Patent classifications
G07C2209/04
SYSTEMS AND METHODS FOR PREMISES ACCESS CONTROL
Systems and methods for premises access control are disclosed. A first request for a first user to access a premises is received by a first server and via a WAN (wide area network). The first request is received from a second server and the first server determines authorization. A second request for a second user to access the premises is received by the first server and via a WLAN (wireless local area network) associated with the first server. The second request is received from a mobile device that is associated with the second user and connected to the WLAN and the second user is determined to be authorized. A third request for a third user to access the premises is received by the first server. The third request is received from a physical access system configured to limit physical access to the premises and the third user is determined to be authorized.
VEHICLE TRANSFER KEY MANAGEMENT SYSTEM
A transfer key system for a vehicle may include a key receptacle configured to detect the presence of a transfer key, and a controller configured to receive key status signals from the key receptacle, and activate the transfer key as an active transfer key in response to the status signal indicating a removal of the transfer key from the key receptacle and receiving an authentication signal from a user.
Monitoring Duration of Stay and Region of Stay
Embodiments of a method are disclosed. In the method, it is checked whether a person stayed in a building or part of the building for less or no longer than a predefined duration to perform an action and/or only stayed in a predefined region of a building or part of the building. The building is accessible via an entrance securable with respect to unauthorised entry. Also, embodiments of a method are disclosed in which it is checked whether a person stayed in the building for less or no longer than a predefined duration to perform an action. Embodiments of a method are also disclosed in which information to unlock or indicative of a successful unlocking of an entrance securable with respect to unauthorised entry is received, and one or a plurality of signals which allow a position in the building to be deduced are provided.
EMERGENCY DELEGATION
It is provided a method for controlling access to a physical space using an emergency delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations wherein when two delegations are chained together, the delegatee of one delegation is the delegator of the next delegation; determining that a delegation in the chain of delegations is an emergency delegation, the emergency delegation indicating that access should only be granted when an emergency situation occurs; determining when an emergency situation occurs; and granting access to the physical space when the chain of delegations starts in the lock device and ends in the electronic key; and when the emergency situation occurs.
METHOD AND APPARATUS FOR POLICY BASED ACCESS CONTROL
An authorization approach to physical access uses identity attributes, doors/readers attributes, time of the day, and policies to determine access rights to facilities and physical spaces in real-time, based on three criteria: who, when, and what. Embodiments address the constantly changing physical access needs of companies as those needs evolve.
Controlling access to an access object
It is presented a method for controlling access to an access object. The method is performed in an access control device and comprises the steps of: receiving a user input to reset the access control device; generating a new identifier for the access control device, and discarding any previously used identifier for the access control device; communicating with an electronic key to obtain an identity of the electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a receiver; and granting access to the access object only when the plurality of delegations comprise a sequence of delegations covering a delegation path from the access control device, identified using the new identifier, to the electronic key such that, in the sequence of delegations, the delegator of the first delegation is the access control device, and the receiver of the last delegation is the electronic key.
Using a private key of a cryptographic key pair accessible to a service provider device
It is provided a method for providing access to a physical space secured by a lock for provision of a service. The method comprises the steps of: receiving an approval signal from a service consumer device of the service consumer, the approval signal indicating that the service consumer allows a service provider agent of a service provider to open the lock; receiving, from the service provider device, a request to assign a service provider agent to open the lock; communicating with the service provider device to use a private key of a cryptographic key pair accessible to the service provider device, the private key being used to generate service agent access data that is specific for the service provider agent, to allow the service provider agent to open the lock; and transmitting the service agent access data to a service provider agent device associated with the service provider agent.
SYSTEMS AND METHODS FOR LOCATION INDENTIFICATION AND TRACKING USING A CAMERA
Systems and methods for location identification and tracking of a person, object and/or vehicle. The methods involve: obtaining, by a computing system, a video of a surrounding environment which was captured by a portable camera coupled to the person, object or vehicle; comparing, by the computing system, first images of the video to pre-stored second images to identify geographic locations where the first images were captured by the portable camera; analyzing, by the computing system, the identified geographic locations to verify that the person, object or vehicle is (1) traveling along a correct path, (2) traveling towards a facility for which the person, object or vehicle has authorization to enter, or (3) traveling towards a zone or secured area internal or external to the facility for which the person, object or vehicle has authorization to enter; and transmitting a notification from the computing system indicating the results of the analyzing.
SYSTEM AND METHOD FOR DIFFERENTIATED PRIVACY MANAGEMENT OF USER CONTENT
A method for applying electronic data sharing settings. The method includes determining a first image or a first plurality of images shared by a user to a first network-enabled application. A first plurality of image components are extracted from the first image or the first plurality of images, and access by the first network-enabled application to a second image or a second plurality of images stored on a computing device of the user is enabled based on the first plurality of image components extracted from the first image or the first plurality of images. A method for controlling internet browsing is further provided.
Key information sharing system, delivery device and user terminal
A server that shares key information to a portable terminal includes processing circuitry configured to deliver the key information to the portable terminal. The key information is associated with an object equipped with a control device, and the control device performs a predetermined control to the object when the control device receives the key information from an external terminal. The key information includes restriction information, where the restriction information sets a restriction content for the predetermined control.