Patent classifications
G07C2009/00507
Signalling duress
It is provided a method performed by a key device for supporting duress signalling. The method comprises the steps of: determining that a user is under duress; entering a wait state after the step of determining that a user is under duress; exiting the wait state and establishing a communication channel with a lock device, the communication channel being intended to be used for access control signalling; generating a duress signal; and transmitting, over the communication channel, the duress signal to the lock device.
MACHINE LEARNING MOBILE DEVICE LOCALIZATION
A machine-learning localization scheme is provided. Calibration data is received from a plurality of vehicles, the calibration data including wireless data indicative of locations of mobile devices within the plurality of vehicles, ground truth data with respect to the locations of the mobile devices, and contextual information with respect to one or more of operating system versions of the mobile devices or battery levels of the mobile devices. A machine-learning model is trained using the wireless data and the contextual information as inputs and the ground truth data as output. Responsive to an error rate for the machine-learning model being within an error target, the machine-learning model is provided to the plurality of vehicles.
METHOD AND MEANS FOR REMOTELY CONTROLLING A SECURE FUNCTION OF A MOTOR VEHICLE BY MEANS OF A MOBILE COMMUNICATION TERMINAL
A method for the remote control, by way of a mobile communication terminal equipped with a UHF-SHF module, of a secure motor vehicle function requiring a user to be present within a security perimeter around the vehicle, the vehicle being equipped with an access device including a control unit and an access fob. The method includes: detecting the presence of the access fob within the security perimeter around the vehicle through LF transmission between the vehicle and the access fob; detecting the presence of the mobile communication terminal at a distance less than a predetermined distance from the access fob, through a communication operation between the access fob and the mobile communication terminal; remotely controlling, by way of the mobile communication terminal, the secure function of the vehicle on the UHF-SHF frequency band.
Set-top box with enhanced behavioral controls and system and method for use of same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectedly includes a television input, a television output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then receive a status signal from the electronic door locking apparatus relative to the open/closed status of the door and locked/unlocked status of the door.
Information prompting method, apparatus, and system, and intelligent electronic door lock
A method, apparatus and system for information prompt, and an intelligent electronic door lock are provided. The method includes: when detecting that an intelligent electronic door lock performs an operation for unlocking a door, determining a target user behavior type corresponding to the operation for unlocking the door, obtains target user concern data corresponding to the target user behavior type, and generates to-be-output prompt information based on the target user concern data; wherein, the prompt information is configured for prompting a user to perform a target behavior or displaying the target user concern data, and the target behavior is a behavior corresponding to the target user concern data; and outputting the prompt information. The problem that the intelligent door lock system has a single humanized function may be solved.
Authentication system, mobile device, processing device, and non-transitory computer-readable medium
A mobile device is carried by a person to be authenticated. An acceleration sensor is installed in the mobile device and configured to output an acceleration signal corresponding to acceleration applied to the mobile device. A processing device is configured to execute determination processing for determining whether the person is walking based on the acceleration signal. A control device is configured to control operation of a controlled device based on a result of the determination processing and a result of processing for authenticating, by way of the mobile device, the person as a user of the controlled device. The processing device is configured to determine that the person is not walking in a case where an amount of change in the acceleration falls below a threshold before a prescribed time period elapses while the determination processing is executed.
MULTI-FACTOR FACILITY ACCESS AND CONTROL
An access control method comprises providing a handheld mobile wireless device that includes a user key uniquely associated with a user, and a facility communication device that transmits a facility key uniquely associated with the facility. The mobile device receives the transmitted facility key and retransmits the received facility key and the user key to a remote premise control server, which authenticates the received keys. The server transmits an access control command if the keys authenticate. The server regularly updates the facilities key and transmits an updated facility key to the facilities communication device.
DEVICES AND METHODS FOR DIGITALLY COMBINING MULTIPLE ACCESS KEYS AND LOCATIONS
Methods and devices for digitally combining multiple access or entry enabling items or keys and/or location data of multiple destinations. A device may wirelessly communicate with a plurality of access control devices. The access control devices may individually authenticate a digital key of a plurality of digital keys identifiable by key identification data stored in a memory of the device. The device may further include a processor. The processor may be configured to determine that the digital key is authenticated by one of the access control devices. The processor may be further configured to communicate with the one access control system to prompt the one access control system to allow access to a user of the device. The processor may be further configured to communicate the location data to a navigation system. The processor may be further configured to transmit access tokens and/or location data to other devices.
Facility control methods and apparatus
A security system includes a physical sensor for determining presence of a first number of users within a detecting region, short-range readers for determining presence of a second number of authorized smart devices in response to ephemeral tokens, wherein the users may remain anonymous to the short-range readers, authentication servers for determining ephemeral tokens for smart devices in response to identifiers of the readers and the smart devices, a physical output device configured to provide a user detectable output, and a processor for determining whether the first number of users is different from the second number and for directing the physical output device to provide the user detectable output.
Smartkey, control method thereof and detection model generation apparatus for detecting relay attack based on LF fingerprinting
An apparatus and a method of detecting an attack based on LF fingerprinting are provided. A smart key which is an attack detection apparatus includes a communication interface, a memory storing a classifier, and a processor configured to generate a first signal by removing a carrier frequency of a signal received from a vehicle, demodulate the first signal and extract at least one of a second signal of a preamble region or a third signal of an idle region, extract a feature of at least one of the first signal, the second signal, or the third signal, and detect whether there is a relay attack by using an output value of the classifier for the extracted feature.