Patent classifications
G07C9/38
DISTRIBUTED IDENTITY SYSTEM WITH LOCAL IDENTIFICATION
A distributed identity system with local identification includes an identity system device and at least one local electronic device. The local electronic device locally stores at least a portion of identity information and the biometric identification information stored by the identity system device. The local electronic device determines identities by comparing received digital representations of biometrics with locally stored biometric identification information, performs actions using locally stored identity information included in the local copy, and uploads data related to the actions to the identity system device upon occurrence of an upload condition.
THIRD-PARTY RETAILER DELEGATION FOR AUTOMATED-CHECKOUT RETAIL ENVIRONMENTS
Described herein are systems and techniques for implementing a third-party item tracking and payment system that enables a user to walk out without a manual checkout process. The techniques include receiving user identifying information associated with a payment account and conveying an identifier of the account to a management system of the retailer. Items, as selected by the user, are added to a virtual cart that is checked out automatically when the user exits the store and the third party system communicates the cart contents to the retailer for cost calculation and then instructs payment using the stored payment information without disrupting existing inventory and account management systems.
THIRD-PARTY RETAILER DELEGATION FOR AUTOMATED-CHECKOUT RETAIL ENVIRONMENTS
Described herein are systems and techniques for implementing a third-party item tracking and payment system that enables a user to walk out without a manual checkout process. The techniques include receiving user identifying information associated with a payment account and conveying an identifier of the account to a management system of the retailer. Items, as selected by the user, are added to a virtual cart that is checked out automatically when the user exits the store and the third party system communicates the cart contents to the retailer for cost calculation and then instructs payment using the stored payment information without disrupting existing inventory and account management systems.
Assistance system for the delivery of mail consignments
A mail delivery assistance system comprises a letterbox for receiving mail consignments that has an opening and an electronic locking mechanism, a data processing device that comprises a database having an address file in which a respective addressee is associated with a building address, and a reader for capturing mail consignment data of a mail consignment. The reader, during operation, is communicatively connected to the data processing device in order to send the mail consignment data to the data processing device. The data processing device checks whether the mail consignment data match an addressee in the address file, and, if this is the case, generates a control signal for the locking mechanism in order to open the opening and to allow delivery of the mail consignment.
Assistance system for the delivery of mail consignments
A mail delivery assistance system comprises a letterbox for receiving mail consignments that has an opening and an electronic locking mechanism, a data processing device that comprises a database having an address file in which a respective addressee is associated with a building address, and a reader for capturing mail consignment data of a mail consignment. The reader, during operation, is communicatively connected to the data processing device in order to send the mail consignment data to the data processing device. The data processing device checks whether the mail consignment data match an addressee in the address file, and, if this is the case, generates a control signal for the locking mechanism in order to open the opening and to allow delivery of the mail consignment.
Entry prevention of persons of interest from venues and events using facial recognition
A system uses facial recognition to exclude persons of interest (e.g., “undesirables”) from events and/or venues. Such a system can include a combination of cameras, edge processing devices, and servers that are in communications coupling (e.g., via a network) and that are on premise and/or in the cloud to recognize such persons of interest (POI) and interdict and prevent such POI from entering, traversing, and/or attending (collectively, “entering”) such venues or events.
Movable barrier operator registration verification
Systems, methods, and apparatus for managing and controlling network-enabled movable barrier operators is provided. A method for managing network-enabled movable barrier operator includes receiving a user account identifier and a movable barrier operator identifier from a user device, providing an instruction to perform a specified action with a movable barrier operator associated with the movable barrier operator identifier to the user device, determining a registration condition is met upon detecting that the specified action has been performed, and, in the event that the registration condition is met, associating the movable barrier operator identifier with the user account identifier to allow a user account associated with the user account identifier to control the movable barrier operator over a network.
Movable barrier operator registration verification
Systems, methods, and apparatus for managing and controlling network-enabled movable barrier operators is provided. A method for managing network-enabled movable barrier operator includes receiving a user account identifier and a movable barrier operator identifier from a user device, providing an instruction to perform a specified action with a movable barrier operator associated with the movable barrier operator identifier to the user device, determining a registration condition is met upon detecting that the specified action has been performed, and, in the event that the registration condition is met, associating the movable barrier operator identifier with the user account identifier to allow a user account associated with the user account identifier to control the movable barrier operator over a network.
Access control electronics for wireless locks
Access control electronics tor wireless locks comprise one or more battery operated radios that receive access control codes. The wireless accessed locks locate the electronic components, circuits, sensors and antennas and many of the lock components away from the container being secured and closer to the operator/user. The disclosed access control electronics combine a proximity detection circuit comprising sensor pads and a capacitive sensing circuit and one or more short-range radio frequency antennas for reading RFID devices. The proximity sensor pads are in close proximity with the antennas, without the antennas interfering with the proximity sensing process, and the sensor pads to not attenuate the signals between the RFID devices and the antennas after the RFID devices are detected.
Access control electronics for wireless locks
Access control electronics tor wireless locks comprise one or more battery operated radios that receive access control codes. The wireless accessed locks locate the electronic components, circuits, sensors and antennas and many of the lock components away from the container being secured and closer to the operator/user. The disclosed access control electronics combine a proximity detection circuit comprising sensor pads and a capacitive sensing circuit and one or more short-range radio frequency antennas for reading RFID devices. The proximity sensor pads are in close proximity with the antennas, without the antennas interfering with the proximity sensing process, and the sensor pads to not attenuate the signals between the RFID devices and the antennas after the RFID devices are detected.