G07C2009/00412

Door lock bolt plate pivot system, and associated structures and methods

Disclosed are embodiments of a tapered bolt receiver for a door lock to accommodate misalignment, between a deadbolt mounted to a door, and an opposing jamb. The tapered bolt receiver can be configured to accommodate misalignment for a deadbolt having a non-tapered bolt, such as for an electromechanical smart lock having a battery stored within a battery compartment that is integrated with an enhanced bolt. Also disclosed are embodiments of a deadbolt plate pivot assembly that is pivotably mountable to a corresponding deadbolt assembly to define a plate pivot system, to accommodate a beveled door edge. An illustrative embodiment of the deadbolt plate pivot assembly includes opposing plate that captures a hinge assembly, which can include plastic plate hinges, which serve to locate the deadbolt plate pivot assembly with respect to a corresponding bolt housing, and can provide a spring force and/or constant torque when mounted to a beveled door.

Guest access for locking device

A method includes establishing communication between a first mobile device and a locking device via a first wireless transceiver of the first mobile device and a second wireless transceiver of the locking device; determining a location of at least one of the first mobile device or the locking device responsive to the communication; receiving, by a server, permission for the guest user to access the locking device using a second mobile device where the permission is provided from an external device prior to the second mobile device interacting with the locking device; generating, by the server, a guest user profile in response to receiving the permission where the guest user profile includes data usable to allow the guest user to lock or unlock the locking device; and transmitting, by the server, the guest user profile to the second mobile device.

Systems, Devices, and/or Methods for Managing Drone Deliveries
20230112944 · 2023-04-13 ·

Certain exemplary embodiments can provide a receptacle constructed to receive deliveries from a drone. The receptacle can comprise an automatically openable lid; and a wireless receiver that is constructed to receive data concerning a delivery from the drone. The automatically openable lid can open to receive the delivery from the drone.

Access management system and access management method
11470087 · 2022-10-11 · ·

According to one embodiment of the present application, provided is an access management method of an access control device, comprising the steps of: receiving, from a user terminal, a first advertising packet including open authentication information; generating a key on the basis of at least a first random key; confirming the open authentication information on the basis of the generated key; and determining the opening of a door on the basis of the open authentication information.

Tamperproof camera
11606490 · 2023-03-14 · ·

A tamperproof video camera includes a video lens, an antenna; a wireless, transceiver, a processor, a battery compartment comprising a door, and an electronic lock. The processor receives signals through the wireless transceiver to lock or unlock the battery compartment's door. In response, the processor sends signals to the electronic lock to lock or unlock the battery compartment's door. The electronic lock is configured to lock or unlock the battery compartment's door in response to receiving the signals from the processor.

Security mechanism for wireless authentication devices

Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.

MANAGING ACCESS TO PHYSICAL AREAS BASED ON CAPTURED DIGITAL DATA AND A DATABASE

Techniques for managing access to a physical area are provided. In one technique, first data is extracted from a digital file. Based on identification data within the first data, a database is searched. A data item in the database is identified that matches the identification data. The first data is associated with the data item. After associating the first data with the data item, code data is generated. Encoded data that encodes the code data is then generated. The encoded data is sent over a computer network to a mobile device, or an account, of a user that is associated with the data item.

Mobile key enrollment and use
11643048 · 2023-05-09 · ·

A computer system performs techniques related to enrolling and using a secure credential. In some embodiments, a computer system provides user interfaces for enrolling a secure credential on the computer system. In some embodiments, a computer system provides user interfaces for inviting a user account to use a secure credential.

SAFE DELIVERY CONTAINER, AND SYSTEM AND METHOD THEREOF
20230133756 · 2023-05-04 ·

A safe delivery container, system and method which permits tracking of the state of the container and controlled release of its contents. Determination of the state of the container is preferably provided according to a plurality of sensors, including without limitation a temperature sensor, GPS tracking device, accelerometer, gyroscope, and an IMU. Tracking of the state of the container is preferably supported through a communication module which may for example comprise a SIM card. Such a communication module preferably enables the sensor signals to be transmitted to a remote location. Alternatively and/or additionally, communication of such sensor signals may occur when the container is brought into communication contact with each of a plurality of local communication devices. Upon receipt of such state information for the container, optionally and preferably the state information is written to a distributed ledger technology (DLT) such as for example the blockchain.

SMART DEVICE CONTROL METHODS AND SYSTEMS

A smart device control method and system is provided. The smart device control method may include obtaining a control command, the control command being used for instructing the smart device to perform a target operation; determining whether the control command satisfies a preset condition; and in response to determining that the control command satisfies the preset condition, controlling the smart device to perform the target operation.