G07C9/257

BIOMETRIC PRE-IDENTIFICATION
20230097112 · 2023-03-30 ·

A station device in a biometric pre-identification system uses identity to perform one or more actions. Identities are determined (such as via a backend) using biometric information. A biometric pre-identification device obtains biometric information and/or a digital representation thereof from a person approaching the station device. The biometric pre-identification device transmits such to the station device, facilitating the station to begin and/or perform various actions. The station device begins or performs the actions using the identity determined based on the biometric information before the person arrives at the station device.

CUSTOMER MANAGEMENT APPARATUS, CUSTOMER MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
20230094972 · 2023-03-30 · ·

A customer management apparatus (10) includes an acquisition unit (110) and a determination unit (120). The acquisition unit (110) acquires, from a registration terminal (20), first face information and card identification information. When the first face information satisfies a first criterion regarding whether authentication is possible, the determination unit (120) causes a storage unit (130) to store the first face information and the card identification information in association with each other (first registration processing), and performs processing for allowing a customer to enter a store. The processing may be, for example, issuing, to a store entry apparatus (40), a command to open an automatic door, or may be issuing, to the store entry apparatus (40), a command (so-called lock releasing) to cause an automatic door to open when the customer stands in front of the automatic door.

Camera and Systems for Integrated, Secure, and Verifiable Home Services

Systems and methods for providing integrated, secure, and verifiable home services, such as delivery of physical items within a home and execution of services within a home, are disclosed. In certain embodiments, the system includes cameras, sensors and locks wirelessly connected and configured to provide information to a server associated with the delivery of items and services. In one embodiment, the disclosed methods track and deliver a package in a secure and verifiable manner through use of a time-limited electronic key. Other embodiments include apparatuses having wirelessly connected cameras that allow monitoring of the status of the delivery of an item or of services.

MATCHING AN USER TAKEN IMAGE WITH ACCESS CONTROL APPARATUS REFERENCES FOR PHYSICAL ACCESS CONTROL
20230030707 · 2023-02-02 ·

It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.

Safe Delivery Tower
20230100623 · 2023-03-30 ·

A safe delivery container, system and method which permits tracking of the state of the container and controlled release of its contents. Determination of the state of the container is preferably provided according to a plurality of sensors, including without limitation a temperature sensor, GPS tracking device, accelerometer, gyroscope, and an IMU. Tracking of the state of the container is preferably supported through a communication module which may for example comprise a SIM card. Such a communication module preferably enables the sensor signals to be transmitted to a remote location. Alternatively and/or additionally, communication of such sensor signals may occur when the container is brought into communication contact with each of a plurality of local communication devices. Upon receipt of such state information for the container, optionally and preferably the state information is written to a distributed ledger technology (DLT) such as for example the blockchain.

Decentralized virtual trustless database for access control

Described are systems and techniques for leveraging a virtual distributed trustless database using access-enabling codes. The computations use private codes. Each computation includes the information from all previous computations so that a chain of computations is maintained and controlled. A central system insures that dual computations do not occur.

User authentication system

Described are systems and techniques configured to authenticate a user upon entry to a facility. Prior to entry, the user may log in to a secure website with valid credentials, whereupon a login image of the user at the time of login is acquired. In one implementation, optically encoded data is generated which includes data representative of the login image, an acquisition timestamp, and an identifier value. At entry of the user to the facility, an entry image of the user's face, an image of the optically encoded data as presented on a display of a computing device in possession of the user, and an entry timestamp are acquired. By determining the timestamp is within a valid range of time and the data representative of the login image corresponds to the entry image, the user is authenticated to the identifier value.

RECEPTION TERMINAL

A reception terminal, included in a management system for managing entry and/or exit of a user in a security zone that includes a server room of a data center, the reception terminal that issues reception information upon accepting personal information of the user prior to the entry into the security zone, includes: a personal authentication part that is used for a personal authentication of the user visiting the data center; and an issuing part that issues, in a case where biometric information is pre-registered in addition to a performance of a personal identification, authorization information representing an authorization of the entry of the user into a particular server room in response to existence of personal information associated with the reception information input by the user, and a satisfaction of a visit condition of visit information associated with the input reception information.

SECURITY CONTROL AND ACCESS SYSTEM

The present disclosure provides methods, devices, and systems for controlling access to a controlled area. The method may comprise receiving a credential identifier in an access controller associated with an entrance to the enclosed area, and then authenticating the credential identifier. The method may then comprise sending an unlock signal through a solid state relay within the access controller to power a lock associated with but external to the access controller to unlock a door at the entrance to the enclosed area when the credential identifier has been successfully authenticated.

GATE APPARATUS, GATE SYSTEM, AND GATE CONTROL METHOD

A gate apparatus includes a gate unit which is disposed on a second plane crossing a first plane in which an authentication object moves in one direction and which partitions a moving space of the authentication object from another space, an inclined face which is formed on the gate unit to cross the first plane and the second plane and which is inclined upwardly from the first plane, a display configured to display an image on the inclined face, and an image acquisition unit configured to capture an image of the authentication object in proximity to the display.