G07C2209/08

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Lotte lockbox and parcel management system
11699314 · 2023-07-11 · ·

A lockbox and parcel management system is implemented in which a lockbox having multiple compartments is controllable via an access device that locks and unlocks respective compartments upon receiving a proper access code input. A user may place an order with an e-commerce service using an e-commerce application or website. The e-commerce service, upon receiving the order, may transmit order information to a lockbox remote service which can communicate with a user device associated with the user who placed the order, the access device for the lockbox, and a deliverer's device from the delivery company. The lockbox remote service or authorized user/owner may set access codes for the deliverer to open and place a parcel in a lockbox's compartment for safe and secure storage until the user arrives home.

Method for opening a vehicle

A plurality of keys are registered to the vehicle for opening the vehicle. A respective key must answer within a predetermined timeslot after a first request transmitted by the vehicle, in order to open the vehicle. Several such successive timeslots are provided and several keys are allocated to at least one of these timeslots.

LOCKING SYSTEM FOR EXCHANGE OF ITEMS, SERVICES, AND/OR FACILITIES
20230005313 · 2023-01-05 ·

One or more techniques and/or systems are provided for generating locking codes. For example, a remote interface (e.g., hosted by a kiosk or a cloud service provider) may receive a request from a requestor for an unlocking code. The unlocking code may be used to unlock a lock, such as a lock integrated into or attached by a secondary means of attached to a containment component. The remote interface generates the unlocking code valid for a timespan. The unlocking code may be generated based upon a unique identifier of the containment component. The remote interface transmits the unlocking code to the requestor for unlocking the lock. In an example, the unlocking code is transmitting after a delay.

Self-service modular drop safes with messenger access capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

System and method to authorize the use of a BEV charging apparatus by a short-term renter

The disclosure generally pertains to systems and methods for authorizing the use of a battery electric vehicle (BEV) charging apparatus by a short-term renter. In an example method, a processor provides an authorization for use of a BEV charging apparatus by a first individual. The BEV charging apparatus is located on the premises of a building. The processor further enables access to the BEV charging apparatus over a designated period of time for use by the first individual and configures a first lock to prevent unauthorized entry by the first individual into a first portion of the building. In one scenario, the first individual is a short-term renter, the BEV charging apparatus is located in a garage of the building, the first portion of the building is a first room of the building, and the first lock is installed in a door leading into the first room of the building.

Handle Arrangement with User Authentication
20220406112 · 2022-12-22 ·

The present invention relates to a handle arrangement (1) comprising a locking mechanism (10), a blocking mechanism (20), a handle (30), a display unit (50), and a control unit (40) communicatively connected to a remote server (80) and configured to display a QR code on the display unit for a user to read, wherein the QR code is unique for the handle arrangement and the time period during which the QR code is displayed, receive, from a remote server, information that the user has communicated, to the remote server, a reading of the displayed QR code together with an identification of the user, and that the identified user is authorized to open the door, and either operate the blocking mechanism enabling opening of the door by means of the handle, or enabling a second level authorization function for the user to verify its authorization, and if access is granted, operating the blocking mechanism enabling opening of the door by means of the handle.

VEHICLE SAFETY SYSTEM, DISTANCE DETERMINATION METHOD, AND VEHICLE
20220406109 · 2022-12-22 ·

A distance determination method has: detecting a first received signal strength indicator (RSSI) of a first electronic device by a second electronic device; detecting a second RSSI of the second electronic device by the first electronic device; obtaining the first RSSI from the second electronic device by the first electronic device; and calculating a motion direction and a distance of the second electronic device relative to the first electronic device according to the first RSSI and the second RSSI by the first electronic device.

SYSTEMS AND METHODS FOR CONTROL OF A LOCKING SYSTEM
20220403677 · 2022-12-22 ·

Systems and methods for control of a locking system are disclosed. In some embodiments, a system comprises one or more sensors configured to generate output signals indicating one or more movement information of a subject. The system comprises at least one processor operatively connected with the one or more sensors, and memory storing instructions executable by the at least one processor, the instructions when executed cause the system to determine, using the output signals from the one or more sensors, one or more movement parameters of the subject; and send, based on the determined movement parameters of the subject, an instruction to the locking system to adjust an open delay time for the locking system, the open delay time being time the locking system remains open.

Methods and systems for offline verification code generation based on smart door lock system

A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.