G07C2009/00785

Access control system using mobile device

A method of controlling access through a door may include storing a user's digital identity and a user's access policy in a memory of the user's mobile device, which may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader, which controls operation of a door lock in accordance with whether the access decision was YES or NO.

ACCESS CONTROL SYSTEM USING MOBILE DEVICE

A method of controlling access through a door may include storing a user's digital identity and a user's access policy in a memory of the user's mobile device, which may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader, which controls operation of a door lock in accordance with whether the access decision was YES or NO.

ACCESS CONTROL SYSTEM USING MOBILE DEVICE

A method of controlling access through a door may include storing a user's digital identity and a user's access policy in a memory of the user's mobile device, which may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader, which controls operation of a door lock in accordance with whether the access decision was YES or NO.

HIGHLY SECURE OPTICAL KEY ACCESS CONTROL SYSTEM
20200370339 · 2020-11-26 ·

Highly secure optical key access control system utilizing unique optical refraction properties of non-duplicated transparent objects to secure premises or computer databases is disclosed.

Said access control system includes optical key containing an optical element with unique refraction properties and unique access module comprising source of light, image capture array and electronic processor. An optical element of optical key is inserted to access module between light source and image catching array at initial and then several following prearranged positions and resulting set of unique refraction image appeared at surface of image catching array processed with electronic processor for comparison against the existing database of preauthorized refraction images in database. If resulting set of unique refraction image match with some set of preauthorized refraction images the access to premises or computer databases is permitted.

Apparatus and method for securing items with optical lock and key

Systems, apparatuses, and methods are provided herein for securing merchandise. In one embodiment an apparatus for securing merchandise comprises a locking mechanism limiting access to one or more items, one or more optical sensors configured to detect a plurality of wavelengths and an intensity associated with each wavelength from at least one light beam emitted by an optical key, and a control device comprising a control circuit and a memory device. The control device being configured to store a lock code comprising a plurality of wavelength values and a plurality of intensity values each associated with a wavelength value on the memory device and determine whether to release the locking mechanism based on whether intensities of each of the plurality of wavelengths detected by the one or more optical sensors match the lock code.

SYSTEMS AND METHODS FOR DETERMINING AND EXECUTING TRUSTED CUSTOMER ACCESS

Systems, apparatuses, and methods are provided herein for determining and executing trusted customer access. In one embodiment, a system for determining and executing trusted customer access for smart locks at a retail shopping facility includes an access door, a smart lock securing the access door, a user interface device, and a control circuit coupled to the user interface device. The control circuit being configured to determine whether a user is a trusted user based on a determination that authentication data matches with stored authentication data within a threshold accuracy, a store-risk value associated with a retail shopping facility is within a risk threshold value, and a crime index value associated with an area that is within a threshold distance from the retail shopping facility is within the index threshold value, and provide an optical key to the user interface device.

Photonic authentication system for a receiver terminal and transmitter terminal

The present application discloses an authentication system, and a transmit terminal, a receive terminal, and a right authentication method of same. The receiver externally propagates, by using the information transmit module, an identification code information set corresponding to the receiver. After receiving the identification code information set, the transmitter firstly performs a first right authentication on rights of the transmitter. The transmitter allows itself to transmit a light signal of an identification code of the transmitter only after the authentication is passed, thereby reducing a security risk caused by uncontrolled transmission of the light signal of the identification code of the transmitter by the transmitter. After the transmitter transmits the light signal of the identification code of the transmitter, the receiver performs a second right authentication on the received light signal. In this way, security of the authentication system is further improved.

Electronic access control based on optical codes
20200258378 · 2020-08-13 ·

Methods and systems relating to administration of authentication information for electronic access control are disclosed. Authentication information is conveyed to an electronic locking device configured to restrict access to an entry point. In various embodiments, a smart device comprises a display screen for presenting a machine-readable optical code comprising encoded authentication information. An image sensor of the electronic locking device can decode the machine-readable optical code to obtain the authentication information. The electronic locking device is configured to permit access to the entry point in response to the image sensor detecting a machine-readable optical code corresponding to an access credential. A server device can provide authentication information to the smart device based on an access criterion. Conveying authentication information to the locking device may include rendering a webpage comprising the machine-readable optical code corresponding to the access credential.

Vehicle communication system using light modulation

A vehicle communication system includes an on-board vehicle communication module and a remote communication module. The on-board vehicle communication module includes a light source that is configured to be modulated in order to transmit data, an on-board controller that controls the light source and an on-board memory that is operably coupled to the on-board controller such that the on-board controller can obtain data from the on-board memory for transmission by the light source. The remote communication module includes a light receiver that is sensitive to the modulated light provided by the light source forming part of the on-board vehicle communication module. In some cases, the vehicle communication system enables bidirectional communication between the vehicle communication module and the remote communication module.

Smart lockbox
10685514 · 2020-06-16 ·

The lockbox contains a microcomputer used in the processes of validating preapproved credentials. One method of obtaining access to the lockbox is by user carrying only an identification card, the lockbox scanning the identification card and transmitting its data to the lockbox's server for validation via an internal cell phone modem's connection through cell towers. The lockbox is also capable of capturing video and audio recordings, storing and categorizing the recordings into data such as traffic or noise levels over varying periods of time; and such data can be transferred to a user's cell phone upon the owner's approval. Additionally, the lockbox is powered by a solar panel power source, making it self-sustaining.