G07C2009/0042

Wireless communication system

A wireless communication system includes: an in-vehicle unit mounted on a vehicle and capable of wirelessly transmitting an access signal when an operation unit is operated; a portable device capable of wirelessly transmitting a vehicle-specific authentication code on a condition that the access signal is received; and a determination unit capable of determining whether or not the authentication code is a regular authentication code on a condition that the authentication code is received. Start of a driving source of the vehicle is permitted or running of the vehicle is enabled when the determination unit determines that the authentication code is the regular authentication code, and a security mode in which a function of transmitting the access signal by the in-vehicle unit or a function of transmitting the authentication code by the portable device is stopped can be set by a predetermined setting operation.

SELF-SERVICE MODULAR DROP SAFES

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

System for user interaction in a retail environment

A system for automatically determining the location of a user-specified item within a plurality of possible independent inventory systems is described where each inventory system is located in a different unique geographic location. The system comprises a user profile database comprising a plurality of user records associated with a plurality of different users; at least one of the user records comprising a list of items that are required by a corresponding user; an availability database for providing information relating to the availability of specific items at each of the plurality of inventory systems, a central server for interacting with a mobile telecommunications device. The server comprises: an updating engine for regularly updating the availability database with supply or usage information received from the plurality of inventory systems; the supply or usage information regarding the number of items currently available at the location of each inventory system; and a processing engine for receiving a request from the mobile device from the location associated with one of the inventory systems, the request comprising a current location identifier and a user identifier. The processing engine is arranged to: search the user profile database for a matching user record corresponding to the user identifier; retrieve from the matching user record the list of items for that user; search the availability database using a unique identifier of each item of the list and the current location identifier to determine whether the inventory system at the current location of the mobile device has any of the items on the list; and transmit a reply to the request, the reply comprising information about which items on the user's list are present at the current location of the mobile device.

Access control method for persons and system for carrying out the method

An access control method for people in which the access control device (16) is assigned to an access point. Each access control device (16) has at least one antenna (1, 2, 8, 9, 10, 11), which emits beacons. Each access area (3) can only accommodate one person at a time. All antennas lie on an antenna plane. The transmitted beacons containing a unique access point ID, which positively identifies the access point and a unique antenna ID within predefined intervals. The received beacons are analyzed based on the RSSIs (Received Signal Strength Indicator) such that the distance of the mobile device (14) to the at least one antenna (1, 2, 8, 9, 10, 11) is determined. The received access point ID are transmitted to a server (15) or to the access control device (16) for analysis. Access is granted if the access authorization is valid for the access point ID.

SECURE DEVICE OPERATION USING TRANSFERRED CODE MODULES
20210209874 · 2021-07-08 ·

A first device uses a first runtime environment executing on the first device to transfer a code module to a second runtime environment executing on a second device. The code module is configured to execute within the second runtime environment and expose a function of the second device that is supported by the second runtime environment to the first device. The first device executes an application within the first runtime environment. The application remotely invokes the function of the second device via the transferred code module and the second runtime environment.

Method and device for authenticating a user to a transportation vehicle
10882492 · 2021-01-05 · ·

A method for authenticating a user on a transportation vehicle, wherein the transportation vehicle is coupled to an external device storing an authentication secret code and to at least one token storing a token secret code. In the method the token secret code is transmitted to the transportation vehicle when an operator control action performed with the at least one token is sensed. A new secret code is generated from the token secret code and is compared with the authentication secret code. When the new secret code matches the authentication secret code, the user is authenticated on the transportation vehicle. Also disclosed is an apparatus for authenticating a user on a transportation vehicle.

Automated container kiosk
10878680 · 2020-12-29 ·

Apparatuses, methods, systems, and program products are disclosed for an automated container kiosk. An apparatus includes a request module configured to receive a request over a data network to unlock a door of a container. An apparatus includes a payment module configured to determine whether one or more payment conditions is satisfied for one or more items within a container. An apparatus includes a security module configured to, in response to determining that one or more payment conditions is satisfied, receive unlock information for unlocking a door of a container and enable one or more security measures for monitoring activity within the container.

TAMPER-RESISTANT SMART FACTORY
20200379734 · 2020-12-03 · ·

An access restriction system having a true random number generator (TRNG) to generate true random keys based on quantum-level physical properties and hub computer to provide those keys. An access-restricted component executes one or more tasks in response to receiving a verified task instruction. A component computer associated with the access-restricted component receives true random keys from the hub computer and stores the keys to a memory. A controller provides a task request to the component computer that includes a task instruction paired with a key. The component computer then verifies the task instruction by comparing and ensuring that the true random key stored to the memory matches the key received from the controller with the task request and then provides the verified task to the access-restricted component. The access-restricted component then carries out the verified task instruction.

SELECTIVE ARRIVAL NOTIFICATION SYSTEM

A method for operating an arrival notification system at a location includes receiving a request to generate a notification from an arrival notification system. The method also includes receiving, in response to the request, a token. The method further includes enabling an output from a component of the arrival notification system when the token is validated.

Access key transmission over personal area networks in vehicles

A vehicle includes a controller. The controller is configured to send a nonce encrypted according to a symmetric encryption key. The nonce is sent responsive to receiving a pair request over a personal area network from a nomadic device outside the vehicle. The controller is further configured to initialize a secure connection using a random key and permit vehicle access according to data received via the secure connection. The initialization is responsive to receiving a concatenation of the random key and an incrementation of the nonce encrypted with the symmetric encryption key.