G07C2009/00865

Electronic identification, location tracking, communication and notification system with beacon clustering

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allows for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking. Also provided is a system and method for identifying a customer's location at a business and provide notification to a company representative upon arrival of the customer at the business location. Real-time location determinations for the customer and customer location tracking can be provided. One or more wireless beacons communicate with the customer's electronic device. The beacons provide the system with real-time data about the customer's whereabouts, allowing for the confirmation and tracking of the customer at the location. A first non-limiting example of use, include a company that provides food and beverage allowing the customer to place an order for food and beverages on their electronic device and having the order delivered to the person at their current location as determined by the system. Another non-limiting example includes a company using the notification system to have assigned staff members notified of the customer's arrival.

UNIVERSAL CREDENTIAL

A method for leveraging a universal credential in an access control system according to one embodiment includes generating, by a cloud system, a CBOR web token for user access to at least one electronic lock, wherein the CBOR web token includes a group tag associated with a set of access rights for a group of users and a cryptographic signature, transmitting the CBOR web token to a user mobile device, receiving, by a first electronic lock, the CBOR web token from the user mobile device for access to a passageway secured by the first electronic lock, verifying an authenticity of the cryptographic signature of the CBOR web token and that the group tag of the CBOR web token is associated with a group authorized to access the passageway secured by the first electronic lock, and unlocking a lock mechanism in response to the verifications.

SYSTEM AND METHOD FOR TRANSMITTING UNLOCK CODES BASED ON EVENT TRIGGERS
20230039893 · 2023-02-09 ·

The disclosure generally relates to a system and method for randomly generating unlock codes and identifiers for locks, and creating unlock code and identifier pairs. In an exemplary embodiment, the invention is integrated with, or part of, a distributed management system that controls access to various locations, such as, for example, self-storage units, hotel rooms, apartment buildings, storage containers, short-term housing rentals, lockers, equipment rooms, vaults, hospitals, airports, government facilities, nuclear power facilities, water treatment facilities, weapon storage facilities, aircraft cockpits, and any other setting that requires restricted, selective, or monitored access that can be remotely controlled, whereby users can receive unlock codes electronically on their mobile device.

Movable barrier operator registration verification

Systems, methods, and apparatus for managing and controlling network-enabled movable barrier operators is provided. A method for managing network-enabled movable barrier operator includes receiving a user account identifier and a movable barrier operator identifier from a user device, providing an instruction to perform a specified action with a movable barrier operator associated with the movable barrier operator identifier to the user device, determining a registration condition is met upon detecting that the specified action has been performed, and, in the event that the registration condition is met, associating the movable barrier operator identifier with the user account identifier to allow a user account associated with the user account identifier to control the movable barrier operator over a network.

Enabling distribution of a mobile key

It is provided a method for enabling distribution of a mobile key for obtaining access to a physical space. The method is performed in a mobile key agent and comprises the steps of: receiving a booking signal from a booking agent, the booking signal being associated with a booking of physical space, wherein the booking signal comprises a property identifier, an allocation time, and a name of the user; obtaining a system booking reference associated with the booking of physical space; providing the system booking reference to the booking agent; establishing contact with the mobile key repository, yielding an identifier of the mobile key repository; receiving a space allocation message comprising an identifier of a physical space and the system booking reference; and transmitting a key allocation command to an electronic access control system associated with the property, the key allocation command comprising the identifier of the mobile key repository, the identifier of the physical space and the allocation time.

Secure element for processing and authenticating digital key and operation method therefor

A secure element (SE) for processing a digital key includes a communication interface for communicating with a host, a memory for storing programs and data for processing the digital key, and a processor for executing the programs stored in the memory to receive a digital key processing request from a target device, determine whether a service is providable to the target device, by using a service-provider-specific service performance manager, process the digital key by using a digital key manager based on digital key processing information stored in the memory, upon determining that a service is providable to the target device, issue a digital key processing certificate by using the service-provider-specific service performance manager based on authentication information stored in the memory, and transmit the digital key processing certificate to at least one of a service provider and the target device.

Intelligent lock
11482063 · 2022-10-25 · ·

A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.

USE OF A PAYMENT CARD TO UNLOCK A LOCK

Exemplary embodiments may provide keys for unlocking access to a location, like a user room, a secure location, a door at an employee location, a trunk, a closet or other locked location or item, on a payment card. Examples of a payment card include but are not limited to a credit card, a debit card, a smart card, an employee identification card, etc. A secure token that acts as digital key may be uploaded to the payment card. The payment card may then be put in close proximity of a wireless reader at the lock. The wireless reader obtains the secure token and extracts the contents. If the contents are proper, the lock is unlocked. Otherwise, the lock remains locked.

Electronic Locking Systems, Methods, and Apparatus

Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from a server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website.

Intelligent Lock
20230062538 · 2023-03-02 · ·

A method for operating an access control comprises creating a plurality of wake-up schedules for a wireless transceiver. Each of the plurality of wake-up schedules may be configured to control how frequently the wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the wireless transceiver may be different from another one or the plurality of wake-up schedules for the wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the wireless transceiver such that a duration of time between wake-ups for the wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for the wireless transceiver may be configurable by an administrative user via an interface.