Patent classifications
G07C2009/00412
ESTABLISHMENT OF SECURE BLUETOOTH CONNECTION TO INTERNET OF THINGS DEVICES, SUCH AS ELECTRONIC LOCKS
Systems and methods are disclosed for managing secure connection between a mobile device and an Internet of things device, such as an electronic lock. In some instances, a mutual authentication process is performed, and public keys are exchanged. Once keys are exchanged, subsequent communication between the devices may be encrypted using a shared key generated using the exchanged keys.
SYSTEMS AND METHODS FOR DYNAMIC CONTACTLESS SMART LOCKERS
A system described herein may provide for the dynamic and secure assignment of lockers that may be used when delivering goods in response to a fulfillment request. In some embodiments, smart tags may be used for packages provided in response to a fulfillment request. A smart locker system of some embodiments may include a set of lockers and one or more scanners that identify goods that have been delivered into a particular locker, such as by scanning smart tags placed on or in packages. The smart locker system may further receive a request from a User Equipment (“UE”), via a contactless tap, to provide the delivered goods, authenticate the UE, locate the particular locker in which the delivered goods are located, and unlock the locker.
DEVICES AND METHODS FOR CONTROLLING SMART LOCK
The present disclosure discloses a method for controlling a smart lock. The method includes obtaining a control request for a smart lock, wherein the control request carries ciphertext information; decrypting the ciphertext information in response to the control request; and controlling the smart lock to perform a target operation based on a decrypted control request.
Autonomous device authentication and compartment unlocking
Systems, methods, and computer-readable media are disclosed for systems and methods for autonomous device authentication and compartment unlocking. Example methods may include determining, by a user device, an identifier associated with a target Bluetooth Low Energy peripheral device, receiving a beacon from a Bluetooth Low Energy peripheral device, and determining, using the beacon, that the Bluetooth Low Energy peripheral device is the target Bluetooth Low Energy peripheral device. Example methods may include establishing a connection with the target Bluetooth Low Energy peripheral device, and sending a signal to the target Bluetooth Low Energy peripheral device to implement an action, where the signal comprises a resource identifier, and where the target Bluetooth Low Energy peripheral device controls access to a plurality of resources, and uses the resource identifier to identify a resource of the plurality of resources at which to implement the action.
IN-FIELD ENCODING OF ACCESS CREDENTIALS
A method and system for in-field encoding of credentials to a credential device. An example method comprises receiving a request to at least one of add or update credentials to a credential device; providing an invitation code for an in-field device, the in-field device being separate from the credential device; receiving, from the in-field device, the invitation code along with information from the credential device for establishing a secure communication channel with the credential device; establishing a secure communication channel with the credential device using the in-field device as an intermediate; generating one or more commands for encoding credentials to the credential device based on the request; and sending the one or more commands, via the secure communication channel using the in-field device as an intermediate, to the credential device.
Multi-Purpose Physical Smartcard
A multi-purpose smartcard is disclosed. a computer-implemented method of controlling a smartcard. The smartcard can include a near-field communication (NFC) system. The NFC system can be configured to communicate with remote computing systems. The smartcard can include one or more computing chips embedded in the smartcard. The smartcard receives, from a provisioning computing system accessible to a user, a transaction type indicator and transaction data, the transaction type indicator indicating a particular transaction type from a plurality of potential transaction types. The smartcard stores, in the one or more computer-readable media of the one or more computing chips, the transaction data. The smartcard communicates, using the NFC communication system and in accordance with the transaction type, the transaction data to an authentication computing system.
CLOUD DOOR LOCK CONTROL SYSTEM WITH IDENTIFICATION OF TIME VARIED 2D CODES
A cloud door lock control system with identification of time varied 2D codes is provided. A cloud device transmits the encryption codes of doors to be opened, the time periods for opening the doors, and the user's encryption codes to the handset through a communication channel and the handset stores these values in a memory. A mobile phone APP receives these values and encrypts them by using a specific encrypting code. The encoding way for the encoding unit is time varied, that is, the QR code from the encoding unit is only retained for a preset time period; after the preset time period has elapsed, the encoding unit generates another QR code. When the cloud device receives the QR code from a card reader, it is decoded. These decoded data is compared with those stored in the cloud device to determine whether the door is necessary to be opened.
Two-factor authentication system
A physical access control (PAC) system configured to perform a two-factor authentication prior to granting access to a secure area. The PAC system includes an access point device configured to perform facial recognition on a person proximate to the access point device, and perform wireless handshake with a mobile device associated with the person prior to granting or denying entry to the secure area.
TECHNOLOGIES FOR USING NFC OR QR CODE TO COMMISSION A DEVICE TO THE CLOUD
A method of commissioning an access control device to an access control system according to one embodiment includes, by the access control system, receiving a public cryptographic key of a cryptographic key pair from a cryptography circuit manufacturer device, wherein at least the private cryptographic key of the public cryptographic key pair is stored in the cryptography circuit of the access control device; generating commissioning data for in-field commissioning of the access control device in response to receiving the public cryptographic key, wherein the commissioning data for the access control device is associated with a unique identifier located on the access control device; receiving a request from a mobile device for the commissioning data in response to the mobile device scanning the unique identifier on the access control device; and transmitting the commissioning data to the mobile device for transmittal to the access control device.
Method and system for decentralized digital authentication
A method and system for digital authentication is disclosed, in which an owner device associated with a smart lock receives identity information of a user device requesting access to the smart lock. The owner device registers first contract information of the smart contract, for granting access of the smart lock to the user device, on a decentralized trust network, and sends second contract information about the smart contract to the user device. The second contract information comprises validation information of the smart contract indicating an un-validated information of the second contract information. The user device validates the received second contract information against the first contract information on the decentralized trust network, and authenticates the user device with the smart lock using the validated second contract information.