G07C2009/00365

Vehicular Pest Repeller

In-vehicle transducers (speakers, sound exciters, or vibrating window panels) are used to generate the ultrasonic waves to repel pests, without driving away family pets or exposing nearby people. In one preferred method, a pest deterrent mode is activated in response to a first user command by emitting ultrasonic soundwaves from a transducer driven by an onboard audio system. A region around the vehicle is monitored for human-related activity within the region. The emission of ultrasonic soundwaves is deactivated when the human-related activity is detected. Emission of the ultrasonic soundwaves is resumed when the human-related activity is no longer detected. Then the pest deterrent may be set to a deactivated mode in response to a second user command.

Method of controlling access
11282318 · 2022-03-22 · ·

A method of controlling access to a zone 300a, 300b, 300c, the zone is accessed via a first access point 301a, 301b, 301c having an associated first set of access rights, the first set of access rights including permission for a first entity category to access the zone 300a, 300b, 300c, the method including: receiving a first signal including a first identifier indicating that a first entity 302 identified by the first identifier and belonging to the first entity category is at the first access point 301a, 301b, 301c; in response to receipt of the first signal, allowing the first entity entry into the zone 300a, 300b, 300c through the first access point 301a, 301b, 301c; and in response to receipt of the first signal, temporarily changing the access rights associated with the first access point 301a, 301b, 301c to a second set of access rights.

METHOD OF CONTROLLING ACCESS
20220076516 · 2022-03-10 ·

A method of controlling access to a zone 300a, 300b, 300c, the zone is accessed via a first access point 301a, 301b, 301c having an associated first set of access rights, the first set of access rights including permission for a first entity category to access the zone 300a, 300b, 300c, the method including: receiving a first signal including a first identifier indicating that a first entity 302 identified by the first identifier and belonging to the first entity category is at the first access point 301a, 301b, 301c; in response to receipt of the first signal, allowing the first entity entry into the zone 300a, 300b, 300c through the first access point 301a, 301b, 301c; and in response to receipt of the first signal, temporarily changing the access rights associated with the first access point 301a, 301b, 301c to a second set of access rights.

System and method for communicating with a vehicle

A system and method for using a portable device to communicate with a vehicle to authorize one or more vehicle operations. The portable device may authorize the vehicle to unlock/lock doors, start the vehicle engine, or mobilize the vehicle, or a combination thereof. The vehicle may include a vehicle transmitter system with one or more transmitters disposed at various locations on the vehicle, and the portable device may be configured to monitor a communication strength between the portable device and the one or more transmitters of the transmitter system. Based on the monitored signal strength, the portable device may determine location information about itself.

NEAR FIELD COMMUNICATION TAG
20210192876 · 2021-06-24 ·

A method and a tag for opening a powerless electromechanical lock are provided. The tag comprises a power source, a near field communication transceiver, an antenna connected to the transceiver, an proximity switch and a controller. The switch is configured to wake up the controller from a low power mode upon a detection of a predetermined signal. The controller is configured after the wake up to activate the near field communication transceiver and control the transceiver to transmit via the antenna wirelessly first operating power to the lock for communication and authentication, perform authentication with the lock and, provided that the authentication is successful, control the transceiver to transmit wirelessly second operating power to the lock for the lock to be set into an openable state.

REGION ARRANGEMENT METHODS, APPARATUSES AND STORAGE MEDIA
20210201384 · 2021-07-01 ·

Examples of the present disclosure provide a region arrangement method, apparatus and storage medium, wherein the region arrangement method includes: respectively acquiring association degree data between a first region and each of a plurality of second regions, wherein the first region and the plurality of second regions are located in a first site; obtaining a region arrangement analysis result by analyzing, according to the association degree data, arrangement between the first region and the plurality of second regions in the first site; and based on the region arrangement analysis result, performing region arrangement on a second site or outputting region arrangement information of the second site.

Method and Device for the Non-Mechanical Activation of a Closure Arrangement

A method and a device are provided for non-mechanical activation of a closure arrangement, in particular of a vehicle door, by way of a mobile terminal. The mobile terminal is registered and corresponding registration information is generated, on the basis of which an activation signal is transmitted to the registered terminal. The terminal changes from a first operating state into a second operating state on the basis of the activation signal, wherein in the second operating state a user input is registered by way of the terminal, and corresponding input data are generated. An activation signal which is output by the terminal operated in the second operating state, on the basis of the input data, is received, and the closure arrangement is activated in a power-driven fashion on the basis of the activation signal.

INTELLIGENT LOCK
20230419753 · 2023-12-28 ·

A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.

Intelligent lock
11854324 · 2023-12-26 · ·

A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.

SHARING VEHICLE ACCESS BY USING MOBILE DEVICE MESSAGING

In selected embodiments, a vehicle control system (VCS) is coupled to a vehicle computer and configured to present selectively appearance of a presence in the vehicle of a smartkey, e.g., by energizing/de-energizing the smartkey. The VCS communicates with a remote vehicle control platform (VCP) configured to direct the VCS and send/receive SMS messages. An authorized user of the vehicle sends from a smartphone an SMS to the VCP, identifying the vehicle and a smartphone of another person with whom the authorized user wishes to share the vehicle. The VCP sends an SMS to the other person's smartphone, notifying the other person of the vehicle's availability. The second person replies to the VCP, requesting vehicle access. The VCP receives the reply SMS, validates the other person's smartphone, and signals the VCS to grant vehicle access. The VCS unlocks the vehicle, and energizes the smartkey, rendering the vehicle accessible.