G07C2009/00388

UPPER LAYER DEVICE ARCHITECTURE FOR ULTRA-WIDE BAND ENABLED DEVICE

A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.

Electronic identification, location tracking, communication and notification system with beacon clustering

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allows for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking. Also provided is a system and method for identifying a customer's location at a business and provide notification to a company representative upon arrival of the customer at the business location. Real-time location determinations for the customer and customer location tracking can be provided. One or more wireless beacons communicate with the customer's electronic device. The beacons provide the system with real-time data about the customer's whereabouts, allowing for the confirmation and tracking of the customer at the location. A first non-limiting example of use, include a company that provides food and beverage allowing the customer to place an order for food and beverages on their electronic device and having the order delivered to the person at their current location as determined by the system. Another non-limiting example includes a company using the notification system to have assigned staff members notified of the customer's arrival.

MECHANISMS, ASSEMBLIES AND ELECTRONIC LOCKING SYSTEM

Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess. A freewheel mechanism and assemblies for an electronic locking system are also provided.

KEYLESS PATTERN-BASED MECHANISM FOR UNLOCKING VEHICLE

An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.

Authentication method for authenticating that target vehicle is vehicle of which dispatch has been reserved in dispatch system, storage medium, server, and dispatch system

An authentication method includes: receiving, from a terminal of a user, a user ID for identifying the user and a target vehicle ID for identifying a target vehicle that the user tries to authenticate; determining whether the target vehicle ID matches a reserved vehicle ID for identifying a reserved vehicle whose dispatch has been reserved by the user; in a case where the target vehicle ID matches the reserved vehicle ID, transmitting, to the target vehicle, an unlocking instruction to unlock a door of the target vehicle and causing the terminal to present a message indicating that the user is allowed to get on the target vehicle; and in a case where the target vehicle ID does not match the reserved vehicle ID, causing the terminal to present a message indicating that the target vehicle is not the reserved vehicle of the user.

Method for securing a communication between a mobile communication apparatus and a vehicle

The invention relates to a method (100) for securing a communication between a mobile communication apparatus (10) and a vehicle (5), in particular for authentication at a passive access system of the vehicle (5), wherein the vehicle (5) comprises at least one radio unit (20).

ESTABLISHMENT OF SECURE BLUETOOTH CONNECTION TO INTERNET OF THINGS DEVICES, SUCH AS ELECTRONIC LOCKS
20220335764 · 2022-10-20 ·

Systems and methods are disclosed for managing secure connection between a mobile device and an Internet of things device, such as an electronic lock. In some instances, a mutual authentication process is performed, and public keys are exchanged. Once keys are exchanged, subsequent communication between the devices may be encrypted using a shared key generated using the exchanged keys.

SYSTEMS AND METHODS FOR DYNAMIC CONTACTLESS SMART LOCKERS

A system described herein may provide for the dynamic and secure assignment of lockers that may be used when delivering goods in response to a fulfillment request. In some embodiments, smart tags may be used for packages provided in response to a fulfillment request. A smart locker system of some embodiments may include a set of lockers and one or more scanners that identify goods that have been delivered into a particular locker, such as by scanning smart tags placed on or in packages. The smart locker system may further receive a request from a User Equipment (“UE”), via a contactless tap, to provide the delivered goods, authenticate the UE, locate the particular locker in which the delivered goods are located, and unlock the locker.

Access management system and access management method
11470087 · 2022-10-11 · ·

According to one embodiment of the present application, provided is an access management method of an access control device, comprising the steps of: receiving, from a user terminal, a first advertising packet including open authentication information; generating a key on the basis of at least a first random key; confirming the open authentication information on the basis of the generated key; and determining the opening of a door on the basis of the open authentication information.

METHOD AND SYSTEM FOR SMART BLUETOOTH OPERATION SWITCHING BASED ON BEACON BROADCAST

A method and a system for smart Bluetooth operation switching based on a beacon broadcast are provided. A Bluetooth device transmits the beacon broadcast; a mobile terminal scans the beacon broadcast and, by parsing the beacon broadcast, the mobile terminal determines whether to wake up an application program; sending a parsed beacon broadcast to the application program, and identifying feature data of a Bluetooth device connectable broadcast set in the beacon broadcast; the Bluetooth device transmits a connectable broadcast; the mobile terminal connects to the connectable broadcast and performs an identity verification; acquiring a received signal strength indicator (RSSI) signal strength between the Bluetooth device and the mobile terminal, and mutually calculating position information to obtain a relative distance of the Bluetooth device and the mobile terminal; and, when the relative distance reaches a threshold, executing a corresponding switch action.