Patent classifications
G07C9/00571
LOCATION-AWARE BEACON SCANNING AND AUTHENTICATION FOR SECURE CONTROL OF IOT APPLICATIONS
Systems and methods for location-aware scanning of an IoT beacon by a mobile device, and the authentication of the mobile device, are disclosed herein. The system detects when the mobile device is within a geofenced region associated with the IoT beacon and enables the scanning by the mobile device for signals from the beacon. Using the beacon signals received by the mobile device, the system detects when the mobile device and IoT beacon are sufficiently near one another. Once the mobile device and IoT beacon are sufficiently near each other, the system authenticates control of the mobile device over the IoT beacon by verifying an authentication key transmitted to a server.
VEHICLE SAFETY SYSTEM, DISTANCE DETERMINATION METHOD, AND VEHICLE
A distance determination method has: detecting a first received signal strength indicator (RSSI) of a first electronic device by a second electronic device; detecting a second RSSI of the second electronic device by the first electronic device; obtaining the first RSSI from the second electronic device by the first electronic device; and calculating a motion direction and a distance of the second electronic device relative to the first electronic device according to the first RSSI and the second RSSI by the first electronic device.
PROOF OF AUTHORITY BASED ACCESS TO DEVICES ON A NETWORK WITH LOCAL TOKEN ACQUISITION
An access control method and system that uses a physical proximity interface on a token dispenser device to obtain tokens on a blockchain which are used for subsequent access to a local network. The tokens are authenticated on the local network using proof of authority authentication. A client device can present a token to the local network from anywhere in the world in order to access at least one device on the local network. In an example, the method includes receiving, from the physical proximity interface of the token dispenser device, a token on a blockchain layer; presenting, to a node of the local network, the token; and receiving, from the node, successful authentication of the token by way of proof of authority authentication. The method can include, after the successful authentication of the token, authorizing the client device to access a device on the local network.
ACCESS CONTROL SYSTEM AND METHOD THEREOF
The present invention provides a robust and effective solution to an entity or an organization for fully ensuring people and property security by designing and developing an intelligent access control system (ACS) that can provide a smart, swift and simplified user authentication and authorization mechanism. This proposed system may be an event-driven system. A plurality of events such as location-centric, people-inspired, unplanned, and the like can be captured and acted upon by using artificial intelligence along with an adaptive control system.
MULTIFAMILY ELECTRONIC LOCK CREDENTIAL MANAGEMENT
An electronic lock access management system includes an electronic lock and a server system. In some embodiments, the server system includes a memory storing a database including a plurality of user accounts, each user account being associated with a set of privileges and one or more properties, each property being associated with one or more locks, each of the locks being associated with one or more access codes that are specific to each user. In some embodiments, the electronic lock stores, in the lock memory, an encrypted copy of an access code list received from the server system based on a set of access codes that are associated with the electronic lock in the database.
METHODS AND SYSTEMS FOR ACCESS CONTROL
A method of requesting access through a door may involve: causing a mobile computing device to receive an identifier of the door; and causing the mobile computing device to transmit an access request to an access-control system, the access request comprising data representing at least the identifier of the door and an access code. A method of controlling access through a door may involve: receiving an access request from a mobile computing device, the access request comprising data representing at least an identifier of the door and an access code; and in response to the request, allowing access through the door. Systems are also disclosed.
Energy efficient secure Wi-Fi credentialing for access control systems
An access control system includes an energy efficient access control that operates as a Wi-Fi access point that broadcasts a Service Set Identifier (SSID) as indicator of access control level to communicate with a mobile device with WPA2 PSK.
Transaction management system, transaction management method, and program
A system for managing a transaction of an item between first and second users includes a first lock attached to the item, a storage unit having a second lock attached thereto and physically storing the item, and a processor that manages a first privilege to open the first lock and a second privilege to open the second lock. The processor performs management so that a holder of the first and second privileges is the first user. Upon receiving, from the storage unit, information indicating the second lock being opened, the processor performs management so that a first transaction is concluded in which the first user tentatively receives the item from the second user. Upon receiving, from the first lock, information indicating the first lock being opened, the processor performs management so that a second transaction is concluded in which the first user inspects the item and finally receives the item.
Gaming service automation system with graphical user interface
A robot management system (RMS) includes a plurality of service robots deployed within an operations venue that includes a plurality of gaming devices, an operator terminal presenting a graphical user interface (GUI) to an operator, and a robot management system server (RMS server) configured in networked communication with the plurality of service robots. The RMS server is configured to: identify location data for the service robots; create an interactive overlay map of the operations venue that includes a static map of the operations venue, overlay data showing the location data of the plurality of service robots over the static map, and an interactive icon for each service robot of the plurality of service robots; display, via the GUI, the overlay map; receive a first input indicating a selection of a first interactive icon associated with a first service robot; and display current status information associated with the first service robot.
TRANSACTION METHOD AND DEVICE USING UWB COMMUNICATION
A method is provided for operating an ultra-wide band (UWB) device, the method including transmitting, to a gate, a first message including a device identity (ID) for identifying the UWB device and a transaction ID for identifying a transaction of the UWB device, receiving, from the gate, a second message including a gate authentication cryptogram generated based on the device ID and the transaction ID, verifying the gate based on the gate authentication cryptogram, encrypting payment information for the transaction in response to the gate being verified, and transmitting, to the gate, a third message including the encrypted payment information.