Patent classifications
G07C9/215
QUEUING SYSTEM
A technique for controlling access to one or more attractions is achieved using a number of access keys, each being issued to one or more users. An electronic queue management part manages a virtual queue in respect of each attraction and receives electronic requests for attraction access, each request relating to an access key and being for the users associated with it to access a particular attraction. Receipt of each request causes the respective users to be added to a corresponding virtual queue. A time at which each group of users reaches the front of the virtual queue and can access the attraction is determined. The users access the attractions by presenting an access key to an access control part, in communication with the electronic queue management part. Only a user presenting an access key at the correct time for accessing the attraction is allowed access to the attraction.
System and method for performing an action based upon two-party authorization
An action is permitted to be performed on a computing device only after the action has been confirmed by two or more authorized and/or authenticated parties. A security component receives a request from to initiate an action on a computing device. Before the action is allowed to be initiated on the computing device the security component requires the authentication of first and second parties or authorizations from first and second parties, or both the authentications of and authorizations from first and second parties. After receiving the required authorizations and/or successfully performing the required authentications, the security component allows the requested action to be initiated on the computing device.
METHOD AND APPARATUS FOR INCREASING RELIABILITY IN MONITORING SYSTEMS
The disclosure relates to a technology for allowing access to an area having a blocked entrance, wherein the blocking of the entrance is controlled by an access controller arranged to unblock the entrance upon receipt of an authorized credential. The technology is implemented to repeatedly updating an override credential in the access controller, sending updated override credential the access controller to a remote node, repeatedly checking the connectivity between the remote node and the access controller, detecting failure of connectivity between the access controller and the remote node, setting the override credential as an authorized credential in the access controller in response to the detection of failure of connectivity, and allowing access through the blocked entrance upon receipt of the override credential in an access request to the area received by the access controller.
Apparatus, systems, and methods for receiving and temporarily maintaining a delivery item and dynamically initiating a dispatched logistics operation for a storage receptacle
A system for receiving and temporarily maintaining a delivery item and dynamically initiating a dispatched logistics operation for a storage receptacle. The storage receptacle has an entrance opening for receiving the delivery item, a temporary storage area for temporarily maintaining the delivery item once deposited with the storage receptacle, and a retrieval door providing selective access to the temporary storage area. The system includes a backend server that maintains a management profile related to the storage receptacle, a bridge node mounted to the storage receptacle, and a wireless accessory sensor node having at least one sensor that monitors for a change in state of the storage receptacle. The wireless accessory sensor node broadcasts an updated advertising signal. The bridge node transmits retrieved event information to the backend server at a reporting time, and the backend server initiates the dispatched logistics operation from comparing the retrieved event information to location information.
Realty virtual assistant
A realty virtual application for agents and clients. Agents and clients enter information into the application on their personal devices, and this information is stored on a central database. The application runs algorithms to find properties based on client preferences, and presents them to the agent in a report. The agent then sends these properties to the client through the application, and the client may accept or deny potential showing times. The client may also send messages to the agent, or give feedback or rate the property through the application. The client may share the property with friends or family through the application.
Dynamically authorizing access to restricted areas
A dynamic access server engine on a server may be configured to receive a request for access to a restricted area during a specific time period. If there is no scheduling conflict the engine can schedule the access period. Additionally, the request may be associated with one or more invitees. For each invitee, the engine determines whether the invitee is authorized to temporarily access the restricted area. If authorized, the engine automatically grants to the invitee temporary access to the restricted area during the scheduled period.
Smart home short-term rental system
Systems and methods are provided to generate an access code specific to a user of an online marketplace to use to enter a first accommodation during a first reservation time frame and a second accommodation during a second reservation time frame and to send the access code specific to the user to a computing device at the first accommodation and a computing device at the second accommodation to use to enter the first accommodation during the first reservation time period and the second accommodation during the second reservation time period. The access code is automatically removed from the computing device at the first accommodation and the computing device at the second accommodation at the end of the first reservation time period and at the end of the second reservation time period, respectively.
Enhanced multi-compartment logistics receptacle apparatus, systems, and methods for receiving and temporarily maintaining a delivery item and causing a backend server to initiate a dispatched logistics operation
An enhanced multi-compartment connected logistics receptacle system includes a storage receptacle, a bridge node, and wireless accessory sensor node with a plurality of sensors. A first subset of the sensors is disposed relative to a first monitored receptacle compartment and a second subset of the sensors is disposed relative to a second monitored receptacle compartment. The plurality of sensors monitor for a change in state of the storage receptacle. The wireless accessory sensor node detects the storage receptacle's state change based upon sensor data and broadcasts a signal with a flag set indicating there is event information available for upload. The bridge node detects the flag set, retrieves the event information available for upload from the wireless accessory sensor node, and transmits the retrieved event information to a backend server to cause the backend server to initiate a dispatched logistics operation related to the storage receptacle.
TIME-BASED CODES FOR REMOTELY DEPLOYED LOCKS
An access-control system comprises using an access management server, a lock, and time-based codes. When a time-based code from the access management server does not match the time-based code computed by the lock, the lock may check temporally proximate time-based codes. Upon a determination that a temporally proximate time-based code matches, the lock may adjust its clock to re-sync with the access management server clock. Additionally, the lock may implement soft matching by determining that an input code is a match if it matches either a current or a proximate time-based code. Additionally, the access management server and lock may implement multiple parallel time-based code instances to facilitate additional functionality.
Alarm scoring based on alarm event data in a storage environment having time-controlled access
According to some embodiments, a system is provided. The system comprises a computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises, receive alarm event data associated with an alarm event, store the alarm event data associated with the alarm event in at least one data store of the computing system, enforce an access control policy on the alarm event data stored in the at least one data store, the access control policy restricting access to the alarm event data based on time and a plurality of roles of a plurality of users of the computing system, perform at least one analytics operation on the alarm event data associated with the alarm event, and update a value of a current alarm score based on an output of the at least one analytics operation.