G07C9/00896

SYSTEMS AND METHODS FOR KEYBOX STATUS DETERMINATION

Systems and methods for keybox status determination are disclosed. In some embodiments, a system for determining a status of a keycontainer of a lockbox comprises one or more sensors configured to generate output signals related to the keycontainer. The system further comprises at least one processor operatively connected with the one or more sensors, and memory storing instructions executable by the at least one processor. The instructions when executed cause the system to: determine, using the output signals from the one or more sensors, a status of the keycontainer, the status indicating whether the keycontainer is released from the keybox; and send a status notification based on the determined status of the keycontainer.

Transaction management system, transaction management method, and program

A system for managing a transaction of an item between first and second users includes a first lock attached to the item, a storage unit having a second lock attached thereto and physically storing the item, and a processor that manages a first privilege to open the first lock and a second privilege to open the second lock. The processor performs management so that a holder of the first and second privileges is the first user. Upon receiving, from the storage unit, information indicating the second lock being opened, the processor performs management so that a first transaction is concluded in which the first user tentatively receives the item from the second user. Upon receiving, from the first lock, information indicating the first lock being opened, the processor performs management so that a second transaction is concluded in which the first user inspects the item and finally receives the item.

Detection of unauthorized access of locked container

Detecting unauthorized access of a locked key container having a key for a vehicle or a premises. An indication is received at a sensor coupled to the key that the key container is being tampered with. A notification is sent in response to receiving the indication that the key container is being tampered with.

COMMUNICATION PROTOCOL FOR NON-INTERNET-ENABLED DEVICES
20220400111 · 2022-12-15 ·

A method of updating a first device (e.g., one or more locking devices) to reflect information located on a second device (e.g., a server) is provided, where the first device and the second device cannot communicate directly with one another. The method may include employing a third untrusted device (e.g., a mobile device) temporarily as an intermediary between the first device and second device. The method may include receiving, at the first device and from a third device, a request for the first device to communicate with the third device. In response to determining that the third device is authorized to communicate with the first device, the first device may receive information from the third device that was provided by the second device. The first device may transmit at least one message to the third device that is to be provided to second device.

METHODS AND SYSTEMS FOR CONTROLLING AN INTELLIGENT DEVICE

The present disclosure relates to a method and system for controlling a smart device. The method may include obtaining correlating information of the smart device. The correlating information may include at least one of smart device information or a communication status of the smart device. The method may include determining indication information of the smart device by processing the correlating information of the smart device according to a preset algorithm. The method may include performing designated operations related to the smart device based at least in part on the indication information.

SUPPORT SERVER, DISASTER SUPPORT SYSTEM, AND PROGRAM

A support server includes a processor configured to perform: acquiring an amount of residual fuel, state information of each of a plurality of vehicles, position information of each of the plurality of vehicles, and user position information of a user who desires supply of fuel from the plurality of vehicles; identifying a supply vehicle that is able to supply fuel out of the plurality of vehicles based on the amounts of residual fuel of the plurality of vehicles and the state information of the plurality of vehicles; generating fuel position information including at least the position information of the supply vehicle based on the user position information and the position information of the supply vehicle; and outputting the fuel position information.

TECHNIQUES FOR AUTHENTICATING BUILDING/ROOM ACCESS TERMINALS
20220392286 · 2022-12-08 ·

The techniques described herein provide for authentication of a reader device over a wireless protocol (e.g., NFC or Bluetooth, BLE). The mobile device can receive and store the static public key of the reader device and one or more credentials, each credential specifying access to an electronic lock. The mobile device can receive an ephemeral reader public key, a reader identifier, and a transaction identifier. The mobile device can generate session key using the ephemeral mobile private key and the ephemeral reader public key and send the ephemeral mobile public key to the reader device. The reader device can receive the ephemeral mobile public key and sign and transmit a signature message to the mobile device. The mobile device can validate a reader signature and generate an encrypted credential that the reader can use to access an electronic lock. The reader device can authenticate the mobile device for mutual authentication.

Door lock device and control method for door lock device

Disclosed is a door lock device. The door lock device comprises: a communication unit for receiving location information of an electronic device and a key from the electronic device; a location information reception unit for receiving location information of the door lock device; a door lock unit having a locked state or a released state; and a control unit electrically connected with the communication unit, the location information reception unit, and the door lock unit, wherein the control unit determines a distance between the electronic device and the door lock device on the basis of the location information of the electronic device and the location information of the door lock device, and determines whether to release the door lock unit on the basis of information of the distance.

System for parcel transport and tracking operated responsive to data bearing records
11521163 · 2022-12-06 · ·

A system for parcel transport and tracking that operates responsive to data bearing records includes a plurality of geographically spaced repositories. The exemplary repositories include a plurality of enclosed compartments. Access to each of the enclosed compartments is controlled by a respective door which is in operative connection with a respective lock. Central system circuitry is in operative connection with the repositories and is operative to control access to the compartments and to cause compartments to be selectively accessible so that selected parcels may be placed therein or removed therefrom by authorized item handlers. The exemplary central system circuitry is further operative to make determinations concerning handling of a plurality of parcels together in respective bundles to facilitate the timely and cost-effective transport of the parcels between repositories.

Apparatus for Detection of Driver and Vehicle Performance, Fuel Efficiency and Presence of Humans or Mammals in Vehicle Storage Area

The invention relates to the provision of apparatus and a method to determine the operation of a vehicle and provide monitoring of the same and the condition of a storage area capable of being transported as part of the vehicle. The storage area includes one or more detection devices provided in the same and which are in communication with the operator of the vehicle and/or external personnel or organisations so as to detect a change in condition of the vehicle and in particular if the change exceeds predetermined parameters.