G07C2009/00436

Authentication information control system, authentication information control method, and non-transitory computer-readable recording medium

A control unit issues temporary authentication information for disabling a locking/unlocking process to a user terminal satisfying a first condition. The control unit determines whether first authentication information has been issued to another user terminal, issues second authentication information to the user terminal to which the temporary authentication information has been issued when the first authentication information has not been issued to another user terminal, and issues the second authentication information to the user terminal to which the temporary authentication information has been issued with detection of ending of use of the first authentication information in another user terminal as a trigger when the first authentication information has been issued to the other user terminal.

Package delivery system and method of use
11495068 · 2022-11-08 ·

A package delivery system for secured delivery of packages without the need for a person to be present to accept them in person is disclosed. The package delivery system includes a vertical structure such as a wall, a door, and a garage door; a package delivery door dispositioned within the vertical structure; and one or more user devices in communication with the package delivery door via a network.

SYSTEMS AND METHODS FOR DYNAMIC CONTACTLESS SMART LOCKERS

A system described herein may provide for the dynamic and secure assignment of lockers that may be used when delivering goods in response to a fulfillment request. In some embodiments, smart tags may be used for packages provided in response to a fulfillment request. A smart locker system of some embodiments may include a set of lockers and one or more scanners that identify goods that have been delivered into a particular locker, such as by scanning smart tags placed on or in packages. The smart locker system may further receive a request from a User Equipment (“UE”), via a contactless tap, to provide the delivered goods, authenticate the UE, locate the particular locker in which the delivered goods are located, and unlock the locker.

Systems and methods for locking device management including time delay policies using random time delays

A locking device employs improved lock management techniques based on time delay polices that use a random period of time. The locking device receives a first credential of a custodian, validates the first credential and determines a random period of time based upon a time-delay policy when the first credential is validated. The locking device executes a lock release protocol upon expiration of the random period of time.

Rolling Code Based Point of Access System For Event Tickets Stored In Mobile Access Devices

A system for providing ticket based authorized entry of a mobile access device includes a memory, a transceiver and a control module. The memory stores an access code of a ticket of an event to be accessed by the mobile access device. The mobile access device also stores the access code. The control module: determines an amount of time since the ticket was purchased or an amount of time since the access code of the ticket was last updated; and updates the access code stored in the memory and signals the mobile access device via the transceiver to update the access code stored at the mobile access device in response to the amount of time since the ticket was purchased exceeding a first predetermined amount of time or the amount of time since the access code of the ticket was last updated exceeding a second predetermined amount of time.

Smart locks unlocking methods, mobile terminals, servers, and computer-readable storage media

In an embodiment, a server receives—a digital key request for a digital key to unlock a smart lock. A biometric feature request for collecting a biometric feature from the mobile device is generated and sent to the mobile device. A biometric feature corresponding to the biometric feature request is received. Identity information and a device identifier of the smart lock is received from another server. Based on the identity information, a matching biometric feature stored in a biometric feature database is determined. An identity of a user corresponding to the received biometric feature is verified based on the matching biometric feature. After the identity of the user is verified, smart lock information is identified. A digital key for unlocking the smart lock is generated based on the digital key request and the smart lock information and sent to the mobile device.

Electronic lockbox with schedule controlled access credentials
11348391 · 2022-05-31 · ·

An electronic lockbox control system allows visiting agents (such a “showing agents” in a real estate sales situation) to make an appointment to visit a property that is protected by an electronic lockbox, using a time-sensitive authorizing credential that is provided by a central computer; and then, if that visiting agent is delayed because of an earlier appointment, the central computer can automatically create a new time-sensitive authorizing credential that is time-shifted, so that visiting agent can later visit that remote property and obtain access to that lockbox at the later, time-shifted appointment time. Another interested party (e.g., a homeowner) can decline that later, time-shifted appointment. The visiting agent can carry a smart phone with a GPS receiver, and the central computer can use his GPS coordinates to calculate his physical position, and calculate his travel time to the next lockbox location to automatically create the new, time-shifted appointment time.

USING IDENTITY CREDENTIALS AS A KEY FOR SECURELY CONTROLLING A LOCK CONNECTED TO A WIRELESS NETWORK
20230298417 · 2023-09-21 · ·

Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.

SMART LOCKS UNLOCKING METHODS, MOBILE TERMINALS, SERVERS, AND COMPUTER-READABLE STORAGE MEDIA

In an embodiment, a server receives—a digital key request for a digital key to unlock a smart lock. A biometric feature request for collecting a biometric feature from the mobile device is generated and sent to the mobile device. A biometric feature corresponding to the biometric feature request is received. Identity information and a device identifier of the smart lock is received from another server. Based on the identity information, a matching biometric feature stored in a biometric feature database is determined. An identity of a user corresponding to the received biometric feature is verified based on the matching biometric feature. After the identity of the user is verified, smart lock information is identified. A digital key for unlocking the smart lock is generated based on the digital key request and the smart lock information and sent to the mobile device.

Electronic access control system
11170592 · 2021-11-09 · ·

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.