G07C2009/00373

ELECTRIC LOCK ADAPTED TO BE ACTIVATED BY A MOBILE PHONE AND METHOD THEREOF
20170243420 · 2017-08-24 ·

Provided is an electric lock adapted to be activated by a mobile phone. The mobile phone includes a wireless connection module and a battery unit for supplying power to the wireless connection module and the electric lock includes a detection device, a control module and a wireless unlock module, wherein the detection device and the wireless unlock module are connected electrically to the control module and the wireless unlock module is configured to couple with the wireless connection module of the mobile phone via a wireless communication protocol such that once the wireless connection module of the mobile phone and the wireless unlock module of the electric lock are paired with each other, the mobile phone is capable of converting without touching awakening the wireless unlock module in order to unlock the electric lock relative to a locked object.

Portable device searching device, portable device searching method, portable device searching program
09741232 · 2017-08-22 · ·

A portable device searching device includes a transmitter that transmits search information to a search area near a vehicle to search for a portable device, a receiver that receives authentication information returned from the portable device as a response to the search information, and a controller that controls the transmitter and the receiver. The receiver includes an authentication portion to authenticate the portable device based on the authentication information and notifies the controller of an authentication result. The controller performs control to transmit the search information in a normal operation state, subsequently transitions to a low-power consumption state, and returns from the low-power consumption state to the normal operation state when notified of the authentication result from the receiver.

LOCATION TRACKING FOR LOCKING DEVICE

Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a locking device, transmitting a security challenge to the mobile device, and transmitting a response to the challenge and an encrypted user profile for the locking device. The response includes data generated with an access key that is stored by both the mobile device and the locking device, and the user profile is encrypted by a server using a secret key that is stored by the server and the locking device. Authentication further includes verifying the response to the challenge, where the response is verified using the access key, and validating additional data from the mobile device. An action of the locking device may be initiated as specified by the request.

ACCESS CONTROL ACCESSIBILITY
20220036672 · 2022-02-03 ·

An access control system and a method for operating an access control system are provided. The access control system includes an access control device. The method provides a step for initiating the transmission of the advertising signal by a communication module of the access control device, the advertising signal being received by a mobile device. The method provides a step for automatically receiving an access credential from the mobile device to the communication module of the access control device. The method provides a step for comparing, in an authentication module, the access credential with an authorized access credential (e.g., stored in a memory of the access control device).

Control device

A control device includes: an input unit to which a first signal is input from a detection unit detecting an operation for an opening-closing body; and a control unit generates a second signal for operating the opening-closing body, based on the first signal, wherein the control unit can be switched between a first power consumption mode and a second power consumption mode in which less power is consumed, and the control unit can be switched between a first state where the second power consumption mode is switched to the first power consumption mode, based on a first condition, and a second state where the second power consumption mode is switched to the first power consumption mode, based on a second condition on which the second power consumption mode is less likely to be switched to the first power consumption mode.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A SECURED SPACE

Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device fastenable to an access point of the secured space, a server, and a network for communication between the locking device and server. The locking device includes an actuator, a memory, and a processing unit for generating a control signal for the actuator to move the locking device into a locked state or a closed state. The server includes a storage unit to store authorization data for the locking device, and a processing unit which can receive a security request for the locking device from a user computing device; determine whether the security request includes requesting data that corresponds to the authorization data stored for the locking device; generate a security command based on the security request; and communicate the security command to the locking device.

Physical lock electronic interface tool

A physical lock interface system facilitates secure and remote control of assignment and enablement of physical lock systems. The system receives a request to enable a user to disable a physical lock during a particular range of time. The lock is associated with a geofence boundary defined by a geofence. During the range of time, the system monitors for a presence of the user within the geofence. In response to determining that the user is within the geofence during the range of time, the system transmits a communication to an application of a client device of the user. The application is configured to interact electronically with the physical lock and to cause the client device to display information identifying the physical lock based on the communication. The system detects an electronic signal initiated by the application while the user is within the geofence and disables the physical lock.

Technologies for associating an offline Wi-Fi system with a wireless access point

A method according to one embodiment includes establishing, by Bluetooth Low Energy (BLE) circuitry of an access control device, a BLE communication connection with a first mobile device while a main microprocessor and a Wi-Fi circuitry of the access control device are in sleep states; waking, by the access control device, the Wi-Fi circuitry of the access control device from the sleep state in response to establishing the BLE communication connection with the mobile device; establishing, by the Wi-Fi circuitry of the access control device, a Wi-Fi communication connection with an access control server in response to waking the Wi-Fi circuitry from the sleep state; and receiving, by the access control device and from the access control server via the Wi-Fi communication connection, access control data for the access control device transmitted from a second mobile device to the access control server.

Administering web-based access credentials
11367343 · 2022-06-21 · ·

Methods and systems relating to administration of access credentials for electronic access control are disclosed. Web resources are provided for rendering a webpage including an access credential. A server device receives an access instruction authorizing a user to access an electronic lock associated with the access credential. A client device of the user transmits a first request for the access credential. The first request may be generated by a browser application of the client device. The server device provides the web resources and a browser cookie to the client device. Responsive to subsequent requests for the access credential, the server device determines whether the client device is authorized to receive the access credential based on the client device providing the browser cookie. When the server device determines that a subsequent request authorizes the client device to receive the access credential, the web resources are provided to the browser application.

ELECTRONIC LOCK WITH WIRELESS CONTROL
20220189225 · 2022-06-16 ·

The method and system for access control, comprising detecting, by the electronic lock a tactile action by a body on a tactile sensor. The electronic lock transmitting a first signal using very low frequency band in response to said detection of tactile action through said body. The electronic key fob receives the first electromagnetic signal, where the first signal is transmitted through a body in contact with a transmitter of said first electromagnetic signal i.e. the electronic lock. Further, the electronic key fob transmits a second electromagnetic signal in response to receipt of said first electromagnetic signal. The electronic lock receives the second signal in response to said first signal and disengages or engages a lock in response to said received second signal.