Patent classifications
G07C9/215
Systems and methods for managing infectious disease dissemination
System and method for infectious disease prevention includes transmitting, via a server, a facility credential associated with a facility configured to identify a user operating on an application deployed by server from a mobile computing device. The server receives a user identification test code (UITC) associated with a status of an infectious disease of the user. The server then generates a two-dimensional code associated with the facility credential based on the UITC. The server determines if the two-dimensional code is valid for permitting access to the facility based on the status of the infectious disease. Thereafter, the server activates the two-dimensional code on the mobile computing device for a predetermined period of time. A gatekeeper device responds to the two-dimensional code from the mobile computing device and then permits the user access to the facility within the predetermined period of time based on the facility credential and the two-dimensional code.
MOBILE APPLICATION DATA IDENTIFICATION METHOD AND APPARATUS
Applicant's Smartphone application provides ticket-holding patrons an alternative, digital means of verifying personal identification at entry to a venue or event. The Smartphone application periodically generates a unique QR code (barcode) that contains a unique identifier (i.e., mobile device ID) which prompts the venue/event entry system to recognize the patron. No barcode (serving as a ticket, or authentication/verification, or otherwise) is downloaded from the system server to the Smartphone/mobile device client in contrast to prior art systems.
Method, server, smart terminal and storage device for access authentication
Disclosed is a method for access authentication. The method includes: receiving profile information of a visitor through a server, and generating a visitor code and transmitting the same to a visitor terminal, and generating a random code based on a valid visitor code, and receiving a decoding result based on decoding the random code and the visitor code by the visit terminal, and predetermining an access authority for the visitor for a predetermined time as the decoding result is successfully matched.
Secure container for package delivery
A method includes transmitting, by a handler device associated with package handler, a message to an access control system requesting access to a secure container secured by an electronic lock mechanism; determining, by the access control system, whether the package handler is authorized to access the secure container based on the received message; transmitting, by the access control system, an unlock command to the secure container in response to a determination that the package handler is authorized to access the secure container; and unlocking the electronic lock mechanism of the secure container in response to successful authentication of the unlock command.
FEATURE AMOUNT MANAGEMENT APPARATUS AND METHOD
According to one embodiment, a feature amount management apparatus includes a data generation unit, an ID generation unit, a storage unit, and a deletion unit. The data generation unit generates, from an image, feature amount data indicating a feature amount of biometric information of a person. The ID generation unit generates identification information including expiration date information used for determining an expiration date of the feature amount data. The storage unit stores the feature amount data in correlation with the identification information. The deletion unit deletes the feature amount data when the feature amount data pass the expiration date.
ACCESS CONTROL SYSTEM WITH DYNAMIC ACCESS PERMISSION PROCESSING
Aspects of the disclosure relate to systems and methods for administering access to resources in an access control system. In one implementation, the access control system comprises an electronic lock for restricting access to a resource. An electronic key can deliver a signal based on an access credential to the electronic lock to initiate an unlocking event for facilitating access to the resource. An access validation engine can process access control information related to access conditions. Access to resources may be granted according to scheduled access permissions. In other aspects, access to resources can be granted based on access conditions. The access validation engine can evaluate whether access to a resource is authorized based on a determination that one or more access conditions are satisfied. An unlocking signal can be delivered to the electronic lock in response to a determination that the one or more access conditions are satisfied.
Method and Apparatus for Finding and Accessing an Access Station
A method for access control accepts a first data from a first mobile computing device of a first patron. The first data is representative of at least a certificate and represents an authorization for access. The method further provides the access in response to the first data, and makes a record in the first station. The record includes a second data representing the access and an identifying portion of the certificate. The method further provides, after the access, a third data to a second mobile computing device of any patron. The third data is deliverable by the second mobile computing device to the management system and is representative of the record. The method further accepts a fourth data that is representative of at least an acknowledgment of the record, and deletes the record from the first station in response to the fourth data.
METHOD AND APPARATUS FOR AUTHENTICATING A USER OF A COMPARTMENT INSTALLATION
A method comprising performing a process for authenticating a user of a compartment installation vis--vis a backend system managing the compartment installation. A necessary condition for performing the process for authenticating the user is that a proximity check has revealed that a mobile device of the user is situated at the location of the compartment installation, and/or that an occupancy check has revealed that the compartment installation contains at least one shipment assigned to the user. A corresponding apparatus, a corresponding system and a corresponding computer program are furthermore disclosed.
Key management system
An item management system and a key management system are provided. The key management system includes a plurality of keys, each key including an RFID tag in association therewith; a plurality of key storage positions, each for storing one or more of the plurality of keys; a visual indicator associated with each of the storage positions, the visual indicator configured to indicate a status of one or more of the key storage positions; at least one RFID reader configured to read the RFID tags of the plurality of keys; and at least one processor, coupled to the at least one RFID reader, the at least one processor configured to determine the presence of at least one of the plurality of keys in an associated storage position of the plurality of key storage positions.
Unattended smart property showing
Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.