Patent classifications
G07C2009/00507
REGULATING VEHICLE ACCESS USING CRYPTOGRAPHIC METHODS
A system and method of regulating access to a vehicle from a wireless device communicating using short-range wireless communications includes: transmitting a vehicle access certificate signing request from the wireless device to a central facility; receiving an authenticated vehicle access certificate from the central facility in response to the vehicle access certificate signing request, wherein the authenticated vehicle access certificate is signed using a central facility private key and includes the wireless device public key; transmitting the authenticated vehicle access certificate containing the wireless device public key from the wireless device to the vehicle via a short-range wireless communications protocol; receiving from the vehicle a shared secret that is encrypted by the wireless device public key; decrypting the received shared secret using a wireless device private key; generating a command controlling vehicle functions; and transmitting the command from the wireless device to the vehicle.
SYSTEM FOR REMOTELY OPENING A LAND-VEHICLE DOOR
A system for remotely opening a land vehicle door is provided. The system includes a mobile communication device supported on the vehicle and operative to produce a first signal in the form of a first electromagnetic field defined by a field envelope. A hand-held communication device is operative to detect the first electromagnetic field and produce a second signal in the form of a second electromagnetic field when the hand-held device is located within the field envelope. Control logic is coupled to the mobile device and is operative to determine if the hand-held device is an authorized hand-held device. The control logic is operative to determine if a pedestrian carrying an authorized hand-held device is located within the field envelope and to generate a door-opening command signal when the authorized device is located within the field envelope for a predetermined period of time.
ACCESS CONTROL SYSTEM USING MOBILE DEVICE
A method of controlling access through a door may include storing a user's digital identity and a user's access policy in a memory of the user's mobile device, which may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader, which controls operation of a door lock in accordance with whether the access decision was YES or NO.
SYSTEM HAVING A MOBILE KEY UNIT
A system having a mobile key unit (2) for reading and writing data from at least one external device (3) of a facility (4), wherein the data at least comprise identification data for the device (3) to be checked, and wherein the mobile key unit (2) has a first transmission/reception unit (5) by means of which the data can be transmitted wirelessly between the device (3) and the key unit (2), wherein the key unit (2) has a first memory (6), the key unit (2) has at least one secure channel (7) having a first evaluation unit (8) and the first transmission/reception unit (5) and has at least one second channel (12) having a second evaluation unit (13) and a second transmission/reception unit (10) by means of which data can be wirelessly transferred between the device (3) and the key device (2), wherein the data can at least be transmitted using one of the transmission/reception units.
Configurable remote control system and method for a marine vessel
A remote control system for a marine vessel includes a helm transceiver positioned on the marine vessel and configured to communicate with one or more fobs, and at least one operator fob configured to wirelessly transmit a fob signal to the helm transceiver on the marine vessel. A controller is configured to receive the fob signal transmitted by the operator fob and to determine an operator distance based on the fob signal. The operator distance is compared with one or more threshold distances, and then a system command is generated based on the comparison of the operator distance to the one or more threshold distances so as to control operation of one or more devices on the marine vessel.
Position-based performance of a vehicle function in a vehicle communication system
A vehicle communication system (100) for facilitating control over a function of a vehicle (102) comprises a base station (104) positioned in the vehicle (102) and a mobile communication unit (122). The base station (104) comprises a first transmitter for transmitting a signal to the mobile communication unit and a first receiver for receiving a signal from the mobile communication unit (122). The base station (104) is configured to receive a first request from the mobile communication unit (122), wherein the first request seeks performance of a first vehicle function, determine a position of the mobile communication unit (122) relative to the vehicle (102), compare the position of the mobile communication unit (122) relative to the vehicle (102) to a first criteria, and facilitate performance of the first vehicle function if the position of the mobile communication unit (122) relative to the vehicle (102) satisfies the first criteria.
Set-top box with enhanced behavioral controls and system and method for use of same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectively includes a signal input, a signal output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then reprogram the electronic door locking apparatus as well as control amenities, such as a display, in response to presence signal from the electronic door locking apparatus.
Set-Top Box with Enhanced Behavioral Controls and System and Method for Use of Same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectedly includes a television input, a television output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then receive a status signal from the electronic door locking apparatus relative to the open/closed status of the door and locked/unlocked status of the door.
Vehicle control system
A control unit (40A) includes an operation state determination unit (43) that determines an operating state of a driving source (21) and a communication state determination unit (46) that determines a communication state between an authentication unit (2) and a remote key (4), and the control unit (40A) disables a starting of the driving source (21) by a driving source starting unit (21a) when the control unit (40A) is in an ON state, the operation state determination unit (43) determines that the driving source (21) is in a non-operating state, and the communication state determination unit (46) determines that communication with the remote key (4) is lost.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A SECURED SPACE
Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device fastenable to an access point of the secured space, a server, and a network for communication between the locking device and server. The locking device includes an actuator, a memory, and a processing unit for generating a control signal for the actuator to move the locking device into a locked state or a closed state. The server includes a storage unit to store authorization data for the locking device, and a processing unit which can receive a security request for the locking device from a user computing device; determine whether the security request includes requesting data that corresponds to the authorization data stored for the locking device; generate a security command based on the security request; and communicate the security command to the locking device.