Patent classifications
G07C2009/00476
SYSTEMS, STRUCTURES, AND METHODS FOR ACCESSING POWER LOCKED PANELS
Various disclosed embodiments include illustrative systems, structures, and methods for performing authenticated access to a structure. An illustrative system includes a connector configured to be operably connected to a personal electronics device and to receive an electric charge from the personal electronics device, a controller couplable to an electromechanical locking device and the connector, and a memory. The memory is configured to store computer-executable instructions configured to cause the controller to receive first authentication information, receive second authentication information from the personal electronics device, authenticate the personal electronics device responsive to the first authentication information and the received second authentication information, and activate an electromechanical locking device to unlock responsive to the electric charge and a successful authentication.
ARTIFICIAL INTELLIGENCE (AI)-BASED SECURITY SYSTEMS FOR MONITORING AND SECURING PHYSICAL LOCATIONS
Various aspects of the disclosure relate to monitoring a physical location to determine and/or predict anomalous activities. One or more machine learning algorithms may be used to analyze inputs from one or more sensors, cameras, audio recording equipment, and/or any other types of sensors to detect anomalous measurements/patterns. Notifications may be sent one or more devices in a network based on the detection.
Methods and systems for offline verification code generation based on smart door lock system
A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
Secure authorization via a dynamic interface on a visitor device
A keyless access system for securely authorizing access to a resource via a dynamic interface that user equipment (“UE”) may access using a changing access identifier without the UE installing or executing any specialized applications or code. The secure authorization of visitor access may include periodically modifying the access identifier, providing access activation data with a first access identifier to a UE in response to a triggering action, providing the dynamic interface to the UE in response to the access activation data automatically directing a browser of the UE to the first access identifier, receiving UE authorization data that is entered using a keypad or login screen of the dynamic interface, and providing access to the resource based on the first access identifier being associated with the resource, the UE authorization data authorizing access to the resource, and the access being provided before an expiration time.
Vehicle, and controlling method thereof
An embodiment vehicle includes a UWB (ultra-wideband) module configured to receive a UWB signal transmitted from a smart key, and a controller configured to determine a location of the smart key based on the UWB signal received through the UWB module, control the UWB module to stop UWB communication after a first reference time has elapsed from a point of time at which the UWB module starts communication, and control the UWB module to restart the UWB communication after a second reference time has elapsed from a point of time at which the UWB module stops communication.
Apparatus and method for remote administration and recurrent updating of credentials in an access control system
A portable electronic key for use with an electronic locking device comprises a wireless communications module, a processor, and a software application configured to transmit, receive, and respond to electronic messages related to access control information. The electronic messages are formatted according to a request-response protocol. The wireless communications module is configured to use a standardized communication protocol to establish a wireless communications link with a networking device operably associated with a remote administration device located away from the portable electronic key. The software application periodically exchanges, via the wireless communications link, request-response messages related to access control information with a server application of the remote administration device. The processor responds to the exchange of request-response messages by performing at least one of modifying access control information of the portable electronic key or providing access control information of the portable electronic key to the remote administration device.
Remote auditing of electronic keys
Embodiments relate to enhanced auditing features for administration of remote electronic keys. An electronic key delivers electrical power to an electronic lock to energize circuitry thereof. The electrical power may energize an electric motor or solenoid. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes the electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.
SINGLE-SIDED STORAGE LOCKER SYSTEMS ACCESSED AND CONTROLLED USING MACHINE-READABLE CODES SCANNED BY MOBILE PHONES AND COMPUTING DEVICES
A single-sided ride storage locker system deployed at any site within a facility, and providing guest visitors with access control enabled by scanning multi-level machine-readable codes using mobile scanning computing systems, such as web-enabled smartphones with digital cameras and mobile application support. The storage locker system supports automated modes of discovering and finding where a guest's rented locker is located within the facility and its sites at any moment in time, simply by using the guest' smart phone to scan a device-level code, a site-level code, a facility-level code or a discovery-level code, posted anywhere within the facility or any site, without need for using a physical locker lookup kiosk or other conventional systems and methods.
REMOTE ADMINISTRATION OF AN ELECTRONIC KEY TO FACILITATE USE BY AUTHORIZED PERSONS
Embodiments relate to remote administration of a portable electronic key. An activation signal may be delivered to wireless communications circuitry of the portable electronic key to enable the key to perform one or more tasks. A smart device can receive information related to the activation signal from a server device. The smart device may deliver the activation signal to the portable electronic key via a wireless communications link established in accordance with a wireless networking standardized communications protocol. A user verification procedure may be performed at one of the portable electronic key and the smart device. The user verification procedure may indicate if a holder of the portable electronic key is authorized to use the key. Delivery of the activation signal may be initiated in response to completion of the user verification procedure.
METHODS AND SYSTEMS FOR OFFLINE VERIFICATION CODE GENERATION BASED ON SMART DOOR LOCK SYSTEM
The present disclosure provides a method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.