G07C2009/00865

Systems and methods for secure lock systems with redundant access control

Systems and methods for providing secure locks having redundant access channels are disclosed. In some embodiments, the smart lock has a hardware processor, a power source, a cylinder, a button that forms a rose knob, and a rose protector. The rose knob and rose protector protect and conceal the hardware processor, the power source, and the cylinder. The rose protector forms an annular groove that slidabiy interlocks with the rose knob. The rose knob has a plurality of redundant access channels for receiving authentication information, The redundant access channels may include a biometric scanner for receiving biometric information, a passcode keypad for entering a token, or a wireless transceiver for receiving a token from a mobile device and transmitting a response to the mobile device. When the user cannot open the lock through the first redundant access channel, the smart lock is configured to allow access through a second access channel.

AUTHENTICATION METHOD AND USER EQUIPMENT
20220130194 · 2022-04-28 ·

An authentication method used in a server, includes: acquiring check-in information sent by user equipment (UE) of a user, wherein the check-in information includes information on the user and a check-in period; determining information on a room of the user based on the check-in information; sending the information on the room to the UE; determining unlocking information based on the check-in information; and sending the unlocking information to at least one of the UE or door lock equipment corresponding to the information on the room, wherein the door lock equipment is configured to authenticate the user based on the unlocking information during the check-in period, the unlocking information being invalid other than during the check-in period.

METHOD AND SYSTEM TO REMOTELY FLASH EXTERNAL MODULE USING A COMMUNICATION HUB
20220130191 · 2022-04-28 ·

A system to remotely flash an external module, the system comprising an external module installable in a secured location having at least one securing device with a transponder, at least one server, wherein the at least one server and a communication hub that communicates said at least one server, said communication hub further comprising a communication device that extracts key data from the securing device's transponder. Additional embodiments of the system include an external module and a learning module that extract partial key data. A method to flash the external module by extracting at least one set of partial key data from the securing device's transponder and/or securing device using an external module, communication device, and/or learning module, wherein the server analyzes and processes the set(s) of partial key data to generate a securing device bypass for the external module that installed to the secured location.

Smart platform for programming remote keyless devices

A platform for a programmable remote transmitter, designed, and programmed to perform single or multiple operations, optionally incorporated into a custom-made base that attaches to a smart phone case or other mobile devices. The remote transmitter is designed and activated via secured programming provided by an application on the user's mobile device, without the intervention of car dealers, locksmiths or using difficult manual processes. The remote transmitter can be attached to smart phones, mobile devices, or other suitable surfaces (e.g. a briefcase or a vehicle's dashboard) for safekeeping and accessibility.

Remote emergency vehicle device management and diagnostics

Examples provide a system and method for remote management of lockable devices associated with emergency vehicles. A lockable device is a device, such as a multicolor light device or a siren device having one or more available functions which are initially placed in a locked state at the time of manufacture. A user can unlock the locked functions by logging into a remote device manager on a user device while the locked device is connected to the user device. The user selects one or more locked functions to unlock. The remote device manager generates a unique unlock code for each locked function selected for unlock. The unlock code is returned to the user device for utilization in unlocking the selected functions. The unlock code enables operation of the locked function. A lock status is updated to indicate which functions have been unlocked.

Controlling access to an access object
11763618 · 2023-09-19 · ·

It is presented a method for controlling access to an access object. The method is performed in an access control device and comprises the steps of: receiving a user input to reset the access control device; generating a new identifier for the access control device, and discarding any previously used identifier for the access control device; communicating with an electronic key to obtain an identity of the electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a receiver; and granting access to the access object only when the plurality of delegations comprise a sequence of delegations covering a delegation path from the access control device, identified using the new identifier, to the electronic key such that, in the sequence of delegations, the delegator of the first delegation is the access control device, and the receiver of the last delegation is the electronic key.

Physical access control systems with localization-based intent detection

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.

Trusted device establishment
11190507 · 2021-11-30 · ·

A device implementing a trusted device establishment system includes at least one processor configured to receive, via a direct wireless connection and from an other device, a public key associated with the other device and an indication of a data item previously provided to the other device via an out-of-band channel. The at least one processor is further configured to verify that the indication of the data item corresponds to the data item previously provided to the other device, and store, in a secure memory region, the public key in association with an identifier corresponding to the other device when the indication of the data item is verified. The at least one processor is further configured to authorize the public key to access a secure device based at least in part on the public key being stored in the secure memory region.

Using a private key of a cryptographic key pair accessible to a service provider device
11232660 · 2022-01-25 · ·

It is provided a method for providing access to a physical space secured by a lock for provision of a service. The method comprises the steps of: receiving an approval signal from a service consumer device of the service consumer, the approval signal indicating that the service consumer allows a service provider agent of a service provider to open the lock; receiving, from the service provider device, a request to assign a service provider agent to open the lock; communicating with the service provider device to use a private key of a cryptographic key pair accessible to the service provider device, the private key being used to generate service agent access data that is specific for the service provider agent, to allow the service provider agent to open the lock; and transmitting the service agent access data to a service provider agent device associated with the service provider agent.

METHODS AND SYSTEMS FOR ACCESS CONTROL AND AWARENESS MANAGEMENT

Systems and methods for access control management designed for multi-unit buildings are provided. The disclosed systems can use mobile devices, a local mesh network, access control devices, and wireless communication to facilitate multi-unit real estate management. Mobile devices can download and use credentials to access appropriate areas and units in a building through local wireless communications with access control devices.