Patent classifications
G07C2009/00365
FINGERPRINT MODULE, FINGERPRINT IDENTIFICATION SYSTEM, CONTROL METHOD, AND SMART LOCK
A fingerprint module, a fingerprint identification system, a control method and a smart lock. The fingerprint module includes: a fingerprint sensor, an MOC, and a key member, and the key member is connected to the fingerprint sensor. The key member is configured to generate an interrupt signal according to a touch operation of a user on the key member to wake up the main control unit, thereby reducing power consumption of the main control unit.
SMART MANAGEMENT DEVICE, LOCK, AND IDENTIFICATION METHOD
A smart management device identification method includes: sending, by a smart management device, an activation request to a smart lock device, wherein the activation request is used to verify validity of the smart management device; in response to information indicating that the smart management device is valid, receiving, by the smart management device, an access control key from the smart lock device, wherein the access control key is generated according to a master key of the smart lock device and an identifier of the smart management device; and requesting, by the smart management device, the smart lock device to perform a state switching operation using the access control key.
SYSTEM AND METHOD FOR ADMINISTERING PHYSICAL SECURITY ACCESS TO COMPONENTS OF A PROCESS CONTROL SYSTEM
A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user. Upon authentication of a user for physical access to the particular process control component, the user may directly access the component for which the user is authorized. The system provides tracking of all authenticated users and attempts to access the various control system components.
Electronic key and method for operating an electronic key
Upon a triggering event, an electronic key for a vehicle, comprising a microcontroller and a motion sensor to detect movement of a transponder unit, performs a first measurement resulting in a first measurement value, and compares the first measurement value to a predefined threshold value. Subsequently, the key: performs a plurality of first reference measurements to determine a first average value over the plurality of first reference measurements if the first measurement value is below the predefined threshold value; and performs a plurality of second reference measurements to determines a second average value over the plurality of second reference measurements, and compares the second average value with the first average value if the first measurement value equals or is above the predefined threshold value. The electronic key is considered as moving if a difference between the second average value and the first average value is greater than a third threshold.
LOW FREQUENCY OR ULTRA WIDE BAND CONTROL BY BLE IN IDENTIFICATION DEVICE
A vehicle access system includes an identification device with a first transceiver, a short-range transceiver and a processor configured to control the first transceiver and the short-range transceiver to activate the first transceiver only when a distance measurement between the identification device and a vehicle is within a predefined range as determined utilizing the short-range transceiver.
Systems and Methods for Controlling a Locking Mechanism Using a Portable Electronic Device
Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device.
COMMUNICATION DEVICE, COMMUNICATION SYSTEM AND COMMUNICATION METHOD
A communication device mounted at a vehicle, the communication device including: a blocking section that, in a case in which communication with a second mobile device that is different from a first mobile device that transmits key information for the vehicle is interrupted, performs a blocking process to block an unlocking of the vehicle or a starting of the vehicle that is performed based on received key information.
POWER-SAVING DOOR LOCK SYSTEMS AND METHODS
An electronic door lock system that saves power by putting some electronic devices, such as transceivers, in sleep mode and by executing instructions only in response to ambient trigger scenarios. Instructions sent to an electronic door lock from a remote device could be stored on a server before being downloaded to the electronic door lock system once the transceiver is awakened from sleep mode.
INTELLIGENT LOCK
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
System and method for administering physical security access to components of a process control system
A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user. Upon authentication of a user for physical access to the particular process control component, the user may directly access the component for which the user is authorized. The system provides tracking of all authenticated users and attempts to access the various control system components.