Patent classifications
G07C2009/0019
DEVICE FOR DECONTAMINATION OF OBJECTS AND FOR CONTROL DECONTAMINATION
The invention relates to a decontamination control system for an establishment comprising at least one sensitive room (L), comprising: a decontaminator (D1); —at least one badge (I) with an NFC tag, and/or at least one object (T) bearing an NFC tag; a first clock (H1) of the decontaminator (D1); a sabot (S) at the entrance to said room (L), comprising an NFC reader and a second clock (H2) synchronous with the first. According to the invention, the system triggers the decontaminator (D1) when said badge (I) is appended thereunto and/or said object (T) is introduced therein, and writes the corresponding timestamp on said NFC tag; then authorizes entry (E) into said room (L) if a first period (A) between the timestamp and the reading on the sabot (S) is less than a second threshold period (B); in the opposite case, the system prohibits said entry (E).
KEY-OPERATED UNLOCKING OF AUTOMOTIVE POWER-OPERATED KEY-CYLINDER-LESS DOOR LOCKS
A motor vehicle comprising side doors, a bonnet and a boot lid, power-operated key-cylinder-less locks associated with all the side doors, a power-operated lock associated with the boot lid, a key-cylinder lock associated with the bonnet, and an electronic control system configured to sense operation of the key-cylinder lock by means of a mechanical key and, upon determining a specific operation of the key-cylinder lock by means of a mechanical key, responsively unlock one or more of the power-operated key-cylinder-less locks.
MATCHING AN USER TAKEN IMAGE WITH ACCESS CONTROL APPARATUS REFERENCES FOR PHYSICAL ACCESS CONTROL
It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.
Door lock using a mobile device as an input interface
A door lock uses a mobile device as an input interface. The door lock includes a latch device mounted to a door, an outer operating device mounted to an outer face of the door, and an inner operating device mounted to an inner face of the door. The outer operating device includes a contact-type connection interface for contact-type connection with the mobile device. After the mobile device is in electrical connection with the outer operating device, an input device of the mobile device is used to input a to-be-identified identification information to the door lock, and the door lock identifies whether the to-be-identified identification information matches authenticated identification information for subsequent unlocking operation or remaining in a locked state.
Electronic hidden shackle padlock with key override
Systems and apparatuses include a lock including a shackle movable between an unlocked state and a locked state, an electronically actuated blocker selectively engaged with the shackle to inhibit movement of the shackle from the locked state to the unlocked state, the blocker movable between a key override disabled position, a key override enabled position, and an electronic unlock position, and a key cylinder structured to move the shackle to the unlocked state when the blocker is in the key override enabled position.
REFRIGERATOR FOR ENTRANCE GATE
A controller for a refrigerator for an entrance gate according to an embodiment of the present invention is configured to: register a user authentication means through a user authentication method setting process; and to open an outer door only when user authentication has succeeded, if an article delivery command is input, thereby preventing theft of the article.
Multi-factor authentication with geolocation and voice command
A method of multi-factor authentication is performed by an access control device. In response to detecting a voice command, the access control device sends a query to a location server for a current location of a user equipment (UE) included in a list of trusted UEs. The access control device may then receive an indication of the current location from the location server and in response thereto, the access control device may determine whether the current location of the UE is within a threshold distance of the access control device. If so, the access control device may generate an access signal that indicates that a user associated with the UE is authorized to access a protected resource.
LOCK APPARATUSES AND METHODS
Moto-controlled lock apparatus/mechanism that deploys locking pins to retain the shackle when the lock apparatus/mechanism is in the closed position. Generally, when the lock apparatus/mechanism is in the closed position, the locking pins are prevented from moving by a blocking cam. In various embodiments, the blocking cam is actuated by a motor that rotates the blocking cam, thereby forcing the locking pins into and holding the locking pins in compatibly-shaped cutouts in the shackle.
Robotic sherpa
Embodiments disclosed herein include a mobile locker. The mobile locker can include a mobility unit to enable the locker to relocate from one location to another. The mobile locker is modular which allows the storage compartment to be detached from the mobility unit for storage, transfer via other means. The storage compartment can be coupled either the same or a different mobility unit. The mobile lockers can be recalled by a customer to either the customer's location or to designated locations at the venue. The lockers can include any one of multiple locking mechanisms. The mobile locker can communicate with a monitoring center that oversees the deployment of multiple mobile lockers. Embodiments of the mobile locker can interact with customers through a display, microphone, and speaker.
SENSING AND CONTROLLING STATES OF LOCKING MECHANISMS
An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.