G07C2209/08

METHOD FOR CONTROLLING DOOR LOCK OF HOME NETWORK SYSTEM
20170365119 · 2017-12-21 · ·

Provided is a method for controlling a door lock of a home network system, the method including: generating release information used for locking or unlocking the door lock in an external software module which communicates with a first smart terminal of a user according to a request from the first smart terminal, or in a software installed in the first smart terminal; transmitting the generated release information to the gateway and a second smart terminal of a temporary user; transmitting the received release information to a controller of the door lock; and locking/unlocking the door lock by determining whether release information input by the temporary user are identical to the release information transmitted from the gateway.

Wireless smart lock systems
11682250 · 2023-06-20 ·

Systems and methods for providing a wireless lock system include a locking device wherein the locking device comprises a retractable bolt and a wireless communication transceiver. The systems and methods can also include a bolt catch that is configured to couple with the retractable bolt, wherein, when coupled, the bolt and locking device are locked into a static position relative to the bolt catch. A keypad programmable with a plurality of combination buttons and a wireless communication transceiver can be configured to communicate with the bridge wirelessly. The bolt then protrudes from the locking device to couple with the bolt catch and decouples from the bolt catch and recedes into the locking device in response to one or more wireless signals received from a wireless device. A wireless communication bridge device may also be utilized to provide additional wireless communication links to further devices to expand user reach and interoperability.

ELECTRONIC LOCKBOX

An electronic lockbox uses a rotary actuator with multiple positions to achieve multiple locking states. Multiple positions of the actuator are detected, using optical sensors. The locking mechanism includes an outer sleeve and an inner cylindrical barrel that are coupled with torsion springs. The lockbox has a shackle and a key bin that are retained by the inner barrel when in the locked state, and the barrel can be rotated to either release the shackle or to release the key bin that typically holds a building's key.

Smart containers and systems and methods for shipping and tracking smart containers

Systems and methods for tracking a smart container are provided. The methods use sensors of the smart container to detect tampering with the smart container after the container leaves a sender and before the container arrives at a receiver. In particular, the sensors detect when the smart container has been opened by someone other than the receiver (i.e., tampered with) and write the detection of tampering (e.g., the sensor measurement) to a blockchain. Delivery agents use scanners to write their possession or agency over the smart container to the blockchain. Accordingly, the agency of the smart container can be determined if tampering occurs.

Time synchronization

A method having the steps of obtaining temporal information communicated to a first device; carrying out one or more of the following tests: a test to determine whether the first device is in a state following an initial operation, a battery replacement or other power outage, or a reset, a test to determine whether a deviation between temporal information of the clock and the communicated temporal information is less than or equal to a threshold which is specified, and a test to determine whether the communicated temporal information has the same date as the temporal information of the clock; and synchronizing the clock using the communicated temporal information if all of one or more defined conditions are satisfied, wherein one of the one or more conditions requires that at least one of the one or more tests carried out has a positive result.

PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.

Vehicular control device

A vehicular control device includes: a transmitter section that transmits a request signal to an electronic key according to an input operation; a receiver section that receives a response signal from the electronic key; a verification section that performs verification of the electronic key on the basis of the response signal; a determination section that determines that an abnormal state occurs, when the receiver section cannot receive the response signal until a first time or when the receiver section receives the response signal until the first time and the verification section fails in verification based on the response signal, after the transmitter section has transmitted the request signal; and a control section that prohibits, when the determination section determines that an abnormal state occurs, a vehicle operation until a second time passes after the determination, and allows the vehicle operation after the second time has passed.

VEHICLE CONTROL DEVICE, VEHICLE, VEHICLE CONTROL METHOD AND RECORDING MEDIUM ON WHICH A PROGRAM IS RECORDED
20230186699 · 2023-06-15 · ·

A vehicle control device includes: a receiving section receiving, from a user, setting processing for setting a time period in which control of a vehicle by using an information processing device is suppressed; a detecting section detecting a predetermined user operation for control of the vehicle; and a control permitting section that, in a case in which the predetermined user operation is detected in a time period that is different than the time period in which control of the vehicle is suppressed, permits control of the vehicle in accordance with the information processing device vibrating or moving, and, in a case in which the predetermined user operation is detected within the time period in which control of the vehicle is suppressed, does not permit control of the vehicle regardless of whether or not the information processing device is vibrating or moving.

Automatic transitions in automation settings

Various aspects and embodiments of automation in tenancy transitions are described. Among other aspects or features of the embodiments, a computing device in an automation or gateway hub receives and stores automation settings from an automation management service environment over time. The automation settings can include different settings for various states of occupancy of a rental unit or dwelling. For example, the automation settings can include a first set of automation settings, which can be used while the dwelling is occupied, and a second set automation settings for use after the dwelling is no longer occupied. The automation or gateway hub can determine whether a transition has occurred for the dwelling and, in response to the transition, load the different automation settings into one or more home automation devices of the dwelling.

METHOD AND APPARATUS FOR PROXYING ACCESS COMMANDS TO SMART OBJECT(S) IN RESPONSE TO AN EMERGENCY CONDITION
20170345238 · 2017-11-30 ·

A method, apparatus and computer program product are provided in order to assist with the provision of timely emergency services. In the context of a method, an indication of an emergency condition is received and, following receipt of the indication of the emergency condition, a request is then received for temporary access to and control of the one or more smart objects. Following receipt of the request for temporary access and in response to a determination that temporary access is authorized, the method includes proxying access commands to the one or more smart objects.