Timed Access Blocking Patents (Class 340/5.28)
  • Patent number: 6774763
    Abstract: An apparatus for activating and/or deactivating a security device, particularly an entry device for a motor vehicle, having a portable transmitter unit for wirelessly transmitting a coded information item which is received by a receiver apparatus and is compared with a prescribed coded information item, the receiver apparatus being capable of outputting an actuation signal to the security device if the two coded information items match, and wherein the codes of the transmitter unit and the receiver apparatus can be updated in terms of the currently coded information items to prevent unauthorized use of the motor vehicle.
    Type: Grant
    Filed: December 13, 2000
    Date of Patent: August 10, 2004
    Assignee: Mannesmann VDO AG
    Inventors: Hans-Peter Lässle, Dietmar Schmid
  • Publication number: 20030210128
    Abstract: A system and method for permitting different authorized degrees of access to two or more users of a vehicle in a fleet of vehicles. Each user has a radio (RF) transponder coupled to an ignition key that operates the ignition switch of the vehicle. The transponder stores data indicating the degree of operating access authorized to each user for the vehicle.
    Type: Application
    Filed: April 29, 2003
    Publication date: November 13, 2003
    Inventor: Peter J. Dix
  • Publication number: 20030184431
    Abstract: Method and arrangement for controlling authorization for access to an object, in which a signal communication via electromagnetic waves is established between the object and a wireless portable unit when a tripping device on the object is actuated. The signal communication includes at least one first signal (X1 . . . Xn) that is sent from the object to the portable unit, and at least one second signal (Y3, Z1 . . . Zn) that is sent from the portable unit to the object in response to the first signal(s). The second signal(s) includes sufficient information for verifying that the portable unit has an approved identity. The verification information is checked, a distance is measured between the object and the portable unit and the authorization is confirmed if both the checked verification information is approved and the measured distance is less than a predetermined value.
    Type: Application
    Filed: April 23, 2003
    Publication date: October 2, 2003
    Applicant: VOLVO TEKNISK UTVECKLING AB
    Inventor: Ola LUNDKVIST
  • Patent number: 6624744
    Abstract: This invention relates to the control of rental vehicles that are operated on a pay for usage basis. With this invention, operation of a vehicle is limited to those that have either paid for its use, or those that must have access to it for the purpose of maintaining it. Central to this invention is the integration of the Point of Sale payment process with the golf cart operation through the use of a readily available portable electronic messenger commonly known as an iButton.
    Type: Grant
    Filed: October 5, 2001
    Date of Patent: September 23, 2003
    Inventors: William Neil Wilson, Lars William Johnson
  • Publication number: 20030146820
    Abstract: An electronic key system has a portable apparatus, an operation control device and an update control device. The portable apparatus selectively transmits a first signal and a second signal. The operation control device authorizes an operation of a key based on reception of the first signal. The update control device transmits an update signal in a private region of the owner of the portable apparatus. The portable apparatus has a counter and a portable apparatus controller. When receiving the update signal, the portable apparatus controller resets the counter. When the counting value of the counter is equal to or less than a predetermined limit value, the controller selects the first signal as a signal to be transmitted. When the counting value is in excess of the limit value, the controller selects the second signal as a signal to be transmitted.
    Type: Application
    Filed: February 4, 2003
    Publication date: August 7, 2003
    Applicant: Kabushiki Kaisha Tokai Rika Denki Seisakusho
    Inventors: Kimitake Takamura, Osamu Inagaki, Yuuji Shibagaki
  • Patent number: 6587032
    Abstract: A stealth system and method that allows a resource to be practically invulnerable to fast online brute-force attacks is disclosed. The method for controlling access to a computer resource consists in performing a user authentication procedure upon receiving a request from a user to access the computer resource. As part of the user authentication procedure, a password verification procedure is performed which comprises the steps of requesting a password from the user and comparing the entered password with an expected valid one. The next steps are to compute the number of ungranted access for the user during a predefined time interval N if the password matches the expected one and to grant access to the user only if the computed number is lower than a predetermined number K of authorized requests.
    Type: Grant
    Filed: November 26, 2001
    Date of Patent: July 1, 2003
    Assignee: International Business Machines Corporation
    Inventor: Francois-Dominique Gilles Armingaud
  • Publication number: 20030118187
    Abstract: A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. To provide even greater security, the transmitter is limited in the number of times it may perform a resynchronization procedure. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.
    Type: Application
    Filed: August 14, 2002
    Publication date: June 26, 2003
    Applicant: The Chamberlain Group, Inc.
    Inventor: James J. Fitzgibbon
  • Patent number: 6583712
    Abstract: The electronic supervisor and subordinate lock system employs an electronic lock as a supervisor lock and at least one other electronic lock as a subordinate lock. The supervisor lock controls and/or authorizes the opening of one or more subordinate locks.
    Type: Grant
    Filed: January 6, 2000
    Date of Patent: June 24, 2003
    Assignee: Kaba Mas Corporation
    Inventors: Tim Reed, Gerald L. Dawson, Adrian Schaefer, Will Miracle
  • Publication number: 20030107470
    Abstract: The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device enables the input of user access data and a readout panel monitors the equipment status. A programmable feature selection member enables the user to select at least one programmable feature and respective activation time period. An internal member controls operation of the equipment by controlling access to one or more said programmable features based upon user selection, to enable full or partial activation of the device. A user is able to program specific events, such as TV shows, to be activated at specific times with controlled access by secondary access codes.
    Type: Application
    Filed: January 9, 2003
    Publication date: June 12, 2003
    Inventor: Darren Kady
  • Publication number: 20030071715
    Abstract: A door security system for a door having an electrically actuated lock. The lock is controlled by a lock controller having an audit trail memory. An entry code reader transmits entered access codes to the controller. The controller compares the entered access code to prestored access codes and actuates the lock in response to the comparison. The controller stores the entered access code and a time stamp in the audit trail memory.
    Type: Application
    Filed: September 17, 2002
    Publication date: April 17, 2003
    Applicant: Harrow Products, Inc.
    Inventors: Gary E. Lavelle, Peter S. Conklin
  • Patent number: 6549116
    Abstract: A key-verifying apparatus for quickly determining whether a key is legitimate, even when a legitimate key is determined not to be legitimate in at least a first iteration of key-verifying processing due to a communication fault or the like. An immobilizer ECU sends query data to a key transponder, receives response data from the transponder, generates auto-response data from the query data and key-discriminating data, and repeats key-verifying processing through determination as to whether the key is a legitimate until the key is determined to be legitimate or until a predetermined number of iterations are completed.
    Type: Grant
    Filed: July 1, 1999
    Date of Patent: April 15, 2003
    Assignee: Denso Corporation
    Inventors: Takayoshi Honda, Koichi Kinbara
  • Publication number: 20020186121
    Abstract: Access to restricted areas or devices are controlled by based on collecting information about the surrounding environment in connection with those restricted areas or service devices. Generally, one refers to service devices and access to service devices. Area access control can be viewed as being provided by a service device (e.g., an automated door or gate), access to which permits entry to (or exit from) a controlled area. Information about the surrounding environment includes, but is not limited to, the presence or absence of particular individuals, the presence or absence of other service devices, the location and/or proximity of other service devices, the location of the user requesting access to the service device, and so on. Based on knowledge of the surrounding environment, service access to the device can be permitted or denied.
    Type: Application
    Filed: January 17, 2002
    Publication date: December 12, 2002
    Applicant: Hitachi, Ltd.
    Inventors: Tatsuya Yoshikawa, Shigetoshi Sameshima, Katsumi Kawano, Toshihiko Nakano, Nobuhisa Kobayashi
  • Publication number: 20020041226
    Abstract: A vehicle disablement device detects whether it has been tampered with. If the vehicle disablement device determines that it has been tampered with, the vehicle disablement device sends a signal to a tamper disabler. The tamper disabler is then able to disable the vehicle in the same manner in which the vehicle disablement device disables the vehicle. Accordingly, the vehicle may be disabled even when the vehicle disablement device is tampered with.
    Type: Application
    Filed: September 18, 2001
    Publication date: April 11, 2002
    Inventor: Michael P. Simon
  • Publication number: 20020024418
    Abstract: A method for a key to selectively allow access to an unpowered enclosure having a lock controller is disclosed. The key provides wireless transmission of power with simultaneous transfer of data.
    Type: Application
    Filed: June 27, 2001
    Publication date: February 28, 2002
    Inventors: Raymond F. Ayala, Philip J. Finlay, Steven Shannon, Matthew D. Steindl, Woodrow C. Stillwagon
  • Publication number: 20020017977
    Abstract: A method and system for controlling use of software and hardware, and for controlling access to and usability of commodities, by use of position (or location) dependent signals emanating from GPS, DPGS, GLONASS, and other sources, in conjunction with time and ephemeris data, wherein the receipt of position (or location) data is verified by reference to independent time and satellite ephemeris data, and where when position (or location) is established within preloaded boundaries, the system is rendered useful. A module which includes software and/or hardware modules (implemented as chip sets in combination with mechanical actuators), and a position (or location) determining system such as a global positioning receiver, built into each device and/or shipping container used to transport devices and/or commodities for control.
    Type: Application
    Filed: August 3, 2001
    Publication date: February 14, 2002
    Inventor: Mark Emanuel Wall
  • Publication number: 20020014950
    Abstract: A method for programming a key for selectively allowing access to at least one enclosure having a lock controlled by a lock controller is disclosed. The method comprises: detecting the key; identifying the key by a static key number and a key user; identifying the at least one authorized enclosure corresponding to the identified key; loading the at least one authorized enclosure identification onto the key; generating a plurality of date sensitive key access codes; and loading the plurality of date sensitive key access codes in the key.
    Type: Application
    Filed: June 27, 2001
    Publication date: February 7, 2002
    Inventors: Raymond F. Ayala, Philip J. Finlay, Jeffrey L. King, Steven Shannon, Matthew D. Steindl, Woodrow C. Stillwagon