Patent classifications
G07C2009/00317
ELECTRONIC LOCKBOX WITH INTERFACE TO OTHER ELECTRONIC LOCKS
An electronic lock system that uses an intermediary controller (IMC), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (WPC), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC's memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC's memory.
System for user interaction in a retail environment
A system for automatically determining the location of a user-specified item within a plurality of possible independent inventory systems is described where each inventory system is located in a different unique geographic location. The system comprises a user profile database comprising a plurality of user records associated with a plurality of different users; at least one of the user records comprising a list of items that are required by a corresponding user; an availability database for providing information relating to the availability of specific items at each of the plurality of inventory systems, a central server for interacting with a mobile telecommunications device. The server comprises: an updating engine for regularly updating the availability database with supply or usage information received from the plurality of inventory systems; the supply or usage information regarding the number of items currently available at the location of each inventory system; and a processing engine for receiving a request from the mobile device from the location associated with one of the inventory systems, the request comprising a current location identifier and a user identifier. The processing engine is arranged to: search the user profile database for a matching user record corresponding to the user identifier; retrieve from the matching user record the list of items for that user; search the availability database using a unique identifier of each item of the list and the current location identifier to determine whether the inventory system at the current location of the mobile device has any of the items on the list; and transmit a reply to the request, the reply comprising information about which items on the user's list are present at the current location of the mobile device.
SYSTEMS AND METHODS OF SECURITY SYSTEM ACCESS AND SHARING TEMPORAL EVENT-BASED NOTIFICATIONS AND ACCESS TO DEVICES OF DESIGNATED PERSONS
Implementations of the disclosed subject matter provide systems and methods of granting temporary control access of a home security system of a first user to a second user, where the temporary control access is for at least a portion of a home security system for a predetermined period of time. One or more tasks to be completed for the first user may be completed by the second user while having temporary control access to the home security system. The temporary control access of the second user to the at least a portion of the home security system of the first user may be revoked when the predetermined period of time has elapsed. The second user may receive a notification may be received for a security event, a safety event, a home event, and a package delivery event after the predetermined period of time has lapsed.
Systems and methods for location-based automated authentication
Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
Electronic lockbox with interface to other electronic locks
An electronic lock system that uses an intermediary controller (IMC), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (WPC), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC's memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC's memory.
SYSTEMS, DEVICES, METHODS, AND PROGRAM PRODUCTS ENHANCING STRUCTURE WALKTHROUGHS
Systems, devices, methods, and program products for enhancing structure walkthroughs are disclosed. In various embodiments, a method includes: monitoring a current location of an interested party (IP) device utilizing data collected by the IP device during a walkthrough of a structure having a structure representative (SR); detecting, based on the current location of the IP device, when the IP device is brought into proximity of a first SR-marked location included in a plurality of structure SR-marked locations; and in response to detecting that the IP device has been brought into proximity of the first SR-marked location, (i) identifying a first SR-created message corresponding to the first SR-marked location and contained in a location-referenced message set; and (ii) generating or causing generation of an SR message notification on the IP device, the SR message notification presenting or offering to present the first SR-created message to the interested party.
METHOD FOR OPERATING ELECTRONIC LOCK
A method for operating an electronic lock system is implemented between an electronic lock and a portable device. A user must first input an unlocking command to the electronic lock, and the electronic lock determines whether the unlocking command is correct. If yes, the electronic lock further performs short-range communication with the portable device and determines whether the portable device is registered. If yes, the electronic lock will be unlocked. The user only needs to perform a single unlocking operation, and the electronic lock determines whether to unlock through double verification, which combines ease of operation and safety.
Optimized differential evolution for radio frequency trilateration in complex environments
A system, device and method for wireless device localization using a differential evolution algorithm in a continuous trilateration process.
Multi-factor authentication with geolocation and short-range communication with indoor-outdoor detection
A method of controlling user access to a protected area is performed by an access control device. In response to detecting a beacon signal transmitted by a user equipment (UE) via a short-range radio access technology (RAT) the access control device determines whether the UE is within the protected area or in an exterior area that is outside the protected area. In some aspects, the access control device determines whether the UE is within the protected area or in the exterior area based on the received beacon signal. In response to determining that the UE is in the exterior area, the access control device performs a multi-factor authentication procedure. If the access control device determines that the UE is within the protected area, the access control device is configured to deny access to the protected area.
MULTI-FACTOR AUTHENTICATION WITH GEOLOCATION AND SHORT-RANGE COMMUNICATION WITH INDOOR-OUTDOOR DETECTION
A method of controlling user access to a protected area is performed by an access control device. In response to detecting a beacon signal transmitted by a user equipment (UE) via a short-range radio access technology (RAT) the access control device determines whether the UE is within the protected area or in an exterior area that is outside the protected area. In some aspects, the access control device determines whether the UE is within the protected area or in the exterior area based on the received beacon signal. In response to determining that the UE is in the exterior area, the access control device performs a multi-factor authentication procedure. If the access control device determines that the UE is within the protected area, the access control device is configured to deny access to the protected area.