Patent classifications
G07C2009/00976
Method and apparatus for policy based access control
An authorization approach to physical access uses identity attributes, doors/readers attributes, time of the day, and policies to determine access rights to facilities and physical spaces in real-time, based on three criteria: who, when, and what. Embodiments address the constantly changing physical access needs of companies as those needs evolve.
AUTHENTICATION SYSTEM, OPERATION METHOD OF AUTHENTICATION SYSTEM, AND OPERATION PROGRAM OF AUTHENTICATION SYSTEM
A first processor is configured to acquire a first facial image of the user; extract first facial feature information from the first facial image; generate an authentication code representing the first facial feature information; and cause a printer to print the authentication code and a display facial image of the user on a card medium to create the ID card, and a second processor is configured to acquire the authentication code printed on the ID card possessed by the user and a second facial image of the user; decode the first facial feature information from the authentication code; extract second facial feature information from the second facial image using the same algorithm as used in a case of extracting the first facial feature information from the first facial image; collate the first facial feature information with the second facial feature information; and perform the determination based on a collation result.
Enhanced security for contactless access card system
An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.
IMPEDING UNAUTHORIZED NETWORK INFILTRATION AT REMOTE CRITICAL INFRASTRUCTURE FACILITIES
A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.
AUTOMATIC PAYMENT MACHINE AND AUTOMATIC PAYMENT MACHINE CONTROL METHOD
An automatic payment machine includes an information reading section, an image reading section, a display acceptance section, a key issuing section, and a control section. The control section instructs the information reading section to read passport information. Upon acquiring the passport information via the information reading section, the control section verifies reservation information and instructs the key issuing section to issue a room key, based on the verification result. Upon failing to acquire the passport information via the information reading section, the control section instructs the display acceptance section to display a designation screen for performing an operation to acquire image data of a passport, acquires the image data, instructs the image reading section to perform character recognition on the image data and read character information, verifies the reservation information, and instructs the key issuing section to issue the room key, based on the verification result.
Card key for vehicle
A vehicle card key, includes: a mainboard part on which an electronic element for wireless transmitting/receiving with a vehicle is mounted; a connector part formed on the mainboard part; a housing part which covers the mainboard part avoiding the connector part; and a switchboard part which has at least one among a switch and light-emitting diode mounted thereon, and which is layered on the mainboard part and is connected to the connector part.
Apparatus, System and Method For Quick Transport of Hospital Beds or Ambulance Gurneys Through Secured Areas
Novel security clearance delivery assistance system for healthcare providers working in hospitals nationwide that improves patient care by reducing or eliminating the amount of time needlessly wasted by manually presenting security clearance smart cards to the security reader for authentication while transporting patients across hospitals. In life or death situations, which occur routinely in hospitals, quick delivery of patients to destinations such as the operating room could mean life or death. A health care professional's ability to save lives may depend in part on their ability to quickly transport patients through secured areas, which currently require the transporter to stop and authenticate at each doorway. With the likelihood of survival decreasing exponentially as time passes, reducing or eliminating interruptions during transportation will enable healthcare providers more time to perform life saving procedures and dramatically increase the likelihood of survival.
PROTECTING A CARD KEY FOR VEHICLES FROM BREAKAGE
Disclosed is an invention that relates to a breakage prevention type card key. A breakage prevention type card key of the present invention includes: a substrate part installed inside a case part, a key accommodation part connected to the substrate part and having a groove into which an auxiliary key part is inserted, a locking part located inside the key accommodation part and elastically pressurizing a side surface of the auxiliary key part stored in the key accommodation part to restrain the movement of the auxiliary key part, and a reinforcement part extended from key accommodation part and coupled to the case part and augmenting the rigidity of the case part located on both sides of the entrance of the key accommodation part.
SMART KEY FOR VEHICLE
The present invention relates to a smart key for a vehicle including a substrate part on which components are mounted, a key accommodation part formed on the substrate part and into which an auxiliary key part is inserted, a reinforcement part coupled to the substrate part and augmenting rigidity, and a case part covering the substrate part, the key accommodation part, and the reinforcement part to augment the rigidity thereof.
CARD TYPE SMART KEY
Disclosed is an invention related to a card type smart key. The disclosed card type smart key includes a key main body part having a circuit substrate installed thereinside, a battery cover part having a battery mounted thereon and inserted into an insertion part formed in the key main body part, and a contact part installed in the key main body part so as to be in contact with the battery and having elastic restoration force in the battery side direction.