G07C9/00904

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

SMART BUILDING INTEGRATION AND DEVICE HUB

Embodiments are generally directed to systems, devices, methods, and techniques to control devices via a mobile device platform in a smart building system. Embodiments further include techniques to determine a device of the smart building system and an action to perform by the device. The techniques include establishing, a connection with a smart lock of the smart system, and communicating a request to perform the action to the smart lock of the smart system.

SMART LOCK REMOTE ADMITTING SYSTEM AND METHOD
20230215233 · 2023-07-06 ·

A method for facilitating communication between a first person such as an occupant of a building with a smart lock and a second person such as a visitor includes receiving at a computer system, from a visitor device app, a smart lock identifier and a visitor device app identifier so the occupant can establish a communication channel between the occupant and the visitor and if desired allow the visitor access to the building (or other property).

Smart storage locker for mobile devices
11694496 · 2023-07-04 ·

A smart storage locker can be used to store an individual's mobile device while the individual is at work, school or another location where mobile devices should be restricted. The smart storage locker will therefore prevent the individual from carrying his or her mobile device while in such restricted environments. In addition to storing mobile devices, the smart storage locker can also be configured to automatically detect an individual's identity when the individual's mobile device is secured within the smart storage locker. This detection can then be employed to track when the individual is present at a particular location while not having access to, and therefore not using, his or her mobile device.

Multi-factor authentication for access control using a wearable device
11693941 · 2023-07-04 ·

A system and method for providing multi-factor authentication for access through a door, but without the user having to repeat a physical act of providing authentication every time that the door is opened, wherein the first time through the door, multi-factor authentication is provided to the access control system, and wherein each subsequent access through the door, multi-factor authentication is performed automatically and without intervention of the user as long as the user has a wearable device providing at least one factor of the multi-factor authentication, and the user has not removed the wearable device since the multi-factor authentication was last provided to the access control system.

ACCESS MANAGEMENT SYSTEM
20230005312 · 2023-01-05 · ·

An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from an access management device and other devices connected to the software platform. Other devices connected to the platform include robots, such as aerial robots, which are configured to detect motion and engage with an object connected to the motion detection. An enclosure is operable to house an aerial robot and provides for ease of addition of the aerial robot to a security or entry management system by providing an easily installable package. The enclosure provides the advantages of simple deployment and charging of aerial robots.

Smart building system for integrating and automating property management and resident services in multi-dwelling unit buildings
11544976 · 2023-01-03 · ·

A method for converting a legacy building into a smart building. The method including calculating a distance between a first connection point and a second connection point; creating a cable having a first length based on the distance between the first connection point and the second connection point; installing a demarcation point; installing a plurality of systems; connecting the demarcation point and a system using the cable, to create a smart building system; connecting the smart building system to a portal; and testing the connection of the smart building system to the portal.

SYSTEMS AND METHODS FOR CONTROL OF A LOCKING SYSTEM
20220403677 · 2022-12-22 ·

Systems and methods for control of a locking system are disclosed. In some embodiments, a system comprises one or more sensors configured to generate output signals indicating one or more movement information of a subject. The system comprises at least one processor operatively connected with the one or more sensors, and memory storing instructions executable by the at least one processor, the instructions when executed cause the system to determine, using the output signals from the one or more sensors, one or more movement parameters of the subject; and send, based on the determined movement parameters of the subject, an instruction to the locking system to adjust an open delay time for the locking system, the open delay time being time the locking system remains open.

Interlock system and parts thereof
11532191 · 2022-12-20 · ·

An interlock system comprising: a first lock including a first lock memory configured to store one or more virtual keys; and a first key including a first key memory configured to store one or more virtual keys, wherein the first lock is configured to be actuated between a first condition and a second condition, when a first virtual key stored in the first key memory is transferred to the first lock memory, by engagement of the first key and first lock, and movement of the first key with respect to the first lock.

Energy efficient secure Wi-Fi credentialing for access control systems

An access control system includes an energy efficient access control that operates as a Wi-Fi access point that broadcasts a Service Set Identifier (SSID) as indicator of access control level to communicate with a mobile device with WPA2 PSK.