G07C2009/00246

Protocols for remote vehicle access systems

Protocols for wireless communications between controllers in vehicles, key fobs, and sensors are shown. In particular, methods of parallel processing and interweaving data in signals are provided.

SECURITY SYSTEM AND METHOD OF USING SAME
20180286154 · 2018-10-04 ·

A security system can include a doorbell device comprising a scanner, and a locking mechanism operatively connected to the scanner and a structure, such as a home or lockbox. A key, which can be in the form of a bar code, can be generated and sent to delivery or service personnel needing access to the structure. The delivery or service personnel present the bar code to the scanner. Upon reading the bar code, the locking mechanism is unlocked thereby allowing access to the structure.

Method and apparatus for streamlining guest entry into a building
09978192 · 2018-05-22 · ·

A method of providing an electronically generated key includes the steps of generating an account for a resident; allowing the resident to access a software application; receiving a request from the resident for an electronic pass; and generating the electronic pass. The method further includes the steps of electronically detecting the electronic pass at a reader; determining whether the electronic pass is valid; and activating a relay if the electronic pass is valid. A device for receiving the request and for activating the relay is also provided.

Server Device, Method, And Program
20250046138 · 2025-02-06 ·

A server device is provided comprising: at least one processor, wherein the at least one processor is configured to execute a computer readable instructions so as to: receive at least one of person-under-restriction related information related to a person under restriction whose usage of a restricted item is restricted or usage related information related to usage of the restricted item by the person under restriction instructed by an instructor; and generate authentication key information generated based on at least one of the received person-under-restriction related information or the received usage related information, the authentication key information being used to authenticate input key information generated based on predetermined input-key generation rule information and the authentication key information and input to the restricted item by the person under restriction, and to release restriction of the restricted item.

PROTOCOLS FOR REMOTE VEHICLE ACCESS SYSTEMS
20170158168 · 2017-06-08 ·

Protocols for wireless communications between controllers in vehicles, key fobs, and sensors are shown. In particular, methods of parallel processing and interweaving data in signals are provided.

Modifying access control permissions
12548391 · 2026-02-10 · ·

Aspects of the disclosure relate to electronic access control. An access control server maintains data associated with a plurality of electronic locks. A user is issued an electronic key for unlocking one or more electronic locks. The user can be assigned to a group. Members of the group are permitted to access a subset of the plurality of electronic locks. A first key configuration is transmitted to the electronic key, the first key configuration permitting the user to access the subset of electronic locks. The access control server accesses personnel data related to the user and determines whether the personnel data satisfies a condition associated with the group. Responsive to determining that the condition is not satisfied, the user is removed from the group and a second key configuration is transmitted to the electronic key, the second key configuration preventing the user from accessing the subset of electronic locks.