G07C2009/00976

Impeding unauthorized network infiltration at remote critical infrastructure facilities

A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.

Protecting a card key for vehicles from breakage
11512496 · 2022-11-29 · ·

Disclosed is an invention that relates to a breakage prevention type card key. A breakage prevention type card key of the present invention includes: a substrate part installed inside a case part, a key accommodation part connected to the substrate part and having a groove into which an auxiliary key part is inserted, a locking part located inside the key accommodation part and elastically pressurizing a side surface of the auxiliary key part stored in the key accommodation part to restrain the movement of the auxiliary key part, and a reinforcement part extended from key accommodation part and coupled to the case part and augmenting the rigidity of the case part located on both sides of the entrance of the key accommodation part.

Smart card key
11508198 · 2022-11-22 · ·

Disclosed is an invention related to a card type smart key. The disclosed card type smart key includes a key main body part having a circuit substrate installed thereinside, a battery cover part having a battery mounted thereon and inserted into an insertion part formed in the key main body part, and a contact part installed in the key main body part so as to be in contact with the battery and having elastic restoration force in the battery side direction.

Smart key for vehicle
11624207 · 2023-04-11 · ·

The present invention relates to a smart key for a vehicle including a substrate part on which components are mounted, a key accommodation part formed on the substrate part and into which an auxiliary key part is inserted, a reinforcement part coupled to the substrate part and augmenting rigidity, and a case part covering the substrate part, the key accommodation part, and the reinforcement part to augment the rigidity thereof.

Digital credentials for employee badging

A system for credential authentication comprises an interface configured to receive a create indication to create a badge credential representing an employee badge and receive a claim indication from an authentication device to claim the badge credential, and a processor configured to provide the badge credential to the authentication device in response to the claim indication, receive a proof response from the authentication device comprising the badge credential and a lock identifier, validate the proof response using a distributed ledger, and provide a token for unlocking a lock associated with the lock identifier to the authentication device.

Enhanced Security for Contactless Access Card System
20220270420 · 2022-08-25 ·

An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.

Deleting unnecessary map data
09772195 · 2017-09-26 · ·

A system for deleting map data comprises an interface and a processor. The interface is configured to determine a location associated with a device. The processor is configured to determine one or more map bundles to delete based at least in part on the location and delete the one or more map bundles.

Enhanced Security for Contactless Access Card System
20210390805 · 2021-12-16 ·

An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.

SMART DOOR LOCK SYSTEM HAVING DOOR-LOCK AREA INFORMATION DISPLAY FUNCTION AND CONTROL METHOD OF SMART DOOR LOCK SYSTEM
20220122393 · 2022-04-21 ·

A smart door lock system and a control method thereof are proposed. More specifically, in the smart door lock system and the control method thereof, door-lock area information is displayed on an outer side of a door, the door-lock area information including: any one or more pieces of door-lock area state information on states of a door lock area entered through a door lock in which a smart door lock is installed; and door-lock area user information of users who use the door lock area.

METHOD AND APPARATUS FOR POLICY BASED ACCESS CONTROL
20230298413 · 2023-09-21 ·

An authorization approach to physical access uses identity attributes, doors/readers attributes, time of the day, and policies to determine access rights to facilities and physical spaces in real-time, based on three criteria: who, when, and what. Embodiments address the constantly changing physical access needs of companies as those needs evolve.