Patent classifications
G07C9/28
SYSTEM AND METHOD FOR AUTOMATED DATA COLLECTION AND ANCHOR LOCATION EVALUATION
A system and method for obtaining location data for a portable device relative to an object. The system and method may include an object device disposed in a fixed position relative to the object, the object device having an antenna configured to communicate wirelessly via UWB with the portable device via a communication link. The system may include a control system, such as a robot and/or a remote controller, configured to obtain one or more samples pertaining to communications between the portable device and the object device.
Determining when access control of an electronic lock should be performed
It is provided a method for determining when access control of an electronic lock, controlling access to a restricted physical space, should be performed. The method is performed in an intent determiner and comprising the steps of: obtaining movement data from a first sensor of a portable key device, the movement data indicating movement of the portable key device; obtaining a distance indicator from a second sensor, the distance indicator being indicative of distance between the electronic lock and the user; determining when there is user intent to open based on both the movement data and the distance indicator; and triggering access control to be performed only when user intent has been determined.
Determining when access control of an electronic lock should be performed
It is provided a method for determining when access control of an electronic lock, controlling access to a restricted physical space, should be performed. The method is performed in an intent determiner and comprising the steps of: obtaining movement data from a first sensor of a portable key device, the movement data indicating movement of the portable key device; obtaining a distance indicator from a second sensor, the distance indicator being indicative of distance between the electronic lock and the user; determining when there is user intent to open based on both the movement data and the distance indicator; and triggering access control to be performed only when user intent has been determined.
System and method for detecting events in a system
A plurality of sensors are operably coupled to a system controller. Each sensor includes a detection mode in which the sensor applies one or more detection algorithms to sensor data generated by the corresponding sensor to detect a possible event and to report the possible event to the system controller, but does not report the system data to the system controller. Each sensor also includes a sensor data mode in which the sensor data is reported to the system controller. When one of the plurality of sensors reports a possible event to the system controller, the system controller instructs one or more of the plurality of sensors to switch from the detection mode to the sensor data mode. The system controller is configured to receive the sensor data and to process the received sensor data to confirm or otherwise provide a measure of confidence in the reported possible event.
System and method for detecting events in a system
A plurality of sensors are operably coupled to a system controller. Each sensor includes a detection mode in which the sensor applies one or more detection algorithms to sensor data generated by the corresponding sensor to detect a possible event and to report the possible event to the system controller, but does not report the system data to the system controller. Each sensor also includes a sensor data mode in which the sensor data is reported to the system controller. When one of the plurality of sensors reports a possible event to the system controller, the system controller instructs one or more of the plurality of sensors to switch from the detection mode to the sensor data mode. The system controller is configured to receive the sensor data and to process the received sensor data to confirm or otherwise provide a measure of confidence in the reported possible event.
COMPUTERIZED SYSTEMS AND METHODS FOR A USER-ASSOCIATED ELECTRONIC BADGE
The disclosed system provides a novel framework that includes an on-device electronic badge configured with presence broadcasting, monitoring, and communication platforms for interaction with other on-device and networked applications and badges. The disclosed badge can be configured to be dynamically generated (or assembled) based on a set of identifying information related to the user. A generated badge can be utilized to interact with other users and/or interact with activities at particular events, which can occur in the digital realm (e.g., online) or in/at physical locations. A badge can also further be utilized for receiving recommended content.
COMPUTERIZED SYSTEMS AND METHODS FOR A USER-ASSOCIATED ELECTRONIC BADGE
The disclosed system provides a novel framework that includes an on-device electronic badge configured with presence broadcasting, monitoring, and communication platforms for interaction with other on-device and networked applications and badges. The disclosed badge can be configured to be dynamically generated (or assembled) based on a set of identifying information related to the user. A generated badge can be utilized to interact with other users and/or interact with activities at particular events, which can occur in the digital realm (e.g., online) or in/at physical locations. A badge can also further be utilized for receiving recommended content.
Control method based on user authentication using detection sensor and device using thereof
Disclosed is a control method of a control device, the control method including determining whether a movable object is located in a first area using a detection sensor, activating a first mode among operation modes of the control device when it is determined that the movable object is located in the first area, acquiring user confirmation information from a terminal when the first mode is activated wherein the user confirmation information corresponds to user-specific information stored in the terminal and is provided to the terminal by a server before the terminal provides the user confirmation information to the control device, transmitting processing request information based on the user confirmation information to the server so that the server performs processing on the user confirmation information, acquiring a processing result for the user confirmation information from the server, and providing the processing result for the user confirmation information to the terminal.
Control method based on user authentication using detection sensor and device using thereof
Disclosed is a control method of a control device, the control method including determining whether a movable object is located in a first area using a detection sensor, activating a first mode among operation modes of the control device when it is determined that the movable object is located in the first area, acquiring user confirmation information from a terminal when the first mode is activated wherein the user confirmation information corresponds to user-specific information stored in the terminal and is provided to the terminal by a server before the terminal provides the user confirmation information to the control device, transmitting processing request information based on the user confirmation information to the server so that the server performs processing on the user confirmation information, acquiring a processing result for the user confirmation information from the server, and providing the processing result for the user confirmation information to the terminal.
Systems and methods for authentication using radio frequency tags
Systems and methods for authentication using radio frequency tags are disclosed. In one embodiment, a method for approving a requested operation from a secondary user of a resource that is controlled by a primary user may include (1) a back end comprising at least one computer processor receiving, from a mobile application that is executed by a mobile device associated with a secondary user, a requested operation involving a resource that is controlled by a primary user; (2) the back end receiving a unique identifier from the secondary user mobile application, the unique identifier being read by the mobile application from a tag associated with the secondary user; (3) the back end determining that the received unique identifier matches a stored unique identifier that is associated with the secondary user; and (4) the back end approving the requested operation and communicating the approval to the secondary user mobile application.