G07C2009/00523

Enhanced security for contactless access card system
11276258 · 2022-03-15 · ·

An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.

WIRELESS NETWORK, MOBILE SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO LOCKERS, STROLLERS, WHEEL CHAIRS AND ELECTRONIC CONVENIENCE VEHICLES PROVIDED WITH MACHINE-READABLE CODES SCANNED BY MOBILE PHONES AND COMPUTING DEVICES

A wireless network, mobile systems and methods for controlling access to lockers, strollers, wheel chairs and electronic convenience vehicles and other networked devices provided with machine-readable codes that are scanned by mobile phones and computing devices.

METHODS OF CONTACT-LESS ACCESS CONTROL TO NETWORKED STORAGE LOCKERS USING A MOBILE SCANNING SYSTEM TO SCAN FACILITY-LEVEL, SITE-LEVEL AND DEVICE-LEVEL MACHINE-READABLE CODES DISPLAYED IN AN ENVIRONMENT IN WHICH THE NETWORKED STORAGE LOCKERS ARE LOCATED

A method of contact-less access control to a device available for rental, access and use in an environment, by scanning multi-level machine-readable codes displayed in the environment using web-enabled mobile phones wirelessly connected to a wireless access control network. To practice a facility-level, site-level access and/or device-level access control method, a web-enabled mobile phone is used to scan facility-level, site-level and/or device-level machine-readable codes in the environment, and in response, rental transaction identifiers are stored within the cache on the web-enabled mobile phone scanning the machine-readable code. Each rental transaction identifier identifies the web-enabled mobile phone that is linked to a specific device rental transaction. After renting the selected device at either a facility-level, site-level or device-level location in the environment, the web-enabled mobile phone is used to scan the device-level machine-readable code on the rented device. The web-enabled mobile phone uses the rental transaction identifier stored within its cache to automatically enable access to the rented device at the selected site for use in the environment. While not required by the access methods, the user may set a passcode for entry into the system using the web-enabled mobile phone, to further constrain access to the rented device

Method of and system for providing guest users with wireless access control to wireless-networked electric convenience vehicles within an environment

A GPS-tracked wireless-networked electric convenience vehicle (ECV) includes a body portion adapted for supporting the body of passenger; a GPS system for providing GPS-location services to the GPS-tracked wireless-networked ECV; a transport system with wheels and a drive mechanism, for supporting and transporting the body portion; and a wireless electronic control module being integrated with the transport system, and in wireless communication with a wireless communication infrastructure, for controlling said wheels and/or the drive mechanism. When a web-enabled mobile phone is used to (i) scan a device-level machine-readable code displayed on the GPS-tracked wireless-networked ECV, (ii) complete an ECV rental transaction over the wireless communication infrastructure, and (iii) obtain access control over the rented GPS-tracked wireless-networked ECV, then the wireless electronic control module enables the GPS-tracked wireless-networked ECV to be operated on a ground surface.

WIRELESS-NETWORKED STROLLER ACCESS CONTROL SYSTEM

A wireless-networked stroller access control system includes a plurality of wireless-networked strollers, each having stroller framework for carrying a passenger, and having a set of wheels mounted on an axle. A device-level machine-readable code is displayed on a surface associated with the stroller system. A wheel brake assembly is arranged with the set of wheels and has a locked position, and an unlocked position. A manually-actuated control bar assembly is mounted on the stroller framework, arranged with respect to the wheel brake assembly, and has a locked state of operation and an unlocked state of operation. A wireless wheel-axle locking control module is arranged in wireless communication with a wireless communication infrastructure, and configured with the manually-actuated control bar assembly to control the state of operation of the manually-actuated control bar assembly and also the wheel brake assembly. When a web-enabled mobile phone is used to (i) scan the device-level machine-readable code displayed on the wireless-networked stroller, (ii) complete a stroller rental transaction over the wireless access control network, and (iii) obtain access control over the rented stroller system, then the wireless wheel-axle locking control module unlocks the wheel brake assembly, so that the set of wheels are allowed to rotate and the stroller framework is allowed to moved relative to the ground surface.

Reducing latency in a passive entry system of a vehicle

Exemplary embodiments described in this disclosure are generally directed to systems and methods for reducing latency in a passive entry system of a vehicle. In an exemplary method, a computer detects a presence of a passive entry device inside a passive entry zone of the vehicle. The passive entry device may be a phone-as-a-key (PaaK) device or a key fob, and the passive entry zone is an area around the vehicle that is monitored by a wireless detection system of the vehicle. The computer authenticates the passive entry device, which can include determining an identity of an individual authorized to use the passive entry device. Upon successful authentication, the computer may unlock a door of the vehicle and provide a visual prompt to the individual to unlatch the unlocked door. The visual prompt can include an unlatch icon displayed upon a door access panel of the vehicle.

Unattended smart property showing
11145016 · 2021-10-12 · ·

Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.

ELECTRONIC DEVICE, AN ACCESS CONTROL DEVICE, AND RELATED METHODS
20210295625 · 2021-09-23 ·

An electronic device includes a memory circuitry, an interface circuitry, and a processor circuitry. The processor circuitry is configured to determine prioritization data associated with the one or more access control devices. The processor circuitry is configured to control, based on the prioritization data, at least one of the one or more access control devices.

Vehicle management server, vehicle management system and vehicle management method
11043053 · 2021-06-22 · ·

A vehicle management server for managing a shared vehicle used by a plurality of users in different time slots. The vehicle management server includes a processor and a memory connected to the processor. The processor is configured to perform: receiving use reservations for using the shared vehicle from the plurality of users; and making a use schedule of the shared vehicle. The memory is configured to perform: storing a correspondence between a plurality of containers provided in the shared vehicle and the plurality of users respectively using the plurality of containers. The processor is further configured to perform: outputting a control signal to command the shared vehicle to lock or unlock each of the plurality of containers provided in the shared vehicle based on the use schedule made in the making and the correspondence stored in the memory.

VEHICLE CONTROL APPARATUS, VEHICLE CONTROL METHOD, RECORDING MEDIUM WITH PROGRAM FOR CONTROL RECORDED, AND VEHICLE CONTROL SYSTEM

A vehicle control apparatus includes a first vehicle communication unit performing communication with a mobile terminal, a first distance measuring unit measuring, with first precision, a vehicle-terminal distance being a distance between a vehicle and the mobile terminal, a terminal position information obtaining unit obtaining terminal position information transmitted from the mobile terminal, a second distance measuring unit measuring the vehicle-terminal distance with second precision being measurement precision lower than the first precision based on the terminal position information, and a high-precision distance measurement determining unit determining whether the first distance measuring unit is caused to measure the vehicle-terminal distance or not based on the vehicle-terminal distance measured by the second distance measuring unit.