Patent classifications
G07C2009/00341
Access Control Via Selective Direct and Indirect Wireless Communications
A system is described for controlling a locking system restricting physical access (e.g. a door lock). The locking system is accessed (e.g., actuated and monitored) via dual communication path types used by a mobile wireless communication device. The locking system includes an electro-mechanical access control security device, and a receiving unit controlling the electro-mechanical access control security device. The receiving unit is paired with the mobile wireless communication device for receiving input from the mobile wireless device for activating the electro-mechanical access control security device using both low energy and high energy operating modes. The mobile wireless device is configured to access the locking system via both direct BLUETOOTH and indirect mobile wireless data network communications. Moreover, the operating range of the receiving unit is extended by connections to networked devices operating BLUETOOTH 4+LE at a high power—extended range mode through the use of an amplifier stage.
ACCESS CONTROL SYSTEM AND METHOD FOR OPERATING AN ACCESS CONTROL SYSTEM
A system for controlling access to an access-restricted zone in a building includes a transmitting device transmitting a first radio signal, a receiving device for radio signals, a control device and a signal processing device communicatively connected to the receiving and control devices. The signal processing device determines a first channel impulse response based on the first radio signal received by the receiving device and a second channel impulse response based on a second radio signal received by the receiving device. The second radio signal is transmitted from a first mobile electronic device of a first user. The signal processing device determines a degree of similarity by evaluating the first and second channel impulse responses. The degree of similarity indicates how similar the first and second channel impulse responses are to one another. The control device initiates a building action if the degree of similarity meets a specified rule.
SYSTEM AND METHOD OF IDENTIFYING AND VERIFYING A VALID ENTRY OF AN APPLICATION USER INTO A VENUE USING CONTACLESS CREDENTIAL VERIFICATION
A comprehensive contactless entry verification system for use within a predefined space, such as an entry point to a venue requiring verified credentials for entry, including sporting events, modes of transportation, bars and restaurants, concerts, and other exclusive or limited capacity events. Rather than relying on a physical scanning event, the system improves an entry speed of a patron by automatically tracking, in real-time, a position of each patron within a predefined space, simultaneously querying, verifying, and tracking a credential associated with each patron for a contactless entry into a venue. Moreover, by allowing venue personnel to focus attention on security concerns rather than entry verification, the system improves safety protocols associated with a given event. The collaborative, comprehensive system includes cameras, transmitters, and a position engine, with each component working in combination to detect and verify a credential associated with one or more mobile devices.
Home monitoring system triggered rules
In some implementations, a system can trigger an action to be performed at a property based on satisfaction of criteria related to location information and a connection status of a mobile computing device. Location information of the mobile computing device relative of a pre-defined geographic region including at least a portion of the property is initially obtained. A connection status of the mobile computing device for a short range wireless connection with a communication-enabled device within the property is then obtained. Criteria for an action at the property is then determined to be satisfied by the location information and the connection status of the mobile computing device. The action is finally triggered to be performed at the property in response to determining that criteria for the action is satisfied.
METHODS AND APPARATUS FOR VALIDATING WIRELESS ACCESS CARD AUTHENTICITY AND PROXIMITY
A method includes performing, by a terminal with an access card, a first relay attack check for the access card in accordance with a local value associated with the terminal and a local value associated with the access card; determining, by the terminal, that the access card has passed the first relay attack check, and based thereon, performing, by the terminal with the access card, an authentication check of the access card in accordance with the local value associated with the terminal, the local value associated with the access card, and a local challenge value associated with the terminal; and determining, by the terminal, that the access card has passed the first relay attack check and the authentication check, and based thereon, validating, by the terminal, the access card.
Home monitoring system triggered rules
In some implementations, a system can trigger an action to be performed at a property based on satisfaction of criteria related to location information and a connection status of a mobile computing device. Location information of the mobile computing device relative of a pre-defined geographic region including at least a portion of the property is initially obtained. A connection status of the mobile computing device for a short range wireless connection with a communication-enabled device within the property is then obtained. Criteria for an action at the property is then determined to be satisfied by the location information and the connection status of the mobile computing device. The action is finally triggered to be performed at the property in response to determining that criteria for the action is satisfied.
APPARATUS AND METHOD FOR DETERMINING UWB MULTI-RANGING PRIORITIES
An apparatus for determining UWB multi-ranging priorities including a memory configured to store one or more instructions, a first communication system configured to perform a first communication with a plurality of digital keys, and processors configured to execute the one or more instructions to determine a respective UWB multi-ranging priority of a plurality of UWB multi-ranging priorities for each respective digital key of the plurality of digital keys based on received signal strength indicators (RSSIs) of a first plurality of communication signals of the first communication received by the first communication system for each digital key.
ACCESS SYSTEM AND METHOD OF OPERATING AN ACCESS SYSTEM FOR A MOTOR VEHICLE
A user detection system and method a motor vehicle that has a closure panel for facilitating access to the motor vehicle by a user of the motor vehicle are provided. The system includes a hardware token associated with and carried by the user to provide an authorization to access the motor vehicle. The system additionally includes at least two proximity sensors configured to detect the hardware token in proximity to the motor vehicle. The system also includes a controller connected to the at least two proximity sensors and configured to determine a location of the user relative to the motor vehicle using the at least two proximity sensors. The controller grants or rejects access to the motor vehicle via the at least one closure panel based on the authorization and the location of the user relative to the motor vehicle.
HOME MONITORING SYSTEM TRIGGERED RULES
In some implementations, a system can trigger an action to be performed at a property based on satisfaction of criteria related to location information and a connection status of a mobile computing device. Location information of the mobile computing device relative of a pre-defined geographic region including at least a portion of the property is initially obtained. A connection status of the mobile computing device for a short range wireless connection with a communication-enabled device within the property is then obtained. Criteria for an action at the property is then determined to be satisfied by the location information and the connection status of the mobile computing device. The action is finally triggered to be performed at the property in response to determining that criteria for the action is satisfied.
METHODS AND DEVICES FOR DETERMINING A DISTANCE VALUE REPRESENTING A TIME OF FLIGHT AND/OR A DISTANCE BETWEEN AT LEAST TWO TRANSCEIVERS, IN PARTICULAR ON THE PART OF A MOTOR VEHICLE AND A VEHICLE KEY
Disclosed are a method and a device for determining, repeated in time intervals, of at least one of a distance value representing a time of flight and a distance between at least two transceivers by exchanging messages between the at least two transceivers, wherein on the part of at least one transceiver: at least one antenna is provided in each case for transferring messages by in each case at least one of transmitting and receiving the messages, wherein furthermore at least one evaluation unit is provided to determine a first distance value using messages transferred by at least one antenna and to determine at least one second distance value using of messages transferred by at least one antenna, wherein furthermore a selection unit is provided, which is configured to select in each case, from the last determined distance values, the smallest distance value