Patent classifications
G07C9/215
Systems and methods for location-based automated authentication
Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
Secured delivery system and method of using same
A secured delivery system can include a doorbell device comprising a scanner, and a locking mechanism operatively connected to the scanner, a computer processor or a cloud server and a structure, such as a residence or lockbox. A key, which can be in the form of a bar code, can be generated and sent to delivery or service personnel needing access to the structure. The delivery or service personnel present the bar code to the scanner. Upon reading the bar code, the locking mechanism is unlocked thereby allowing access to the structure.
PROVIDING CREDENTIAL SET WHEN NETWORK CONNECTION IS UNAVAILABLE
It is provided a method for providing a credential set to a credential carrier for gaining access to a physical space. The method is performed in a credential provider and comprises the steps of: preloading a plurality of credential sets from a server into a local memory, each credential set being usable to gain access to a physical space and each credential set comprising a first validity time; wherein, when a network connection between the credential provider and the server is unavailable, performing the following steps: obtaining a request to provide a credential set for a physical space; retrieving a credential set from the local memory, the credential set being usable to gain access to the physical space indicated in the request; and providing, as long as the first validity time of the credential set has not expired, the retrieved credential set to a credential carrier.
Mobile credential management system for vehicle key box access control
A mobile credential management system includes a processing system and a memory system with computer-executable instructions that, when executed by the processing system, cause the processing system to perform a plurality of operations. The operations include issuing a credential to a mobile device operable to trigger opening of a releasable latch of a vehicle key box responsive to receiving the credential within an assigned window of time. The operations also include monitoring for a releasable latch opened indicator from the vehicle key box indicative of the vehicle key box acknowledging the credential and providing access to a vehicle key corresponding to a vehicle assigned to the vehicle key box. The operations further include sending a notification to a user system responsive to receiving the releasable latch opened indicator, the notification identifying the vehicle and information about a user of the mobile device.
System and method for managing showings of real estate listings based on multiple factors
A specialized server within a real estate showing management system creates a showing appointment for a showing agent to show a listing and a set of geo-fences around the listing when the appointment is created. At a particular time before the showing, the specialized server notifies a showing agent mobile device to download the set of geo-fences and, when requested, provides the set to the mobile device. The mobile device notifies the specialized server when it breaches a geo-fence within the set. A key controller also notifies the specialized server when the showing agent opens the key controller to retrieve a key to the listing from the key controller. The specialized server determines that the showing has started when the two notifications and the beginning time of the showing appointment are within a predetermined time range. The specialized server then notifies property electronic devices to turn on.
Systems and methods of lock and powered load enumeration and secure activation
A load control system includes a power supply, a load controller coupled to a load, and a supply controller. The load controller receives a first power having a first current level from the power supply, and uses the first power to cause a plurality of resistors to output a plurality of pre-defined codes. The supply controller receives the plurality of pre-defined codes, evaluates an output condition based on the plurality of pre-defined codes, and causes the power supply to output a second power having a second current level greater than the first level responsive to the plurality of pre-defined codes satisfying the output condition.
Theme park gamification, guest tracking and access control system
A system for providing gamification of a destination such as a theme park where guests use a venue app with an optional electronic ticket that allows for both self-serve access into the destination and tracking of individual guests throughout various access points. An extended range ID such as an RFID is provided to the guest either in the electronic ticket or in a wearable. Using combinations of RFID readers, pressure sensors and cameras the system tracks guests down the ride seat and tracks the movements of guided, free-floating and free-ranging vehicles. Using the combination of guest and vehicle tracking information along with information provided by a destination gaming system, the destination guest experience is customized including various effects for rides and attractions. Spot cameras are placed at tracked locations such as rides seats, where images are captured in response to either external triggers generated by the system or guest indications.
System and method for premise management
Systems and methods for premise management comprising a reservation 5 management module having at least one server, the at least one server arranged in data communication with a user device to receive a request for reservation from the user device to access a premise for a specific duration; and a key generator arranged in data communication with the reservation management module; wherein upon receipt of the request for reservation, the key generator generates a secret key for 10 the user to access the premise for the specific duration, is disclosed. The system may be integrated with other modules including, but not limited to, a lock system and a presence detection system to provide a seamless service to a user.
METHOD FOR SHARING, COLLECTING AND PROCESSING DATA AND RELATED SYSTEM
A method is described for sharing, collecting and processing data designed to allow at least one user to locate a plurality of structures, to exploit at least one service provided by a plurality of structures and to pay by the user depending on the actual usage time of the service by the user.
Co-signing delegations
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.