G07C2009/00412

Advance mobile device and vehicle profile pairing

An advance pairing system preemptively pairs a phone to a vehicle using a backend cloud system prior to establishing the connection with the vehicle, such as during the time that a user is purchasing a vehicle, or just after the user enters the vehicle for the first time. The system includes a mobile application for automated advance pairing with the vehicle's automotive computer. The mobile app sends a request for advance pairing to a server that assigns a set of unique keys to the account for secure pairing of the mobile device and the vehicle. The server pushes an encrypted payload to both the mobile device app and the vehicle advance pairing app operating on the automotive computer. The encrypted payload can include a unique vehicle ID, a unique mobile device ID, and one or more encryption keys. The mobile device and the vehicle use the encrypted advance pairing information to establish a secured connection with minimal user input.

UPPER LAYER DEVICE ARCHITECTURE FOR ULTRA-WIDE BAND ENABLED DEVICE

A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.

SECURE LOCKING OF KEYLESS LOCK CONTROLLERS
20220375291 · 2022-11-24 ·

A lock control interface is operably connectable to an electrical actuator of a lock that restricts access to a physical resource. A primary wireless interface communicates with a wireless mobile device within a local vicinity of the primary wireless interface. A primary processor is connected to the primary wireless interface and the lock control interface. A secondary wireless interface communicates with a server via a long-range low-power wireless network. A secondary processor is connected to the secondary wireless interface. The secondary processor communicates with the server using the secondary wireless interface. The secondary processor is not operably connected to lock control interface. The primary processor controls the electrical actuator through the lock control interface to unlock the lock based on communication of cryptographic access data.

LOCK AND SWITCH CONTROLLER SYSTEM, LOCK AND SWITCH DEVICE WITH OFFLINE RESPONSIVENESS, LOCK AND SWITCH CONTROLLER SYSTEM WITH FLEXIBLE COMMANDS
20220366742 · 2022-11-17 ·

A lock and switch controller system, a lock and switch device with offline responsiveness, and system with flexible commands are present. The disclosure provides a lock and/or switch and controller system having a controller with a means of receiving readable alpha and/or numeric input manually from a user using a keypad or other means. The apparatus disclosed herein, provides for the compilation of commands, encrypted in the form of human readable tokens containing covert instructions for the remote control and management of target devices. Any instructions to an appliance or any other users' credentials can be encrypted by an administrator and/or owner and delivered to the controller of the appliance by a user without compromising any security. The lock and switch controller system operates independently and can accept new rules without the presence of the administrator or owner and without connectivity to any communications network.

SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

GUEST ACCESS FOR LOCKING DEVICE

A system includes a server having a communication device and a processing circuit. The communication device is configured to facilitate communication with electronic devices. The processing circuit is configured to receive permission from a first user device for a guest user to access an electronic lock using a second user device, provide a notification to the second user device regarding a guest user profile, receive an activation command from the second user device based on the notification, generate the guest user profile for the guest user in response to receiving the permission and the activation command, and transmit the guest user profile to the second user device. The guest user profile is usable to allow the guest user to unlock the electronic lock.

SCHEDULED ACCESS CONTROL FOR AN ELECTRONIC LOCK

Methods and apparatus to support scheduled access control for an electronic lock are described herein. An initiating central wireless device obtains an ephemeral identity resolving key (IRK) to use in resolving an ephemeral resolvable private address (RPA) of a peripheral wireless device. The initiating central wireless device can subsequently connect securely to the peripheral wireless device in order to unlock an electronic lock controlled by the peripheral wireless device to gain access during a scheduled time period. The ephemeral IRK and ephemeral RPA can be used for a limited period of time and/or for a predetermined number of usages during the scheduled time period.

DEADBOLT CONTROL AND SECURITY SYSTEMS

A deadbolt control and security system for preventing rotation of a deadbolt manual egress handle of a deadbolt lock is described herein. The system preferably includes a deadbolt interface unit and at least one actuator unit. The deadbolt interface unit has a manual mode (the deadbolt interface unit manual egress handle controlling locking and unlocking the deadbolt lock) and a remote mode (the at least one actuator unit controlling locking and unlocking the deadbolt lock). The deadbolt interface unit includes: a deadbolt interface unit manual egress handle; a gear train having a shaft coordinated with the deadbolt interface unit manual egress handle; a unit-handle coupler that interfaces between the deadbolt manual egress handle and the deadbolt interface unit manual egress handle via the shaft; and a clutch. Preferred systems prevent the deadbolt lock from being unlocked using keys and/or other bypass tools.

Method for securing a communication between a mobile communication apparatus and a vehicle

The invention relates to a method (100) for securing a communication between a mobile communication apparatus (10) and a vehicle (5), in particular for authentication at a passive access system of the vehicle (5), wherein the vehicle (5) comprises at least one radio unit (20).

Electronic Locking Systems, Methods, and Apparatus

Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.