Patent classifications
G07C9/29
SYSTEMS AND METHODS FOR ACTIVATING A DIGITAL KEY BASED ON A VITAL SIGN
Systems and methods for activating a digital key based on a vital sign include the digital key configured to lock and unlock a digital lock when activated. The system may include an electronic device including a sensor configured to detect a vital sign of a user in real time. The electronic device may include a memory configured to store a reference vital sign of the user. The electronic device may include a wireless transceiver configured to communicate with the digital key. The electronic device may include a processor coupled to the sensor, the memory, and the wireless transceiver. The processor may be configured to receive and compare the vital sign to the reference vital sign and prompt the wireless transceiver to send a signal to the digital key to activate the digital key when the vital sign is within a threshold of similarity to the reference vital sign.
SYSTEMS AND METHODS FOR ACTIVATING A DIGITAL KEY BASED ON A VITAL SIGN
Systems and methods for activating a digital key based on a vital sign include the digital key configured to lock and unlock a digital lock when activated. The system may include an electronic device including a sensor configured to detect a vital sign of a user in real time. The electronic device may include a memory configured to store a reference vital sign of the user. The electronic device may include a wireless transceiver configured to communicate with the digital key. The electronic device may include a processor coupled to the sensor, the memory, and the wireless transceiver. The processor may be configured to receive and compare the vital sign to the reference vital sign and prompt the wireless transceiver to send a signal to the digital key to activate the digital key when the vital sign is within a threshold of similarity to the reference vital sign.
Methods, apparatuses, and systems for dynamically managing assets
Apparatuses, methods and systems for unlocking a tracking apparatus that is affixed to an asset are disclosed herein. In one example, a method of unlocking a tracking apparatus that is affixed to an asset is provided. The tracking apparatus may comprise an electronic tag electronically coupled to a securing component comprising an actuating element. The method may comprise: receiving asset information associated with the tracking apparatus; generating and storing a secure machine-readable code in conjunction with the asset information; in response to receiving a request to unlock the tracking apparatus, determining whether a received input corresponds with the stored secure machine-readable code; and providing an indication to cause an electronic reader in electronic communication with the tracking apparatus to trigger deactivating the actuating element.
Methods, apparatuses, and systems for dynamically managing assets
Apparatuses, methods and systems for unlocking a tracking apparatus that is affixed to an asset are disclosed herein. In one example, a method of unlocking a tracking apparatus that is affixed to an asset is provided. The tracking apparatus may comprise an electronic tag electronically coupled to a securing component comprising an actuating element. The method may comprise: receiving asset information associated with the tracking apparatus; generating and storing a secure machine-readable code in conjunction with the asset information; in response to receiving a request to unlock the tracking apparatus, determining whether a received input corresponds with the stored secure machine-readable code; and providing an indication to cause an electronic reader in electronic communication with the tracking apparatus to trigger deactivating the actuating element.
Access control system having radio and facial recognition
An access control system receives a device-specific identifier of a mobile electronic device and an electronic reference template for facial parameters of a user. The reception takes place when the mobile device is located in a public zone, from which the user can request access to an access-restricted zone. A memory unit stores the identifier of the mobile device and the reference template, which are received by a transmitting and receiving unit, as belonging to the user present in a public zone. An image processing unit generates a real-time template for facial features of the user based on an image of the user when the user requests access to the access-restricted zone. It determines if the real-time template matches a reference template stored in the memory unit to a defined degree, wherein the user is recognized as an access-requesting user in the event of a match.
Access control system having radio and facial recognition
An access control system receives a device-specific identifier of a mobile electronic device and an electronic reference template for facial parameters of a user. The reception takes place when the mobile device is located in a public zone, from which the user can request access to an access-restricted zone. A memory unit stores the identifier of the mobile device and the reference template, which are received by a transmitting and receiving unit, as belonging to the user present in a public zone. An image processing unit generates a real-time template for facial features of the user based on an image of the user when the user requests access to the access-restricted zone. It determines if the real-time template matches a reference template stored in the memory unit to a defined degree, wherein the user is recognized as an access-requesting user in the event of a match.
Access control system with virtual card data
An access control system includes a mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the credential from the credential service and a credential module for an access control, the credential module operable to receive virtual card data from the credential, the virtual card data usable to operate the access control.
Access control system with virtual card data
An access control system includes a mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the credential from the credential service and a credential module for an access control, the credential module operable to receive virtual card data from the credential, the virtual card data usable to operate the access control.
MANAGING SERVER, MANAGING METHOD AND COMPUTER PROGRAM FOR OPERATING BIOMETRIC INFORMATION-BASED ACCESS MANAGEMENT SYSTEM
The present invention relates to an access management system determining whether to approve the user's authentication request for the management space and the method for operating the access management system based on biometric data measured by a wearable device directly worn on the user's body, in order to solve the problem that the QR code check causes inconvenience and the body temperature test has low accuracy. Since approval of the authentication request may be determined based on the user's authentication data retrieved from the public database and biometric data directly measured from the user's body by a wearable device such as a smart mask, biometric data such as body temperature can be measured more accurately, and the hassle of users directly tagging their QR code with the QR code scanner can be reduced, and the accuracy and efficiency of access management can be improved.
MANAGING SERVER, MANAGING METHOD AND COMPUTER PROGRAM FOR OPERATING BIOMETRIC INFORMATION-BASED ACCESS MANAGEMENT SYSTEM
The present invention relates to an access management system determining whether to approve the user's authentication request for the management space and the method for operating the access management system based on biometric data measured by a wearable device directly worn on the user's body, in order to solve the problem that the QR code check causes inconvenience and the body temperature test has low accuracy. Since approval of the authentication request may be determined based on the user's authentication data retrieved from the public database and biometric data directly measured from the user's body by a wearable device such as a smart mask, biometric data such as body temperature can be measured more accurately, and the hassle of users directly tagging their QR code with the QR code scanner can be reduced, and the accuracy and efficiency of access management can be improved.