Patent classifications
G07C2009/00825
SYSTEM FOR MANAGING ACCESS TO A VEHICLE BY A SERVICE PROVIDER THAT IS TO PROVIDE A SERVICE ASSOCIATED WITH THE VEHICLE
In some implementations, a system may receive an access request associated with an agent and the vehicle. The system may authenticate, based on an agent identification associated with the agent, the agent in association with providing the vehicle service. The system may send, based on authenticating the agent, an authorization request to a user associated with the vehicle, wherein the authorization request is sent to a user device associated with the user that enables the user to authorize the agent to access the vehicle in association with providing the vehicle service. The system may receive, from the user device, a user authorization that authorizes the agent to access the vehicle. The system may configure the vehicle to enable the agent to access the vehicle via a client device associated with the agent.
Door security device
Embodiments discussed herein enable an authorized user of a door security device to secure a door against entry, but also enable that authorized user to provide access to others, without having to provide a physical key. Embodiments discussed herein further allow an authorized user to operate the door security device remotely, such as through a wired or wireless network, or through any other network as described herein, as known at the time of filing, and/or as developed after the time of filing.
Secure element for processing and authenticating digital key and operation method therefor
A secure element (SE) for processing a digital key includes a communication interface for communicating with a host, a memory for storing programs and data for processing the digital key, and a processor for executing the programs stored in the memory to receive a digital key processing request from a target device, determine whether a service is providable to the target device, by using a service-provider-specific service performance manager, process the digital key by using a digital key manager based on digital key processing information stored in the memory, upon determining that a service is providable to the target device, issue a digital key processing certificate by using the service-provider-specific service performance manager based on authentication information stored in the memory, and transmit the digital key processing certificate to at least one of a service provider and the target device.
Intelligent lock
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
Electronic Locking Systems, Methods, and Apparatus
Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.
SMART LOCK AND METHOD FOR AUTOMATICALLY LOCKING SMART LOCK
The present disclosure provides a smart door lock and a method for controlling the smart door lock. The method may be implemented on a computing apparatus including a processor and a storage device. The method may include obtaining user information and determining whether the user information passes a verification. The method may further include in response to a determination that the user information passes the verification, controlling the smart door lock to perform an unlock operation. The method may further include determining whether the door on which the smart door lock is installed has a preset action within a preset time period and in response to a determination that the door has the preset action within the preset time period, controlling at least one component of the smart door lock to perform at least one operation.
Access management and reporting technology
An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.
POWER AND COMMUNICATION ARRANGEMENTS FOR AN ACCESS CONTROL SYSTEM
An access control system includes an electrically powered access control device for locking and unlocking a barrier, and an access controller coupled to the access control device. A Power over Ethernet (PoE) circuit receives power over an Ethernet cable and powers the access control device and the access controller. An active power supply buffer connects the access control device and the access controller with the PoE circuit.
Intelligent Lock
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
System for managing access to a vehicle by a service provider that is to provide a service associated with the vehicle
In some implementations, a system may receive an access request associated with an agent and the vehicle. The system may authenticate, based on an agent identification associated with the agent, the agent in association with providing the vehicle service. The system may send, based on authenticating the agent, an authorization request to a user associated with the vehicle, wherein the authorization request is sent to a user device associated with the user that enables the user to authorize the agent to access the vehicle in association with providing the vehicle service. The system may receive, from the user device, a user authorization that authorizes the agent to access the vehicle. The system may configure the vehicle to enable the agent to access the vehicle via a client device associated with the agent.