G07C9/29

Wearable RFID device for use in an event-based interrogation zone

A wearable RFID device is provided for use in an event-based interrogation zone. The zone contains terminals with RFID readers. The device has an element worn by a user and an attached or embedded RFID tag. The tag has stored data representing a UniqueID of the tag, and a stored funds balance. The tag is programmed to activate an otherwise inactive one of said terminals upon presentation of the tag to the RFID reader of said terminal in a first tap, and communicate its UniqueID to the terminal for validation. Upon validation and following a second tap of the tag at the RFID reader, the tag's stored funds balance can be changed by the amount of a transaction run through said terminal. A temporary installation of a system of RFID-based terminals and user-worn RFID devices is also provided for use within an event interrogation zone.

Wearable RFID device for use in an event-based interrogation zone

A wearable RFID device is provided for use in an event-based interrogation zone. The zone contains terminals with RFID readers. The device has an element worn by a user and an attached or embedded RFID tag. The tag has stored data representing a UniqueID of the tag, and a stored funds balance. The tag is programmed to activate an otherwise inactive one of said terminals upon presentation of the tag to the RFID reader of said terminal in a first tap, and communicate its UniqueID to the terminal for validation. Upon validation and following a second tap of the tag at the RFID reader, the tag's stored funds balance can be changed by the amount of a transaction run through said terminal. A temporary installation of a system of RFID-based terminals and user-worn RFID devices is also provided for use within an event interrogation zone.

Aggregator of identification devices
11526593 · 2022-12-13 · ·

A personal identification device for physical access control systems, including: at least one reader capable of reading data from an identification badge, the data including at least identification data; a processing unit; a data storage member; at least one wireless communication module; and an internal battery arranged to supply power to the components of the device. The processing unit is arranged for: acquiring data from at least one identification badge by way of the reader; storing the acquired data in the data storage member; if the acquired data are encrypted, decrypting the data; and transmitting at least a portion of the acquired data, via the wireless communication module and on request from a reader external to the device.

Aggregator of identification devices
11526593 · 2022-12-13 · ·

A personal identification device for physical access control systems, including: at least one reader capable of reading data from an identification badge, the data including at least identification data; a processing unit; a data storage member; at least one wireless communication module; and an internal battery arranged to supply power to the components of the device. The processing unit is arranged for: acquiring data from at least one identification badge by way of the reader; storing the acquired data in the data storage member; if the acquired data are encrypted, decrypting the data; and transmitting at least a portion of the acquired data, via the wireless communication module and on request from a reader external to the device.

Methods and apparatuses for removing a security tag

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a confirmation signal to unlock the security tag being detachably locked to a merchandise, wherein the confirmation signal includes a RFID device identifier associated with a RFID device of the security tag, and the RFID device is associated with a wireless device of the security tag, identifying the wireless device associated with the RFID device based on the RFID device identifier, transmitting a wireless signal to the wireless device to enable a controller to receive a release signal used to unlock the security tag from the merchandise, and transmitting the release signal to the controller to unlock the security tag from the merchandise.

Methods and apparatuses for removing a security tag

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a confirmation signal to unlock the security tag being detachably locked to a merchandise, wherein the confirmation signal includes a RFID device identifier associated with a RFID device of the security tag, and the RFID device is associated with a wireless device of the security tag, identifying the wireless device associated with the RFID device based on the RFID device identifier, transmitting a wireless signal to the wireless device to enable a controller to receive a release signal used to unlock the security tag from the merchandise, and transmitting the release signal to the controller to unlock the security tag from the merchandise.

Physical access control system and method
11521450 · 2022-12-06 · ·

An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.

Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance

A method of providing visual feedback to a driver based on data collected during vehicle operation. A processor at the vehicle analyzes vehicle data and determines when predetermined threshold values have been reached for particular parameters. Whenever such a threshold is reached, an audible indication is provided to the driver, indicating that the baseline has been exceeded. Certain parameters have at least two threshold values. When a first threshold value is reached, an alert is presented to the driver, but no data is recorded or reported. When a second threshold value is reached, another alert is presented to the driver, and data is recorded for reporting to a driver manager or supervisor. This approach provides a driver warning, that if they correct the triggering behavior, their supervisor is never notified of that behavior. However, if the behavior escalates, and the second threshold is breached, the behavior is recorded.

Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance

A method of providing visual feedback to a driver based on data collected during vehicle operation. A processor at the vehicle analyzes vehicle data and determines when predetermined threshold values have been reached for particular parameters. Whenever such a threshold is reached, an audible indication is provided to the driver, indicating that the baseline has been exceeded. Certain parameters have at least two threshold values. When a first threshold value is reached, an alert is presented to the driver, but no data is recorded or reported. When a second threshold value is reached, another alert is presented to the driver, and data is recorded for reporting to a driver manager or supervisor. This approach provides a driver warning, that if they correct the triggering behavior, their supervisor is never notified of that behavior. However, if the behavior escalates, and the second threshold is breached, the behavior is recorded.

Identity, Payment and Access Control System

Various implementations described herein are directed to a method for providing identity, payment and/or access. A primary account number (PAN) is read from a card or token. A hashed PAN is generated. A transaction result is determined based on the hashed PAN.