G07C2009/00761

DEVICE STORAGE ISOLATION

Examples associated with device storage isolation are described. One example apparatus includes a set of receptacles for electronic devices. Each receptacle includes a power connector to provide power to an electronic device stored in the receptacle, a network connector to provide a network connection to the electronic device stored in the receptacle, and a locking mechanism to secure contents of the receptacle. Members of the set of receptacles are digitally isolated from other members of the set of receptacles. The apparatus also includes an authentication module to authenticate a user based on a credential provided by the user. The authentication module controls a selected locking mechanism of a selected member of the set of receptacles based on the credential and based on data received from a remote information technology module. The apparatus also includes a user interface module to instruct the user through the process of storing a received electronic device in the receptacle or retrieving a provided electronic device from the receptacle.

ELECTRONIC ACCESS CONTROL
20210327177 · 2021-10-21 ·

An embodiment of an electronic access control system includes an electronic key, an electronic lock, and an access control administration program. The electronic key can include program code for switching between a lock mode and a computer mode. In some embodiments, the lock mode and computer mode allow for simplified administration and operation of the access control system. Some embodiments of the electronic key include a rechargeable battery. In some embodiments, the access control system includes a hybrid power supply system having a rechargeable battery and a generator. In some embodiments, the electronic lock includes a piezoelectric latch. In some embodiments, the electronic key is configured to act as a storage device for a computer system. Some embodiments provide an electronic access control system with a streamlined user interface.

Trainable transceiver and mobile communications device systems and methods

A trainable transceiver for controlling a remote device includes a transceiver circuit configured, based on training information, to control the remote device, a communications device configured to communicate with a mobile communications device, an output device, and a control circuit coupled to the transceiver circuit, coupled to the communications device, and coupled to the output device. The control circuit is configured to receive notification information from the mobile communications device via the communications device, and wherein the control circuit is configured to generate an output using the output device based on the notification information.

ACCESS SYSTEM

An access system (2) has a first actuation handle (6) that is attached to an outside of a door (4), a second actuation handle (8) that is attached to an inside of a door (4), and an access control system that has at least one evaluation unit (14), which is coupled to the at least one reader (10, 12) and is configured to identify a transponder that has been read. The system is characterized in that a first reader (10) is located on the outside of the door (4) and a second reader (12) is located on the inside of the door (4), and that the at least one evaluation unit (14) is configured to determine whether a transponder (16) read by the first reader (10) and/or the second reader (12) and identified by the at least one evaluation unit (14) is inside or outside the door (4), and to generate a door-opening signal if the identified transponder (16) is on the outside.

DYNAMIC TRANSPORT IN A MODULAR PHYSICAL ACCESS CONTROL SYSTEM

A device may include a memory storing instructions and a processor configured to execute the instructions to identify a communication link between a first domain object and a second domain object; identify a first endpoint associated with the first domain object and a second endpoint associated with the second domain object; and determine a location relationship between the first endpoint and the second endpoint. The processor may be further configured to select a communication mechanism based on the determined location relationship; instruct the first endpoint to communicate with the second endpoint using the selected communication mechanism; and instruct the second endpoint to communicate with the first endpoint using the selected communication mechanism.

Electronic combination lock with different levels of access control
11024107 · 2021-06-01 · ·

A combination lock has a touch panel to receive a keypad entry code indicative of a combination code for unlocking the lock with various access levels, including a first level and second level. The combination lock is also arranged to receive the combination code from a mobile device via wireless signals. The combination lock also has an independent key-lock mechanism for unlocking the lock with a key. The mobile device has an application icon, when activated, prompting the wireless signals indicative of the combination code. The mobile device also has a deactivation icon and re-activation associated with the combination code of the first level. The deactivation icon causes the disablement of the touch panel and the key-lock mechanism when activated. The re-activation icon terminates the disablement of the touch panel and the key-lock mechanism when activated.

ELECTRONIC LOCK STATE DETECTION SYSTEMS AND METHODS

An electronic key may include a partial capacitor comprising a capacitive metal plate in communication with a processor. The capacitive metal plate of the partial capacitor is configured to form a capacitor with a corresponding capacitive metal plate of a lock when brought into proximity with the metal plate of the lock. Data may be transferred from the key to the lock using a capacitor formed by combining the two metal plates, wherein a common ground is established between the metal plate of the key and the metal plate of the lock through a parasitic capacitance present between the key and lock circuitry. Audit trail data may be recorded based on usage of the key.

AUTHENTICATION METHOD AND SYSTEM OF ELECTRONIC LOCKING DEVICE BASED ON USAGE PATTERN
20210012595 · 2021-01-14 ·

Provided is an authentication method of an electronic locking device. The authentication method of an electronic locking device according to an exemplary embodiment of the present invention includes: collecting a usage history of locking and unlocking an electronic locking device using an electronic key; generating a usage pattern by analyzing the usage history; and performing authentication by applying an authentication level selected based on the usage pattern when the electronic locking device is locked and unlocked using the electronic key.

Electronic lock state detection systems and methods

An electronic key may include a partial capacitor comprising a capacitive metal plate in communication with a processor. The capacitive metal plate of the partial capacitor is configured to form a capacitor with a corresponding capacitive metal plate of a lock when brought into proximity with the metal plate of the lock. Data may be transferred from the key to the lock using a capacitor formed by combining the two metal plates, wherein a common ground is established between the metal plate of the key and the metal plate of the lock through a parasitic capacitance present between the key and lock circuitry. Audit trail data may be recorded based on usage of the key.

In-vehicle control apparatus using smart key provided with display and method of controlling the same

A user interface capable of controlling various functions in a vehicle is disclosed. The vehicle control method using a smart key includes an integrated operation unit detecting attachment of the smart key through a smart key detector disposed in a predetermined attachment area inside a vehicle, the integrated operation unit transmitting information on a controlled function corresponding to a vehicle state to the smart key, outputting a first user interface corresponding to the information on the controlled function on a first display of the smart key, transmitting information on a result of operation from the smart key to the integrated operation unit when an operation unit provided in the smart key is operated, and the integrated operation unit controlling the controlled function based on the information on the result. The smart key is fixed in the attachment area using magnetic force.