G07C2009/00476

STORAGE CASE, AND VEHICLE LENDING AND BORROWING SYSTEM
20220172541 · 2022-06-02 ·

A storage case for being provided in a vehicle includes a case body having a storage space for an electronic key; a first actuator to protrude into the storage space and pressing an unlocking button of the electronic key in the storage space; a second actuator; an adjustment piece for adjusting positions of the first actuator and the second actuator; a transceiver for communicating with an external terminal apparatus; and a processor to, in response to the transceiver receiving an unlocking request signal transmitted from the external terminal apparatus, cause the first actuator to press the unlocking button. The adjustment piece includes a rotating plate rotatably provided with respect to the case body; and, with respect to the rotating plate, the first and the second actuators being adjustable to become nearer to each other and adjustable to become farther from each other.

Vehicle, and Controlling Method Thereof
20220139134 · 2022-05-05 ·

An embodiment vehicle includes a UWB (ultra-wideband) module configured to receive a UWB signal transmitted from a smart key, and a controller configured to determine a location of the smart key based on the UWB signal received through the UWB module, control the UWB module to stop UWB communication after a first reference time has elapsed from a point of time at which the UWB module starts communication, and control the UWB module to restart the UWB communication after a second reference time has elapsed from a point of time at which the UWB module stops communication.

Systems, structures, and methods for accessing power locked panels

Various disclosed embodiments include illustrative systems, structures, and methods for performing authenticated access to a structure. An illustrative system includes a connector configured to be operably connected to a personal electronics device and to receive an electric charge from the personal electronics device, a controller couplable to an electromechanical locking device and the connector, and a memory. The memory is configured to store computer-executable instructions configured to cause the controller to receive first authentication information, receive second authentication information from the personal electronics device, authenticate the personal electronics device responsive to the first authentication information and the received second authentication information, and activate an electromechanical locking device to unlock responsive to the electric charge and a successful authentication.

USING IDENTITY CREDENTIALS AS A KEY FOR SECURELY CONTROLLING A LOCK CONNECTED TO A WIRELESS NETWORK
20230298417 · 2023-09-21 · ·

Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.

SECURE AUTHORIZATION VIA A DYNAMIC INTERFACE ON A VISITOR DEVICE
20210360403 · 2021-11-18 · ·

A keyless access system for securely authorizing access to a resource via a dynamic interface that user equipment (“UE”) may access using a changing access identifier without the UE installing or executing any specialized applications or code. The secure authorization of visitor access may include periodically modifying the access identifier, providing access activation data with a first access identifier to a UE in response to a triggering action, providing the dynamic interface to the UE in response to the access activation data automatically directing a browser of the UE to the first access identifier, receiving UE authorization data that is entered using a keypad or login screen of the dynamic interface, and providing access to the resource based on the first access identifier being associated with the resource, the UE authorization data authorizing access to the resource, and the access being provided before an expiration time.

Electronic key system and electronic key managing apparatus
11176763 · 2021-11-16 · ·

An electronic key system is provided with: an electronic key issuing apparatus configured to issue an electronic key associated with a moving body; a determinator configured to determine whether or not an electronic key with a first key code as the electronic key is normal; and a requester configured to request the electronic key issuing apparatus to reissue the electronic key on condition that it is determined by the determinator that the electronic key with the first key code is not normal. The electronic key issuing apparatus is configured to issue an electronic key with a second key code, which is different from the first key code, as the electronic key, on condition that the electronic key issuing apparatus is requested to reissue the electronic key.

Single-sided storage locker systems accessed and controlled using machine-readable codes scanned by mobile phones and computing devices

A single-sided ride storage locker system deployed at any site within a facility, and providing guest visitors with access control enabled by scanning multi-level machine-readable codes using mobile scanning computing systems, such as web-enabled smartphones with digital cameras and mobile application support. The storage locker system supports automated modes of discovering and finding where a guest's rented locker is located within the facility and its sites at any moment in time, simply by using the guest' smart phone to scan a device-level code, a site-level code, a facility-level code or a discovery-level code, posted anywhere within the facility or any site, without need for using a physical locker lookup kiosk or other conventional systems and methods.

Storage case, and vehicle lending and borrowing system
11756361 · 2023-09-12 · ·

A storage case for being provided in a vehicle includes a case body having a storage space for an electronic key; a first actuator to protrude into the storage space and pressing an unlocking button of the electronic key in the storage space; a second actuator; an adjustment piece for adjusting positions of the first actuator and the second actuator; a transceiver for communicating with an external terminal apparatus; and a processor to, in response to the transceiver receiving an unlocking request signal transmitted from the external terminal apparatus, cause the first actuator to press the unlocking button. The adjustment piece includes a rotating plate rotatably provided with respect to the case body; and, with respect to the rotating plate, the first and the second actuators being adjustable to become nearer to each other and adjustable to become farther from each other.

Enhanced access control based on key proximity
11423723 · 2022-08-23 · ·

Embodiments relate to enhanced access control features based on proximity between a portable electronic key and an electronic locking device. The portable electronic key receives first authentication information from an access administration device. Based on the portable electronic key being located within a threshold distance to the electronic locking device, the portable electronic key receives second authentication information from the access administration device. In some aspects, determining whether the key is located within the threshold distance to the electronic locking device comprises detecting a communication between the locking device and the portable electronic key. The portable electronic key may initiate an unlocking event at the electronic locking device based on the first authentication information and the second authentication information. Initiating the unlocking event comprises transmission of an access credential that causes the electronic locking device to permit access to an entry point.

Vehicle deauthortization of user device

Authorization of a user device is suspended based on determining, for a first predetermined time, a distance between the user device and a vehicle is greater than a threshold distance. Then a user input specifying a vehicle parameter is requested. Upon receiving the user input, the user input is validated based on the user input matching a stored vehicle parameter. The user device is deauthorized based on a) failing to receive a valid user input within a second predetermined time, or b) receiving a number of invalid user inputs equal to a threshold number.