G07C9/32

Scalable systems and methods for monitoring and concierge service

Disclosed systems and methods relate to a smart access control device in a security system for monitoring an area. According to embodiments, a method can include receiving, by the smart access control device, from one or more sensors in the area, sensor data about the area. The method can also include analyzing the received sensor data and generating an alert for a user about the area based on the analyzed sensor data. The method can further include transmitting, by the smart access control device, a first signal comprising the alert to a monitoring server of the security system. Moreover, the method can include enabling, by the smart access control device, a person requesting access to the area to enter identification information and granting access to the area to the person based on the received identification information that is evaluated by the user.

Method and system for decentralized digital authentication
11657665 · 2023-05-23 · ·

A method and system for digital authentication is disclosed, in which an owner device associated with a smart lock receives identity information of a user device requesting access to the smart lock. The owner device registers first contract information of the smart contract, for granting access of the smart lock to the user device, on a decentralized trust network, and sends second contract information about the smart contract to the user device. The second contract information comprises validation information of the smart contract indicating an un-validated information of the second contract information. The user device validates the received second contract information against the first contract information on the decentralized trust network, and authenticates the user device with the smart lock using the validated second contract information.

Method and system for decentralized digital authentication
11657665 · 2023-05-23 · ·

A method and system for digital authentication is disclosed, in which an owner device associated with a smart lock receives identity information of a user device requesting access to the smart lock. The owner device registers first contract information of the smart contract, for granting access of the smart lock to the user device, on a decentralized trust network, and sends second contract information about the smart contract to the user device. The second contract information comprises validation information of the smart contract indicating an un-validated information of the second contract information. The user device validates the received second contract information against the first contract information on the decentralized trust network, and authenticates the user device with the smart lock using the validated second contract information.

Remote access authentication and authorization

Features are disclosed for accurately authenticating a delivery agent for unattended delivery of an item. The systems and methods described confirm the location of the delivery agent and proximity to the delivery location using short range wireless communications between a monitoring device at the delivery location and a communication device associated with the delivery agent. Access may also be conditioned on user specified “do not disturb” rules indicating when remote access is authorized. The authentication may be dynamically assessed such as based on a type of item being delivered.

Remote access authentication and authorization

Features are disclosed for accurately authenticating a delivery agent for unattended delivery of an item. The systems and methods described confirm the location of the delivery agent and proximity to the delivery location using short range wireless communications between a monitoring device at the delivery location and a communication device associated with the delivery agent. Access may also be conditioned on user specified “do not disturb” rules indicating when remote access is authorized. The authentication may be dynamically assessed such as based on a type of item being delivered.

MULTI-FACTOR AUTHENTICATION AND SECURITY

An approach is provided to authenticate objects based on surface patterns on the object. In the approach, a pressure pattern is measured between a sensor array surface of a pressure mapping sensor array accessible by the processor and one of the object's surfaces. A set of characteristics of the object surface is extracted based on the pressure pattern resulting from the measuring. These characteristics are compared to a set of expected characteristics with the object being authenticated based on the comparison.

Secure enclosure for devices used to test remote connectivity

Mobile devices executing applications may be tested for networking issues by utilizing a test network having proxy access devices placed at different physical locations. Devices may be stored in a secure enclosure that includes a host device. The enclosure includes access controls to prevent unauthorized removal of devices or access to stored data. If an unauthorized access, disconnection from the host device, or disconnection of a device from a power source is detected, devices may be placed into a locked state or data on the devices may be deleted. The enclosure may also include a control device for testing the exchange of Bluetooth data by the devices. The enclosure may also include conductive members placed on the touch sensors of devices for providing simulated touch input to the touch sensors by changing the capacitance of adjacent regions of the touch sensors.

Secure enclosure for devices used to test remote connectivity

Mobile devices executing applications may be tested for networking issues by utilizing a test network having proxy access devices placed at different physical locations. Devices may be stored in a secure enclosure that includes a host device. The enclosure includes access controls to prevent unauthorized removal of devices or access to stored data. If an unauthorized access, disconnection from the host device, or disconnection of a device from a power source is detected, devices may be placed into a locked state or data on the devices may be deleted. The enclosure may also include a control device for testing the exchange of Bluetooth data by the devices. The enclosure may also include conductive members placed on the touch sensors of devices for providing simulated touch input to the touch sensors by changing the capacitance of adjacent regions of the touch sensors.

SYSTEMS AND METHODS FOR ANALYZING AND PRESENTING A VEHICLE INCIDENT
20230103839 · 2023-04-06 · ·

This disclosure describes systems and methods related to analyzing a vehicle incident. A method for analyzing a vehicle incident, comprising: sending an authentication request to a device associated with a vehicle data storage system, receiving from the device, an authentication response, sending to the vehicle data storage server, a request for vehicle data of a vehicle, receiving based on the authentication response and the request for vehicle data, the vehicle data, determining a time associated with a vehicle incident associated with the vehicle, identifying, based on the time, video data of the vehicle data, the video data associated with a camera of the vehicle, identifying based on the time and the video data, first data of the vehicle data, the first data comprising vehicle event data recorder data of the vehicle, and generating a report indicative of a relationship between the video data and the first data at the time.

PERSONALIZATION METHOD FOR A MOTOR VEHICLE, AND A DATA RELEASE PROCEDURE FOR A BACKEND

A personalization method for a motor vehicle and data release method. The motor vehicle includes at least the following components: an on-board computer; a human-machine interface; a vehicle-side data interface; and an access security device for recognizing physical or electronic vehicle-specific access authorization information. The personalization method includes a first step of recognizing, by the on-board computer using the access security device, the physical and/or electronic input of the vehicle-specific access authorization information. The method also includes a second step of retrieving and storing, by the on-board computer using the vehicle-side data interface, personal data of at least one user assigned to the motor vehicle. The second step is only carried out if in the first step the vehicle-specific access authorization information is recognized. The personalization method and data release method significantly simplify the personalization process in a motor vehicle.