Patent classifications
G07C2009/00865
Wireless device enabled locking system having different modalities
An encrypted security system and associated methods for controlling physical access are described. The system includes a security server configured to receive a request for authentication from a mobile device, the request including information identifying the mobile device and a physical access control device. The security server forwards an encryption message including a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential from a key device associated with a user using a first wireless connection. The access control system may be further adapted to verify the credential with a preliminary authentication for the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to verifying the credential with the preliminary authentication. The access control system may be adapted to determine an intent of the user to access the asset. The access control system may identify the credential includes a pattern in the preliminary authentication. The access control system may be further adapted to provide a command to grant access to the asset.
Smart management device, lock, and identification method
A smart management device identification method includes: sending, by a smart management device, an activation request to a smart lock device, wherein the activation request is used to verify validity of the smart management device; in response to information indicating that the smart management device is valid, receiving, by the smart management device, an access control key from the smart lock device, wherein the access control key is generated according to a master key of the smart lock device and an identifier of the smart management device; and requesting, by the smart management device, the smart lock device to perform a state switching operation using the access control key.
Electronic lockbox with schedule controlled access credentials
An electronic lockbox control system allows visiting agents (such a “showing agents” in a real estate sales situation) to make an appointment to visit a property that is protected by an electronic lockbox, using a time-sensitive authorizing credential that is provided by a central computer; and then, if that visiting agent is delayed because of an earlier appointment, the central computer can automatically create a new time-sensitive authorizing credential that is time-shifted, so that visiting agent can later visit that remote property and obtain access to that lockbox at the later, time-shifted appointment time. Another interested party (e.g., a homeowner) can decline that later, time-shifted appointment. The visiting agent can carry a smart phone with a GPS receiver, and the central computer can use his GPS coordinates to calculate his physical position, and calculate his travel time to the next lockbox location to automatically create the new, time-shifted appointment time.
System for controlling operations of a vehicle using mobile devices and related methods thereof
The present disclosure relates to aspects of authenticating a mobile device and providing a vehicle access key thereto when a previously registered mobile device is not accessible. In one aspect of the present disclosure, a method includes requesting at a first mobile device, access to a profile associated with controlling operations of a vehicle, the profile having stored thereon an access key for operating the vehicle, the access key having been previously installed on a second mobile device. The method further includes upon successful authorization, receiving the access key at the first device and operating the vehicle using the access key on the first mobile device.
System for secure access and initiation using a remote terminal
Systems, computer program products, and methods are described herein for secure access and initiation using a remote terminal. The present invention is configured to determine that a secondary user has entered a secure environment, wherein the secure environment comprises a safe-deposit box associated with a primary user; determine that the secondary user has initiated an augmented reality session using a computing device associated with the secondary user; automatically generate a digital authentication key in response determining that the secondary user has entered the secure environment and has initiated the augmented reality session; electronically receive, from the computing device associated with the primary user, an authorization to transmit the digital authentication key to the computing device associated with the secondary user; transmit the digital authentication key to the computing device associated with the secondary user; and emulate the augmented reality session on the computing device associated with the primary user.
Electronic lockbox with interface to other electronic locks
An electronic lock system that uses an intermediary controller (“IMC”), such as an electronic lockbox, to communicate with an electronic lock that protects buildings, such as dwellings. The IMC also communicates with a wireless portable computer (“WPC”), such as a smart phone, so that an authorized user can first authenticate credentials to the IMC, then have the IMC (or the WPC) send appropriate messages to the electronic lock to command that lock to unlock. The IMC must initially be setup by an ADMIN, so that the IMC's memory contains the specific codes and protocols to successfully communicate with the electronic lock. In this manner, the user can obtain access to the building without specific knowledge of those specific codes and protocols required by the electronic lock. An alarm panel on a building could also be disarmed by the IMC, if its specific codes and protocols are first setup into the IMC's memory.
CONTROL APPARATUS, SYSTEM, STORAGE, AND SERVICE PROVISION METHOD
A control apparatus includes a controller configured to generate an electronic key for unlocking a storage configured to be locked with an article stored therein, and a communication interface configured to transmit the electronic key generated by the controller to a terminal apparatus of a user in a case in which the user is forecasted to arrive at a store after a time slot for providing the article at the store has passed.
Key delegation for controlling access
It is provided a method for controlling access to an access object. The method is performed in an electronic key device and comprises the steps of: communicating with an access control device to obtain an identity of the access control device; sending an access request to a server, the access request comprising an identity of the electronic key device and the identity of the access control device; receiving a response from the server, the response comprising a key delegation to the electronic key device; and sending a grant access request to the access control device, the grant access request comprising the key delegation, to allow the access control device to evaluate whether to grant access to the access object based on a plurality of delegations comprising a sequence of delegations.
DISTRIBUTED CLONING TOOL ASSEMBLY, SYSTEM, AND METHOD FOR REPLICATION OF VEHICLE ACCESS DEVICES
Provided is a system and method for duplicating a master key for a vehicle. The system includes determining that a first device is communicating with a t/r device, the t/r device including an antenna for communicating with the master key. A cloning application associated with said t/r device may be operating on the first device. The t/r device may retrieve security information from said master key. The cloning application may communicate the security information for said master key to said central network system. The central network system may generate duplicate security information. The central network system may communicate the duplicate security information to the cloning application. The cloning application may transmit the duplicate security information to the t/r device to program a duplicate master key with the duplicate security information.