Patent classifications
G07C2009/00444
ENABLING MACHINE OPERATION
A plurality of operator controls can, in an operation mode, operate a machine, and, in a validation mode, be disabled to operate the machine and selectable to provide inputs for a candidate key. A computing device can initialize the validation mode, including initializing the candidate key and, according to a number base, and a maximum storage length, of a stored key, an input multiplier; receive a plurality of inputs to the operator controls in the validation mode; determine respective numeric values of the inputs; add the candidate key to a product of the multiplier and the numeric value of a first input to update the candidate key; for each of one or more second inputs to the operator controls after the first input to the operator controls, determine whether the candidate key matches a stored key; and upon determining that the candidate key matches the stored key, output an authorization.
Enabling operator controls for machine operation
A plurality of operator controls can, in an operation mode, operate a machine, and, in a validation mode, be disabled to operate the machine and selectable to provide inputs for a candidate key. A computing device can initialize the validation mode, including initializing the candidate key and, according to a number base, and a maximum storage length, of a stored key, an input multiplier; receive a plurality of inputs to the operator controls in the validation mode; determine respective numeric values of the inputs; add the candidate key to a product of the multiplier and the numeric value of a first input to update the candidate key; for each of one or more second inputs to the operator controls after the first input to the operator controls, determine whether the candidate key matches a stored key; and upon determining that the candidate key matches the stored key, output an authorization.
USING IDENTITY CREDENTIALS AS A KEY FOR SECURELY CONTROLLING A LOCK CONNECTED TO A WIRELESS NETWORK
Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.
KEY SAFE AND KEY ACCESS SYSTEMS
A method and apparatus for use in aiding provision of services requiring access through a physical key including the steps of providing a plurality of compartments with a digital lock for receiving the physical key and including the step of transmitting to a user providing the service with one or more of a digital keycode, time access key, and identity tag. The digital lock is activatable to open the identified compartment by receipt through a sensor of digital keycode and time access key and comparison of the time access key with the clock.
Control switch connection apparatus
The present invention relates to a method that allows a CSCA to enable an iFOB key system once it is turned on by pressing a function button. When the function button is released, the iFOB key system is turned off. The iFOB key system includes the ERFTS, so when the iFOB key system is turned on/off, the ERFTS is also turned on/off. The embodiment of the CSCA has a double-action switch, a triple-action switch, a timer, a timer circuit and all of the circuitries that are associated with an iFOB key. The CSCA controls the length of time that current is allowed to flow from a battery source to an iFOB key system; it is this type of control that prevents an ERFTS and a customer's property from being compromised. The iFOB key system is always in the off position until it is turned on.
Method and system for access control proximity location
A system for a frictionless access control automatically identifies users and enables access to restricted areas of a building for example via access points such as locked doors. The system allows access when authorized users are in the vicinity of doors without requiring the users to swipe access keycards (or badges) at keycard terminals located at the doors, as in current systems. The system includes user devices such as key fobs and mobile phones that wirelessly broadcast user information and unique IDs for each of the devices in data packets, which are received by positioning units. The positioning units determine locations of the user devices, and send the packet data and the location data to a verification and tracking system. Preferably, the positioning units include two or more antennas that determine close proximity of users to access points while also allowing the system to continuously monitor the locations of the users.
Method and system for access control proximity location
A system for a frictionless access control automatically identifies users and enables access to restricted areas of a building for example via access points such as locked doors. The system allows access when authorized users are in the vicinity of doors without requiring the users to swipe access keycards (or badges) at keycard terminals located at the doors, as in current systems. The system includes user devices such as key fobs and mobile phones that wirelessly broadcast user information and unique IDs for each of the devices in data packets, which are received by positioning units. The positioning units determine locations of the user devices, and send the packet data and the location data to a verification and tracking system. Preferably, the positioning units include two or more antennas that determine close proximity of users to access points while also allowing the system to continuously monitor the locations of the users.
Method and system for access control proximity location
A system for a frictionless access control automatically identifies users and enables access to restricted areas of a building for example via access points such as locked doors. The system allows access when authorized users are in the vicinity of doors without requiring the users to swipe access keycards (or badges) at keycard terminals located at the doors, as in current systems. The system includes user devices such as key fobs and mobile phones that wirelessly broadcast user information and unique IDs for each of the devices in data packets, which are received by positioning units. The positioning units determine locations of the user devices, and send the packet data and the location data to a verification and tracking system. Preferably, the positioning units include two or more antennas that determine close proximity of users to access points while also allowing the system to continuously monitor the locations of the users.