Patent classifications
G07C2009/00952
ACCESS CONTROL ACCESSIBILITY
An access control system and a method for operating an access control system are provided. The access control system includes an access control device. The method provides a step for initiating the transmission of the advertising signal by a communication module of the access control device, the advertising signal being received by a mobile device. The method provides a step for automatically receiving an access credential from the mobile device to the communication module of the access control device. The method provides a step for comparing, in an authentication module, the access credential with an authorized access credential (e.g., stored in a memory of the access control device).
Electronic Cam Lock for Cabinet Doors, Drawers and Other Applications
A cam lock for cabinets, drawers, drug cabinets, credenzas, sliding doors, lockers, mail boxes and other door type applications is compact in size, fits an existing cam lock opening and provides electronic access via a keypad or other electronic access. Using batteries, such as AAA size batteries or smaller, the lock has electronics that release a lock turn knob or handle when the correct code is entered. Preferably a set of electronic contacts is included at an accessible position on the lock housing to allow both master access and power jumping with a common manager's implement, for situations of lost codes and/or battery failure. In a particular embodiment the lock is long, narrow and low in profile so as to fit on the margin of a steel or wood file cabinet, compatible with the cam lock opening already provided. The locks, NFC-enabled, can be used in securing delivery boxes to enable delivery access, when authorized.
Systems and methods for secure lock systems with redundant access control
Systems and methods for providing secure locks having redundant access channels are disclosed. In some embodiments, the smart lock has a hardware processor, a power source, a cylinder, a button that forms a rose knob, and a rose protector. The rose knob and rose protector protect and conceal the hardware processor, the power source, and the cylinder. The rose protector forms an annular groove that slidabiy interlocks with the rose knob. The rose knob has a plurality of redundant access channels for receiving authentication information, The redundant access channels may include a biometric scanner for receiving biometric information, a passcode keypad for entering a token, or a wireless transceiver for receiving a token from a mobile device and transmitting a response to the mobile device. When the user cannot open the lock through the first redundant access channel, the smart lock is configured to allow access through a second access channel.
Electronic device arrangement, method for operating an electronic device arrangement, security device, and automated teller machine
A Universal-Serial-Bus interface communicatively couples a first electronic device and a second electronic device with one another. The Universal-Serial-Bus interface includes an electrical connection structure to electrically connect the first electronic device and the second electronic device with one another and a switch to disconnect the electrical connection structure. A measurement circuit to measure one or more electrical properties is associated with the electrical connection structure and/or the first electronic device. One or more processors configured to control the switch based on the measured one or more electrical properties.
Method for detecting a change of a state of a lock and a system for detecting a change of a state of a lock
A method for detecting a change of a state of a lock by means of a device connected to a key for that lock. The method includes measuring a change of a position of the key about three axes; and indicating that the state of the lock has changed if the measured change of position of the key indicates that the key has rotated about a first axis by an angle greater than or equal to a primary threshold value and about the other two axes by an angle smaller than a secondary threshold value.
SECURE ELECTRONIC LOCK SYSTEMS AND METHODS OF USING THE SAME
Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.
Secure electronic lock systems and methods of using the same
Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.
Electronic device arrangement, method for operating an electronic device arrangement, security device, and automated teller machine
A Universal-Serial-Bus interface communicatively couples a first electronic device and a second electronic device with one another. The Universal-Serial-Bus interface includes an electrical connection structure to electrically connect the first electronic device and the second electronic device with one another and a switch to disconnect the electrical connection structure. A measurement circuit to measure one or more electrical properties is associated with the electrical connection structure and/or the first electronic device. One or more processors configured to control the switch based on the measured one or more electrical properties.
Verifying the Metaverse
We verify Metaverse users. You contact a user having an avatar. She goes in the real world to an area scanned by security cameras or drones. Or to an ATM. Or enters a building with a security camera. You see her images in the real world. You ask her to do manual actions in view of the camera, to verify she controls the avatar in front of you in the Metaverse. The tasks she does can be analyzed by image recognition and AI by a server, which tells you if she did these or not.
Electronic lockbox with key retainer subassembly
Disclosed herein are various embodiments of an electronic lockbox for storing keys and key cards. The lockbox may include calendar-based entry rules so that the key codes can differ based on the date and time. The lockbox may be controllable by a mobile device such as a mobile phone, tablet, or other mobile device. The lockbox may include functionality so that key codes for the lockbox can be transmitted via websites such as Airbnb, HomeAway, or other rental websites, so that guests automatically receive their unique lockbox codes when they confirm their reservations. The lockbox may also receive a Bluetooth low energy virtual key which may be transmitted directly from a user's mobile phone to the lockbox, so that no manual code entry through the keypad is required by a user. The lockbox may be capable of accepting multiple passcodes enabled at different times and dates, and for different purposes.