Patent classifications
G07C9/22
System and method to authorize the use of a BEV charging apparatus by a short-term renter
The disclosure generally pertains to systems and methods for authorizing the use of a battery electric vehicle (BEV) charging apparatus by a short-term renter. In an example method, a processor provides an authorization for use of a BEV charging apparatus by a first individual. The BEV charging apparatus is located on the premises of a building. The processor further enables access to the BEV charging apparatus over a designated period of time for use by the first individual and configures a first lock to prevent unauthorized entry by the first individual into a first portion of the building. In one scenario, the first individual is a short-term renter, the BEV charging apparatus is located in a garage of the building, the first portion of the building is a first room of the building, and the first lock is installed in a door leading into the first room of the building.
Interactive local information interface
Example implementations include a method, apparatus and computer-readable medium for managing and communicating local information of an area, comprising receiving a user identification information of a user in the area. The implementations further include determining a user identification of the user based on the user identification information. Additionally, the implementations further include obtaining a first information based on the user identification, wherein the first information comprises a first set of local information associated with the area. Additionally, the implementations further include instructing display of the first information. Additionally, the implementations further include receiving a user input from the user in response to the first information. Additionally, the implementations further include instructing display of a second information based on the user identification and the user input, wherein the second information comprises a second set of local information of the area based on at least one local device and the user input.
Door system with authentication and activation
A detection sensor or a user device is used to aid in providing authentication and activation of a door system when a user tries to access the door for ingress and egress. Operating parameters of the door systems may be set to allow ingress and egress only when a user is identified and authorized. As such, the operating parameters of the door systems may include authentication and activation parameters such that the door systems are controlled, at least in part, based on the presence of a user and/or a user device and the identification of the specific user. As such operating parameters may be different for different users or types of users. Moreover, the user device may be used to authenticate a user and control ingress and egress through the door automatically or through an authentication action taken by the user.
Door system with authentication and activation
A detection sensor or a user device is used to aid in providing authentication and activation of a door system when a user tries to access the door for ingress and egress. Operating parameters of the door systems may be set to allow ingress and egress only when a user is identified and authorized. As such, the operating parameters of the door systems may include authentication and activation parameters such that the door systems are controlled, at least in part, based on the presence of a user and/or a user device and the identification of the specific user. As such operating parameters may be different for different users or types of users. Moreover, the user device may be used to authenticate a user and control ingress and egress through the door automatically or through an authentication action taken by the user.
CREDENTIALING METHOD AND APPARATUS FOR FACILITY ACCESS
A credentialing method and apparatus for facility access. The apparatus can include a system that includes one or more BLE beacons located within proximity to a facility, where one or more of the beacons identifies a location or other information unique to its proximity to the facility. The apparatus can further include an eBadge used by a person seeking access to the facility. The eBadge can also in some embodiments be a BLE beacon. Interaction between the one or more BLE beacons, a credentialing provider's app operating on the person's mobile device, and the person's eBadge operate in the system to perform a method of controlled access to the facility. In some embodiments, administrators with access to the credentialing provider's app also can control, monitor, report, and observe details concerning such facility access.
CREDENTIALING METHOD AND APPARATUS FOR FACILITY ACCESS
A credentialing method and apparatus for facility access. The apparatus can include a system that includes one or more BLE beacons located within proximity to a facility, where one or more of the beacons identifies a location or other information unique to its proximity to the facility. The apparatus can further include an eBadge used by a person seeking access to the facility. The eBadge can also in some embodiments be a BLE beacon. Interaction between the one or more BLE beacons, a credentialing provider's app operating on the person's mobile device, and the person's eBadge operate in the system to perform a method of controlled access to the facility. In some embodiments, administrators with access to the credentialing provider's app also can control, monitor, report, and observe details concerning such facility access.
Physical access control system and method
An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.
Physical access control system and method
An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.
Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance
A method of providing visual feedback to a driver based on data collected during vehicle operation. A processor at the vehicle analyzes vehicle data and determines when predetermined threshold values have been reached for particular parameters. Whenever such a threshold is reached, an audible indication is provided to the driver, indicating that the baseline has been exceeded. Certain parameters have at least two threshold values. When a first threshold value is reached, an alert is presented to the driver, but no data is recorded or reported. When a second threshold value is reached, another alert is presented to the driver, and data is recorded for reporting to a driver manager or supervisor. This approach provides a driver warning, that if they correct the triggering behavior, their supervisor is never notified of that behavior. However, if the behavior escalates, and the second threshold is breached, the behavior is recorded.
Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance
A method of providing visual feedback to a driver based on data collected during vehicle operation. A processor at the vehicle analyzes vehicle data and determines when predetermined threshold values have been reached for particular parameters. Whenever such a threshold is reached, an audible indication is provided to the driver, indicating that the baseline has been exceeded. Certain parameters have at least two threshold values. When a first threshold value is reached, an alert is presented to the driver, but no data is recorded or reported. When a second threshold value is reached, another alert is presented to the driver, and data is recorded for reporting to a driver manager or supervisor. This approach provides a driver warning, that if they correct the triggering behavior, their supervisor is never notified of that behavior. However, if the behavior escalates, and the second threshold is breached, the behavior is recorded.