G07C9/28

SYSTEMS AND METHODS FOR SHORT-RANGE COMMUNICATION BETWEEN DEVICES

The present disclosure relates to systems and methods for communicating between devices using short-range communication links. More specifically, the present disclosure relates to systems and methods for communicating access-right data between devices for verification or transfer.

METHOD AND SYSTEM FOR MANAGING DOOR ACCESS USING BEACON SIGNAL
20180012432 · 2018-01-11 · ·

A method and system allow management of access to a door using a beacon signal. A user access authority determination unit controls access of a user to a target door based beacon data from beacons installed near a door. The user carries a terminal that obtains the beacon data based on a proximity to the beacons. The method includes identifying the target door based on identification information of the beacons extracted from the beacon data. A type of user movement is determined. The type of user movement includes an entering movement that the user enters into an inner side from an outer side through the target door and an exiting movement that the user exits the inner side to the outer side through the target door. An access authentication process to be performed to unlock the target door is determined according to the determined type of user movement.

CAPACITIVE VEHICLE ENTRY CONTROL
20180012431 · 2018-01-11 ·

An illustrative example method of operating a capacitive vehicle entry control device includes: determining a plurality of capacitance values of the vehicle entry control device during a measurement period; determining an average capacitance of the plurality of capacitance values; determining whether the determined average capacitance exceeds an average threshold; determining a range of the plurality of capacitance values; determining whether the determined range exceeds a range threshold; and initiating a vehicle entry process when the determined average capacitance exceeds the average threshold or when the determined range exceeds the range threshold.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

System and method for remote monitoring of released individual
11711114 · 2023-07-25 · ·

A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.

System and method for remote monitoring of released individual
11711114 · 2023-07-25 · ·

A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.

PROTECTED ARTICLE MANAGEMENT

Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.

PROTECTED ARTICLE MANAGEMENT

Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.

INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD, AND PROGRAM

An information management system includes a reception device including a camera that images a face of a participant, and an information management apparatus. The information management apparatus issues a digital key assigned for each participant independently of personal information of the participant and transmits the digital key to the reception device. In a case where the reception device outputs an ID image of the participant, the information management apparatus acquires a face image from the reception device and stores the face image and the digital key in a database in association with each other. In a case where information including the digital key is received from a reading device installed in an event venue, the information management apparatus stores the received information in the database in association with the digital key as behavior information representing a behavior of the participant in the event venue.