G07C9/32

EXPANDABLE SECURITY SYSTEM

A computer-implemented method includes receiving, by a base station of a first security system, an identification of a portable security system. The method further includes adding, by the base station, the portable security system as a sensor to a plurality of sensors monitored by the first security system. The method further includes configuring, by the base station, the portable security system in protect-mode, wherein the portable security system sounds an alarm in response to a sensor from the second system indicating a security-breach. The method further includes in response to the alarm from the portable security system, generating, by the base station, an alarm event of the first security system.

Managing access based on activities of entities

Concepts and technologies are disclosed herein for managing access based on activities of entities. A computing device can collect data that comprises an image. The computing device can identify an entity that is located in a range of a sensor. The computing device can determine an identity that is associated with the entity and an activity associated with the entity. The computing device can obtain a trust indicator associated with the entity. The computing device can determine, based on the trust indicator, if the activity should be allowed. If the computing device determines that the activity should be allowed, the computing device can initiate allowing of the activity. If the computing device determines that the activity should not be allowed, the computing device can initiate blocking of the activity.

System operated responsive to data bearing records
11568696 · 2023-01-31 · ·

A depository operates to accept and make available deposit items to authorized users responsive at least in part to data read from data bearing records. The depository (10) includes a body (12) that bounds and interior area (14). The depository includes a door (18) that is controlled by a lock (24) so that only authorized users can access the interior area. The depository includes at least one input device (20) operative to receive data usable to identify users authorized to access the depository. At least one reading device (26) is operative to read indicia included on depository items so that depository items placed in or removed from the interior area can be tracked. The depository is in operative connection with a network (50) that enables the transport and tracking of deposit items.

System operated responsive to data bearing records
11568696 · 2023-01-31 · ·

A depository operates to accept and make available deposit items to authorized users responsive at least in part to data read from data bearing records. The depository (10) includes a body (12) that bounds and interior area (14). The depository includes a door (18) that is controlled by a lock (24) so that only authorized users can access the interior area. The depository includes at least one input device (20) operative to receive data usable to identify users authorized to access the depository. At least one reading device (26) is operative to read indicia included on depository items so that depository items placed in or removed from the interior area can be tracked. The depository is in operative connection with a network (50) that enables the transport and tracking of deposit items.

SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
20230023944 · 2023-01-26 ·

Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.

SYSTEM AND METHOD FOR AUTHENTICATING A PERSON BASED ON MOTION DATA FOR ONE OR MORE EARPIECES WORN BY THE PERSON
20230005317 · 2023-01-05 ·

A person authentication system is provided. The person authentication system includes one or more earpieces. The one or more earpieces can include one or more motion sensors. The person authentication system includes a computing system communicatively coupled to the one or more earpieces. The computing system is configured to obtain motion data indicative of motion of the one or more earpieces when the one or more earpieces are being worn by the person. The computing system is configured to determine a motion signature for the person based, at least in part, on the motion data. The motion signature can be unique to the person. The computing system can be even further configured to authenticate an identity of the person based, at least in part, on the motion signature.

SYSTEM AND METHOD FOR AUTHENTICATING A PERSON BASED ON MOTION DATA FOR ONE OR MORE EARPIECES WORN BY THE PERSON
20230005317 · 2023-01-05 ·

A person authentication system is provided. The person authentication system includes one or more earpieces. The one or more earpieces can include one or more motion sensors. The person authentication system includes a computing system communicatively coupled to the one or more earpieces. The computing system is configured to obtain motion data indicative of motion of the one or more earpieces when the one or more earpieces are being worn by the person. The computing system is configured to determine a motion signature for the person based, at least in part, on the motion data. The motion signature can be unique to the person. The computing system can be even further configured to authenticate an identity of the person based, at least in part, on the motion signature.

Gaming service automation system with graphical user interface

A robot management system (RMS) includes a plurality of service robots deployed within an operations venue that includes a plurality of gaming devices, an operator terminal presenting a graphical user interface (GUI) to an operator, and a robot management system server (RMS server) configured in networked communication with the plurality of service robots. The RMS server is configured to: identify location data for the service robots; create an interactive overlay map of the operations venue that includes a static map of the operations venue, overlay data showing the location data of the plurality of service robots over the static map, and an interactive icon for each service robot of the plurality of service robots; display, via the GUI, the overlay map; receive a first input indicating a selection of a first interactive icon associated with a first service robot; and display current status information associated with the first service robot.

Gaming service automation system with graphical user interface

A robot management system (RMS) includes a plurality of service robots deployed within an operations venue that includes a plurality of gaming devices, an operator terminal presenting a graphical user interface (GUI) to an operator, and a robot management system server (RMS server) configured in networked communication with the plurality of service robots. The RMS server is configured to: identify location data for the service robots; create an interactive overlay map of the operations venue that includes a static map of the operations venue, overlay data showing the location data of the plurality of service robots over the static map, and an interactive icon for each service robot of the plurality of service robots; display, via the GUI, the overlay map; receive a first input indicating a selection of a first interactive icon associated with a first service robot; and display current status information associated with the first service robot.

SERVER DEVICE AND DOOR CONTROL DEVICE
20220392287 · 2022-12-08 · ·

It A service provider such as a courier to unlock a door without a permission of a user. A server device, which is capable of communicating with a door control device that controls locking and unlocking of a door installed at an entrance of a multifamily residential, includes: a storage that stores, for each user, a service number set by a service provider; a request reception that receives, from the door control device, an unlock request including a device ID and the service number; an authentication that executes an authentication based on information included in the unlock request and information stored in the storage; and unlock instructions that transmits an unlock instruction to the door control device, when the authentication is succeeded.