G07C2009/00841

Method and System for Providing Mobile Ticketing to Users

A mobile ticketing method and system for providing mobile ticketing services to users is provided. A user selects a mobile ticket and initiates payment by using a user device. In response to successful processing of the payment, the user device receives encrypted QR data from a server. The user device decrypts and format the encrypted QR data to display a QR code. The QR code is scanned at a gate terminal associated with an entry or exit gate. The gate terminal validates the QR code and broadcasts data pertaining to the QR code via a BLE network. The user device verifies the gate terminal on receiving the broadcasted data via the BLE network, and transmits a connection request to the gate terminal. The gate terminal further validates the connection request and decides whether to allow or disallow the user to pass through the entry or exit gate.

MANAGING ADMINISTRATION PRIVILEGES OF AN ELECTRONIC LOCK

It is provided a method for managing administration privileges of an electronic lock. The method is performed in the electronic lock and comprises the steps of: receiving a first signal from a first mobile device, the first signal comprising a first code entered by a user to the first mobile device, and an identifier of the first mobile device; determining that the first mobile device has administration privileges to the electronic lock; storing the first code in memory of the electronic lock; receiving a second signal from a second mobile device, the second signal comprising a second code entered by a user to the second mobile device, and an identifier of the second mobile device; and granting administration privileges to the lock for the second mobile device only when the second code matches the first code.

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20210019969 · 2021-01-21 · ·

An information processing system includes a receiving unit that receives request to reserve a lockable place for a time window from a first person; and an authority giving unit that gives one or more second persons an unlocking authority to unlock the place within the time window.

Operation communication system

An operation communication system is provided including a server, a mobile device, and a reader device. The server and the reader device communicate data with one another via the mobile device. The mobile device may communicates with the reader device via Bluetooth, for example. The mobile device may communicate with the server via the Internet, for example. Associated methods, devices and apparatuses are also provided.

Issuing an alert based on mobile user device location
10891208 · 2021-01-12 · ·

Issuing an alert with respect to a first physical area includes determining a location of a mobile user device of a user with respect to the first physical area controlled by a entity, following determining the current location, remotely configuring the mobile user device to detect when the device is within a predefined proximity to one or more second physical areas within the first physical area, and, in response to detecting that the device is within the predefined proximity, issuing the alert to one or more parties. Issuing an alert with respect to a first physical area may also include placing one or more wireless beacons that transmit beacon signals relative to the one or more second physical areas, where detecting that the device is within the predefined proximity includes the device detecting at least one of the beacon signals transmitted from the one or more wireless beacons.

CONFIGURABLE ACCESS CONTROLLER, AND RELATED SYSTEMS, METHODS, AND DEVICES
20200410794 · 2020-12-31 ·

Access control devices are described, and systems including the same. An access control device may be configurable/reconfigurable such that it may communicate with a variety of keyless entry systems. Such keyless entry systems may control access to vehicles, buildings, facilities, containers, or other target resources, where access is controlled by way of devices for securing, for example, doors, windows, gates, and lids, without limitation.

Method for Obtaining Digital Key for Check-in a Room Reservation
20200394573 · 2020-12-17 ·

Present invention provide a method for obtaining digital key for check-in the room reservation comprising steps as following. Firstly, a room reservation application is executed by a user for connecting to a room reservation website. The reservation website exchanges information with a hotel server of a hotel. When an order for reserving a room of the hotel is established on the room reservation website, the room reservation website or the hotel server transfers a reservation voucher for storing in the room reservation application. The user executes the room reservation application to connect with a wireless access point when arrives the hotel. Finally, the reservation voucher is then verified and a corresponded digital key for unlocking an electronic lock of the room is transmitted and stored in the room reservation application held by the user. The method provided by the present invention enables the user to access the wireless access point in the hotel upon arrival after the reservation voucher has been transmitted. The user could then use the reservation voucher to exchange for the digital key for unlocking the electronic lock of the hotel's room without waiting for check-in process at front desk of the hotel.

Remote management of electronic products
10866799 · 2020-12-15 · ·

A remote server may receive a data log with information regarding the status and/or a setting of an electronic product. The remote server may store information in the data log in a database. The remote server may process information in the database to determine whether a newer version of firmware is available for the electronic product.

Leveraging flexible distributed tokens in an access control system

A method according to one embodiment includes determining whether a guest associated with a guest device is authorized to control an access control device based on an access control list, generating a caveated cryptographic bearer token in response to determining the guest is authorized to control the access control device, the caveated cryptographic bearer token including a time-based caveat defining a time limit for control of the access control device, transmitting the caveated cryptographic bearer token to the guest device in response to generating the caveated cryptographic bearer token, transmitting, in response to receiving the caveated cryptographic bearer token, a request including the caveated cryptographic bearer token to control the access control device to the access control device, and authenticating the request based on the received caveated cryptographic bearer token, a base cryptographic bearer token stored on the access control device, and a real-time clock of the access control device.

Utilizing caveats for wireless credential access

A method according to one embodiment includes receiving, by an access control device, a credential token from a mobile device, wherein the credential token includes an access credential, a credential identifier, and a caveat that instructs the access control device to perform an associated action, determining, by the access control device, a credential type associated with the access credential based on the credential identifier, determining, by the access control device, a set of caveat rules associated with the credential type, wherein the set of caveat rules identifies one or more actions authorized for an access credential of the credential type, and performing, by the access control device, the associated action identified by the caveat in response to a determination that the associated action is an action authorized by the set of caveat rules associated with the credential type.