Patent classifications
G07C9/215
SYSTEM AND METHOD FOR ACCESSING SECURE STORAGE LOCKERS
A system comprises a locking mechanism, a mobile device, and a communication device. The communication device is configured to receive an access request from the mobile device. The communication device is further configured to, in response to receiving the access request, generate an expiring electronic key, wherein the expiring electronic key includes an expiration time. The communication device is also configured to send the expiring electronic key to the mobile device. The mobile device is configured to send the access request to the communication device and to receive the expiring electronic key from the communication device via a text message service. The mobile device is also configured to activate the expiring electronic key. The locking mechanism is configured to, in response to the mobile device activating the expiring electronic key, perform a command on the locking mechanism.
Authentication security
A method can include obtaining access code data corresponding to an access code transmitted to a user device. The method can further include monitoring the user device. The method can further include determining, based on the monitoring, that the access code is shared. The method can further include initiating, in response to the determining that the access code is shared, an invalidation of the access code.
Providing wireless access to a secure lock based on various security data
A remote security access procedure for granting access to a wirelessly controlled lock may include one of receiving an address location at a server to setup a temporary access, receiving a security question at the server required to be answered prior to the temporary access being granted, receiving a time window at the server for the temporary access to be granted, encrypting via the server an access credential comprising the address location, the security question and the time window, and transmitting from the server the encrypted access credential to a guest device.
BOOTH, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A booth includes an openable door and a locking mechanism that locks the door. The door is locked in a case where the door is closed, and the door is not locked in a case where a predetermined condition is satisfied.
VISUAL BIOMETRIC AUTHENTICATION SUPPLEMENTED WITH A TIME-BASED SECONDARY AUTHENTICATION FACTOR
Various features pertain to two-factor authentication. A user seeking access to the secure facility or system generates a time-limited Quick Response (QR) code with his or her smartphone for display on a touchpad screen of the smartphone. The user presents the display of the QR code to a video camera of an authentication system that controls access to the secure facility or system. The video camera captures both the QR code on the smartphone screen and an image of the user. The authentication system then identifies the user based on a biometric analysis of the image of the user and confirms the authentication by verifying that the QR code corresponds to an authorized user. The QR code may be generated based on a secret key stored within the smartphone and the current date/time, with valid authorization limited to a narrow time window following generation of the QR code. Alternatively, the authentication code may be continuously or periodically transmitted as an infrared signal (IR) by a device such as smart glasses.
Mobile application data identification method and apparatus
Applicant's Smartphone application provides ticket-holding patrons an alternative, digital means of verifying personal identification at entry to a venue or event. The Smartphone application periodically generates a unique QR code (barcode) that contains a unique identifier (i.e., mobile device ID) which prompts the venue/event entry system to recognize the patron. No barcode (serving as a ticket, or authentication/verification, or otherwise) is downloaded from the system server to the Smartphone/mobile device client in contrast to prior art systems.
UNATTENDED SMART PROPERTY SHOWING
Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.
Providing credential set when network connection is unavailable
It is provided a method for providing a credential set to a credential carrier for gaining access to a physical space. The method is performed in a credential provider and comprises the steps of: preloading a plurality of credential sets from a server into a local memory, each credential set being usable to gain access to a physical space and each credential set comprising a first validity time; wherein, when a network connection between the credential provider and the server is unavailable, performing the following steps: obtaining a request to provide a credential set for a physical space; retrieving a credential set from the local memory, the credential set being usable to gain access to the physical space indicated in the request; and providing, as long as the first validity time of the credential set has not expired, the retrieved credential set to a credential carrier.
System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
A system and method for biobehavioral identification may include a user device, a secure system/client device, and a server. The elements of the system work together to monitor the biologic features (e.g., fingerprints, pupils, or the like) and behavior (e.g., wake time, exercise time, location) to verify the authenticity of a user requesting access to a database and/or secure facility.
Real-time Ticket Server for Vacated Stadium Seats
A ticket exchange server is configured to monitor seat usage in a stadium during an event. The ticket exchange server provides a first ticket for a seat to a first client device in response to a request from a first user of the first client device. The ticket exchange server unlocks the seat in response to detecting a presence of the first user at the seat. The ticket exchange server receives an indication from the first user surrendering the seat prior to completion of the event and locks the seat. The ticket exchange server provides a second ticket for the seat for a remainder of the event to a second client device of a second user in response to a request for the seat from the second client device. The ticket exchange server unlocks the seat in response to detecting a presence of the second user at the seat.