G07C9/23

Device storage isolation

Examples associated with device storage isolation are described. One example apparatus includes a set of receptacles for electronic devices. Each receptacle includes a power connector to provide power to an electronic device stored in the receptacle, a network connector to provide a network connection to the electronic device stored in the receptacle, and a locking mechanism to secure contents of the receptacle. Members of the set of receptacles are digitally isolated from other members of the set of receptacles. The apparatus also includes an authentication module to authenticate a user based on a credential provided by the user. The authentication module controls a selected locking mechanism of a selected member of the set of receptacles based on the credential and based on data received from a remote information technology module. The apparatus also includes a user interface module to instruct the user through the process of storing a received electronic device in the receptacle or retrieving a provided electronic device from the receptacle.

Device storage isolation

Examples associated with device storage isolation are described. One example apparatus includes a set of receptacles for electronic devices. Each receptacle includes a power connector to provide power to an electronic device stored in the receptacle, a network connector to provide a network connection to the electronic device stored in the receptacle, and a locking mechanism to secure contents of the receptacle. Members of the set of receptacles are digitally isolated from other members of the set of receptacles. The apparatus also includes an authentication module to authenticate a user based on a credential provided by the user. The authentication module controls a selected locking mechanism of a selected member of the set of receptacles based on the credential and based on data received from a remote information technology module. The apparatus also includes a user interface module to instruct the user through the process of storing a received electronic device in the receptacle or retrieving a provided electronic device from the receptacle.

System and method for providing temporary access to a vehicle
11312331 · 2022-04-26 · ·

A method for providing temporary access to a vehicle includes receiving a vehicle access request at a vehicle, transporting the vehicle from a storage space to a user originating the vehicle access request using the at least one of the semi-autonomous mode and the fully autonomous mode, providing the user access to the vehicle via a smartlock system, and transporting the vehicle from the user to the storage space subsequent to the user's access. The vehicle includes a controller configured to operate the vehicle in at least one of a semi-autonomous mode and a fully autonomous mode.

System and method for providing temporary access to a vehicle
11312331 · 2022-04-26 · ·

A method for providing temporary access to a vehicle includes receiving a vehicle access request at a vehicle, transporting the vehicle from a storage space to a user originating the vehicle access request using the at least one of the semi-autonomous mode and the fully autonomous mode, providing the user access to the vehicle via a smartlock system, and transporting the vehicle from the user to the storage space subsequent to the user's access. The vehicle includes a controller configured to operate the vehicle in at least one of a semi-autonomous mode and a fully autonomous mode.

USING IDENTITY CREDENTIALS AS A KEY FOR SECURELY CONTROLLING A LOCK CONNECTED TO A WIRELESS NETWORK
20230298417 · 2023-09-21 · ·

Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.

USING IDENTITY CREDENTIALS AS A KEY FOR SECURELY CONTROLLING A LOCK CONNECTED TO A WIRELESS NETWORK
20230298417 · 2023-09-21 · ·

Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.

Smart parking lot system

One or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to detect a vehicle that enters into a parking lot, identify an individual associated with the vehicle, retrieve context information corresponding to the individual, dynamically determine a first parking space based on the context information and available parking spaces, and provide the individual with directions to the first parking space.

Smart parking lot system

One or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to detect a vehicle that enters into a parking lot, identify an individual associated with the vehicle, retrieve context information corresponding to the individual, dynamically determine a first parking space based on the context information and available parking spaces, and provide the individual with directions to the first parking space.

Verified access to a monitored property
11232666 · 2022-01-25 · ·

A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.

METHODS AND SYSTEMS FOR ACCESS CONTROL AND AWARENESS MANAGEMENT

Systems and methods for access control management designed for multi-unit buildings are provided. The disclosed systems can use mobile devices, a local mesh network, access control devices, and wireless communication to facilitate multi-unit real estate management. Mobile devices can download and use credentials to access appropriate areas and units in a building through local wireless communications with access control devices.