Patent classifications
G07C2009/00388
ELECTRONIC LOCKS FOR SERVER RACKS
Embodiments of the present invention are directed to systems and methods for preventing unauthorized access to server racks. In one example, a system includes an electronic key and an electronic lock configured to be attached to the server rack. The electronic lock is configured to communicate with the electronic key for determining whether the electronic key is authorized to unlock or lock the lock. The electronic lock includes a handle configured to be disengaged from the electronic lock when the electronic key is authorized, and the handle is configured to be actuated to unlock the lock for accessing the server rack when the handle is disengaged from the electronic lock. The electronic lock is configured to re-lock only when the handle is engaged with the electronic lock.
SYSTEMS AND METHODS FOR DELIVERING PRODUCTS VIA AUTONOMOUS GROUND VEHICLES TO RESTRICTED AREAS DESIGNATED BY CUSTOMERS
In some embodiments, methods and systems are provided that provide for facilitating delivery, via autonomous ground vehicles, of products ordered by customers of a retailer to customer-specified restricted areas accessible by an entryway openable via an access code.
COMMUNICATION DEVICE
A communication device includes a communication control unit generating a communication signal to be transmitted to an external source and an encryption unit connected to the communication control unit through a wiring. The communication control unit stores a predetermined communication signal indicative of a predetermined message and a target duration required for from a transmission of the predetermined communication signal to a reception of the same from the encryption unit. The communication control unit further counts an actual duration taken from the transmission of the predetermined communication signal to the reception of the same from the encryption unit. When the actual duration is longer than the target duration, the communication control unit determines that a fraudulent circuit is inserted into the wiring for fraudulently acting on the communication signal.
SECURE VEHICLE ACCESS METHOD AND SYSTEM
The present disclosure relates to a method and a system for securely accessing a vehicle. The method comprises a preliminary phase, a data exchange phase, and an access phase. The method implements the vehicle, a remote data server, and at least one personal electronic device supplied with a dedicated application. The method implements an elliptic encryption curve, a master key, a primary key, a secondary key, and a tertiary key.
Smartphones based vehicle access
A symmetric key-based generation and distribution system and method for a vehicle access authentication framework is provided, the framework comprising: a first device operated by a car owner, a second device operated by a delegated user, and a third device residing in a vehicle. The first device is configured to: request for an authentication key from the third device, the request for the authentication key comprising an ID of the first device, id.sub.O; receive an authentication key K.sub.id.sub.
SMART ENTRY SYSTEM
A smart entry system that releases a lock of an opening/closing body includes: a transmission unit that transmits a call signal to a mobile key by wireless communication; a reception unit that receives a response signal from the mobile key responding to the call signal; and a control unit that outputs a call signal transmission command to the transmission unit, performs authentication of the response signal when the reception unit receives the response signal, and outputs a command for unlocking the opening/closing body based on a result of the authentication. The call signal is transmitted by a polling system. The control unit includes an output strength setting unit that changes and sets an output strength of the call signal.
System and Method for Access Control Using Context-Based Proof
Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
AUTHENTICATION OF INTERNET OF THINGS DEVICES, INCLUDING ELECTRONIC LOCKS
Methods and systems for authenticating an Internet of Things device, such as an electronic lock, are disclosed. One method includes generating a first challenge at a server; transmitting the first challenge to the Internet of Things device; receiving a first signed certificate from the Internet of Things device, the first signed certificate being the first random number challenge signed with a private key associated with the internet of things device; and verifying the first signed certificate with the first challenge and a public key associated with the Internet of Things device. Mutual authentication of the server from the Internet of Things device is also provided.
Providing wireless access to a secure lock based on various security data
A remote security access procedure for granting access to a wirelessly controlled lock may include one of receiving an address location at a server to setup a temporary access, receiving a security question at the server required to be answered prior to the temporary access being granted, receiving a time window at the server for the temporary access to be granted, encrypting via the server an access credential comprising the address location, the security question and the time window, and transmitting from the server the encrypted access credential to a guest device.
REGULATING VEHICLE ACCESS USING CRYPTOGRAPHIC METHODS
A system and method of regulating access to a vehicle from a wireless device communicating using short-range wireless communications includes: transmitting a vehicle access certificate signing request from the wireless device to a central facility; receiving an authenticated vehicle access certificate from the central facility in response to the vehicle access certificate signing request, wherein the authenticated vehicle access certificate is signed using a central facility private key and includes the wireless device public key; transmitting the authenticated vehicle access certificate containing the wireless device public key from the wireless device to the vehicle via a short-range wireless communications protocol; receiving from the vehicle a shared secret that is encrypted by the wireless device public key; decrypting the received shared secret using a wireless device private key; generating a command controlling vehicle functions; and transmitting the command from the wireless device to the vehicle.