Patent classifications
G07C9/00571
System and method for facilitating access to a secured area
In one aspect, a portable electronic device is provided for accessing a secured area to deliver a package therein. The portable electronic device includes a sensor configured to detect an indicium of the package and communication circuitry configured to communicate a message to a server computer associated with the package upon the sensor detecting the indicium. The communication circuitry is further configured to receive delivery information from the server computer, the delivery information including at least a location of the secured area. The portable electronic device further includes a processor operatively coupled to the sensor and the communication circuitry. The processor is configured to cause, via the communication circuitry, the movable barrier operator to open a movable barrier associated with the secured area.
INTELLEGENT LOCK MECHANISM AND METHODS
An intelligent lock mechanism includes a retrofittable apparatus comprising a constant temperature monitor, wherein the lock apparatus can be maintained at an operating temperature by engaging the motor to keep sufficient temperature for consistent operability.
Radio frequency antenna and system for presence sensing and monitoring
A wireless device system employs short-range wireless communication to require the proximity of a user device to a defined area prior to communicating a request or notification to the wireless user device. The system authenticates a request and the proximity of the user to or within the defined area prior to transmitting a command, request, or notification to the user or a third party. Additionally, the system uses an access node configured to shape the radiation pattern of short-range wireless communications to better determine the position of a user proximate in or around a defined area.
Retail security system
A retail security system that includes a locking system having locking assemblies that can be locked and unlocked directly by a consumer or clerk/employee using his or her mobile phone or other portable electronic device. Each of the locking assemblies may be configured to lock an article so that it cannot be freely accessed. The security system may include a sanitizing system that sanitizes the article after a consumer returns the article to the locking system without making a purchase. The security system may include a computer apparatus that allows an owner of the security system to access a software application that provides the owner with information/data about access to the locked articles.
METHOD AND VEHICLE DOOR LOCK SYSTEM FOR MANAGING ACCESS TO THE VEHICLE
A vehicle door lock system includes: a door lock; a vehicle event sensor; and a processing circuitry, the processing circuitry is configured to cause the vehicle door lock system to generate first triggering event data, indicative of a first triggering event detected by the vehicle event sensor, caused by a movement of an object onto, or in the vicinity of, the vehicle, at a first time, obtain, from a portable electronic device, second triggering event data, indicative of a second triggering event caused by a movement of the portable electronic device, at a second time, determine if the first triggering event and the second triggering event both occurs within a predetermined time period by comparing the first triggering event data and the second triggering event data.
System and process for authenticating a user in a region
A system for identifying users for entrance to an area comprising a point of entry into a pre-defined area. The system comprises a first computing device having a microprocessor, a memory and a screen disposed adjacent to the point of entry. There is also at least one second computing device having at least one microprocessor and at least one memory, said at least one second computing device being disposed remote from the first computing device. There is at least one third computing device having at least one screen and at least one microprocessor wherein the third computing device is in communication with the second computing device wherein the second computing device is configured to send at least one image to the first computing device and to the third computing device wherein when an image at the point of entry matches an image on the third computing device the port of entry will allow the user holding the third computing device into the point of entry.
Keyless entry utilizing set-back box
Techniques are described for keyless entry to a structure (e.g., hotel room) utilizing a set-back box. Registrants (e.g., hotel guest) may scan a barcode from their mobile device to check-in to the structure. Upon scanning the barcode or by other means, a mobile device identifier (e.g., a Bluetooth low-energy address (BLE)) is registered and associated with the checked-in structure. Receiving the registered mobile device identifier, the backend server pushes such to the set-back box associated with (e.g., resides in) the checked-in structure. The set-back box is enabled (e.g., BLE enabled) to actively scan addresses of nearby mobile devices. When the registered mobile device identifier is detected within a predetermined signal strength range (e.g., by using received signal strength indicator (RSSI) levels), the set-back box transmits a command to a smart lock (e.g., via BLE or Wifi or other radio) or to a lock controlling backend processor, to open the lock.
LOCKING AND RELEASE SYSTEM OF A LOCK FITTED ON A VEHICLE
A locking and release system of a lock fitted on a vehicle comprising: a mechanical lock (10, 70) which is fixed on a door of a vehicle; an electronic circuit (11) associated with said lock (10, 70); said electronic circuit (11) comprises a Bluetooth communication device (13); an Internet communication device (14); a GPS localization device (15); said system further comprises: a cloud (30) containing the data for the management of said system; a management centre (35) of said system; said management centre (35) is adapted to communicate with said cloud (30); a smartphone (21); said smartphone (21) comprises a Bluetooth communication device (22); an HTTPS communication device (23); and a GPS localization device (24); said electronic circuit (11) and said smartphone (21) are adapted to communicate with said cloud (30); said smartphone (21) is adapted to communicate with said electronic circuit (11); said lock (10, 70) opens if the following conditions are met: the GPS position of the lock (10, 70) coincides with the delivery position; the GPS position of the smartphone (21) coincides with the delivery position; said smartphone (21) is recognized by the system; said lock comprises coupling means (56, 74), located on a first door adapted to close against closing means (59, 71) located on a second door and locking means (60, 78) adapted to lock said coupling means (56, 74) in the closed position.
Methods and Systems for Comprehensive Security-Lockdown
An electronic lock can enter a lockdown mode in response to a lockdown command comprising a mechanical command, e.g. a button or door handle being pressed on the lock in a predefined time-series sequence, or touching the lock in a time-series sequence). Alternatively, an audio or visual command can be issued, e.g. saying certain words or making a hand gesture. The lock may require additional authentication before executing the lockdown command, e.g. recognizing an authorized electronic key. Other embodiments are also provided.
Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.