G07C2009/00325

Electronic lock with wireless exterior to interior door communication

A lockset that includes a latch assembly, an interior assembly and an exterior assembly. The latch assembly includes a bolt movable between an extended position and a retracted position. The interior assembly is configured to electronically control movement of the bolt between the extended position and the retracted position. The exterior assembly includes a locking assembly configured to be mechanically coupled with the latch assembly. The interior assembly includes an interior wireless communication unit and the exterior assembly includes an exterior wireless communication unit that is configured to wirelessly communicate therebetween. In some embodiments, an exterior assembly includes a photovoltaic cell and the interior assembly includes a light source. The light source and the solar cell are configured for wirelessly communicating and for power transmission between the exterior and interior assemblies through a bore hole in the door.

SYSTEM AND COMPUTER PROGRAM FOR REAL-TIME LOCATION TRACKING AND MONITORING OF PRODUCT CONTAINERS
20210350318 · 2021-11-11 · ·

A system, computer program product and method for real-time location tracking and monitoring of product containers. The system includes a plurality of remote computers in communication with a respective plurality of remote users, a service provider computer, a network interface in communication with the central server and the plurality of remote computers over a shared network, a shared database in communication with the service provider computer, an administrative module configured to onboard the plurality of remote users onto the shared network via the network interface, and a location monitoring module configured to monitor in real-time the status and geographical location of a tote tracker attached to a product container and provide the status and geographical location to at least a portion of the plurality of remote users. The service provider computer is configured to receive location tracking information over a network from the tote tracker, store the location tracking information in the shared database, provide access to the shared network to the plurality of remote computers based on the respective access permission of the one of the plurality of remote users provided by the permissibility network module, and manage access specific portions of the location tracking information for all relevant remote users of the plurality of remote users.

Method for controlling locker based on delivery message and electronic device

Embodiments provide a method for controlling a locker based on a delivery message. In those embodiments, an electronic device obtains a delivery message of a first package that is sent by a server, where the delivery message includes pickup information of the first package and location information of a locker in which the first package is placed, and the pickup information is used to open a pickup box in which the first package is placed in the locker. The electronic device then determines a first area based on the location information, where the locker is located in the first area; and displays a pickup function item when it is detected that the electronic device enters the first area. Still in those embodiments, the electronic device sends a locker opening request to the server when it is detected that a user triggers the pickup function item.

Keys and locks

A key and lock set for a vehicle includes: a vehicle lock set with both vehicle door lock and vehicle engine start lock; a passcode for mechanical lock; a rotary mechanical passcode dialer or push-button mechanical passcode keypad that is mounted in vehicle and accessible from vehicle outside; an electronic key in the form of a card key, tag key, passcode or biometric for an electronic lock, wireless key with a built-in power source, portable electronic appliance with key software or key hardware of cell phone, smart phone, tablet, computer, smart watch, digital camera or digital multimedia player; and an electronic key identifier that is mounted in vehicle for the electronic key.

Near field communication tag
11164407 · 2021-11-02 · ·

A method and a tag for opening a powerless electromechanical lock are provided. The tag comprises a power source, a near field communication transceiver, an antenna connected to the transceiver, an proximity switch and a controller. The switch is configured to wake up the controller from a low power mode upon a detection of a predetermined signal. The controller is configured after the wake up to activate the near field communication transceiver and control the transceiver to transmit via the antenna wirelessly first operating power to the lock for communication and authentication, perform authentication with the lock and, provided that the authentication is successful, control the transceiver to transmit wirelessly second operating power to the lock for the lock to be set into an openable state.

VEHICLE KEY PROGRAMMING SYSTEM AND METHOD
20230334923 · 2023-10-19 ·

A vehicle key programming system and method for chip reading and writing, key and remote programming and remote frequency testing. The system tracks programming usage when not connected to system servers and reports such usage upon connection. Immobilizer algorithms are chosen to program and such algorithms are optimized with each attempted use.

Utilizing a short-range wireless communication device to provide keyless access to a safe deposit box

A device receives, from a short-range wireless communication device associated with a safe deposit box, first data identifying a first transaction card, and identifies a bank employee associated with the first data. The device determines whether the bank employee is authorized to access the safe deposit box, and starts a timer when the bank employee is authorized to access the safe deposit box. The device receives, from the short-range wireless communication device, second data identifying a second transaction card, and determines whether the second data is received prior to an expiration of the timer. The device identifies a customer associated with the second data when the second data is received prior to the expiration of the timer, and determines whether the customer is authorized to access the safe deposit box. The device causes the safe deposit box to be unlocked when the customer is authorized.

Location-aware beacon scanning and authentication for secure control of IoT applications

Systems and methods for location-aware scanning of an IoT beacon by a mobile device, and the authentication of the mobile device, are disclosed herein. The system detects when the mobile device is within a geofenced region associated with the IoT beacon and enables the scanning by the mobile device for signals from the beacon. Using the beacon signals received by the mobile device, the system detects when the mobile device and IoT beacon are sufficiently near one another. Once the mobile device and IoT beacon are sufficiently near each other, the system authenticates control of the mobile device over the IoT beacon by verifying an authentication key transmitted to a server.

Wireless credential proximity control

Embodiments of the present application generally relate to controlling ingress/egress through entryway devices. More particularly, but not exclusively, embodiments of the present invention relate to attaining confirmation of intent relating to access to a controlled opening. According to certain embodiments, the credential device and/or the user of the credential device is prompted to provide a response, or otherwise is to perform certain actions, that can demonstrate a confirmation of intent to gain access to the controlled opening. Such responses and/or actions can be evaluated to determine authority to gain access to the controlled opening. Further, such intent confirmation events may, depending on the embodiment, be performed before or after credential information is communicated from the credential device and/or before or after pairing of the access control device and the credential device. According to other embodiments, intent may be confirmed, at least in part, based on changes in the characteristics of signals communicated from the credential device.