G07C2009/0042

SELF-SERVICE MODULAR DROP SAFES WITH DOOR REPLACEMENT / SAFE TYPE CHANGING CAPABILITY

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

Secure communication method and smart lock system based thereof

The present disclosure provides a secure communication method, and the method may include: a sending terminal may generate data to be transmitted and determine encrypted data by encrypting the data to be transmitted using a preset encryption algorithm based on an encryption key. The encryption key may be obtained by a key exchange process between a smart door lock and a mobile terminal through a preset secure communication channel. The sending terminal may assign a unique identifier to the encrypted data and may send the encrypted data with a unique identifier to the receiving terminal, so that the receiving terminal may perform identity authentication on the encrypted data with the unique identifier and may decrypt the encrypted data based on the encryption key obtained by the key exchange process according to a result of the identity authentication.

SHARED SYSTEM AND CONTROL METHOD THEREFOR

A sharing system includes an authentication device arranged in an operation subject that can be entered and exited. The sharing system includes mobile terminals that obtain code information required to use the operation subject. The mobile terminals are allowed by the authentication device to operate the operation subject if authenticated through communication with the authentication device. The sharing system further includes a terminal checking unit that checks the number of the mobile terminals that are located near the authentication device and can communicate with the authentication device. The sharing system further includes a process execution unit that executes a process, in a case where the number of the mobile terminals checked by the terminal checking unit is more than one and any one of the mobile terminals is left forgotten in the operation subject, for allowing another one of the mobile terminals to operate the operation subject.

SELF-SERVICE MODULAR DROP SAFES WITH TECHNOLOGY SHELF REPLACEMENT CAPABILITY

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

COMPUTER SYSTEM FOR UTILIZING ULTRASONIC SIGNALS TO IMPLEMENT OPERATIONS FOR AUTONOMOUS VEHICLES
20210304532 · 2021-09-30 ·

In some examples, a control system for a vehicle can detect a set of ultrasonic signals generated by a mobile computing device of a user. Additionally, the control system can determine a pin code from the set of ultrasonic signals. Moreover, the control system can perform one or more vehicle operations to initiate fulfillment of a transport request that is associated with the determined pin code, upon the user being determined to be within a given proximity distance of the vehicle.

METHODS AND SYSTEMS FOR CONTROLLING AN INTELLIGENT DEVICE

The present disclosure relates to a method and system for controlling a smart device. The method may include obtaining correlating information of the smart device. The correlating information may include at least one of smart device information or a communication status of the smart device. The method may include determining indication information of the smart device by processing the correlating information of the smart device according to a preset algorithm. The method may include performing designated operations related to the smart device based at least in part on the indication information.

Selective arrival notification system

A method for operating an arrival notification system at a location includes receiving a request to generate a notification from an arrival notification system. The method also includes receiving, in response to the request, a token. The method further includes enabling an output from a component of the arrival notification system when the token is validated.

Tamper-resistant smart factory
10990356 · 2021-04-27 · ·

An access restriction system having a true random number generator (TRNG) to generate true random keys based on quantum-level physical properties and hub computer to provide those keys. An access-restricted component executes one or more tasks in response to receiving a verified task instruction. A component computer associated with the access-restricted component receives true random keys from the hub computer and stores the keys to a memory. A controller provides a task request to the component computer that includes a task instruction paired with a key. The component computer then verifies the task instruction by comparing and ensuring that the true random key stored to the memory matches the key received from the controller with the task request and then provides the verified task to the access-restricted component. The access-restricted component then carries out the verified task instruction.

USER INTERACTION IN A RETAIL ENVIRONMENT

A system for automatically determining the location of a user-specified item within a plurality of possible independent inventory systems is described where each inventory system is located in a different unique geographic location. The system comprises a user profile database comprising a plurality of user records associated with a plurality of different users; at least one of the user records comprising a list of items that are required by a corresponding user; an availability database for providing information relating to the availability of specific items at each of the plurality of inventory systems, a central server for interacting with a mobile telecommunications device. The server comprises: an updating engine for regularly updating the availability database with supply or usage information received from the plurality of inventory systems; the supply or usage information regarding the number of items currently available at the location of each inventory system; and a processing engine for receiving a request from the mobile device from the location associated with one of the inventory systems, the request comprising a current location identifier and a user identifier. The processing engine is arranged to: search the user profile database for a matching user record corresponding to the user identifier; retrieve from the matching user record the list of items for that user; search the availability database using a unique identifier of each item of the list and the current location identifier to determine whether the inventory system at the current location of the mobile device has any of the items on the list; and transmit a reply to the request, the reply comprising information about which items on the user's list are present at the current location of the mobile device.

METHOD AND DEVICE FOR AUTHENTICATING A USER TO A TRANSPORTATION VEHICLE

A method for authenticating a user on a transportation vehicle, wherein the transportation vehicle is coupled to an external device storing an authentication secret code and to at least one token storing a token secret code. In the method the token secret code is transmitted to the transportation vehicle when an operator control action performed with the at least one token is sensed. A new secret code is generated from the token secret code and is compared with the authentication secret code. When the new secret code matches the authentication secret code, the user is authenticated on the transportation vehicle. Also disclosed is an apparatus for authenticating a user on a transportation vehicle.