Patent classifications
G07C9/21
ACCESS CONTROL SYSTEM AND METHOD TO DISTINGUISH BETWEEN TAILGATE AND PIGGYBACK
Access control system and method to distinguish between tailgate and piggyback. The method includes receiving, from a camera positioned at an access point, one or more images of a first person at the access point and determining based on credential information whether the first person is authorized to enter through the access point. In response to determining that the first person is authorized to enter through the access point, the method includes determining, based on a consent-to-follow gesture of the first person detected in the one or more images, a number of guests of the first person requested to enter through the access point. The method also includes determining, based on the one or more images, a number of persons entering through the access point and generating an alert indicating unauthorized entry when the number of persons is greater than the number of guests.
ACCESS CONTROL SYSTEM AND METHOD TO DISTINGUISH BETWEEN TAILGATE AND PIGGYBACK
Access control system and method to distinguish between tailgate and piggyback. The method includes receiving, from a camera positioned at an access point, one or more images of a first person at the access point and determining based on credential information whether the first person is authorized to enter through the access point. In response to determining that the first person is authorized to enter through the access point, the method includes determining, based on a consent-to-follow gesture of the first person detected in the one or more images, a number of guests of the first person requested to enter through the access point. The method also includes determining, based on the one or more images, a number of persons entering through the access point and generating an alert indicating unauthorized entry when the number of persons is greater than the number of guests.
System and method for using a mobile device as an input device for surveys at a live event
A method is provided for interacting with audience members in an event, each of the potential attendees having available thereto a unique identifier. The method comprises creating, for an attendee, a unique ID (UID) on a mobile wireless device (MWD) by the steps of inputting to the MWD one of the unique identifiers, combining the obtained unique identifier with a UID time stamp at the time of creation of the UID; receiving with a server on a first wireless channel communications from the MWD; registering the UID at the physical location of the event; generating a visual query; displaying on the MWD response indicators; receiving at the server from the registered attendee a response, to the query over the first wireless channel; and storing in a database on the server the received response in association with the displayed query.
System and method for using a mobile device as an input device for surveys at a live event
A method is provided for interacting with audience members in an event, each of the potential attendees having available thereto a unique identifier. The method comprises creating, for an attendee, a unique ID (UID) on a mobile wireless device (MWD) by the steps of inputting to the MWD one of the unique identifiers, combining the obtained unique identifier with a UID time stamp at the time of creation of the UID; receiving with a server on a first wireless channel communications from the MWD; registering the UID at the physical location of the event; generating a visual query; displaying on the MWD response indicators; receiving at the server from the registered attendee a response, to the query over the first wireless channel; and storing in a database on the server the received response in association with the displayed query.
Smart containers and systems and methods for shipping and tracking smart containers
Systems and methods for tracking a smart container are provided. The methods use sensors of the smart container to detect tampering with the smart container after the container leaves a sender and before the container arrives at a receiver. In particular, the sensors detect when the smart container has been opened by someone other than the receiver (i.e., tampered with) and write the detection of tampering (e.g., the sensor measurement) to a blockchain. Delivery agents use scanners to write their possession or agency over the smart container to the blockchain. Accordingly, the agency of the smart container can be determined if tampering occurs.
Smart containers and systems and methods for shipping and tracking smart containers
Systems and methods for tracking a smart container are provided. The methods use sensors of the smart container to detect tampering with the smart container after the container leaves a sender and before the container arrives at a receiver. In particular, the sensors detect when the smart container has been opened by someone other than the receiver (i.e., tampered with) and write the detection of tampering (e.g., the sensor measurement) to a blockchain. Delivery agents use scanners to write their possession or agency over the smart container to the blockchain. Accordingly, the agency of the smart container can be determined if tampering occurs.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Remote auditing of electronic keys
Embodiments relate to enhanced auditing features for administration of remote electronic keys. An electronic key delivers electrical power to an electronic lock to energize circuitry thereof. The electrical power may energize an electric motor or solenoid. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes the electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.
Remote auditing of electronic keys
Embodiments relate to enhanced auditing features for administration of remote electronic keys. An electronic key delivers electrical power to an electronic lock to energize circuitry thereof. The electrical power may energize an electric motor or solenoid. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes the electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.