Patent classifications
G07C2009/00769
METHOD AND SYSTEM FOR MULTI-ZONE PERSONALIZATION
A method for adjusting apparatuses of a vehicle including multiple zones having adjustable apparatuses in the vehicle interior. A setting of the apparatuses that is individually customized to a respective person is stored in a respective user account associated with a mobile terminal of the respective person. The respective setting is controlled by way of a control unit in accordance with the respective user account. Each zone is assigned a vehicle exterior area that is monitored by a vehicle authorization unit. The vehicle authorization unit authenticates the respective person, on the person's coming into the vehicle exterior area of the respective zone, by way of the mobile terminal in his possession, and provides the control unit with the associated user account. The control unit responds to a first person's coming into the exterior area of the respective zone by adjusting the apparatuses of the respective zone in the vehicle interior.
TRANSACTION METHOD AND DEVICE USING UWB COMMUNICATION
A method is provided for operating an ultra-wide band (UWB) device, the method including transmitting, to a gate, a first message including a device identity (ID) for identifying the UWB device and a transaction ID for identifying a transaction of the UWB device, receiving, from the gate, a second message including a gate authentication cryptogram generated based on the device ID and the transaction ID, verifying the gate based on the gate authentication cryptogram, encrypting payment information for the transaction in response to the gate being verified, and transmitting, to the gate, a third message including the encrypted payment information.
KEYLESS ENTRY MESSAGE VALIDATION
An example operation includes one or more of establishing a security level based on an environment of a transport, determining a minimal radio frequency signal strength needed for a device to communicate with the transport based on the security level of the transport, and performing a command, by the transport, based on the communication when the minimal radio frequency signal strength is achieved.
COMMUNICATION PROTOCOL FOR NON-INTERNET-ENABLED DEVICES
A method of updating a first device (e.g., one or more locking devices) to reflect information located on a second device (e.g., a server) is provided, where the first device and the second device cannot communicate directly with one another. The method may include employing a third untrusted device (e.g., a mobile device) temporarily as an intermediary between the first device and second device. The method may include receiving, at the first device and from a third device, a request for the first device to communicate with the third device. In response to determining that the third device is authorized to communicate with the first device, the first device may receive information from the third device that was provided by the second device. The first device may transmit at least one message to the third device that is to be provided to second device.
Method and system for preventing a physical layer relay attack
There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.
VEHICLE AND CONTROL METHOD THEREOF
A vehicle includes a plurality of controllers, a database in which priorities for switching to inactivation of the plurality of controllers are stored, and a main controller configured to identify whether a key of the vehicle is in off state, when the key of the vehicle is identified to be in off state, identify a communication state of the vehicle, when at least one communication state is identified among a first communication state, a second communication state, and a third communication state, select a controller corresponding to the identified communication state from the plurality of controllers, based on the identified communication state and the priorities stored in the database, the first communication state in which an active sate of communication being maintained due to a controller in error, the second communication state in which the active sate and an inactive state of communication being repeated due to the controller in error, the third communication state in which the active sate of communication being maintained due to a noise signal, and reset or cut off a power of the controller.
TECHNIQUES FOR AUTHENTICATING BUILDING/ROOM ACCESS TERMINALS
The techniques described herein provide for authentication of a reader device over a wireless protocol (e.g., NFC or Bluetooth, BLE). The mobile device can receive and store the static public key of the reader device and one or more credentials, each credential specifying access to an electronic lock. The mobile device can receive an ephemeral reader public key, a reader identifier, and a transaction identifier. The mobile device can generate session key using the ephemeral mobile private key and the ephemeral reader public key and send the ephemeral mobile public key to the reader device. The reader device can receive the ephemeral mobile public key and sign and transmit a signature message to the mobile device. The mobile device can validate a reader signature and generate an encrypted credential that the reader can use to access an electronic lock. The reader device can authenticate the mobile device for mutual authentication.
Automatic physical access
Physical access to secure areas is automatically performed based on presence or detection of a wireless device. A unique identifier of a wireless cellular device, for example, may be pre-authorized for occupants, employees, and tenants of a building. Contractors and vendors may also have their wireless cellular devices pre-approved for access. When the wireless cellular device is detected by a network serving the secure area, its unique identifier may be compared to databases or lists of approved cellular devices. Physical access may thus be automatically granted, based on possession of a recognized cellular device.
Paperless venue entry and location-based services
When attending an event at a venue, the attendee typically presents ticket information that is scanned by a venue scanner. In conventional systems, once validated, the scanner prints a paper stub that typically includes seat location data. Production of this paper stub can be dispensed with, and the associated data conveyed by the paper stub as well as additional information not contemplated or possible with paper stubs can be conveyed by an electronic stub or e-stub that resides on a device of the attendee, generally the same device employed to present the ticket information.
System for parcel transport and tracking operated responsive to data bearing records
A system for parcel transport and tracking that operates responsive to data bearing records includes a plurality of geographically spaced repositories. The exemplary repositories include a plurality of enclosed compartments. Access to each of the enclosed compartments is controlled by a respective door which is in operative connection with a respective lock. Central system circuitry is in operative connection with the repositories and is operative to control access to the compartments and to cause compartments to be selectively accessible so that selected parcels may be placed therein or removed therefrom by authorized item handlers.