a lock device within a communication range of the mobile device. Then, a hardware serial number of the lock device is inputted into the mobile device to obtain the management authority of the lock device. A manager electronic key formed by the mobile device with the management authority of at least one lock device can grant the unlocking authority of a selected lock device to another user whose account name is provided to the manager electronic key. The unlocking procedure can be carried out based on one of a quick pass pattern, a single identification pattern, and a double identification pattern.
Systems and methods for lock access management using wireless signals
A system for access management is disclosed. 100 A server (100) can receive a request for access to a locking device (140) from a mobile device (110). The server (100) can transmit access credentials to the mobile device (110). The mobile device (110) can transmit, via wireless signal, the access credentials and a lock command for the locking device (140) to a wireless access point (130) capable of communicating with the locking device (140). The wireless access point (130) can transmit the lock command to the locking device (140).
Systems and methods for managing a floating population
Systems and methods for managing a floating population can be used to obtain a register of a user from a user terminal via at least one terminal interface; receive a fingerprint input instruction from an administrator terminal via the at least one terminal interface; send the fingerprint input instruction to a fingerprint lock via the at least one network interface; obtain at least one fingerprint of the user from the fingerprint lock via the at least one network interface; send a notification to the administrator terminal via the at least one terminal interface after obtaining the at least one fingerprint of the user; and obtain a permission from the administrator terminal via the at least one terminal interface to permit the user associated with the user terminal to open the fingerprint lock using one of the at least one fingerprint.
Automatic transitions in automation settings
Various aspects and embodiments of automation in tenancy transitions are described. Among other aspects or features of the embodiments, a computing device in an automation or gateway hub receives and stores automation settings from an automation management service environment over time. The automation settings can include different settings for various states of occupancy of a rental unit or dwelling. For example, the automation settings can include a first set of automation settings, which can be used while the dwelling is occupied, and a second set automation settings for use after the dwelling is no longer occupied. The automation or gateway hub can determine whether a transition has occurred for the dwelling and, in response to the transition, load the different automation settings into one or more home automation devices of the dwelling.
ENHANCED BIOMETRIC AUTHORIZATION
Upon obtaining biometric data for a user of a structure while the user is outside the structure, user data for the user is updated based on a confidence score for the biometric data exceeding a first confidence threshold. Based on the confidence score for the biometric data not exceeding the first confidence threshold, instructions are provided to the user to provide updated biometric data. Then the user data is updated based on a confidence score for the updated biometric data exceeding a second confidence threshold. The second confidence threshold is greater than the first confidence threshold. Structure components are controlled based on the updated user data.
TOUCHLESS VISITOR MANAGEMENT
Disclosed are various approaches for providing touchless visitor management. A visitor can complete a visitor registration process using a client device of the visitor and obtain a virtual badge credential to a visitor's device. A physical access control system credential as well as a visitor badge can also be obtained to the visitor's device.
Wireless device and methods for making and using the same
A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility. Services can thereby be seamlessly provided to the guests throughout the facility. The services include contact tracing, automatic unlocking of doors, including hotel or state room doors, based on the guests' immediate proximity to their assigned room's door. The services also include automated payment services provided at checkout or vending terminals, and automated log-on to interactive displays and portals, among others, based on secure wireless authentication of the guest devices. The guest devices can each include a device health sensor configured for measuring at least one health function of a user wearing the guest device.