Abstract: Systems, devices, and methods for access control via a mobile device are described herein. One device includes instructions stored thereon executable by a processor to track a location of a mobile device in a facility based on communications between the mobile device and a plurality of beacons located in the facility, wherein the mobile device is associated with a particular user having access rights associated with the facility, determine that the mobile device is located in a particular area of the facility, determine whether the user is allowed access to the particular area based on the access rights, and provide a notification responsive to a determination that the user is not allowed access to the particular area.
December 31, 2018
Date of Patent:
August 4, 2020
Honeywell International Inc.
Magesh Lingan, Anantha Padmanabha Rahal U, Roshan Valder, Bryan Jones
Abstract: There is disclosed a secure remote actuation system that includes a network storing one or more acceptable inputs. The system also includes a central signal switch disposed inside an enclosure. The central signal switch stores therein the one or more acceptable inputs and user codes, which comprise a succession of the acceptable inputs. The system further includes a remote input receptor that, in turn, includes a user interface with a communication tilt plate that has a front side and a back side. The front side includes an outer touch surface. The back side includes electronic components mounted thereon, a raised center pivot and a plurality of spring loaded switches mounted thereon disposed around the periphery of the back side. As such, tilting the communication tilt plate by pressing proximate the periphery of the outer touch surface will activate two or more of the spring-loaded switches mounted on the back side of the tilt plate, thereby transmitting the one or more user codes.
Abstract: A system for managing communication with a movable object includes one or more processors configured to receive a request for movable object data from a requester in a movable object environment, determine whether movable object data corresponding to the request is available in a cache associated with a movable object manager, and, in response to determining that the movable object data is available in the cache, provide the movable object data in the cache to the requester.
Abstract: Messages may be passed between Radio Frequency Identification (RFID) tags using RFID readers. A first tag with a message intended for a second tag sends the message to an RFID reader. The reader then determines that the destination of the message is the second tag and sends the message to the second tag. The second tag may confirm receipt of the message by sending a receipt confirmation message to the reader for forwarding to the first tag, and/or the reader may itself confirm that the message was sent to the second tag by sending a transmit confirmation message to the first tag.
Abstract: A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.
December 21, 2018
Date of Patent:
July 14, 2020
Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
Abstract: The invention provides a worksite ingress/egress system for an enclosed worksite with a locked gate capable of being unlocked by an actuator upon receipt of a travel signal communicated via a communications network from an access computer system operating an access authorization system in communications with an identification system. Identification system comprises a reader configured to read a personal token presented by an individual seeking passage through locked gate. Access authorization system sends a pass signal to actuator after a successful parity check between data of a worksite criteria file and data related to said individual, the employer, and worksite.
Abstract: A monitoring terminal device (2) is a device for monitoring users entering and exiting an area. A controller (14) specifies each user entering the area as a first monitoring target or a first non-monitoring target in a first entry image and a first exit image. The first entry image and the first exit image exhibit the same first monitoring target. The first entry image includes an image of at least one user entering the area (22). The first exit image includes an image of at least one user exiting the area. The controller (14) creates a second entry image by performing a first marking process on the first entry image. The controller (14) creates a second exit image by performing a second marking process on the first exit image. An image display section (18) displays at least one of the second entry image and the second exit image.
Abstract: A wireless access device deployed at a traffic station performs short-range wireless communication with a mobile device associated with a target user and entering a signal coverage area of the traffic station. An association between identity information of the target user and the traffic station is detected. An image capture device deployed at the traffic station obtains a facial image of the target user and matches the facial image against facial image samples in a dynamic facial sample library. A gate associated with the traffic station is controlled based on a result of a matching operation performed with the facial image and the facial image samples in the dynamic facial sample library.
Abstract: A connecting device operating as a gateway in communicating information to a lock device using a first bandwidth wireless communication protocol, and which also operates temporarily as an access point for communicating other information with the lock device using a second bandwidth wireless communication protocol. Temporary, random credentials may be used to establish a one-time connection with the connecting device via the access point. Upon completion of the transfer of information using the second bandwidth wireless communication protocol, the access point may be terminated, and the generated credentials may become obsolete. The server may also attempt to balance a load on the server by scheduling the timing of at least certain types of communications to lock device based on matching periods of time in which usage of the lock device is low with times that would allow for a balance of the load on the server.
Abstract: A vehicle management system includes an acquisition unit configured to acquire a manipulation list including one or a plurality of vehicle manipulations set when electronic key data of a vehicle is issued to a user device, a detection unit configured to detect that the vehicle manipulation included in the manipulation list has been performed when the vehicle is being used using the electronic key data of the user device, and a notification unit configured to notify an owner terminal related to an owner of the vehicle that the vehicle manipulation included in the manipulation list has been performed, after the detection of the detection unit.
Abstract: A method for a positioning server configured to locate positioning devices and to maintain information on users, who are associated with respective positioning devices. The server receives one or more alert messages from an alerting positioning device. Each alert message conveys identifying information of the alerting positioning device. The server uses the identifying information to retrieve a location estimate of the alerting positioning device. The server forms a first set of other positioning devices in a vicinity of the alerting positioning device and sends an assist request message to the positioning devices in the first set. The assist request message indicates the location estimate of the alerting positioning device and/or said descriptive information.
October 19, 2018
Date of Patent:
May 19, 2020
AiRISTA Flow, Inc., AiRISTA International Oy
Abstract: A system including a reader device and a mobile device having a user credential. The reader device includes an ultrasonic transmitter configured to transmit an identifier, and a wireless transceiver configured to receive information from and transmit information to the mobile device. The identifier is configured to be received by a microphone of the mobile device. The mobile device may determine a position of the mobile device based on the identifier.
Abstract: Exemplary embodiments of the present disclosure are related to a distributed system in which wearable devices communicate with computing systems to implement one or more actions or operations and sensor data transmitted by the wearable devices to the computing systems can be utilized to determine information about tasks being performed by the wearers of the wearable devices after consent is given and verified. Embodiments of the distributed system can include the wearable devices, wireless receivers (or transceivers), and a computing system.
July 15, 2019
Date of Patent:
April 21, 2020
Walmart Apollo, LLC
Cathy Gibbs, Christopher Soames Johnson, Kathleen Elizabeth Pearson
Abstract: A method, apparatus and a computer-readable medium for securing an automobile ignition key, including scanning an authorized user's fingerprint, as well as inputting a security code chosen by the authorized user. Verifying users whether they are authorized to access the automobile ignition key, allowing a user when verified, and denying access when the verification steps fails.
Abstract: A boarding door control system controls opening and closing of a boarding door of a vehicle. The boarding door control system includes an odor detector and an electronic control unit. The odor detector is configured to detect an odor of a user outside the vehicle. The electronic control unit is configured to, when the odor of the user outside the vehicle, detected by the odor detector, is stronger than or equal to a predetermined threshold, prohibit opening of the boarding door.
Abstract: The present disclosure provides a method for unlocking an air conditioning unit, including: when a server receives first identity information and unit information from a mobile terminal, performing a verification of the first identity information based on the unit information; and sending an unlocking instruction to the air conditioning unit corresponding to the unit information when the first identity information is verified, such that the air conditioning unit performs an unlocking operation based on the unlocking instruction. The present disclosure also provides a device for unlocking an air conditioning unit and a server. The present disclosure realizes unlocking the air conditioning unit when the first identity information is verified, thus ensuring that the current operator (user) is an authorized operator, and thus further avoiding problems that the air conditioning unit still have malfunctions and that irreversible damages are caused to the air conditioning unit.
Abstract: An aircraft and system of doors for providing security to a flight deck of the aircraft, and methods for operating the same, are provided. A passenger cabin is separated from a flight deck by an aisle that includes doors at either end. The doors are locked by a controller and one of the doors may only be unlocked, during a flight, if the remaining door is locked. As a result, a pilot can access a lavatory in the aisle in a secure manner. Additionally, the door closest to the passenger cabin may include a window that allows the pilots to view the passenger cabin through a peephole in the flight deck door. The controller may selectively dim or block a view through the window to prevent monitoring of the pilots' movements onto and off of the flight deck.
Abstract: An embodiment of the invention provides a system and or method for combining wireless kill switch functionality and key either mechanical or wireless or other form of access control components. Embodiments of the invention comprise hardware including but not limited to, processing circuitry and wireless transceiver to fulfill the function as both a key or access control device and wireless kill switch.
Abstract: A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.
Abstract: A method for wirelessly accessing a vehicle including the steps of: exchanging data between a UID-transponder and the vehicle to verify authorization of the UID-transponder, triangulating a location of UID-transponder relative to the vehicle using at least three first antennas being positioned at three different first positions of the vehicle and providing access to the vehicle under the first authorization condition that the UID-transponder is identified as an authorized UID-transponder and if the location meets a second authorization condition as well, to recognize a relay attack.