G07C2009/00412

REMOTE PROGRAMMING FOR ACCESS CONTROL SYSTEM WITH VIRTUAL CARD DATA
20170311161 · 2017-10-26 · ·

An access control system includes a credential service operable to generate an encrypted programming credential. A mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the encrypted programming credential from the credential service and a credential module for an access control, the credential module operable to extract programming data from the encrypted programming credential, the programming data usable to program the access control.

METHODS AND SYSTEMS FOR CONTROLLING A SMART LOCK

The present disclosure discloses methods and systems for controlling a smart lock. The method may include establishing a secure connection with a network, obtaining security control information through the secure connection, obtaining an operation input; performing a security verification based on the security control information and the operation input, and performing a corresponding operation based on the operation input when the security verification is passed.

SECURE VEHICLE ACCESS METHOD AND SYSTEM
20170301167 · 2017-10-19 ·

The present disclosure relates to a method and a system for securely accessing a vehicle. The method comprises a preliminary phase, a data exchange phase, and an access phase. The method implements the vehicle, a remote data server, and at least one personal electronic device supplied with a dedicated application. The method implements an elliptic encryption curve, a master key, a primary key, a secondary key, and a tertiary key.

Wireless device and methods for making and using the same

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility. Services can thereby be seamlessly provided to the guests throughout the facility. The services include contact tracing, automatic unlocking of doors, including hotel or state room doors, based on the guests' immediate proximity to their assigned room's door. The services also include automated payment services provided at checkout or vending terminals, and automated log-on to interactive displays and portals, among others, based on secure wireless authentication of the guest devices. The guest devices can each include a device health sensor configured for measuring at least one health function of a user wearing the guest device.

METHOD FOR SECURE TRANSMISSION OF A VIRTUAL KEY AND METHOD FOR AUTHENTICATION OF A MOBILE TERMINAL

The invention relates to a method for transmission of a secure virtual key (VK) from a server (50, S) to a mobile terminal (20, T) capable of communicating with the server (50, S), comprising the steps of: a) reception by the server (50, S) of a certification request from the mobile terminal (20, T), b) provision and downloading on the mobile terminal (20, T), by the server (50, S), of a user application (25), and c) provision of the mobile terminal (20, T), by the server (50, S), with a virtual key (VK), and d) downloading and securing of the virtual key (VK) in a security element (27) of the mobile terminal (20, T), characterised in that said security element is formed by an encrypting software environment (27).

REVERSE TRACE-PREVENTING WIRELESS RECOGNITION SECURE ENTRY METHOD AND SECURE ENTRY SYSTEM USING SAME
20170287246 · 2017-10-05 · ·

The present invention relates to a secure entry method of a radio-frequency identification (RFID) secure entry system including a tag, a reader, a detector, a remote controller, and a locker. According to the present invention, since different data is exchanged all the time using a pre-shared encryption/decryption algorithm to transmit/receive the same data, even when reverse detection occurs from outside, accurate detection may not be easy. Furthermore, since a frequency for data transmission is randomly allocated within a pre-defined frequency list, reverse detection and jamming during communication may be prevented.

AUTHENTICATION OF INTERNET OF THINGS DEVICES, INCLUDING ELECTRONIC LOCKS
20220051498 · 2022-02-17 ·

Methods and systems for authenticating an Internet of Things device, such as an electronic lock, are disclosed. One method includes generating a first challenge at a server; transmitting the first challenge to the Internet of Things device; receiving a first signed certificate from the Internet of Things device, the first signed certificate being the first random number challenge signed with a private key associated with the internet of things device; and verifying the first signed certificate with the first challenge and a public key associated with the Internet of Things device. Mutual authentication of the server from the Internet of Things device is also provided.

SMART LICENSE PLATE VAULT
20220044504 · 2022-02-10 ·

A smart license plate vault is disclosed. The smart license plate vault securely holds small objects, such as a vehicle key, while resembling a license plate mounting platform. The smart license plate vault establishes a communication connection with a user device via the local transceiver of the smart license plate vault and receives a signed command to access the vault from the user device via the communication connection, verifies authenticity of the signed command, and unlocks the vault only upon determining that the signed command is authentic

LOCATION TRACKING FOR LOCKING DEVICE

Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a locking device, transmitting a security challenge to the mobile device, and transmitting a response to the challenge and an encrypted user profile for the locking device. The response includes data generated with an access key that is stored by both the mobile device and the locking device, and the user profile is encrypted by a server using a secret key that is stored by the server and the locking device. Authentication further includes verifying the response to the challenge, where the response is verified using the access key, and validating additional data from the mobile device. An action of the locking device may be initiated as specified by the request.

REMOTE MONITORING AND CONTROL SYSTEM FOR A BARRIER OPERATOR
20170236354 · 2017-08-17 ·

The invention generally relates to a gateway device (102) that operates as a hub or base station to provide for remote monitoring and control of a barrier operator (104,106) such as is used to operate a powered garage door. The device (102) includes a processor; a data storage device; a network interface for connecting the gateway device to a computer network (114); an operator interface for communicating with the barrier operator; and a computer program, which when executed on the processor: permits access to the gateway device over the computer network by way of a mobile application installed on a mobile device (108); transmits control signals received over the computer network to the barrier operator (104,106); and receives monitoring signals from the barrier operator (104,106).