Patent classifications
G07C2209/08
Smart storage system
Embodiments relate to a system comprising a drug storage comprising a container to hold a drug; a communication module; and a cyber security module. The system is operable to log record of an access of the drug and maintain a ledger of the record of the access of the drug using a blockchain technology. The access of the drug is secured by the cyber security module.
Authentication information control system, authentication information control method, and non-transitory computer-readable recording medium
A control unit issues temporary authentication information for disabling a locking/unlocking process to a user terminal satisfying a first condition. The control unit determines whether first authentication information has been issued to another user terminal, issues second authentication information to the user terminal to which the temporary authentication information has been issued when the first authentication information has not been issued to another user terminal, and issues the second authentication information to the user terminal to which the temporary authentication information has been issued with detection of ending of use of the first authentication information in another user terminal as a trigger when the first authentication information has been issued to the other user terminal.
ENABLING REMOTE UNLOCK OF A LOCK
It is provided a method for enabling remote unlock of a lock securing access to a physical space. The method is performed in a server and comprises the steps of: receiving, from a first mobile device, an access request to unlock a lock, wherein the request comprises an identifier of the lock and a user identifier associated with an access requester, being a user of the first mobile device; finding a remote credential device being associated with the lock; and transmitting an access request to the remote credential device, the access request comprising an identifier based on the user identifier.
ELECTRONIC LOCK AND METHOD OF OPERATION
Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.
Electronic identification, location tracking, communication and notification system with beacon clustering
A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allows for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking. Also provided is a system and method for identifying a customer's location at a business and provide notification to a company representative upon arrival of the customer at the business location. Real-time location determinations for the customer and customer location tracking can be provided. One or more wireless beacons communicate with the customer's electronic device. The beacons provide the system with real-time data about the customer's whereabouts, allowing for the confirmation and tracking of the customer at the location. A first non-limiting example of use, include a company that provides food and beverage allowing the customer to place an order for food and beverages on their electronic device and having the order delivered to the person at their current location as determined by the system. Another non-limiting example includes a company using the notification system to have assigned staff members notified of the customer's arrival.
Touchless motion sensor systems for performing directional detection and for providing access control
A touchless motion sensor system for performing directional motion detection includes first and second touchless motion sensors. First and second sensing units are coupled to the first and second touchless motion sensors each having a sensing unit disable input, a sensing unit disable output, a sensing unit to sensing unit motion detected output, and motion logic. The first sensing unit disable output is coupled to the second sensing unit disable input, and the second sensing unit disable output is coupled to the first sensing unit disable input.
UWB ON/OFF OPERATION METHOD TO MINIMIZE POWER CONSUMPTION AND UWB ANCHOR USING THE SAME
An ultra-wideband (UWB) anchor using a UWB ON/OFF operation method to minimize power consumption. The UWB anchor includes a power supply to supply power to the UWB anchor, a transceiver to transmit/receive a UWB signal to and from a UWB tag for performing ranging, and to transmit a reception failure when failing to receive the UWB signal from the UWB tag, and a controller to receive the reception failure from the transceiver and to end a ranging session when a cumulative sum of ranging failures for each ranging block reaches a maximum number of failed ranging round attempts.
SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
Authorized smart access to a monitored property
A method includes, receiving a biometric identifier from a visitor to the property, determining an arrival time of the visitor based on receiving the biometric identifier, comparing the arrival time of the visitor to an expected arrival time of an expected visitor, based on comparing the arrival time of the visitor to an expected arrival time, transmitting the biometric identifier and data identifying the expected visitor, receiving, by the monitoring system and from the external server, (i) data indicating that the biometric identifier corresponds to the expected visitor and (ii) data indicating that an electronic device of the expected visitor is located at the property, and based on (i) the data indicating that the biometric identifier corresponds to the expected visitor and (ii) the data indicating that the electronic device of the expected visitor is located at the property, granting, by the monitoring system, the visitor access to the property.
Mobile check-in and user verification for access to secured areas such as lounges
A method of verifying that a user is authorized to access a secured area via an entry point includes receiving at a first computer and from a user device associated with the user, check-in request information that includes: a membership number associated with the user and a travel event; and a lounge location. The method also includes generating a time stamp for the receipt of the check-in request; verifying that the membership number is a valid membership number; and verifying that the time stamp is within a predetermined window of time. The method also includes sending, in response to the verification, instructions from the first computer to a second computer positioned near the entry point to display a window that includes user information associated with the user.