G07C2009/00476

METHOD OF AND SYSTEM FOR AUTOMATICALLY FINDING A STORAGE LOCKER RENTED BY A GUEST WITHIN A FACILITY USING A MOBILE PHONE TO SCAN MACHINE-READABLE CODES ON STORAGE LOCKERS WITHIN THE FACILITY

A single-sided storage locker system deployed at any site within a facility, and providing guest visitors with access control enabled by scanning multi-level machine-readable codes using mobile scanning computing systems, such as web-enabled smartphones with digital cameras and mobile application support. The storage locker system supports automated modes of discovering and finding where a guest's rented locker is located within the facility and its sites at any moment in time, simply by using the guest' smart phone to scan a device-level code, a site-level code, a facility-level code or a discovery-level code, posted anywhere within the facility or any site, without need for using a physical locker lookup kiosk or other conventional systems and methods.

ELECTRONIC KEY DEVICE UTILIZING USER INPUT TO FACILITATE ACCESS BY AUTHORIZED PERSONS
20190066425 · 2019-02-28 ·

Embodiments relate to the processing of information associated with a user of a portable electronic key to limit use of the key by unauthorized persons. The portable electronic key includes an input device configured to receive user input information from a holder of the key. A user verification procedure is performed based on the user input information. The user input information can include biometric information associated with the holder of the key. The user verification procedure includes a determination that the user input information corresponds to authorized user information stored in a memory of the key. Based in part on execution of the user verification procedure, the portable electronic key can be configured to initiate an unlocking event at an entry point.

Digital seal security system for side mounted swing-out type vehicle cargo access doors
10181233 · 2019-01-15 ·

The system includes a digital counter adapted to display a number which is changed in response to an actuation signal. A lock assembly mounted to the cargo door is connected to the counter. The lock assembly has a hollow housing within which a member having a recess adapted to receive the handle is moveable by the handle between an unlocked position, wherein the door may be opened, and a locked position, in which the door is prevented from being opened. A magnetically actuated switch is mounted within the housing. The switch is adapted to generate an actuation signal to the digital counter in response to movement of the member within the housing from its locked position. The signal causes the counter to change the displayed number, indicating that the door may have been opened in transit.

Remote administration of an electronic key to facilitate use by authorized persons
10115256 · 2018-10-30 · ·

Embodiments relate to remote administration of a portable electronic key. An activation signal may be delivered to wireless communications circuitry of the portable electronic key to enable the key to perform one or more tasks. A smart device can receive information related to the activation signal from a server device. The smart device may deliver the activation signal to the portable electronic key via a wireless communications link established in accordance with a wireless networking standardized communications protocol. A user verification procedure may be performed at one of the portable electronic key and the smart device. The user verification procedure may indicate if a holder of the portable electronic key is authorized to use the key. Delivery of the activation signal may be initiated in response to completion of the user verification procedure.

Upgrade kit for an ignition key and methods

One variation of an upgrade kitfor an ignition key corresponding to a vehicle and including an immobilizer transponder and a keyless entry transmitterincludes: a wireless jammer configured to interfere with wireless transmission from the immobilizer transponder; a wireless receiver configured to receive an unlock request from an external device; a relay configured to actuate the keyless entry transmitter to unlock a door of the vehicle in response to the unlock request; and an enclosure configured to contain the wireless receiver and a portion of the ignition key.

ENTRY AUTHORIZATION SYSTEM AND METHOD THEREFOR
20240348594 · 2024-10-17 ·

Internet-based entry authorization systems and methods for enabling a human authorizer to authorize or deny physical entry to a human visitor at a secure physical entry point designed to defend against replay attacks by use of instantaneously presented dynamic URLs including dynamic Physical Entry Request Identifiers (PERIs) requiring authentication.

DISTRIBUTION OF ACCESS CONTROL INFORMATION BASED ON MOVEMENT OF AN ELECTRONIC KEY
20180081335 · 2018-03-22 ·

Methods, systems, and devices relating to administration of a portable electronic key are disclosed. The portable electronic key is configured for controlling access to an electronic locking device. A motion detection sensor detects a movement of the portable electronic key. Based on the movement of the key, a wireless communications link is established between the portable electronic key and an access administration device for exchanging messages related to access control information.

Method of and system for automatically finding a storage locker rented by a guest within a facility using a mobile phone to scan machine-readable codes on storage lockers within the facility

A single-sided storage locker system deployed at any site within a facility, and providing guest visitors with access control enabled by scanning multi-level machine-readable codes using mobile scanning computing systems, such as web-enabled smartphones with digital cameras and mobile application support. The storage locker system supports automated modes of discovering and finding where a guest's rented locker is located within the facility and its sites at any moment in time, simply by using the guest' smart phone to scan a device-level code, a site-level code, a facility-level code or a discovery-level code, posted anywhere within the facility or any site, without need for using a physical locker lookup kiosk or other conventional systems and methods.

Securing internet of things (IoT) based entrance/exit with multi-factor authentication

Certain aspects direct to systems and methods for securing an internet of things (IoT) based entrance for a designated area with multi-factor authentication. The system includes an IoT based entrance having an IoT device, which stores a secret key for generating a time-based password. An authenticated identification device may also have the same secret key. When the IoT device receives a request from an identification device to establish a secured connection, the IoT device first verifies the wireless address of the identification device. Once the wireless address is verified, the IoT device establishes the secured connection with the identification device through the wireless network. Then the IoT device uses the secret key and a current access time to generate the time-based password, and receive a second time-based password from the identification device through the secured connection. If both time-based passwords match each other, the identification device is authenticated.

Remote auditing of electronic keys
12347255 · 2025-07-01 · ·

Embodiments relate to enhanced auditing features for administration of remote electronic keys. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes an electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.