Patent classifications
G07C9/26
VEHICLE CONTROL METHOD, COMMUNICATIONS APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM
This disclosure provide a vehicle control method. A first terminal device obtains first biometric information of a first user, generates a first key based on the first biometric information and identifier information of the first terminal device, and generates first verification information based on the first key. Further, the first terminal device sends the first verification information to an in-vehicle device. When successfully verifying the first verification information, the in-vehicle device controls a vehicle to start. If the first user loses the first terminal device, an unauthorized user that obtains the first terminal device cannot control the vehicle based on only the identifier information of the first terminal device. Because different users have different biometric information, a key generated by the first terminal device is different from the first key, and the in-vehicle device cannot control the vehicle to start. This improves vehicle security.
SYSTEMS AND METHODS FOR ACTIVATING A DIGITAL KEY BASED ON A VITAL SIGN
Systems and methods for activating a digital key based on a vital sign include the digital key configured to lock and unlock a digital lock when activated. The system may include an electronic device including a sensor configured to detect a vital sign of a user in real time. The electronic device may include a memory configured to store a reference vital sign of the user. The electronic device may include a wireless transceiver configured to communicate with the digital key. The electronic device may include a processor coupled to the sensor, the memory, and the wireless transceiver. The processor may be configured to receive and compare the vital sign to the reference vital sign and prompt the wireless transceiver to send a signal to the digital key to activate the digital key when the vital sign is within a threshold of similarity to the reference vital sign.
SYSTEMS AND METHODS FOR ACTIVATING A DIGITAL KEY BASED ON A VITAL SIGN
Systems and methods for activating a digital key based on a vital sign include the digital key configured to lock and unlock a digital lock when activated. The system may include an electronic device including a sensor configured to detect a vital sign of a user in real time. The electronic device may include a memory configured to store a reference vital sign of the user. The electronic device may include a wireless transceiver configured to communicate with the digital key. The electronic device may include a processor coupled to the sensor, the memory, and the wireless transceiver. The processor may be configured to receive and compare the vital sign to the reference vital sign and prompt the wireless transceiver to send a signal to the digital key to activate the digital key when the vital sign is within a threshold of similarity to the reference vital sign.
MANAGING SERVER, MANAGING METHOD AND COMPUTER PROGRAM FOR OPERATING BIOMETRIC INFORMATION-BASED ACCESS MANAGEMENT SYSTEM
The present invention relates to an access management system determining whether to approve the user's authentication request for the management space and the method for operating the access management system based on biometric data measured by a wearable device directly worn on the user's body, in order to solve the problem that the QR code check causes inconvenience and the body temperature test has low accuracy. Since approval of the authentication request may be determined based on the user's authentication data retrieved from the public database and biometric data directly measured from the user's body by a wearable device such as a smart mask, biometric data such as body temperature can be measured more accurately, and the hassle of users directly tagging their QR code with the QR code scanner can be reduced, and the accuracy and efficiency of access management can be improved.
Wireless devices for storing a financial account card and methods for storing card data in a wireless device
A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.
Method for Unlocking a Lock Using Real-Time Wireless Power Supply
A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.
ACCESS CONTROL DEVICE, KEY DEVICE AND KEY HOLDER
According to an embodiment, an access control device includes a first communication interface, a second communication interface and a processor. The processor acquires, from the key device, an identifier functioning as the key identification information and a biometrics authentication result; transmits a confirmation request signal to the confirmation device, when the key identification information of the key device agrees with key identification information of a valid key and when the biometrics authentication result is an authentication failure; and permits access to the security device, upon receiving a confirmation response signal indicative of the access permission from the confirmation device in response to the confirmation request signal.
Requesting access to a physical space controlled by an electronic lock associated with a tag
According to a first aspect, it is presented a method for requesting access to a physical space controlled by an electronic lock. The method is performed in a user device and comprises the steps of: reading a tag using a near field radio protocol, yielding a tag identifier, the tag being distinct from the electronic lock; finding, based on the tag identifier, a lock identifier associated with the tag identifier, wherein the tag identifier is distinct from the lock identifier; and sending an access request message to the electronic lock having the lock identifier.
Requesting access to a physical space controlled by an electronic lock associated with a tag
According to a first aspect, it is presented a method for requesting access to a physical space controlled by an electronic lock. The method is performed in a user device and comprises the steps of: reading a tag using a near field radio protocol, yielding a tag identifier, the tag being distinct from the electronic lock; finding, based on the tag identifier, a lock identifier associated with the tag identifier, wherein the tag identifier is distinct from the lock identifier; and sending an access request message to the electronic lock having the lock identifier.
TRANSMITTER FOR TRANSMITTING A SECURE ACCESS SIGNAL
A transmitter for transmitting a secure access signal to a system for providing secure access to a controlled item is disclosed. The access is dependent on information contained in the secure access signal. The transmitter comprises a biometric sensor for receiving a biometric signal and a processor for matching the biometric signal against members of a database of biometric signatures. The transmitter comprises enabling means for enabling an inductive circuit, based on the matching of the biometric signal, to transmit the secure access signal conveying the information to the system upon the inductive circuit being placed within range of a radio frequency field emitted by the system.