Patent classifications
G07C9/00857
METHODS AND SYSTEMS FOR ACCESS CONTROL
A method of requesting access through a door may involve: causing a mobile computing device to receive an identifier of the door; and causing the mobile computing device to transmit an access request to an access-control system, the access request comprising data representing at least the identifier of the door and an access code. A method of controlling access through a door may involve: receiving an access request from a mobile computing device, the access request comprising data representing at least an identifier of the door and an access code; and in response to the request, allowing access through the door. Systems are also disclosed.
Interlock system and parts thereof
An interlock system comprising: a first lock including a first lock memory configured to store one or more virtual keys; and a first key including a first key memory configured to store one or more virtual keys, wherein the first lock is configured to be actuated between a first condition and a second condition, when a first virtual key stored in the first key memory is transferred to the first lock memory, by engagement of the first key and first lock, and movement of the first key with respect to the first lock.
ELECTROMECHANICAL LOCK ASSEMBLY
An electromechanical lock assembly (1) comprising a lock body (13), a lock core (21) located at least partially within the lock body (13) and selectively rotatable with respect to the lock body (13), the lock core (21) including a key receptacle (23), a bolt operating member rotationally secured to the lock core (21) and configured to move a lock bolt of a lock (3) for locking and unlocking said lock (3), and a programmable key (12), wherein said electromechanical lock assembly is configured to be powered upon insertion of the programmable key (12) in said key receptacle (23). A position sensing device (27) is arranged to transmit position data to said programmable key (12).
Phone as a key predictive vehicle access
A computer-implemented method includes predicting, via a predictive analytical model, a time interval associated with a future key-on event for a vehicle. The predictive analytical model is based at least in part on key-on event data. The method includes generating, based at least in part on the predicted time interval, a power mode instruction configured to cause a vehicle Telematics Control Unit (TCU) or Phone as a Key (PaaK) system to change a TCU state from a low energy state to a higher energy state, and transmitting, based on the predicted time interval, the power mode instruction to the vehicle TCU.
ELECTROMECHANICAL LOCK ASSEMBLY WITH ANNULAR ELEMENT, BLOCKING AND RETAINING DEVICES
The present invention relates to an electromechanical lock assembly (1) comprising a lock body (15), a lock core (17), a lock bolt operating member (19), and an electronic access control device. The electromechanical lock assembly further comprises an annular element (27) which is rotatably and axially displaceably mounted on said lock core (17), a coupling device (25) arranged to communicate with said electronic access control device and, upon the insertion of an appropriate key (65) in a key receptacle (37) of the lock core (17), rotationally lock the annular element (27) to the lock core (17), thereby enabling rotation of the lock core (17) in a first direction and thereby enabling unlocking of a lock (3) with said appropriate key (65), and a blocking arrangement (63) arranged to prevent unauthorized unlocking of said lock (3).
Systems and methods for providing temporary access credentials to access physical locations
A physical location access control system is configured to receive. via a network interface, a request to provide a temporary access right for a first physical location to a first user, the request providing an indication as to a first time period associated with the temporary access right. In response to determining that the requester has an access right to the first physical location for a second time period that comprises the first time period, a temporary access token corresponding to the first time period is created and the requester's access right to access the first physical location for the first time period is disabled. The temporary access token is transmitted to a device associated with the first user, enabling the first user to access the first physical location during the first time period.
SYSTEM AND METHOD FOR TRANSMITTING UNLOCK CODES BASED ON EVENT TRIGGERS
The disclosure generally relates to a system and method for randomly generating unlock codes and identifiers for locks, and creating unlock code and identifier pairs. In an exemplary embodiment, the invention is integrated with, or part of, a distributed management system that controls access to various locations, such as, for example, self-storage units, hotel rooms, apartment buildings, storage containers, short-term housing rentals, lockers, equipment rooms, vaults, hospitals, airports, government facilities, nuclear power facilities, water treatment facilities, weapon storage facilities, aircraft cockpits, and any other setting that requires restricted, selective, or monitored access that can be remotely controlled, whereby users can receive unlock codes electronically on their mobile device.
Enabling distribution of a mobile key
It is provided a method for enabling distribution of a mobile key for obtaining access to a physical space. The method is performed in a mobile key agent and comprises the steps of: receiving a booking signal from a booking agent, the booking signal being associated with a booking of physical space, wherein the booking signal comprises a property identifier, an allocation time, and a name of the user; obtaining a system booking reference associated with the booking of physical space; providing the system booking reference to the booking agent; establishing contact with the mobile key repository, yielding an identifier of the mobile key repository; receiving a space allocation message comprising an identifier of a physical space and the system booking reference; and transmitting a key allocation command to an electronic access control system associated with the property, the key allocation command comprising the identifier of the mobile key repository, the identifier of the physical space and the allocation time.
METHODS OF PERFORMING A DISPATCHED CONSUMER-TO-STORE LOGISTICS OPERATION FOR AN ITEM BEING REPLACED USING A MODULAR AUTONOMOUS BOT APPARATUS ASSEMBLY AND A DISPATCH SERVER
Methods are described that perform a dispatched consumer-to-store return or swap logistics operation for an item being replaced using a modular autonomous bot apparatus assembly and a dispatch server. The method begins with receiving a return operation dispatch command that includes identifier information, transport parameters, and designated pickup information for the item being replaced/returned, along with authentication information related to an authorized supplier of the item being replaced. Modular components of the bot apparatus are verified to be compatible with the dispatched logistics operation. The MAM then autonomously causes the bot apparatus to move to the designated pickup location, notifies the authorized supplier of an approaching pickup, receives supplier authorization input to permissively allow access to a payload area within the bot apparatus, monitors loading as the item being replaced is received along with return documentation, and then autonomously causes movement of the bot apparatus back to the origin location.
Secure element for processing and authenticating digital key and operation method therefor
A secure element (SE) for processing a digital key includes a communication interface for communicating with a host, a memory for storing programs and data for processing the digital key, and a processor for executing the programs stored in the memory to receive a digital key processing request from a target device, determine whether a service is providable to the target device, by using a service-provider-specific service performance manager, process the digital key by using a digital key manager based on digital key processing information stored in the memory, upon determining that a service is providable to the target device, issue a digital key processing certificate by using the service-provider-specific service performance manager based on authentication information stored in the memory, and transmit the digital key processing certificate to at least one of a service provider and the target device.