Patent classifications
G07C2009/00428
Method for secure transmission of a virtual key and method for authentication of a mobile terminal
The invention relates to a method for transmission of a secure virtual key (VK) from a server (50, S) to a mobile terminal (20, T) capable of communicating with the server (50, S), comprising the steps of: a) reception by the server (50, S) of a certification request from the mobile terminal (20, T), b) provision and downloading on the mobile terminal (20, T), by the server (50, S), of a user application (25), and c) provision of the mobile terminal (20, T), by the server (50, S), with a virtual key (VK), and d) downloading and securing of the virtual key (VK) in a security element (27) of the mobile terminal (20, T), characterised in that said security element is formed by an encrypting software environment (27).
Intelligent lock
A method for operating an access control comprises creating a plurality of wake-up schedules for each of one or more wireless transceivers. Each of the plurality of wake-up schedules may be configured to control how frequently a particular wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the particular wireless transceiver may be different from another one or the plurality of wake-up schedules for the particular wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the particular wireless transceiver such that a duration of time between wake-ups for the particular wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for each of the one or more of the wireless transceivers may be configurable by an administrative user via an interface.
INFORMATION PROCESSING SYSTEM, KEY INFORMATION MANAGEMENT DEVICE, KEY INFORMATION MANAGEMENT METHOD AND NON-TRANSITORY STORAGE MEDIUM STORING PROGRAM
An information processing system includes circuitry configured to: choose, in response to a request from a user terminal carried by a user of a delivery service, a vehicle cabin including a trunk of a rental vehicle scheduled to be rented out, or having been rented out to the user of the delivery service by a car rental service, as a delivery destination of a package, and distribute key information to a delivery company providing the delivery service, the key information being used for unlocking a door accessing the vehicle cabin of the rental vehicle within a rental period of the rental vehicle corresponding to the chosen delivery destination.
APPARATUS, MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An apparatus includes a controller. When an operation to set a door in a state in which the door will be opened is performed by a first existing subject and if a second existing subject is located on a path on which the door moves to open, the controller causes an informing unit to provide information that the door will be opened and the second existing subject is on the path.
Methods And Apparatuses For Unlocking A Motor Vehicle Having An Engine Start And/Or Vehicle Entry System
Various embodiments may include systems for unlocking a motor vehicle. For example, an apparatus may include: a motor vehicle key for unlocking a motor vehicle having a remote engine start and/or vehicle entry system. The motor vehicle key comprises a Bluetooth antenna and a motor vehicle communication antenna. A controller of the motor vehicle key is configured to: use the Bluetooth antenna to set up a Bluetooth link to a mobile radio terminal using an activation key stored in a memory of the motor vehicle key; and instruct a motor vehicle controller installed in the motor vehicle to prompt an operation of the motor vehicle.
SYSTEM AND METHOD FOR PREMISE MANAGEMENT
Systems and methods for premise management comprising a reservation 5 management module having at least one server, the at least one server arranged in data communication with a user device to receive a request for reservation from the user device to access a premise for a specific duration; and a key generator arranged in data communication with the reservation management module; wherein upon receipt of the request for reservation, the key generator generates a secret key for 10 the user to access the premise for the specific duration, is disclosed. The system may be integrated with other modules including, but not limited to, a lock system and a presence detection system to provide a seamless service to a user.
AUTHORIZATION METHOD, APPARATUS, AND SYSTEM APPLIED TO ELECTRONIC LOCK
Embodiments of the present disclosure disclose an authorization method and an apparatus applied to an electronic lock. The method performed at a server hosting an instant messaging application includes: receiving an authorization request sent by a first instant messaging client at a first terminal, and the authorization request being used for requesting to grant use permission on the electronic lock to a second account; querying for, according to the authorization request, key information bound to the second account; and sending the key information to the electronic lock, the electronic lock being configured to add the key information into a trusted key information store. Moreover, the instant messaging application at the server can also be involved to further enhancing the authenticity of a person who tries to unlock the electronic lock based on the location of a terminal used by the person for accessing the instant messaging application.
Co-signing delegations
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
Intelligent lock
A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.
Safety system
A safety system and a method using a safety system having at least one mobile key unit (2) with an evaluation unit (3) and having a key station (4) with a receiver for the key unit (2), wherein at least one spatially restricted access zone (6) is arranged having an access station (7) for a facility (8), wherein the key unit (2) is configured for reading data from at least one checking station (9) within a safety zone (16) of the facility (8), wherein the data comprise identification data for the checking station (9), and wherein the mobile key unit (2) has an interface (10) by means of which the data can be wirelessly transmitted from the checking station (9) to the key unit (2), with the checking unit (9) only being accessible via the access zone (6) so that the access zone (6) can be passed through by a person (17) having the key unit (2) before reaching the checking station (9) and after the leaving of the checking station (9), with the data of the key unit (2) being able to be transmitted to the key station (4) when all the mobile key units (2) are in the key station (4), and with the facility (8) being deactivated or blocked when at least one key unit (2) has been removed from the key station (4).