Patent classifications
G07C9/02
System for regulating access to a resource
A system for regulating access to a resource by a plurality of users is provided. The system comprises: a plurality of portable access keys, each being provided to one of the users and having an associated variable access parameter; an access barrier, having an open state allowing passage through and a closed state denying access to the resource, and defining an access queue; a sensor that determines an access queue characteristic related to a number of users in the access queue; a controller, which sets an access criterion based on the determined access queue characteristic; and a detector, located at the access barrier and which determines the variable access parameter of a portable access key when it is brought into the vicinity of the detector. The controller sets the access barrier in its open state if the variable access parameter determined by the detector meets the access criterion.
Heterogeneous clustered anti-pass back host processing system and method
A heterogeneous clustered anti-pass back host processing system and method can include a single heterogeneous host system receiving a triggering signal from a first access controller in a plurality of access controllers, the single heterogeneous host system identifying all areas referenced by the first access controller, a respective type of anti-pass back feature associated with each of the areas referenced by the first access controller, and a least restrictive type of the respective type of anti-pass back feature associated with each of the areas referenced by the first access controller, and the single heterogeneous host system transmitting an anti-pass back status update message to each of the plurality of access controllers in accordance with rules of the least restrictive type of the respective type of anti-pass back feature associated with each of the areas referenced by the first access controller.
Target Odor Detection and Security Method
A target odor detecting method for screening odor emitters in a relatively confined space using an animate and/or inanimate odor detector to detect one or more target odors.
SYSTEM AND METHOD FOR AUTHENTICATION USING PAYMENT PROTOCOL
Methods, systems, and devices are disclosed for using a payment processing network as an authorization engine to access secure physical areas, such as college dormitories, office buildings. A keycard with a cryptogram generator is presented by a user to an access device, and the access device or associated computer sends an access request message formatted like a payment authentication request message to an aggregator/acquirer and payment processing network. The payment processing network validates the cryptogram and returns an access response message, again formatted like a payment authorization response message, indicating that the keycard is authentic. The gate, door, turnstile, or other barrier is then temporarily unlocked to let the user through.
Turnstile allowing emergency exit
A turnstile comprising means for dictating a person entering or exiting the lane, a barrier positioned to move between a position blocking a lane and a position where it allows passage through the lane, under control of a motor; means for checking the credentials of a person attempting to pass through the lane and a brake, the turnstile having a mode of operation in which in the event that a user enters an exit side of the lane without presenting a credential, and an authorized person is not detected on the entry side of the lane, the brake is unlocked and the barrier is held in position in a closed mode but is able to be pushed or pulled by the person who has entered from the exit side in order for that person to exit; and the motor assists movement in the pushing or pulling direction by moving the barrier at a controlled speed, less than a speed at which it operates the barrier if the exiting user presents a credential.
Method and system for access control
A method for access control wherein verification of access authorization is effected by evaluating an ID sent at regular intervals from a mobile electronic device or a data carrier nearest an access control device (3, 4, 5, 6), via bluetooth low energy standard as part of a broadcasting, to which at least one access authorization is unequivocally assigned, which is received by BLE transceiver units (TRX-1, TRX-2, TRX-3, TRX-4) connected to a computer comprising a CPU and storage located within range of the mobile electronic device or the data carrier. Localization of the mobile electronic devices or the data carriers is carried out by evaluation of the RSSI, wherein the signal strength is measured, with which that signal of a mobile electronic device or a data carrier is received, which contains the ID of BLE transceiver units (TRX-1, TRX-2, TRX-3, TRX-4).
TURNSTILE ALLOWING EMERGENCY EXIT
A turnstile comprising means for dictating a person entering or exiting the lane, a barrier positioned to move between a position blocking a lane and a position where it allows passage through the lane, under control of a motor; means for checking the credentials of a person attempting to pass through the lane and a brake, the turnstile having a mode of operation in which in the event that a user enters an exit side of the lane without presenting a credential, and an authorised person is not detected on the entry side of the lane, the brake is unlocked and the barrier is held in position in a closed mode but is able to be pushed or pulled by the person who has entered from the exit side in order for that person to exit; and the motor assists movement in the pushing or pulling direction by moving the barrier at a controlled speed, less than a speed at which it operates the barrier if the exiting user presents a credential.
SYSTEM FOR CONTROLLING USER ACCESS TO A SERVICE
A system for controlling user access to a service includes a read device that reads a payment card of a user, and a first control block coupled an entry gate determines whether online payment authorization should be requested for the payment card. A first memory stores a hot list indicating payment cards for which the first control block denies user access to the service. If the online payment authorization is denied for the payment card, the first control block adds the payment card to the hot list. A further read device is configured to read the payment card, and a second control block coupled to the further read device controls a second gate after determining whether the payment card is on the hot list stored in a second memory coupled to the second control block, the hot list being updated with modifications via a network.
Failsafe operation for unmanned gatelines
Systems and techniques are presented for enabling fail-safe operation of an automatic pedestrian access control gate during a health and safety event. Gateline sensor data is received from at least one gateline sensor. The gateline sensor data indicates that an event concerning health and safety has occurred. An alert is generated in response to receiving the gateline sensor data. The alert is transmitted to a remote monitoring device that is remote from the access control gate. A determination is made that a preset amount of time has elapsed since transmitting the alert. A further determination is made that an acknowledgement of the alert has not been received. Based on determining that the preset amount of time has elapsed and determining that the acknowledgement has not been received, a predefined action is triggered.
Collection of information using contactless devices in combination with mobile computing devices
An approach for collecting information in a facility including a plurality of users, wherein each of the plurality of users includes at least one contact-less device for accessing the facility, wherein the contact-less device stores an identifier, and at least one of the plurality of users includes a wireless computing device, is provided. The approach broadcasts an interrogation signal by a selected wireless computing device from at least one of the plurality of users. The approach receives a response signal to the interrogation signal by the selected wireless computing device from each of one or more proximal contact-less devices of one or more contact-less devices within the operating range of the selected wireless computing device. The approach generates a collection message from the selected wireless computing device. The approach transmits the collection message from the selected wireless computing device to a central computing system.