G07C2209/04

System and method for controlling access to vehicle
09767629 · 2017-09-19 · ·

A system for controlling access to a vehicle includes a first portable device and an access controller. The access controller stores an unshared password and an access control parameter (ACP). The first portable device stores the unshared password and generates an access mode signal and a shared password. In a first access mode, the access controller provides full access to the vehicle based on a first lock signal and the unshared password. In a second access mode, the access controller provides limited access to the vehicle based on a second lock signal and the shared password. In a third access mode, the access controller provides limited access to the vehicle for a predetermined time based on a third lock signal. The access controller generates a control output signal and an ignition control signal based on the ACP and the shared password to allow only limited access to the vehicle.

ARRANGEMENT FOR MONITORING FUNCTIONS OF A WORK MACHINE
20170261978 · 2017-09-14 ·

An arrangement for monitoring functions of a work machine comprises an electronically readable identification means that is assigned to identifier associated with an operator of the work machine; a user interface; a processor; and at least one control device, wherein the at least one control device is configured to control operations of the work machine or an implement coupled to the work machine in response to receipt of an output signal generated by the processor. The processor is configured to execute a set of instructions stored on a memory such that when executed the processor is programmed to: read out the electronically readable identifier and obtain, via the user interface, an input selection of a desired device function assigned in an authorization database to the electronically readable identifier and to activate a desired function for a limited time.

METHOD FOR OPERATING A FIELD DEVICE

A method for operating a field device is disclosed, the field device having settings and/or functions classified into different security levels, where one of the settings and/or functions of the field device is selected by a user, at least one security measure is implemented depending upon the security level with which the selected setting and/or function is associated, and the security measure determines whether the selected setting and/or function of the field device is released for the user.

SYSTEMS AND METHODS FOR AUTHORIZING TRANSMISSION OF COMMANDS AND SIGNALS TO AN ACCESS CONTROL DEVICE OR A CONTROL PANEL DEVICE
20220237977 · 2022-07-28 ·

Systems and methods are provided that can include a doorbell device receiving a request signal to enter a region associated with the doorbell device from a remote control device and, responsive thereto, accessing a list identifying which of a plurality of authorized users are located within the region, identifying one of the plurality of authorized users associated with the remote control device, determining whether the list indicates that the one of the plurality of authorized users is located within the region, and determining whether to transmit a disarm command signal to a control panel device or an activation signal to an access control device based on whether the list indicates that the one of the plurality of authorized users is located within the region, wherein entries on the list can correspond to historical use of the doorbell device or the control panel device to enter and exit the region.

KEY INFORMATION SHARING SYSTEM, DELIVERY DEVICE AND USER TERMINAL

A key information sharing system includes a delivery device that delivers key information as first information for a control device equipped in an object and a user terminal that receives the first information delivered from the delivery device. The delivery device adds second information that allows the first information to be transferred between the user terminal and a third-party terminal without the delivery device, to the first information to be delivered to the user terminal. The user terminal transmits the first information to the third-party terminal in response to an input operation by a user, when the user terminal receives the first information to which the second information has been added.

Authorization to unlock a space

An information processing system includes a receiving unit that receives request to reserve a lockable place for a time window from a first person; and an authority giving unit that gives one or more second persons an unlocking authority to unlock the place within the time window.

Method and device for sharing functions of smart key

A device for providing information about a smart key for use in vehicles includes a communicator which receives information about at least one function, performed by the smart key, of controlling a vehicle; and a controller which sets a usage restriction for the at least one function. The communicator may provide information about the at least one function including the usage restriction to an external device.

ACCESS CONTROL SYSTEM
20220180686 · 2022-06-09 ·

An access control system is provided for controlling access to at least one secure area. The access control system includes credentials associated with a user and being for identifying the user to the access control system; administrator level permissions that have been set by an administrator and being for determining if the user is an authorised person in order to control access to the at least one secure area; and user level permissions that have been set by the user and being for determining if accessing the at least one secure area is in accordance with user preferences. The access control system is arranged to permit access to the at least one secure area when presented with credentials that both identify the user as being an authorised person for that secure area and also confirm that access by the user is in line with the user preferences.

A COMPUTER IMPLEMENTED METHOD FOR ALLOWING THIRD-PARTY ACCESS TO A PREMISE

The present disclosure relates to a computer implemented method of entry handling, specifically adapted for allowing third-party access to a premise. According to this method an intermediate server is provided for coordinating how an electronic entry arrangement associated with a first user may be allowed to be controlled by a third-party, such as for example a contractor requiring access to the first user's premise using the electronic entry arrangement. Accordingly, the first user does not need to share his own electronic key, since the server function as an intermediate handler of access rights.

METHOD AND SYSTEMS FOR EVENT ENTRY WITH FACIAL RECOGNITION

A system is provided that includes an event site device having a display and an imaging device. The event site device is configured to capture an image of a user's face for identification. The system further includes a server configured to associate ticketing information with an identity of the user, receive the image of the user's face from the event site device, determine the identity of the user based on facial feature information stored for the user, retrieve the ticketing information associated with the user, and transmit the ticketing information to the event site device for presentation on the display.