G07C9/27

VISUAL VOUCHER COMMUNICATION SYSTEMS AND METHODS
20180005464 · 2018-01-04 ·

Various embodiments each include at least one of systems, devices, methods, and software for visual voucher communication systems and methods. One such embodiment includes receiving an entry request with an account identifier from a requestor and retrieving data of a voucher from a voucher database based on the account identifier and a current voucher requirement. In such embodiments, when voucher data is retrieved, the voucher data is transmitted to the requestor. However, when no voucher data is retrieved and at least one voucher is available, the method includes transmitting a voucher procurement option to the requestor. Otherwise, when no voucher data is retrieved and no voucher is available, data representative thereof is transmitted to the requestor.

SYSTEMS AND METHODS FOR SHORT-RANGE COMMUNICATION BETWEEN DEVICES

The present disclosure relates to systems and methods for communicating between devices using short-range communication links. More specifically, the present disclosure relates to systems and methods for communicating access-right data between devices for verification or transfer.

Systems and methods for controlling access to a secured space

Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device having a body having a rotatable locking cam having a locked paddle and an unlocked paddle. The cam is rotatable between a first position and a second position. The body also has a locking pin and a power supply for supplying electrical power to circuit components of the locking device. The locking device also includes a shackle having two arms. One of the two arms has a groove in a bottom portion thereof configured to engage with the locking pin when the shackle is in a closed position. In the first position, the locked paddle of the rotatable locking cam engages the locking pin in the groove. In the second position, the locked paddle of the rotatable locking cam is disengaged from the locking pin.

Systems and methods for controlling access to a secured space

Systems and methods for controlling access to a secured space are disclosed. The system includes a locking device having a body having a rotatable locking cam having a locked paddle and an unlocked paddle. The cam is rotatable between a first position and a second position. The body also has a locking pin and a power supply for supplying electrical power to circuit components of the locking device. The locking device also includes a shackle having two arms. One of the two arms has a groove in a bottom portion thereof configured to engage with the locking pin when the shackle is in a closed position. In the first position, the locked paddle of the rotatable locking cam engages the locking pin in the groove. In the second position, the locked paddle of the rotatable locking cam is disengaged from the locking pin.

Enhanced authorization to access transportation hub services

A method for enhanced authorization to access transportation hub services is provided that includes creating, by an electronic device, a token based on credentials of a traveler. Moreover, the method includes displaying the token by the electronic device for scanning for accessing a security service area and determining whether the credentials are valid. In response to determining the credentials are valid, a traveler operating the electronic device is authorized to access the security service area. Otherwise, the traveler is denied access to the security service area.

Enhanced authorization to access transportation hub services

A method for enhanced authorization to access transportation hub services is provided that includes creating, by an electronic device, a token based on credentials of a traveler. Moreover, the method includes displaying the token by the electronic device for scanning for accessing a security service area and determining whether the credentials are valid. In response to determining the credentials are valid, a traveler operating the electronic device is authorized to access the security service area. Otherwise, the traveler is denied access to the security service area.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

System and method for remote monitoring of released individual
11711114 · 2023-07-25 · ·

A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.

System and method for remote monitoring of released individual
11711114 · 2023-07-25 · ·

A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.