Patent classifications
G07C9/00182
Vibration-based authentication method for access control system
A vibration-based authentication method for an access control system includes: collecting vibration signals generated by a built-in vibration motor in an authentication device; filtering, denoising, and performing endpoint segmentation on the collected vibration signals, and extracting vibration signals containing effective touch; performing an alignment on the segmented vibration signals; performing a fast Fourier transform on the aligned vibration signals to obtain frequency-domain data, extracting frequency-domain features obtained after alignment and features obtained before alignment to construct a training data set, and storing the training data set in a database of the authentication device; using a new unlock signal generated when a user touches the authentication device as test data, and processing the test data to obtain test data containing effective touch; and matching and classifying the test data containing effective touch with the training data set by using a machine learning classification model, to obtain an authentication result.
Method and System for Isolation Management and or Access Control
A system of isolation management comprises a computer for generating an isolation plan; a lockbox configured to receive the isolation plan from the computer; a mobile device associated with an individual, and one or more locks for isolation locking of an asset by each individual according to the isolation plan. The mobile device is allocated to the lockbox according to the isolation plan. The lockbox is configured to recognise the mobile device when proximal to the lockbox. The one or more isolation locks are removably housed in the lockbox. The one or more isolation locks are each able to be recognised by the mobile device and the mobile device is configured to record an association of one or more of the isolation locks to the mobile device according to the isolation plan. There is also an isolation point for isolating the asset with the one or more isolation locks according to the isolation plan. The isolation point is able to be recognised by the mobile device.
Gunshot detection system with forensic data retention, live audio monitoring, and two-way communication
A gunshot detection system includes gunshot sensor units with microphones for detecting gunshots and capturing audio data depicting the detected gunshots and other ambient sounds, an environmental board with various environmental sensors for generating environmental data indicating environmental conditions. The audio data, environmental data, and position information can be stored locally on local nonvolatile storage of the gunshot sensor unit for later retrieval by law enforcement entities. In one embodiment, the gunshot sensor units include a wired and/or wireless data transfer interface for transferring the audio data, environmental data and/or position information to handheld units of law enforcement entities. The gunshot sensor unit can also stream live captured audio data for live monitoring by a control panel, and might also include speakers for providing audio playback of audio data from the control panel.
APPARATUS, SYSTEM AND METHOD FOR VEHICLE ACCESS AND FUNCTION CONTROL UTILIZING A PORTABLE DEVICE
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to one or more key fobs linked to the vehicle, and device data that includes data relating to one or more devices linked to the key fob that are authorized to access the vehicle. The vehicle receives an access request indicating that a new device is requesting access to the vehicle, whereupon a challenge may be transmitted to one or more of the authorized devices. The one or more devices may respond, granting access to vehicle functions. The vehicle and/or authentication network generate a secure fob key and access limitations based on the response and transmit the secure fob key to the new device. Profile templates may be used to set and control vehicle access and functions.
Interlockable devices
Examples of devices are described herein. In some examples, a device may include a plurality of electronic elements. In some examples, each of the electronic elements is mechanically interlockable to another of the electronic elements. In some examples, each of the electronic elements is to control a lock state based on a broadcast signal to modify a shape of the device to a predetermined target shape.
VEHICLE, VEHICLE SYSTEM INCLUDING THE SAME, AND CONTROL METHOD OF VEHICLE SYSTEM
A vehicle includes a storage to store an authority value representing authority to access vehicle data generated by at least one vehicular component and a communicator to transmit the vehicle data and the authority value to a user terminal.
ACCESS CONTROL SYSTEM AND ACCESS CONTROL METHOD USING THE SAME
A sub-reader and a method of controlling the sub-reader are provided. The method of controlling the sub-reader which is connected to a door reader provided in an existing installed door operating device to provide a communication method that is not supported by the door reader includes: obtaining first open request information using a first communication method from a terminal; obtaining second open request information for transmission to the door reader based on the first open request information; and transmitting the second open request information to the door reader using a second communication method different from the first communication method.
SMART LOCK HAVING AN ELECTROMECHANICAL KEY
The invention concerns a locking mechanism (10) configured to switch from a locked state to an unlocked state, comprising: a. a processor (11) configured to read an identification code of an identification key (13) and configured to cause the locking mechanism (10) to switch from the locked state to the unlocked state if the identification code of the identification key (13) is an authorized code of the locking mechanism (10), b. a printed circuit board (14) in a first plane comprising an aperture (15) configured to accept insertion of the identification key (13) according to a first axis (Y) secant to the printed circuit board (14), the identification key (13) comprising a NFC passive part (16), c. a NFC active part comprising a wire antenna (18) positioned on the printed circuit board (14), the wire antenna (18) comprising a first at least one winding around the aperture (15), the wire antenna being connected to the processor (11),
wherein the locking mechanism is configured to establish a NFC communication between the NFC active part of the locking mechanism and the NFC passive part (16) of the identification key (13) when the identification key (13) is inserted into the aperture (15).
METHOD AND APPARATUS FOR PROVIDING ROUTE GUIDANCE
A route guidance apparatus includes: a reservation information communications unit to receive reservation information which includes at least one of a parking-reserved space of the parking lot, a vehicle type, a vehicle number, and a parking time; a reserved vehicle recognition unit to recognize a vehicle number of a reserved vehicle and determine whether the reserved vehicle enters or exits the parking lot; a traffic flow determination unit that divides an area of each floor of the parking lot into a plurality of unit areas and calculates density within the parking lot based on the number of vehicles within each divided unit area; and a parking route generation unit and an exit route generation unit that respectively generate an optimal parking route and an optimal exit route based on the calculated density; and a route guidance unit to provide the user with the generated optimal parking and exit routes.
Software-based time rollover detection
A method for detecting time rollovers is disclosed. The method may include receiving time data including week data and second data and processing the time data to generate a first date. The method may include generating, based on the first date and an offset value, a second date and obtaining, when the second date is prior to a baseline date, a network date. The method may include assigning the network date as the baseline date and processing the network date and the first date to determine an updated offset value. The method may include storing the updated offset value as the offset value and determining, based on the network date, a system date.