G07C2009/00357

METHOD AND APPARATUS FOR ADAPTIVE POWER USAGE IN TIME OF FLIGHT LOCALIZATION INSTANCES

A vehicle may determine a predefined communication scheme for localizing a user via time of flight (ToF), responsive to a request designated for fulfilment upon condition that a user is within a certain distance of a vehicle. The vehicle may identify a first user location via a first ToF localization using the predefined communication scheme and a second user location via time of flight using a lower power communication scheme, the lower power communication scene configured to use less power for user localization from a power source as compared to the predefined communication scheme. The vehicle may then, responsive to a difference between the first user location and the second user location being within a predefined threshold difference, save coordinate information indicative of a location of the request as being as suitable for use of the lower power communication.

System and method for pre-authenticating mobile device prior to performing vehicle function
10726649 · 2020-07-28 · ·

A vehicle includes doors, antennas, and processors. Each of the doors include an interface. The processors: (1) define, via the antennas, first zones and a second zone encompassing the first zones and surrounding the vehicle, each of the first zones associated with each of the doors; (2) in response to a mobile device entering the second zone, determine whether the mobile device is authenticated; (3) in response to the mobile device being authenticated, determine whether a user-interaction with the interface of one of the doors has occurred and determine, via the antennas, whether the mobile device is positioned in one of the first zones corresponding to said door; and (4) in response to detecting that the user-interaction has occurred and that the mobile device is positioned in said first zone, cause said door to unlock.

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A VEHICLE USING A WIRELESS ACCESS DEVICE
20200216025 · 2020-07-09 ·

Disclosed is a method and apparatus for providing access to a system using a wireless access device. The method can include activating a plurality of beacon transceivers of the vehicle. The method may also include determining, based at least in part on at least one beacon message received by the beacon transceivers, the wireless access device, or a combination thereof, when a position of the wireless access device relative to the vehicle satisfies an access threshold. The method may also include, in response to determining that the access threshold has been satisfied, configuring one or more systems of the vehicle based on the position of the wireless access device relative to the vehicle.

RF SYSTEM AND METHOD FOR IMPLEMENTING ROLE SWITCHING OF TRANSCEIVER NODES

Disclosed is a RF system (100) having at least one transceiver node device (110, 112, 114, 116, 118, 120) that is capable to assume, at a controllable point in time and/or for a controllable time period, each one of the following roles (210, 220, 230, 240): a first role (210) comprising listening or answering to a message from an active communication session, in particular ranging sessions, a second role (220) comprising listening for new communication sessions, in particular ranging sessions, a third role (230) comprising staying idle, and optionally a third role (230) comprising scanning for ongoing communication sessions, in particular ranging sessions, of other RF systems. The RF system (100) further comprises a controller device (134) communicatively interlinked with the at least one, in particular each, transceiver node device (110, 112, 114, 116, 118, 120) and capable to control an assignment of roles to the at least one, in particular each, transceiver node device, in particular to control for a transceiver node device a point in time to assume a role and/or a duration of performing a role and/or a duty cycle of performing a role (210, 220, 230, 240).

Door lock control apparatus and method

Provided are door lock control apparatus and method having enhanced security and being capable of providing improved convenience to a user, the door lock control method including: requesting a server for security information set in a door lock; receiving first security information from the server; unlocking the door lock by using the first security information; and setting second security information different from the first security information, in the door lock.

SMART THERMOSTAT HUB
20200118370 · 2020-04-16 ·

A smart thermostat hub and a management platform for controlling and securing smart devices in a multi-family residential property are disclosed. Smart thermostat hubs may bi-directionally communicate with the management platform using a LoRaWAN communication link and communicate with smart devices present within an apartment of the multi-family residential property via a non-LoRaWAN communication link. Smart thermostat hub may provide a gateway or bridge between the management platform and an offline door lock, thereby enabling access credentials for an offline door lock to be disabled from the management platform, and may serve to facilitate remote configuration of other smart devices, such as thermostats and smart light fixtures, for example.

SMART THERMOSTAT HUB
20200118371 · 2020-04-16 ·

A smart thermostat hub and a management platform for controlling and securing smart devices in a multi-family residential property are disclosed. Smart thermostat hubs may bi-directionally communicate with the management platform using a LoRaWAN communication link and communicate with smart devices present within an apartment of the multi-family residential property via a non-LoRaWAN communication link. Smart thermostat hub may provide a gateway or bridge between the management platform and an offline door lock, thereby enabling access credentials for an offline door lock to be disabled from the management platform, and may serve to facilitate remote configuration of other smart devices, such as thermostats and smart light fixtures, for example.

Half-Hemisphere Antennas For Locating Remote Devices
20200013249 · 2020-01-09 ·

A method and apparatus includes a processor that receives information corresponding to a first signal strength of a communication link between a remote device and a communication gateway of a vehicle. The information corresponding to the first signal strength is associated with a first antenna of a sensor and the first antenna includes a first peak main lobe magnitude oriented in a first direction. The processor also receives information corresponding to a second signal strength of the communication link. The information corresponding to the second signal strength is associated with a second antenna. The second antenna includes a second peak main lobe magnitude oriented in a second direction. The processor executes a first boundary line determination that includes determining whether the remote device is located on a first side of a boundary line based on the first signal strength and the second signal strength.

Key unit, locking/unlocking system, and computer-readable storage medium having program stored therein

A key unit includes a control unit configured to control locking and unlocking of an object by performing radio communication with a locking/unlocking device. The key unit is configured to transmit a predetermined signal corresponding to whether a radio wave intensity in the radio communication with the locking/unlocking device is equal to or greater than a predetermined intensity to a mobile terminal. The predetermined signal is used to transmit a predetermined notification to a user when the predetermined signal is received by the mobile terminal.

Systems, methods, and devices for access control

An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.