G07C2009/00246

Protocols for remote vehicle access systems

A wireless communications system for an automotive vehicle includes a vehicle control unit and a fob. The vehicle control unit includes a vehicle transceiver. The fob includes a fob transceiver and a fob control unit and is configured to transmit and receive communications through at least two channels. The fob control unit is programmed to transmit a preamble through the first of the at least two channels, transmit a preamble through the second of the at least two channels during a null space following the preamble transmitted through the first channel, transmit a data packet payload through the first channel when a null space following the preamble in the second channel is detected, and transmit a data packet payload through the second channel when a null space following the preamble in the second channel is detected. Communications are interleaved between the first and second channels.

RESTRICTIVE ACCESS CONTAINER
20200199909 · 2020-06-25 ·

Disclosed herein is a restrictive access container that may include a container body, at least one container lid, a lock, at least one actuator, and a timer. Further, the container body may include at least one container wall and a container interior space formed by the at least one container wall. Further, the at least one container wall may include at least one container opening. Further, the at least one container lid openably coupled with the at least one container opening. Further, the lock may include a catch and a latch. Further, the catch and the latch are detachably attachable. Further, the lock may be associated with at least one of a lock state and an unlock state. Further, the at least one actuator operationally coupled with the lock. Further, the timer communicatively coupled with the at least one actuator. Further, the timer may be electrically powered.

AUTHENTICATING ACCESS TO A PHYSICAL SPACE

According to one or more embodiments described herein, a computer-implemented method includes detecting a trigger event occurring at a physical space. The method further includes generating, by the processing system, a temporary network and a temporary authorization code to permit access to the physical space based at least in part on an analysis of information associated with the detected trigger event. The method further includes transmitting, by the processing system, information about the temporary network and the temporary authorization code to a second processing system. The method further includes implementing, by the processing system, an automation routine responsive to detecting the trigger event.

OPTIMAL COMMUNICATION EMITTER AND EMITTING METHOD
20200105077 · 2020-04-02 ·

The present disclosure discloses an optical communication emitter and an optical communication receiver, an emitting method and a receiving method, an optical communication transceiving system and a key for an optical communication smart door lock. The optical communication emitter includes: at least one light emitting unit, each light emitting unit comprising at least two light sources, each of the at least two light sources emitting light of a different color, wherein a unit optical communication time is divided into a number of time slots, which number correspond to the number of the light sources included in each light emitting unit, each time slot corresponds to the light sources that emit light of the same color, the light sources corresponding to different time slots are different, and each of the light sources can only emit light in the corresponding time slot.

Electronic lock box
11908256 · 2024-02-20 ·

In some aspects, an electronic lock box may include a heated section, a cooled section, a non-temperature controlled section, and a processor. The processor may receive, from a server, an indication of an electronic order. The processor may identify a code associated with an item. The processor may determine, from the code, a tracking number associated with the item and the description of the item. The processor may determine that the tracking number associated with the item corresponds to a tracking number associated with the electronic order and that a current date corresponds to an expected delivery date. The processor may provide an instruction to unlock the heated section, the cooled section, or the non-temperature controlled section to hold the item based on the description of the item. The processor may maintain an environmental status of sensors (e.g., weight, volume, temperature, operations, and/or location) within the electronic lock box.

Method for Unlocking Intelligent Lock, Mobile Terminal, Intelligent Lock and Server
20190362574 · 2019-11-28 ·

Provided are a method for unlocking an intelligent lock, a mobile terminal, an intelligent lock and a server. The method includes following steps. A mobile terminal receives an initial key and a communication key from a server. The mobile terminal encrypts the initial key and preset key data by using the communication key to generate an unlocking verification code. The mobile terminal attaches the preset key data to the unlocking verification code, to obtain an unlocking verification code attached with the preset key data. The mobile terminal sends the unlocking verification code attached with the preset key data to the intelligent lock. The intelligent lock performs an unlocking operation based on the unlocking verification code attached with the preset key data.

Security system and method of using same
10475259 · 2019-11-12 ·

A security system can include a doorbell device comprising a scanner, and a locking mechanism operatively connected to the scanner and a structure, such as a home or lockbox. A key, which can be in the form of a bar code, can be generated and sent to delivery or service personnel needing access to the structure. The delivery or service personnel present the bar code to the scanner. Upon reading the bar code, the locking mechanism is unlocked thereby allowing access to the structure.

PROTOCOLS FOR REMOTE VEHICLE ACCESS SYSTEMS
20190161059 · 2019-05-30 ·

A wireless communications system for an automotive vehicle includes a vehicle control unit and a fob. The vehicle control unit includes a vehicle transceiver. The fob includes a fob transceiver and a fob control unit and is configured to transmit and receive communications through at least two channels. The fob control unit is programmed to transmit a preamble through the first of the at least two channels, transmit a preamble through the second of the at least two channels during a null space following the preamble transmitted through the first channel, transmit a data packet payload through the first channel when a null space following the preamble in the second channel is detected, and transmit a data packet payload through the second channel when a null space following the preamble in the second channel is detected. Communications are interleaved between the first and second channels.

Authenticating with an authentication server for requesting access to a physical space

According to a first aspect, it is provided a method for requesting access to a physical space secured by a lock. The method is performed in a mobile device of a user and comprises the steps of: authenticating the mobile device with an authentication server, resulting in a token, being a data item, indicating one or more access groups to which the user belongs, wherein the token is cryptographically signed by the authentication server; storing the token in the mobile device; obtain a lock identifier of the lock; and transmitting an access request to an access control device, the access request comprising the token and the lock identifier.

Forward single origin physical access verification apparatus, system, and method of operation
20190073843 · 2019-03-07 ·

A wireless apparatus controls physical access through a portal by forward verification of a single origin code submitted by a mobile application device. A system forward verifies a single physical access control code upon each successful physical access request. The apparatus sets a flag that triggers an action when a single origin code is received out of sequence. The controller receives a plurality of physical access requests from a plurality of mobile application devices. The controller determines for each mobile application device a sequence of access requests comprising at least a first access request and a second access request. Upon authenticating the first access request, the controller writes into storage a forward verification code specific to an immediately subsequent second access request from the same app device. Upon receiving a successor, the controller performs an authentication process by matching the stored forward verification code associated with the predecessor.