Patent classifications
G07C2209/14
Multi-factor authentication with geolocation and short-range communication
A method of multi-factor authentication is performed by an access control device. In response to detecting a beacon signal transmitted by a user equipment (UE) via a short-range radio access technology (RAT) the access control device sends a query to a location server for a current location of the UE. The access control device then determines whether the UE is within a threshold distance of the access control device and, if so, begins monitoring a signal strength of one or more beacon signals transmitted by the UE. If the signal strength of the one or more beacon signals exceeds a signal strength threshold, then the access control device may generate an access signal to indicate that a user associated with the UE is authorized to access a protected resource.
Information processing apparatus, information processing method, and storage medium
An information processing apparatus includes a memory for storing instructions and a processor to execute the instructions to read a first medium including a first biometrics information, read a code indicated in a second medium, and capture a second biometrics information on a user at a time when one of the first medium and the code is read.
MEDICATION COMPLIANCE METHODS, DEVICES, AND SYSTEMS
Cannabis, much like medications, requires secure containment. It is particularly important to prevent access to Cannabis to children, elderly, or others for whom the Cannabis is not prescribed, designated, or legally permitted. Provided herein are medication tracking and securement devices, systems, platforms, and methods configured to be used with or in place of commercial standard medicine bottles. The wireless tracking and communications elements of the present disclosure are configured to prevent medication theft, overdosing, medication loss, and prescription noncompliance.
Apparatus And Related Method For Isolation Locking Of An Asset
Apparatus and related methods for use in isolation locking of an asset are disclosed. In one aspect, an apparatus (205) is disclosed comprising a containment unit (210) configured for storing one or more articles (eg. isolation keys) therein, a communication module (220) configured capable of receiving a signal, and an identifier (222) registered to the apparatus and provided in a form acknowledgeable by a portable device. The apparatus (205) further comprises an operable device (230) associated with the containment unit (210) and configured operable to perform an action in (respect of the containment unit) in response to the signal received by the communication module (220).
REDUCING LATENCY IN A PASSIVE ENTRY SYSTEM OF A VEHICLE
Exemplary embodiments described in this disclosure are generally directed to systems and methods for reducing latency in a passive entry system of a vehicle. In an exemplary method, a computer detects a presence of a passive entry device inside a passive entry zone of the vehicle. The passive entry device may be a phone-as-a-key (PaaK) device or a key fob, and the passive entry zone is an area around the vehicle that is monitored by a wireless detection system of the vehicle. The computer authenticates the passive entry device, which can include determining an identity of an individual authorized to use the passive entry device. Upon successful authentication, the computer may unlock a door of the vehicle and provide a visual prompt to the individual to unlatch the unlocked door. The visual prompt can include an unlatch icon displayed upon a door access panel of the vehicle.
SYSTEMS AND METHODS FOR WIRELESS UNLOCKING A LOCK ASSOCIATED WITH AN ENCLOSED SPACE WITHIN A VEHICLE
Systems and methods for wireless unlocking of lock systems on enclosures within a vehicle are provided. A lock system may be unlocked via a digital key communicated to the lock system via any suitable communication protocol, for example, a short range communication protocol. The digital key can be embedded or otherwise stored and accessed in an application accessible via a user interface device.
SECURITY SYSTEM
A monitoring system includes a sensor to detect a behavioral pattern of a person entering the defined space, a storage to store a behavioral pattern and a personal characteristic of the person, a pattern comparison logic to compare the detected behavioral pattern with the behavioral pattern, and determine that access to the defined space is allowed if at least the detected behavioral pattern matches the behavioral pattern stored in the storage, or is not allowed if the detected behavioral pattern does not match the behavioral pattern. Logic is configured to generate a signal indicating that access to the space is allowed if the pattern comparison logic determined that access to the defined space is allowed, and generate a signal triggering an alarm if the pattern comparison logic determined that access to the defined space is not allowed.
A GESTURE ACCESS CONTROL SYSTEM INCLUDING A MOBILE DEVICE DISPOSED IN A CONTAINMENT CARRIED BY A USER
A gesture access system adapted to operate in conjunction with a containment carried by a user. The access system includes an access assembly, a mobile device, a storage medium, and a processor. The assembly is adapted to operate between an access and no-access states, and includes a controller, and a signal receiver. The device is disposed in the containment and includes an inertial measurement unit sensor system configured to measure a device motion of the device to conditionally detect an intentional body gesture of the user indicative of an intent to gain access. The intentional body gesture is contrary to routine containment motions caused by routine body motions of the user. The storage medium and the processor are configured to store and execute an application and preprogrammed motion scenario data to analyze the device motion and conditionally send a command signal to the assembly.
INFORMATION PROCESSING METHOD AND SYSTEM
The present disclosure provides methods and systems for information processing. The method may include obtaining object information of at least one object and user information of at least one authorized user; establishing a corresponding relationship between the object information of the at least one object and the user information of the at least one authorized user; determining, based to the corresponding relationship, a first object corresponding to user information of a first authorized user among the at least one authorized user; and sending the user information of the first authorized user to the first object, enabling the first object to verify information of an operator of the first object based on the user information of the first authorized user and processing an operation request of the operator based on a verification result.
EASY UNLOCKING METHOD WITH SAFETY
An unlocking method includes using an electronic key to execute a lock control app. An account number and a password are set and stored under guidance of the lock control app. A predetermined biological feature is inputted after login of the lock control app and is used to create an authenticated biological feature. The electronic key is used to match with a lock under guidance of the lock control app which is executed as a background program after matching is successful. An unlocking information is outputted to the lock when the authenticated biological feature matches with a biological feature inputted while the electronic key is connected to the lock. The lock switches to an unlocking state when the unlocking information is identified as being correct. When no biological feature is inputted while the electronic key is connected to the lock, the electronic key is disconnected from the lock.