G07C2009/0088

Enhanced access control based on key proximity
11423723 · 2022-08-23 · ·

Embodiments relate to enhanced access control features based on proximity between a portable electronic key and an electronic locking device. The portable electronic key receives first authentication information from an access administration device. Based on the portable electronic key being located within a threshold distance to the electronic locking device, the portable electronic key receives second authentication information from the access administration device. In some aspects, determining whether the key is located within the threshold distance to the electronic locking device comprises detecting a communication between the locking device and the portable electronic key. The portable electronic key may initiate an unlocking event at the electronic locking device based on the first authentication information and the second authentication information. Initiating the unlocking event comprises transmission of an access credential that causes the electronic locking device to permit access to an entry point.

Locking and unlocking system, portable terminal capable of communicating with server, locking and unlocking method executed by portable terminal, and non-transitory storage medium storing program
11380149 · 2022-07-05 · ·

A locking and unlocking system includes a portable terminal and a server. The portable terminal includes a service providing unit, a first sending unit, and a first receiving unit. The service providing unit provides a use reservation service for a vehicle or facilities by communicating with another server. The first sending unit sends a first signal to the server in response to a request from the service providing unit. The first signal requests authentication information used for locking and unlocking. The first receiving unit receives the authentication information from the server. The server includes a second receiving unit and a second sending unit. The second sending unit sends a second signal including the authentication information to the portable terminal when the second receiving unit receives the first signal.

Method and system for changing the premises
11380152 · 2022-07-05 · ·

Systems and methods for changing the premises in a building such as a hotel or the like. An accessing device is encoded and provided to a guest to access first premises. The guest may request for second premises. Accordingly, the guest may receive information related to second premises along with a unique code to access the second premises. On entering the unique code the guest is prompting to receive second encoding associated with the second premises.

Wireless access tag duplication system and method
11282315 · 2022-03-22 · ·

A wireless access tag duplication device, system and method is provided. The wireless access tag duplication system comprises: a wireless access tag reader; a wireless access tag writer; a processor, coupled to the wireless access card reader and the wireless access card writer; and a memory. The memory includes instruction code, executable by the processor, for: determining a first key of a first wireless access tag; determining remaining keys of the first wireless access tag using nested authentication and the first key; reading data of the first tag using the wireless access card reader, the first key and the remaining keys; and writing the data to a second tag using the wireless access card writer, the first key and the remaining keys.

CONTAINER, METHOD, AND SYSTEM FOR ENABLING OFFLINE ACCESS CONTROL AND FOR ENABLING OFFLINE SENSOR DATA TRANSMISSION

In a method and system for opening a container having a lock device, a mobile terminal exchanges data with the lock device using near-field data transmission and exchanges data with a server using far-filed data transmission. The mobile terminal stores container reconfiguration data and container operating data, which include at least time data and access data. The server generates new container reconfiguration data in response to receiving the container operating data from the mobile terminal and transmits the new container reconfiguration data to the mobile terminal using the far-field data transmission. The new container reconfiguration data are then transmitted from the mobile terminal to the lock device using the near-filed transmission.

METHOD, SYSTEM AND APPARATUS FOR EQUIPMENT MONITORING AND ACCESS CONTROL
20210327188 · 2021-10-21 ·

A method of asset access control includes: storing, at an access control server: an asset record corresponding to a physical asset and containing an asset identifier corresponding to the asset; and an account record corresponding to a user of the physical asset and containing an account identifier; receiving, at the access control server from a client computing device, an authorization request containing the asset identifier and the account identifier; determining, based on a comparison between the asset record and the account record, whether to authorize the request; when the determination is affirmative, transmitting an instruction to a collector device mounted on the physical asset to permit subsequent access to the asset.

Key information sharing system, delivery device and user terminal

A key information sharing system includes a delivery device that delivers key information as first information for a control device equipped in an object and a user terminal that receives the first information delivered from the delivery device. The delivery device adds second information that allows the first information to be transferred between the user terminal and a third-party terminal without the delivery device, to the first information to be delivered to the user terminal. The user terminal transmits the first information to the third-party terminal in response to an input operation by a user, when the user terminal receives the first information to which the second information has been added.

METHOD, SYSTEM AND APPARATUS FOR EQUIPMENT MONITORING AND ACCESS CONTROL
20210343096 · 2021-11-04 ·

A method of asset access control includes: storing, at an access control server: an asset record corresponding to a physical asset and containing an asset identifier corresponding to the asset; and an account record corresponding to a user of the physical asset and containing an account identifier; receiving, at the access control server from a client computing device, an authorization request containing the asset identifier and the account identifier; determining, based on a comparison between the asset record and the account record, whether to authorize the request; when the determination is affirmative, transmitting an instruction to a collector device mounted on the physical asset to permit subsequent access to the asset.

METHOD, SYSTEM AND APPARATUS FOR EQUIPMENT MONITORING AND ACCESS CONTROL
20210343097 · 2021-11-04 ·

A method of asset access control includes: storing, at an access control server: an asset record corresponding to a physical asset and containing an asset identifier corresponding to the asset; and an account record corresponding to a user of the physical asset and containing an account identifier; receiving, at the access control server from a client computing device, an authorization request containing the asset identifier and the account identifier; determining, based on a comparison between the asset record and the account record, whether to authorize the request; when the determination is affirmative, transmitting an instruction to a collector device mounted on the physical asset to permit subsequent access to the asset.

UTILIZING CAVEATS FOR WIRELESS CREDENTIAL ACCESS

A method according to one embodiment includes receiving, by an access control device, a credential token from a mobile device, wherein the credential token includes an access credential, a credential identifier, and a caveat that instructs the access control device to perform an associated action, determining, by the access control device, a credential type associated with the access credential based on the credential identifier, determining, by the access control device, a set of caveat rules associated with the credential type, wherein the set of caveat rules identifies one or more actions authorized for an access credential of the credential type, and performing, by the access control device, the associated action identified by the caveat in response to a determination that the associated action is an action authorized by the set of caveat rules associated with the credential type.