G07C9/215

Secure door entry system and method
09990787 · 2018-06-05 · ·

A method for controlling access to a secure area via an electronic door entry system includes the steps of: displaying a bar code associated with the door entry system which can be read by a smartphone, the bar code encoding instructions for establishing a communications channel between the smartphone and a remote authentication system where a passcode for the door entry system can be obtained by an authorized person; receiving authentication data for a person over the communications channel from the smartphone; authenticating a person based on the authentication data; communicating a passcode to the smartphone; receiving a passcode input at the door entry system; verifying the passcode; and, generating a door lock release signal for the door entry system if the passcode is verified.

Smart lockbox
09990791 · 2018-06-05 ·

The lockbox contains a microcomputer used in the processes of validating preapproved credentials. One method of obtaining access to the lockbox is by user carrying only an identification card, the lockbox scanning the identification card and transmitting its data to the lockbox's server for validation via an internal cell phone modem's connection through cell towers. The lockbox is also capable of capturing video and audio recordings, storing and categorizing the recordings into data such as traffic or noise levels over varying periods of time; and such data can be transferred to a user's cell phone upon the owner's approval. Additionally, the lockbox is powered by a solar panel power source, making it self-sustaining.

Method and apparatus for streamlining guest entry into a building
09978192 · 2018-05-22 · ·

A method of providing an electronically generated key includes the steps of generating an account for a resident; allowing the resident to access a software application; receiving a request from the resident for an electronic pass; and generating the electronic pass. The method further includes the steps of electronically detecting the electronic pass at a reader; determining whether the electronic pass is valid; and activating a relay if the electronic pass is valid. A device for receiving the request and for activating the relay is also provided.

Expanding time window for remote commands

A vehicle includes: receiver(s), a timer counting time, memory, and processor(s) configured to: receive a timestamped signal from a fob; compare the timestamp to a time window; reject the timestamp if the timestamp is outside the time window; expand the time window with the counted time; compute the time window as a trigonometric function of the counted time and a predetermined angle.

Secure container for package delivery

A method includes transmitting, by a handler device associated with a package handler, a message to an access control system requesting access to a secure container secured by an electronic lock mechanism; determining, by the access control system, whether the package handler is authorized to access the secure container based on the received message; transmitting, by the access control system, an unlock command to the secure container in response to a determination that the package handler is authorized to access the secure container; and unlocking the electronic lock mechanism of the secure container in response to successful authentication of the unlock command.

Systems and methods for location-based automated authentication

Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform is in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted encrypted transitory identifier.

Access control system and method for use by an access device

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.

METHOD AND SYSTEM FOR ACCESS CONTROL
20180061155 · 2018-03-01 ·

The present disclosure generally relates to a computerized method comprising: communicating access details of the facility from the mobile device to the facility for a first authentication process, the mobile device located in the vicinity of the facility initially in a secured state for preventing access thereto; receiving a request notification on the mobile device in response to positive authentication of the access details from the first authentication process, the request notification comprising a request for biometric data of the user; receiving an input of the biometric data on the mobile device; and communicating the biometric data from the mobile device to a host server for a second authentication process, wherein the facility is configured to change from the secured state to an unsecured state in response to positive authentication of the biometric data from the second authentication process, thereby providing, to the user, access to the facility.

Co-signing delegations
12159500 · 2024-12-03 · ·

It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.

Connected Logistics Receptacle Apparatus, Systems, and Methods having Enhanced Status Indication Functionality Related to a Logistics Operation for a Delivery Item Being Deposited by a Parcel Customer
20250005508 · 2025-01-02 ·

A connected logistics receptacle system having enhanced status indication functionality related to a logistics operation for a delivery item being deposited by a parcel customer. The system includes a storage receptacle for receiving the delivery item and a bridge node mounted to the storage receptacle. The bridge node has a bridge node processor and a communication interface operative to communicate with at least a backend server. The system includes a status indicator and a wireless accessory sensor node. The bridge node processor is operative to detect an updated advertising signal broadcast by the wireless accessory sensor node, retrieve event information from the wireless accessory sensor node in response to detecting the updated advertising signal, and toggle the status indicator from a first condition to a second condition based upon a comparison of the event information to a status indicator setting profile.