G07C9/22

SYSTEM FOR MANAGING ACCESS TO A VEHICLE BY A SERVICE PROVIDER THAT IS TO PROVIDE A SERVICE ASSOCIATED WITH THE VEHICLE
20230101560 · 2023-03-30 ·

In some implementations, a system may receive an access request associated with an agent and the vehicle. The system may authenticate, based on an agent identification associated with the agent, the agent in association with providing the vehicle service. The system may send, based on authenticating the agent, an authorization request to a user associated with the vehicle, wherein the authorization request is sent to a user device associated with the user that enables the user to authorize the agent to access the vehicle in association with providing the vehicle service. The system may receive, from the user device, a user authorization that authorizes the agent to access the vehicle. The system may configure the vehicle to enable the agent to access the vehicle via a client device associated with the agent.

Machine Learning-Based Platform For User Identification

A system and method are disclosed for identifying a user based on the classification of user movement data. An identity verification system receives a sequence of motion data from a mobile device operated by a target user. From the sequences of motion data, the identity verification system identifies a plurality of identity blocks representing different movements performed by the target user and encodes a set of signature sequences from each identity block into a feature vector. Each feature vector is input to a confidence model to output an identity confidence value for an identity block. An identity confidence value describes a confidence that the movement in the identity block was performed by the target user. The identity confidence value is compared to an operational security threshold and if identity confidence value is above the threshold, the target user is granted access to an operational context.

Machine Learning-Based Platform For User Identification

A system and method are disclosed for identifying a user based on the classification of user movement data. An identity verification system receives a sequence of motion data from a mobile device operated by a target user. From the sequences of motion data, the identity verification system identifies a plurality of identity blocks representing different movements performed by the target user and encodes a set of signature sequences from each identity block into a feature vector. Each feature vector is input to a confidence model to output an identity confidence value for an identity block. An identity confidence value describes a confidence that the movement in the identity block was performed by the target user. The identity confidence value is compared to an operational security threshold and if identity confidence value is above the threshold, the target user is granted access to an operational context.

A SYSTEM AND A METHOD FOR UNLOCKING ITEM/S
20220351126 · 2022-11-03 ·

Aspects of the invention are directed towards a system and a method for unlocking items. One or more embodiments of the invention describe establishing a connection between an item and a user device through a communication channel and receiving an input on the user device to unlock the item after the establishment of the connection. One or more embodiments of the invention further disclose prompting on the user device to provide information before unlocking the item and transmitting an unlock command to the item through the communication channel for unlocking the item after receiving the information.

SYSTEMS AND METHODS FOR VERIFYING PATIENT IMMUNITY
20230092499 · 2023-03-23 ·

A system and method for verifying a patient's immunity to a predetermined pathogen are provided. The contemplated system relies on at least one of patient-specific and exposure data, which could include immunization or vaccination data, to assess the patient's immunity to a predetermined pathogen. If immunity is verified, the patient is selectively issued a digital certificate real-time and/or on-demand used to allow access to a building, gain authorization to conduct predetermined activities, work, travel freely, etc. The immunity certificate may be renewed or revoked if predetermined events occur, such as a rise in body temperature over a predetermined level.

RADIO FREQUENCY IDENTIFIER APPARATUS FOR ACCESS CONTROL AND USER IDENTIFICATION

A component includes a housing mounted at an entry point of an enclosure protecting a machine. The component includes a first RFID sensor, in the housing, that reads a first RFID tag in close proximity to the first RFID sensor indicating a closed status of a movable barrier of the enclosure at the entry point. Opening of the movable barrier allows entry to the enclosure. The component includes a second RFID sensor, in the housing, that reads a second RFID tag of an authorized person. The component includes a barrier access module that sends an open alert that the movable barrier is in an open state in response to the first RFID sensor not being close enough to read the first RFID tag, and an identification module that sends tag information unique to a person from the second RFID tag.

RADIO FREQUENCY IDENTIFIER APPARATUS FOR ACCESS CONTROL AND USER IDENTIFICATION

A component includes a housing mounted at an entry point of an enclosure protecting a machine. The component includes a first RFID sensor, in the housing, that reads a first RFID tag in close proximity to the first RFID sensor indicating a closed status of a movable barrier of the enclosure at the entry point. Opening of the movable barrier allows entry to the enclosure. The component includes a second RFID sensor, in the housing, that reads a second RFID tag of an authorized person. The component includes a barrier access module that sends an open alert that the movable barrier is in an open state in response to the first RFID sensor not being close enough to read the first RFID tag, and an identification module that sends tag information unique to a person from the second RFID tag.

ACCESS CONTROL FOR PROPERTY MANAGEMENT
20230083819 · 2023-03-16 ·

Systems and methods herein provide for cloud-controlled access to an access point. A database maintains a plurality of user datasets and accounts for a plurality of access point management systems. Each account of the access point management systems includes identifies one or more access points associated with a property. Each user dataset includes user identifying information and user access information to one or more access points. A processor processes a request for access to the first access point. A rules engine accesses the database to identify a first user based on the request and a user equipment (UE) of the first user via the user identifying information, identifies a first of the access points based on a beacon transmitted by the first access point, retrieves the user access information, identifies access permission of the first user to the first access point, and grants access to the first user.

ACCESS CONTROL FOR PROPERTY MANAGEMENT
20230083819 · 2023-03-16 ·

Systems and methods herein provide for cloud-controlled access to an access point. A database maintains a plurality of user datasets and accounts for a plurality of access point management systems. Each account of the access point management systems includes identifies one or more access points associated with a property. Each user dataset includes user identifying information and user access information to one or more access points. A processor processes a request for access to the first access point. A rules engine accesses the database to identify a first user based on the request and a user equipment (UE) of the first user via the user identifying information, identifies a first of the access points based on a beacon transmitted by the first access point, retrieves the user access information, identifies access permission of the first user to the first access point, and grants access to the first user.

USE OF A PAYMENT CARD TO UNLOCK A LOCK

Exemplary embodiments may provide keys for unlocking access to a location, like a user room, a secure location, a door at an employee location, a trunk, a closet or other locked location or item, on a payment card. Examples of a payment card include but are not limited to a credit card, a debit card, a smart card, an employee identification card, etc. A secure token that acts as digital key may be uploaded to the payment card. The payment card may then be put in close proximity of a wireless reader at the lock. The wireless reader obtains the secure token and extracts the contents. If the contents are proper, the lock is unlocked. Otherwise, the lock remains locked.