Patent classifications
G07C2009/00825
SINGLE-SIDED STORAGE LOCKER SYSTEMS ACCESSED AND CONTROLLED USING MACHINE-READABLE CODES SCANNED BY MOBILE PHONES AND COMPUTING DEVICES
A single-sided ride storage locker system deployed at any site within a facility, and providing guest visitors with access control enabled by scanning multi-level machine-readable codes using mobile scanning computing systems, such as web-enabled smartphones with digital cameras and mobile application support. The storage locker system supports automated modes of discovering and finding where a guest's rented locker is located within the facility and its sites at any moment in time, simply by using the guest' smart phone to scan a device-level code, a site-level code, a facility-level code or a discovery-level code, posted anywhere within the facility or any site, without need for using a physical locker lookup kiosk or other conventional systems and methods.
SECURE PACKAGE DELIVERY AND PICK-UP SYSTEM
A secure package delivery and pick-up system includes a security door having a frame, and one or more collapsible storage compartments affixed to the frame. The collapsible storage compartments are configured for accommodating packages. An electronic unit is mounted on the frame, and is configured for electronically controlling an operation for the collapsible storage compartments. A security device is connected to the security door and receives images of a physical object from a first camera, receives an indication from at least one security tether indicating movement of the at least one physical object, and provides an alert based on the indication of movement of the at least one physical object.
Set-top box with enhanced behavioral controls and system and method for use of same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectively includes a signal input, a signal output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then reprogram the electronic door locking apparatus as well as control amenities, such as a display, in response to presence signal from the electronic door locking apparatus.
Set-Top Box with Enhanced Behavioral Controls and System and Method for Use of Same
A set-top box with enhanced behavioral controls and system and method for use of the same are disclosed. In one embodiment of the set-top box, a wireless transceiver is located within a housing, which also interconnectedly includes a television input, a television output, a processor, and memory. The set-top box may pair with an electronic door locking apparatus coupled to a door that is room-collocated with the set-top box in a hospitality establishment. The set-top box may then receive a status signal from the electronic door locking apparatus relative to the open/closed status of the door and locked/unlocked status of the door.
METHODS AND SYSTEMS FOR OFFLINE VERIFICATION CODE GENERATION BASED ON SMART DOOR LOCK SYSTEM
The present disclosure provides a method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
Access control system having radio authentication and password recognition
An access control system receives an identifier of a mobile electronic device when it is located in a public area, from which a user can request access to an access-restricted area. A dataset is created, which is assigned to the user present in the public area, for the identifier and for storing a password in the first dataset such that the password is assigned to the identifier. A code processing unit acquires a password presented by the user when the user requests access to the access-restricted area. A processor unit determines if the identifier is assigned to a user profile in a database, authenticates the user as having access authorization in the event of such an assignment and determines if the acquired password matches the password stored in the dataset, wherein the user is recognized as an access-requesting user in the event of a match.
Premises access system
User access to a physical location (e.g., a homes, businesses, or other locations) may be granted for certain limited tasks based on one or more access procedures stored in a registry and associated with an identity of the user. Such access may be given without including an interaction with an owner, administrator, or manager of the location. User individuals may self-identify themselves to an access server or registry after arriving at the premises and receive corresponding access privileges via one or more devices within the premises based on access procedures stored in the access registry. The access procedures may be executed by the access server through communications with access devices within or about the premises and may be tailored based on the type of user individual or type of access requested.
Remote access control
A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.
VEHICLE LOCK AND METHOD FOR ACCESS-CONTROLLED LOADING AND/OR UNLOADING
A vehicle lock includes a locking mechanism with a rotary latch and a pawl for latching the rotary latch when the vehicle lock is in a closed state, a receiver for receiving a reference code, a code transfer interface for obtaining an access code and a control unit which is configured such that the vehicle lock assumes an unlocked state when the obtained access code matches the reference code. The locking mechanism is used in a method for access-controlled loading and/or unloading of a vehicle. A high degree of automation of an access-controlled process for loading and/or unloading a vehicle can thus be achieved substantially with the aid of the vehicle lock.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A SECURED SPACE
Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device fastenable to an access point of the secured space, a server, and a network for communication between the locking device and server. The locking device includes an actuator, a memory, and a processing unit for generating a control signal for the actuator to move the locking device into a locked state or a closed state. The server includes a storage unit to store authorization data for the locking device, and a processing unit which can receive a security request for the locking device from a user computing device; determine whether the security request includes requesting data that corresponds to the authorization data stored for the locking device; generate a security command based on the security request; and communicate the security command to the locking device.