G07C9/00658

LOCK HOUSING DEVICE AND KEY STRUCTURE

An apparatus includes an enclosure, a central processing unit, a power source, a first distance measuring device, a first compressible member, and a first housing pin, where the central processing unit is electrically coupled to the power source and the first distance measuring device. A first end of the first compressible member is mechanically coupled to a first end of the first housing pin and a second end of the first compressible member is mechanically coupled to an inner surface of the enclosure. The first distance measuring device positioned at the second end of the first compressible member, where the first distance measuring device is configured to measure a first distance to the first end of the first housing pin. A first key pin of a key structure disposed in the enclosure, where the first key pin is configured to compress the first compressible member the first distance.

Systems and methods for secure lock systems with redundant access control

Systems and methods for providing secure locks having redundant access channels are disclosed. In some embodiments, the smart lock has a hardware processor, a power source, a cylinder, a button that forms a rose knob, and a rose protector. The rose knob and rose protector protect and conceal the hardware processor, the power source, and the cylinder. The rose protector forms an annular groove that slidabiy interlocks with the rose knob. The rose knob has a plurality of redundant access channels for receiving authentication information, The redundant access channels may include a biometric scanner for receiving biometric information, a passcode keypad for entering a token, or a wireless transceiver for receiving a token from a mobile device and transmitting a response to the mobile device. When the user cannot open the lock through the first redundant access channel, the smart lock is configured to allow access through a second access channel.

CONTROLLED ZONE TRACKING SYSTEM

A controlled zone monitoring system and method for tracking assets is disclosed. The system includes one or more checkpoint stations located adjacent to a controlled zone. Each checkpoint station includes an RFID tag reader for reading RFID tags on assets and a processing system for comparing sets of assets and determining if any assets are missing from the sets.

Video Doorbell Visitor Filtration Apparatuses and Date-Time System Methods of Operation
20210366216 · 2021-11-25 ·

A system enables a scheduled visitor to receive an optical credential in paper or electronic form, and a range of date-time validity for a video doorbell which may actuate a portal. Upon activation the video doorbell hashes the optical credential with a range of date-times of the actual access request. The range of most significant bits of date-time at the doorbell causes the hashing to produce a plurality of digital bit-keys. The plurality of bit-keys generated exclusively at that video doorbell at that time would be verified with a stored digital bit-lock which is a complementary transformation of the valid date-time range hashed with the original optical credential at a visitor filtration server. Overwriting a stored digital bit-lock in a video doorbell at any time effectively cancels access by that optical credential.

Video doorbell visitor filtration apparatuses and date-time system methods of operation

A system enables a scheduled visitor to receive an optical credential in paper or electronic form, and a range of date-time validity for a video doorbell which may actuate a portal. Upon activation the video doorbell hashes the optical credential with the date-time of the actual access request, masked to a range of most significant bits to create a plurality of digital bit-keys. The bit-keys generated exclusively at that video doorbell at that time would be verified with a stored digital bit-lock which is a complementary transformation of the valid date-time range hashed with the original optical credential at a visitor filtration server. Overwriting a stored digital bit-lock in a video doorbell at any time effectively cancels access by that optical credential. An emergency access key phrase communicatively couples the video doorbell with a visitee interview panel overriding access policies. Installation of custom software on the visitor's terminal is unnecessary.

METHODS FOR ADMINISTERING RESIDENTIAL CARE FACILITY
20220005592 · 2022-01-06 ·

Assisted Living facility administration methods are disclosed for effectively preventing infection spread. A decentralized architecture and innovative systems including InfeXPASS™ (a certified designation of a person's health status), InfeXCON™ (a facility's real-time risk designation), a InfeXBloc™ Scorecard system (rating of facilities' implemented infection safety measures), and a InfeXSIM™ system to depict the simulation of an operating facility are provided to increase resistance to infection transmission while retaining the residential setting.

SECURE ELECTRONIC LOCK SYSTEMS AND METHODS OF USING THE SAME
20230326273 · 2023-10-12 · ·

Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.

Secure electronic lock systems and methods of using the same
11783656 · 2023-10-10 · ·

Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.

Access control smart system
11749042 · 2023-09-05 ·

The invention is a device, system, and method for access control, including a combination of access control, live video communication, interactive virtual host, internal compound mapping, digital couponing, vacancy information, security system, maintenance requests, and administrative tracking and control.

STORE SYSTEM, STORE APPARATUS, CHECKOUT METHOD, AND PROGRAM
20230359840 · 2023-11-09 · ·

A store system (1) includes: a reading apparatus (220) that reads a product that passes through a gate (20); a person determination information acquisition apparatus (210) that acquires person determination information that determines a person P who passes through the gate (20); a coupon notification unit (110) that transmits, when a coupon applicable to any product read by the reading apparatus (220) is present, notification information that provides notification of the applicable coupon, to a terminal (30) associated with the person determination information; a checkout unit (120) that performs checkout processing of a product read by the reading apparatus (220), and application processing of a coupon based on coupon use information that is acquired from the terminal (30) and indicates a coupon to be used by the person P; and an electronic receipt transmission unit (130) that transmits an electronic receipt to the terminal (30) in response to execution of the checkout processing and the application processing of a coupon.