G07C9/215

HEALTH SERVICE SYSTEM
20230070592 · 2023-03-09 · ·

A health service system for caring for the health of a patient. In one example, the health service system operates to present media content in association with a telehealth consultation. The health service system generates a virtual waiting room for display on a patient device, which presents a media content presentation. After the media content presentation has concluded, the health service system facilitates the telehealth consultation between a patient and a care provider. In some configurations the health service system further includes at least one hub care facility. The hub care facility includes a locked door with a scanner that unlocks the locked door upon scanning a time sensitive door unlock code; and a locked medication locker with a scanner that unlocks the locked medication locker upon scanning a medication locker unlock code.

System and method for permitting a request after verifying knowledge of first and second secrets

A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party. The security component initiates transmissions to the computing device of first and second information indicating knowledge of first and second secrets provisioned on the computing device. The computing device, upon verifying the knowledge of first and second secrets, then permits the requested action.

Autonomous mobile delivery robot and chain of custody system

Disclosed are a system and a method that includes a robotic unit configured to deliver items (e.g., medicine, foodstuff, linens, equipment, etc.) to sites (e.g., rooms, offices, etc.) and/or individuals (e.g., patients, pharmacists, technician, etc.) throughout a facility (e.g., hospital, office building, mailroom, manufacturing facility, etc.). The robotic unit is a mobile unit that operates autonomously to follow predetermined or programmed routes throughout the facility to deliver the items. The system is configured to maintain a chain of custody for the items. In addition, the robotic unit is configured to only allow designated items to be delivered to designated sites and/or to authorized individuals. This can be achieved by the robotic unit having a plurality of containers that are locked within a storage space of the robotic unit, and are only accessible upon successful completion of an authorization process.

CLOUD DOOR LOCK CONTROL SYSTEM WITH IDENTIFICATION OF TIME VARIED 2D CODES
20230062621 · 2023-03-02 ·

A cloud door lock control system with identification of time varied 2D codes is provided. A cloud device transmits the encryption codes of doors to be opened, the time periods for opening the doors, and the user's encryption codes to the handset through a communication channel and the handset stores these values in a memory. A mobile phone APP receives these values and encrypts them by using a specific encrypting code. The encoding way for the encoding unit is time varied, that is, the QR code from the encoding unit is only retained for a preset time period; after the preset time period has elapsed, the encoding unit generates another QR code. When the cloud device receives the QR code from a card reader, it is decoded. These decoded data is compared with those stored in the cloud device to determine whether the door is necessary to be opened.

Methods of estimating a throughput of a resource, a length of a queue associated with the resource and/or a wait time of the queue

Aspects of the disclosure describe estimating a throughput of a resource within a venue. A server may determine an operating throughput of the resource. The server may receive event schedule data identifying a plurality of scheduled times corresponding to a plurality of events occurring at one or more of the resource and nearby points of interest, which may cause a throughput of the resource to deviate from the operating throughput of the resource. The server may estimate the throughput of the resource based on the operating throughput and the event schedule data. Based on the estimated throughput, the server may perform one or more actions.

SYSTEM AND METHOD OF ENROLLING USERS OF A WIRELESS BIOMETRIC LOCKSET

A method of enrolling a user at a biometric lockset is described. The method includes receiving user access information from a mobile device of an administrative user of the biometric lockset. The user access information indicates to the biometric lockset to enter an enrollment mode in which a user identity is associated with fingerprint data in a user entry within a memory of the biometric lockset. A plurality of different light codes are displayed on the lockset, each one of the plurality of light codes representative of a different state of fingerprint data capture. A message is transmitted to the mobile device, and corresponds to the light code displayed at the lockset. The completed fingerprint data is stored in association with the user identity of the user in the user entry.

EXPANDING TIME WINDOW FOR REMOTE COMMANDS
20170372537 · 2017-12-28 ·

A vehicle includes: receiver(s), a timer counting time, memory, and processor(s) configured to: receive a timestamped signal from a fob; compare the timestamp to a time window; reject the timestamp if the timestamp is outside the time window; expand the time window with the counted time; compute the time window as a trigonometric function of the counted time and a predetermined angle.

Managing real estate listing showings based on multiple factors

A specialized server within a real estate showing management system creates a showing appointment for a showing agent to show a listing and a set of geo-fences around the listing when the appointment is created. At a particular time before the showing, the specialized server notifies a showing agent mobile device to download the set of geo-fences and, when requested, provides the set to the mobile device. The mobile device notifies the specialized server when it breaches a geo-fence within the set. The specialized server determines that the showing has started when the notification and the beginning time of the showing appointment are within a predetermined time range. The specialized server then notifies property electronic devices to turn on.

CO-SIGNING DELEGATIONS
20230169812 · 2023-06-01 ·

It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
20230177906 · 2023-06-08 ·

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.