Patent classifications
G07C9/29
ENCLOSURE DEVICE AND METHOD FOR WASTE PRODUCT, CHEMICAL DEGRADATION PROCESS OF WASTE PRODUCT, AND CHAIN-OF-CUSTODY AUDIT TRAIL
A secured “smart” container is disclosed for collecting green waste products including operational functions for collection, video surveillance and monitoring capacity. The secured “smart” container may include one or more programmable logic controllers. Operational functions are performed by electrical components including sensors to determine green waste deposits characteristics and contents. Operational functions are further adapted to send and receive data, operationally wirelessly, and configured and adapted to utilize solar derived electric power and, optionally, electric power from other sources. Embodiments provide constant 24 hour/7 days a week video surveillance and alert monitoring capabilities. Disclosed systems and methods also include collection and transportation of waste contents from the container to a processing subsystem. Additionally, disclosed systems may also include a monitoring system for monitoring the collection of green waste product, delivery of the same to the processing subsystem and tracking to and throughout final processing of the green waste product and handling personnel.
ENCLOSURE DEVICE AND METHOD FOR WASTE PRODUCT, CHEMICAL DEGRADATION PROCESS OF WASTE PRODUCT, AND CHAIN-OF-CUSTODY AUDIT TRAIL
A secured “smart” container is disclosed for collecting green waste products including operational functions for collection, video surveillance and monitoring capacity. The secured “smart” container may include one or more programmable logic controllers. Operational functions are performed by electrical components including sensors to determine green waste deposits characteristics and contents. Operational functions are further adapted to send and receive data, operationally wirelessly, and configured and adapted to utilize solar derived electric power and, optionally, electric power from other sources. Embodiments provide constant 24 hour/7 days a week video surveillance and alert monitoring capabilities. Disclosed systems and methods also include collection and transportation of waste contents from the container to a processing subsystem. Additionally, disclosed systems may also include a monitoring system for monitoring the collection of green waste product, delivery of the same to the processing subsystem and tracking to and throughout final processing of the green waste product and handling personnel.
MOTION SENSOR WITH BEACON ADVERTISEMENT
Systems, devices, and methods for motion-based beacon advertisement are disclosed. A motion detector (e.g., request to enter detector) includes a motion sensor, a first Bluetooth® radio that operates in a beacon mode, and a controller that executes instructions. The instructions cause the controller to detect a motion event via the motion sensor, initiate a timer for a predetermined time in response to the detected motion event, broadcast a beacon message in response to the detected motion event via the Bluetooth® radio, and terminate the broadcast of the beacon message upon expiration of the timer.
MOTION SENSOR WITH BEACON ADVERTISEMENT
Systems, devices, and methods for motion-based beacon advertisement are disclosed. A motion detector (e.g., request to enter detector) includes a motion sensor, a first Bluetooth® radio that operates in a beacon mode, and a controller that executes instructions. The instructions cause the controller to detect a motion event via the motion sensor, initiate a timer for a predetermined time in response to the detected motion event, broadcast a beacon message in response to the detected motion event via the Bluetooth® radio, and terminate the broadcast of the beacon message upon expiration of the timer.
DOCK DOOR ACCESS APPARATUS
A warehouse dock door control system (101) has a system controller (147), an interior side unit (144), an exterior side unit (142) comprising a key repository and a key detector. The key detector is configured to detect and identify a specific vehicle key having unique identification data associated therewith. The key detector is configured to detect the presence of the key within the key repository and to read the identification data associated therewith. The controller is configured to use the identification data to determine whether the vehicle key is an authorised vehicle key. In response to the determination, the controller communicates with the interior side unit to authorise opening of the dock door and controls the exterior side unit to secure the vehicle key in the key repository to inhibit removal therefrom until a signal is received indicating that a loading or unloading process is complete.
DOCK DOOR ACCESS APPARATUS
A warehouse dock door control system (101) has a system controller (147), an interior side unit (144), an exterior side unit (142) comprising a key repository and a key detector. The key detector is configured to detect and identify a specific vehicle key having unique identification data associated therewith. The key detector is configured to detect the presence of the key within the key repository and to read the identification data associated therewith. The controller is configured to use the identification data to determine whether the vehicle key is an authorised vehicle key. In response to the determination, the controller communicates with the interior side unit to authorise opening of the dock door and controls the exterior side unit to secure the vehicle key in the key repository to inhibit removal therefrom until a signal is received indicating that a loading or unloading process is complete.
System and method for context-sensitive access control
Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
System and method for context-sensitive access control
Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
REGIONAL LOCK-STATE CONTROL SYSTEM
A regional lock-state control system for operation within a region, includes a server, a plurality of mobile devices and a plurality of lock assembles. The server is configured to initiate a lock-state event. The mobile devices are each configured to receive a wireless lock-state directive from the server upon the lock-state event, and send a wireless lock lock-state directive to the server. The lock assemblies are each configured to receive a lock-state command associated with the lock-state directive from the plurality of mobile devices, and are each configured to transmit an advertisement that includes data on a lock-state.
Antenna Switching Control For AOA Capturing In Phone-As-A-Key Systems With De-Whitened Tone Transmission, CRC Based Validation And Event Timing
A reader includes a transceiver and a control module. The transceiver is configured to, during a current connection event, monitor notification messages transmitted from a portable access device to a phone-as-a-key (PaaK) system of a vehicle, where the notification messages are transmitted to establish a communication link between the portable access device and the PaaK system. The control module is configured to: perform an in-phase and quadrature phase capture of the notification messages based on fields in one or more of the notification messages, where the fields include a mobile de-whitened section including two or more series of consecutive bits, where the consecutive bits in each of the one or more series are all zeros or all ones; based on the in-phase and quadrature phase capture, determine an angle-of-arrival of the notification messages, and indicate the angle-of-arrival to the PaaK system for permitted access determined by the PaaK system.