G07C2009/00412

SECURITY SYSTEM AND COMMUNICATION METHOD
20170228546 · 2017-08-10 · ·

A security system includes: a first device that includes a first processor and a first target processor; and a second device that includes a second processor and a second target processor. The first processor executes a first process including: first protecting a first program as a monitoring target among programs operating on the first target processor; first decrypting encrypted data obtained by encrypting output data from the first program; and first encrypting the decrypted output data and causing the encrypted data of the output data to be transmitted to the second device. The second processor executes a second process including: second protecting a second program as a monitoring target among programs operating on the second target processor; second decrypting the transmitted encrypted data of the output data; and second encrypting the decrypted output data and outputting the encrypted data of the output data to the second program.

Memory management for fleet operation of PEPS vehicles

Methods and apparatus are provided to dynamically configure a passive entry, passive start system to issue passive and active commands upon authentication of a remote keyless fob with a body control module in a given vehicle selected from a fleet of vehicles. In particular, a UID secret key data field is generated in the FOB data store using a fleet secret key data field and a vehicle secret key field retrieved from the BCM data store. A wakeup pattern data field stored in the FOB data store is generated with a fleet wakeup pattern data field and a master wakeup pattern data field retrieved from the BCM data store such that an approach wakeup pattern data field stored in the BCM data field is written to an approach wakeup pattern data field in the FOB data store when the remote fob is authenticated with the body control module.

Enhanced Security for Contactless Access Card System
20220270420 · 2022-08-25 ·

An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.

IDENTITY RECOGNITION
20170270723 · 2017-09-21 ·

Embodiments of the present invention provide methods, computer program products, and systems to automatically verify a person's claimed identity using wireless token passing. Embodiments of the present invention can be used to receive identification data comprising a universally unique identifier (UUID) and a first security token and process the received identification data by matching the UUID to an associated website and verifying the first security token against a second security token. Embodiments of the present invention can be used to notify a first user of the processed identification data by displaying an indication that verification of the identification data was successful or unsuccessful.

Wireless guest engagement system

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility. Services can thereby be seamlessly provided to the guests throughout the facility. The services include automatic unlocking of doors, including hotel or state room doors, based on the guests' immediate proximity to their assigned room's door. The services also include automated payment services provided at checkout or vending terminals, and automated log-on to interactive displays and portals, among others, based on secure wireless authentication of the guest devices.

SECURE SMARTPHONE BASED ACCESS AND START AUTHORIZATION SYSTEM FOR VEHICLES
20170263062 · 2017-09-14 ·

A Bluetooth enabled Smartphone may be used for both access control and start authorization in a secure and safe way, and embodiments are backward-compatible with conventional vehicle access and start systems. A smart phone acts as an intermediary authorization device to a code generator which effectively resembles a car key that is installed in a vehicle. A Bluetooth transceiver and the code generator—and, optionally, for the retrofit solution, an RF/LF transceiver—are added to the vehicle. The Bluetooth transceiver communicates with the smart phone. The code generator communicates with electronic control units in the vehicle that control access, immobilization, and engine start. The communication may happen via a wired connection or, in the case of the retrofit solution, via an RF/LF transceiver that mimics an additional car key programmed to the vehicle.

Short-range device communications for secured resource access

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

PHYSICAL ACCESS CONTROL SYSTEMS AND METHODS

A physical access control (PAC) system comprises an authentication device that includes physical layer circuitry and processing circuitry. The physical layer circuitry transmits and receives radio frequency electrical signals over a radio access network. The processing circuitry is operatively coupled to the physical layer circuitry and includes an authentication engine. The authentication engine is configured to receive access credential information via the radio access network using a cloud-based messaging service; authenticate the access credential information using the authentication device; and initiate access to a physical access portal according to the access credential information.

METHODS AND SYSTEMS FOR OFFLINE VERIFICATION CODE GENERATION BASED ON SMART DOOR LOCK SYSTEM

The present disclosure provides a method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.

VEHICLES AND CLOUD SYSTEMS FOR SHARING E-KEYS TO ACCESS AND USE VEHICLES
20210394637 · 2021-12-23 ·

A vehicle configured to communicate with a server of a cloud system to enable access to use the vehicle via one or more electronic keys is provided. The vehicle includes electronics and a subsystem of the vehicle for enabling unlocking of the vehicle. The subsystem is interfaced with the electronics and a subsystem of the vehicle for enabling starting of the vehicle for use of the vehicle. The vehicle further includes communications circuitry that is interfaced with electronics of the vehicle. The communications circuitry is programmable to communicate with the server of the cloud system and communicate with a mobile device. The communications circuitry of the vehicle is configured to receive a request from the mobile device for unlocking of the vehicle. The request from the mobile device includes coded data obtained by the mobile device from the server to enable sending the request to the vehicle. The coded data is associated with privileges for use of the vehicle. The privileges are defined for the coded data, and the vehicle is configured to receive information from the server to authenticate the request by the mobile device. And, if the request is authentic, the mobile device is provided with data to enable an electronic key to use the vehicle, and the electronics of the vehicle instructs the subsystem of the vehicle to enable unlocking of the vehicle and enable starting of the vehicle for use of the vehicle via the electronic key consistent with the privileges of the coded data.