Patent classifications
G07C9/00904
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
RENTAL GUEST VERIFICATION SYSTEM AND METHOD
A rental guest verification system and method include a community access platform having at least one unit access device, a plurality of community access devices, a local server and a platform provider system. The platform provider system is in communication with the local server and creates a property owner portal for use by a property owner. A guest seeking to rent a unit from the property owner provides information through a guest portal and undergoes an identity and background check. A digital key is linked to the guest portal of the guest upon a successful background check. Upon arriving at the rental property, the guest portal captures a real time image of the guest and compares the same to the images used in the background check. If the comparison is a match, the guest key is activated to unlock the unit access device and community access devices.
ACCESS CONTROL SYSTEM WITH AUTOMATIC MOBILE CREDENTIALING SERVICE HAND-OFF
A method of initializing a mobile device to operate in a mobile credentialing system, the method including sending an authorization code and host URL from a hotel loyalty application to a mobile credential library of a mobile application on a mobile device, the mobile device operable to perform a first sync with a credential service to establish an ongoing trust relationship between the mobile credential library and the credential service such that the mobile application is operable to interact with an access control without the user of the mobile device knowing either an authorization code or a host location of the credential service.
Smart access control device
Embodiments are directed to systems and techniques to provide smart access control devices with legacy access control systems.
Delegation and auxiliary condition for physical access
It is provided a method for controlling access to a physical space. The method is performed in an access control device and comprises the steps of: communicating with an electronic key to obtain an identity of the electronic key; obtaining a plurality of delegations; determining, from one of the delegations, that there is an auxiliary condition, wherein the auxiliary condition is that access is approved for the electronic key by an auxiliary party, authenticated by a digital signature by the auxiliary party; and granting access to the physical space when the plurality of delegations comprises a sequence of delegations covering a delegation path from the access control device to the electronic key such that, in the sequence of delegations, the delegator of the first delegation is the access control device, the receiver of the last delegation is the electronic key, and the auxiliary condition is fulfilled.
DEVICE, SYSTEM, AND METHOD FOR ELECTRONIC ACCESS CONTROL TO REUNIFY PERSONS
A device, system, and method for electronic access control to reunify persons is provided. A device determines, using electronic data, a modality of an incident associated with a premises. The device determines: one or more routes associated with the premises and the modality; and electronic reunification data associated with the modality, the electronic reunification data defining one or more first persons and one or more second persons that are to meet in association with the incident and in accordance with the one or more routes. The device controls access points at the premises, along the one or more routes, to one or more of unlock, lock, open, or close. The device transmits one or more notifications to one or more communication devices, indicative of the electronic reunification data.
Authentication method and user equipment
An authentication method used in a server, includes: acquiring check-in information sent by user equipment (UE) of a user, wherein the check-in information includes information on the user and a check-in period; determining information on a room of the user based on the check-in information; sending the information on the room to the UE; determining unlocking information based on the check-in information; and sending the unlocking information to at least one of the UE or door lock equipment corresponding to the information on the room, wherein the door lock equipment is configured to authenticate the user based on the unlocking information during the check-in period, the unlocking information being invalid other than during the check-in period.
Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock
An electronic device associated with a lock device obtains a number of users detected within a premises, and detects a trigger event related to a lock device and premises. When the trigger event is detected, a target state of the lock device is determined based on: (1) the number of users within the premises, and (2) user security profiles indicating a desired target state of the lock device when a respective user is within the premises. A current state of the lock device is determined, and if the current state and the target state of the lock device are not the same, instructions are provided to the lock device based on the target state.
SYSTEM AND METHOD FOR CONTROLLING REMOTE ACCESS TO FACILITIES
The invention relates to a system and method for controlling remote access to facilities, comprising a control center (1) with at least one database, where said control center (1) is accessible via a mobile communications device (2) and is connected to a remote system (4) configured for managing remote access to a facility.
GENERATING TIME-BASED PREDICTIONS AND CONTROLLING ACCESS TO THE SAME
There is a need to accurately and dynamically generate a time-based prediction and control access to the time-based prediction. This need can be addressed, for example, by allowing controlled access to user information pertaining to a user visiting a facility. In one example, a method includes storing a companion user identifier in association with a public user identifier; receiving a request for a user status of the user; determining whether the companion user is permitted to receive the user status of the user based at least in part on the public user identifier and the companion user identifier; responsive to determining that the companion user is permitted to receive the user status of the user, requesting an aggregated time-based prediction for the user; and causing, the aggregated time-based prediction to be decrypted and provided as a response to the request for the user status of the user.