Patent classifications
G07C2009/00428
CO-SIGNING DELEGATIONS
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the S electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
CIRCUIT DEVICE, ELECTRONIC DEVICE, COMMUNICATION SYSTEM, AND VEHICLE ELECTRONIC KEY SYSTEM
A circuit device is used in an electronic device including a receiver, a control circuit that performs processing on reception data received by the receiver using a clock signal, a transmitter that transmits transmission data generated by performing processing based on the reception data by the control circuit. The circuit device includes a time-to-digital conversion circuit that measures a time difference between a transition timing of a start signal based on the reception data and a transition timing of a stop signal based on the transmission data or the clock signal, and an output interface that outputs, to the control circuit, a measurement result of the time difference of the time-to-digital conversion circuit.
Keyless courier entry for safes
There are disclosed devices, systems and methods for keyless courier entry into a safe using a courier mobile computing device for receiving and authenticating a courier login and a selection for keyless courier entry into the safe. The safe has a computing device for receiving and authenticating a selection for keyless courier entry into the safe. Upon receiving the authenticated selection for keyless entry, the safe computing device generates and displays a factor code based on a safe's serial number. The courier inputs the factor code into the mobile device. In response to receiving and authenticating of the factor code, the mobile computing device generates and displays a security check code. The courier enters the security check code into the safe computing device, which in response to the entry and upon authenticating the security check code, unlocks the safe.
Information prompting method, apparatus, and system, and intelligent electronic door lock
A method, apparatus and system for information prompt, and an intelligent electronic door lock are provided. The method includes: when detecting that an intelligent electronic door lock performs an operation for unlocking a door, determining a target user behavior type corresponding to the operation for unlocking the door, obtains target user concern data corresponding to the target user behavior type, and generates to-be-output prompt information based on the target user concern data; wherein, the prompt information is configured for prompting a user to perform a target behavior or displaying the target user concern data, and the target behavior is a behavior corresponding to the target user concern data; and outputting the prompt information. The problem that the intelligent door lock system has a single humanized function may be solved.
KEYLESS COURIER ENTRY FOR SAFES
There are disclosed devices, systems and methods for keyless courier entry into a safe using a courier mobile computing device for receiving and authenticating a courier login and a selection for keyless courier entry into the safe. The safe has a computing device for receiving and authenticating a selection for keyless courier entry into the safe. Upon receiving the authenticated selection for keyless entry, the safe computing device generates and displays a factor code based on a safe's serial number. The courier inputs the factor code into the mobile device. In response to receiving and authenticating of the factor code, the mobile computing device generates and displays a security check code. The courier enters the security check code into the safe computing device, which in response to the entry and upon authenticating the security check code, unlocks the safe.
LOCK SYSTEM USING FIDO AUTHENTICATION
Disclosed is a lock system of a device by using FIDO authentication, the lock system including: an input terminal to which a biometric FIDO authenticator registered to a relying party on the cloud is inserted; an agent which receives an authentication message from the biometric FIDO authenticator and attempts FIDO authentication to a relying party when the biometric FIDO authenticator is inserted into the input terminal and biometric information of a user registered to the relying party is input to the biometric FIDO authenticator, and generates a lock releasing signal when an authentication response is received; and an operation control unit which releases a lock so that the device is operable when the lock releasing signal is received.
Method for Securing a Communication between a Mobile Communication Apparatus and a Vehicle
The invention relates to a method (100) for securing a communication between a mobile communication apparatus (10) and a vehicle (5), in particular for authentication at a passive access system of the vehicle (5), wherein the vehicle (5) comprises at least one radio unit (20).
INTELLIGENT LOCK
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
Intelligent lock
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
System and method for premise management
Systems and methods for premise management comprising a reservation 5 management module having at least one server, the at least one server arranged in data communication with a user device to receive a request for reservation from the user device to access a premise for a specific duration; and a key generator arranged in data communication with the reservation management module; wherein upon receipt of the request for reservation, the key generator generates a secret key for 10 the user to access the premise for the specific duration, is disclosed. The system may be integrated with other modules including, but not limited to, a lock system and a presence detection system to provide a seamless service to a user.