G07C9/00904

CREDENTIALING METHOD AND APPARATUS FOR FACILITY ACCESS
20220398886 · 2022-12-15 · ·

A credentialing method and apparatus for facility access. The apparatus can include a system that includes one or more BLE beacons located within proximity to a facility, where one or more of the beacons identifies a location or other information unique to its proximity to the facility. The apparatus can further include an eBadge used by a person seeking access to the facility. The eBadge can also in some embodiments be a BLE beacon. Interaction between the one or more BLE beacons, a credentialing provider's app operating on the person's mobile device, and the person's eBadge operate in the system to perform a method of controlled access to the facility. In some embodiments, administrators with access to the credentialing provider's app also can control, monitor, report, and observe details concerning such facility access.

SERVER DEVICE AND DOOR CONTROL DEVICE
20220392287 · 2022-12-08 · ·

It A service provider such as a courier to unlock a door without a permission of a user. A server device, which is capable of communicating with a door control device that controls locking and unlocking of a door installed at an entrance of a multifamily residential, includes: a storage that stores, for each user, a service number set by a service provider; a request reception that receives, from the door control device, an unlock request including a device ID and the service number; an authentication that executes an authentication based on information included in the unlock request and information stored in the storage; and unlock instructions that transmits an unlock instruction to the door control device, when the authentication is succeeded.

Methods and devices for physical access control systems

An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interface enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.

Smartlock system for improved fire safety

Methods, systems, and apparatus, including computer programs encoded on computer storage mediums, for a smartlock device that can be integrated in a door at a property. The smartlock device includes a locking mechanism configured to lock the door and to unlock the door. The device includes a radio device and a sensor that determines a first temperature of the smartlock device and a second temperature of a room that is accessible via the door. The radio device is operable to: i) receive parameter signals from the sensor indicating each of the first and second temperatures; ii) transmit data that includes the first and second temperatures to a monitoring system; and iii) receive a command to cause the locking mechanism to unlock the door based on information from the monitoring system. The information includes a determined routing of occupants at the property and is presented on a display of the device.

Securing access to restricted areas from visitors

A computer-implemented method, a computer system and a computer program product secure access to a restricted area. The method includes capturing, by a camera, a first image of a face of a first person and a second image of a face of a second person. The method also includes determining whether the face of the first person is included in a database of persons authorized to access the restricted area. The method further includes determining whether the second person is in proximity to the first person. In addition, the method includes determining whether the second person is authorized to access the restricted area. Finally, the method includes transmitting a signal that the second person is authorized to access the restricted area in response to determining that the second person is in proximity to the first person and the second person is authorized to access the restricted area.

Touchless motion sensor systems for performing directional detection and for providing access control
11594089 · 2023-02-28 · ·

A touchless motion sensor system for performing directional motion detection includes first and second touchless motion sensors. First and second sensing units are coupled to the first and second touchless motion sensors each having a sensing unit disable input, a sensing unit disable output, a sensing unit to sensing unit motion detected output, and motion logic. The first sensing unit disable output is coupled to the second sensing unit disable input, and the second sensing unit disable output is coupled to the first sensing unit disable input.

On demand access control authorization using mobile devices
11501588 · 2022-11-15 · ·

A method of controlling access to at least one access point is provided. The method comprising: transmitting, using a requesting device, an access request to an access device; generating, using the access device, an authorization information request in response to the access request; generating an authorization request in response to the authorization information request; transmitting, using the requesting device, the authorization request to an authorization service; generating, using the authorization service, an authorization token in response to the authorization request; transmitting, using the authorization service, the authorization token to the requesting device; transmitting, using the requesting device, the authorization token to the access device; validating, using the access device, the authorization token; and adjusting, using the access device, at least one access point.

MOBILE KIOSK FOR INTELLIGENT SECURABLE DEVICES SYSTEM
20230051060 · 2023-02-16 · ·

A system and method of controlling a securable device may include establishing a centralized data repository with data representative of status of each securable device. Communications with a mobile kiosk executing on a mobile device of a user may be established. Responsive to receiving a request from the mobile kiosk to identify an available securable device local and accessible to the user, the centralized data repository may be accessed, at least one securable device that is available may be identified, and data associated with the identified available securable device(s) may be communicated to the mobile kiosk to cause the mobile kiosk to communicate at least a portion of the data to one of the securable device(s) to provide access thereto. Responsive to receiving a status update of the securable device accessed from the mobile kiosk, the centralized data repository may be updated with the status update.

Mobile check-in and user verification for access to secured areas such as lounges

A method of verifying that a user is authorized to access a secured area via an entry point includes receiving at a first computer and from a user device associated with the user, check-in request information that includes: a membership number associated with the user and a travel event; and a lounge location. The method also includes generating a time stamp for the receipt of the check-in request; verifying that the membership number is a valid membership number; and verifying that the time stamp is within a predetermined window of time. The method also includes sending, in response to the verification, instructions from the first computer to a second computer positioned near the entry point to display a window that includes user information associated with the user.

Doorbell communication systems and methods
11575537 · 2023-02-07 · ·

The disclosure includes a method for using a doorbell system to detect a presence of a visitor. The doorbell system can comprise a doorbell having a speaker, a microphone, a camera, and a button. The method can include detecting, by the doorbell system, the presence of the visitor while the visitor is located outside a building to which the doorbell is attached. The building can include a door having a lock that is configured to fasten the door to inhibit unauthorized entry into the building. In response to detecting the presence of the visitor, the method can include the step of actuating, by the doorbell system, a first appliance associated with the building.