G07C2209/61

SECURITY SYSTEM
20230016580 · 2023-01-19 ·

A security system includes a portable terminal, a communication device communicating with the portable terminal, and a determination unit determining validity of the portable terminal. Phase data acquired from distance measuring radio wave is used to determine validity of communication between the portable terminal and the communication device. The received phase data of the distance measuring radio wave varies according to the distance from a transmission source. When the communication device and the portable terminal are fixed, and the communication device and the portable terminal have transmitted and received distance measuring radio waves having the same specific frequency, vehicle acquisition phase data and terminal acquisition phase data are the same. The determination unit determines, by using this two types of phase data, the validity of communication between the communication device and the portable terminal is determined.

Distance measuring device and distance measuring method

According to an embodiment, a first device includes: a first transceiver configured to transmit two or more first carrier signals using an output of a first reference signal source and to receive two or more second carrier signals; and a calculation unit, and a second device includes: a second transceiver configured to transmit the two or more second carrier signals using an output of a second reference signal source that operates independently of the first reference signal source and to receive the two or more first carrier signals. A frequency group of the two or more first carrier signals and a frequency group of the two or more second carrier signals are identical or substantially identical to each other, and the calculation unit calculates the distance between the first device and the second device based on a phase detection result obtained by receiving the first and second carrier signals.

METHOD AND SYSTEM FOR SMART BLUETOOTH OPERATION SWITCHING BASED ON BEACON BROADCAST

A method and a system for smart Bluetooth operation switching based on a beacon broadcast are provided. A Bluetooth device transmits the beacon broadcast; a mobile terminal scans the beacon broadcast and, by parsing the beacon broadcast, the mobile terminal determines whether to wake up an application program; sending a parsed beacon broadcast to the application program, and identifying feature data of a Bluetooth device connectable broadcast set in the beacon broadcast; the Bluetooth device transmits a connectable broadcast; the mobile terminal connects to the connectable broadcast and performs an identity verification; acquiring a received signal strength indicator (RSSI) signal strength between the Bluetooth device and the mobile terminal, and mutually calculating position information to obtain a relative distance of the Bluetooth device and the mobile terminal; and, when the relative distance reaches a threshold, executing a corresponding switch action.

PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.

Binding device with embedded smart key and method for controlling object using the same

Provided is a binding device and method of operation of the binding device, with the binding device including a strap including a body, a first area formed inside the body, with a smart key related control circuit disposed in the first area, and a second area formed on one side of the body, with a battery for supplying electric power for operating the smart key related control circuit seated on the second area such that at least a portion of the battery is exposed, and a cover formed to cover the second area.

Method for preventing security breaches of a passive remove keyless entry system

The present invention relates to a method for preventing security breaches of a passive remote keyless entry system for authorizing access to a vehicle. The passive remote keyless entry system comprises a base station located at the vehicle and a mobile device, in particular a remote key, wherein the base station comprises a first processor unit and a first transceiver unit, the first transceiver unit comprises a timing device, the mobile device comprises a second processor unit and a second transceiver unit, an air travel time T of a single message sent back and forth from the base station to the mobile device is measured, and access to the vehicle is granted depending on the measured air travel time T.

Method for calibrating a radio-based keyless access system of a motor vehicle, access system, and motor vehicle

A method for calibrating a radio-based keyless access system of a transportation vehicle, an access system, and a corresponding transportation vehicle. Based on a measured field strength of an LF field, it is determined whether the signal transmitter is located at most at a specified distance from the transportation vehicle. A second transmission device emits a higher-frequency calibration signal in response to which the signal transmitter transmits a response signal back to the transportation vehicle. A reference distance from the signal transmitter to the transportation vehicle is automatically determined from the propagation time of the calibration signal and the response signal. The measured LF field strength-based determination of whether the signal transmitter is located at most at a specified distance from the transportation vehicle is then calibrated automatically based on the determined reference distance.

Access control system having radio authentication and password recognition
11210880 · 2021-12-28 · ·

An access control system receives an identifier of a mobile electronic device when it is located in a public area, from which a user can request access to an access-restricted area. A dataset is created, which is assigned to the user present in the public area, for the identifier and for storing a password in the first dataset such that the password is assigned to the identifier. A code processing unit acquires a password presented by the user when the user requests access to the access-restricted area. A processor unit determines if the identifier is assigned to a user profile in a database, authenticates the user as having access authorization in the event of such an assignment and determines if the acquired password matches the password stored in the dataset, wherein the user is recognized as an access-requesting user in the event of a match.

INFRASTRUCTURE CONTROLLER FOR AN INFRASTRUCTURE AND A KEY CONTROLLER FOR A KEY
20220198850 · 2022-06-23 ·

An infrastructure-controller for an infrastructure. The infrastructure-controller configured to: send a ranging-scheduling-signal to a key, wherein the ranging-scheduling-signal comprises timing-information for a subsequent ranging operation; and activate one or more ranging nodes associated with the infrastructure, for receiving a key-ranging-signal from the key, at an infrastructure-node-start-ranging-time based on the timing-information. The ranging-scheduling-signal has a frequency in a first RF frequency range. The key-ranging-signal has a frequency in a second RF frequency range.

PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential from a key device associated with a user using a first wireless connection. The access control system may be further adapted to verify the credential with a preliminary authentication for the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to verifying the credential with the preliminary authentication. The access control system may be adapted to determine an intent of the user to access the asset. The access control system may identify the credential includes a pattern in the preliminary authentication. The access control system may be further adapted to provide a command to grant access to the asset.