G07C9/21

Enhanced authorization to access transportation hub services

A method for enhanced authorization to access transportation hub services is provided that includes creating, by an electronic device, a token based on credentials of a traveler. Moreover, the method includes displaying the token by the electronic device for scanning for accessing a security service area and determining whether the credentials are valid. In response to determining the credentials are valid, a traveler operating the electronic device is authorized to access the security service area. Otherwise, the traveler is denied access to the security service area.

Enhanced authorization to access transportation hub services

A method for enhanced authorization to access transportation hub services is provided that includes creating, by an electronic device, a token based on credentials of a traveler. Moreover, the method includes displaying the token by the electronic device for scanning for accessing a security service area and determining whether the credentials are valid. In response to determining the credentials are valid, a traveler operating the electronic device is authorized to access the security service area. Otherwise, the traveler is denied access to the security service area.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

SALES MANAGEMENT SYSTEM
20220405759 · 2022-12-22 · ·

A sales management system includes a registration device having a processor configured to perform commodity registration based on operation of a customer who purchases a commodity. The sales management system also includes a gate device having a processor configured to execute error processing in response to receiving, as an input, information indicating that payment for the commodity registered by the registration device is completed is not input when the customer passes the gate device. The processor of the registration device is also configured to receive stop information indicating that the customer stops shopping without purchasing the commodity output information for passing the gate device. The processor of the gate device is also configured to receive, as the input, the information for passing the gate device, and allow passage of the customer without executing the error processing.

TCS, Tube Conveyor System of a purchase for drive-through pickup.
20220383434 · 2022-12-01 ·

A system and a method for online order and easy pickup comprising (1) a mobile application capable of interacting with customer to place and pay for the order, set up the time for pickup, generating order number and readable code associated with said order number, (2) a Tube Conveyor System (TCS) connecting the merchant's processing station to a kiosk. (3) said kiosk is located near the merchant facility for drive-through pickup using the order number and its associated readable code.

A system for drive through order and pickup comprising (i) at least one kiosk at a business facility capable of taking customer's order and process payment, (ii) a freely mobile capsule carrying the order, (iii) a Tube conveyor System capable of moving said capsule from the business process station to said kiosk