Abstract: Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag's unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.
Abstract: Concepts and technologies disclosed herein are directed to secondary short-range wireless assist for wireless-based access control. According to one aspect, a method can include receiving, at an access control system, a first identifier via a near-field communications (“NFC”) reader associated with an entryway to an area. The NFC reader can receive the first identifier from an NFC component of a mobile device. The method can include receiving, at the access control system, a second identifier via a wireless transceiver associated with the area. The wireless transceiver associated with the area can receive the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway. The method can also include determining, by the access control system, that the first identifier and the second identifier constitute an authentication pair that identifies the mobile device as being authenticated to access the area.
Abstract: An on-vehicle apparatus control system includes: an on-vehicle control device; and a portable machine. The on-vehicle apparatus control system includes: a mode switching unit that selects a permission mode or a prohibition mode; and an illegality recording portion that records transmission or reception of a response request signal as illegality history in a case where the response request signal is transmitted from the on-vehicle control device or is received by the portable machine during the prohibition mode. If the response request signal is received by the portable machine during the permission mode, the portable machine transmits the response signal. If the response request signal is received by the portable machine during the prohibition mode, the portable machine transmits an illegality notification signal instead of the response signal, and the on-vehicle control device does not control an on-vehicle apparatus if the illegality notification signal is received.
Abstract: A base station may include a transceiver, an indicator, and a processor programmed to detect presence of a key fob using one or more inputs. When the key fob is detected, the processor may direct the transceiver to broadcast an interference signal using the transceiver to prevent the key fob from detecting and responding to challenge requests and set the indicator to indicate presence of the broadcast. When an access request is received from a modem, using the transceiver the base station may temporarily discontinue broadcast of an interference signal to send a challenge request to the key fob and receive a challenge response, and send a response to the access request including information based on the challenge response.
Type:
Grant
Filed:
April 11, 2016
Date of Patent:
April 10, 2018
Assignee:
Livio, Inc.
Inventors:
John Robert Van Wiemeersch, Joey Ray Grover, Scott Smereka, Justin Dickow
Abstract: One variation of a method for controlling access to products from a vending machine includes: locking a door of the vending machine; recording an initial inventory of products arranged within the vending machine based on signals received by a radio antenna arranged within the vending machine and read by a radio frequency identification reader; initiating a transaction in response to receiving a cashless payment mechanism from a patron; unlocking the door in response to authentication of the cashless payment mechanism; in response to closure of the door, recording a final inventory of products within the vending machine based on signals received by the radio antenna and read by the radio frequency identification reader; and initiating a payment with the cashless payment mechanism for a difference between the initial inventory and the final inventory to complete the transaction.
Type:
Grant
Filed:
April 27, 2016
Date of Patent:
April 3, 2018
Assignee:
Byte Foods, Inc.
Inventors:
Artem Tkachenko, Alexander Yancher, Zhongning Chen, Christopher Alika Ah New
Abstract: Systems and methods are provided for on-demand delivery of a payload by an unmanned vehicle. An unmanned vehicle may comprise a chamber configured to house a payload and adjust a payload state. The payload state may be adjusted based on detection of a tampering event. An unmanned vehicle may also comprise an authentication system configured to allow access to the payload.
Abstract: A method for inferring real world identities is provided. The method includes receiving an authenticated copy of a document, the document having identification information and the document subject to a security check. The method includes providing evidence that an owner of the authenticated copy of the document passed the security check validating the identification information contained in the document. The method includes asserting that a device is associated with a real-world identity corresponding to the identification information listed in the authenticated copy of the document, in response to a determination that the owner of the authenticated document entered the secured area. At least one method operation is executed through a processor.
Abstract: A system and a method are provided for authenticating a requester seeking service. In response to a received request, the system selects a random biometric behavior. A request to provide the selected behavior is output by the system. Evaluation circuitry compares a received behavioral response from a requester to information from an authorized user database and determines if the requested service should be provided.
Abstract: Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned vehicles analyzes the messages that it received from the other unmanned vehicle to determine whether any of the received messages warrants changing a set of tasks it was planning to perform. When a message indicates that a task should be changed, the task is updated accordingly.
Type:
Grant
Filed:
March 27, 2015
Date of Patent:
March 6, 2018
Assignee:
Amazon Technologies, Inc.
Inventors:
Darren Ernest Canavor, Varadarajan Gopalakrishnan, Jesper Mikael Johansson, Jon Arron McClintock, Brandon William Porter, Andrew Jay Roths
Abstract: A system includes a remote controller, such as a fob, and a base station at a target device, such as a vehicle. The remote controller and the base station are configured to communicate authorization communications and time-of-flight (ToF) communications between one another over a common communications channel. The base station is further configured to confirm from the authorization communications whether the remote controller is authorized for controlling a function of the target device and to confirm from the ToF communications whether the remote controller is within a predetermined range of the target device. The base station is further configured to prevent the function from being controlled by the control unit when the control unit is not within the predetermined range of the target device.
Type:
Grant
Filed:
January 20, 2017
Date of Patent:
March 6, 2018
Assignee:
Lear Corporation
Inventors:
Riad Ghabra, Robert Mariani, Keith A. Christenson
Abstract: The present disclosure provides a wireless communications system for a fleet of automotive vehicle comprising: a server in communication with a wireless wide area network and including a database; a fob including a memory storing a unique fob identifier, the fob in communication with a wireless local area network; and a control unit in the automotive vehicle including a memory storing a vehicle identifier. The control unit is in communication with the server via the wireless wide area network and with the fob via the wireless local area network, wherein the server stores data correlating the fob identifier to the vehicle identifier in the database, and when the fob transmits a communication to the vehicle through the local area network the vehicle accesses the database to validate the key fob.
Type:
Grant
Filed:
December 2, 2014
Date of Patent:
February 20, 2018
Assignee:
Huf North America Automotive Parts Manufacturing Corp.
Abstract: A computer-implemented method may conceal sensitive data displayed within a viewport of a display of a client computing device, such as sensitive data relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may receive a user credential authenticating a user of the computing device and determine that a sensitive data flag has been triggered. The sensitive data flag may indicate that sensitive user data is displayed within a viewport of the computing device. The method may also initiate a biometric detection service, application, and/or functionality in response to determining that the sensitive data flag has been triggered and detect a first biometric identifier belonging to the user of the computing device. The method may further detect a second biometric identifier belonging to someone other than the user, and obscure the sensitive user data displayed within the viewport of the computing device.
Type:
Grant
Filed:
August 24, 2015
Date of Patent:
February 20, 2018
Assignee:
STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
Abstract: A computer-implemented method may conceal sensitive data displayed within a viewport of a display of a client computing device, such as sensitive data relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may receive a user credential authenticating a user of the computing device and determine that a sensitive data flag has been triggered. The sensitive data flag may indicate that sensitive user data is displayed within a viewport of the computing device. The method may also initiate a biometric detection service, application, and/or functionality in response to determining that the sensitive data flag has been triggered and detect a first biometric identifier belonging to the user of the computing device. The method may further detect a second biometric identifier belonging to someone other than the user, and obscure the sensitive user data displayed within the viewport of the computing device.
Type:
Grant
Filed:
August 24, 2015
Date of Patent:
February 20, 2018
Assignee:
STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
Type:
Grant
Filed:
June 27, 2013
Date of Patent:
February 6, 2018
Assignee:
International Business Machines Corporation
Inventors:
Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
Abstract: Systems, methods, and computer program products for providing secure messaging communications are disclosed. For example, a computer-implemented method may include receiving an encrypted message and a key from a sender associated with a first computing device where the encrypted message is generated by the first computing device, verifying the received key at least in part based on a comparison with a pre-determined key, processing one or more unique factors associated with the sender in view of verifying the received key, decrypting the encrypted message, re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device, and sending the re-encrypted result to the receiver associated with the second computing device.
Abstract: A password setting method includes the following steps of: providing a lock body, which is configured with identification data; providing a reset device including a RFID, which has characteristic data; accessing the RFID to obtain the characteristic data; transmitting the characteristic data to the lock body; comparing the characteristic data and the identification data; and when the characteristic data matches the identification data, enabling a password setting function of the lock body. In addition, a password setting system and a lockset matching method and system are also disclosed.
Abstract: A surveillance system includes one or more camera systems at least some of the camera systems including a camera element comprising optical components to capture and process light to produce images, camera processing circuitry that receives the light and processes the into electrical signals and encodes the signals into a defined format, power management circuitry to power the camera system, the power management system including first and second power interfaces and first and second video output interfaces.
Abstract: A system and a method for causing a garage door to open using a garage door opener having a wireless receiver is provided. The system comprises an interface coupled to an environment sensor and configured to receive data from the environment sensor. The system can include processing electronics coupled to the interface and configured to receive the data from the interface and to use the received data to determine whether an environmental condition exists. The processing electronics provide a command to cause the garage door opener to open the garage door based on the determination of whether the environmental condition exists.
Type:
Grant
Filed:
December 31, 2015
Date of Patent:
December 5, 2017
Assignee:
GENTEX CORPORATION
Inventors:
Richard J. Chutorash, Philip J. Vanderwall
Abstract: A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag (308) is enabled to generate a Tag Authentication Cryptogram (TAC) and include the TAC in a data signature transmitted (S305) to a reading device (304). The data signature can be forwarded by the reading device (304) to an authentication service (340) that will issue a valid signature certificate (S309) if the TAC is determined to be unique and correct. Upon receiving the valid signature certificate, the reading device (304) can validate other data read from the smart tag (308) based on the increased trust relationship between the smart tag (308) and reading device (304).
Abstract: Methods and apparatuses for Bluetooth device management in a technical field of wireless communications are disclosed herein. The method for Bluetooth device management comprises establishing a Bluetooth connection between a first terminal device and a Bluetooth device; receiving, by the first terminal device, control data sent by at least a second terminal device connected to the first terminal device, wherein the control data is used to control the Bluetooth device; and sending, by the first terminal device, a Bluetooth control message associated with the control data to the Bluetooth device.
Type:
Grant
Filed:
October 20, 2016
Date of Patent:
November 14, 2017
Assignees:
Qingdao Yeelink Information Technology Co., Ltd., Xiaomi Inc.
Abstract: Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality.
Abstract: Cross-contamination prevention systems and cross-contamination prevention methods are provided for defining and automatically enforcing access restrictions between environments where cross-contamination may occur. The system and methods can evaluate a person's exposure to contaminants in one or more locations against contamination risk posed for another location. The system can prevent or allow access to the other location based on that evaluation. Some embodiments can be implemented in a laboratory setting and configured to prevent cross-contamination between different laboratories and/or experiments being conducted.
Abstract: Systems and methods for a material handling vehicle include a controller and a near field communication reader adapted to communicate with the controller. The controller is configured to activate at least one of a software option and a hardware option when a near field communication device encoded with option information is placed within an operable range to the near field communication reader.
Type:
Grant
Filed:
March 10, 2014
Date of Patent:
August 1, 2017
Assignee:
The Raymond Corporation
Inventors:
Joshua Daniel Vanderpool, Timothy Edward Donahue
Abstract: Approaches are provided for a predictive electrical appliance power-saving management mode. An approach includes ascertaining a location and pace of a mobile device. The approach further includes calculating an amount of time that it will take to enable or start programs and services upon a computing device waking from a sleep mode or hybrid sleep mode. The approach further includes determining a distance threshold to the computing device that allows for the calculated amount of time to pass such that the programs and services are enabled or started prior to a user of the mobile device arriving at the computing device when the user is returning to the computing device at the ascertained pace. The approach further includes sending a signal to awaken the computing device from the sleep mode or hybrid sleep mode when the mobile device is within the distance threshold.
Type:
Grant
Filed:
February 25, 2015
Date of Patent:
June 20, 2017
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
James E. Bostick, John M. Ganci, Jr., Sarbajit K. Rakshit, Kimberly G. Starks
Abstract: The technology disclosed can provide methods and systems for identifying users while capturing motion and/or determining the path of a portion of the user with one or more optical, acoustic or vibrational sensors. Implementations can enable use of security aware devices, e.g., automated teller machines (ATMs), cash registers and banking machines, other secure vending or service machines, security screening apparatus, secure terminals, airplanes, automobiles and so forth that comprise sensors and processors employing optical, audio or vibrational detection mechanisms suitable for providing gesture detection, personal identification, user recognition, authorization of control inputs, and other machine control and/or machine communications applications. A virtual experience can be provided to the user in some implementations by the addition of haptic, audio and/or other sensory information projectors.
Type:
Grant
Filed:
March 13, 2015
Date of Patent:
June 13, 2017
Assignee:
Leap Motion, Inc.
Inventors:
Maxwell Sills, Aaron Smith, David S. Holz, Hongyuan (Jimmy) He
Abstract: In a method for operating a vehicle barrier (1) having a barrier column (2), a barrier arm (4) and a drive mechanism for pivoting the barrier arm (4) between a blocking position and an open position, a camera (7) is used for vehicle recognition, for the license plate recognition, for recognizing a following vehicle and for monitoring for vandalism, and the images thereof are evaluated by an electronic evaluation logic that is coupled to control of the vehicle barrier (1).
Type:
Grant
Filed:
March 5, 2015
Date of Patent:
May 30, 2017
Assignee:
SKIDATA AG
Inventors:
Guido Harucksteiner, Thomas Schlechter, Reinhard Surkau
Abstract: A remote function control system is for a vehicle including a data communications bus and coupled to a plurality of vehicle devices, and a wired electrical power system. A wireless data bus device may be coupled to the power system and include a wired interface coupled to the data bus, and a first wireless device coupled to the wired interface. A remote function device may be coupled to the power system and include a second wireless device to wirelessly communicate within the vehicle with the first wireless device, a third wireless device to wirelessly communicate with a remote control device away from the vehicle, and a controller to permit communication between the remote control device and a vehicle device(s) coupled to the data bus. A wireless security sensor may be positioned within the vehicle and coupled to the power system, and wirelessly communicate with the first wireless device.
Abstract: The invention relates to a method for detecting an operator control event using a sensor arrangement having at least one proximity sensor and a sensor controller, the operator control event being generated by a user of a vehicle. A first coarse evaluation of the sensor measured values for the occurrence of an operator control sign is carried out, that a predetermined number of the respective last sensor measured values of at least one sensor element are buffered, that the detection of an operator control sign triggers a fine evaluation of the sensor measured values for verifying the occurrence of an operator control event at a triggering time, and that the fine evaluation is based on the buffered sensor measured values and on the temporally subsequent sensor measured values, with the result that sensor measured values both before and after the triggering time are included in the fine evaluation.
Abstract: A remote control method with identity verification mechanism is suited for a wearable device. The remote control method includes the following steps. Detecting whether the wearable device is close to a target device within a specific distance is performed. If the wearable device is close to the target device within the specific distance, a fingerprint data inputted by the user is obtained from the wearable device and determined whether the fingerprint data matches a predetermined fingerprint data. If yes, a control command is sent to the target device.
Abstract: Systems and methods are provided that include preventing access to users of an access control system, for example, by facilitating an administrator temporarily forbidding access by all users to one or more areas secured by one or more doors associated with one or more card readers. Some methods can include reading a first management card at a first card reader, identifying a first group of which the first card reader is a part, identifying a plurality of card readers in the first group, and updating a database device to indicate that access via the first card reader or any card reader in the plurality of card readers is forbidden.
Abstract: According to one embodiment, when a control unit is notified of information in at least one second signal received by one of first and second wireless communication units after the control unit provides the second wireless communication unit with a command to transmit a first signal containing first address information and before a waiting time elapses and when the at least one second signal contains second address information assigned to an authentication apparatus having received the first signal, then the control unit provides the first wireless communication unit with a command to transmit a third signal for a connection request with the second address information set in a destination address.
Type:
Grant
Filed:
September 4, 2013
Date of Patent:
April 4, 2017
Assignee:
KABUSHIKI KAISHA TOSHIBA
Inventors:
Tomoko Adachi, Seiichiro Horikawa, Koji Akita, Ryoko Matsuo
Abstract: A material-discerning proximity sensor is arranged to include an antenna that is arranged to radiate a radio-frequency signal. A capacitive sensor is arranged to detect a change in capacitance of the capacitive sensor and to receive the radio-frequency signal. An electrical quantity sensor is arranged to detect a change of the received radio-frequency signal and a change of a radio-frequency signal at an output of the at least one band pass filter.
Abstract: Methods and systems for facilitating exchanges of keys between individuals across multiple locations are provided. Each key set is assigned a unique key identifier. The key identifier is encoded on a key chain attached to the key set. A key set is picked up or dropped off at a key exchange center and is scanned to read the key identifier. The key identifier is relayed to a key exchange server which tracks key locations. The key exchange server verifies that an individual is authorized to pick up a key set and provides instructions to a device at the key exchange center to enable access to the key set. The key exchange server coordinates drop-off of a key set by updating the key location associated with the key identifier at drop-off and providing instructions to a device at the key exchange center for storage of the key set.
Type:
Grant
Filed:
January 15, 2014
Date of Patent:
February 28, 2017
Assignee:
KEYCAFE INC.
Inventors:
Clayton Carter Brown, Jason Robert Crabb
Abstract: A material-discerning device is arranged to include an antenna, a proximity sensor, a band pass filter and a processor. The antenna radiates a radio-frequency signal and a material object is located in the field created by the antenna and near the proximity sensor. Change in the amplitude of the radio-frequency signal due to the presence of the material object is detected by the proximity sensor. The change in amplitude of the radio-frequency signal is stored. The frequency of the radio-frequency signal is changed and the process is repeated until a range of frequencies have been swept and stored. After the range of frequencies has been swept and stored, the processor determines the type of material of the material object using the results of the changes in amplitude of the radio-frequency signals.
Abstract: A system includes a processor, configured to wirelessly communicate with at least a vehicle computing system, wherein the processor is further configured to receive input from a vehicle owner indicating that transfer of administrative rights to vehicle systems is desired. The processor is further configured to send a confirmation message to a new owner of the vehicle and send a confirmation request to the vehicle computing system, following receipt of a response to the first confirmation message. Also, the processor is configured to establish the new owner as having administrative rights upon receipt of a response to the confirmation request.
Type:
Grant
Filed:
May 3, 2012
Date of Patent:
February 14, 2017
Assignee:
Ford Global Technologies, LLC
Inventors:
Brian Petersen, Robert Bruce Kleve, Ritesh Pandya, Michael Kruntovski
Abstract: Various systems and methods for implementing automatic image metatagging are described herein. A system for metatagging media content comprises a camera system; a user input module to receive user input from a user to capture media content via the camera system; a camera control module to: activate the camera system to capture a scene, and obtain an image with at least a portion of a face of the user; a user identification module to identify the user based on the image; and a metatagging module to tag the scene with the user as an author of the scene.
Abstract: Methods, systems, and products monitor the environmental conditions in an enclosed environment, such as a garage or storage shed. If a dangerous environmental condition is determined, such as elevated carbon monoxide, an entry door may be opened. If further remedial measures are required, ignition of an internal combustion engine may be prohibited.
Abstract: Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Type:
Grant
Filed:
December 1, 2014
Date of Patent:
January 10, 2017
Assignee:
EBAY INC.
Inventors:
Christopher Diebold O'Toole, Bryant Genepang Luk, Robert He, Richard Chapman Bates, Jennifer T. Brenner, Yu Tang
Abstract: Methods and systems for use in exchanging information between aircraft at an airport are provided. The system includes a power system capable of providing power to each of the plurality of vehicles via an electric cable, at least one off-board broadband over power lines (BPL) module coupled to the power system. The at least one off-board BPL module is capable of communicating via the electric cable with an onboard BPL module on each of the plurality of vehicles. The system also includes a network coupled to each of the at least one off-board BPL modules for communicatively coupling each of the at least one off-board BPL modules such that the plurality of vehicles can exchange information via the network.
Type:
Grant
Filed:
August 16, 2012
Date of Patent:
December 6, 2016
Assignee:
The Boeing Company
Inventors:
Radhakrishna G. Sampigethaya, Timothy M. Mitchell, Anil L. Kumar
Abstract: A notification method includes the steps of: (a) receiving an operation signal for operating an electrical appliance; (b) determining whether or not to deny an operation indicated by the operation signal; and (c) when the step (b) determines to deny the operation, causing an electronic message board to display thereon an object indicating that the operation is denied.
Abstract: A method for unlocking a door, a method for renting asset and a system thereof are provided in the present invention. The door includes an audio receiver, and the method includes the steps of: storing a unlock sequence into a mobile device; performing a audio modulation to generates a audio modulation voiceprint signal, wherein the frequency range of the audio modulation voiceprint signal is in the audio frequency; playing the audio modulation voiceprint signal by using the speaker of the mobile device; when the audio receiver receives the audio modulation voiceprint signal, the method further includes: performing a audio demodulation to obtain the unlock sequence; and determining whether the door is unlock or not according to the unlock sequence.
Type:
Grant
Filed:
August 12, 2014
Date of Patent:
October 11, 2016
Assignee:
GENERALPLUS TECHNOLOGY INC.
Inventors:
Kung-Wang Lee, Chia-Sheng Hsu, Cheng-Chiang Liu, Chih Hsiang Yang
Abstract: Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag's unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.
Abstract: Methods, apparatus and articles of manufacture for adding entropy to key generation on a mobile device are provided herein. A method includes generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface manipulation measures associated with the one or more input elements; and resolving the authentication request based on said processing.
Type:
Grant
Filed:
June 26, 2013
Date of Patent:
August 2, 2016
Assignee:
EMC Corporation
Inventors:
Yedidya Dotan, Lawrence N. Friedman, Daniel V. Bailey, John Brainard, William M. Duane
Abstract: Systems and techniques are presented for enabling fail-safe operation of an automatic pedestrian access control gate during a health and safety event. Gateline sensor data is received from at least one gateline sensor. The gateline sensor data indicates that an event concerning health and safety has occurred. An alert is generated in response to receiving the gateline sensor data. The alert is transmitted to a remote monitoring device that is remote from the access control gate. A determination is made that a preset amount of time has elapsed since transmitting the alert. A further determination is made that an acknowledgement of the alert has not been received. Based on determining that the preset amount of time has elapsed and determining that the acknowledgement has not been received, a predefined action is triggered.
Abstract: A mobile station UE according to the present invention includes a control unit 13 that is configured not to transmit “RRC Connection Request” to a predetermined network when recognizing that the predetermined network is incompatible with an MTC function based on signaling from the predetermined network.
Abstract: The present invention relates to a gate system which uses overlapping radiation patterns to deduce when an item is entering a warehouse and when an item is leaving a warehouse, for example, for loading onto a truck. The present invention stores information relating to the direction the item moved and actuates an alarm if the item is moved in an unexpected direction. The radiation patterns of the gates are angled such that one radiation pattern from a first antenna is directed towards the loading dock, while another radiation pattern from a second antenna is directed towards the interior of the building. Overlapping the radiation patterns allows the logic circuitry to account for the item as it moves from one side of the gate system to the other.
Abstract: One variation of a method for controlling access to products from a vending machine includes: locking a door of the vending machine; recording an initial inventory of products arranged within the vending machine based on signals received by a radio antenna arranged within the vending machine and read by a radio frequency identification reader; initiating a transaction in response to receiving a cashless payment mechanism from a patron; unlocking the door in response to authentication of the cashless payment mechanism; in response to closure of the door, recording a final inventory of products within the vending machine based on signals received by the radio antenna and read by the radio frequency identification reader; and initiating a payment with the cashless payment mechanism for a difference between the initial inventory and the final inventory to complete the transaction.
Type:
Grant
Filed:
March 7, 2014
Date of Patent:
May 24, 2016
Assignee:
Pantry Retail, Inc.
Inventors:
Artem Tkachenko, Alexander Yancher, Zhongning Chen, Christopher Alika Ah New
Abstract: A composite device includes an RFID device and a controller. The controller allows the RFID to respond to a query from an external source only when the composite device is at a predetermined location. In this manner, a code associated with the RFID is not released by the RFID anywhere in the world except at the location of the query requester.
Abstract: A method of certifying a user is provided. The method includes: generating a learning system; if a reference image is registered, analyzing the reference image by using the learning system to detect characteristic information; storing the detected characteristic information; photographing a user to acquire a user image; analyzing the user image by using the learning system to detect face characteristic information and additional information of the user; and comparing the face characteristic information and the additional information with stored characteristic information to certify the user. Therefore, a user certification is accurately performed.
Type:
Grant
Filed:
December 2, 2013
Date of Patent:
April 26, 2016
Assignee:
SAMSUNG ELECTRONICS CO., LTD.
Inventors:
Sang-yoon Kim, Ki-jun Jeong, Hee-seob Ryu, Mikiyas Teshome, Seung-kwon Park
Abstract: An information processing device includes an image acquirer that acquires a shot image of a user, a registered user information holder that holds face identification data of a registered user, and a first authentication section that detects a face image of a registered user existing in the shot image by using face identification data held in the registered user information holder. The information processing device further includes a second authentication section that detects an image of an object having a predetermined positional relationship with a region of the face image detected by the first authentication section, and an information processing section that executes information processing based on detection results by the first authentication section and the second authentication section. The second authentication section uses information obtained in detection processing by the first authentication section for detection processing of the image of the object.
Type:
Grant
Filed:
October 22, 2014
Date of Patent:
April 19, 2016
Assignees:
SONY CORPORATION, SONY COMPUTER ENTERTAINMENT INC.