G07C2009/00865

Method and system for the configuration of small locking systems
09811960 · 2017-11-07 · ·

The present invention relates to a method and a system for the configuration of small locking systems with electronic locks, preferably electronic locking cylinders, which can preferably communicate with passive RFID cards. The present invention particularly relates to a method and a system which not only allows the easy configuration of locks/locking cylinders, but also of corresponding RFID cards, preferably by using a smartphone.

PARTIALLY ACTIVATED TOKENS WITH LIMITED FUNCTIONALITY
20170270517 · 2017-09-21 ·

Embodiments are described that are directed to optimizing the provisioning of account credentials to mobile devices utilizing mobile wallets. In some embodiments, provisioned credentials may be immediately usable for restricted applications, and then fully activated at a later time after the user is authenticated.

System and method for controlling access to vehicle
09767629 · 2017-09-19 · ·

A system for controlling access to a vehicle includes a first portable device and an access controller. The access controller stores an unshared password and an access control parameter (ACP). The first portable device stores the unshared password and generates an access mode signal and a shared password. In a first access mode, the access controller provides full access to the vehicle based on a first lock signal and the unshared password. In a second access mode, the access controller provides limited access to the vehicle based on a second lock signal and the shared password. In a third access mode, the access controller provides limited access to the vehicle for a predetermined time based on a third lock signal. The access controller generates a control output signal and an ignition control signal based on the ACP and the shared password to allow only limited access to the vehicle.

KEY INFORMATION SHARING SYSTEM, DELIVERY DEVICE AND USER TERMINAL

A key information sharing system includes a delivery device that delivers key information as first information for a control device equipped in an object and a user terminal that receives the first information delivered from the delivery device. The delivery device adds second information that allows the first information to be transferred between the user terminal and a third-party terminal without the delivery device, to the first information to be delivered to the user terminal. The user terminal transmits the first information to the third-party terminal in response to an input operation by a user, when the user terminal receives the first information to which the second information has been added.

SYSTEM TO PROVIDE ACCESS TO PREMISES THAT COMPRISE ENTRANCES LOCKED BY MEANS OF ELECTROMECHANICAL KEY LOCKS
20210390808 · 2021-12-16 · ·

The invention concerns a system (1) to provide access to premises (P1-P4) that comprise entrances (E1.1, E1.2, E2-E4) locked by means of electromechanical key locks (L1.1, L1.2, L2-L4), which for locking and unlocking are powered by insertion and actuation of at least one programmable key (24). In said system (1) an administrator (10) contacts a service unit (20) in possession of a programmable key (24) and provides it with synchronization data (13) for an electromechanical key lock (L1.2) of at least one entrance (E1.1) of at least one premise (P1) at an exact geographic position of a site (S).

Providing credential set when network connection is unavailable

It is provided a method for providing a credential set to a credential carrier for gaining access to a physical space. The method is performed in a credential provider and comprises the steps of: preloading a plurality of credential sets from a server into a local memory, each credential set being usable to gain access to a physical space and each credential set comprising a first validity time; wherein, when a network connection between the credential provider and the server is unavailable, performing the following steps: obtaining a request to provide a credential set for a physical space; retrieving a credential set from the local memory, the credential set being usable to gain access to the physical space indicated in the request; and providing, as long as the first validity time of the credential set has not expired, the retrieved credential set to a credential carrier.

Method and device for sharing functions of smart key

A device for providing information about a smart key for use in vehicles includes a communicator which receives information about at least one function, performed by the smart key, of controlling a vehicle; and a controller which sets a usage restriction for the at least one function. The communicator may provide information about the at least one function including the usage restriction to an external device.

Method for Authenticating Identity of Digital Key, Terminal Device, and Medium
20220203933 · 2022-06-30 ·

A method for authenticating an identity of a digital key, a terminal, and a medium, where before a second terminal enters a preset operating state from a non-preset operating state, identity authentication is first performed on a user using an identity authentication system of the second terminal, and obtained identity authentication information is stored in a secure element of the second terminal. Then, when a digital key in the second terminal is to be used, the identity authentication information stored in the secure element of the second terminal is sent to a first terminal, and the first terminal may perform verification based on the identity authentication information to determine whether the user using the digital key in the second terminal is an authorized holder of the second terminal.

Steganographic access controls

Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.

Administering web-based access credentials
11367343 · 2022-06-21 · ·

Methods and systems relating to administration of access credentials for electronic access control are disclosed. Web resources are provided for rendering a webpage including an access credential. A server device receives an access instruction authorizing a user to access an electronic lock associated with the access credential. A client device of the user transmits a first request for the access credential. The first request may be generated by a browser application of the client device. The server device provides the web resources and a browser cookie to the client device. Responsive to subsequent requests for the access credential, the server device determines whether the client device is authorized to receive the access credential based on the client device providing the browser cookie. When the server device determines that a subsequent request authorizes the client device to receive the access credential, the web resources are provided to the browser application.