Patent classifications
G07C2009/00412
Secure container for package delivery
A method includes transmitting, by a handler device associated with a package handler, a message to an access control system requesting access to a secure container secured by an electronic lock mechanism; determining, by the access control system, whether the package handler is authorized to access the secure container based on the received message; transmitting, by the access control system, an unlock command to the secure container in response to a determination that the package handler is authorized to access the secure container; and unlocking the electronic lock mechanism of the secure container in response to successful authentication of the unlock command.
System and method to authorize the use of a BEV charging apparatus by a short-term renter
The disclosure generally pertains to systems and methods for authorizing the use of a battery electric vehicle (BEV) charging apparatus by a short-term renter. In an example method, a processor provides an authorization for use of a BEV charging apparatus by a first individual. The BEV charging apparatus is located on the premises of a building. The processor further enables access to the BEV charging apparatus over a designated period of time for use by the first individual and configures a first lock to prevent unauthorized entry by the first individual into a first portion of the building. In one scenario, the first individual is a short-term renter, the BEV charging apparatus is located in a garage of the building, the first portion of the building is a first room of the building, and the first lock is installed in a door leading into the first room of the building.
Electronic locking systems, methods, and apparatus
Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.
INTELLIGENT LOCKS AND KEYS
The lock(100) comprises a controller, a data storage device, a lock mechanism operable by the controller in a locked state or an unlocked state, and a data communication frontend comprises a first data port(108) and a second data port; Wherein the controller is configured to enter into data communication via second data port after successful completion of data communication via the first data port(108). An electronic key(200) comprises a key controller, a data storage device, a power source and a data communication frontend comprising a first data port(202) and a second data port; wherein the electronic key(200) is a physical key having a key body and is configured to work with the lock(100).
MULTIFAMILY ELECTRONIC LOCK CREDENTIAL MANAGEMENT
An electronic lock access management system includes an electronic lock and a server system. In some embodiments, the server system includes a memory storing a database including a plurality of user accounts, each user account being associated with a set of privileges and one or more properties, each property being associated with one or more locks, each of the locks being associated with one or more access codes that are specific to each user. In some embodiments, the electronic lock stores, in the lock memory, an encrypted copy of an access code list received from the server system based on a set of access codes that are associated with the electronic lock in the database.
COMMUNICATION PROTOCOL FOR NON-INTERNET-ENABLED DEVICES
A method of updating a first device (e.g., one or more locking devices) to reflect information located on a second device (e.g., a server) is provided, where the first device and the second device cannot communicate directly with one another. The method may include employing a third untrusted device (e.g., a mobile device) temporarily as an intermediary between the first device and second device. The method may include receiving, at the first device and from a third device, a request for the first device to communicate with the third device. In response to determining that the third device is authorized to communicate with the first device, the first device may receive information from the third device that was provided by the second device. The first device may transmit at least one message to the third device that is to be provided to second device.
Methods and systems for offline verification code generation based on smart door lock system
A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
Systems and methods for delayed-message attack mitigation
A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.
SECURITY MECHANISM FOR WIRELESS AUTHENTICATION DEVICES
Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.
Sharing system access using a mobile device
Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.