G07C2009/00825

Systems and methods for controlling access to a secured space

Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device having a body having a rotatable locking cam having a locked paddle and an unlocked paddle. The cam is rotatable between a first position and a second position. The body also has a locking pin and a power supply for supplying electrical power to circuit components of the locking device. The locking device also includes a shackle having two arms. One of the two arms has a groove in a bottom portion thereof configured to engage with the locking pin when the shackle is in a closed position. In the first position, the locked paddle of the rotatable locking cam engages the locking pin in the groove. In the second position, the locked paddle of the rotatable locking cam is disengaged from the locking pin.

JOBSITE BOX WITH KEYLESS ENTRY

A jobsite box includes a body, the body having an interior, an exterior, and a lid, a key pad positioned on the exterior of the body, the key pad being in communication with a controller positioned on the body, a locking mechanism connected to the body, the locking mechanism being configured to lock and unlock the jobsite box, a battery positioned in the interior of the body, the battery configured to power the locking mechanism. The controller is configured to lock or unlock the locking mechanism when a predetermined code is entered into the key pad.

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

Lotte lockbox and parcel management system
11699314 · 2023-07-11 · ·

A lockbox and parcel management system is implemented in which a lockbox having multiple compartments is controllable via an access device that locks and unlocks respective compartments upon receiving a proper access code input. A user may place an order with an e-commerce service using an e-commerce application or website. The e-commerce service, upon receiving the order, may transmit order information to a lockbox remote service which can communicate with a user device associated with the user who placed the order, the access device for the lockbox, and a deliverer's device from the delivery company. The lockbox remote service or authorized user/owner may set access codes for the deliverer to open and place a parcel in a lockbox's compartment for safe and secure storage until the user arrives home.

Electronic locking systems, methods, and apparatus

Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.

Emergency lockdown in a local network of interconnected devices

Systems, methods, and devices are described herein for executing a lockdown of electronic locks deployed in a local network of interconnected devices. In example implementations, each electronic lock is provided with a unique encryption key specific to that electronic lock and is provided with a shared encryption key. To execute a lockdown of all electronic locks in the local network, a server generates a locking instruction and encrypts it using the shared encryption key. The server then transmits the encrypted locking instruction to the gateway devices of the local network which, in turn, transmit it to each of the electronic locks. Upon receipt of the encrypted locking instruction, the electronic locks attempt to decrypt it using the shared encryption key. Upon successful decryption of the encrypted locking instruction, an electronic lock toggles to a lock state.

Privileged access and anti-theft protection for premises using lock box

A method is provided herein. The method includes disabling, by an electronic lock box, a programmable key based on the programmable key being placed in the electronic lock box. The method also includes enabling, by the electronic lock box, the programmable key based on the electronic lock box being accessed.

Methods and systems for offline verification code generation based on smart door lock system

A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.

LOCK AND SWITCH CONTROLLER SYSTEM, LOCK AND SWITCH DEVICE WITH OFFLINE RESPONSIVENESS, LOCK AND SWITCH CONTROLLER SYSTEM WITH FLEXIBLE COMMANDS
20220366742 · 2022-11-17 ·

A lock and switch controller system, a lock and switch device with offline responsiveness, and system with flexible commands are present. The disclosure provides a lock and/or switch and controller system having a controller with a means of receiving readable alpha and/or numeric input manually from a user using a keypad or other means. The apparatus disclosed herein, provides for the compilation of commands, encrypted in the form of human readable tokens containing covert instructions for the remote control and management of target devices. Any instructions to an appliance or any other users' credentials can be encrypted by an administrator and/or owner and delivered to the controller of the appliance by a user without compromising any security. The lock and switch controller system operates independently and can accept new rules without the presence of the administrator or owner and without connectivity to any communications network.

Digital Key With Monetary Value
20220366408 · 2022-11-17 ·

The disclosure is directed to use of digital keys in providing access to secured locations, goods and resources as well as other assets. The access may be fee based with the disclosure further directed to including fee payment authorization into the access process. Electronic locks may be employed within modules to faciltiate the access. The digital keys may be accompanied with commands for the electronic locks and/or modules accomodating them to execute in the course of providing the access. The digital keys may be shared, limited to single or multiple use and may be lock agnostic. The commands may be sent from a smart mobile device and be digitally signed for subsequent attestation by the lock for authenticity verification. The digital keys may be generated and otherwise handled under one of a series of escalating security encryption methods typically used and reserved for financial transactions.