Patent classifications
G07C9/00904
SMART ACCESS CONTROL DEVICE
Embodiments are directed to systems and techniques to provide smart access control devices with legacy access control systems.
Doorbell communities
Doorbells can send data to each other to enable a first doorbell user to warn a second doorbell user regarding a suspicious visitor. A first user can indicate a first trait of a visitor via a first remote computing device. The first user can create a user group to enable the members of the user group to use their doorbells to take pictures of suspicious visitors and to send the pictures of the suspicious visitors to other members of the user group.
SMART BUILDING INTEGRATION AND DEVICE HUB
Embodiments are generally directed to systems, devices, methods, and techniques to control devices via a mobile device platform in a smart building system. Embodiments further include techniques to determine a device of the smart building system and an action to perform by the device. The techniques include establishing, a connection with a smart lock of the smart system, and communicating a request to perform the action to the smart lock of the smart system.
AUTOMATIC ACCESS CONTROL BASED ON THIRD-PARTY DATABASE STATUS
A method of granting access to a visitor for a secured property including: receiving third-party opt-in information from a host via a first computer application accessed through a host computing device, the third-party opt-in information including an access grant authorizing a third-party service provider to grant access to an access control device that secures the secured property of the host; receiving a third-party service request from the host; assigning the third-party service request to the visitor; and granting the visitor an access to the access control device, wherein the visitor computing device is configured to transmit an access request to actuate the access control device and gain access to the secured property.
ACCESS MANAGEMENT SYSTEM
An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.
Information processing apparatus, information processing system, and non-transitory computer readable medium
An information processing apparatus includes a processor configured to acquire reservation information on a rental space and perform, using the reservation information, processing of prompting a user to perform a predetermined task that is to be performed before or after using the rental space.
Systems and methods for lock access management using wireless signals
A system for access management is disclosed. 100 A server (100) can receive a request for access to a locking device (140) from a mobile device (110). The server (100) can transmit access credentials to the mobile device (110). The mobile device (110) can transmit, via wireless signal, the access credentials and a lock command for the locking device (140) to a wireless access point (130) capable of communicating with the locking device (140). The wireless access point (130) can transmit the lock command to the locking device (140).
SYSTEMS AND METHODS FOR WIRELESSLY TRANSMITTING TOKEN DATA TO A KEY CARD READING DEVICE
A mobile computing device for transmitting token data to a key card reading device having an activation mechanism is provided. The computing device is programmed to receive token data representing access data of a key card, generate a transmission signal representing the access data of the key card based on the token data in response to receiving the token data, and output the transmission signal to the key card reading device. The access data causes the key card reading device to activate the activation mechanism. The transmission signal causes the key card reading device to activate the activation mechanism when the mobile computing device is placed near the key card reading device and the transmission signal is authenticated by the key card reading device.
SYSTEM FOR MAINTAINING A CONFINED SPACE
Systems for monitoring a confined space include image sensors, such as cameras, and access control devices, such as intercoms and scanning devices, positioned within the interior and external to the confined space. Sensors for detecting hazardous materials, light sources, and audio output devices, such as speakers, may also be positioned within the confined space. Equipment within the confined space may be explosion proof or intrinsically safe and rated for use in hazardous areas. A first single electrical cable, such as a multi-core cable, may engage all of the system components external to the confined space to power components. A second single electrical cable may engage all of the components within the confined space to the power components. A monitoring station may receive video, audio, sensor, and access data from the system equipment and generate alarms and notifications responsive to unauthorized access attempts, hazardous materials, or irregular user incidents.
Time synchronization
A method having the steps of obtaining temporal information communicated to a first device; carrying out one or more of the following tests: a test to determine whether the first device is in a state following an initial operation, a battery replacement or other power outage, or a reset, a test to determine whether a deviation between temporal information of the clock and the communicated temporal information is less than or equal to a threshold which is specified, and a test to determine whether the communicated temporal information has the same date as the temporal information of the clock; and synchronizing the clock using the communicated temporal information if all of one or more defined conditions are satisfied, wherein one of the one or more conditions requires that at least one of the one or more tests carried out has a positive result.