Patent classifications
G07C2009/00492
Methods, systems, apparatuses, and devices for controlling access to an access control location
A method for controlling access to a restricted resource is provided. The method may include receiving, by a cloud server, an identifier from a user device over a long range wireless channel. Further, the method may include comparing the identifier with a plurality of identifiers registered with an access control device. Further, the method may include authenticating the user device based on the comparing and subsequently transmitting a code to the user device upon successful authenticating. Thereafter, the user device may transmit the code to the access control device over a short range wireless channel. Further, the access control device may be configured to provide access to the restricted resource based on receiving of the code. Further, the method may include transmitting the code to the access control device over a long range wireless channel so that the access control device may authenticate the user device.
METHODS, SYSTEMS, APPARATUS, AND DEVICES FOR CONTROLLING ACCESS TO ACCESS CONTROL LOCATIONS
A method for controlling access to a restricted resource is provided. The method may include receiving, by a cloud server, identifiers from a user device over a long range wireless channel. Further, the method may include comparing the identifiers with a plurality of identifiers registered with access control devices. A system of control access with mobile and keycard access is also provided with long distance wireless communications between the cloud server and access control devices where the information can be remotely and wirelessly updated in each access control device independantly.
Further, the method may include authenticating the user device based on the comparing and subsequently transmitting a code to the user device upon successful authenticating. Thereafter, the user device may transmit the code to the access control device over a short range wireless channel. Further, the access control device may be configured to provide access to the restricted resource based on receiving of the code. Further, the method may include transmitting the code to the access control device over a long range wireless channel so that the access control device may authenticate the user device.
Method for operating a locking system, locking system, and tube safe
A method for operating a locking system comprising an electronic key and an electronic lock and a central unit which in locking operation is used locally separately from the electronic key and the electronic lock, wherein in the method an external authorization code is generated by the central unit by means of an authorization code determination program, the external authorization code is transferred to the electronic key and the external authorization code is saved in a memory by the electronic key, wherein, on interaction of the electronic key with the electronic lock, the external authorization code is read out from the memory by the electronic lock and is checked by a processor of the electronic lock in that, using an internal authorization code determination program, the processor itself determines an internal authorization code and compares it with the external authorization code received by the electronic key and wherein, in the event of the determined internal authorization code being identical to the transferred external authorization code, the processor permits an opening process.
SMARTPHONE WITH INTEGRATED MULTI-TRANSPONDER MODE KEY DEVICE
A smartphone having: a configurable radio frequency transmitter; a configurable low frequency transponder with at least one low frequency coil; and a smartphone application program that is controlled by a cloud service and that is configured to configure the radio frequency transmitter and the low frequency transponder with protocol parameters and initial data values such that the low frequency transponder mimics a virgin key device that can be programmed to a particular vehicle model.
REMOTE MONITORING AND CONTROL SYSTEM FOR A BARRIER OPERATOR
The invention generally relates to a gateway device (102) that operates as a hub or base station to provide for remote monitoring and control of a barrier operator (104,106) such as is used to operate a powered garage door. The device (102) includes a processor; a data storage device; a network interface for connecting the gateway device to a computer network (114); an operator interface for communicating with the barrier operator; and a computer program, which when executed on the processor: permits access to the gateway device over the computer network by way of a mobile application installed on a mobile device (108); transmits control signals received over the computer network to the barrier operator (104,106); and receives monitoring signals from the barrier operator (104,106).
COMMUNICATION SYSTEM, CONTROL DEVICE, AND AUTHENTICATION INFORMATION DETERMINATION METHOD
Since two pieces of fraudulently acquired authentication information A are transmitted from a transmission device at relatively short time intervals, a time Tp is relatively short, whereas the two pieces of authentication information A are received by a control device at relatively long time intervals, an elapsed time TMAX is relatively long and this relationship is different from that in a case where there is no fraudulent work. Thus, it is possible to accurately determine whether received authentication information is fraudulently acquired information on the basis of a relationship between a code included in the authentication information received in the control device and a code that is being selected in the control device, and a relationship between first time information and second time information included in the authentication information received in the control device.
SECURE WIRELESS LOCK-ACTUATION EXCHANGE
System and techniques for a secure wireless lock-actuation exchange are described herein. After receiving a request to actuate a lock from a device, a controller can calculate a challenge counter and then perform verification iterations until an end condition is met—which is a failure of a verification iterations or the number of iterations reaches the challenge count. If the verification iterations reach the challenge count (e.g., there are no failed iterations), then the controller actuates the lock. Each iteration includes an exchange between the device and the controller that the device validates by signing a message with a private key shared by the device and the controller. The exchange also includes a freshness value integrated into the device validation to prevent replay attacks.
DOOR LOCKING AND/OR OPENING SYSTEM, A METHOD FOR CONTROLLING DOOR LOCKING AND/OR OPENING, AND A DOOR LOCKING AND/OR OPENING AND DOCUMENTATION SYSTEM
A door locking/opening system includes multiple doors, each configured with a door ID number, a handle, a lock and an I/O controller, the I/O controller controls the corresponding door; multiple door controllers, each door controller connects the I/O controller of the respective door and controls the corresponding door; multiple sensors, each sensor connects the respective door controller and communicates with the corresponding door; a door controller unit, connected with the respective door controller via a decentralized network and controlling the multiple door controllers; the multiple door controllers are digitally connected and communicating with each other via the decentralized network; each door controller contains its local logbook of own activities and a configuration file of the complete door locking and/or opening system, and each door controller configurated to update and synchronize the configuration file with each other in a rotating cycle based on the door ID numbers in an ascending order, beginning with the lowest door ID number.
SYSTEM, METHOD AND APPARATUS FOR MULTI-VENDOR ROLLING CODE KEYLESS ENTRY AND FOR IDENTIFYING AND STORING KEY INFORMATION AND CREATING DUPLICATE KEYS AND REMOTE ENTRY DEVICES
A system providing rolling code remote device functions to provide keyless entry to multiple makes and models of cars. The system adapted to produce the radio signal type and transmitted data of an original manufacturer's keyless entry remote device system by implementing multiple modulation schema and data encoding techniques. A system for backing up and restoring or replacing OEM vehicle keys. The system stores a copy of data from an OEM key along with other information necessary to replace the OEM key in a key bank. The data collected is processed and stored, a customer can order a universal replacement from the key bank programmed with stored data to emulate prior paired OEM key.
Method and System for Remotely and Wirelessly Controlling Electric Window Blinds and Electric Window Shades
Remote control for actuating an electric window shade or an electric window blind or an electric window covering, and method and system of using same. A base unit includes: a wireless receiver, to wirelessly receive from an electronic device an incoming wireless signal indicating a command to actuate an electric window covering; a wireless signal constructor, to dynamically construct an outgoing wireless signal which comprises a rolling code; and a wireless transmitter, to transmit the outgoing wireless signal to a wireless receiver of a motor unit that is operably associated with the electric window covering. A wireless signal constructor dynamically constructs the outgoing wireless signal without having access to a secret seed value that is accessible to the motor unit. A local storage unit stores a data-set of rolling codes that are associated with the motor unit; and the outgoing wireless signal is dynamically constructed based on a next-available rolling code obtained from the local storage unit of the base unit.