Patent classifications
G07C9/22
On demand access control authorization using mobile devices
A method of controlling access to at least one access point is provided. The method comprising: transmitting, using a requesting device, an access request to an access device; generating, using the access device, an authorization information request in response to the access request; generating an authorization request in response to the authorization information request; transmitting, using the requesting device, the authorization request to an authorization service; generating, using the authorization service, an authorization token in response to the authorization request; transmitting, using the authorization service, the authorization token to the requesting device; transmitting, using the requesting device, the authorization token to the access device; validating, using the access device, the authorization token; and adjusting, using the access device, at least one access point.
On demand access control authorization using mobile devices
A method of controlling access to at least one access point is provided. The method comprising: transmitting, using a requesting device, an access request to an access device; generating, using the access device, an authorization information request in response to the access request; generating an authorization request in response to the authorization information request; transmitting, using the requesting device, the authorization request to an authorization service; generating, using the authorization service, an authorization token in response to the authorization request; transmitting, using the authorization service, the authorization token to the requesting device; transmitting, using the requesting device, the authorization token to the access device; validating, using the access device, the authorization token; and adjusting, using the access device, at least one access point.
CONTROL METHOD BASED ON USER AUTHENTICATION USING DETECTION SENSOR AND DEVICE USING THEREOF
Disclosed is a control method of a control device, the control method including determining whether a movable object is located in a first area using a detection sensor, activating a first mode among operation modes of the control device when it is determined that the movable object is located in the first area, acquiring user confirmation information from a terminal when the first mode is activated wherein the user confirmation information corresponds to user-specific information stored in the terminal and is provided to the terminal by a server before the terminal provides the user confirmation information to the control device, transmitting processing request information based on the user confirmation information to the server so that the server performs processing on the user confirmation information, acquiring a processing result for the user confirmation information from the server, and providing the processing result for the user confirmation information to the terminal.
CONTROL METHOD BASED ON USER AUTHENTICATION USING DETECTION SENSOR AND DEVICE USING THEREOF
Disclosed is a control method of a control device, the control method including determining whether a movable object is located in a first area using a detection sensor, activating a first mode among operation modes of the control device when it is determined that the movable object is located in the first area, acquiring user confirmation information from a terminal when the first mode is activated wherein the user confirmation information corresponds to user-specific information stored in the terminal and is provided to the terminal by a server before the terminal provides the user confirmation information to the control device, transmitting processing request information based on the user confirmation information to the server so that the server performs processing on the user confirmation information, acquiring a processing result for the user confirmation information from the server, and providing the processing result for the user confirmation information to the terminal.
RADIO FREQUENCY IDENTIFIER APPARATUS FOR ACCESS CONTROL AND USER IDENTIFICATION
A method includes sending a first safety instruction to a machine in response to, within an entry window of time, receiving an open alert that a movable barrier is in an open state, where the movable barrier is at an entry point of an enclosure protecting personnel from the machine, receiving tag information of a person from a reader at the movable barrier, and confirming that the tag information belongs to a person authorized to enter the enclosure. The method includes sending a second safety instruction to the machine in response to, within the entry window of time, receiving the open alert, and without receiving tag information or confirming that the tag information belongs to a person authorized to enter the enclosure. The first and second safety instructions are different and the first safety instruction is less restrictive than the second safety instruction in terms of actions to prevent injury.
RADIO FREQUENCY IDENTIFIER APPARATUS FOR ACCESS CONTROL AND USER IDENTIFICATION
A method includes sending a first safety instruction to a machine in response to, within an entry window of time, receiving an open alert that a movable barrier is in an open state, where the movable barrier is at an entry point of an enclosure protecting personnel from the machine, receiving tag information of a person from a reader at the movable barrier, and confirming that the tag information belongs to a person authorized to enter the enclosure. The method includes sending a second safety instruction to the machine in response to, within the entry window of time, receiving the open alert, and without receiving tag information or confirming that the tag information belongs to a person authorized to enter the enclosure. The first and second safety instructions are different and the first safety instruction is less restrictive than the second safety instruction in terms of actions to prevent injury.
Digital pass verification systems and methods
Digital pass verification systems and methods are disclosed herein. One or more servers are to distribute instructions on a network. The instructions, when executed, cause a first device carried by a person to at least: access a result of a diagnostic test performed on the person, the result provided by a second device; generate a machine-readable code in response to the result being negative; and display the machine-readable code on a display of the first device to enable the person to gain access to a location.
Digital pass verification systems and methods
Digital pass verification systems and methods are disclosed herein. One or more servers are to distribute instructions on a network. The instructions, when executed, cause a first device carried by a person to at least: access a result of a diagnostic test performed on the person, the result provided by a second device; generate a machine-readable code in response to the result being negative; and display the machine-readable code on a display of the first device to enable the person to gain access to a location.
System and method for a health status display
Disclosed is a method for displaying a health registry-issued vaccination certification of a user on a user-mobile device, said method comprising the steps of: coupling the user-mobile device to a health registry over a network for display of a health registry-issued vaccination certification for the user; and outputting a visual display from the user-mobile device certifying the user's vaccination status.
SYSTEM FOR MANAGING ACCESS TO A VEHICLE BY A SERVICE PROVIDER THAT IS TO PROVIDE A SERVICE ASSOCIATED WITH THE VEHICLE
In some implementations, a system may receive an access request associated with an agent and the vehicle. The system may authenticate, based on an agent identification associated with the agent, the agent in association with providing the vehicle service. The system may send, based on authenticating the agent, an authorization request to a user associated with the vehicle, wherein the authorization request is sent to a user device associated with the user that enables the user to authorize the agent to access the vehicle in association with providing the vehicle service. The system may receive, from the user device, a user authorization that authorizes the agent to access the vehicle. The system may configure the vehicle to enable the agent to access the vehicle via a client device associated with the agent.