Entries |
Document | Title | Date |
20080197968 | Power Stand-Alone Electronic System - A self-powered electronic system for checking the authorization of individual persons to operate a device, comprising a first subsystem ( | 08-21-2008 |
20080211620 | Method of Authorization - A method for granting access to restricted areas such as computers, doors, vehicles, or other areas to which access by a user is controlled. An access code is transmitted from a central computer via radio waves to a user's radio terminal, such as a mobile telephone. The radio terminal transmits the access code over a short-range radio link to a communication device at the restricted area. The communication device transmits the access code to the central computer, which compares the received code with the code that the computer transmitted to the radio terminal to determine whether access should be granted. | 09-04-2008 |
20080211621 | Electronic Communication System, in Particular Authentication Control System, as Well as Corresponding Method - In order to provide an electronic communication system ( | 09-04-2008 |
20080211622 | Deliberate Access Permission To Data On Contactless Devices - A method for allowing access to data or logic implemented on a device ( | 09-04-2008 |
20080211623 | PERSONAL AUTHENTICATION METHOD AND APPARATUS SENSING USER VICINITY - A security device restricting access to various machines, places or data, using a security device that is kept in close proximity to a portion of the body of a person and is activated by an activation station to provide access to those machines, places or data to that person only when that person is confirmed to be an authorized person, and which is automatically deactivated when it ceases to be in close proximity to that person's body. | 09-04-2008 |
20080224822 | GAME ACCOUNT ACCESS DEVICE - Systems and methods for verifying the eligibility of players attempting to participate in gaming events are disclosed. Communication objects having RFID tags and closed electrical circuits are individually assigned to and worn by players within a gaming player verification system, which can be administered by a casino desk, hotel concierge, or other operating entity. These RFID tags are adapted to communicate with associated player tracking units attached to gaming machines and other devices via radio frequency waves, and each communication object is adapted to alter its communication pattern in response to any break of its closed electrical circuit. Bracelets, wristwatches or collars can be used as communication objects, such that the removal of such an object from a player cannot be accomplished without breaking the closed electrical circuit contained therein, thereby disabling or de-authenticating the device. A communications object may emit a signal which can be tied to one of two or more player accounts. One of the two accounts may be charged for a player transaction depending on the nature of the transaction. A computer server having a player verification program and database may also be used. | 09-18-2008 |
20080238608 | ANTI-THEFT SYSTEM AND METHOD - At least one exemplary embodiment is directed to an anti-theft method comprising: determining whether a user's authorization parameters match stored verification parameters; selecting a feature of a device to affect if the user's authorization parameters do not match the stored verification parameters; and gradually affecting the selected feature of the device. | 10-02-2008 |
20080238609 | Electric Hand Tool Device and Battery Pack Therefor - The invention relates to a battery-operated electric hand tool device ( | 10-02-2008 |
20080252412 | Method for Performing Driver Identity Verification - Method for assuring that the operator of a vehicle is an authorized driver, the method including utilizing an onboard, multi-mode driver identification system to ascertain whether an operator is an authorized driver. A first driver identification procedure is performed on a present operator of the vehicle and determining whether the present operator is an authorized or unauthorized driver of the vehicle. A second driver identification procedure is performed on the present operator of the vehicle and determining whether the present operator is an authorized or unauthorized driver of the vehicle, wherein the first and second driver identification procedures are performed with a time interval therebetween, the time interval being dependent upon the nature of the work being performed by the operator. A remedial measure is exercised to avert potentially negative impact when the present operator of the vehicle is determined to be an unauthorized driver based upon at least one of the performed identification procedures. | 10-16-2008 |
20080252413 | Information communication system, facility apparatus, user apparatus, and methods for controlling facility apparatus and user apparatus - An information communication system is capable of allowing a service provider at a facility to appropriately attend a user visiting the facility in accordance with an intention of the user. The information communication system includes a user apparatus carried by the user and a facility apparatus installed at a facility the user may visit. The user apparatus enters the user intention concerning the facility service provider and transmits intention information indicating the entered user intention to the facility apparatus capable of short range wireless communication. The user apparatus transmits appearance information indicating the user's captured face picture to the facility apparatus. When receiving the intention information from the user apparatus, the facility apparatus allows a display section to display the user intention indicated by the intention information along with the user's captured face picture indicated by the appearance information received from the user apparatus. | 10-16-2008 |
20080258863 | Method and a System for Proximity Evaluation - This invention relates to a method and a system for evaluating proximity. A reference object is moved such that it enters at least two different proximity areas of two different proximity indicators, whereby proximity indications are generated. The time difference between the indications is measured. If the time difference is within predefined range it is ascertained that the reference object is within a well defined area. Thus, the fact that the speed of movement of a physical object is significantly limited is used for obtaining reliable proximity evaluations. | 10-23-2008 |
20080266053 | Wireless enable/disable locking system - A wireless enable/disable locking system comprises a locking element configured to physically cooperate with a switch, the switch for enabling/disabling a wireless communication capability of a device, to lock the wireless communication state of the switch to either enabled or disabled. | 10-30-2008 |
20080272880 | DEVICE WITH IC, SOC OR SIP HAVING ONE OR MORE REMOTELY ENABLED MODULE AND METHODS FOR SELLING THE DEVICE - A device comprises an integrated circuit comprising N first circuit modules each having an enabled state, wherein N is an integer greater than zero and M second circuit modules each having a disabled state, wherein M is an integer greater than zero. A control module that outputs upgrade data including identification of the M second circuit modules for enabling the M second circuit modules, respectively, and that allows selection and enablement of at least one of the M second circuit modules by a purchaser based on payment of at least corresponding ones of M prices associated with said M second circuit modules. | 11-06-2008 |
20090009283 | Anti-Theft Location Check Device - An anti-theft device for an electronics apparatus, including (a) locating means for determining an actual location, (b) storage means for storing a permissible location, and (c) processing means connected to the locating means and storage means. The processing means is configured to retrieve the actual location from the locating means, and to compare the actual location against the permissible location. The processing means is further configured to disable at least part of the functionality of the electronics apparatus if the actual location is more than a predetermined distance from the permissible location. The processing means is further configured to enter the anti-theft device in a standby mode, wherein the electronics apparatus is never disabled by the anti-theft device, and the standby mode may be entered for a predetermined time period. | 01-08-2009 |
20090015370 | Method of Providing a Radio Service at a Remote Terminal - A method of providing a service at a remote terminal including receiving information broadcast by a commercial radio station in a broadcast radio channel; discriminating an identifier of an application within the received broadcast information; initiating an authentication process for authenticating broadcast information received via the broadcast channel; and in response to a positive authentication, enabling use of information received via the broadcast radio channel by the identified application. | 01-15-2009 |
20090015371 | SYSTEM AND METHOD OF CONTROLLING ACCESS TO SERVICES - The subject matter described herein generally relates to methods and systems for controlling access to services and more specifically relates to a method and a system for controlling access to a variety of services within security sensitive sites. In one embodiment, the invention provides a system for controlling access to a plurality of services within an area, each service of the plurality of services being associated with a service identifier identifying the service, the system comprising: at least one service device storing a service identifier for identifying a service among the plurality of services, each service device covering a proximity zone within the area and being capable of activating the service identifier stored by the service device for the user, in response to the detection of a user in the proximity zone; and an access control subsystem to control the access of a user to a service identified by a service identifier activated for the user. | 01-15-2009 |
20090021343 | RFID Intrusion Protection System and Methods - Systems and methods for RFID intrusion protection are defined. The system uses RFID sensors coupled with one or more servers to detect unauthorized scanning or programming of RFID tags. The system has active defense mechanisms to block unauthorized communications between a rogue RFID reader and one or more tags. Special IPS tags implement active defenses and log activity for tags that are not within the protected perimeter or in transit. | 01-22-2009 |
20090021344 | Method and System for Controlling an Ignition Switch and an Operational State of a Vehicle - Methods and systems for controlling an operational state of a vehicle having a keyless rotary ignition switch and a locking mechanism coupled to the keyless rotary ignition switch are provided. The locking mechanism is disengaged to allow the keyless rotary ignition switch to be rotated from a first position to a second position by a user when an electronic authorization is detected. The locking mechanism is engaged to prevent the keyless rotary ignition switch from being rotated from the first position to the second position by the user when no electronic authorization is detected. | 01-22-2009 |
20090033456 | Compact electronic security locker system - An embodiment of the present invention provides a compact electronic security locker system that includes an array of lockers, each of which is electronic locked and electronically accessed. One aspect of an embodiment of the present invention allows authorized personnel access to the identification of the person storing an article in a particular locker. In another aspect of an embodiment of the present invention, the storage lockers are arranged in a matrix of rows and columns and are constructed to have a size to accommodate items having a size of common cell phones. | 02-05-2009 |
20090040017 | SYSTEM AND METHOD FOR POWER MANAGEMENT DIRECTED TO IMAGE FORMING APPARATUS, AND USAGE MANAGEMENT APPARATUS OF IMAGE FORMING APPARATUS - A presence state inquiry unit refers to a use permission table stored in a data storage unit to extract a user permitted to use a target image forming apparatus, and inquires from an entry control server for a presence state of the extracted user in a particular area where the target image forming apparatus is placed A mode transition unit transmits a transition command to a lower power consumption mode to the target image forming apparatus when all the users permitted to use the target image forming apparatus exist outside the particular area. | 02-12-2009 |
20090040018 | APPARATUS AND METHOD FOR CONTROLLING KEY LOCK IN PORTABLE TERMINAL - An apparatus and method for controlling a key lock in a portable terminal are provided. The apparatus includes a keypad, a key buffer, and an input controller. The keypad has a plurality of key buttons and detects at least one key input. The key buffer temporarily stores input key information. The input controller stores the at least one key input, which is detected by the keypad, in the key buffer in a key lock state and determines if a combination of key inputs stored in the key buffer includes an unlock key combination. | 02-12-2009 |
20090058593 | Hazardous Material Transportation Monitoring Techniques - Method and arrangement for monitoring transport of hazardous materials includes arranging at least one sensor capable of detecting hazardous materials on a vehicle, transmitting information about the detection of hazardous materials by each sensor upon approach of the vehicle to infrastructure regulating the transport of the hazardous materials, and regulating the transit of the vehicle relative to the infrastructure based on whether any sensor provides information about the presence of hazardous materials on the vehicle. When the vehicles are trucks having trailers, each sensor can be arranged to detect hazardous materials in the trailer. When transit of hazardous materials through or over the infrastructure is prohibited, regulating the transit of the vehicle relative to the infrastructure may entail preventing the vehicle from passing through or over the infrastructure, e.g., by interposing a barrier to the vehicle's passage through or over the infrastructure. | 03-05-2009 |
20090079537 | Machine tool comprising an access control device - The invention relates to a machine tool | 03-26-2009 |
20090085717 | ENERGY-EFFICIENT ELECTRONIC ACCESS CONTROL - An embodiment of an electronic access control system includes an electronic key, an electronic lock, and an access control administration program. The electronic key can include program code for switching between a lock mode and a computer mode. In some embodiments, the lock mode and computer mode allow for simplified administration and operation of the access control system. Some embodiments of the electronic key include a rechargeable battery. In some embodiments, the access control system includes a hybrid power supply system having a rechargeable battery and a generator. In some embodiments, the electronic lock includes a piezoelectric latch. In some embodiments, the electronic key is configured to act as a storage device for a computer system. Some embodiments provide an electronic access control system with a streamlined user interface. | 04-02-2009 |
20090091419 | METHODS AND SYSTEMS TO CONTROL REMOTE ACCESS TO A VEHICLE MODULE - A method for controlling remote access to a module of a vehicle includes the steps of determining whether the vehicle is in a predetermined state, and permitting remote access to the module only on the condition that the vehicle is in the predetermined state. | 04-09-2009 |
20090091420 | FACE AUTHENTICATING APPARATUS, FACE AUTHENTICATING METHOD AND FACE AUTHENTICATING SYSTEM - The face authenticating apparatus obtains the facial image of the pedestrian M before the pedestrian M approaches the camera. The face authenticating apparatus performs the face authentication based on the obtained image and the feature information which is previously stored as the dictionary information. When the face authentication is unsuccessful, the face authenticating apparatus receives operational input from the pedestrian M by prompting the pedestrian M to operate the operating unit which is installed near the door. The face authenticating apparatus performs the authentication of the pedestrian M based on the inputted operational input. When the authentication result is OK, the face authenticating apparatus performs registration or updating based on the facial image which is obtained before the pedestrian M approaches the door. | 04-09-2009 |
20090115570 | DEVICE FOR ELECTRONIC ACCESS CONTROL WITH INTEGRATED SURVEILLANCE - Described is a device for electronic access control (EAC) and surveillance. The device includes an EAC module and an imager integrated in a single unit. The EAC module controls physical access through a secure portal and the imager maintains surveillance of an observation area near the portal. A data signal is provided at a data port proximate to the EAC module and imager. The data signal includes EAC data for the portal, image or video data of the observation area and optional audio data. The device can be configured to communicate with a remote server and database over an IP data network. The device can also include one or more analytical modules for real-time computation and processing of data and generation of metadata for transmission over the data network. Correlating and combining current and historical data from multiple devices results in powerful real time threat detection and forensic search capability. | 05-07-2009 |
20090121829 | Method, Electronic Cover, and Access Unit for Providing Access to a Zone by Means of a Card - An access system includes a portable pouch and an access unit. The pouch has an inserted electronic card, a card receive module and a send/receive module. The access unit is assigned to a transit region of the zone and has a send/receive unit for a communication with the send/receive module of the pouch. To provide access, the tag is transmitted to the send/receive unit of the access unit when the pouch is within range of the send/receive unit. If the tag received by the send/receive unit matches a stored tag, an unblocking signal for providing access to the zone is generated. A signal detector of the pouch detects an electromagnetic field generated by a send unit arranged in the transit region, and information transmitted by the electromagnetic field is processed. A bidirectional communication between the send/receive unit of the access unit and the send/receive module of the pouch is initiated. | 05-14-2009 |
20090140835 | LED lamp control apparatus - The present invention discloses an LED lamp control apparatus including wireless or electric cable LED driving module and control system transceiving module. A cable, wireless or electric cable module of the control system transceiving module is provided for encrypting an instruction by a microprocessor, and transmitting a signal from a bidirectional wireless or electric cable transceiver module, and a bidirectional wireless or electric cable transceiver module installed in the wireless or electric cable LED driving module receives the signal. After the LED lamp driver decrypts and confirms the signal, the microprocessor displays the LED lamp according to the instruction and the signal, and a wireless or cable transmission is provided for controlling the signal, so as to achieve the effects of saving time, effort and power, and enhance the product practicability and industrial use of the LED lamp control apparatus. | 06-04-2009 |
20090160604 | RFID equipped vehicle immobilizer systems including speed control zones and methods relating thereto - A vehicle speed control system includes an RFID equipped vehicle having a computer system for controlling operating functions of the vehicle, a transmitting and receiving station positioned adjacent a speed control zone, capability for sending a speed control command from the transmitting and receiving station to the vehicle, cooperative components associated with the vehicle for receiving the speed control command from the transmitting and receiving station, and various elements associated with the vehicle for adjusting speed of the vehicle in response to the speed control command received from the station. The transmitting and receiving station includes electronic circuitry and related components for determining the speed of the RFID equipped vehicle as the vehicle enters the speed control zone. | 06-25-2009 |
20090167485 | CONTROLLER PROVIDING SHARED DEVICE ACCESS FOR ACCESS CONTROL SYSTEMS - An access control system and method for controlling access to secured areas includes a plurality of local readers connected to corresponding local control devices for reading portable access devices. A system reader reads the portable access devices, and a system control device is electrically connected to the local control devices. The system control device controls access to a common secure area using the system reader by validating the portable access devices using one of the local control devices. The system control device locally stores information from the portable access device and the associated local control device which may include validation or authentication data received from the associated local control device, so that repeat validation of the portable access device can be communicated from the associated local control device. | 07-02-2009 |
20090167486 | SECURE ASSOCIATION BETWEEN DEVICES - Methods and apparatus relating to secure association between devices are described. In one embodiment, devices capable of communicating via a wireless channel may be authenticated via a different channel established by signal generators and/or sensors present on the devices. Other embodiments are also disclosed. | 07-02-2009 |
20090167487 | SECURE ASSOCIATION BETWEEN DEVICES - Methods and apparatus relating to secure association between devices are described. In one embodiment, devices capable of communicating via a wireless channel may be authenticated via a different channel established based on observation of the same event by sensors present on the devices. Other embodiments are also disclosed. | 07-02-2009 |
20090195353 | CONTROL DEVICE AND CONTROLLED DEVICE - A control device being a control device communicating with a controlled device to control the controlled device includes: a first memory to store first authentication information for authenticating the controlled device; a second memory to store second authentication information for making the controlled device authenticate itself; a determination unit to compare third authentication information sent from the controlled device for specifying the controlled device with the first authentication information; a calculator to perform calculation processing on the first authentication information or the third authentication information using the second authentication information to generate a calculated value; a transmitter to transmit, when the determination unit determines that the first authentication information and the third authentication information are the same, the calculated value to the controlled device; and a memory controller to update the first authentication information. | 08-06-2009 |
20090201125 | Electronic device provided with theft prevention function, and method for preventing theft of electronic devices - An electronic device includes a memory storing a first lock release code, a comparing portion comparing the first lock release code with a second lock release code that is input with an input device, a controlling portion permitting the electronic device to operate normally if the comparing portion finds that the first lock release code matches the second lock release code, and a restricting portion restricting an acceptance of an input of the second lock release code after input attempts have been made a predetermined number of times if the comparing portion finds that the first lock release code does not match the second lock release code. | 08-13-2009 |
20090201126 | Electronic device provided with theft prevention function, and method for preventing theft of electronic devices - An electronic device includes a first rewritable nonvolatile memory storing a first lock release code, a comparing portion comparing the first lock release code with a second lock release code that is input with an input device, a controlling portion permitting the electronic device to operate normally if the comparing portion finds that the first lock release code matches the second lock release code, and a first error checking portion checking whether or not there is an error in the first lock release code stored in the first rewritable nonvolatile memory. If the first error checking portion finds an error in the first lock release code stored in the first rewritable nonvolatile memory, the controlling portion permits the electronic device to operate normally regardless of a comparison result obtained by the comparing portion. | 08-13-2009 |
20090206984 | APPLICATION CONTROL METHOD IN AN NFC CHIPSET COMPRISING SEVERAL HOST PROCESSORS - A method for controlling the execution of an application in a system having a contactless data sending/receiving interface (CLINT) of NFC type, and host processors (HP | 08-20-2009 |
20090212902 | SYSTEM AND METHOD FOR AUTHORIZING LIMITED ACCESS - A system and method for securely controlling access to a designated location with a single card having a permanent data storage medium and a temporary data storage medium disposed on the card. Biometric information is acquired from a person and written on the permanent storage medium. A verification terminal acquires biometric information from a possessor of the card, such as random and multiple biometric information, and reads the same type of biometric information from the permanent storage medium of the card. Upon a favorable comparison of biometric information of the card and card possessor, authorization data is written on the card specifying limited access. The biometric information and the authorization data can be uploaded to a local database. The type of biometric information to be acquired from the card possessor and read from the card is accessed from the database. If the biometric information from both the card and the possessor match, and if access attempted by the card possessor is in accordance with the limits of the authorization data, access will be granted. | 08-27-2009 |
20090212903 | Card-Type Electronic Key - A card-type electronic key having a high level of portability and including an emergency mechanical key that is difficult to duplicate. The electronic key is used with a communication controller arranged in a vehicle. The electronic key includes a communication circuit unit which transmits a wireless signal including an authentication code. The communication circuit unit is allowed to control an external device arranged on the subject when the communication controller receiving the wireless signal determines that the verification code is authentic. A key card unit includes a verification code pattern formed by through holes. A concealment film is removably adhered to the key card unit and conceals the through holes so that the through holes cannot be seen. | 08-27-2009 |
20090219131 | System for tracking hand washing and other tasks - The system is designed for use in a hospital for tracking hand washing and other medical care related tasks. It includes multiple disinfectant soap dispenser devices connected to a network server that provide confirmation that caregivers are in compliance with hospital rules regarding hand cleanliness and the performance of other patient maintenance or treatment procedures. The system individually identifies each disinfectant soap dispenser device, identifies the location of the device associated with each patient and identifies each authorized caregiver or unauthorized recorded person using the device. The device identifies its location, the identity of caregiver, the time and date of use of device, and same is recorded in a network server as part of patient records. | 09-03-2009 |
20090231091 | WALL-MOUNTED ACCESS/SECURITY CONTROL PANEL - In one aspect, the invention provides a wall-mounted access control panel that includes one or more access control boards, each of which provides at least an interface for monitoring and/or controlling access to one or more building entry points or zones via associated sensors and/or intrusion prevention devices, collectively, “security devices.” The access control panel includes at least one connector disposed internal to the panel that provides communications coupling between at least one of the control boards and the aforementioned security devices (e.g., detectors, electrified locks, etc.). That connector permits such coupling without requiring that a field technician, or other person installing the panel at a site, pass and/or connect wires directly to the control boards from the security devices in order to establish that communications coupling. | 09-17-2009 |
20090231092 | Facility equipment cooperation system, equipment control method, and agent apparatus - An apparatus communicating with a gateway apparatus on a control system network for facility equipment, via an information system network, includes a unit which stores not less than one piece of virtual point information defining a virtual point combined with not less than one piece of facility equipment, a user authentication unit which performs user authentication for a user associated with a client, a unit which receives a request for control on one virtual point from the client, a unit which creates a remote control command for the facility equipment associated with the request based on the virtual point information when the request has been received and the user authentication has succeeded, and a unit which transmit the remote control command to the gateway via the information system network when tenant authentication for a tenant associated with the agent apparatus which is performed by the gateway has succeeded. | 09-17-2009 |
20090237201 | IMAGE PROCESSING APPARATUS, SETTING INFORMATION ACQUIRING METHOD, AND SETTING INFORMATION ACQUIRING PROGRAM - To provide a technique for allowing a user to acquire information peculiar to the user stored in a storage area, for which log-in processing and authentication processing are necessary, through simple authentication processing using a card without performing operation for inputting a user ID and a password. An image processing apparatus includes: a card-ID-information acquiring unit that acquires card ID information of a user; a user-ID-information acquiring unit that outputs the card ID information acquired by the card-ID-information acquiring unit and acquires, according to the outputted card ID information, user ID information associated with the card ID information; and a setting-information acquiring unit that acquires, on the basis of the acquired user ID information, environment setting information concerning a work environment of the user corresponding to the user ID information, the setting-information acquiring unit acquiring the environment setting information on the basis of environment setting administrator authority for allowing the user to acquire a work environment associated with the user ID information of users who can be targets of acquisition of the work environment. | 09-24-2009 |
20090243791 | Mini fob with improved human machine interface - A remote control device for a vehicle remote access system includes the housing, an input switch for selecting a vehicle control function, a control, a transmitter for transmitting a wireless signal from the control to the vehicle remote access system, and an attachment for mounting the housing on or integrating it with a separate article carried or worn by a user. The input switch can be a single pressible member, the number of time spaced sequential activations and the duration of each activation of which is determined by the control member to indicate a selected one of a plurality of distinctive vehicle control functions. The input switch member can alternately be a slidable or a rotary multi-position switch in which each position designates a distinct vehicle control function. A rechargeable battery can be carried in the housing and receives recharging electric power from a plug on the housing which is connectable to an external power supply, a solar cell carried on the housing, or an inductive secondary transformer coil carried in the housing. | 10-01-2009 |
20090251278 | Method for prohibiting a person with a facial mask to operate an automatic teller machine - A method for prohibiting a person with a facial mask to operate an automatic teller machine essentially includes the followings steps of: a) arranging a visual spectrum camera and an alarm unit approaching an automatic teller machine (ATM); b) capturing a facial picture of an experimental subject via the camera; c) judging if the picture performs generic facial features of a human face; if false, proceed Step g); d) if true, a facial temperature of the subject is detected to gain a measured temperature; e) comparing the measured temperature with a predetermined reference temperature; if the measured temperature is not within the reference temperature range, a spurious human face is determined and Step g) goes on; f) if the measured temperature is within the reference temperature range, a genuine human face is determined and the ATM is allowably operated without proceeding Step g); and g) activating the alarm unit to transmit a warning signal without operating the ATM. | 10-08-2009 |
20090256672 | Article management system, and portable apparatus for communicating with RFID tag - An article management system | 10-15-2009 |
20090256673 | IMAGE ACQUISITION SYSTEM AND METHOD OF AUTHENTICATING IMAGE ACQUISITION DEVICE IN THE IMAGE ACQUISITION SYSTEM - An image acquisition system includes an image acquisition device and a commanding device configured as a member separate from an image acquisition device proper to transmit a command for controlling the image acquisition device to the image acquisition device proper. The image acquisition device includes an authentication command receiving unit which receives an authentication command transmitted from the commanding device and containing authentication information used by the image acquisition device to authenticate the commanding device, a general command receiving unit, arranged separately from the authentication command receiving unit, which receives a general command transmitted from the commanding device and not containing the authentication information, an authentication command recognition unit which recognizes the authentication command received by the authentication command receiving unit, and a function limiting unit which limits a function of the image acquisition device based on the authentication command recognized by the authentication command recognition unit. | 10-15-2009 |
20090273434 | SYSTEM AND METHOD FOR FACTORY KEY CODE DISPLAY WITH AN AUTOMOTIVE KEYLESS ENTRY SYSTEM - A system and method for providing keypad information to a user for a keypad coupled to an exterior portion of the vehicle is provided. The method includes receiving a first radio frequency (RF) signal from a first transmitter and increasing a first count in response to detecting the first RF signal. The method includes receiving a second RF signal from a second transmitter and increasing a second count in response to detecting the second RF signal. The method includes comparing the first count to a first predetermined count and comparing the second count to a second predetermined count. The method includes transmitting the keypad information to the display device based on at least one of the comparison of the first count to the first predetermined amount and the comparison of the second count to the second predetermined amount. | 11-05-2009 |
20090273435 | COORDINATED SECURITY SYSTEMS AND METHODS FOR AN ELECTRONIC DEVICE - Systems and methods for implementing security features of a mobile electronic device. The mobile electronic device comprises a first security module configured to implement a first security operation and a second security module configured to implement a second security operation. The method includes: detecting a first security event; implementing a first security operation by the first security module; triggering a second security event; and implementing a second security operation by the second security module. The first security operation includes triggering the second security event. | 11-05-2009 |
20090273436 | METHOD AND DEVICE FOR CONTROLLING USE OF POWER TOOLS - A method and device for blocking unauthorized use of power tools with a circuit-interrupting device being positioned between a power tool and an electrical power source (AC power or battery power). The circuit-interrupting device is in a normally open circuit configuration to prevent unauthorized use. Authorized use is with a transmitted signal from a remote signal transmitting device (such as RF, bluetooth and infra-red generating fob or PDA) to a signal receiving device, operatively linked to the circuit-interrupting device, to close the circuit upon receipt of a signal and to open the circuit (and deactivation of the power tool) with removal of the signal. | 11-05-2009 |
20090278653 | Device for Operating an Electrical Device of an Automation System - An electrical device of an automation system is operated by carrying out the following steps: an electronic control device of the electrical device detects an external data storage module which is connected to the device; the electronic control device reads a control program stored on the external data storage module, the control program including a control command sequence for calling functions of the electrical device, and the electronic control device executes the command sequence contained in the control program. | 11-12-2009 |
20090284343 | METHODS AND SYSTEMS FOR EFFICIENT SECURITY SCREENING - The present invention relates to systems and methods relating to security checkpoints. In some embodiments the present invention includes a security checkpoint system that is optimized in one or more of design and décor, audio characteristics, and efficiency in passing customers through the security checkpoint and generating revenue with adverting and sponsorships. | 11-19-2009 |
20090295534 | Using an RFID Device to Enhance Security by Determining Whether a Person in a Secure Area is Accompanied by an Authorized Person - Embodiments of the invention are generally directed to controlling access to an area or enclosed location, wherein any person in possession of a specified RFID badge or other RFID device is defined to be a person who is authorized to be in the area or location. One embodiment, directed to a method, includes the step of detecting the presence of a particular person in the area, who is not in possession of a specified RFID device. In response to detecting the presence of the particular person, a search is initiated to determine whether any authorized person is present in the area. Upon sensing the presence of one or more authorized persons in the area, the method further determines whether any of the sensed authorized persons is accompanying the particular person. In response to determining that no authorized person is accompanying the particular person, prespecified corrective action is initiated with respect to the particular person. | 12-03-2009 |
20090295535 | DEVICE FOR ACCESS CONTROL - In a device for access control comprising an electrically actuable lock and a key ( | 12-03-2009 |
20100026448 | SYSTEM AND METHOD FOR SECURING AUTHORIZED ACCESS BY A MOBILE DATA DEVICE OF A DOCUMENT PROCESSING DEVICE - The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data device is first stored in a data storage. An incoming data message is received from a first mobile data device having identifier data assigned to the mobile device. The identifier data is then compared to stored address data and operation of a document processing device is selectively enabled via a user interface associated with the processing device according to an indication that identifier data corresponding to the received data is present in the storage. Electronic document data corresponding to an electronic document is received into the document processing device. Instruction data associated with a document processing operation is then received via the interface. Confirmation data is sent to the mobile device confirming the desired document processing operation. The desired operation is then commenced on the electronic document data. | 02-04-2010 |
20100045424 | Entry and exit control apparatus and entry and exit control method - When a user enters or leaves an area to which a security level is assigned, it is determined whether the user is allowed to enter or leave the area by performing authentication. When the user moves between areas to which different security levels are preliminarily assigned, appropriate authentication is performed on the user depending on the difference between the security levels of the areas. | 02-25-2010 |
20100060410 | LOCK FOR A PORTABLE DEVICE - The present invention relates to an antitheft device for a wireless portable device designed to be in contact with a docking device including a lockable attachment apparatus for attaching the portable device to the docking device. The antitheft device according to the invention comprises an electromechanical system commanding the unlocking of the lockable attachment apparatus based on an electric signal. The electric signal is disabled by a command supplied by a user interface unit. The invention is notably used as an antitheft device for a wireless, portable X-ray sensor associated with a docking station. | 03-11-2010 |
20100073125 | SYSTEM AND METHOD FOR CONFIRMING THAT A USER OF AN ELECTRONIC DEVICE IS AN AUTHORIZED USER OF A VEHICLE - Methods and a system are provided for confirming that a user of an electronic device is an authorized user of a vehicle. The method comprises receiving a request regarding the vehicle from the electronic device in response to a user action, verifying that the user is able to cause the vehicle to perform a predetermined operation, and permitting the request to proceed only if the vehicle performs the predetermined operation. | 03-25-2010 |
20100073126 | SECURE SYSTEM FOR NON-COVERT USER AUTHENTICATION AND IDENTIFICATION - A secure system for user authentication comprised of an authentication interface having a character dial and alignment markers is provided. A passcode input module receives user commands to move the character dial with respect to the alignment markers and to record a configuration of the characters with respect to the alignment markers, thereby creating alignment configuration data. A passcode generation module receives at least one of said alignment configuration data from passcode input module and generates a plurality of passcode hypotheses. An authentication module receives the passcode hypotheses and compares the passcode hypotheses with the passcodes of registered users stored in a data store. The passcode hypotheses are updated after each new alignment configuration data entered by the user. The authentication module authenticates a user upon finding a passcode hypothesis matching a stored passcode. | 03-25-2010 |
20100109835 | APPARATUS AND METHOD FOR PROVIDING LOCATION BASED SECURITY FOR COMMUNICATION WITH A REMOTE DEVICE - A method for providing location based security for communication between a remote device and a mobile device having a global positioning system receiver for determining its current position. The method comprises receiving geographic data from the remote device, determining if the mobile device is within a predetermined geographic region based on the geographic data and the current position, and enabling subsequent communication with the remote device when the current position is within the predetermined geographic region. | 05-06-2010 |
20100127820 | QUALITY ADJUSTMENT OF A RECEIVING CIRCUIT - A receiving circuit for a communication unit of an access device has a resonance circuit ( | 05-27-2010 |
20100127821 | Access Control - According to an aspect of the present invention, there is provided a method and apparatus for controlling access to a restricted area containing machinery. The method comprises receiving from a communications device a location identifier associated with said restricted area and a further identifier, verifying said location identifier and said further identifier, and controlling access to said restricted area based upon said verifying. Controlling access to said restricted area comprises providing a control signal to a controller associated with said restricted area. The controller is arranged to control said machinery in response to said control signal. | 05-27-2010 |
20100141380 | SPECTROSCOPIC METHOD AND SYSTEM FOR MULTI-FACTOR BIOMETRIC AUTHENTICATION - A multi-factor biometrics authentication method including the steps of: acquiring a non-spectrometric biometric signature (e.g. fingerprint, iris pattern, etc.) of a biometric signature source (e.g. fingertip, iris, etc.) of a subject to be authenticated (e.g. person); acquiring spectral information (e.g. diffuse reflectance spectrum, reflectance spectrum, etc.) of the biometric signature source; using the non-spectrometric biometric signature to determine the unique identity of the biometric signature source; and using the spectral information to verify that the subject to be authenticated belongs to a predetermined class of objects (e.g. living persons). A biometrics system (e.g. fingerprint authentication device, iris pattern authentication device) is augmented with spectral biometrics capability in a practical manner without introducing much overhead to the base biometrics technology or inconvenience to users. | 06-10-2010 |
20100148918 | HYBRID ACCESS CONTROL SYSTEM AND METHOD FOR CONTROLLING THE SAME - A wireless access apparatus for controlling access into a secure area comprises a first power source and a second power source. A controller automatically switches between the first and second power source based at least on a calculated power level of the first and second power source. The controller is connected to either the first or the first and second power source based on the switching. The access apparatus includes a switch having a first position for connecting the first power source to the controller and a second position for connecting second power source to the controller and an electromechanical transducer coupled to the controller for unlocking or locking an entrance into the secure area. The controller determines access to the secure area using information received from an access card. | 06-17-2010 |
20100148919 | METHOD AND SYSTEM FOR ROOM ACTIVITY COMMUNICATION - The invention relates to a method and system for room activity communication. In one embodiment, a tray sensing device detects the presence of a tray in a given location and forwards the information to a room controller. The tray can be a conventional tray for supporting food articles or can be supported or integral with a food cart. The system also includes a door lock/tag controller for monitoring door lock and door tag information. Information from the tray sensing device, door lock/tag controller is communicated to a room controller. The room controller of each room can include a wireless network to the tray controller and/or door lock/tag controller. The room controller can also monitor information of the room such as, for example, temperature, humidity and light intensity information, and receive information regarding room activities, such as, for example, room service ordering and status, housekeeping, minibar, phone messages and checkout routine. Information from the room controller can be forwarded to a central host controller for management of the information. The central host controller can display the information, activate an alarm or separate and send data to relevant controllers located, for example at security, service, housekeeping and front desk. The alarm can be an audio or visual alert. The alarm can be deactivated upon removal of the tray from the given location or acknowledgement of request. | 06-17-2010 |
20100148920 | AUTOMATED PRESENCE DETECTOR FOR MOTOR VEHICLES - The disclosure presents various embodiments, as well as features and aspects thereof, of a presence detection technique and system used in motor vehicles. Exemplary embodiments recognize the presence of a motor vehicle driver in, or near, a motor vehicle. Based on the recognized presence of a driver, embodiments of an automated presence detector for motor vehicles may inhibit, block or otherwise restrict access to services or applications associated with the driver's mobile device. To recognize the presence of a motor vehicle driver, embodiments may employ wireless radio frequency standards, such as Bluetooth, position indication technologies, such as GPS, or any other means suitable for correlating the physical presence of a driver with a motor vehicle. | 06-17-2010 |
20100156591 | Facility Access Integrated With Other Security Systems - Systems and methods for integrating facility access with other security systems are described. An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan. If authorized, the system may allow entry by disabling the alarm system, and a time period for access may be determined based on one or more characteristics associated with the individual. These characteristics may include the functional role of the individual at the facility and/or the location of the facility itself. Moreover, this facility access authorization system may be integrated with a network access authorization system associated with the facility so that when an individual gains access to the facility for a specific time period, the system is also able to determine how long the individual may access its network resources. | 06-24-2010 |
20100156592 | Television Theft Deterrence - A signal received by a television over a communication medium is interrogated for the presence of a remotely transmitted ping. The television is operated in response to detection of the presence of the ping in the received signal. The television is locked against use in response to failing to detect the presence of the ping in the received signal. | 06-24-2010 |
20100176915 | Remote control communication system - The present invention relates to remote control communication system that uses electromagnetic waves to communicate with and send commands to operate receiving devices. In a preferred embodiment of the present invention, the remote control communication system relates to a cellular telephone device that has been equipped with the necessary hardware and software to allow a user of the cellular telephone to communicate with certain devices that can be located within a building or similar structure such that the communications act to control activate, deactivate, monitor, or control the operation of the interior devices through an interface that can use the electromagnetic waves to operate the controlled devices. | 07-15-2010 |
20100194526 | Tool Operated Combination Lock - A process for opening a combination lock having a known opening sequence with a tool having a driven portion operable only upon receipt of an authorization, the process including associating the tool's driven portion with the lock such that the driven portion automatically calibrates with the lock irrespective of the initial position of the lock and authorizing the driven portion to proceed through the known lock opening sequence of a predetermined series of clockwise and counterclockwise rotations to unlock the lock. A method of opening a combination lock with a tool, the combination lock having an opening sequence consisting of clockwise and counterclockwise rotations of a non finger manipulable lock opening component, the method including mating the tool with the lock opening component and operating the tool to rotate the lock opening component through a series of clockwise and counterclockwise rotations corresponding to the opening sequence to unlock the lock. | 08-05-2010 |
20100214057 | Biometric device, system, and method for individual access control - A biometric device, and a corresponding system and a method, is used to control human access to an arbitrary area. The device includes a biometric capture system that reads specified biometric information from an individual and that compares the biometric information to previously stored biometric information to determine a match between the read and stored biometric information; a position location system that records the geographic location of the device, and determines if the device is inside the United States or outside the United States; an encryption system that encrypts the geographic location and a device-unique identification; and a wireless system that sends the encrypted geographic location and the device-unique identification to a remote location, where if the geographic location is inside the United States, the device receives a test satisfactory signal, and where if the geographic location is outside the United States, the device receives an exit satisfactory signal. | 08-26-2010 |
20100231349 | COMMUNICATION DEVICE AND COMMUNICATION METHOD - A communication method of a communication device for performing communication with an in-vehicle device includes determining whether or not the communication device is within a predetermined storage region, and performing a control of prohibiting transmission and reception of signals with the in-vehicle device when determined that the communication device is within the predetermined storage region. | 09-16-2010 |
20100231350 | MECHATRONIC FURNITURE LOCK - The invention relates to a mechatronic lock comprising a linearly movable bolt which can be moved from a retracted position into an advanced position in order to lock the lock. Said lock further comprises an actuating element for manually actuating the bolt, a blocking element which can laterally engage into a profiled section of the bolt in order to block the linear movement of the bolt in the advanced position of the bolt, and an electric drive for moving a movable intermediate element. The blocking element can be actuated by the movable intermediate element via a first spring means, especially a coil spring, in such a way that the spring means can be biased by actuating the drive when the bolt is in the retracted position. The blocking element thus snaps into the advanced position thereof in the profiled section of the bolt when the bolt is advanced, and the bolt is prevented from being retracted. Also described is an arrangement comprising at least two furniture compartments that are each fitted with a mechatronic lock. Said arrangement further comprises at least two individually encodable transponders for opening the locks, a central control device, and a network via which data can be transmitted between the central control device and the locks. | 09-16-2010 |
20100237984 | Apparatus and Methods for Providing Access Control and Video Surveillance at Access Control Points - An apparatus for providing access control and video surveillance at an access control point comprises an access control memory portion, a data processing portion, a camera input/output portion, and an event history memory portion. The access control memory portion is operative to store data indicative of who may properly enter past the access control point. The data processing portion controls who enters past the access control point in accordance with the data stored in the access control memory portion. The camera input/output portion is operative to receive data from a video camera. Finally, the event history memory portion is operative to store access data indicative of who entered past the access control point and to store video data generated by the video camera. The access control memory portion, the data processing portion, the camera input/output portion, and the event history memory portion are in signal communication with one another in the apparatus. | 09-23-2010 |
20100245033 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND INFORMATION PROCESSING APPARATUS - An authentication system is provided with a room-security device, and an information processing apparatus installed in a controlled area controlled by the room-security device, in which the room-security device and the information processing apparatus are connected in a network. The room-security device obtains, from a user, identification information, and transmits the identification information to the information processing apparatus, if the user is permitted to enter a room based on the obtained identification information. The information processing apparatus receives the identification information. If it is detected that the user is alone in the controlled area based on the received identification information, the information processing apparatus performs authentication based on the received identification information instead of asking the user to enter authentication information to obtain the authentication information. | 09-30-2010 |
20100259359 | VEHICLE FOR CARGO HANDLING - Limited operation of a vehicle for cargo handling, such as a forklift or a bulldozer, is allowed in the event of an emergency while theft of the vehicle is prevented even when the key is left in the vehicle. The vehicle is equipped with a storage unit for storing a password, a password input unit, a control unit for controlling selection of a normal operating mode with no restrictions on travel capability or cargo handling capability, an emergency operating mode where at least the travel capability of the vehicle is restricted, and a travel prohibited mode where neither the normal operating mode or the emergency operating mode is selected, and an emergency operating mode indicating unit. The control unit determines whether or not password entry is required when the vehicle is powered on and controls selection of the aforementioned normal operating mode when password entry is required or when a password entered and the password stored in the aforementioned memory unit match, the aforementioned emergency operating mode when emergency operation is indicated by the aforementioned emergency operating mode indicating unit, or the travel prohibited mode when neither the normal operating mode nor the emergency operating mode is selected within a predetermined specific amount of time or within a specific number of times of operation. | 10-14-2010 |
20100259360 | Computer Room Security - This invention relates to a fastener system, in particular a system for improving computer room security, that reduces energy consumption. This invention provides a fastener system comprising at least one fastener for fastening a first element to a second element, the at least one fastener having a sensor to determine status of that fastener; a trigger box having an LED panel; a junction box capable of receiving and relaying authorization access; and an IP-connected control appliance with relay input/output for access control applications. This invention is particularly useful within server racks. | 10-14-2010 |
20100277272 | SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access with a touch sensitive display is provided. The method includes displaying a security access interface on a touch sensitive display, wherein the security access interface has at least one polyhedron object; changing the at least one polyhedron object from a first state to a second state according to detections of inputs/contacts with the touch sensitive display; recording properties of the at least one polyhedron object in the second state; determining if the recorded properties satisfy the predetermined value; granting access when the record properties satisfy the predetermined value. A security system using the method is also provided. | 11-04-2010 |
20100283576 | Key for A Lock Having An Open Architecture - An electronic key for opening a lock having a lock interface is disclosed. The key includes a housing, a key interface extending from the housing that can mate with the lock interface to move the key, a motor connected to the key interface for moving the key interface, a microprocessor circuit that includes a memory that controls the motor and a electronic communication port connected to the memory in the microprocessor circuit. New operating systems and applications or new versions thereof for the key can be downloaded to the memory through the electronic communication port, which can be wired or wireless. Alternatively, existing operating systems and applications can be modified through the electronic communications port. Methods of downloading operating systems and applications or versions thereof to the key are also disclosed. | 11-11-2010 |
20100283577 | MONITORING APPARATUS, AND METHOD FOR DETERMINING A POWER CONSUMPTION AUTHORIZATION - A monitoring apparatus for determining an authorization to consume electric power of an electric consumer connected to an electric power supply network includes a device for recording and/or receiving measurement data for recognizing a current flow in at least a part of the electric power supply network. A communications unit queries and receives an identifier of the electric consumer, and a comparison unit compares a received identifier with at least one stored reference identifier. | 11-11-2010 |
20100289614 | System for Screening People and Method for Carrying out a Screening Process - The invention relates to a method for carrying out a screening process and a control system ( | 11-18-2010 |
20100289615 | Electro-mechanical Leverlock with Switching System - A leverlock system is provided wherein an enclosure can be locked for a specified time period using a simple locking arrangement. The leverlock is intended to be used in conjunction with existing locking systems, and allows a user to restrict entry to anyone, including those who might otherwise be authorized to enter the enclosure, over a specified time period. A timer module is provide which activates a solenoid connected to a locking apparatus is provided, and the timer module controls the activation of the solenoid so that entry into the enclosure is only permitted for a selected interval duration, at a specific time. The leverlock system is also preferably accompanied by an Electrical/Electronic Switching System having a circuit which can be energized or de-energized by using a Random Access Memory—(RAM) Recognition Switching System™. The preferably auxiliary switching means is primarily used in conjunction with existing electrical/electronic switching circuits, and allows the primary user to restrict even those with secondary authority from energizing or de-energizing the circuit at other times. A temporary, randomly generated entry code is used to restrict access. The code is stored in memory for subsequent comparison with an inputted code value, which is preferably printed as a hard copy original of the code. Preferably, the code will not be erased from memory until used or reset by the primary user. | 11-18-2010 |
20100301993 | PATTERN BASED SECURITY AUTHORIZATION - A method, system and computer-usable medium for authorizing access to a secure location are disclosed. Data indicative of security-related activities (e.g., badging in and/or out of a secure building) can be compiled and then mined to deduce a particular pattern of security-related activities. Access to the secure location can be then authorized, based on the particular pattern of security-related activities. | 12-02-2010 |
20100301994 | ANTI-TAMPER DEVICE, METHOD OF CONTROLLING AN ANTI-TAMPER DEVICE, AND A FISCAL PRINTER USING THE SAME - Anti-tamper devices, control methods for electronic appliances having an anti-tamper device, and fiscal printers having an anti-tamper device are disclosed. A control method for an electronic appliance having an anti-tamper device includes detecting a removal sequence of a plurality of fasteners from the electronic appliance, comparing the specified removal sequence with the detected removal sequence, and, when the compared sequences differ, limiting one or more specific operations of the electronic appliance or causing the electronic appliance to execute one or more specific operations. A corresponding plurality of sensors can be used to monitor the installation states of the fasteners. The specified removal sequence can be changed based on time kept by a timer. The detected removal sequence and the specified removal sequence can be stored in memory and compared by a control unit. | 12-02-2010 |
20100301995 | FLUID HUMAN-MACHINE INTERFACE - A method of operating a communication device to interface with a machine system comprises projecting a human-machine interface (HMI) system for the machine system on a surface, wherein the HMI system comprises a plurality of commands associated with the machine system, detecting an input from a user, wherein the input comprises a fluid motion in air performed by the user corresponding to a selection of a command of the plurality of commands associated with the machine system, and transferring the selected command for delivery to the machine system. | 12-02-2010 |
20100308959 | ACCESS CONTROL DEVICE - The invention relates to an access control device ( | 12-09-2010 |
20100308960 | Method and Apparatus for a Rolling Code Learning Transmitter - A barrier movement operator system having a receiver for receiving, learning and responding to transmitted rolling code type access codes; at least one trained transmitter for operating the system by transmitting a rolling code type access code to the receiver; at least one learning transmitter for learning the rolling code type access code from said trained transmitter in order to operate the system; a controller for evaluating the relationship between the learning transmitter rolling type access code and the trained transmitter rolling type access code; and a device for providing a barrier movement in response to access codes received by the receiver. The barrier movement operator provides a method of learning valid security codes by a security code receiver comprising the steps of receiving a first security code, then within a predetermined period of time receiving a second security code, having a predetermined relationship to the first security code; and storing a representation of the second security code as a valid security code. | 12-09-2010 |
20100315197 | AUTHORIZATION IN A NETWORKED ELECTRIC VEHICLE CHARGING SYSTEM - Networked electric vehicle charging stations for charging electric vehicles are coupled with an electric vehicle charging station network server that performs authorization for charging session requests while the communication connection between the charging stations and the server are operating correctly. When the communication connection is not operating correctly, the networked electric vehicle charging stations enter into a local authorization mode to perform a local authorization process for incoming charging session requests. | 12-16-2010 |
20100315198 | FIELD DEVICE AND METHOD OF OPERATION THEREOF - A field device, in particular a protective device for protecting, controlling or monitoring an electric switching or energy supply unit, has an access control device, controlling access to the field device. The access control device includes: a memory with access rights, roles and users stored therein, wherein each access right defines the access to at least one device value, one device parameter or one device function, one or more access rights are associated with each role, and one or more roles are associated with each user, and a control device suitable to prevent an access to a device value, a device parameter or a device function by a user when the respective user is not associated with a role with the access right required for the respective access. The control device has a test module that exclusively allows access by a user only if the access right that is required for the respective access and that is stored in the memory is provided with a valid electronic signature. | 12-16-2010 |
20100321149 | Method and Apparatus for Controlling Admission to Individual Rides at an Amusement Park - Methods for controlling admission to amusement park rides include electronically measuring each person's height (and optionally weight) and comparing the measured data to a database which specifies minimum requirements for each ride in the amusement park. Upon completing the comparison, several optional steps are provided including encoding a data carrier with the person's measured data and/or a list of rides which are appropriate for the person. The data carrier may be a “swipe card” or other machine readable device which must be presented at the entrance to each ride. The entrance to each ride is provided with an electronic entry control gate which is operated by the data carrier. Optionally, a list of appropriate rides is printed for the person and/or the person's guardians. Apparatus for performing the methods are also disclosed. | 12-23-2010 |
20110001603 | METHODS AND APPARATUS RELATING TO A SECURITY SYSTEM - A method of receiving secure information from a mobile communication device to control an authorisation device in a security system, the method including the steps of the authorisation device: receiving an electronic key transmitted by the mobile communication device; decoding the key using a decoding technique to retrieve a hidden token; and decrypting the retrieved token to retrieve the secure information. | 01-06-2011 |
20110043325 | KEYLESS ENTRY ASSEMBLY HAVING CAPACITANCE SENSOR OPERATIVE FOR DETECTING OBJECTS - A keyless entry assembly includes a vehicle opening movable between locked and unlocked positions, an electrical conductor (i.e., a capacitance sensor) mounted to the vehicle opening, and a controller. The conductor capacitively couples to an electrically conductive object proximal to (or touching) the conductor while the conductor is driven with an electrical charge such that capacitance of the conductor changes due to the conductor capacitively coupling with the object. The conductor is in the shape of an emblem identifying a vehicle associated with the vehicle opening. The controller is operable for driving the conductor with the electrical charge and measuring the capacitance of the conductor to determine whether an electrically conductive object is proximal to the conductor. The controller is further operable for controlling the vehicle opening to move the vehicle opening between the positions upon determining that the object is proximal to (or touching) the conductor. | 02-24-2011 |
20110057769 | Key switch for installation in a drive device and method for operating the key switch - The invention relates to key switches ( | 03-10-2011 |
20110057770 | RFID READER REVOCATION CHECKING USING LOW POWER ATTACHED DISPLAYS - A method of authenticating a radio frequency identification (RFID) reader to efficiently and timely check of revocation status of the RFID reader includes the steps of checking whether a given certificate is expired or revoked, and allowing a user of an RFID tag to verify that the credentials and revocation status information reported to the tag by reader is correct and current/valid before permitting information transmission from the RFID tag to the reader. An RFID tag includes a passively powered display and a user activatable control which allows the method to be carried out with the tag. The tag may include encrypted communication ability and automatic certificate revocation list checking. (This method is applicable not just to RFID but to any technology involving purely passive operation, i.e., where the tag obtains power from a reader). | 03-10-2011 |
20110068892 | Wireless Tracking System And Method Utilizing Near-Field Communication Devices - The present invention provides a method and system to determining a near-field communication interaction in a wireless tracking mesh network. The present invention preferably utilizes near-field communication devices in conjunction with tracking tags to transmit signals for reception by sensors stationed throughout a facility which form a mesh network and forward the signals to an information engine for analysis. | 03-24-2011 |
20110109425 | IP Protection And Control Method Thereof - An embodiment of the invention provides an integrated circuit with IP protection. The integrated circuit includes a hardware IP, an ID generator and a lock circuit. The ID generator generates an ID according to each manufactured hardware IP. The lock circuit locks the manufactured hardware IP and unlocks the manufactured hardware IP when receiving a key corresponding to the ID. | 05-12-2011 |
20110128118 | AUTHORIZATION SYSTEM - An authorization control device for selectively enabling operation of a vehicle on which it is installed is described. The device employs vehicle identity logic for storing or reading a vehicle identifier for the vehicle on which the authorization control device is installed. | 06-02-2011 |
20110140834 | SECURE IDENTIFICATION, VERIFICATION AND AUTHORIZATION USING A SECURE PORTABLE DEVICE - A system for providing authorization is disclosed. The system includes a server configured to: allow a user to conduct a transaction using a computer, and present an image to the user in connection with the transaction, the image having information embedded therein, and a portable device configured to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information. The server is further configured to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction. | 06-16-2011 |
20110140835 | ELECTRIC VEHICLE, TAXING SERVER, CHARGING APPARATUS, DRIVE MANAGEMENT METHOD, AND PROGRAM - An electronic device that includes an interface that connects to a charging apparatus and exchanges authentication information with a server via a network. The electronic device also includes a control unit that controls charging of a battery of the electronic device based on power received from the charging apparatus. Upon completion of the charging operation, the interface of the electronic device transmits information for calculating a tax based on the charging operation to the server. | 06-16-2011 |
20110156864 | SECURITY DOCUMENT, SECURITY SYSTEMS AND METHODS OF CONTROLLING ACCESS TO A REGION - A security document is provided comprising a first RFID tag readable only within a first range, and a second RFID tag readable within a second range, the first RFID tag containing data pertaining to the owner of the security document and an identification code, and the second RFID tag containing the same or a related identification code, and wherein the second range is longer than the first range. Also provided is a method and system for controlling access to a region, each person seeking access carrying a detectable unique identifier. The method comprises: detecting, at a first location, a unique identifier relating to a person in the first location; using the detected unique identifier to retrieve information concerning the person from one or more external databases; supplying the retrieved information to a second location remote from the first location; and using, at the second location, the retrieved information to make a decision as to whether to allow the person carrying the unique identifier access to the controlled region. | 06-30-2011 |
20110181387 | CONTACT DETECTION DEVICE FOR VEHICULAR USE AND SECURITY DEVICE FOR VEHICULAR USE - Disclosed are a contact detection device for vehicular use and a security device for vehicular use that are capable of identifying whether contact is human-induced and that prevent erroneous detection due to raindrops and the like. A security device ( | 07-28-2011 |
20110187492 | Fascia Panel Assembly Having Capacitance Sensor Operative for Detecting Objects - A fascia panel assembly includes an electrically non-conductive fascia panel, an electrically non-conductive isolator, and a capacitance sensor. The sensor capacitively couples to an electrically conductive object proximal to the sensor while the sensor is driven with an electrical charge such that capacitance of the sensor changes due to the sensor capacitively coupling with the object. The isolator is sandwiched between the fascia panel and the isolator. | 08-04-2011 |
20110205013 | Method and System of Conditionally Operating a Movable Barrier - A method and system provides conditional allowance of access by operating a movable barrier such that access is not granted unless another condition is met. In one illustrative approach, a first signal is received and, if a second signal is received within a set time frame relative to receipt of the second signal, a movable barrier operator is then activated. By one approach, one of the signals is a long-range transmission, and the other signal is a visual-range transmission. | 08-25-2011 |
20110215898 | LOCKING SYSTEM - An electronic locking system in which the control computer and a plurality of locking devices are connected by a data bus, and in which the communication between the external computers and each locking device is carried out by element of commands sent through the data bus. | 09-08-2011 |
20110254658 | DOOR LOCKING SYSTEM - A door locking system configured to lock and unlock a door frame of a cabinet is provided. The door locking system includes a handle rod; a digital or mechanical door sensor configured to detect whether the door frame of the cabinet is open or closed; and a latch configured to lock the handle rod, the latch being connected to and controlled by a lock mechanism. The lock mechanism includes a mechanical module and an electromechanical module. The mechanical module is configured to actuate the latch to lock and unlock the handle rod, and configured to grant the electromechanical module control over the latch to lock and unlock the handle rod. | 10-20-2011 |
20110267170 | METHOD FOR PROCESSING SIGNALS RECEIVED BY A WIRELESS CONTROLLED CIRCUIT OF A STEAM DEVICE - A method for processing signals received by a wireless controlled circuit of a steam device, includes the steps of: judging a received signal is a registration signal or a control signal; if the received signal is a registration signal, storing an ID code contained in the registration signal; and if the received signal is a control signal, judging whether the control signal contains an ID code same as a stored ID code or not, then responding a control instruction contained in the control signal if yes, and not responding the control instruction contained in the control signal if no. The present invention has the following advantages: when a plurality of the steam devices are placed together, each wireless controlled circuit of the steam devices will only respond the special remote controller which is registered correspondingly and not respond a non-corresponding remote controller. | 11-03-2011 |
20120032775 | ENTRY/EXIT CONTROLLING SYSTEM AND METHOD - Reader terminals are provided on both sides of doors accessing different areas and are provided on at least one side of doors accessing regions of the same area. An evaluation processing portion evaluates if there is an anti-pass-back violation by a user in response to an evaluation request from a reader terminal. A comparison an area ID for the movement origin region, obtained from the region information storing portion, and a current area ID for the user, obtained from the current location information storing portion is performed. If the result of the evaluations for entry/exit permission is that entry/exit is permitted and there is no anti-pass-back violation, then the area ID and the individual ID of the movement destination region, obtained from the region information storing portion, are stored as the current area ID and the current region ID for the user, in the current location information storing portion. | 02-09-2012 |
20120044046 | Remote Control Parking Barrier - A remotely controlled parking space barrier for preventing access to a reserved parking space by unauthorized vehicles includes a barrier assembly. The assembly includes an anchoring member and a rotatable barrier member that is rotatable between a relatively flat position that can be driven over and a vertical or blocking position for preventing vehicular access to the space. The remotely controlled parking space also includes a plurality of studs for anchoring the anchoring member within the parking space. The mechanism also includes an electric motor for rotating the barrier member between a generally flat and a generally vertical position. A lighting system includes a plurality of lights, an alarm and a first sensor for sensing an unauthorized vehicle within a predetermined distance from the entrance to the parking space and actuates flashing lights and sounds an audible alarm when an unauthorized vehicle approaches the entrance to the parking space or parks in front of the parking space. Further a transceiver is also provided and disposed in an authorized vehicle or carried by an authorized individual to send a signal to the transceiver to rotate the barrier member to a generally horizontal position to give access to the authorized vehicle to enter the space. Further, the barrier assembly includes a mechanism and a sensor for detecting a vehicle within the parking space and prevents the moveable barrier from being raised while the authorized vehicle is there and automatically raises the barrier upon removal of the authorized vehicle from the parking space. | 02-23-2012 |
20120044047 | ELECTRONIC ACCESS CONTROL OF HAZARDOUS ZONES - A zone access control system is described. The system is particularly suited for controlling access to radioactive or potentially radioactive areas. The system comprises one or more portable devices that are worn or otherwise carried by individuals in the facility or region of interest. The system also comprises one or more intelligent barriers that govern or restrict entry into or exit from, one or more zones of interest. And, the system comprises a computer or computer system to process information and provides control instructions to the barriers and to the portable devices. Various methods of operation are also described. | 02-23-2012 |
20120056714 | BIOMETRIC VISITOR CHECK SYSTEM - A system for biometric exclusion of certain individuals from entering a facility. A biometric exclusion system may use biometric acquisition and matching and a database to screen a large population of subjects by looking for individuals enrolled in a database. A screening approach may be used to match biometrics having sufficient quality of any individuals attempting to enter the facility, relative to biometrics of individuals stored in the database. A biometric, such as that of a face or an iris, of an individual may be obtained with the individual's knowledge or cooperation. The database may have biographical information pertinent to an individual having a biometric in the database. There may be an associated system which may be used to enroll individuals by entering their biometrics in the database. | 03-08-2012 |
20120062358 | MULTIPLE-FREQUENCY SOLUTIONS FOR REMOTE ACCESS SYSTEMS - Aspects of the present disclosure are directed toward a system in which a three-dimensional low-frequency (3D-LF) antenna and a high frequency (HF) antenna are used. The 3D-LF antenna includes three coils each oriented relative to X, Y and Z axes that define a Cartesian coordinate system for a three-dimensional space. The HF antenna is oriented along one of the axes of the LF coils and in the same antenna package as the 3D-LF antenna. The 3D-LF antenna is configured to be used in connection with an LF signal of between 3 kHz and 300 kHz. The HF antenna is configured to be used in connection with an HF signal between 3 MHz and 30 MHz. | 03-15-2012 |
20120062359 | System and Method for Wireless Interactive Security Services Using a Key-Switch Interface - In one aspect of the present invention there is provided an alarm communicator configured to communicate directly with an alarm panel. The alarm panel includes a key-switch input terminal which is in direct communication with a relay switch defined on the alarm communicator. The alarm communicator is capable of sending open or closed signals from the relay switch to the key-switch input terminal in response to receiving a command that was initiated from a remote device. | 03-15-2012 |
20120068813 | DATA PROCESSING APPARATUS AND ASSOCIATED USER INTERFACES AND METHODS - A processor ( | 03-22-2012 |
20120075055 | FACILITIES CONTROLLING SYSTEM AND METHOD - An evaluation processing portion changes a user level of a user, in a user level storing portion, to a value that is equal to a region level when an evaluation result indicates that entry is authorized. | 03-29-2012 |
20120075056 | FACILITY CONTROLLING SYSTEM AND METHOD - When an evaluation result by an evaluation processing portion indicates that entry is authorized, the evaluation processing portion obtains a resident region of the user from a user information storing portion and obtains a movement destination resident user count of the movement destination region of the user from a region information storing portion, and if the user is a resident user of the movement destination region and the movement destination resident user count prior to entry by the user is zero, instructs an equipment operation controlling portion to start operation of the related equipment in the movement destination region. | 03-29-2012 |
20120112878 | AUTOMATIC INTEGRATED SENSING AND ACCESS CONTROL - An access control system for sensing exposure to items of interest for a person associated with a unique identifier of a fare card or ticket is disclosed. The access control system includes the unique identifier, an exposure detector and a processor. The unique identifier associated with the person that is flagged when exposure is detected. The exposure detector detects exposure to items of interest by the person. The processor is coupled to the exposure detector. The message is communicated away from the processor to a remote location when the unique identifier is flagged. | 05-10-2012 |
20120126935 | BRIDGE BETWEEN SECURITY SYSTEM AND APPLIANCES - A method and apparatus for controlling an appliance. The method includes the steps of a security system within a secured area, said security system having a wireless transmitter transmitting status messages including at least a first encrypted message that the security system in armed and a second encrypted message that the security system is disarmed, an appliance control device having a wireless receiver and a decryption unit, the wireless receiver receiving the first and second encrypted messages, the decryption unit decrypting the first encrypted message to recover the armed status message and decrypting the second encrypted message to recover the disarmed status message and an appliance associated with the secured area and controlled by the appliance control device, the appliance entering a relatively low energy consuming mode in response to the appliance control device receiving the armed message and the appliance entering a relatively high energy consuming mode in response to the appliance control device receiving the disarmed message. | 05-24-2012 |
20120126936 | Access control system - An access device for a system having at least one lock that is configured to receive instructions and to energize a lock mechanism to unlock the at least one lock and a computer is disposed at a remote location from the at least one lock and the access device. The computer is connected to a primary wireless communication path. The access device comprises at least one key configured for communicating with the computer via the primary wireless communication path and to communicate with the lock over a secondary wireless communications path and wherein the at least one key further is configured as authorized to unlock the at least one lock absent a de-authorizing instruction from the computer. | 05-24-2012 |
20120133481 | Modular Control and Indicating Panel, Its Use and a Method of Controlling Building Alarm Systems - A modular control and indicating panel for authorized control of functions of electronic intruder alarm system, fire or other danger alarms, for access control and for control of appliances and other electronic devices, characterized by that it comprises at least one control and indicating segment (A) allowing to control particular function, the control segment (A) comprises label ( | 05-31-2012 |
20120133482 | SYSTEMS AND METHODS FOR MANAGING ACCESS CONTROL DEVICES - Described herein are systems and methods for managing access control devices. In overview, an access control device is configured to function on the basis of an applied set of configuration data. For example, the manner in which the device processes an access request is dependent on the configuration data. A device according to an embodiment of the present invention is configured to locally maintain plurality of uniquely applicable sets of configuration data. Each set, when applied, causes the device to function in accordance with a respective mode of operation. The device is configured to change which set of configuration data is applied in response to a predetermined command, thereby allowing the device to shift between modes of operation relatively quickly and without the need to download additional configuration data. In some cases, the modes of operation correspond to threat levels, and the use of such access control devices allows a change in threat level to be applied across an access control environment quickly and with minimal bandwidth requirements. | 05-31-2012 |
20120139691 | SYSTEM FOR PREVENTING ESTABLISHMENT OF UNAUTHORIZED COMMUNICATION - A system that prevents unauthorized establishment of wireless bidirectional communication between a communication master and a communication terminal. The system includes a strength measurement signal transmission circuit that transmits a received signal strength measurement signal, which is used to measure received signal strength at the communication terminal, a number of times with different transmission strengths during a single wireless bidirectional communication session. A received signal strength measurement circuit measures the received signal strength of the received signal strength measurement signal whenever the received signal strength measurement signal is received by the communication terminal. A measurement result transmission circuit transmits received signal strength measurement results as a single response signal to the communication master from the communication terminal during the single communication session. A check circuit checks whether the current bidirectional communication is authorized based on the received signal strength measurement results from the communication terminal. | 06-07-2012 |
20120139692 | USE BLOCK FOR A HANDHELD WORK APPARATUS - The invention relates to a portable handheld work apparatus such as a cutoff machine, motor-driven chain saw, brushcutter, blower apparatus or the like. The apparatus includes a drive motor ( | 06-07-2012 |
20120139693 | Electronic Book Security Features - A method and system for fingerprinting a content item is described, the and system method include providing the content item, the content item including a set of content item elements, the set of content item elements denoted E, such that E={E | 06-07-2012 |
20120146762 | METHOD AND SYSTEM FOR MONITORING A PLURALITY OF ELEMENTS IN A SAFETY PROCEDURE - The method according to a preferred embodiment of the present invention allows monitoring that a plurality of preliminary actions is performed, before an operation is authorised. In particular a controller device operated by a user must be brought into close proximity with a predetermined set of entities (e.g. safety garments). Only when all the required safety garments are detected, the user is authorised to perform the operation. As an example, the method of the present invention can be used in safety procedure, divided in predetermined operation steps, comprising the following stages: a first stage, in which a remote system asks to carry out said operation step by means of telecommunication; a second stage, in which a human operator carries out said operation step; a third stage, in which a tag, located in a place associated to said operation step, is detected; a fourth stage, following said third stage, in which said detection is notified to said remote system, by means of telecommunication; a further stage, following at least one from among said first, third or fourth stage, in which instructions for carrying out said operation according to said standard procedure are displayed electronically in a format which is intelligible for said human operator. | 06-14-2012 |
20120154109 | ESTABLISHING AN AUTHENTICATED WIRELESS CONNECTION BETWEEN SHORT-RANGE WIRELESS TERMINALS MORE CONVENIENTLY - A method for establishing a wireless connection based on a touch screen of a wireless device. The wireless device includes a slide-out processing section for determining, in response to a slide-out from an edge of the touch screen, a first slide-out parameter for determining by the other wireless device an object to be connected, and broadcasting the first slide-out parameter. The wireless device further includes a slide-in processing section for determining a slide-in parameter in response to a slide-in from the edge of the touch screen and reception of a second slide-out parameter directionally transmitted from the other wireless device. Furthermore, if the determined slide-in parameter matches the second slide-out parameter, then the slide-in processing section establishes a wireless connection between the wireless device and the other wireless device. As a result, an authenticated wireless connection between short-range wireless terminals can be established more conveniently. | 06-21-2012 |
20120169457 | METHOD AND SYSTEM FOR DYNAMICALLY ASSIGNING ACCESS RIGHTS - The system and method take changes in a person's or groups' status and by following a series of steps (rules) ensures that the person or groups are given proper access to a secure location. The system has at least one access control device for controlling the flow of persons in a physical setting to at least one secure area. An access control database of the system contains information regarding criteria for allowing access to the at least one secure area. A control system receives information from the at least one access control device and compares it to the access control database to determine if access is to be granted. A rules unit gathers information from various sources and updates the access control database. | 07-05-2012 |
20120182120 | Radio Devices, Regulation Servers, and Verification Servers - According to various embodiments, a radio device may be provided. The radio device may include a configurable component, a configuration information transmitter configured to transmit information identifying the radio device and an identifier of a configuration of the configurable component to a regulation server; and a permission information receiver configured to receive from the regulation server information indicating as to whether the radio device is permitted to use the configuration of the configurable component or as to whether a pre-determined configuration of the configurable component is to be used by the radio device. | 07-19-2012 |
20120182121 | RADIO DEVICES, REGULATION SERVERS, AND VERIFICATION SERVERS - According to various embodiments, a radio device may be provided. The radio device may include a configurable component, a configuration information transmitter configured to transmit information identifying the radio device and an identifier of a configuration of the configurable component to a regulation server; and a permission information receiver configured to receive from the regulation server information indicating as to whether the radio device is permitted to use the configuration of the configurable component or as to whether a pre-determined configuration of the configurable component is to be used by the radio device. | 07-19-2012 |
20120274441 | Power Outlet with Restricted Access - An apparatus to provide controlled electrical energy in a substantially public setting includes a power control unit. The unit includes credential entering circuitry which, upon authentication, provides access to a supply of AC-type electrical energy which can be used to recharge batteries of a vehicle. Authentication can be carried out locally, or at a displaced access control system. An access credential can be entered via a card reader or a wires receiver. | 11-01-2012 |
20120286925 | Method and device for implementing screen locking - The disclosure provides a method and a device for implementing screen locking. In the method, a pre-selected picture is selected; when a screen locking condition is met, the pre-selected picture is taken as a screen locking picture, function restriction processing is performed on the screen locking picture to obtain the screen locking interface and the screen is locked. According to the method, the pre-selected picture can be taken as the screen locking interface. Compared with the prior art, the screen locking function is enhanced. | 11-15-2012 |
20120306613 | SENSOR ALLOCATION - The present invention relates to methods and apparatus for allocating sensors. Data from an unallocated sensor is received and a unique sensor link identifier is received where the unique sensor link identifier relates to the unallocated sensor from a user device. It is determined which unallocated sensor corresponds to the unique sensor link identifier such that the user device can access the data received from the unallocated sensor. | 12-06-2012 |
20120326837 | Protective Compliance Systems - The present invention provides apparatus and methods for safety compliance in hazardous situations. The apparatus may include sensing means for detecting a first protective apparatus, means for detecting a subject, monitoring means for monitoring engagement of the protective apparatus with the subject; and a controller for controlling operability of a second apparatus according to the monitoring means. Embodiments of the invention include the protective apparatus being eyewear or attenuating sound or radiation. The apparatus may include a power source. The communication between the elements of the apparatus may be by any suitable means, whether fixed line, radio frequency, optical transmission, acoustical, or the like. The invention includes a method for safety compliance comprising the steps of detecting a subject; determining the position of the subject in relation to a protective apparatus; determining the compliance state of the protective apparatus and controlling a second apparatus according to the compliance state. | 12-27-2012 |
20130009747 | Synchronized Robotic Baggage Portal for Secure Access - Systems and methods describe automated/robotic baggage portals as well as their use when synchronized with automated/robotic human security portals. When companion human and baggage portals are synchronized, baggage items belonging to a subject are not passed through to a secure area unless the subject is cleared by a companion human portal for passage. Likewise, unless the subject is cleared for passage by the human portal, baggage items belonging to the subject are not passed through to a secure area unless the subject is cleared by the companion human portal. Variations on synchronization, tracking, and coordination mechanisms and methods are described as well as variations on baggage portal mechanisms including conveyer arrangements and baggage chamber configurations. | 01-10-2013 |
20130015946 | USING FACIAL DATA FOR DEVICE AUTHENTICATION OR SUBJECT IDENTIFICATIONAANM Lau; James Kai YuAACI BellevueAAST WAAACO USAAGP Lau; James Kai Yu Bellevue WA USAANM Kaheel; AymanAACI BellevueAAST WAAACO USAAGP Kaheel; Ayman Bellevue WA USAANM El-Saban; MotazAACI CairoAACO EGAAGP El-Saban; Motaz Cairo EGAANM Shawky; MohamedAACI CairoAACO EGAAGP Shawky; Mohamed Cairo EGAANM Gonzalez; MonicaAACI SeattleAAST WAAACO USAAGP Gonzalez; Monica Seattle WA USAANM Baz; Ahmed ElAACI BellevueAAST WAAACO USAAGP Baz; Ahmed El Bellevue WA USAANM Deif; TamerAACI CairoAACO EGAAGP Deif; Tamer Cairo EGAANM Aly; Alaa Abdel-HakimAACI AssiutAACO EGAAGP Aly; Alaa Abdel-Hakim Assiut EG - Exemplary methods, apparatus, and systems are disclosed for authenticating a user to computing device. In one exemplary embodiment, an indication of a request by a user to unlock a mobile device in a locked state is received. One or more images of the face of the user are captured. Facial components of the user from the one or more captured images are extracted. A determination is made as to whether the user is an authorized user or a non-authorized user based at least in part on a comparison of the facial components of the user extracted from the one or more captured images to facial components of the authorized user from one or more authentication images of the authorized stored on the mobile device. If the user is determined to be the authorized user, the mobile device unlocked; otherwise, the mobile device is maintained in its locked state. | 01-17-2013 |
20130057383 | SYSTEM AND METHOD FOR IDENTIFYING OBJECT AND RELEASING ITS SECURITY - For identifying an object and releasing a security of the object an identification element is associated with the object and recognized by recognizing unit, a securing element is attached to an object and releasable from the object, and the identification element and the securing element are formed so that a release of the securing element is possible only after the identification of the object by recognizing the identification element. | 03-07-2013 |
20130099891 | AUTHENTICATION METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access to the secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester. | 04-25-2013 |
20130162392 | SYSTEM AND METHOD FOR UNLOCKING SCREEN OF ELECTRONIC DEVICE - An electronic device includes a vibration sensor. The vibration sensor senses shake of the electronic device. If the user shakes the electronic device when a screen of the electronic device is in a locked state, the electronic device detects if the vibration sensor is activated. If the vibration sensor is activated, the electronic device counts a number of activation times of the vibration sensor. If the number of the activation times of the vibration sensor is the same as a predefined number, the screen of the electronic device is unlocked. | 06-27-2013 |
20130200994 | WIRELESS SYSTEMS AND METHODS OF MAKING VISITOR APPOINTMENTS - Wireless systems and methods for making visitor appointments are provided. Methods include wirelessly transmitting a registration form to a visitor device, wirelessly receiving a completed registration form from the visitor device, validating a visitor, wirelessly transmitting an image to the visitor device, wirelessly receiving an appointment request from a visitor device, processing the appointment request, wirelessly transmitting a message with available appointment times to the visitor device, wirelessly receiving an approval request from the visitor device, and wirelessly transmitting an approval confirmation message to the visitor device. | 08-08-2013 |
20130214897 | Prismatic Lock And Key Security - Methods and apparatus for lock and key security, the lock including a light receptacle, a scatter pattern detecting module, and a locking mechanism, the key including a light source and a prism, the lock and key security including receiving, in the light receptacle of the lock, light transmitted by the light source in the key through the prism; identifying, by the scatter pattern detecting module, a scatter pattern of the received light; comparing, by the scatter pattern detecting module, the scatter pattern to a unique preauthorized pattern for operating the lock; if the scatter pattern matches the unique preauthorized pattern, switching, by the scatter pattern detecting module, the current locking state of the locking mechanism; and if the scatter pattern does not match the unique preauthorized pattern, maintaining the current locking state of the locking mechanism. | 08-22-2013 |
20130241691 | CONTROL DEVICE OF AN OPERATING ELEMENT IN A MOTOR VEHICLE - A receiver belongs to a control device of an operating element in a motor vehicle, which receiver is a component part of the operating element and into which signals are able to be inputted by a person. In order to be able to establish with great reliability a threshold for the decision ‘signal valid/signal invalid”, it is proposed defined in the invention that the receiver of the operating element has a first coupling-in element and a second coupling-in element, which are arranged at a defined distance from one another on an evaluation axis. | 09-19-2013 |
20130241692 | AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AND CONTAINER SYSTEM - An authentication apparatus includes an authentication unit configured to perform authentication processing according to power generation information from a power generation unit configured to generate electric power from ambient energy. | 09-19-2013 |
20130249668 | METHOD OF CONTROLLING ACCESS TO AN AREA ACCESSIBLE BY PERSONS, PARTICULARLY TO A SPACE CLOSED BY A DOOR - A method of controlling access to an area accessible by persons, particularly to a space closed by a door, utilizes at least two communications units for transmitting and receiving an identification code and an access code. The identification code is transmitted at a predetermined first transmission power from a first communications unit to at least one second communications unit. The second communications unit checks the identification code and transmits an acknowledgement code at a second transmission power, which is lower than the first transmission power, from the second communications unit to the first communications unit if the check of the identification code was successful. The first communications unit transmits an access code to the second communications unit. After a successful check of the access code by the second communications unit the access is freed. | 09-26-2013 |
20130314204 | PORTABLE ELECTRONIC DEVICE AND METHOD OF UNLOCKING THEREOF - A method executes a gyroscope function to set unlock method for a portable electronic device. A user can rotate the portable electronic device to set a predetermined rotation direction and a predetermined rotation angle for unlocking the portable electronic device. In an unlock method setting procedure, the gyroscope detects the rotated portable electronic device and outputs detected information of the portable electronic device. An unlock method of the portable electronic device is set according to the detected information. | 11-28-2013 |
20130314205 | MODULAR VEHICLE SYSTEM, ELECTRIC VEHICLE AND MODULE FOR CONNECTING TO AN ELECTRIC VEHICLE - The invention relates to a modular vehicle system, having an electric vehicle ( | 11-28-2013 |
20130321123 | SYSTEM AND METHOD FOR CONTROLLING ELECTRICAL APPLIANCES - A system for controlling electrical appliances is disclosed. The system comprises: at least one detection device configured to acquire detection data, indicating the presence or absence of a user in a spatial region; a comparison unit configured to (i) receive the acquired detection data from the at least one detection device; (ii) access a database storing data associating each of a list of users with respective stored detection data and a respective set of electrical appliances; (iii) compare the acquired detection data against the stored detection data in the database; and (iv) if the acquired detection data matches the stored detection data of one of the list of users in the database, identify the user associated with the matched stored detection data and extract the set of electrical appliances associated with the identified user; and a control device configured to control the extracted set of electrical appliances associated with the identified user based on predefined settings. | 12-05-2013 |
20140002235 | PROVIDING AN ID-VERIFIED BLOOD TEST | 01-02-2014 |
20140009257 | System and Method for Implementing a Threat Condition Protocol in Pass Control - This disclosure relates to a system and method for implementing threat condition in pass control. In one embodiment, a method for implementing threat condition can comprise, receiving by a checkpoint computer, from a server, a threat condition status. The method can further comprise requiring from a visitor at a checkpoint an information set by the checkpoint computer, the information dependent on the threat condition. The method can further comprise issuing a pass to the visitor only if the visitor supplies the information set at the checkpoint. | 01-09-2014 |
20140009258 | SYSTEMS FOR ACTIVATING ELECTRONIC DEVICES FOR OPERATION WITH ATHLETIC EQUIPMENT - Articles of clothing or pieces of athletic equipment include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the clothing or athletic equipment or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of clothing or piece of athletic equipment for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and clothing or piece of athletic equipment are authorized for use with one another, and/or for automatic data algorithm selection methods. Additionally, such systems and methods also may use the activation and/or authentication systems for data input to the module. Some examples of such systems and methods may utilize magnets and magnetic sensing systems and/or light (or other radiation) sources and sensing systems for activation, authentication, data input, and/or algorithm selection. | 01-09-2014 |
20140022050 | RELATIVE POSITIONING APPLICATIONS IN WIRELESS DEVICES - Techniques for determining whether a mobile device crosses a boundary defined by a first wireless access point (WAP) and a second fixed-location WAP are provided. A method according to these techniques includes receiving, at a mobile device, information defining a boundary defined by first and second fixed-location WAPs, the boundary being defined at least in part based on a ratio of a round trip time (RTT) between the mobile device and the first fixed-location WAP to a ratio of a RTT between the mobile device and the second fixed-location WAP, determining the ratio of the RTT between the mobile device and the first fixed-location WAP to a ratio of the RTT between the mobile device and the second fixed-location WAP, determining whether the mobile device has crossed the boundary, and triggering an event in response to the mobile device crossing the boundary. | 01-23-2014 |
20140022051 | UNMANNED DEVICE INTERACTION METHODS AND SYSTEMS - Structures and protocols are presented for configuring an unmanned aerial device to participate in the performance of tasks, for using data resulting from such a configuration or performance, or for facilitating other interactions with such devices. | 01-23-2014 |
20140049359 | SECURITY DEVICE AND INTEGRATED CIRCUIT INCLUDING THE SAME - A security device includes a shield having at least one first and second conductive wire, first and second logic units, and a detecting unit. The first logic unit is configured to receive a first pattern signal, transmit data based on the first pattern signal through the at least one first conducting wire, and output a detection pattern signal based on data received through the at least one second conducting wire. The second logic unit is configured to perform a logical operation on the data received through the at least one first conducting wire, and transmit a result of the logical operation through the at least one second conducting wire. The detecting unit is configured to provide the first pattern signal to the first logic unit, receive the detection pattern signal from the first logic unit, and detect an unauthorized access attempt. | 02-20-2014 |
20140111303 | Lock-Out, Tag-Out System Using Safety Programmable Logic Controller - A remote lock-out, tag-out system for controlling multiple buckets in a motor control center employs a safety network providing serial communication between one or more remote lock-out, tag-out stations and individual buckets of the control center permitting remote disconnection of power without the need for protective gear. | 04-24-2014 |
20140145819 | PORTABLE LOW COST FIREARM SAFE - A rapid-access gun safe includes a portable enclosing structure and a communication module. The portable enclosing structure encloses a firearm. The portable enclosing structure includes a fixed portion and a collapsing wall. The collapsing wall provides rapid access to the firearm. The communication module is coupled to the fixed portion of the enclosing structure. The communication module facilitates incoming and outgoing electronic communication of at least one access signal from a device external to the rapid-access gun safe. | 05-29-2014 |
20140191842 | APPARATUS FOR AN AUTOMATED FUEL AUTHORIZATION PROGRAM REQUIRING DATA TO BE DYNAMICALLY EXCHANGED WITH A FUEL VENDOR DURING FUEL AUTHORIZATION USING AN INFRARED DATA LINK - A fuel authorization system enables data to be exchanged between vehicles and a fuel vendor, to verify that the vehicle is authorized to receive fuel. In an exemplary embodiment, each fuel island is equipped with a motion detector, a short range radio frequency (RF) component, and an infrared (IR) receiver. Participating vehicles are equipped with fuel authorization component including an IR transmitter and a RF component that can establish a data link with the fuel island's RF unit. When the motion detector senses a vehicle in the fuel lane, an RF query is sent to the vehicle. Participating vehicles respond with an IR transmission. An RF data link is then established between the enrolled vehicle and the fuel vendor to verify that the vehicle is authorized to receive fuel. Once the verification is complete, the fuel dispenser is enabled. | 07-10-2014 |
20140266575 | INTERACTIVE PORTABLE CARRYING CASE FOR HAND SANITIZER - A dispensing system is provided including a housing that removably supports a container. A material is contained within the container. The material is dispensed from the container. The housing includes a wireless communication system that transmits a first set of information related to a user of the dispensing system. An example method of operating the dispensing system is also provided. | 09-18-2014 |
20140266576 | SYSTEMS AND METHODS FOR COMMUNICATING WITH WELDING EQUIPMENT - Systems and methods for reading data from and/or writing data to various components of a welding installation are provided. The data is exchanged between devices using near field communication. | 09-18-2014 |
20140266577 | Pressure Wire Detection and Communication Protocol for Use With Medical Measurement Systems - One aspect of the present disclosure involves a method. The method includes retrieving, from a diagnostic medical device, identification information that identifies a feature of the diagnostic medical device. A proprietary signal is generated in response to the identification information. The proprietary signal is sent to a medical measurement system to facilitate an unlocking of one or more programs to be executed on the medical measurement system. Another aspect of the present disclosure involves a method. The method includes detecting, through an electronic interface device, a coupling of a remote diagnostic medical device. Thereafter, a proprietary signal is received from the electronic interface device. An identity feature of the remote diagnostic medical device is ascertained based on the proprietary signal. One or more programs are unlocked for execution if the identity feature of the remote diagnostic medical device matches a predetermined identity feature. | 09-18-2014 |
20140333412 | VIRTUAL BADGE, DEVICE AND METHOD - A system, methods, and devices comprising a virtual badge are disclosed. The virtual badge can be displayed on an electronic device or on another linked or unlinked portable device. For use in both emergency and non-emergency scenarios, the virtual badge comprises images and data which can be scanned, and the capability to alternate colors and/or self-destruct on a pre-set schedule. The system, methods, and devices may use a self-destruct mechanism which renders the virtual badge unusable. Using plugin technologies, the system optionally can enable field collected photos and notes on customizable forms to be mapped, tracked, and time/date stamped, including in a 100% disconnected environment. A modifiable virtual badge can aid in credentialing via certifications and qualifications, inventory, accountability, organization, and efficiency. The system, methods, and devices are designed to aid in access control, and other activities, such as data collection, inventory, accountability, payment gateways, and site management. | 11-13-2014 |
20140340191 | MEDICATION MANAGEMENT SYSTEM - A medication management system ( | 11-20-2014 |
20140354398 | Authenticating and Tracking a Valuable Asset Within the Confines of a Safe - An approach is provided to track a hard asset in a smart safe. In the approach, the hard asset is registered with a computing system that is associated with the smart safe. The registration of the hard asset include storing at least one physical attribute of the hard asset in a computer memory. The approach then monitors the presence of the hard asset in the smart safe. If removal of the hard asset is detected, a predefined security action is performed, such as contacting the owner or security personnel. | 12-04-2014 |
20140361868 | OBJECT DETECTION SYSTEM - An object detection system | 12-11-2014 |
20150077218 | Virtual Gate and Alarm System - Alarm systems that include testing components for determining if static control devices satisfy certain specifications are described. The alarm system includes virtual gate components that generate alarm signals if after a testing component associated with a first subinterval determines a static control device carried by a person satisfies a first specification, a person attempts to cross a second subinterval which does not overlap the first subinterval. | 03-19-2015 |
20150109097 | Electronically Controlled Locking System and Electronic Key for Controlling the Locking System - An electronically controlled locking system includes a receiver for receiving signals from one or more electronic keys, a locking and unlocking mechanism that can be controlled on the basis of signals received from electronic keys, and a transmitter for transmitting a message confirming the successful execution of a locking and/or unlocking process to the electronic key that initiated the unlocking and/or locking process. | 04-23-2015 |
20150332529 | SYSTEM AND METHOD FOR CROSS-CONTAMINATION PREVENTION - Cross-contamination prevention systems and cross-contamination prevention methods are provided for defining and automatically enforcing access restrictions between environments where cross-contamination may occur. The system and methods can evaluate a person's exposure to contaminants in one or more locations against contamination risk posed for another location. The system can prevent or allow access to the other location based on that evaluation. Some embodiments can be implemented in a laboratory setting and configured to prevent cross-contamination between different laboratories and/or experiments being conducted | 11-19-2015 |
20150348341 | Radio Frequency Fingerprint Detection - Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols. | 12-03-2015 |
20150348343 | Vehicle Detection System Using RFID Tags - A fuel dispensing installation employs multiple fuel islands with fuel dispensers and multiple fuel/travel lanes. The installation employs a communication/controller system for automatically identifying a vehicle, and upon authorizing the vehicle, allowing fuel to be dispensed to said vehicle, determining the quantity of fuel dispensed to the vehicle and securing the dispenser when the vehicle leaves a detection zone. The detection system employs RFID tags placed at both the driver side and the passenger side of the vehicle. Generally oppositely oriented antenna define a detection zone for each of the lanes. A light indicates whether the vehicle is authorized for receiving fuel. | 12-03-2015 |
20150371019 | PREVENTION OF USE OF A CONTAMINATED MEDICAL PRODUCT - This disclosure relates generally to contaminable medical products. In particular, this disclosure provides systems, apparatuses, and methods for preventing contaminated use of medical products that become contaminated upon being used for an intended purpose that requires the operation of a medical treatment apparatus, medical treatment system, or both. A medical product may have a unique identity and a permissive operation session, that is associated with the unique identity, may be created to allow a use of the medical device when uncontaminated, while preventing the use of the medical product after it has been presumably contaminated during the permissive operation session | 12-24-2015 |
20160005249 | SYSTEMS, DEVICES, AND METHODS FOR MANAGING COMMODITIES - Provided are systems, articles of manufacture, methods, and computer program products for managing a commodity, such as, for example, a vehicle accessory. Methods may include receiving an activation input for a commodity and, responsive to receiving the activation input, generating information relating to the activation input for the commodity. | 01-07-2016 |
20160019739 | LOCKING SYSTEMS - A locking system is disclosed. The locking system may move a lockable device included in the locking system between a locked and unlocked state. The lockable device may comprise a laser. | 01-21-2016 |
20160071340 | Apparatus and Method for Operating Same - An apparatus and a method for using an apparatus are provided, which apparatus can be used in particular in an industrial automation process. The apparatus comprises a machine part for performing a process to be performed by an automation system or for processing a workpiece, and an authentication and access part for authenticating a user of the apparatus and for permitting the user access to at least some of the functions of the machine part if the user has been authenticated, and for blocking the user access to the functions of the machine part if the user has not been authenticated. | 03-10-2016 |
20160088432 | SYSTEM AND METHOD FOR LOCATION-BASED SECURITY - A mobile computing device, including: a first memory device having first computer-readable instructions tangibly recorded thereon; a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and an RFID component that includes a transceiver configured to receive a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader, and a second memory device configured to store the proximity signal, wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, control at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader. | 03-24-2016 |
20160117873 | INTERFACE OF AN AUTOMATION SYSTEM - According to at least one embodiment, a computer-implemented method to interface with an automation system is disclosed. One or more activation parameters and deactivation parameters may be identified associated with a mobile control panel. A concealed interface of the mobile control panel may be activated based at least in part on the one or more activation parameters. The activated interface of the mobile control panel may be deactivated based at least in part on one or more sleep parameters. | 04-28-2016 |
20160138941 | OPERATION DETECTION DEVICE FOR VEHICLE - An operation detection device for a vehicle includes: a capacity measurement section that measures a change amount of capacitance of an operation section; a determination section that determines that there is an approaching operation of a user to the operation section if a state where an absolute value of a time change rate of the change amount of the capacitance is equal to or less than a second threshold value is continued for a first time after the change amount of the capacitance is equal to or greater than a first threshold value; and an output section that outputs a control signal to an object to be controlled based on a determination result of the determination section. | 05-19-2016 |
20160196704 | SYSTEM FOR VITUALIZING AND CENTRALIZING THE SECURITY GUARD FUNCTIONS OF AUTHORIZATION AND AUTHENTICATION OF ENTRANTS AT UNMANNED SITES | 07-07-2016 |
20190147673 | SECURE DELIVERY VIA UNMANNED VEHICLES | 05-16-2019 |
20190147676 | SYSTEM AND METHOD FOR OPTIMIZING A FACIAL RECOGNITION-BASED SYSTEM FOR CONTROLLING ACCESS TO A BUILDING | 05-16-2019 |