G07C9/215

Booth, information processing system, and non-transitory computer readable medium
11893848 · 2024-02-06 · ·

A booth includes an openable door and a locking mechanism that locks the door. The door is locked in a case where the door is closed, and the door is not locked in a case where a predetermined condition is satisfied.

Car sharing system

A car sharing system includes a car sharing device installed in a vehicle. The car sharing device is configured to perform ID verification via an electronic key system of the vehicle in a state in which key information registered to the mobile terminal has been authenticated to allow an onboard device to be operated by the mobile terminal. The car sharing system includes a key function unit that implements a smart function to perform the ID verification through bidirectional short-range wireless communication with the electronic key system, a determination processing unit that determines whether or not a condition for permitting actuation of the smart function has been satisfied, and an actuation switching unit that validates the smart function if the condition for permitting actuation of the smart function has been satisfied.

Interactive image-based communication using image coding
10482558 · 2019-11-19 · ·

Embodiments of a system and method for interactive barcode communication are described. In one embodiment, a mobile device presents a barcode to an information or transaction receptacle associated with the point of entry device. One embodiment provides for a method of transmitting data from an unconnected point of access device using an interactive barcode communication system on a mobile device, where the method comprises accessing a set of data on a point of access device, wherein the point of access device is unconnected from a data network with access to a central system database; dividing the set of data into multiple sections; incorporating the multiple sections into scan images for display during per-user transactions at the point of access device; and displaying the point of access data along with per-user transaction data during an interactive barcode communication transaction.

Systems and methods for location-based automated authentication

Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

UNATTENDED SMART PROPERTY SHOWING
20240135474 · 2024-04-25 ·

Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.

System and method for permitting an action based on verification information and a challenge token

A computing device creates verification information and a challenge token and sends the verification information and token to a server. A server receives a command and authentication information and uses the verification information to verify the authentication information. The server creates authentication credentials based on the authentication information and the challenge token. The computing device receives the command and the authentication credentials from the server, determines whether the credentials are valid, and then processes the command if the credentials are valid.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Air conditioner

An air conditioner is installed in a target space. An operating state is switched based on a command sent from a portable communication terminal. The air conditioner includes a specific information storage component, a specific information notification component that gives notification of the specific information to the communication terminal, a command receiving component that receives the command sent from the communication terminal, and an actuator drive component that executes a switching control that switches action of an actuator based on the command received. The specific information includes identification information and operable period information that designates an operable period during which the operating state is switchable by the communication terminal. The actuator drive component does not execute the switching control in response to the command sent from the communication terminal for which the operable period designated in the operable period information of which notification was given has expired.

CONFIGURING ACCESSING RIGHT TO ELEVATOR CONTROL SYSTEM
20190276272 · 2019-09-12 ·

A control system of an elevator can be communicated with by a mobile control device to execute a maintenance and/or installation for the elevator. The control system includes a receiving element for receiving a request to establish a communication connection from the mobile control device, at least one processor to perform a first identification whether the mobile control device is authorized to communicate with the elevator, the at least one processor to perform a second identification whether a user of the mobile control device is authorized for using this mobile control device and/or for servicing this elevator, the at least one processor for matching a right of access of the mobile control device to the elevator depending on results of the first and the second identification, and a communication element to establish the requested communication connection according the matched right of access of the mobile control device.

Vehicle remote key system and smart key authentication method for the same

A smart key authentication method for a vehicle remote key system that includes a smart key performing bi-directional communication with a vehicle to control the vehicle and a vehicle authentication module provided at the vehicle to authenticate the smart key is provided. The smart key authentication method includes generating, by the vehicle authentication module, a random number and sharing the random number with the smart key and performing a first authentication process based on the random number, and performing, by the vehicle authentication module, a second authentication process by comparing at least one location information value among an access point (AP) list, a satellite-based positioning sensor value, or a geomagnetic sensor value, which are respectively measured at the vehicle and at the smart key and determining whether or not to permit an authentication to the smart key.