Patent classifications
G07C9/33
System Providing Self-Service Access to Locked Merchandise
A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.
System Providing Self-Service Access to Locked Merchandise
A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.
ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.
DEVICES AND METHOD FOR DIGITAL CONSIGNMENT OF PHYSICAL RESOURCES WITHIN AN INDUSTRIAL ENVIRONMENT
An aspect of the invention relates to a method for controlling access to a physical resource by a blocking device which can be locked and unlocked, comprising steps of locking and unlocking the blocking device which comprise comparing an access code transmitted by a first individual device with an access code associated with a first agent, and a step of consigning the blocking device using a set of second individual devices, wherein the unlocking can be carried out only when each of the second individual devices of the set has de-consigned the blocking device.
DEVICES AND METHOD FOR DIGITAL CONSIGNMENT OF PHYSICAL RESOURCES WITHIN AN INDUSTRIAL ENVIRONMENT
An aspect of the invention relates to a method for controlling access to a physical resource by a blocking device which can be locked and unlocked, comprising steps of locking and unlocking the blocking device which comprise comparing an access code transmitted by a first individual device with an access code associated with a first agent, and a step of consigning the blocking device using a set of second individual devices, wherein the unlocking can be carried out only when each of the second individual devices of the set has de-consigned the blocking device.
Methods and systems for offline verification code generation based on smart door lock system
A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
Methods and systems for offline verification code generation based on smart door lock system
A method and a system for offline verification code generation based on a smart door lock system. The method may include in response to an unlocking event, recording, by a mobile terminal, a trigger time of the unlocking event; in response to the unlocking event, sending, by the mobile terminal, a request for unlocking verification information to a cloud server, wherein the request for the unlocking verification information is used to request the cloud server to return a verification code of a smart door lock, and the unlocking verification information includes a private key seed of the smart door lock and the trigger time; and receiving, by the mobile terminal, the verification code of the smart door lock for opening the smart door lock generated by the cloud server based on the private key seed and the trigger time.
CUSTOMIZED FOOD AND RECIPE ORDERING, PRODUCTION, LABELING, AND DELIVERY SYSTEM AND METHOD OF USE
An interactive and customizable food delivery system with a high degree of personalization. The system provides for the personalization of a product and product label thereby delivering a client-specified food product based upon their recipe input through a computer device interface. Through use of a computer interface, such as a mobile computing device or “smart phone,” personal computer, or even through a unique computerized kiosk located at a fixed location, the user can input recipes or order products from existing recipes. The product is prepared either locally or remotely and is then delivered or shipped to the user with a customized label indicating ingredients and other information.
CUSTOMIZED FOOD AND RECIPE ORDERING, PRODUCTION, LABELING, AND DELIVERY SYSTEM AND METHOD OF USE
An interactive and customizable food delivery system with a high degree of personalization. The system provides for the personalization of a product and product label thereby delivering a client-specified food product based upon their recipe input through a computer device interface. Through use of a computer interface, such as a mobile computing device or “smart phone,” personal computer, or even through a unique computerized kiosk located at a fixed location, the user can input recipes or order products from existing recipes. The product is prepared either locally or remotely and is then delivered or shipped to the user with a customized label indicating ingredients and other information.
Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance
A method of providing visual feedback to a driver based on data collected during vehicle operation. A processor at the vehicle analyzes vehicle data and determines when predetermined threshold values have been reached for particular parameters. Whenever such a threshold is reached, an audible indication is provided to the driver, indicating that the baseline has been exceeded. Certain parameters have at least two threshold values. When a first threshold value is reached, an alert is presented to the driver, but no data is recorded or reported. When a second threshold value is reached, another alert is presented to the driver, and data is recorded for reporting to a driver manager or supervisor. This approach provides a driver warning, that if they correct the triggering behavior, their supervisor is never notified of that behavior. However, if the behavior escalates, and the second threshold is breached, the behavior is recorded.