G07C2009/0023

LOCKING AND UNLOCKING SYSTEM

A locking and unlocking system includes a controller. The controller is configured to acquire a state of locking and unlocking of a vehicle that is locked and unlocked based on locking and unlocking instruction information acquired from a portable terminal, and send a notification to a first device associated with the vehicle, when the vehicle is not locked during a period of time from when the vehicle is unlocked based on the locking and unlocking instruction information acquired from the portable terminal until a first timing.

Multi-sensor passive keyless functionality

In selected examples, a vehicle control system (VCS) includes Bluetooth beacons and an app running on a mobile device, such as a smartphone or a key fob equipped with movement sensors and a Bluetooth® transceiver. Passive keyless entry capability of the system uses received signal strength indications (RSSIs) together with movement-related indications of the movement sensors to determine when the mobile device moves away from the vehicle beyond a predetermined departure distance, and/or approaches the vehicle to within a predetermined arrival distance. When the user approaches the vehicle, the mobile device automatically transmits an arrival notification to the VCS, which automatically performs arrival actions, e.g., unlocking doors and disarming security features of the VCS/vehicle. When the user moves away from the vehicle, the mobile device automatically transmits a departures notification to the VCS, which performs departure actions, e.g., locking the vehicle and arming the security features of the VCS/vehicle.

Cloud door lock control system with identification of time varied 2D codes and images
11804091 · 2023-10-31 ·

A cloud door lock control system identifies time varied 2D codes and images. A cloud device transmits the encryption codes of doors to be opened, the time periods for opening the doors, and the user's encryption codes to the mobile phone. The mobile phone stores these values in a memory. A mobile phone APP receives these values and encrypts them by using a specific encrypting code. The encoding way for the encoding unit is time varied. When the cloud device receives the QR code from a card reader, it is decoded and is compared with those stored in the cloud device to determine whether the door is necessary to be opened. The cloud device stores mobile phone holder's images which is transferred to the APP. The mobile phone holder's image is displayable on the mobile phone for determining whether the mobile phone holder is acceptable to pass through the door.

Passive electronic locks and methods of using the same
11804083 · 2023-10-31 · ·

The present disclosure relates an electronic locking system. In certain embodiments, the electronic locking system includes a passive electronic lock, active electronic key and passive electronic key. The passive electronic key stores a passive digital key, and the active electronic key stores an active digital key. Each of passive and active electronic keys includes a communication channel and an electronic key power supply port. The active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key through passive electronic lock to operate passive electronic lock. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively.

Matching an user taken image with access control apparatus references for physical access control
11468719 · 2022-10-11 · ·

It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.

Matching an user taken image with access control apparatus references for physical access control
11836234 · 2023-12-05 · ·

It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.

System and method for remotely controlling locks on depositories
11069169 · 2021-07-20 ·

The present invention relates to a system and method for remotely controlling locks on depositories, primarily locks used for the purpose of securing things using a scanning device and at least one identification token. Each lock (215) is provided with a token (112) that contains identification information related to its depository system (221). A scanning device (111) is needed to decode (211) the token (112) and communicate its information to an online database (212) for authorization to access the depository (221). If the scanner (111) is authorized to access the depository (221), the online database (212) will communicate a command (213) to the lock (215) to open. This operation will need to be repeated each time the depository needs to be opened. In some embodiments, the scanning device (111) may be operatively connected to a power source that can transfer power as a means of powering depository (221).

SYSTEM AND METHOD FOR REMOTELY CONTROLLING LOCKS ON DEPOSITORIES
20210118252 · 2021-04-22 ·

The present invention relates to a system and method for remotely controlling locks on depositories, primarily locks used for the purpose of securing things using a scanning device and at least one identification token. Each lock (215) is provided with a token (112) that contains identification information related to its depository system (221). A scanning device (111) is needed to decode (211) the token (112) and communicate its information to an online database (212) for authorization to access the depository (221). If the scanner (111) is authorized to access the depository (221), the online database (212) will communicate a command (213) to the lock (215) to open. This operation will need to be repeated each time the depository needs to be opened. In some embodiments, the scanning device (111) may be operatively connected to a power source that can transfer power as a means of powering depository (221).

METHOD AND DEVICE FOR AUTHENTICATING A USER TO A TRANSPORTATION VEHICLE

A method for authenticating a user on a transportation vehicle, wherein the transportation vehicle is coupled to an external device storing an authentication secret code and to at least one token storing a token secret code. In the method the token secret code is transmitted to the transportation vehicle when an operator control action performed with the at least one token is sensed. A new secret code is generated from the token secret code and is compared with the authentication secret code. When the new secret code matches the authentication secret code, the user is authenticated on the transportation vehicle. Also disclosed is an apparatus for authenticating a user on a transportation vehicle.

Multi-sensor passive keyless functionality

In selected examples, a vehicle control system (VCS) includes Bluetooth beacons and an app running on a mobile device, such as a smartphone or a key fob equipped with movement sensors and a Bluetooth transceiver. Passive keyless entry capability of the system uses received signal strength indications (RSSIs) together with movement-related indications of the movement sensors to determine when the mobile device moves away from the vehicle beyond a predetermined departure distance, and/or approaches the vehicle to within a predetermined arrival distance. When the user approaches the vehicle, the mobile device automatically transmits an arrival notification to the VCS, which automatically performs arrival actions, e.g., unlocking doors and disarming security features of the VCS/vehicle. When the user moves away from the vehicle, the mobile device automatically transmits a departures notification to the VCS, which performs departure actions, e.g., locking the vehicle and arming the security features of the VCS/vehicle.