G07C9/27

Frictionless access control system with ceiling tile positioning unit
11705615 · 2023-07-18 · ·

A positioning unit of an access control and user tracking system includes an antenna, which is embedded in the substrate of a ceiling tile of a drop ceiling system. The antenna can be observable (embedded in the substrate of an exposed surface of the ceiling tile), or, alternately, not observable (concealed within the substrate of the ceiling tile). A pinhole camera for capturing video information is inserted through the substrate of the ceiling tile and protrudes from the exposed surface of the tile. A ground plane covers the unexposed surface of the ceiling tile. A control module, comprising a controller, a network interface, an antenna controller, a power supply, an omni directional antenna and/or memory for the positioning unit, is positioned on the unexposed surface of the tile.

LOCKING AND RELEASE SYSTEM OF A LOCK FITTED ON A VEHICLE
20230220704 · 2023-07-13 ·

A locking and release system of a lock fitted on a vehicle comprising: a mechanical lock (10, 70) which is fixed on a door of a vehicle; an electronic circuit (11) associated with said lock (10, 70); said electronic circuit (11) comprises a Bluetooth communication device (13); an Internet communication device (14); a GPS localization device (15); said system further comprises: a cloud (30) containing the data for the management of said system; a management centre (35) of said system; said management centre (35) is adapted to communicate with said cloud (30); a smartphone (21); said smartphone (21) comprises a Bluetooth communication device (22); an HTTPS communication device (23); and a GPS localization device (24); said electronic circuit (11) and said smartphone (21) are adapted to communicate with said cloud (30); said smartphone (21) is adapted to communicate with said electronic circuit (11); said lock (10, 70) opens if the following conditions are met: the GPS position of the lock (10, 70) coincides with the delivery position; the GPS position of the smartphone (21) coincides with the delivery position; said smartphone (21) is recognized by the system; said lock comprises coupling means (56, 74), located on a first door adapted to close against closing means (59, 71) located on a second door and locking means (60, 78) adapted to lock said coupling means (56, 74) in the closed position.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

Tracking conditions concerning an area to automatically generate artificial intelligence based responsive actions
11556098 · 2023-01-17 · ·

Logical boundaries enclosing a physical area are defined. A segment of the logical boundaries is defined as a directional gate, wherein traversing the gate into the physical area is defined as an ingress and traversing the gate out of the physical area is defined as an egress. The directional gate is monitored, and ingresses and egresses are detected. An occupancy count of the physical area is maintained, based on monitoring the gate and detecting ingresses and egresses. One or more conditions are tracked in addition to the occupancy count. Artificial intelligence (AI) processing is applied to the maintained occupancy count and the additional tracked condition(s), in real-time as the monitoring, maintaining and tracking are occurring. One or more responsive actions are automatically taken as a result of applying the AI processing to the maintained occupancy count and the additional tracked condition(s).

Secure authentication based on physically unclonable functions

The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.

Secure authentication based on physically unclonable functions

The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.

Modular mobility base for a modular autonomous logistics vehicle transport apparatus

A modular mobility base for a modular autonomous bot apparatus transporting an item being shipped including a mobile base platform, a component alignment interface, a mobility controller, a propulsion and steering system, and sensors. The component alignment interface provides an alignment channel into which another modular component can be placed and secured on the platform. The mobility controller generates propulsion control signals for controlling speed of the modular mobility base and steering control signals for navigation of the modular mobility base. The propulsion system is connected to the platform and responsive to the propulsion control signal. The steering system is connected to the mobile base platform and is responsive to the steering control signal to cause changes to directional movement of the modular mobility base. The sensors are disposed on the platform provide feedback sensor data to the mobility controller about a condition of the modular mobility base.