Patent classifications
G07C2009/00769
Proximity detection system for request processing
A request is processed by a control device based on a detected proximity of a client device to the control device. The control device, which is intermediate to the client device and a beacon device, runs application software that receives the request generated using a client application running at the client device. The beacon device, upon receipt of an indication that the control device received the request, transmits a signal to detect a proximity of the client device to the control device. The application software receives data indicative of a response to the signal from the beacon device. The application software allows the request upon a determination that the data reflects the response is received. Alternatively, the application software allows the request upon a determination that the data indicates that the proximity of the client device to the control device satisfies a threshold.
Time synchronization using trust aggregation
A method for synchronizing time may include receiving initial time information including an initial timestamp from a first device, adjusting a clock of the device with the initial time information, storing the initial time information as an earliest possible time, receiving additional time information, including a second timestamp, from a second device, and evaluating the additional time information. When the evaluated additional time information includes information that is unacceptable, the method may further include adjusting the clock with the second timestamp, and replacing the earliest possible time with the second timestamp. When the evaluated additional time information includes information that is acceptable, the method may further include adjusting the clock with the additional time information, and replacing the earliest possible time with the additional time information. The initial time information and additional time information may be respectively determined based on reconciled time data received from two or more proximate devices.
Access control for emergency responders
A method of access control for emergency responders according to one embodiment includes transmitting, by an access control server, an access credential to an emergency responder server over a first network, transmitting, by the emergency responder server, the access credential to an emergency responder mobile device over a second network different from the first network, wherein the second network includes a dedicated emergency responder network, and transmitting the access credential by the emergency responder mobile device to an access control device.
Vehicular safety monitoring
Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.
COMPUTERIZED SYSTEM FOR ACCESSING TO A VEHICLE AND RELATED METHOD
The invention relates to a computerised system for accessing to a vehicle.
The computerised system comprises: a vehicle key comprising a control unit, a first wireless communication module operatively connected to said control unit and adapted to allow said control unit to communicate with a control system of said vehicle, a second wireless communication module operatively connected to said control unit and adapted to allow said control unit to communicate with a mobile computerised device; a software application which can be stored on and executed by at least one mobile computerised device, said software application being configured to control said control unit to interact with said control system to cause the unlocking of one or more doors of said vehicle.
In a further aspect, the invention relates to a computerised method for accessing to a vehicle.
USING COMBINATION OF GPS AND BLE BEACONING TO LOCATE A LOCK BOX
A method of locating a lock box including: obtaining a saved location of the lock box using an application operated via a first cellular telephone, the saved location of the lock box being accurate within a first selected radius; displaying the saved location of the lock box on the first cellular telephone via the application; detecting a Bluetooth advertisement of the lock box using the first cellular telephone; determining a received signal strength indicator (RSSI) of the Bluetooth advertisement; determining a distance between the first cellular telephone and the lock box in response to the RSSI of the Bluetooth advertisement; and displaying a distance indicator depicting the distance between the first cellular telephone and the lock box on the first cellular telephone via the application.
UWB ON/OFF OPERATION METHOD TO MINIMIZE POWER CONSUMPTION AND UWB ANCHOR USING THE SAME
An ultra-wideband (UWB) anchor using a UWB ON/OFF operation method to minimize power consumption. The UWB anchor includes a power supply to supply power to the UWB anchor, a transceiver to transmit/receive a UWB signal to and from a UWB tag for performing ranging, and to transmit a reception failure when failing to receive the UWB signal from the UWB tag, and a controller to receive the reception failure from the transceiver and to end a ranging session when a cumulative sum of ranging failures for each ranging block reaches a maximum number of failed ranging round attempts.
RETAIL SECURITY SYSTEM
A retail security system that includes a locking system having locking assemblies that can be locked and unlocked directly by a consumer or clerk/employee using his or her mobile phone or other portable electronic device. Each of the locking assemblies may be configured to lock an article so that it cannot be freely accessed. The security system may include a sanitizing system that sanitizes the article after a consumer returns the article to the locking system without making a purchase. The security system may include a computer apparatus that allows an owner of the security system to access a software application that provides the owner with information/data about access to the locked articles.
DELIVERY SYSTEM
A delivery vehicle is configured to be able to deliver a package in front of a front door of a dwelling unit in a complex housing including a shared door with automatic lock function that is able to be opened as unlock information is input to an unlock input unit of an entrance via wireless communication. When the delivery vehicle arrives at the complex housing including the shared door with automatic lock function, and a delivery instruction for leaving the package in front of the front door is made, an on-board unit of the delivery vehicle inputs the unlock information to the unlock input unit via the wireless communication, and notifies a terminal device of a user of input date and time.
SECURE GUEST ENROLLMENT AT ELECTRONIC LOCK
Secure enrollment of a user with an electronic lock is provided. Enrollment with the lock may include a verification process and a secure enrollment mode based on verification of a unique enrollment code (UEC) associated with an enrollment invitation link that may be provided to the user. Selection of the link may direct the user’s mobile device to a client application, where an option may be provided for initiating the verification process. The UEC may be communicated to and presented by the lock. The user’s device may capture the presented UEC, which may be compared against the UEC generated in association with the link. When validated, the lock may enter the secure enrollment mode, where the user can register an actuation passcode, or the lock may be paired with the mobile device over a short-range wireless connection, which may allow the user to actuate the lock via the client application.