G07C9/28

Computer-based systems for determining a travel time to an airport departure point and methods of use thereof

A method and system include identifying, by a processor, departing flight information that designates departure airports and departure times in payment card transaction data of a plurality of users. Airport-specific data for a departure airport before a departure time of a departing flight of a user from the plurality of users is received. The airport-specific data is inputted into a machine learning model that outputs a user-specific airport processing time for the user to reach a departure gate upon arriving to the departure airport. A travel time from a geographical location of the computing device of the user to the departure airport is received from a navigation system. The computing device displays a time for the user to start travel to the departure airport based on the user-specific airport processing time and the travel time to the departure airport for the user to reach the departure gate by the departure time.

METHODS AND SYSTEMS FOR INTEGRATING AUTONOMOUS DEVICES WITH AN ACCESS CONTROL SYSTEM
20230215229 · 2023-07-06 ·

Apparatus and methods for integrating autonomous devices with an Access Control System (ACS) includes assigning, by the ACS, one or more security credentials to an autonomous device. The ACS receives an access request from an autonomous device. The access request includes one or more security credentials identifying the autonomous device to the system. The ACS performs validation of the received access request by comparing the received one or more security credentials with the one or more security credentials assigned to the autonomous device. The ACS grants access to one or more resources in a building to the autonomous device, in response to successful validation of the received access request.

METHOD AND APPARATUS FOR CONTROLLING A PASSAGE BARRIER
20230215230 · 2023-07-06 ·

A method and apparatus for controlling a passage barrier is provided herein. During operation the apparatus will determine a location of all persons authorized to enter through the barrier (e.g., a door). The apparatus will also determine the location of all persons not authorized for entry. Based on the location information, the passage barrier will remain open or closed. More particularly, based on the location information, a door, for example, may remain locked unless properly accessed by an authorized person. Additionally, based on the location information, the door may remain open for all to pass through.

UWB-BASED INTENT DETECTION FOR SEAMLESS ACCESS
20230213637 · 2023-07-06 ·

A method according to an embodiment includes receiving UWB data by an access control device, performing predictive analysis on the UWB data to generate expected location data associated with a location of a mobile device, determining a velocity of the mobile device and a heading of the mobile device based on the UWB data, determining whether the mobile device is on course to a passageway associated with the access control device based on the velocity and the heading of the mobile device, performing state estimation to determine whether the mobile device is within a secure distance threshold from the passageway, wherein the secure distance threshold dynamically changes based on the velocity of the mobile device, and inferring ingress intent of a user of the mobile device in response to determining that the mobile device is within the secure distance threshold and on course to the passageway.

UWB-BASED INTENT DETECTION FOR SEAMLESS ACCESS
20230213637 · 2023-07-06 ·

A method according to an embodiment includes receiving UWB data by an access control device, performing predictive analysis on the UWB data to generate expected location data associated with a location of a mobile device, determining a velocity of the mobile device and a heading of the mobile device based on the UWB data, determining whether the mobile device is on course to a passageway associated with the access control device based on the velocity and the heading of the mobile device, performing state estimation to determine whether the mobile device is within a secure distance threshold from the passageway, wherein the secure distance threshold dynamically changes based on the velocity of the mobile device, and inferring ingress intent of a user of the mobile device in response to determining that the mobile device is within the secure distance threshold and on course to the passageway.

Automated delivery security system

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

Automated delivery security system

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

Detection and handling of home owner moving by a home monitoring system
11553320 · 2023-01-10 · ·

Techniques are described for determining that a property is vacant based on monitoring data collected by connected sensors and appliances near or within the property. In response to determining that a property is vacant, the condition of the vacant property can be monitored for various risks such as fire safety and security breaches. Monitoring techniques may also be used to determine when a new customer (e.g., a new tenant or property owner) has moved into the property. In response to detecting a move-in, one or more notifications may be transmitted to assist the new customer to customize a security system associated with the property. In this regard, techniques described herein may be used by service providers to improve the transition associated with move-in and move-out processes, which may also improve retention of monitoring services.

MANAGING SERVER, MANAGING METHOD AND COMPUTER PROGRAM FOR OPERATING BIOMETRIC INFORMATION-BASED ACCESS MANAGEMENT SYSTEM
20230005316 · 2023-01-05 ·

The present invention relates to an access management system determining whether to approve the user's authentication request for the management space and the method for operating the access management system based on biometric data measured by a wearable device directly worn on the user's body, in order to solve the problem that the QR code check causes inconvenience and the body temperature test has low accuracy. Since approval of the authentication request may be determined based on the user's authentication data retrieved from the public database and biometric data directly measured from the user's body by a wearable device such as a smart mask, biometric data such as body temperature can be measured more accurately, and the hassle of users directly tagging their QR code with the QR code scanner can be reduced, and the accuracy and efficiency of access management can be improved.

Electronic access control and location tracking system

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.