G07C2009/0042

BATTERY EXCHANGE METHOD AND BATTERY EXCHANGE SYSTEM
20230015794 · 2023-01-19 ·

A battery exchange method has: receiving, from a first battery exchange station, a first alert indicating an issue regarding a battery inventory of the first battery exchange station; receiving, from a mobile device, a second alert indicating that the second battery exchange station does not release a second battery in response to an insertion of a first battery in one of a plurality of battery slots of the second battery exchange station; and providing an authorization to acquire the second battery from the second battery exchange station to the mobile device if the first and second alerts are associated with the same battery exchange station.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Self-service modular drop safes with messenger access capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

SYSTEMS AND METHODS FOR LOCATION ENABLED ELECTRONIC LOCK CONTROLS
20170337755 · 2017-11-23 ·

A computer-implemented method, the method being performed in a system comprising an electronic lock and a client device comprising a central processing unit, a localization signal receiver and a memory, the computer-implemented method comprising: receiving at least one localization signal using the localization signal receiver; measuring a strength of the received localization signal; using the central processing unit to extract a identifier from the received localization signal; determining a location of the client device based at least on the measured strength of the received localization signal and the extracted identifier; and causing the electronic lock to unlock based on the determined location.

METHOD OF SECURELY OPENING DOORS AND A SYSTEM THAT SECURELY OPENS DOORS
20170316627 · 2017-11-02 ·

A method securely opens a door connected to a system and includes a central unit, a mobile terminal, a local control unit and a door opening device that are configured to transmit data. The method includes transmitting a first key to the mobile terminal by the central unit; transmitting the first key to the control unit by the mobile terminal via the door opening device; generating a second key by the control unit depending on the first key; transmitting the second key from the control unit to the mobile terminal via the door opening device; generating a third key by the mobile terminal depending on the second key; transmitting the third key to the central unit by the mobile terminal via the door opening device; and controlling opening of the door depending on the third key by the central unit by transmitting a request to the door opening device.

METHOD FOR SECURE TRANSMISSION OF A VIRTUAL KEY AND METHOD FOR AUTHENTICATION OF A MOBILE TERMINAL

The invention relates to a method for transmission of a secure virtual key (VK) from a server (50, S) to a mobile terminal (20, T) capable of communicating with the server (50, S), comprising the steps of: a) reception by the server (50, S) of a certification request from the mobile terminal (20, T), b) provision and downloading on the mobile terminal (20, T), by the server (50, S), of a user application (25), and c) provision of the mobile terminal (20, T), by the server (50, S), with a virtual key (VK), and d) downloading and securing of the virtual key (VK) in a security element (27) of the mobile terminal (20, T), characterised in that said security element is formed by an encrypting software environment (27).

CAR CONTROL METHOD OF ELECTRONIC APPARATUS AND ELECTRONIC APPPARATUS THEREOF
20170249791 · 2017-08-31 ·

The present disclosure relates generally to a vehicle control method of an electronic device, and the electronic device. The electronic device may include a display, a first communication circuit, a second communication circuit, one or more sensors, a memory, and a processor electrically coupled to the display, the first communication circuit, the second communication circuit, the memory, and the one or more sensors. The memory may store at least one instruction, when executed by the processor causes the electronic device to: detect a Received Signal Strength Indicator (RSSI) value of a Radio Frequency (RF) signal received from a vehicle through the first communication circuit, convert the detected RSSI value based on deviation information stored in the memory, and transmit the RF signal including the converted RSSI value to the vehicle through the first communication circuit.

System and method for controlling access to vehicle
09767629 · 2017-09-19 · ·

A system for controlling access to a vehicle includes a first portable device and an access controller. The access controller stores an unshared password and an access control parameter (ACP). The first portable device stores the unshared password and generates an access mode signal and a shared password. In a first access mode, the access controller provides full access to the vehicle based on a first lock signal and the unshared password. In a second access mode, the access controller provides limited access to the vehicle based on a second lock signal and the shared password. In a third access mode, the access controller provides limited access to the vehicle for a predetermined time based on a third lock signal. The access controller generates a control output signal and an ignition control signal based on the ACP and the shared password to allow only limited access to the vehicle.

COMMUNICATION SYSTEM AND COMMUNICATION DEVICE

[Object] To provide a novel and improved communication system and communication device that make it possible to reduce an amount of time from when communication with an external device is completed to when communication data corresponding to a communication result is output to another device.

[Solution] Provided is a communication system including: a communication device configured to transmit a selection solution that is selected depending on a result of first communication with an external device; and a control device configured to receive the selection solution from the communication device through second communication between the communication device and a communication partner that is different from the external device serving as a communication partner in the first communication.

ACCESS CONTROL METHOD FOR PERSONS AND SYSTEM FOR CARRYING OUT THE METHOD
20220122390 · 2022-04-21 ·

An access control method for people in which the access control device (16) is assigned to an access point. Each access control device (16) has at least one antenna (1, 2, 8, 9, 10, 11), which emits beacons. Each access area (3) can only accommodate one person at a time. All antennas lie on an antenna plane. The transmitted beacons containing a unique access point ID, which positively identifies the access point and a unique antenna ID within predefined intervals. The received beacons are analyzed based on the RSSIs (Received Signal Strength Indicator) such that the distance of the mobile device (14) to the at least one antenna (1, 2, 8, 9, 10, 11) is determined. The received access point ID are transmitted to a server (15) or to the access control device (16) for analysis. Access is granted if the access authorization is valid for the access point ID.