G07C9/21

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
20230177906 · 2023-06-08 ·

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

System and method for providing interconnected and secure mobile device charging stations

A method is disclosed. The method includes providing a door that selectively opens to allow access to a cavity and selectively closes to block access to the cavity, using a lock to selectively lock and unlock the door when the door is closed, and electrically charging a user device in the cavity when the door is closed and locked. The method also includes unlocking the door based on a first input provided by a first user, the first user removing the user device, electrically charging the user device in the cavity when the door is closed and locked after the first user returns the user device, and unlocking the door based on a second input provided by a second user, the second user removing the user device.

System and method for providing interconnected and secure mobile device charging stations

A method is disclosed. The method includes providing a door that selectively opens to allow access to a cavity and selectively closes to block access to the cavity, using a lock to selectively lock and unlock the door when the door is closed, and electrically charging a user device in the cavity when the door is closed and locked. The method also includes unlocking the door based on a first input provided by a first user, the first user removing the user device, electrically charging the user device in the cavity when the door is closed and locked after the first user returns the user device, and unlocking the door based on a second input provided by a second user, the second user removing the user device.

REMOTE ADMINISTRATION OF AN ELECTRONIC KEY TO FACILITATE USE BY AUTHORIZED PERSONS
20170249794 · 2017-08-31 ·

Embodiments relate to remote administration of a portable electronic key. An activation signal may be delivered to wireless communications circuitry of the portable electronic key to enable the key to perform one or more tasks. A smart device can receive information related to the activation signal from a server device. The smart device may deliver the activation signal to the portable electronic key via a wireless communications link established in accordance with a wireless networking standardized communications protocol. A user verification procedure may be performed at one of the portable electronic key and the smart device. The user verification procedure may indicate if a holder of the portable electronic key is authorized to use the key. Delivery of the activation signal may be initiated in response to completion of the user verification procedure.

ANONYMOUS AND EPHEMERAL TOKENS TO AUTHENTICATE ELEVATOR CALLS
20170243417 · 2017-08-24 ·

According to one or more embodiments, a system and method for authorizing a user securing an elevator call in a building is provided. For example, the method includes receiving, at a mobile device, a secure authorization token that includes an expiration time, connecting the mobile device to a backend system using the secure authorization token from the mobile device, verifying, using the backend system, an authenticity of the secure authorization token from the mobile device based on at least the expiration time, generating, at the backend system, a secure access token and a random number in response to the authenticity of the secure authorization token being verified, and receiving, at the mobile device, the secure access token and the random number for use making elevator call requests.

VEHICLE KEY ACTIVATED TRAVEL LOG SYSTEM
20170236342 · 2017-08-17 · ·

A vehicle key activated travel log system of a vehicle includes a first key with a first key identification code; a second key with a second key identification code different from the first key identification code; and a travel log unit to identify first key and the second key. The system generates a first log book when the first key is identified to start the vehicle.

REMOTE AUTHENTICATION OF AN AUTHORIZED USER FOR REMOTELY UNLOCKING A DIGITAL LOCK
20220309141 · 2022-09-29 ·

Remote authentication of a user for unlocking an onsite lock device. A method includes receiving a request to authorize a user to unlock an onsite lock device at a property, wherein the user is not a licensed real estate professional with authorization to access the property. The method includes identifying a sponsor who will authenticate the user, wherein the sponsor is a licensed real estate professional with authorization to access the property. The method includes receiving verification from the sponsor that the user should be granted access to the property and generating a time sensitive one-time code associated with the user for unlocking the onsite lock device. The method includes causing the onsite lock device to unlock in response to the one-time code being presented to the onsite lock device.

REMOTE AUTHENTICATION OF AN AUTHORIZED USER FOR REMOTELY UNLOCKING A DIGITAL LOCK
20220309141 · 2022-09-29 ·

Remote authentication of a user for unlocking an onsite lock device. A method includes receiving a request to authorize a user to unlock an onsite lock device at a property, wherein the user is not a licensed real estate professional with authorization to access the property. The method includes identifying a sponsor who will authenticate the user, wherein the sponsor is a licensed real estate professional with authorization to access the property. The method includes receiving verification from the sponsor that the user should be granted access to the property and generating a time sensitive one-time code associated with the user for unlocking the onsite lock device. The method includes causing the onsite lock device to unlock in response to the one-time code being presented to the onsite lock device.

DYNAMIC IDENTIFICATION BADGE

A presentation of visual information relates to an accurate identity of a person. Visible data corresponding to the identity is rendered upon a wearable badge associated uniquely with the person. The rendered visible data are augmented dynamically. The augmentation includes adding a conspicuous indication to the rendered visible data, in real time, that an authorized security credential corresponding to the person is exceeded in relation to a presence of the person in a particular location.

Encrypted communications for a movable barrier environment

An at least partially secure communication environment is provided in which accessory devices can be communicated with and controlled in the context of a movable barrier operator system. In one example approach, a gateway device can be configured to coordinate and control such communications in a secure manner. Three example approaches to such a communication environment include: a gateway device's receiving an accessory device control signal and sending a rolling code based accessory command signal to a target accessory device; receiving a rolling code based accessory device control signal and sending a command signal to an accessory device; and receiving a rolling code based accessory device control signal and sending a rolling code based accessory command signal to a target accessory device. Combinations are possible. An integrated system provides for automatic functioning of one device in response to status changes of one or more other devices.