Patent classifications
G07C2009/00769
ULTRA-WIDE BAND ANTENNA CONFIGURATION FOR PHYSICAL ACCESS CONTROL SYSTEM
The present disclosure relates to a reader, such as a reader for a physical access control system. The reader can include first and second antennas, each designed or configured for receiving ultra-wide band (UWB) signals. The reader can also include a mounting plane configured for mounting the reader to a surface. An axis aligning the first and second antennas can be arranged substantially perpendicular relative the mounting plane. A material can be provided between the first and second antennas The material can have a thickness that defines a distance between the first and second antennas of less than a half wavelength of the UWB signal through air (λ.sub.A/2), the material configured to slow down electromagnetic waves passing therethrough such that the thickness of the material provides an effective separation distance of the first and second antennas of at least a half wavelength of the UWB signal through air (λ.sub.A/2).
SECURE LOCKING USING KEYLESS LOCK CONTROLLERS
An electronic lock includes a circuit to secure a room, electrical device, or other resource. A controller is coupled to the circuit and to a short-range wireless interface. The controller controls the circuit to provide access to the resource based on cryptographic access data provided by a wireless mobile device via the short-range wireless interface. The controller may be provided to an electrical box (e.g., back box, junction box, etc.) or other type of housing and may be connected to a light switch or fixture circuit.
MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
Security systems and methods are provided. In one example, a security system includes at least one lock configured to protect one or more items from theft from the fixture, wherein the lock comprises a drive shaft configured to be moved between a latched position and an unlatched position, the fixture configured to be accessed in the unlatched position. The lock is configured to be moved between a locked state and an unlocked state for allowing the drive shaft to be moved between the latched position and the unlatched position when in the unlocked state, wherein the lock includes a cam sleeve having an internal cam surface configured to transition the lock between the locked state and the unlocked state in response to movement of the cam sleeve.
Methods and devices for physical access control systems
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interface enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Authentication information control system, authentication information control method, and non-transitory computer-readable recording medium
A control unit issues temporary authentication information for disabling a locking/unlocking process to a user terminal satisfying a first condition. The control unit determines whether first authentication information has been issued to another user terminal, issues second authentication information to the user terminal to which the temporary authentication information has been issued when the first authentication information has not been issued to another user terminal, and issues the second authentication information to the user terminal to which the temporary authentication information has been issued with detection of ending of use of the first authentication information in another user terminal as a trigger when the first authentication information has been issued to the other user terminal.
Advance mobile device and vehicle profile pairing
An advance pairing system preemptively pairs a phone to a vehicle using a backend cloud system prior to establishing the connection with the vehicle, such as during the time that a user is purchasing a vehicle, or just after the user enters the vehicle for the first time. The system includes a mobile application for automated advance pairing with the vehicle's automotive computer. The mobile app sends a request for advance pairing to a server that assigns a set of unique keys to the account for secure pairing of the mobile device and the vehicle. The server pushes an encrypted payload to both the mobile device app and the vehicle advance pairing app operating on the automotive computer. The encrypted payload can include a unique vehicle ID, a unique mobile device ID, and one or more encryption keys. The mobile device and the vehicle use the encrypted advance pairing information to establish a secured connection with minimal user input.
Mobile Device Vehicle Bonding With Inactive Bond Records
A method for forming bonded mobile device connection with a vehicle includes determining a request count comprising a plurality of Bluetooth advertisement requests received from a mobile device with respect to time, determining an invalid Consumer Access Key (CAK) transmission count associated with the plurality of Bluetooth advertisement requests, generating an active bond record with the request count and the invalid CAK transmission count, determining, based on the active bond record, that a Global Attribute Profile (GATT) service associated with the mobile device is inactive, and disabling a Bluetooth advertisement response setting associated with the GATT service.
SECURE LOCKING OF KEYLESS LOCK CONTROLLERS
A lock control interface is operably connectable to an electrical actuator of a lock that restricts access to a physical resource. A primary wireless interface communicates with a wireless mobile device within a local vicinity of the primary wireless interface. A primary processor is connected to the primary wireless interface and the lock control interface. A secondary wireless interface communicates with a server via a long-range low-power wireless network. A secondary processor is connected to the secondary wireless interface. The secondary processor communicates with the server using the secondary wireless interface. The secondary processor is not operably connected to lock control interface. The primary processor controls the electrical actuator through the lock control interface to unlock the lock based on communication of cryptographic access data.
ELECTRONIC LOCK AND METHOD OF OPERATION
Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.
Electronic identification, location tracking, communication and notification system with beacon clustering
A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allows for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking. Also provided is a system and method for identifying a customer's location at a business and provide notification to a company representative upon arrival of the customer at the business location. Real-time location determinations for the customer and customer location tracking can be provided. One or more wireless beacons communicate with the customer's electronic device. The beacons provide the system with real-time data about the customer's whereabouts, allowing for the confirmation and tracking of the customer at the location. A first non-limiting example of use, include a company that provides food and beverage allowing the customer to place an order for food and beverages on their electronic device and having the order delivered to the person at their current location as determined by the system. Another non-limiting example includes a company using the notification system to have assigned staff members notified of the customer's arrival.