G07C2009/00325

LOCK AND METHOD FOR OPERATING SAME
20230069249 · 2023-03-02 ·

A method for operating a lock. A wireless command is received from a trusted device in a proximity range of the lock to enable a proximity mode. The proximity range is selectable by a user of the trusted device via an application. The proximity mode is enabled, and while enabled, a command is received to activate or deactivate the lock. The lock is activated or deactivated in response to the received activating or deactivating command.

COMMUNICATION SYSTEM AND COMMUNICATION METHOD

A vehicle 2 is provided with an authentication system 4 which enables operating a user's terminal 3 as a key to the vehicle 2. The authentication system 4 performs authentication by means of near-field communication between the terminal 3 and a wireless authentication device 22 and operates a device 20. A determination unit 33 confirms the use state of the terminal 3 at the time when near-field communication was performed, and determines whether or not the confirmed use state of the terminal 3 satisfies a condition for stopping or restricting the key function. If the determination unit 33 has determined that the confirmed use state of the terminal 3 satisfies the condition for stopping or restricting the key function, then a processing unit 36 performs processing for stopping or restricting the key function.

Small format interchangeable core (SFIC) electronic cylinder and method
11466475 · 2022-10-11 ·

A lock module comprises a cylinder including a control latch configured to mechanically rotate between an extended position to prevent removal of the cylinder from a lock assembly, and a retracted position to allow removal of the cylinder from the lock assembly. A rotator is configured to enable the control latch to rotate between a locked position and an unlocked position. An actuation rod is configured to travel between a tab-blocking position maintaining the control latch in the extended position, and a retracted position allowing the control latch to retract into a retracted position. A control pin is configured to restrict the travel of the actuation rod in a control pin-blocking position in response to the rotator being rotated to a locked position and to retract from blocking the travel of the actuation rod to the control pin-unblocking position in response to the rotator being rotated to an unlocked position.

Location-aware beacon scanning and authentication for secure control of IoT applications

Systems and methods for location-aware scanning of an IoT beacon by a mobile device, and the authentication of the mobile device, are disclosed herein. The system detects when the mobile device is within a geofenced region associated with the IoT beacon and enables the scanning by the mobile device for signals from the beacon. Using the beacon signals received by the mobile device, the system detects when the mobile device and IoT beacon are sufficiently near one another. Once the mobile device and IoT beacon are sufficiently near each other, the system authenticates control of the mobile device over the IoT beacon by verifying an authentication key transmitted to a server.

Micromarket security system and method
11620625 · 2023-04-04 · ·

In an example, the present invention provides a local area network system for a micro-market application. The system has a world wide network of computers, which comprising the Internet. In an example, the system has a micro market server device coupled to the world wide network of computers. In an example, the micro market server device has a library comprising a listing of a plurality of products, a field configured with the association information, e.g., an identifier for the server device. In an example, the product information is associated with the plurality of products is provided in a product catalog file. The device has a plurality of fields associated with a plurality of micromarket identification information. The micromarket identification information is a unique identifier for the particular micromarket.

MICROMARKET SECURITY SYSTEM AND METHOD
20230206204 · 2023-06-29 ·

In an example, the present invention provides a local area network system for a micro-market application. The system has a world wide network of computers, which comprising the Internet. In an example, the system has a micro market server device coupled to the world wide network of computers. In an example, the micro market server device has a library comprising a listing of a plurality of products, a field configured with the association information, e.g., an identifier for the server device. In an example, the product information is associated with the plurality of products is provided in a product catalog file. The device has a plurality of fields associated with a plurality of micromarket identification information. The micromarket identification information is a unique identifier for the particular micromarket.

USER AUTHENTICATION-BASED ELECTRONIC KEY USING EXTERNAL TERMINAL APPARATUS, AND OPERATION METHOD FOR SAME
20230169809 · 2023-06-01 ·

The present disclosure relates to a user authentication based electronic key operating method using an external terminal device including, transmitting a first UID of the electronic key to an external terminal device in which user authentication has been completed via a first wireless communication means, receiving an activation signal which activates the electronic key from the external terminal device via the first wireless communication means when the first UID is included in at least one second UID stored in the external terminal device, receiving a third UID of the electronic locking device by inserting the activated electronic key into the electronic locking device, and transmitting an unlocking request signal which is a signal requesting the unlocking to the electronic locking device according to a determination result of whether to unlock based on the third UID.

WIRELESS CREDENTIAL PROXIMITY CONTROL

Embodiments of the present application generally relate to controlling ingress/egress through entryway devices. More particularly, but not exclusively, embodiments of the present invention relate to attaining confirmation of intent relating to access to a controlled opening. According to certain embodiments, the credential device and/or the user of the credential device is prompted to provide a response, or otherwise is to perform certain actions, that can demonstrate a confirmation of intent to gain access to the controlled opening. Such responses and/or actions can be evaluated to determine authority to gain access to the controlled opening. Further, such intent confirmation events may, depending on the embodiment, be performed before or after credential information is communicated from the credential device and/or before or after pairing of the access control device and the credential device. According to other embodiments, intent may be confirmed, at least in part, based on changes in the characteristics of signals communicated from the credential device.

VEHICLE KEY PROGRAMMING SYSTEM AND METHOD
20220058902 · 2022-02-24 ·

A vehicle key programming system and method for chip reading and writing, key and remote programming and remote frequency testing. The system tracks programming usage when not connected to system servers and reports such usage upon connection. Immobilizer algorithms are chosen to program and such algorithms are optimized with each attempted use.

WIRELESS CREDENTIAL PROXIMITY CONTROL

Embodiments of the present application generally relate to controlling ingress/egress through entryway devices. More particularly, but not exclusively, embodiments of the present invention relate to attaining confirmation of intent relating to access to a controlled opening. According to certain embodiments, the credential device and/or the user of the credential device is prompted to provide a response, or otherwise is to perform certain actions, that can demonstrate a confirmation of intent to gain access to the controlled opening. Such responses and/or actions can be evaluated to determine authority to gain access to the controlled opening. Further, such intent confirmation events may, depending on the embodiment, be performed before or after credential information is communicated from the credential device and/or before or after pairing of the access control device and the credential device. According to other embodiments, intent may be confirmed, at least in part, based on changes in the characteristics of signals communicated from the credential device.