Patent classifications
G07C2009/00412
WIRELESS DOOR LOCK SYSTEM WITH AN EMERGENCY REPORTING FUNCTION AND METHOD FOR OPERATING THE SAME
A wireless door lock system with an emergency reporting function includes a user device, a door lock device, a network server and at least one recipient device. When the user device transmits a request signal for reporting an emergency condition to the door lock device, the door lock device determines if the user device is a paired device of the door lock device according to the request signal and further sends an emergency condition confirmation signal to the user device by way of wireless communication. The user device is then connected to the network server through the Internet and transmits an emergency condition signal to activate the network server to perform a push notification service and send an emergency condition message to the at least one recipient device. Given the push notification, the emergency condition message can be instantly provided to right recipients for emergency condition notification.
Protecting the Integrity of Log Entries in a Distributed System
Systems, methods, and instrumentalities are disclosed for integrity protecting log entries generated from a first unit in a distributed system. For example, a first secret key may be received or obtained from a central management system and storing the first secret key in non-volatile memory. A second secret key may be calculated where the second secret key may be shared with a plurality of units within the same local communication domain as a unit using a secure key calculation. The second secret key may further be stored in volatile memory. The first and second keys may be used to calculate a first secret integrity protection key and a first broadcast encryption key. A security sensitive log entry may be generated and may be protected using the first integrity key and the first broadcast encryption key. The log entry may be broadcast to the plurality of units within the domain.
METHOD FOR CONNECTING BLUETOOTH KEY TO VEHICLE, VEHICLE BLUETOOTH SYSTEM, AND BLUETOOTH KEY
A method for connecting a Bluetooth key to a vehicle, a vehicle Bluetooth system, and a Bluetooth key, comprises: when a mobile terminal enters a preset distance range of a vehicle, a Bluetooth master module of the vehicle performs authentication and connection with a Bluetooth key of the mobile terminal according to preset key information (S11); after the Bluetooth master module is successfully connected to the Bluetooth key, the Bluetooth master module generates an original random code and encrypts the original random code to obtain an encrypted random code (S12); the Bluetooth master module sends the original random code to a Bluetooth slave module, and sends the encrypted random code to the Bluetooth key (S13); and the Bluetooth slave module and the Bluetooth key perform bidirectional authentication according to the encrypted random code and the original random code, and when bidirectional authentication succeeds, the connection is established (S14).
METHOD FOR OPERATING A LOCK DEVICE
A method for operating a lock device includes installing a lock device application (lock APP) into a mobile device. A first identification information and a second identification information are inputted into the mobile device under guidance of the lock APP The lock APP can be connected with a lock device within a communication range of the mobile device. Then, a hardware serial number of the lock device is inputted into the mobile device to obtain the management authority of the lock device. A manager electronic key formed by the mobile device with the management authority of at least one lock device can grant the unlocking authority of a selected lock device to another user whose account name is provided to the manager electronic key. The unlocking procedure can be carried out based on one of a quick pass pattern, a single identification pattern, and a double identification pattern.
METHODS AND SYSTEMS FOR CONTROLLING A SMART LOCK
The present disclosure discloses methods and systems for controlling a smart lock. The method may include establishing a secure connection with a network, obtaining security control information through the secure connection, obtaining an operation input; performing a security verification based on the security control information and the operation input, and performing a corresponding operation based on the operation input when the security verification is passed.
APPARATUS, SYSTEM AND METHOD FOR VEHICLE ACCESS AND FUNCTION CONTROL UTILIZING A PORTABLE DEVICE
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to one or more key fobs linked to the vehicle, and device data that includes data relating to one or more devices that are authorized to access the vehicle. The vehicle receives an access request indicating that a new device is requesting access to the vehicle, whereupon a challenge may be transmitted to one or more of the authorized devices. The one or more devices may respond, granting access to vehicle functions. The vehicle and/or authentication network generate a secure fob key and access limitations based on the response and transmit the secure fob key to the new device. The new device may be authenticated to access vehicle functions subject to the limitation based at least in part on the fob key.
Time synchronization
A method having the steps of obtaining temporal information communicated to a first device; carrying out one or more of the following tests: a test to determine whether the first device is in a state following an initial operation, a battery replacement or other power outage, or a reset, a test to determine whether a deviation between temporal information of the clock and the communicated temporal information is less than or equal to a threshold which is specified, and a test to determine whether the communicated temporal information has the same date as the temporal information of the clock; and synchronizing the clock using the communicated temporal information if all of one or more defined conditions are satisfied, wherein one of the one or more conditions requires that at least one of the one or more tests carried out has a positive result.
ASSET ENCLOSURE LOCK SYSTEM WITH ENCRYPTED IDENTIFICATION AND CREDENTIAL FUNCTIONALITY
An asset enclosure lock system includes a systemic lock device and a systemic unlock device. The lock device has a mechanical lock portion movable between an unlocked condition and a locked condition, locking an asset enclosure by way of physical engagement of the unlock device. Each device has an encrypted unique identifier that must match for the mechanical lock portion to move to the unlocked condition. The lock device is powered only by the unlock device or in other words dependently powered. The unique identifiers can be tracked as a function of time to create timestamps and an audit trail of successful engagements of a lock device and an unlock device as well as define limited time slots where specific unlock devices with successfully engage specific lock devices.
SMARTPHONE WITH INTEGRATED MULTI-TRANSPONDER MODE KEY DEVICE
A smartphone having: a configurable radio frequency transmitter; a configurable low frequency transponder with at least one low frequency coil; and a smartphone application program that is controlled by a cloud service and that is configured to configure the radio frequency transmitter and the low frequency transponder with protocol parameters and initial data values such that the low frequency transponder mimics a virgin key device that can be programmed to a particular vehicle model.
Temporary and customized vehicle access
A vehicle includes a processor programmed to validate, using a public key of a lender device, authenticity of a file including permissions for a borrower device signed using a private key of a lender device, and responsive to validating, using a public key of a borrower device, a session request from the borrower device signed with a private key of the borrower device, establish a secure connection with the borrower device over which access to the vehicle is granted per the permissions.