Patent classifications
G07C9/215
SYSTEMS AND METHODS OF LOCK AND POWERED LOAD ENUMERATION AND SECURE ACTIVATION
A load control system includes a power supply, a load controller coupled to a load, and a supply controller. The load controller receives a first power having a first current level from the power supply, and uses the first power to cause a plurality of resistors to output a plurality of pre-defined codes. The supply controller receives the plurality of pre-defined codes, evaluates an output condition based on the plurality of pre-defined codes, and causes the power supply to output a second power having a second current level greater than the first level responsive to the plurality of pre-defined codes satisfying the output condition.
Car sharing system and car sharing method
A car sharing system includes a car sharing device. The car sharing device includes a key function unit and a user authentication function unit. The key function unit allows a device of a vehicle that is shared with multiple people to operate by performing ID verification through a process similar to an electronic key of the vehicle. When the device of the vehicle is operated with a mobile terminal, the user authentication function unit obtains key information from an external device via the mobile terminal and performs authentication of the key information. When authentication of the key information is accomplished and use of the vehicle is within a reservation time, the user authentication function unit validates the key function unit. The key information is generated as information that is permitted only a temporary use.
SYSTEM AND METHOD FOR PREMISE MANAGEMENT
Systems and methods for premise management comprising a reservation 5 management module having at least one server, the at least one server arranged in data communication with a user device to receive a request for reservation from the user device to access a premise for a specific duration; and a key generator arranged in data communication with the reservation management module; wherein upon receipt of the request for reservation, the key generator generates a secret key for 10 the user to access the premise for the specific duration, is disclosed. The system may be integrated with other modules including, but not limited to, a lock system and a presence detection system to provide a seamless service to a user.
Access control system and method for use by an access device
Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.
CO-SIGNING DELEGATIONS
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
SYSTEMS AND METHODS FOR LOCATION-BASED AUTOMATED AUTHENTICATION
Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
DEVICE AND METHODS FOR PROVIDING A LOCK FOR PREVENTING UNWANTED ACCESS TO A LOCKED ENCLOSURE
A device for preventing unwanted opening of a locked enclosure includes a lock bolt moveable between a locked position and an unlocked position. A lever arm is movable between disengaged and engaged positions and moves the lock bolt between the locked and unlocked positions. A rotary element is engageable with the lever arm in the engageable position. The rotation of the rotary element when the rotary element is engaged with the lever arm moves the lock bolt between the locked and unlocked positions. A pin normally blocks the lever arm from moving from the disengaged position to the engageable position. A rotatable output gear moves a rack gear and the pin to unblock the lever arm and thereby allowing the lever arm to engage with the rotary element to allow a user to rotate the rotary element to move the lock bolt between the locked and unlocked positions.
Mobile application data identification method and apparatus
Applicant's Smartphone application provides ticket-holding patrons an alternative, digital means of verifying personal identification at entry to a venue or event. The Smartphone application periodically generates a unique QR code (barcode) that contains a unique identifier (i.e., mobile device ID) which prompts the venue/event entry system to recognize the patron. No barcode (serving as a ticket, or authentication/verification, or otherwise) is downloaded from the system server to the Smartphone/mobile device client in contrast to prior art systems.
Locker adaption system and related method for consumer in-door, out-door and curbside goods delivery and pickup services and for merchant store pickup services
The present invention relates to a locker and system for secured delivery of goods to consumer wherein the locker may be 1) positioned within a building or home such that one door is accessible outside the building or home and a second door is accessible within the building or home; 2) positioned on a property, potentially near a curbside and accessible to a delivery vehicle from a street; or 3) positioned at a commercial location such that one door is accessible to the public and a second door is accessible to the workers at the commercial location. Delivery may occur via drone or human with selected access given to the designated locker door. In accordance with the foregoing objects, an embodiment of the present invention generally comprises a service provider, a service client, an operator (seller or inspector), an end user (buyer or end user), and at least one chamber having at least one remotely controlled electronic door in communication with a service provider, service client, and/or operator.
Universal radio receiver apparatus and method
In one aspect, a universal receiver is provided for being operably coupled to a movable barrier operator. The universal receiver includes at least one radio antenna adapted to receive signals transmitted at different frequencies and a controller operably coupled to the at least one radio antenna. The controller is adapted to determine a code of a signal received by the at least one radio antenna at any one of the different frequencies. The controller being further adapted to learn the code in response to a user-independent learning condition being met.