G07C9/25

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

An information processing system acquires biological information of a target and generates output information determined in correspondence with identification information using the identification information associated with the biological information. Then, the output information is output.

Wireless devices for storing a financial account card and methods for storing card data in a wireless device
11538035 · 2022-12-27 · ·

A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.

Method for Unlocking a Lock Using Real-Time Wireless Power Supply
20220398882 · 2022-12-15 ·

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

Method for Unlocking a Lock Using Real-Time Wireless Power Supply
20220398882 · 2022-12-15 ·

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

Vehicle and Control Method Thereof
20220388478 · 2022-12-08 · ·

An embodiment vehicle includes a display device, an input device configured to obtain an input of a user, a smart key identifying device configured to search for a smart key of a plurality of smart keys, and a controller electrically connected to the display device, the input device, and the smart key identifying device, wherein the controller is configured to control the smart key identifying device to search for the smart key located inside the vehicle based on receiving a first command for executing a face registration process through the input device and to determine whether to proceed with the face registration process based on how many of the plurality of smart keys are identified as being inside the vehicle.

Access control system

An access control system which relies at least in part on a non-networked path for permitting an entity access to a secured location; the entity identified by the system by means of a unique entity identifier accorded the entity; entry to said secured location secured by a barrier; said barrier identified by the system by means of a unique barrier identifier accorded the barrier; said system including a local access unit located local to the barrier; said system including a barrier controller for actuation of the barrier; said local access unit issuing an open signal to the barrier controller whereby the barrier permits the entity access to the secured location if and only if data contained in a token communicated from an un-trusted communications device to the local access unit is verified by the local access unit with respect to at least a first parameter by the local access unit.

Anti-shoplifting system
11521447 · 2022-12-06 ·

The invention utilizes an existing cash register that, in processing the purchases, establishes an identifier (i.e. date stamp, barcode, QR code) on the receipt. This code is then used at an exit portal to trigger the opening of a barrier allowing the purchaser to leave the building. In the preferred embodiment, an image of the customer is taken on entering and leaving the building and facial recognition is made for the purpose of later apprehension or for future denial of entry into the store.

TOUCHSCREEN FOR ELECTRONIC LOCKS

Systems and methods are disclosed for a lock assembly having a touchscreen. The lock assembly includes an interior assembly and an exterior assembly having an exterior lock housing and a touchscreen assembly. The touchscreen assembly includes a touchscreen having selectable icons on a front surface thereof, a printed circuit board assembly (PCBA), and a support structure. The PCBA includes input regions corresponding to the selectable icons and light emitters. The support structure is configured to reflect light emitted from the light emitters through the front surface of the touchscreen.

Securing access to restricted areas from visitors

A computer-implemented method, a computer system and a computer program product secure access to a restricted area. The method includes capturing, by a camera, a first image of a face of a first person and a second image of a face of a second person. The method also includes determining whether the face of the first person is included in a database of persons authorized to access the restricted area. The method further includes determining whether the second person is in proximity to the first person. In addition, the method includes determining whether the second person is authorized to access the restricted area. Finally, the method includes transmitting a signal that the second person is authorized to access the restricted area in response to determining that the second person is in proximity to the first person and the second person is authorized to access the restricted area.

PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
20220375019 · 2022-11-24 · ·

A program in the present invention causes a computer to perform: performing a first process for performing a predetermined process related to an aircraft boarding procedure and acquiring boarding reservation information on a user; when the process is completed, performing a second process for matching biometric information acquired from the user with passport biometric information included in passport information acquired from a passport of the user and, when a result of the matching of the biometric information with the passport biometric information is that the matching is successful, associating the passport information, the biometric information, and the boarding reservation information with each other; and performing a switching process for switching whether to perform the first process or the second process.