G07C9/21

RELEASABLE LOCKING MECHANISM FOR A REFRIGERATED APPLIANCE

A releasable locking mechanism for a refrigerated unit. A latch plate is movable between a position that can be engaged by a deadbolt and a position clear of the deadbolt. The latch plate is moved by a door release accessible from an interior of the refrigerated unit. When the door release is activated, a pin blocks movement of the latch plate so that the refrigerated unit remains unlocked until the pin is reset.

RELEASABLE LOCKING MECHANISM FOR A REFRIGERATED APPLIANCE

A releasable locking mechanism for a refrigerated unit. A latch plate is movable between a position that can be engaged by a deadbolt and a position clear of the deadbolt. The latch plate is moved by a door release accessible from an interior of the refrigerated unit. When the door release is activated, a pin blocks movement of the latch plate so that the refrigerated unit remains unlocked until the pin is reset.

Carsharing system and carsharing method

A carsharing system includes circuitry configured to: receive, from a user, a usage request for requesting a reservation for use of a vehicle which is supplied for a vehicle rental service; permit the reservation for use of the vehicle when the reception unit receives the usage request and no reservation for use of the vehicle has been made at time of receiving the usage request; and give, when the reservation for use of the vehicle is determined, a permission for locking or unlocking by using electronic information to the user at a date and a time on which the vehicle is used.

Carsharing system and carsharing method

A carsharing system includes circuitry configured to: receive, from a user, a usage request for requesting a reservation for use of a vehicle which is supplied for a vehicle rental service; permit the reservation for use of the vehicle when the reception unit receives the usage request and no reservation for use of the vehicle has been made at time of receiving the usage request; and give, when the reservation for use of the vehicle is determined, a permission for locking or unlocking by using electronic information to the user at a date and a time on which the vehicle is used.

PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential from a key device associated with a user using a first wireless connection. The access control system may be further adapted to verify the credential with a preliminary authentication for the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to verifying the credential with the preliminary authentication. The access control system may be adapted to determine an intent of the user to access the asset. The access control system may identify the credential includes a pattern in the preliminary authentication. The access control system may be further adapted to provide a command to grant access to the asset.

PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential from a key device associated with a user using a first wireless connection. The access control system may be further adapted to verify the credential with a preliminary authentication for the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to verifying the credential with the preliminary authentication. The access control system may be adapted to determine an intent of the user to access the asset. The access control system may identify the credential includes a pattern in the preliminary authentication. The access control system may be further adapted to provide a command to grant access to the asset.

Electronic lockbox with interface to other electronic locks
11335150 · 2022-05-17 · ·

An electronic lock system that uses an intermediary controller (“IMC”), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (“WPC”), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC's memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC's memory.

Electronic lockbox with interface to other electronic locks
11335150 · 2022-05-17 · ·

An electronic lock system that uses an intermediary controller (“IMC”), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (“WPC”), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC's memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC's memory.

SYSTEM AND METHOD FOR USING A MOBILE DEVICE AS AN INPUT DEVICE FOR SURVEYS AT A LIVE EVENT
20230262162 · 2023-08-17 ·

A method is provided for interacting with audience members in an event, each of the potential attendees having available thereto a unique identifier. The method comprises creating, for an attendee, a unique ID (UID) on a mobile wireless device (MWD) by the steps of inputting to the MWD one of the unique identifiers, combining the obtained unique identifier with a UID time stamp at the time of creation of the UID; receiving with a server on a first wireless channel communications from the MWD; registering the UID at the physical location of the event; generating a visual query; displaying on the MWD response indicators; receiving at the server from the registered attendee a response, to the query over the first wireless channel; and storing in a database on the server the received response in association with the displayed query.

SYSTEM AND METHOD FOR USING A MOBILE DEVICE AS AN INPUT DEVICE FOR SURVEYS AT A LIVE EVENT
20230262162 · 2023-08-17 ·

A method is provided for interacting with audience members in an event, each of the potential attendees having available thereto a unique identifier. The method comprises creating, for an attendee, a unique ID (UID) on a mobile wireless device (MWD) by the steps of inputting to the MWD one of the unique identifiers, combining the obtained unique identifier with a UID time stamp at the time of creation of the UID; receiving with a server on a first wireless channel communications from the MWD; registering the UID at the physical location of the event; generating a visual query; displaying on the MWD response indicators; receiving at the server from the registered attendee a response, to the query over the first wireless channel; and storing in a database on the server the received response in association with the displayed query.