G07C2009/00841

Vehicle parking and mass transport beacon system

A vehicle parking and mass transport beacon system (60) implemented with a beacon device (10) configured as a wireless identifier and authentication mechanism offers a user a capability of bypassing infrastructures of commercial parking lots and facilities, mass transit systems, and taxi services when using them. The beacon system includes a source beacon and a user beacon, the latter of which implemented in a user smart device (36) such as a smartphone. The use of a source beacon and user smart device enables elimination of reliance on a cellular communication connection from the time of the user's grant of permission for action to the time of separation of the user smart device and the beacon by a distance outside the range of connectivity between them. Such elimination of reliance on cellular communication connection avoids delay and communication coverage issues stemming from use of a cellular communication network.

ACCESS SYSTEM
20210127275 · 2021-04-29 · ·

Managing visitor access to resources within a physical area includes a mobile user device of a visitor associated to the physical area with a secure component having stored thereon a credential for authorizing the mobile user device to communicate transactions with other components of the system that are remotely located from and coupled with the mobile user device. The components include data structures that define a plurality of entities and associate attributes with the entities corresponding to access to the resources. A first application manages access of the visitor to the resources based on the data structures and information communicated by the mobile user device to the components in transactions that are authorized using the at least one credential. The credential may be a block chain credential and the transactions may be block chain transactions. The mobile user device may be locally coupled to the secure component.

Remote keyless entry system
10994698 · 2021-05-04 · ·

A remote keyless entry system includes an in-vehicle device including an in-vehicle device controller, an in-vehicle device transmitter that transmits an in-vehicle device signal, and an in-vehicle device receiver that receives a portable device signal, and a portable device including a portable device controller, an acceleration sensor, a portable device receiver, and a portable device transmitter, wherein the portable device controller calculates a distance from the in-vehicle device to the portable device based on the in-vehicle device signal, calculates a first travel distance based on acceleration, and causes the portable device transmitter to transmit the portable device signal including at least the distance, the in-vehicle device controller receives the portable device signal multiple times and calculates a second travel distance based on distances included in received portable device signals, and whether a relay attack is performed is determined based on the first travel distance and the second travel distance.

Managing visitor access
10990499 · 2021-04-27 · ·

Managing a visitor outside of a physical area includes remotely registering the visitor to an access system, installing an application on a mobile user device of the visitor, the application being authorized to access and communicate with the access system, the visitor entering personnel credentials to authorize use of the application while the visitor is outside of the physical area, and, in response to the visitor authorizing use of the application, the application and the access system exchanging data containing information about the visitor, remote executed activities of the visitor, remote data, and/or information about localization of the user device. The application may exchange data with the access system using a RESTful API. Data may be formed in a blockchain prior to being exchanged between the mobile user device and the access system. The access system may add third party information to complement and improve scheduling of the visitor.

Remote control button actuation system with proxy remote
10977930 · 2021-04-13 · ·

An actuation system used to actuate one or more buttons on a remote control device, such as a key fob, based upon commands that are generated from a mobile device. The actuation system includes a key fob enclosure located remotely from the vehicle. When a command is received on the mobile device, the command is relayed to a controller within the key fob enclosure, causing a button on the key fob to be depressed. The RF signal from the key fob is translated into a digital message which is relayed to a proxy remote located within the vehicle. The proxy remote, in turn, translates the digital message to an RF signal which is transmitted and received by systems within the vehicle. In this manner, the proxy remote is able to communicate using RF signals with the vehicle without requiring the key fob to be located near the vehicle.

SYSTEM AND PROCESS FOR AUTHENTICATING A USER IN A REGION

A system for identifying users for entrance to an area comprising a point of entry into a pre-defined area. The system comprises a first computing device having a microprocessor, a memory and a screen disposed adjacent to the point of entry. There is also at least one second computing device having at least one microprocessor and at least one memory, said at least one second computing device being disposed remote from the first computing device. There is at least one third computing device having at least one screen and at least one microprocessor wherein the third computing device is in communication with the second computing device wherein the second computing device is configured to send at least one image to the first computing device and to the third computing device wherein when an image at the point of entry matches an image on the third computing device the port of entry will allow the user holding the third computing device into the point of entry.

ACCESS CONTROL SYSTEM HAVING RADIO AUTHENTICATION AND PASSWORD RECOGNITION
20210056792 · 2021-02-25 ·

An access control system receives an identifier of a mobile electronic device when it is located in a public area, from which a user can request access to an access-restricted area. A dataset is created, which is assigned to the user present in the public area, for the identifier and for storing a password in the first dataset such that the password is assigned to the identifier. A code processing unit acquires a password presented by the user when the user requests access to the access-restricted area. A processor unit determines if the identifier is assigned to a user profile in a database, authenticates the user as having access authorization in the event of such an assignment and determines if the acquired password matches the password stored in the dataset, wherein the user is recognized as an access-requesting user in the event of a match.

MOBILE APPLICATION FOR VISITING GYMS
20230419757 · 2023-12-28 ·

A system and method for locating fitness centers within a user's geographic area and gaining access and redeeming time-based memberships to fitness centers through an integrated mobile computer application via a mobile electronic device (e.g., smartphone, electronic tablet). The integrated mobile computer application allows an individual user to purchase a time-based membership (e.g., one day, two day, three day, one week, one month, etc.) from participating fitness centers using the integrated mobile computer application, redeem and activate the time-based membership upon check-in at a selected fitness center, and then continue to subsequently check-in at the selected fitness center throughout the term of the purchased time-based membership. In a preferred embodiment, initial check-in, activation and subsequent check-in at the selected fitness center is achieved through an electronic validation process using the user's mobile electronic device.

SECURE DEVICE OPERATION USING TRANSFERRED CODE MODULES
20210209874 · 2021-07-08 ·

A first device uses a first runtime environment executing on the first device to transfer a code module to a second runtime environment executing on a second device. The code module is configured to execute within the second runtime environment and expose a function of the second device that is supported by the second runtime environment to the first device. The first device executes an application within the first runtime environment. The application remotely invokes the function of the second device via the transferred code module and the second runtime environment.

METHOD FOR CONTROLLING LOCKER BASED ON DELIVERY MESSAGE AND ELECTRONIC DEVICE
20210209876 · 2021-07-08 ·

Embodiments provide a method for controlling a locker based on a delivery message. In those embodiments, an electronic device obtains a delivery message of a first package that is sent by a server, where the delivery message includes pickup information of the first package and location information of a locker in which the first package is placed, and the pickup information is used to open a pickup box in which the first package is placed in the locker. The electronic device then determines a first area based on the location information, where the locker is located in the first area; and displays a pickup function item when it is detected that the electronic device enters the first area. Still in those embodiments, the electronic device sends a locker opening request to the server when it is detected that a user triggers the pickup function item.