G07C2009/00769

Electronic access control and location tracking system

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.

Systems and methods for location identification and tracking using a camera

Systems and methods for location identification and tracking of a person, object and/or vehicle. The methods involve: obtaining, by a computing system, a video of a surrounding environment which was captured by a portable camera coupled to the person, object or vehicle; comparing, by the computing system, first images of the video to pre-stored second images to identify geographic locations where the first images were captured by the portable camera; analyzing, by the computing system, the identified geographic locations to verify that the person, object or vehicle is (1) traveling along a correct path, (2) traveling towards a facility for which the person, object or vehicle has authorization to enter, or (3) traveling towards a zone or secured area internal or external to the facility for which the person, object or vehicle has authorization to enter; and transmitting a notification from the computing system indicating the results of the analyzing.

Methods, systems, apparatuses, and devices for controlling access to an access control location
11546774 · 2023-01-03 ·

A method for controlling access to a restricted resource is provided. The method may include receiving, by a cloud server, an identifier from a user device over a long range wireless channel. Further, the method may include comparing the identifier with a plurality of identifiers registered with an access control device. Further, the method may include authenticating the user device based on the comparing and subsequently transmitting a code to the user device upon successful authenticating. Thereafter, the user device may transmit the code to the access control device over a short range wireless channel. Further, the access control device may be configured to provide access to the restricted resource based on receiving of the code. Further, the method may include transmitting the code to the access control device over a long range wireless channel so that the access control device may authenticate the user device.

Relay Attack Determination Device
20220417752 · 2022-12-29 ·

A strength meter in a relay attack determination device is disposed on a portable device and measures a reception strength by a plurality of times in each of a request signal and a request signal received from an in-vehicle device. A comparator executes a comparative process of the request signal and the request signal by using average values of the reception strength measured by the strength meter. A variation calculator calculates variation in the reception strength measured by a plurality of times in the strength meter regarding the request signal. The comparator, in a case where the variation in the reception strength exceeds a threshold value indicating a communication failure in the request signal, determines the relay attack regardless of a result of the comparative process.

Electronic locking systems, methods, and apparatus

Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.

SYSTEM AND METHOD FOR DETERMINING A TIME AT WHICH A VEHICLE FUNCTION OF A VEHICLE IS BROUGHT INTO USE
20220406108 · 2022-12-22 · ·

At least one vehicle and at least one key element, each associated with a corresponding vehicle, are configured to exchange data with one another via a system that determines the vehicle position and the position of the key element. The system places the vehicle in a driving operating mode when the vehicle position and the key element position are essentially the same, in particular when the key element is located inside the vehicle. At least one vehicle function that can be activated when the vehicle is stationary is automatically switched on depending on a current key element position. This may occur when a key element position is changing relative to the vehicle position, but the vehicle and the associated key element are remote from one another, such as separated by at least ten meters.

LOCATION-AWARE BEACON SCANNING AND AUTHENTICATION FOR SECURE CONTROL OF IOT APPLICATIONS
20220406110 · 2022-12-22 ·

Systems and methods for location-aware scanning of an IoT beacon by a mobile device, and the authentication of the mobile device, are disclosed herein. The system detects when the mobile device is within a geofenced region associated with the IoT beacon and enables the scanning by the mobile device for signals from the beacon. Using the beacon signals received by the mobile device, the system detects when the mobile device and IoT beacon are sufficiently near one another. Once the mobile device and IoT beacon are sufficiently near each other, the system authenticates control of the mobile device over the IoT beacon by verifying an authentication key transmitted to a server.

INTELLIGENT LOCKS AND KEYS
20220406107 · 2022-12-22 ·

The lock(100) comprises a controller, a data storage device, a lock mechanism operable by the controller in a locked state or an unlocked state, and a data communication frontend comprises a first data port(108) and a second data port; Wherein the controller is configured to enter into data communication via second data port after successful completion of data communication via the first data port(108). An electronic key(200) comprises a key controller, a data storage device, a power source and a data communication frontend comprising a first data port(202) and a second data port; wherein the electronic key(200) is a physical key having a key body and is configured to work with the lock(100).

VEHICLE SAFETY SYSTEM, DISTANCE DETERMINATION METHOD, AND VEHICLE
20220406109 · 2022-12-22 ·

A distance determination method has: detecting a first received signal strength indicator (RSSI) of a first electronic device by a second electronic device; detecting a second RSSI of the second electronic device by the first electronic device; obtaining the first RSSI from the second electronic device by the first electronic device; and calculating a motion direction and a distance of the second electronic device relative to the first electronic device according to the first RSSI and the second RSSI by the first electronic device.

Energy efficient secure Wi-Fi credentialing for access control systems

An access control system includes an energy efficient access control that operates as a Wi-Fi access point that broadcasts a Service Set Identifier (SSID) as indicator of access control level to communicate with a mobile device with WPA2 PSK.