Patent classifications
G07C9/22
USE OF A PAYMENT CARD TO UNLOCK A LOCK
Exemplary embodiments may provide keys for unlocking access to a location, like a user room, a secure location, a door at an employee location, a trunk, a closet or other locked location or item, on a payment card. Examples of a payment card include but are not limited to a credit card, a debit card, a smart card, an employee identification card, etc. A secure token that acts as digital key may be uploaded to the payment card. The payment card may then be put in close proximity of a wireless reader at the lock. The wireless reader obtains the secure token and extracts the contents. If the contents are proper, the lock is unlocked. Otherwise, the lock remains locked.
PROVIDING PHYSICAL ACCESS TO A SECURED SPACE BASED ON HIGH-FREQUENCY ELECTROMAGNETIC SIGNALING
This disclosure describes techniques for selectively providing access to a physical space. An example method includes identifying a location of a device associated with an authorized user based on an electromagnetic signal received by at least one sensor from the device. The electromagnetic signal has a frequency that is greater than or equal to 24 gigahertz (GHz). The example method further includes determining that the location of the device is within a threshold distance of a location of a threshold to a secured space and determining that an authentication score indicating that an individual carrying the device is the authorized user is greater than a threshold score. The authentication score is associated with multiple authentication factors identified by the device. Based on determining that the authentication score is greater than the threshold score, the threshold is unlocked and/or opened.
PROVIDING PHYSICAL ACCESS TO A SECURED SPACE BASED ON HIGH-FREQUENCY ELECTROMAGNETIC SIGNALING
This disclosure describes techniques for selectively providing access to a physical space. An example method includes identifying a location of a device associated with an authorized user based on an electromagnetic signal received by at least one sensor from the device. The electromagnetic signal has a frequency that is greater than or equal to 24 gigahertz (GHz). The example method further includes determining that the location of the device is within a threshold distance of a location of a threshold to a secured space and determining that an authentication score indicating that an individual carrying the device is the authorized user is greater than a threshold score. The authentication score is associated with multiple authentication factors identified by the device. Based on determining that the authentication score is greater than the threshold score, the threshold is unlocked and/or opened.
AUGMENTED REALITY TRANSPORTATION SYSTEMS
A processing system may obtain traveler data comprising location data of devices of a plurality of travelers, the travelers having reservations to travel aboard a vehicle of a transportation service provider from a point of departure at a designated time of readiness and obtain timing data of a queue from a service provider system associated with the queue, where at least one traveler of the travelers is to traverse the queue to arrive at the point of departure. The processing system may then calculate arrival times of the travelers based upon the traveler data and based upon the timing data of the queue, determine that an arrival time of the at least one traveler is after the designated time of readiness, and perform at least one remedial action in response to the determining that the arrival time of the at least one traveler is after the designated time of readiness.
ESTABLISHMENT OF SECURE BLUETOOTH CONNECTION TO INTERNET OF THINGS DEVICES, SUCH AS ELECTRONIC LOCKS
Systems and methods are disclosed for managing secure connection between a mobile device and an Internet of things device, such as an electronic lock. In some instances, a mutual authentication process is performed, and public keys are exchanged. Once keys are exchanged, subsequent communication between the devices may be encrypted using a shared key generated using the exchanged keys.
ESTABLISHMENT OF SECURE BLUETOOTH CONNECTION TO INTERNET OF THINGS DEVICES, SUCH AS ELECTRONIC LOCKS
Systems and methods are disclosed for managing secure connection between a mobile device and an Internet of things device, such as an electronic lock. In some instances, a mutual authentication process is performed, and public keys are exchanged. Once keys are exchanged, subsequent communication between the devices may be encrypted using a shared key generated using the exchanged keys.
Access control system with trusted third party
An access control system is provided and includes a control device disposed to restrict access to a secured resource and a networked device disposed in signal communication with the control device. The networked device requests authentication of a user from a trusted device responsive to a presentation of credentials to the control device in a request for access to the secured resource, the credentials are associated with access rights of the user, the networked device is receptive of the authentication, and the control device permits a level of access to the secured resource in accordance with the access rights upon the reception of the authentication.
VEHICLE TRANSPORTATION STORAGE SYSTEM AND METHOD
A transportation storage system and method includes a vehicle having a platform on a chassis, plural storage containers disposed on the platform, and electronic locksets mounted to the storage containers. Each of the storage containers includes multiple module walls that define a cavity to receive an object, and a container door mounted to the module walls at an access end of the storage container to enclose the cavity when in a closed state. The electronic locksets lock the container doors in the closed state, and provide access to the object within the respective cavity in response to receiving a corresponding unlock signal. The storage containers are oriented on the platform such that the container doors are accessible to an individual that is off-board the vehicle or that is on the platform to extract the object from the cavity or to deposit the object into the cavity.
AUTHENTICATION OF WEARABLE DEVICES ASSOCIATED WITH A PREMISES SECURITY SYSTEM
In some embodiments, an authentication device is provided. The authentication device configured to determine that the wearable device is authorized to participate in the premises security system, cause transmission of a first security token that is usable to validate that the wearable device is authorized to participate in the premises security system, in response to the status update, request the first security token from the wearable device, validate that the wearable device is authorized to participate in the premises security system based at least in part on the first security token received from the wearable device and in response to validating that the wearable device is authorized to participate in the premises security system, cause transmission of a second security token to the wearable device where the second security token is usable to trigger a premises security system action.
AUTHENTICATION OF WEARABLE DEVICES ASSOCIATED WITH A PREMISES SECURITY SYSTEM
In some embodiments, an authentication device is provided. The authentication device configured to determine that the wearable device is authorized to participate in the premises security system, cause transmission of a first security token that is usable to validate that the wearable device is authorized to participate in the premises security system, in response to the status update, request the first security token from the wearable device, validate that the wearable device is authorized to participate in the premises security system based at least in part on the first security token received from the wearable device and in response to validating that the wearable device is authorized to participate in the premises security system, cause transmission of a second security token to the wearable device where the second security token is usable to trigger a premises security system action.