G07C9/215

AUTHENTICATION SECURITY
20210272402 · 2021-09-02 ·

A method can include obtaining access code data corresponding to an access code transmitted to a user device. The method can further include monitoring the user device. The method can further include determining, based on the monitoring, that the access code is shared. The method can further include initiating, in response to the determining that the access code is shared, an invalidation of the access code.

Automated System for Car Access in Retail Environment
20210192608 · 2021-06-24 ·

A computing device may receive customer information including at least identity information; determine a first set of vehicles for which the customer has been pre-qualified to finance, receive dealership information comprising an inventory of the respective vehicle dealership, wherein a first vehicle dealership has a corresponding inventory, determine that the first vehicle dealership is within a geographic threshold of the customer; validate a user device of the customer to establish a validated user device; and pre-provision the validated user device with a digital master key to create a provisioned user device configured to provide the user device with access rights to each vehicle within the corresponding inventory of the first vehicle dealership.

QUEUING SYSTEM

A technique for controlling access to one or more attractions is achieved using a number of access keys, each being issued to one or more users. An electronic queue management part manages a virtual queue in respect of each attraction and receives electronic requests for attraction access, each request relating to an access key and being for the users associated with it to access a particular attraction. Receipt of each request causes the respective users to be added to a corresponding virtual queue. A time at which each group of users reaches the front of the virtual queue and can access the attraction is determined. The users access the attractions by presenting an access key to an access control part, in communication with the electronic queue management part. Only a user presenting an access key at the correct time for accessing the attraction is allowed access to the attraction.

SYSTEM AND METHOD FOR PERMITTING A REQUEST AFTER VERIFYING KNOWLEDGE OF FIRST AND SECOND SECRETS

A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party. The security component initiates transmissions to the computing device of first and second information indicating knowledge of first and second secrets provisioned on the computing device. The computing device, upon verifying the knowledge of first and second secrets, then permits the requested action.

SYSTEM AND METHOD OF ENROLLING USERS OF A WIRELESS BIOMETRIC LOCKSET

A method of enrolling a user at a biometric lockset is described. The method includes receiving user access information from a mobile device of an administrative user of the biometric lockset. The user access information indicates to the biometric lockset to enter an enrollment mode in which a user identity is associated with fingerprint data in a user entry within a memory of the biometric lockset. A plurality of different light codes are displayed on the lockset, each one of the plurality of light codes representative of a different state of fingerprint data capture. A message is transmitted to the mobile device, and corresponds to the light code displayed at the lockset. The completed fingerprint data is stored in association with the user identity of the user in the user entry.

SYSTEMS AND METHODS FOR LOCATION-BASED AUTOMATED AUTHENTICATION

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Device and methods for providing a lock for preventing unwanted access to a locked enclosure
11846121 · 2023-12-19 · ·

A device for preventing unwanted opening of a locked enclosure includes a lock bolt moveable between a locked position and an unlocked position. A lever arm is movable between disengaged and engaged positions and moves the lock bolt between the locked and unlocked positions. A rotary element is engageable with the lever arm in the engageable position. The rotation of the rotary element when the rotary element is engaged with the lever arm moves the lock bolt between the locked and unlocked positions. A pin normally blocks the lever arm from moving from the disengaged position to the engageable position. A rotatable output gear moves a rack gear and the pin to unblock the lever arm and thereby allowing the lever arm to engage with the rotary element to allow a user to rotate the rotary element to move the lock bolt between the locked and unlocked positions.

System and method for detecting potentially unauthorized access to an enclosure
10997547 · 2021-05-04 · ·

There is disclosed a system and method for detecting potentially unauthorized access to an enclosure. The system and method use an input device, wherein the input device includes a user interface comprising a communication tilt plate with a front side and a back side. The front side comprising an outer touch surface and the back side includes electronic components mounted thereon. The back side also includes a raised center pivot and a plurality of spring loaded switches mounted thereon disposed around the periphery of the back side of the tilt plate. In this way, tilting the communication tilt plate by pressing proximate the periphery of the outer touch surface activates one or more of the spring-loaded switches mounted on the back side of the tilt plate and thereby transmit an access code to a control module. The system and method further include detecting movement of an access barrier of an enclosure and detecting whether a motor and or the access code was used to move the access barrier. The user is notified in the event the access barrier was moved without using the motor and or the access code.

SECURED DELIVERY SYSTEM AND METHOD OF USING SAME
20210142603 · 2021-05-13 ·

A secured delivery system can include a doorbell device comprising a scanner, and a locking mechanism operatively connected to the scanner a computer processor or a cloud server and a structure, such as a residence or lockbox. A key, which can be in the for of a bar code, can be generated and sent to delivery or service personnel needing access to the structure. The delivery or service personnel present the bar code to the scanner. Upon reading the bar code, the locking mechanism is unlocked thereby allowing access to the structure.

Access control system with dynamic access permission processing
11010995 · 2021-05-18 · ·

Aspects of the disclosure relate to systems and methods for administering access to resources in an access control system. In one implementation, the access control system comprises an electronic lock for restricting access to a resource. An electronic key can deliver a signal based on an access credential to the electronic lock to initiate an unlocking event for facilitating access to the resource. An access validation engine can process access control information related to access conditions. Access to resources may be granted according to scheduled access permissions. In other aspects, access to resources can be granted based on access conditions. The access validation engine can evaluate whether access to a resource is authorized based on a determination that one or more access conditions are satisfied. An unlocking signal can be delivered to the electronic lock in response to a determination that the one or more access conditions are satisfied.