G07C2009/0088

Authorization to unlock a space

An information processing system includes a receiving unit that receives request to reserve a lockable place for a time window from a first person; and an authority giving unit that gives one or more second persons an unlocking authority to unlock the place within the time window.

INFORMATION PROCESSING DEVICE AND VEHICLE SYSTEM

An information processing device comprises a controller configured to detect, in relation to an area associated with a predetermined facility, entry or exit of a predetermined vehicle, transmit, to a facility device corresponding to the facility, in a case where the vehicle enters the area, an electronic key for enabling movement of the vehicle, and invalidate the electronic key transmitted to the facility device in a case where the vehicle exits the area.

SYSTEMS AND METHODS FOR EXTRACTING KEY CODE DATA AND CONFIGURING VEHICLE KEYS

A system and method to automatically extract bitting information, such as keycode information, for replicating original/master key. System comprises an imaging device that scans the key blade of the original key and sends images to the server where the keycode gets extracted using an iterative software algorithm based on maximum likelihood principle. In one example a system comprises a kiosk which includes SBC (Single Board Computer), imaging device, touch screen and transponder identification module determines compatible SKU (from internal SKU database) if needed, and a compatible key with a matched cut key blade gets delivered to the location of Kiosk to get paired to the car. Another type system comprises a Smartphone/tablet with CKE application instead of KIOSK to scan the original keyblade. The application sends images to a central server for decoding and cutting a duplicate key, and a compatible duplicate key with matched cut key blade is delivered to the associated customer.

SYSTEMS FOR SHARED VEHICLE ACCESS
20230252367 · 2023-08-10 ·

The present systems, devices, and methods relate to managing shared vehicle access. Vehicle access can be provided to a candidate user based on whether the user is included in a list of at least one user associated with a respective virtual key. Virtual keys can be created, or lists of at least one user can be updated to include the candidate user, to in turn provide vehicle access. Virtual keys can be stored in a plurality of virtual key slots, with vehicle access being provided based on a virtual key stored in an active key slot. Status reports can be sent to a reservation management device, for updating virtual keys or lists of at least one user.

AUTHENTICATION METHOD AND USER EQUIPMENT
20220130194 · 2022-04-28 ·

An authentication method used in a server, includes: acquiring check-in information sent by user equipment (UE) of a user, wherein the check-in information includes information on the user and a check-in period; determining information on a room of the user based on the check-in information; sending the information on the room to the UE; determining unlocking information based on the check-in information; and sending the unlocking information to at least one of the UE or door lock equipment corresponding to the information on the room, wherein the door lock equipment is configured to authenticate the user based on the unlocking information during the check-in period, the unlocking information being invalid other than during the check-in period.

Remote emergency vehicle device management and diagnostics

Examples provide a system and method for remote management of lockable devices associated with emergency vehicles. A lockable device is a device, such as a multicolor light device or a siren device having one or more available functions which are initially placed in a locked state at the time of manufacture. A user can unlock the locked functions by logging into a remote device manager on a user device while the locked device is connected to the user device. The user selects one or more locked functions to unlock. The remote device manager generates a unique unlock code for each locked function selected for unlock. The unlock code is returned to the user device for utilization in unlocking the selected functions. The unlock code enables operation of the locked function. A lock status is updated to indicate which functions have been unlocked.

Method for controlling access to a vehicle
11305730 · 2022-04-19 · ·

A method for controlling access to a vehicle. An electronic key for accessing one or multiple vehicle components is deactivated after the vehicle is switched off in order to park the vehicle in a parking position, so that an attempt with the aid of the deactivated electronic key to access the one or multiple vehicle components of the vehicle parked in the parking position may be prevented. Moreover, a system for controlling access to a vehicle, a parking system for vehicles, an access control system for controlling access to a vehicle, a vehicle, a user for a communication network, a method for operating a user for a communication network, and a computer program, are described.

CO-SIGNING DELEGATIONS
20220028198 · 2022-01-27 ·

It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the S electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.

METHOD, SYSTEM AND APPARATUS FOR EQUIPMENT MONITORING AND ACCESS CONTROL
20210343098 · 2021-11-04 ·

A method of asset access control includes: storing, at an access control server: an asset record corresponding to a physical asset and containing an asset identifier corresponding to the asset; and an account record corresponding to a user of the physical asset and containing an account identifier; receiving, at the access control server from a client computing device, an authorization request containing the asset identifier and the account identifier; determining, based on a comparison between the asset record and the account record, whether to authorize the request; when the determination is affirmative, transmitting an instruction to a collector device mounted on the physical asset to permit subsequent access to the asset.

Key information sharing system, delivery device and user terminal

A server that shares key information to a portable terminal includes processing circuitry configured to deliver the key information to the portable terminal. The key information is associated with an object equipped with a control device, and the control device performs a predetermined control to the object when the control device receives the key information from an external terminal. The key information includes restriction information, where the restriction information sets a restriction content for the predetermined control.