Patent classifications
G07C9/00563
ACCESS MANAGER
An access manager determines whether access will be granted to a guarded species or space utilizing a controller including a digital processor with a memory for storing an ID library and a transducer block coupled with the processor for accessing a plurality of different ID types and an actuator block coupled with the processor for unblocking a normally locked portal to the guarded space.
DUPLICATED WIRELESS TRANSCEIVERS ASSOCIATED WITH A VEHICLE TO RECEIVE AND SEND SENSITIVE INFORMATION
A vehicle is provided that comprises two or more radio frequency (RF) antennas and two or more RF transceivers to communicate wirelessly sensitive information associated with a user of the vehicle (the two or more RF antennas being at different physical locations on an exterior of the vehicle). The vehicle determines which one of the two or more RF antennas is receiving a strongest signal from a common signal source, selects a first RF transceiver associated with the RF antenna with the strongest signal to send the sensitive information associated with the user to the common signal source, and sends the sensitive information associated with the user to the first RF transceiver for transmission to the common signal source.
METHOD AND DEVICE FOR FINGERPRINT AUTHENTICATION
A fingerprint authentication method includes a first step of acquiring partial fingerprint measurement data for a part of a fingerprint, and a second step of calculating a matching rate by comparing the partial fingerprint measurement data with reference comparison data selected among a plurality of partial fingerprint registration data, each partial fingerprint registration data corresponding to a part of a fingerprint. The method further includes a third step of determining whether the matching rate is equal to or greater than an authentication threshold and a fourth step of determining, based on a result in the third step, a success of the authentication, or repeating the second and third steps by selecting new reference comparison data based on whether or not the matching rate is equal to or greater than a preset threshold smaller than the authentication threshold.
MOBILE KEY ENROLLMENT AND USE
A computer system performs techniques related to enrolling and using a secure credential. In some embodiments, a computer system provides user interfaces for enrolling a secure credential on the computer system. In some embodiments, a computer system provides user interfaces for inviting a user account to use a secure credential.
REUSABLE, SECURE SHIPPING PACKAGE
Disclosed herein is a shipping container that includes numerous multi-factor authentication (MFA) tie ins to provide added security to the container. In some embodiments, the shipping container is associated with a mobile user profiles within a mobile application. A retailer makes a sale, then, using a mobile application, associates the container with the destination address and the MFA details associated with the buyer's mobile application account. Once the container is loaded up, the container will not open again except for the buyer using the buyer's MFA authentication credentials.
VARIABLE ELECTROSTIMULATIVE BEHAVIOR MODIFICATION
A method for variable electrostimulative behavior modification includes sensing placement of a first anatomical portion of a body in contact to a surface of a target object adapted for behavior modification with a multiplicity of electrostimulative end points coupled to an energy source. The method additionally includes delivering an electrical neurostimulus through one of the end points nearest to the placement of the first anatomical portion in proximity to the surface the electrical neurostimulus including a waveform promoting a modification of behavior associated with the placement of the first anatomical portion in proximity to the surface. Thereafter, an anomalous characteristic of the sensed placement indicating a failure to modify the behavior may be detected and a profile of the waveform of the electrical neurostimulus changes to a different waveform in response to the anomalous characteristic of the sensed placement.
ACCESS CONTROL SYSTEM AND ACCESS CONTROL METHOD USING THE SAME
A sub-reader and a method of controlling the sub-reader are provided. The method of controlling the sub-reader which is connected to a door reader provided in an existing installed door operating device to provide a communication method that is not supported by the door reader includes: obtaining first open request information using a first communication method from a terminal; obtaining second open request information for transmission to the door reader based on the first open request information; and transmitting the second open request information to the door reader using a second communication method different from the first communication method.
DYNAMIC ENCRYPTION AND DECRYPTION METHOD AMONG LOCK CONTROL SYSTEM MODULES, MULTIPLE AUTHENTICATION LOCK CONTROL SYSTEM, LOCK CONTROL METHOD AND STRONGBOX
Dynamic encryption and decryption method among lock control system modules comprise the following steps: step 1. filling hardware ID data, an unlocking communication protocol and a mask variable into an array according to a predefined variable space, and encrypting the array based on the mask variable to obtain an encrypted array; step 2. decrypting the encrypted array based on the mask variable to obtain a decrypted array, executing data division on the decrypted array according to the predefined variable space, matching the divided data with data recorded in advance one by one, and if the divided data are consistent with the data recorded in advance, executing related operations according to the decrypted unlocking communication protocol content; otherwise, executing no operation.
Natural language user interface
A mobile device is configured to wirelessly authenticate with a reader device. The mobile device may receive an acoustic signal from a user, and a command may be determined based on the acoustic signal. The mobile device may transmit the command to the reader device if the mobile device and the reader device are authenticated. The reader device may receive the command, and may analyze the command to determine an action to be performed. The reader device may then perform the action if the mobile device is authorized to request the command to be performed.
Infrared biometrics information collection device and door locks having the same
The present disclosure relates to a door lock having an infrared biometrics information collection device. In certain embodiments, the door lock includes, a door with a door handle for opening the door, an infrared light source, and an infrared biometrics information collection sensor. The infrared light source includes one or more infrared light emitters. The infrared biometrics information collection sensor captures at least one infrared image of biometrics information of the one or more fingers of a target human hand. The fingers are positioned between the infrared light source and the infrared biometrics information collection sensor. The infrared light source irradiates infrared light through one or more fingers to generate infrared images of biometrics information of fingers to be captured by infrared biometrics information collection sensor, infrared images of biometrics information captured are used for user authentications, and the door lock can be unlocked by an authenticated user.