G07C2009/0019

VEHICULAR KEY FOB DEVICE

A sensing device can include an accelerometer, a transceiver, and a computing device in communication with the accelerometer and transceiver. The computing device can transmit a first set of signals at a first power level to a remote device. The computing device can determine, via the accelerometer, a movement of the sensing device. The computing device can increase a power level for transmission from the first power level to a second power level in response to the movement. The computing device can transmit future signals at the second power level to the remote device.

WINDSHIELD-MOUNTED VEHICLE ANTI-THEFT APPARATUS AND METHODS FOR USING SAME

A vehicle theft-prevention system can include a plurality of sensors configured to sense measurements proximate to a vehicle and a body configured to secure to a window of the vehicle. The body can include a wireless transceiver and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. The at least one computing device can be configured to, in response to the indication, transition to the armed mode, wherein transitioning to the armed mode comprises setting a configuration of at least one property of a subset of the plurality of sensors.

VEHICULAR DRIVER MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

POINT-OF-INTEREST-BASED ANTI-VEHICLE THEFT SYSTEMS AND PROCESSES FOR USING THE SAME

A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.

VEHICULAR SAFETY MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

Programmable lock box
11317748 · 2022-05-03 ·

A programmable locking assembly for an insulated enclosure such as a food delivery box that can be unlocked by the recipient of the box, by pressing a number code on the keypad of the lock, causing a locking finger to slide out from a zipper pull on the lid of the insulated enclosure to allow the recipient unzip the lid to have access to the contents of the enclosure, thereby preventing the food delivery person to access the contents of the enclosure while in route to making the delivery. The number code is texted to the recipient from the sender of the enclosure. In an alternate embodiment, an audio tone can open the lock without the user needing to press numbers on the keypad.

High Security Two-Way Virtual Cross-Barrier Observation and Communication Device
20220132073 · 2022-04-28 ·

A high security two-way virtual cross-barrier observation and communication device has a mounting frame with a hardened core, a pair of digital displays, and a pair of cameras. The mounting frame may correspond to a typical interior door of a building or a relevant component of a vehicle, aircraft, or other relevant application. The hardened core is bullet-resistant and fire-resistant to protect occupants of a protected space from harm. The digital displays and cameras are positioned on opposing sides of the mounting frame, each camera transmitting a live video feed to the opposing display, creating the appearance of a window while protecting occupants. The digital displays may be used to display any desired information. An emergency protocol may be activated to communicate with emergency services. A plurality of laminate layers bond and encapsulate the displays and cameras to the hardened core, forming a rugged, self-contained unit with no moving parts.

Physically secured device for vehicle intrusion detection

A vehicle theft-prevention apparatus can include a slip clutch mechanism, a locking mechanism, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The locking mechanism can be configured to engage based on rotation of the first portion relative to the second portion in a first direction, and disengage based on a rotation of the first portion relative to the second portion in a second direction. The slip clutch mechanism can be configured to prevent the locking mechanism from further engaging from rotation in the first direction relative to the second portion based on a magnitude of force applied.

ACCESS MANAGEMENT SYSTEM, AUTHENTICATION DEVICE FOR ACCESS MANAGEMENT SYSTEM, MANAGEMENT DEVICE FOR ACCESS MANAGEMENT SYSTEM, PORTABLE TERMINAL FOR ACCESS MANAGEMENT SYSTEM, MOBILE BODY FOR ACCESS MANAGEMENT SYSTEM, DATA STRUCTURE FOR ACCESS MANAGEMENT DATA, ACCESS MANAGEMENT PROGRAM, AND CONSTRUCTION METHOD FOR ACCESS MANAGEMENT SYSTEM
20220027448 · 2022-01-27 · ·

An access management system that reduces possibility of unauthorized access, an authentication device, a management device, a portable terminal, and a mobile body configuring the access management system, a data structure for access management data used in the access management system, an access management program executed in the access management system, and a construction method for the access management system. A plurality of nodes connected by a P2P network share a blockchain. Authentication conditions are recorded in blocks of the blockchain by a management node, which is any one of the plurality of nodes. The authentication conditions include authentication information. The authentication conditions designate an authentication node, which is any one of the plurality of nodes, as a node that performs authentication. The passing body is authenticated by the authentication node.

Modifying operational settings of a traffic signal
11189164 · 2021-11-30 · ·

The present disclosure is directed to methods and apparatus that manage the flow of traffic. Methods and systems consistent with the present disclosure may allow biometric information of individuals to be collected when access privileges associated with particular individuals are validated or updated. These methods may allow a supervisor to temporarily or permanently authorize certain employees to access components that are located within a traffic control cabinet and these methods may allow changes in traffic signal light timing to be authorized according to a set of rules. Such authorization rules may require proposed signal light timing changes to be approved by a supervisor before a proposed change is implemented. Methods and systems consistent with the present disclosure may also cause components within a control cabinet to be disabled or disconnected when a signal light control cabinet is accessed by unauthorized persons.