Patent classifications
G07C9/00817
APPARATUS AND METHODS FOR ENTRY CONTROL OVER A CELLULAR NETWORK
Apparatus and methods for controlling physical access to a location include an entry system including at least one barrier at the physical location, with the barrier configured to selectively permit access into and/or from and/or within the physical location upon proper credentials and/or authorization. A cellular device is connected to or integrated with the entry system and is configured to transmit and receive voice and/or data information to the entry system that includes the credentials and/or authorization. The cellular device can be a retrofit to prior art/installed systems, can be external to an otherwise operational system, and/or can be integrated natively into the entry system. Methods and apparatus are disclosed to determine the power status and network link state of the cellular device and/or to establish communication through/to same, as well as for the cellular device to be connected to and control a plurality of entry systems and/or barriers. A plurality of entry systems and/or barriers can be controlled by one or more cellular devices, and the usage (and associated billing charges from cellular service providers) on any/all of those cellular devices monitored and selected to optimize (reduce) the expense of any data or other charges imposed by a cellular carrier associated with the cellular device. Optimization can include allocation to the aforementioned voice and/or data cellular plans related to specific of the plurality of entry systems and/or barriers.
Encrypted communications for a movable barrier environment
An at least partially secure communication environment is provided in which accessory devices can be communicated with and controlled in the context of a movable barrier operator system. In one example approach, a gateway device can be configured to coordinate and control such communications in a secure manner. Three example approaches to such a communication environment include: a gateway device's receiving an accessory device control signal and sending a rolling code based accessory command signal to a target accessory device; receiving a rolling code based accessory device control signal and sending a command signal to an accessory device; and receiving a rolling code based accessory device control signal and sending a rolling code based accessory command signal to a target accessory device. Combinations are possible. An integrated system provides for automatic functioning of one device in response to status changes of one or more other devices.
LOGIN SETTING METHOD AND SYSTEM FOR AN ELECTRIC LOCK
An electric lock login setting method includes: a first detection step: using a verification card to detect a detection unit of an electric lock; a learning pairing step: the electric lock stepping into a learning pairing mode so as to communicate an electronic device with the electric lock via a wireless signal, thereby setting pairing between the electronic device with the electric lock; and a second detection step: after setting pairing between the electronic device with the electric lock, using the verification card to detect the detection unit of the electric lock again so as to finishing setting login of the electronic device relative to the electric lock such that the electronic device is authorized to detect the detection unit to activate a control device to unlock the electric lock.
Method and system for the configuration of small locking systems
The present invention relates to a method and a system for the configuration of small locking systems with electronic locks, preferably electronic locking cylinders, which can preferably communicate with passive RFID cards. The present invention particularly relates to a method and a system which not only allows the easy configuration of locks/locking cylinders, but also of corresponding RFID cards, preferably by using a smartphone.
Electronic apparatus and operating method thereof
According to various embodiments, an electronic device including a touch screen display may receive first information associated with a first electronic key of a first door lock, display a first graphic user interface (GUI) associated with the first electronic key to indicate an inactive status of the first electronic key on the display, receive first credential information associated with the first electronic key, and after receiving the first credential information, change the first GUI to indicate an active status of the first electronic key.
Set-top box with enhanced behavioral controls and system and method for use of same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectively includes a signal input, a signal output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then reprogram the electronic door locking apparatus as well as control amenities, such as a display, in response to presence signal from the electronic door locking apparatus.
System and Method for Integrating Key Access Control of Legacy Lockable Articles into a Control System and Associated Lock Boxes
The present disclosure sets forth a system for integrating key access control of a plurality of legacy lockable articles into a tool control system. The system can comprise a plurality of lock boxes each associated with a respective legacy lockable article. Each of the plurality of lock boxes can be configured to selectively lock and unlock access to a key operable to facilitate access to the respective legacy lockable article. The system can further comprise a programmable logic controller communicatively coupled to each of the plurality of lock boxes. The programmable logic controller can be operable to send control instructions to the plurality of lock boxes to lock or unlock access to the key.
METHODS AND SYSTEMS FOR OFFLINE VERIFICATION CODE GENERATION BASED ON SMART DOOR LOCK SYSTEM
The present disclosure provides a method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
Premises access system
User access to a physical location (e.g., a homes, businesses, or other locations) may be granted for certain limited tasks based on one or more access procedures stored in a registry and associated with an identity of the user. Such access may be given without including an interaction with an owner, administrator, or manager of the location. User individuals may self-identify themselves to an access server or registry after arriving at the premises and receive corresponding access privileges via one or more devices within the premises based on access procedures stored in the access registry. The access procedures may be executed by the access server through communications with access devices within or about the premises and may be tailored based on the type of user individual or type of access requested.
Remote access control
A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.