Patent classifications
G07C9/32
MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
Merchandise security systems and methods are provided. In one example, a security system includes a plurality of locking hooks configured to protect one or more items from theft, each of the plurality of locking hooks comprising a lock configured to be locked to prevent removal of the one or more items and unlocked to allow removal of one or more of the items. Each lock is configured to be unlocked for purchasing one or more of the items in response to receiving an authentication of the consumer.
PERSONAL SAFETY AND PRIVACY FEATURES FOR PASSENGERS OF AN AUTONOMOUS VEHICLE BASED TRANSPORTATION SYSTEM
Computer-based systems and related operating methods for an autonomous vehicle transportation system are presented here. Various features, functions, and methodologies are utilized by the transportation system to enhance personal safety and security for passengers. Security, privacy, and safety features can be provided based on a ride reservation type, the identity or user profiles of passengers, and the like. A security alert feature can also be provided onboard the autonomous vehicles.
Controlling traffic without integrating with a security vendor
Embodiments are directed to providing access without determining an identity of a requester. A fixture may receive a rule pertaining to access to a floor of a building. The fixture may receive a request to access the floor of the building. The fixture may grant access to the floor based on a determination that the rule indicates that access to the floor should be granted.
Method for automatic possession-factor authentication
Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.
Auditable security system for secure enclosures
An auditable security system for preventing unlawful diversion of goods and/or services is provided. The security system includes a secure enclosure, an access control system that generates audit data, cameras proximal to the access control system, cameras located in the secure enclosure, a video management system that manages the cameras and generates video data, an exterior computing system configured to allow users to interface with the access control system, the video management system and data stored by the systems, and a database configured for storing data stored by the access control system and the video management system. When a user interacts with the access control system, the cameras begin generating audio and video data, which is stored, along with audit data, in the connected database. The audit data and video data is also provided to a third-party system for processing.
Auditable security system for secure enclosures
An auditable security system for preventing unlawful diversion of goods and/or services is provided. The security system includes a secure enclosure, an access control system that generates audit data, cameras proximal to the access control system, cameras located in the secure enclosure, a video management system that manages the cameras and generates video data, an exterior computing system configured to allow users to interface with the access control system, the video management system and data stored by the systems, and a database configured for storing data stored by the access control system and the video management system. When a user interacts with the access control system, the cameras begin generating audio and video data, which is stored, along with audit data, in the connected database. The audit data and video data is also provided to a third-party system for processing.
System and method for providing interconnected and secure mobile device charging stations
A method is disclosed. The method includes providing a door that selectively opens to allow access to a cavity and selectively closes to block access to the cavity, using a lock to selectively lock and unlock the door when the door is closed, and electrically charging a user device in the cavity when the door is closed and locked. The method also includes unlocking the door based on a first input provided by a first user, the first user removing the user device, electrically charging the user device in the cavity when the door is closed and locked after the first user returns the user device, and unlocking the door based on a second input provided by a second user, the second user removing the user device.
System and method for providing interconnected and secure mobile device charging stations
A method is disclosed. The method includes providing a door that selectively opens to allow access to a cavity and selectively closes to block access to the cavity, using a lock to selectively lock and unlock the door when the door is closed, and electrically charging a user device in the cavity when the door is closed and locked. The method also includes unlocking the door based on a first input provided by a first user, the first user removing the user device, electrically charging the user device in the cavity when the door is closed and locked after the first user returns the user device, and unlocking the door based on a second input provided by a second user, the second user removing the user device.
Intelligent gesture based security system and method
The present disclosure includes intelligent gesture controlled security systems. A security system acts as a gateway between a user and a restricted area, whether physical or electronic. One gesture controlled security system includes a camera capable of monitoring a real time gesture, a memory operable to store data, a locking assembly having a locked state and an unlocked state, and a processor communicatively coupled to the memory, the locking assembly, and the camera. The processor is operable to utilize the camera to detect a gesture, store the detected gesture in the memory, compare the detected gesture to a stored gesture, and only upon determining that the real time gesture is within a predetermined threshold of the stored gesture, causing the locking assembly to change from the locked state to the unlocked state.
Method and device for protecting a technical installation
A method protects a technical installation that enables physical entry by persons to the installation and a computerized access to a computer device of the installation. Persons who have current access to the computer device are registered as persons accessing the computer device leading to a formation of registered computer user data, and persons who are present in the installation are registered as persons present on site leading to a formation of registered on-site data. In the event of a new desired entry or a new desired access, a plausibility check is carried out in which a check is made as to whether the desired entry is plausibly compatible with the registered computer user data or whether the desired access is plausibly compatible with the registered on-site data.