G07C2009/00373

Actuation handle with access control system

An actuation handle (4) for attaching to an outside of a door (2) has an access control system designed to control a motorized lock, that contains an evaluation unit and a reader (8) for reading and identifying a transponder located in a first detection range (12) defined by the reader (8). The reader (8) is integrated in the actuation handle (4). There is also a sensor (10) for detecting an object located in a second detection range (14) defined by the sensor (10), which is coupled to the evaluation unit and integrated in the actuation handle (4). The sensor (10) is located on a first section (16) of the actuation handle (4), and the second detection range (14) extends outward from the first section (16). The evaluation unit is configured to activate the sensor (10) to detect an object in the second detection range (14) after identifying a transponder.

Systems and methods for controlling access to a secured space

Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device having a body having a rotatable locking cam having a locked paddle and an unlocked paddle. The cam is rotatable between a first position and a second position. The body also has a locking pin and a power supply for supplying electrical power to circuit components of the locking device. The locking device also includes a shackle having two arms. One of the two arms has a groove in a bottom portion thereof configured to engage with the locking pin when the shackle is in a closed position. In the first position, the locked paddle of the rotatable locking cam engages the locking pin in the groove. In the second position, the locked paddle of the rotatable locking cam is disengaged from the locking pin.

INTEROPERABILITY OF RF ANTENNA AND CAPACITIVE TOUCH KEYPAD
20230214056 · 2023-07-06 ·

A method according to one embodiment includes placing a microcontroller of an access control device in a sleep state, monitoring a radio frequency (RF) field using a near field communication (NFC) controller and an NFC antenna of the access control device, waking the microcontroller from the sleep state in response to detecting that an RF field value of the RF field has surpassed a predefined threshold, masking capacitive touch events received by the microcontroller from a capacitive touch controller in response to waking the microcontroller from the sleep state, processing RF-intensive communication between the access control device and a mobile device in response to masking the capacitive touch events, and unmasking capacitive touch events received by the microcontroller from the capacitive touch controller in response to processing the RF-intensive communication.

System and Method for Controlling Vehicle
20220410840 · 2022-12-29 ·

An embodiment system includes a vehicle configured to generate a message for informing a tagging status of a portable terminal, in response to the portable terminal entering the tagging status to a door handle, and to control the door handle to be developed over time after the tagging status of the portable terminal is changed to an untagging status, in response to the tagging status of the portable terminal being changed to the untagging status, and a server configured to receive the message for informing the tagging status from the vehicle and transmit the message for informing the tagging status to the portable terminal.

Method for Unlocking a Lock Using Real-Time Wireless Power Supply
20220398882 · 2022-12-15 ·

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

VEHICLE
20220396240 · 2022-12-15 ·

In a case where a non-history position start for starting an engine based on a remote operation at a position at which a position of a vehicle is different from a start history position having a start history of the engine is executed, a limitation condition for limiting an engine start is tightened as compared to a case where a history position start for starting the engine based on the remote operation at the start history position is executed. That is, in a case where the non-history position start is executed, it is difficult to start the engine. As a result, it is possible to take more appropriate measures when the engine is started based on the remote operation.

Phone as a key predictive vehicle access

A computer-implemented method includes predicting, via a predictive analytical model, a time interval associated with a future key-on event for a vehicle. The predictive analytical model is based at least in part on key-on event data. The method includes generating, based at least in part on the predicted time interval, a power mode instruction configured to cause a vehicle Telematics Control Unit (TCU) or Phone as a Key (PaaK) system to change a TCU state from a low energy state to a higher energy state, and transmitting, based on the predicted time interval, the power mode instruction to the vehicle TCU.

WIRELESS LOCKSET WITH INTEGRATED ANGLE OF ARRIVAL (AOA) DETECTION
20230034014 · 2023-02-02 · ·

A lockset with a latch assembly having a bolt movable between an extended position and a retracted position. The lockset includes a motor configured to move the bolt between the extended position and the retracted position. A controller is provided that is configured to electronically control the motor to control movement of the bolt between the extended position and the retracted position responsive to receiving a valid authentication from an authentication device. The lockset includes a receiver connected to an antenna to detect an incoming wireless signal transmitted from an authentication device. The controller includes an angle of arrival sensor configured to determine a distance and a direction to the authentication device by analyzing a wireless phase and timing of the incoming wireless signal transmitted by the authentication device. The controller is configured to control movement of the bolt between the extended and retracted positions based, at least in part, on the distance and the direction to the authentication device.

Device and method for access control
11475725 · 2022-10-18 · ·

Device, method, and computer program product for access control, the device comprising an ultra-wideband transceiver (12) connected to a first electronic circuit (11); wherein the first electronic circuit (11) is configured to activate (S1) periodically the ultra-wideband transceiver (12) to receive ultra-wideband transmissions (T) from a mobile device (2), upon reception (S2) of an ultra-wideband transmission (T) from a mobile device (2), to activate the ultra-wideband transceiver (12) to transmit (S3) to the mobile device (2) a reguest message and to receive (S5) from the mobile device (2) a response message, to determine (S6) a distance (d) of the mobile device (2) from the access control terminal (1), using the response message, and to execute access control, if the mobile device (2) is within a pre-determined proximity range (P).

Methods, devices and electronic keys for access-restricted environments

A method includes determining, by a first radio transceiver of an access-restricted environment, of first direction information of a first radio signal transmitted between the first radio transceiver and a wireless device. The method further includes determining, by a second radio transceiver of the access-restricted environment, of second direction information of a second radio signal transmitted between the second radio transceiver and the wireless device. The method further includes receiving, by the access-restricted environment, of angle information determined by an electronic key associated with the access-restricted environment. The method further includes determining, based on the first direction information, the second direction information and the angle information, whether the wireless device is a relay device or the electronic key. The method can be based, for example, on a Bluetooth technology.