Patent classifications
G07C2009/00873
AUTO SECURITY AND AUTO SAFETY SYSTEM
A method for implementing security on a vehicle, comprising integrating an auto device on the vehicle; receiving, at the auto device, input from a remote device to authenticate the remote device to the auto device; verifying, at the auto device, that the remote device is a first authenticated remote device or one of a sequence of at least one subsequently authenticated remote devices; and enabling a security related function of the vehicle upon receiving, at the auto device, instruction from the remote device if the remote device is a first authenticated remote device.
CELL PHONE SELF-SERVICE CHECK-OUT (CPSSC) AND ANTI-THEFT DEVICE
A cell phone self-service check-out (CPSSC) application and its anti-theft device with an application controlled unlocking/detaching mechanism. The CPSSC enables the shopper purchase articles that capture their interest in the store, using their cell phones and any other smart mobile device (such as tablets). The Anti-theft device (with an application & electronic driven Locking/Unlocking mechanism) that depends on the completion of payment processing to enable the customer's cell phone to electronically deactivate the anti-theft device, wirelessly. Individually and collectively, CPSSC and RFID anti-theft device provides a cell phone self-service check-out facility/system that eliminates the need to go through the cashier.
READER COORDINATION FOR ACCESS CONTROL
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility. receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Secured vehicle for user use only
Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? How does the first customer lock down the vehicle for their use exclusively? How does a user secure any personal data that they may have stored in the vehicle? As one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user.
SECURED VEHICLE FOR USER USE ONLY
Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? How does the first customer lock down the vehicle for their use exclusively? How does a user secure any personal data that they may have stored in the vehicle? As one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user.
Method and system for switching the premises
Aspects of the invention are directed towards systems and methods for changing the premises in a building such as hotel or the like. A user sends to a request from a user device to a server for switching a first premises with the second premises. An access card is able to access the first premises. Based on the request, the server determines the second premises and generates access credentials for the second premises. The access credentials are transmitted to a first access terminal associated with the first premises and the access card is encoded with the access credentials to access the second premises and permitting entry inside the second premises.
System and method of security enhancement in a security panel
Systems and methods of security enhancement in a security panel are provided. Some systems can include a security system and a keyfob. The security system can identify the keyfob, receive user input identifying a valid user pass code, and transmit the valid user pass code to the keyfob. The keyfob can save the received valid user pass code, receive user input identifying a first user input mechanism, receive user input identifying a sequence of user input mechanisms, determine whether the received sequence of user input mechanisms corresponds to the saved valid user pass code, and responsive to a valid correspondence, transmit a signal to the security system with instructions to execute an action associated with the first user input mechanism.
System of electronic lock and electronic key
A system (1) of an electronic lock (3) and an electronic key (2). The system comprises an electronic key (2) and an electronic lock (3), wherein the electronic key (2) comprises a first processing module (22), a first storage module (23), a power source module (21) and a first terminal (24); the electronic lock (3) comprises a second processing module (32), a second storage module (33), a lock core module (31) and a second terminal (34); when the electronic key (2) and the electronic lock (3) are set in a pairing manner, the first terminal (24) is electrically connected to the second terminal (34), the first processing module (22) or the second processing module (32) automatically generates at least one electronic secret key, and the at least one electronic secret key is stored in the first storage module (23) and the second storage module (33), so that a pairing action is completed; and when locking or unlocking is carried out, the first terminal (24) is electrically connected to the second terminal (34), and when the first processing module (22) or the second processing module (32) identifies that the electronic key (2) and the at least one electronic secret key stored in the electronic lock (3) match with each other, the power source module (21) supplies a power source to the connected electronic lock (3), so as to trigger a locking or unlocking action.
SYSTEM AND METHOD OF SECURITY ENHANCEMENT IN A SECURITY PANEL
Systems and methods of security enhancement in a security panel are provided. Some systems can include a security system and a keyfob. The security system can identifies the keyfob, receive user input identifying a valid user pass code, and transmit the valid user pass code to the keyfob. The keyfob can save the received valid user pass code, receive user input identifying a first user input mechanism, receive user input identifying a sequence of user input mechanisms, determine whether the received sequence of user input mechanisms corresponds to the saved valid user pass code, and responsive to a valid correspondence, transmit a signal to the security system with instructions to execute an action associated with the first user input mechanism.
COMMUNICATION DEVICE, SYSTEM INCLUDING COMMUNICATION DEVICE AND LOCKING/UNLOCKING DEVICE, AND CONTROL PROGRAM FOR COMMUNICATION DEVICE
Proposed are a communication device for reliably locking and unlocking an electronic lock even when a plurality of communication devices attempt to simultaneously connect to a locking/unlocking device, a system including the communication device and the locking/unlocking device, and a control program for the communication device. A communication device starts connection to a locking/unlocking device provided near a door of a building when receiving an advertisement signal transmitted from the locking/unlocking device. The communication device is configured to retry a scan for receiving the advertisement signal after a delay time different from a delay time of another communication device connectable to the locking/unlocking device when the communication device determines the connection failed.