Patent classifications
G07C2009/00793
Sharing system access using a mobile device
Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.
Vehicular security system with biometric authorization feature
A vehicular security system includes a remote device with a first biometric sensor. An electronic control unit (ECU) of a vehicle processes data captured by the first biometric sensor to determine whether an identity of the user of the remote device matches an authorized user of the vehicle. The ECU, responsive to determining that the user is authorized to use the vehicle, unlocks a door of the vehicle to allow the identified authorized user to access the vehicle. The system includes a second biometric sensor disposed in the vehicle and, with the identified authorized user in the vehicle, the ECU, via processing data captured by the second biometric sensor, determines whether the identity of the identified authorized user of vehicle matches an authorized operator of the vehicle. The ECU, responsive to determining that the user is an authorized operator of the vehicle, allows operation of the vehicle.
Automated door system
An automated door system includes a first door control module configured to be mounted in a fixed position relative to a powered door and a second door control module configured to be carried by a user and configured to be in electronic communication with the first door control module to control at least one of an opening actuation and a closing actuation of the powered door. A method of controlling the powered door may include wirelessly electronically connecting a second door control module to a first door control module, determining a proximity of the second door control module to the first door control module, an automating the opening and closing of the powered door in response to a position of the second door control module relative to the first door control module.
METHOD AND SYSTEM FOR RELAY ATTACK PREVENTION INCORPORATING CHANNEL COHERENCE
A method/system of detecting if a relay is present in a vehicle PEPS system, including transmitting from antenna(s) of a vehicle, a first/second LF signals and determining a minimum time-gap between the signal transmissions so that the time-gap exceeds the channel-coherence-time of a high-frequency wireless-relay. A maximum time between the signals is determined by a timing requirement of the PEPS system and the maximum allowable change in a key-fob position. A time gap between the minimum/maximum times is determined. Depending on the time-gap, the system timing requirement is increased to provide a predetermined-time. At the predetermined-time, separately transmitting between the first/second LF signals, which have a known signal ratio, from a vehicle antenna to a key-fob as part of an LF challenge; measuring, at the key-fob, the signal-levels of the first/second LF signals; and determining if the ratio of the first/second LF signals are within a predefined range.
COMMUNICATION DEVICE AND STORAGE MEDIUM
The present invention provides a technology capable of performing control such that ranging is performed more reliably in a mobile object and a portable device which is a regular communication partner.
Provided is a communication device mounted on a mobile object including an acquisition unit configured to acquire a ranging trigger signal for starting measurement of a distance between the communication device and a portable device carried by a person and a communication control unit configured not to start ranging communication for measurement of the distance based on a fact that first specific information defined in advance and necessary for determination of the mobile object does not match second specific information included in the acquired ranging trigger signal and necessary for determination of the mobile object.
USING COMBINATION OF GPS AND BLE BEACONING TO LOCATE A LOCK BOX
A method of locating a lock box including: obtaining a saved location of the lock box using an application operated via a first cellular telephone, the saved location of the lock box being accurate within a first selected radius; displaying the saved location of the lock box on the first cellular telephone via the application; detecting a Bluetooth advertisement of the lock box using the first cellular telephone; determining a received signal strength indicator (RSSI) of the Bluetooth advertisement; determining a distance between the first cellular telephone and the lock box in response to the RSSI of the Bluetooth advertisement; and displaying a distance indicator depicting the distance between the first cellular telephone and the lock box on the first cellular telephone via the application.
RETAIL SECURITY SYSTEM
A retail security system that includes a locking system having locking assemblies that can be locked and unlocked directly by a consumer or clerk/employee using his or her mobile phone or other portable electronic device. Each of the locking assemblies may be configured to lock an article so that it cannot be freely accessed. The security system may include a sanitizing system that sanitizes the article after a consumer returns the article to the locking system without making a purchase. The security system may include a computer apparatus that allows an owner of the security system to access a software application that provides the owner with information/data about access to the locked articles.
SECURE GUEST ENROLLMENT AT ELECTRONIC LOCK
Secure enrollment of a user with an electronic lock is provided. Enrollment with the lock may include a verification process and a secure enrollment mode based on verification of a unique enrollment code (UEC) associated with an enrollment invitation link that may be provided to the user. Selection of the link may direct the user’s mobile device to a client application, where an option may be provided for initiating the verification process. The UEC may be communicated to and presented by the lock. The user’s device may capture the presented UEC, which may be compared against the UEC generated in association with the link. When validated, the lock may enter the secure enrollment mode, where the user can register an actuation passcode, or the lock may be paired with the mobile device over a short-range wireless connection, which may allow the user to actuate the lock via the client application.
LOCKING SYSTEM FOR PORTAL
A system according to an embodiment includes electronic lock and key of which the electronic lock can be installed on a portal such as a door. The electronic lock is capable of contact-less authentication of the electronic key carried in person by a user, and also determines the open/close condition of the door panel with respect to the door frame. Being an add-on, there is no need to replace or modify the existing mechanical lock at the door. The electronic key does not require any batteries to operate, being powered by the electronic lock through wireless transfer of power through the door panel. After a successful authentication of the electronic key, the electronic lock clears the user to open the door. An attempted illegal entry by force or using duplicate key of the mechanical lock without electronic authentication is considered intrusion. Once an intrusion is detected, the system generates an alarm at the premises as well informs multiple mobile devices (e.g., cell phone) anywhere in the world through a wireless network. The electronic lock can be powered by a battery or AC source depending on the installation scenario.
Smart alarm module for automobile security system
A smart alarm module includes a connector terminal adapted to provide not more than five conductive paths from a fused box and an audio device of the vehicle to the smart alarm module, a CAN bus interface adapted to make connection to the CAN bus of the vehicle to detect communication protocol, a microcontroller adapted to arm the smart alarm module in response to the information received from the remote controller to provide the smart alarm module judgment operation based on the received information, a sensor adapted to quantized shock waves applied to the vehicle and to feed a first activating signal to the microprocessor when the quantized values exceeds a predetermined value, a power supply regulator providing power to the CAN bus interface, microprocessor, and sensor of the smart alarm module, and an output interface adapted to sound the audio device in response to output signal from the microprocessor.