Patent classifications
G07C2009/00865
Distributed cloning tool assembly, system, and method for replication of vehicle access devices
Provided is a system and method for duplicating a master key for a vehicle. The system includes determining that a first device is communicating with a t/r device, the t/r device including an antenna for communicating with the master key. A cloning application associated with said t/r device may be operating on the first device. The t/r device may retrieve security information from said master key. The cloning application may communicate the security information for said master key to said central network system. The central network system may generate duplicate security information. The central network system may communicate the duplicate security information to the cloning application. The cloning application may transmit the duplicate security information to the t/r device to program a duplicate master key with the duplicate security information.
SYSTEM AND METHOD FOR GRANTING ACCESS TO OR FOR STARTING AN OBJECT
Disclosed is a system comprising a portable electronic device, and a backend device, wherein the portable electronic device is configured to, upon occurrence of a triggering event, send a first request message to the backend device, the backend device, upon receipt of the first request message, is configured to read an internal device clock and send a first response message to the portable electronic device, wherein the first response message comprises information about the present internal device time. The portable electronic device, upon receipt of the first response message, is further configured to at least one of update an internal clock of the portable electronic device with the present internal device time, and send a second response message to an object, wherein the second response message comprises an information about the present internal device time.
Electronic access control system
A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.
ELECTRONIC ACCESS CONTROL SYSTEM
A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.
Key information sharing system, delivery device and user terminal
A server that shares key information to a portable terminal includes processing circuitry configured to deliver the key information to the portable terminal. The key information is associated with an object equipped with a control device, and the control device performs a predetermined control to the object when the control device receives the key information from an external terminal. The key information includes restriction information, where the restriction information sets a restriction content for the predetermined control.
Electronic access control system
A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.
Remote access of transports
An example operation may include one or more of requesting, by a processor of a device, permissions to provide access to a transport to a diagnostic location from a network of a plurality of diagnostic locations, in response to receiving the permissions from the network of the plurality of the diagnostic locations, authenticating the diagnostic location, by the device, providing a pre-stored one-time access key to the transport to the diagnostic location, and receiving, by the device, diagnostics from the diagnostic location.
Access control system with secure pass-through
The mobile device (12) sends credentials to the authentication module (18), which may be the credential module (36) of the first access control device (16a). If these credentials are authenticated, the first access control device (16a) allows access to its associated first secured element (17a) and puts the access control devices (16a, 16b) in the second mode, viz. the secure-pass-through-mode. Any request to access a second secured element (17b) received from the mobile device (12) in the second mode is passed on and treated as an authenticated request to a second access control device (16b). The access control devices (16a, 16b) allow access to their associated secured elements (17a, 17b) based on whether the type of access being requested is consistent with the type of credentials.
AUTHENTICATING WITH AN AUTHENTICATION SERVER FOR REQUESTING ACCESS TO A PHYSICAL SPACE
According to a first aspect, it is provided a method for requesting access to a physical space secured by a lock. The method is performed in a mobile device of a user and comprises the steps of: authenticating the mobile device with an authentication server, resulting in a token, being a data item, indicating one or more access groups to which the user belongs, wherein the token is cryptographically signed by the authentication server; storing the token in the mobile device; obtain a lock identifier of the lock; and transmitting an access request to an access control device, the access request comprising the token and the lock identifier.
Physical access control systems with localization-based intent detection
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential of a user from a key device associated with the user using a first wireless connection. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to determine the user intends to access the asset based on a data set generated derived from the second wireless connection. The access control system may be further adapted to use a trained machine learning model to determine the intent of the user to access the asset. The access control system may be further adapted to transmit a command to grant access to the asset.