Entries |
Document | Title | Date |
20080197191 | IMAGE PROCESSING APPARATUS AND METHOD FOR OPERATING IMAGE PROCESSING APPARATUS - It is an object of the invention to provide an image processing apparatus and a method for operating the image processing apparatus that can effectively use electric power by preventing units not used by specified users from being brought into an operation state. | 08-21-2008 |
20080203157 | STORAGE AND TRANSPORT MECHANISM FOR A SELF-SERVICE CARD KIOSK WITH RETURN AND REISSUE CAPABILITY - Improved mechanisms are described for use in an automated, self-service machine that is used to issue a card or other object to an individual, and allow return of the card or other object by the individual for later automated re-issuance of the card or object to the same or different individual. The mechanisms allow the machine to issue a card or object to a user, allow return of the card or object back into the machine, and later reissue of the card or object to the same or different user. | 08-28-2008 |
20080217402 | Maturity Rating Enforcement Via Rf-Tags - Maturity levels of those present to watch a television program are automatically and transparently determined and matched to a derived maturity rating of the candidate program (S | 09-11-2008 |
20080223926 | BIOMETRIC CONTROL OF EQUIPMENT - An example apparatus for allowing operation of equipment by an authorized operator comprises a biometric scanner receiving a biometric input from an authorized operator, and transmitting an authorization signal. The apparatus may further includes a base station that allows the equipment to operate while the base station receives the authorization signal from the biometric scanner, and which prevents the equipment from operating shortly after the authorization signal is no longer received from the biometric scanner. | 09-18-2008 |
20080223927 | ENTRY AND EXIT CONTROL APPARATUS - An entry and exit control apparatus wherein missing entry and exit information on a user entering and exiting a controlled area by tailgating is complemented by entry and exit information on another user presumed to enter and exit the controlled area along with the user that is tailgating. Therefore, reliability of user entry and exit history is improved to sufficiently suppress a decrease in security in the controlled area. The entry and exit control apparatus estimates entry and exit date and time concerning the missing entry and exit information based on the statistically processed staying time information of the user and the traveling time information for the entry and exit date information of the user determined that a missing item is generated, extracts complementary entry and exit information from pieces of entry and exit information stored in an entry and exit history DB based on the estimated entry and exit date and time, and complements the missing entry and exit information on the user using the extracted complementary entry and exit information. | 09-18-2008 |
20080230602 | BIOMETRIC AUTHENTICATION DEVICE AND METHOD - The invention may be embodied as an identity authentication system or method. A system according to the invention may have a biometric sensor capable of providing static biometric indications, an adhesive capable of positioning the sensor on an organism, and a computer in communication with the sensor. The computer may have software running on the computer in order to (a) cause the computer to determine whether there is a match between a subsequent static biometric indication and an initial static biometric indication, and (b) cause the computer to send a signal indicating whether a match was determined in order to authenticate the identity of the organism. | 09-25-2008 |
20080245860 | Method and System for Remote Card Access, Computer Program Product Therefor - A method for providing an application access to a smart card includes the steps of providing a card reader device for receiving the smart card, providing a computer for running the application, the computer being equipped with a first portion of smart card middleware for interfacing the card reader device, associating with the card reader device a processing unit incorporating a second portion of smart card middleware, and providing a network ensuring communication between the first portion and the second portion of the smart card middleware, thereby permitting access to the smart card by the application. | 10-09-2008 |
20080245861 | SYSTEM AND METHOD FOR CONTROLLING SECURED TRANSACTION USING COLOR CODED ACCOUNT IDENTIFIERS - A method and system provides coded access to a transactional or other type of system by acquiring account identification data corresponding to a combination of a plurality of colors. The account identification data is transmitted to, for example, a remote server to correlate the account identification data against an account database to evaluate corresponding account information. Based on the account information, access to the transactional or other type of system may be controlled. | 10-09-2008 |
20080265023 | Wireless Access Control Reader - A wireless access control system having a microcontroller, a field generator, an access card reader, a proximity detector, and a self-contained energy source. Energy demands are reduced by maintaining the reader and field generator in a powered off state until the proximity detector detects the possible presentation of an access control card. The microcontroller then activates the field generator and card reader for a predetermined time period for obtaining data from the control card. If data is received, the system determined whether to grant access, or transmits the data to a host for determination whether access should be granted, and then operates a security mechanism accordingly. If data is not received within the time period, the field generator and reader are power off until the next proximity detection. | 10-30-2008 |
20080265024 | Electronic device with functional module - A electronic device comprises a housing having a module bay configured to receive insertion of a modular biometric reader therein, the modular biometric reader located and usable within a periphery of the housing when disposed in the module bay. | 10-30-2008 |
20080265025 | Method and systems for providing merchant services with right-time creation and updating of merchant accounts - Systems and methods for providing merchant services with right-time creation and updating of merchant accounts. Merchant-specific information for each merchant is stored in a record and used to process purchase card transactions submitted by the merchant. When a user creates or updates a merchant account record, the user can indicate whether the update is to take effect immediately or at a user-specified later time. An immediate update is processed substantially without delay. Other updates are queued for later processing and processed at the user-specified later time. | 10-30-2008 |
20080277466 | METHOD AND SERVICE FOR LINKING AND SYNCHRONIZING WASHING SUBSCRIPTIONS WITH RFID TECHNOLOGY - A method and service and computer program product to link and synchronize subscriptions to be used at multiple washing facilities. RFID technology is used in the method and service to keep track of active subscriptions and the types and prices of washing services that are available to the subscriber. In one embodiment, subscription and RFID tag information stored at the local washing facilities are linked together and stored in a host server. The host server will periodically synchronize data between all connected washing facilities so there is consistency as to the subscriptions, active RFID tags, and types and prices of washing services. | 11-13-2008 |
20080290160 | Contactless Electronic Microcircuit Document and Proximity Sensor - The document includes a support ( | 11-27-2008 |
20080290161 | METHOD OF SECURE TRANSMISSION - A method, a system, and an apparatus for proving secure transmissions from a smartcard reader are described. A signal created by the smartcard reader dependent on the smartcard is encrypted. The signal comprises access information. The encrypted signal is transmitted to a remote location relative to the smartcard reader. The transmitted signal is translated at the remote location to another format useable by an access controller. An access mechanism is controlled using the access controller dependent upon the translated signal. | 11-27-2008 |
20080296371 | METHOD OF ACTIVATING A FINGERPRINT IDENTIFICATION PROCESS OF A SMART CARD ACCORDING TO A GIVEN CONDITION AND A DEVICE THEREOF - The present invention relates to a method of activating a fingerprint identification process of a smart card according to a given condition and a device thereof. The present invention uses a contactless smart card as a carrier of the fingerprint identification technology and incorporates user identification during use of the card to make the transaction or access process more secure and efficient. The invention provides the steps of how to determine whether the fingerprint identification process of the smart card should be activated to verify the validation of the user before the transaction according to the comparison result between the transaction amount and the preset conditional value. | 12-04-2008 |
20080308629 | TIME-VARYING SECURITY CODE FOR ENABLING AUTHORIZATIONS AND OTHER USES OF FINANCIAL ACCOUNTS - A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device. | 12-18-2008 |
20090001161 | Information processing system and remote access method - An information processing system comprising a local machine performing an information processing, a remote machine making connection to the local machine via a network and performing operation to the local machine by a user and a management-authorization server performing management and authorization of the remote machine is provided. The management-authorization server includes a plurality of connection information files for the remote machine to make connection to the local machine, and the remote machine, at making connection to the local machine, makes connection to the local machine based on a connection information file provided from the management-authorization server, after the authorization by the management-authorization server. | 01-01-2009 |
20090026261 | CONTROL GATE - A control gate includes a first exciting coil, a first detection coil, a second exciting coil, a second detection coil, a signal determination unit and an amplification factor setting unit. The first exciting coil forms a first alternating magnetic field in a passage. The first detection coil detects a variation in the first alternating magnetic field. The second exciting coil forms a second alternating magnetic field in the passage. The second detection coil that detects a variation in the second magnetic field. The signal determination unit includes a first amplifier which (i) amplifies a first detection signal of the first detection coil and (ii) determines a passage of the magnetic material based on the amplified first detection signal. The amplification factor setting unit sets a first amplification factor for the first amplifier based on a second detection signal of the second detection coil. | 01-29-2009 |
20090032585 | ACCESS CONTROL GATE - An access control gate with a mechanical guidance forms one or more access lanes for patrons. First electronic means include a contactless access reader which is connected to a software controlled verification system to identify the access right of patrons, second means comprise two motor driven flaps which protrude from left and right of the lateral lane boundaries into the access lane thereby forming the closed gate threshold | 02-05-2009 |
20090032586 | ADVERTISING AND MARKETING METHOD AND DEVICE - The event souvenir bracelet and card comprises a bracelet and card displaying an identifying name or logo of an event inside a transparent package with an information packet containing information about the event. The card contains stored, retrievable data allowing it to function as a money card, such as a stored value card or gift card. In a second aspect of the inventions, a wearable bracelet contains a device allowing data to be transmitted to and from the bracelet. The data is stored on an RFID device allowing use of the bracelet as a wearable ticket, as an identification and location device, and as a gift card, credit/debit card or stored value card. | 02-05-2009 |
20090032587 | User identification system - A user identification system includes a portable terminal device for holding user information for receiving a designated service and a user information inspection device for inspecting the user information, wherein provisions are made to prevent any person other than the rightful holder of the portable terminal device from receiving the service by using the portable terminal device. The user information inspection device acquires biometric data from the bearer of the portable terminal device when a designated part of his body is held over the inspection device, and transmits the acquired biometric data via radio directly to the portable terminal device passing in proximity to it. The portable terminal device receives the biometric data, compares it with prestored biometric data, and transmits the prestored user information via radio to the user information inspection device only when a data match is confirmed. Based on the received user information, the user information inspection device permits use by the bearer of the portable terminal device. | 02-05-2009 |
20090039155 | Airport vehicular gate entry access system - A method of securing airport vehicular gate entries by providing mechanisms to check airport employee escorting a vehicle, as well as vehicle driver and passengers and match them against the TSA NO-FLY and SELECTEE lists. The system provides means of authenticating drivers' licenses, verifying employee status, printing temporary passes, printing a temporary vehicle entry pass and certificate, providing the airport police with a handheld apparatus capable of reading the entry certificate and wirelessly verifying its authenticity. The system provides a method of allowing entry for a group of individuals escorted by an airport employee. The system provides also a method for allowing entry of multiples vehicles, escorted by one airport employee. The system is fully automated and is touch screen capable, thus requiring a minimal amount of human interaction. | 02-12-2009 |
20090039156 | Method for Authorized Granting of a Service and Device for Carrying out Said Method - Current electronic cards, such as, for example, proximity cards, smartcards for short, can transmit data to a reader unit over a range of up to about 10 cm. Boosters are used to improve convenience which in essence represent a wireless extension. This is however not adequate with regards to autonomy, function (as a result of termination) and for the differing applications. A method is disclosed in which the transmission of service-specific codes, stored on a number of different smartcards, to a portable device is carried out. The portable device then transmits one or more of the codes via several different communication connections so that access to a service can be activated. By providing services to the corresponding authorized communication connection a modular system is achieved, permitting multiple access for a user to services. | 02-12-2009 |
20090045257 | Federated ID Secure Virtual Terminal Emulation Smartcard - A smartcard using a combination of secure virtual terminal emulation implemented by the smartcard and Federated ID information stored on the smartcard (and optionally on a transaction processor server) to provide secure verification of the personal identity of the cardholder. The Federated ID information provides a high level personal identity verification for the cardholder while secure virtual terminal emulation by the smartcard prevents the Federated ID information from being exposed to the microprocessor and memory resources of a host computer station when the smartcard is used with the host computer station to engage in transactions. The Federated ID smartcard provides a flexible, dynamically adjustable, highly efficient and secure system for personal identity verification for online commerce and a wide range of other application involving personal identity verification. | 02-19-2009 |
20090050695 | EFFICIENT ACCESS RULES ENFORCEMENT MECHANISM FOR LABEL-BASED ACCESS CONTROL - A computer-program product for improving LBAC performance in a database may include assigning a security label to a user of a database. The security label may be one of multiple security labels associated with a security policy of the database. Each of the multiple security labels may then be compared to the user's security label to provide multiple comparison results. These comparison results may be stored in a persistent label comparison results table for later retrieval. Upon receiving a command to read or write to an object in the database, the comparison result associated with the object may be retrieved from the persistent label comparison results table. Access to the object may then be granted or denied based on the comparison result. | 02-26-2009 |
20090050696 | System and method for valid period control - A system for valid period control, comprising: a user device and a paid service server. The user device comprises a device identification code; the paid service server accepts the device identification code; assigns an expiry date according to the device identification code, and then encrypts and sends the device identification code and the expiry date back to the user device. The paid service server of the system for valid period control may be located at a provider of paid services for securities, thus allowing the provider of paid services for securities to manage expiry dates of users independently, and does not require assistance from a securities information service provider. | 02-26-2009 |
20090057401 | SYSTEM AND METHODS FOR PROVIDING PREPAID CAR WASH OR LUBE SERVICES - Systems and methods are disclosed for operating an automated vehicle wash or lubrication system and providing user selected car wash or lubrication services according to a prepaid customer account, in which the customer's credit card is automatically charged at a regular interval or based on a certain number of services having been provided for the prepaid wash or lubrication services. | 03-05-2009 |
20090057402 | Information processing apparatus and information processing system - An information processing system is supplied capable of holding a security; and transferring an output authority which is had by a transfer source portability terminal to a transfer destination portability terminal. In the information processing system, a transfer source sending section for sending authority information to the transfer destination portability terminal for transferring output authority is furnished in a transfer source portability terminal; a transfer destination receiving section for receiving the authority information from the transfer source portability terminal, a transfer destination storing section for storing the received authority information, and a transfer destination sending section for sending authority information to the information processing apparatus are furnished in a transfer destination portability terminal; and an apparatus receiving section for receiving the authority information from the transfer destination portability terminal, a releasing section for releasing an output limitation according to the received authority information and an outputting section for performing an output based on the data are furnished in an information processing apparatus. | 03-05-2009 |
20090065578 | Location Dependent Control Access in a Process Control System - A method of accessing an element in a process control environment using a portable communicator includes defining a plurality of control areas within the process control environment, determining a position of a user operating a portable communicator with respect to one or more of the control areas, establishing an identity of the user, and selectively allowing the user to access an element within the process control environment via the portable communicator depending on the determined position of the user with respect to the one or more control areas and on the identity of the user. | 03-12-2009 |
20090072027 | Subscription antenna strap - An antenna strap for the mobile device is being provided with an antenna extension (means) for receiving wireless broadcast in the mobile device. The antenna extension of the antenna strap extends beyond the traditional antenna of the mobile device so that the mobile broadcast is more feasible and that the antenna strap comprises parameters for initializing an access to the subscribed service delivered by the wireless broadcast. The parameters set the initializing phase for accessing and eventually obtaining at least one subscribed broadcast service. | 03-19-2009 |
20090090772 | METHOD OF CHECKING TRAIN TICKETS - A method of checking train tickets includes the steps of a) detecting authorization data stored in a ticket held by a passenger in a train station and identifiable by an RFID technology by first ticket detecting devices and sending the detected authorization data to a mainframe, b) detecting the authorization data of the ticket held by the passenger on the way of a train by at least one second ticket detecting device to check whether the authorization data detected is feasible for the passenger to take the train and sending the detected result to the mainframe, and c) detecting the authorization data of the ticket held by the passenger after the passenger gets off the train by third ticket detecting devices installed in a train station to determine whether the passenger intending to exit the train station needs to pay an excess train fare. | 04-09-2009 |
20090101708 | SITE-SPECIFIC ACCESS MANAGEMENT - A system for ensuring access management of a given site by providing integrated and comprehensive assessment of persons, livestock or objects that are given access to the site. The system includes a database of information about the site and potential accessors, a mobile wireless communication and scanning device to collect, retrieve and facilitate communication between a device user at the site as well as an administrator console. This system is flexible enough to maintain current information about the persons, livestock or objects requesting access to the site and communicating those results to the device user in real time. The system is further enabled through the Internet and the World Wide Web. | 04-23-2009 |
20090101709 | ENTRANCE CONTROL SYSTEM AND ENTRANCE CONTROL DEVICE - An access control system and device is provided which is capable of preventing, if the system operates, and then, a door, etc., is opened, the entry of a third party due to abuse of an opportunity of the opening. An access control system ( | 04-23-2009 |
20090101710 | Method and System for Unified Presentation of Event Booking Systems - In one embodiment, a system, that may be executed as a method, is provided for managing the booking of event tickets inside a single system, regardless of the source of the tickets and how the system of each ticket provider actually works. | 04-23-2009 |
20090114721 | System having a plurality of service facilities with access control devices - A system has a plurality of groups (A, B) of service facilities ( | 05-07-2009 |
20090121016 | On-Line Authorization In Access Environment - A method for allowing on-line authorization in an access environment. The method includes receiving a request for access to a location at a gate access device from a user. After receiving the request for access to the location, an authorization request message is generated. The authorization request message includes an authorization to charge a predetermined amount of money. The authorization request message is then sent to an issuer for approval. An authorization response message is then received. The authorization response message indicates whether or not the charge is authorized or not authorized. If the authorization response message indicates that the authorization response message is authorized, then the user is allowed to access the location. | 05-14-2009 |
20090134218 | Multifunction removable cover for portable payment device - Methods and devices for conducting financial transactions are provided. Aspects and embodiments include multifunction removable covers for portable payment devices; multifunction removable covers configured as password token type portable payment devices; and multifunction removable covers configured as radio frequency shields to prevent unintended data transmission. | 05-28-2009 |
20090134219 | Biometric Assurance Device And Method - The invention may be embodied as an identity assurance system or method. A system according to the invention may have a biometric sensor capable of providing static biometric indications, a strap capable of positioning the sensor on an organism, and a computer in communication with the sensor. The computer may have software running on the computer in order to (a) cause the computer to determine whether there is a match between a subsequent static biometric indication and an initial static biometric indication, and (b) cause the computer to send a signal indicating whether a match was determined in order to assure the identity of the organism. | 05-28-2009 |
20090140045 | PIV card model # 6800 - A computerized centralized access management system having an access card with personal identification information, a server in communication an access control computer having an access card reader, an add-on computer program stored in the access control computer to perform a method of reading the access card, retrieving personal identification information, transmitting personal information to the server, receiving an access record and noticing the access control computer whether or not to allow access for the individual according to said access record received from said server. | 06-04-2009 |
20090152347 | DEVICE FOR SECURING AN ENCLOSED SPACE BY IDENTIFICATION - The present invention concerns a device for securing an enclosed space by identifying the persons authorized to access it (parking areas, laboratories, high-risk areas), including:
| 06-18-2009 |
20090159674 | PARKING METER AND A DEVICE THEREFOR - A single bay parking meter device is provided which accepts payment by means of a credit or debit card, an electronic purse, or coins. The device has a power supply unit, a solar power charging arrangement and power management, such that it does not need power supply cables to be installed for each meter. The parking meter device also transmits financial data to a financial institution in a wireless manner, also to avoid the need for cabling. The parking meter device is receivable in the base of a conventional single bay parking meter, such that the new parking meter device may be retrofitted to existing coin operated installed single bay parking meters, using a new cover that is also engageable with the conventional housing base. | 06-25-2009 |
20090166411 | HYBRID MULTI-SENSOR BIOMETRIC IDENTIFICATION DEVICE - An improved fingerprint sensing device is provided with multiple sensing apparatus, two or more of which operating on different sensing principles. For example, a capacitive sensor may be integrally formed with an optical sensor on a single substrate. Ideally, the multiple sensing apparatus are disposed such that they may sense nearly identical portions of a fingerprint simultaneously. A primary sensor may be employed to establish the identity of a user based on a fingerprint, while a secondary sensor may be employed to establish that the fingerprint is part of a live human (anti-spoofing). Integrated light sources may be provided to drive an optical sensor. The light sources may also provide visual cues for usage, and enhance the aesthetics of the device. | 07-02-2009 |
20090166412 | AUTOMATIC INTEGRATED SENSING AND ACCESS CONTROL - An access control system for sensing exposure to items of interest for a person associated with a unique identifier of a fare card or ticket is disclosed. The access control system includes the unique identifier, an exposure detector and a processor. The unique identifier associated with the person that is flagged when exposure is detected. The exposure detector detects exposure to items of interest by the person. The processor is coupled to the exposure detector. The message is communicated away from the processor to a remote location when the unique identifier is flagged. | 07-02-2009 |
20090166413 | ENTRANCE GUARD SYSTEM USING ARBITRARY CARD - This invention relates an entrance guard system using arbitrary card comprising one or more card readers for entrance guard controlling, one or more entrance guard controllers, a CPU and one or more guest information input devices, wherein each of the guest information input device includes a guest information reader, a entrance card writing device and a manual input device used for inputting an instruction of registering guest information to the CPU. The CPU acquires the card information captured by a said guest information reader and stores the card information and other guest information in a guest information database as the guest's identification information. This system can use an arbitrary electron card as entrance card. | 07-02-2009 |
20090173787 | INTEGRATED CIRCUIT DEVICE, INFORMATION PROCESSING APPARATUS, MEMORY MANAGEMENT METHOD FOR INFORMATION STORAGE DEVICE, MOBILE TERMINAL APPARATUS, SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE, AND COMMUNICATION METHOD USING MOBILE TERMINAL APPARATUS - A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region is managed in directory units. A personal identification code is set for each application and directory, and the access right is controlled in application units or directory units. If a mobile terminal is lost, the right to access each application in the IC card automatically disappears. Therefore, the right to access each application allocated to the memory region on the IC card is efficiently controlled. | 07-09-2009 |
20090184164 | Secure Commercial Transactions System - A secure financial transactions system. The system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number (PIN) that can include a panic digit or panic PIN. The panic digit or panic PIN can be used to begin an emergency notification sequence including sending emergency signals and video transmissions from the commercial transactions machine. The card can include several biometric devices as well as financial transaction records. The card can include data to interact with data gathered from biometric devices on the ATM or POP devices. The card can then be interfaced with a personal computer. The card could also be made into other formats such as a ring, key chain, or other jewelry. | 07-23-2009 |
20090200373 | System and Method for Implementing an Automated Vault Machine - A system and method for remotely managing a security area such as a safe deposit box repository providing ready access by a community of users includes one or more identity-confirmation steps, followed by granting permission to enter a first secure area. Within the first secure area, further identity-confirmation steps arc performed before access to a second secure area is remotely authorized. Inside the second secure area, the user unlocks one mechanism which secures his specific safe deposit box and, if implemented in the particular vault, a second portion is remotely unlocked, permitting the user access to his box. Egress involves replacing the user's safe deposit box into the assigned location, then exiting to the first secure area. After the door between the second and first secure areas closes, exit from the first secure area is permitted. Identity-confirmation steps may include cards, PINs, biometric tests, visual identification, or other suitable steps. | 08-13-2009 |
20090200374 | METHOD AND DEVICE FOR ARMING AND DISARMING STATUS IN A FACILITY MONITORING SYSTEM - Security systems and methods are implemented using a variety of devices and methods. According to one such implementation, a controller arms or disarms a security system responsive to a contactless card reader. The contactless card reader includes a circuit for wirelessly interfacing with the controller, a battery circuit, and a sensor for detecting a contactless card. The card reader further includes a power-control circuit, responsive to the sensor, to control use of the battery circuit, and a coil for energizing the contactless card in response to the contactless card being detected by the sensor. The contactless card transmits data to the contactless card reader when the contactless card is energized. Responsive to the data transmitted by the contactless card, the contactless card reader wirelessly interfaces with the controller, which arms or disarms the security system based on the data transmitted by the card. | 08-13-2009 |
20090206157 | Method and system for authenticating use of item - A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database. | 08-20-2009 |
20090224036 | System And Method Of Operation Control On An Electronic Device - Systems and methods of application control for use on an electronic device. A device can be configured to receive an operation request from an application. The device can determine whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application. The application is allowed to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application. | 09-10-2009 |
20090230187 | CASH REGISTER SYSTEM AND METHOD OF OPERATING A CASH REGISTER SYSTEM - Aspects of the invention relate to a cash register system and a method of operating a cash register system. The cash register system comprises an age verification system. An image of a person is captured and transmitted to a remote age verification center. An authorization signal is subsequently received if from the image the person can be determined to have an age allowing purchase of the age-restricted item. A release signal is provided only if the authorization signal is received in order to allow payment of the age-restricted item. | 09-17-2009 |
20090236418 | USB Card Reader with Auto-Execution and Method Thereof - A USB card reader with auto-execution and method thereof is disclosed. A HID and an auto-key-in device are included in the USB card reader to execute an on-access program automatically when the USB card reader is mounted with a host system. One or a plurality of characters are keyed in the host system by the auto-key-in device through the HID and they may comprises a hot key for on-access program execution, a website address, a password or a finger print identification data. | 09-24-2009 |
20090255989 | ELECTRONIC DELIVERY OF ADMISSION TICKETS DIRECT TO A PURCHASER - Electronic delivery of counterfeit-resistant documents exchangeable for value such as admission tickets, gift certificates, coupons, vouchers, etc. directly to the person who ordered the documents over an open communications network such at the Internet. A first party orders a document from a second party, and the second party electronically delivers the ordered, counterfeit-resistant document to a device designated by the first party. For example, the document may be electronically ordered using a PC, and a printer coupled to the PC may print the document. In one embodiment, the first party transmits unsolicited offers over the open communications network The document may be made counterfeit resistant by assigning unique information to each document of a given type, e.g., admission tickets, and checking the uniqueness of a document and whether the unique information was previously read prior to allowing it to be exchanged for value. | 10-15-2009 |
20090261163 | ELECTRONIC DEVICE AND INFORMATION TRANSMISSION METHOD THEREOF - An electronic device for transmitting control data according to an external user card includes a control interface, a switching module, and an information center. The information center includes a detection module, a verification module, a control module, and an information transmission module. The detection module detects insertion of the user card. The verification module verifies whether the user card is valid. The control module determines whether the switching module is activated based on the verification of the user card. The information transmission module transmits control data to the control interface when the switching module has been activated. A method for an electronic device for transmitting control data is also provided. | 10-22-2009 |
20090266885 | ACCESS CONTROL PROXIMITY CARD WITH ACTUATION SENSOR - The present invention relates to access control systems using proximity cards, and in particular, to a proximity card and an associated method for controlling activation of the proximity card. The proximity card includes an actuation sensor and an access electronics system connected to the actuation sensor, the access electronics system configured to activate the proximity card in response to an input from the actuation sensor to enable communication of the access information from the proximity card. | 10-29-2009 |
20090266886 | PORTABLE TERMINAL, NONCONTACT IC MODULE, READER/WRITER AND INFORMATION DISTRIBUTION METHOD - Provided is a portable terminal ( | 10-29-2009 |
20090266887 | Method and Apparatus for Ferrous Object and/or Magnetic Field Detection for MRI Safety - A method and apparatus for ferrous object and/or magnetic field detection are provided. Embodiments can improve magnetic resonance imaging (MRI) safety and increase the safety of MRI facilities. Embodiments can detect a given magnetic field strength around a MRI machine and alert users to the field's presence. In an embodiment, the magnetic field warning system can rely on a single badge that warns its user. In another embodiment, the badge can utilize an RFID system. The RFID system can turn the badge on when it enters the MRI room and off when it leaves the MRI room. In another embodiment, a badge with a rechargeable battery and charger can be utilized with or without an RFID tag. The subject badges or other detection devices can be worn by a person, located on or near a ferrous object, embedded in clothing, or located in other positions convenient to a user. | 10-29-2009 |
20090272800 | GAMING SMART CARD - A system has been developed which employs a Smart Card which is approximately the size and shape of an ordinary credit card that an individual can carry in their wallet. It contains a Smart Card chip or similar information storage device which contains information by which the person may be identified. It also contains financial information so the user can make purchases and receive credits. Wireless technologies are employed to provide communication between the Smart Card and a card reader. This card can be used in place of chips or coins in casinos and for on-line wagering. | 11-05-2009 |
20090283589 | ON-LINE GENERATION AND AUTHENTICATION OF ITEMS - Items that require authentication, such as coupons or tickets are printed with a data carrier such as a data matrix or an RFID device. Encoded on the data carrier is a value based token, which comprises a header, a payload and a security portion. The header identifies the token type and also includes a unique identification of the token. A PIN flag may also be included. The payload may be encrypted and contain data which gives an authorised party access to a portion of a databases that stores information corresponding to the token identifier. The security portion may comprise a hash or a digital signature. | 11-19-2009 |
20090283590 | RADIO FREQUENCY IDENTIFICATION METHOD AND SYSTEM OF DISTRIBUTING PRODUCTS - A method and system for vending products from a defined area, such as a micro-warehouse with a door. The method includes fitting each product with a radio frequency identification tag, positioning the plurality of products in a micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the remote processor based on the message. The system is designed to be accessed by authorized individuals possessing some type of code or identifying mechanism. The micro-warehouses may be cabinets, refrigerators, secured rooms, or similar storage units or areas. | 11-19-2009 |
20090283591 | Public transit system fare processor for transfers - An implementation of a system and method for processing transfer rides associated with at least one public transit network is provided. The system and method preprocess transactions to consolidate or eliminate unnecessary transactions with a financial institution clearing and settlement network. | 11-19-2009 |
20090294529 | PARSING AN IDENTIFICATION DOCUMENT IN ACCORDANCE WITH A JURISDICTIONAL FORMAT - An apparatus that authenticates the contents of identification documents provided by different issuers having machine-readable and/or human readable information is disclosed. The contents of the identification documents are verified without encountering any human error. The verified contents of the identification documents may be used for identification purposes such as age restricted purchases, preordained organ donors or possible criminal prosecution. The verified contents of the identification documents may be logged to provide ID checking compliance and/or may be transferred to a remote computer for additional processing or logging. | 12-03-2009 |
20090308921 | DYNAMIC CREDIT CARD WITH MAGNETIC STRIPE AND EMBEDDED ENCODER AND METHODS FOR USING THE SAME TO PROVIDE A COPY-PROOF CREDIT CARD - A dynamic credit card is provided in which a secure credit card number (e.g., a secret/hidden credit card number) is encoded based on a timing signal (e.g., an internal counter) to provide a dynamic credit card number. This dynamic number may be displayed to a user via a display (e.g., so that online purchases can be made) or written onto a magnetic stripe such that the number may be processed by traditional credit card merchants (e.g., swiped). At a remote facility, the dynamic number may be decoded based on time (and/or a counter/key number/equation) or the facility may have the secure number and perform the same function as the dynamic credit card (e.g., encode using time data as a parameter to the encoding equation) and compare the resultant dynamic number to the dynamic number received. Thus, a dynamic credit card number may change continually or periodically (e.g., every sixty seconds) such that credit card numbers may not be copied by thieves and used at later times. A dynamic verification code may be utilized in addition to, or in lieu of, a dynamic credit card number. | 12-17-2009 |
20090314833 | Ticket examining apparatus and ticket examining method - A ticket examining apparatus includes a transmitting and receiving direction switching unit that switches a transmitting and receiving direction of a signal to be transmitted and received by an antenna, provided within a gate, either toward an entrance direction or an exit direction where a user arrives, and a pass permission determining unit that determines whether to permit the user to pass through the gate, by wirelessly communicating with a portable apparatus of the user using a signal transmitted and received by the antenna and switchably directed by the transmitting and receiving direction switching unit toward one of the entrance direction and the exit direction. | 12-24-2009 |
20090321517 | SECURITY DEVICE READER - A method performed by a device may include exchanging encryption information with a security card, generating validation information based on the exchanged encryption information with the security card and transmitting the validation information to the security card for display. | 12-31-2009 |
20100019034 | DEVICE AND METHOD FOR SMART CARD ASSISTED DIGITAL CONTENT PURCHASE AND STORAGE - The present invention discloses a device and a method useful for the provision of secure payment and certification of digital content access, while the devise comprises: at least one IC chip containing an operating system and memory provisions, an interface of a plurality of N plated electrical input contacts (PEICs); interconnected to said IC chip; N is an integer number equal or higher than 1; and, at least one operating system able to process information and recall it, stored on said IC chip; at least one encoding mathematical formula stored on said IC chip that generates a response to input provided by entering a prescribed sequence of electrical inputs to said PEICs by means of said card reader; at least one human interface that prompts the end user to enter data and enables the entry of said data, e.g., by means of an interconnected keypad. | 01-28-2010 |
20100025463 | Digital transmission system (DTS) for bank automated teller machines (ATM) security - This invention describes a hand held digital transceiver to transmit a signal as light (visible and invisible) or sound (audible and inaudible) or other digitized code for alphanumeric in any language, special characters or symbols or graphic or pictures or any combination thereof, to the ATM that is equipped with a compatible digital transceiver card. This card can transmit and receive the said signals and codes using a driver and/or firmware for the operation, management and maintenance of this security system. Upon verification, of the transmitted code, by the ATM, access is granted. The ATM then transmits a randomly selected new code of any combination of the codes or signals stated above to the transceiver for storage in the said transceiver and recording on the client card. The said transmission from the ATM cannot be stored in any other hand held transceiver located within range of the transmission. | 02-04-2010 |
20100059588 | AUTHORIZATION VERIFICATION METHOD AND DEVICES SUITED THEREFOR - The invention relates to an authorization verification method and devices suited therefor, which play back authorization data via a user interface ( | 03-11-2010 |
20100065628 | Multi Application Smartcard with Currency Exchange, Location, Tracking and Personal Identification Capabilities - A smart card capable of performing more than one function, said smart card comprising a first memory means comprising a first set of data to access a bank account, a second set of data to access a credit card account, a third set of data representing the identification of a holder of the smart card, and a fourth set of data to access telephone communication services. The smart card further comprises a microprocessor, said microprocessor being in electrical communication with a second memory means, and a location tracking means for determining a location of the smart card. | 03-18-2010 |
20100065629 | TRANSACTION SECURED IN AN UNTRUSTED ENVIRONMENT - To secure communications in an untrusted environment for a commercial transaction on an account between the account's holder and a merchant, an identifier and a signature can be derived from a token. The identifier is associated by use of a directory with an application context that identifies the account's issuer. The merchant will provide the signature to the account's issuer, or agent thereof, to be verified. In practice, a merchant to the identified issuer of an account an authorization request message for a transaction that includes a signature and an identifier for the account upon which the transaction is to be conducted. The account's issuer responds with an authorization response message that includes an indicator that the signature has been verified. After notice of the signature's verification, the transaction on the account is deemed authorized and the merchant can proceed. | 03-18-2010 |
20100065630 | COVERS HAVING RFID FUNCTIONALITY FOR PORTABLE ELECTRONIC DEVICES - A cover for electronic hand-held devices providing RFID-operability and/or other functional keypad overlay to extend or expand the operation of the device to permit the user to perform additional actions or transactions facilitated by the RFID-operable cover. Method of using the cover for conducting business transactions are also included. | 03-18-2010 |
20100072276 | METHOD AND SYSTEM FOR REWRITING CARD INFORMATION - A system for rewriting card information includes: a personal information acquiring unit that acquires personal identification information for identifying an individual; a card layout information acquiring unit that acquires card layout information indicating a format of a card which records availability information indicating availability of facilities within an area corresponding to the personal information acquiring unit; and a card information rewriting unit that rewrites a format of availability information recorded in a card of an individual identified by the personal identification information acquired by the personal information acquiring unit into the format of the availability information indicating availability of facilities within the area corresponding to the personal information acquiring unit, based on the card layout information acquired by the card layout information acquiring unit. | 03-25-2010 |
20100089999 | VEHICLE UNIT, VEHICLE SYSTEM AND PROGRAM FOR SAME - A portable terminal receives a settlement record information instruction from a user for reading settlement record information, and requests a vehicle unit for an output of corresponding information represented by the user instruction. The vehicle unit then reads the corresponding settlement record information from among all information readable by the portable terminal, and transmits the information to the portable terminal. The settlement record information becomes therefore more accessible for the user without compromising privacy. | 04-15-2010 |
20100090000 | COMMUNICATION METHOD BETWEEN A HANDSET DEVICE AND IC CARDS - A communication method is between a handset device having a slot hosting a first IC card, and a second IC card. The method uses a plurality of commands based on a handset device-IC card interface and intended to drive a communication between the first IC card and the handset device. The method may include providing a second device, including a slot for hosting the second IC card, providing the first IC card and the second IC card with a wireless personal interface supporting a wireless communication, and inserting the second IC card inside the slot. A communication between the handset device and the second IC card is driven by forwarding a command received by the first IC card on the handset device/IC card interface to the wireless personal interface. | 04-15-2010 |
20100090001 | Method and terminal for providing controlled access to a memory card - There is provided a method for providing access to data securely stored in a memory card. An exemplary method comprises receiving the memory card in a terminal. The exemplary method also comprises transmitting a request for accessing the data via a communication link from the terminal to a device. The exemplary method additionally comprises sending first information from the device to the terminal via the communication link upon receipt of the request. In addition, the exemplary method comprises receiving the first information in the terminal and accessing the data using the first information. | 04-15-2010 |
20100096451 | Key-Card Access System for Providing Selective Access to Medical Equipment - An access system for controlling access of a user to one of several unique operative modes of an electronic device used to communicate with an implantable medical device. The access system includes a portable keycard, which is held by a user. The keycard has embedded magnets arranged in a unique predetermined pattern. The electronic device has a housing that provides a slot and a channel for receiving the keycard by the user. A sensing circuit and a processing circuit are both provided. The sensing circuit includes Hall-effect transducers positioned next to the channel so that upon inserted of the keycard, certain ones of these Hall-effect transducers will reside adjacent a magnet, depending on the particular unique pattern. A magnet positioned adjacent a Hall-effect transducer will cause the transducer to send an output signal to the processor indicating the presence of a magnet at the location of the Hall-effect transducer. The Hall-effect transducers collectively generate an electronic pattern representing the particular identity of the keycard. The processor compares this electronic pattern with one of several stored in electronic memory and provides selective access to the device in response to successfully identifying a match. A doctor, a technician, a salesperson and a factory assembly worker are examples of users of this system and each will be granted predetermined access rights to operate the device. Additional Hall-effect transducers may be provided to help detect the intrusion of magnetic fields produced from magnets not located with the keycard. The process will deny any access to the device should any such remove magnetic fields be detected. | 04-22-2010 |
20100096452 | Card Credential Method and System - In one implementation, a method for providing access to a secure facility includes authenticating the user; generating a card credential, transmitting the card credential to an access card carried by of the user, and transmitting the card key to the access card in a form that is usable by the access card. The generating the card credential includes encrypting the card key using a server encryption key. The card key is usable for a challenge-response interaction during subsequent access requests by the user. | 04-22-2010 |
20100116884 | SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES - Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users. | 05-13-2010 |
20100123004 | METHOD AND DEVICE FOR THE AUTOMATED ACCESS CONTROL OF AIR PASSENGERS IN AIRPORTS - In the method for automated access control of air passengers in airports, the boarding pass carried by an air passenger is evaluated. The data recorded as a bar code on the boarding pass is read by means of a bar code reader at a pass-through. A central database is used to check whether a blocking note is stored for the respective boarding pass. If this is not the case, the locking device of the pass-through is opened. As soon as the air passenger has passed through the pass-through, a blocking note relating to the boarding pass is dispatched and stored in the database. | 05-20-2010 |
20100127076 | IMAGE FORMING APPARATUS AND CONTROL METHOD OF IMAGE FORMING APPARATUS - An image forming apparatus includes a power supply unit supplying power to a plurality of components, the power supply unit including a first power mode and a second power mode, the second power mode supplying less power than the first power mode, a control unit controlling which power mode the power supply unit uses, an authentication unit performing a user authentication when power is supplied from the power supply unit in the second power mode and an authentication request received in the second power mode, and a sending unit sending a request signal requesting the control unit to shift the power supply unit to the first power mode when the authentication unit succeeds in the user authentication, wherein the control unit controls the power supply unit to shift from the second power mode to the first power mode upon receipt of the request signal. | 05-27-2010 |
20100133338 | METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device. | 06-03-2010 |
20100133339 | SYSTEM AND METHODS FOR VARIABLE DISTRIBUTION AND ACCESS CONTROL FOR PURCHASED EVENT TICKETS - A system and methods for providing variable distribution and access control for purchased event tickets are described. In one embodiment, a network-based system receives an order for electronic tickets purchased by a buyer, receives one or more recipients other than the buyer for one or more of the electronic tickets, receives delivery options for the recipients from the buyer, receives delivery information for the recipients from the buyer, and delivers electronic ticket information to the recipients. Other embodiments are described and claimed. | 06-03-2010 |
20100140350 | ELECTRONIC DEVICE, CARD ACCEPTING DEVICE, AND IMAGE HANDLING SYSTEM - An electronic device includes: a connection unit for connecting a card accepting device that outputs a card presence signal when the card for using the electronic device has been inserted and ejects the card by at least control with the electronic device; a detection unit that receives the card presence signal and detects that the card has been inserted into the card accepting device; a notification unit that notifies that the card has been inserted into the card accepting device; an operation key; and a control unit for notifying that the card has been inserted into the card accepting device and instructing the card accepting device to eject the card, if it is determined that the detection unit has detected that the card has been inserted into the card accepting device when no operation of the operation key has been accepted within a preset time after a job is completed. | 06-10-2010 |
20100170947 | SYSTEM AND METHOD FOR ELECTRONIC TICKET VERIFICATION, IDENTIFICATION, AND AUTHORIZATION WITH A WIRELESS COMMUNICATION DEVICE - An enhanced security system utilizes a consumer wireless device and independent secure servers to enhance identification and authentication of the electronic ticketing. The consumer may make an eTicket purchase using a network, such as the Internet, in a conventional manner. The server involved in the purchase may send an eTicket confirmation to a consumer wireless device. However, master records of the transaction are sent via a secure link to a vendor server, typically associated with a wireless service provider. At a point just-in-time, the vendor server transmits symbology to the consumer wireless device and transmits additional data related to the symbology to a security server. When the consumer arrives with the eTicket, the consumer also uses the displayed symbology on the consumer wireless device. The symbology is scanned and compared with data transmitted from the vendor server to the security server. If authenticated, the eTicket may be authenticated. In addition, a near field communicator in the consumer wireless device may be programmed to provide additional security. The programmed NFC may be scanned to provide additional authentication. | 07-08-2010 |
20100187304 | Diagnostic delivery service - Systems, methods, and other modalities are described for (a) obtaining an indication relating to an emission module (which may be dangerous, e.g.) or its user (who may be untrained, e.g.) and for (b) configuring the module or causing an irradiation (for imaging, e.g.) in response to the indication. | 07-29-2010 |
20100230489 | COMMUNICATION DEVICE SYSTEM AND CARD-TYPE DEVICE - There is provided a communication device system and a card-type device, in which an attachable and detachable communication device can be attached later only when a control, maintenance or monitor function and an authentication function are required. A communication function, a function to convert an electric signal of a control object device into another communication protocol, and an encryption/decryption function are concentrated on one card, and this card is obtained only when necessary, and the control, maintenance or monitor can be performed remotely. The card is created by an appropriate certificate authority or a manufacture maker of the control object device, and necessary information can be set. | 09-16-2010 |
20100230490 | SECURE ACCESS MODULE FOR INTEGRATED CIRCUIT CARD APPLICATIONS - Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing device includes an unsecure computing environment and a secure computing environment. The secure computing environment is established with a secure access module that includes data and functions for executing the security-sensitive application on behalf of the unsecure computing environment. | 09-16-2010 |
20100243733 | AUTHENTICATION USING PHYSICAL CHARACTERISTICS OF TOKENS - A portable consumer device having a substrate layer, a protective layer and a brittle material layer having an intentionally created unique fissure patterns and systems and methods for making and using same are disclosed. The unique fissure pattern of the brittle material layer is detected and used to authenticate the portable consumer device. | 09-30-2010 |
20100243734 | Smart cards and user terminals including the same - A smart card includes: a host integrated circuit (IC) and one or more secure authentication ICs disposed on a board. The host IC contacts a user's terminal. The host IC is configured to receive signals and execute services in accordance with the received signals. The one or more secure authentication ICs are also configured to receive signals from the host IC and accommodate an application independent of or relevant to the host IC to execute a function of the application. Accordingly, independence and security of the secure authentication ICs is improved. | 09-30-2010 |
20100243735 | CONTROL DEVICE AND USE CONTROL METHOD FOR CONTROL OBJECT APPARATUS - A control device for controlling a use of control object apparatus, including a control section which is configured to read out information recorded in an IC card with noncontact state, to discriminates an attribute of a user based on readout information and previously stored information, and to switch between an authentication mode and a billing mode in accordance with the attribute of the user, wherein in the authentication mode, the control section permits the use of the control object apparatus only with an authentication, and in the billing mode, the control section executes a billing processing on the IC card in accordance with a use state of the control object apparatus. | 09-30-2010 |
20100252624 | APPARATUS AND METHOD FOR INTEGRATED PAYMENT AND ELECTRONIC MERCHANDISE TRANSFER - Interrogation of an electronic device by a first terminal is facilitated, to obtain an account number associated with the electronic device. The electronic device is configured according to a payment specification. The first terminal has a first terminal payment module configured according to the payment specification and a first terminal electronic merchandise module configured according to the electronic merchandise infrastructure and coupled to the first terminal payment module to permit transfer of non-payment e-merchandise related information from the first terminal electronic merchandise module to the first terminal payment module. The interrogation of the electronic device is performed by the first terminal payment module. Generation of non-payment e-merchandise related information by the first terminal electronic merchandise module is facilitated. Transfer of the non-payment e-merchandise related information from the first terminal electronic merchandise module to the electronic device via the first terminal payment module, within a transaction between the electronic device and the first terminal payment module that is conducted in accordance with the payment specification, is also facilitated. The non-payment e-merchandise related information is stored on the electronic device in accordance with the payment specification. The electronic device and the first terminal independently calculate a summary data item. The first terminal calculates a first message authentication code based on the non-payment e-merchandise related information and a terminal-calculated value of the summary data item. The non-payment e-merchandise related information is stored on the electronic device together with an electronic device-calculated value of the summary data item and the first message authentication code. | 10-07-2010 |
20100264214 | METHOD AND SYSTEM FOR PROVIDING CONTRACT-FREE "PAY-AS-YOU-GO" OPTIONS FOR UTILIZATION OF MULTI-FUNCTION DEVICES - A method and system including a plurality of multifunctional devices being operatively associated with at least one controller and each having a preset amount of preloaded consumables at a time of initial use; and a software application for enabling at least one user to access the plurality of multifunctional devices, the software application being configured to receive information from a prepaid card, the information including a financial value relating to usage of some of the preset amount of preloaded consumables in the plurality of multifunctional devices; wherein the financial value of the prepaid card is applied by the at least one user across the plurality of multifunctional devices in any desired uniform or non-uniform financial proportions in accordance with usage determinations; and wherein the at least one user is enabled to pay for access to the plurality of multifunctional devices in time staggered installments without pre-established contractual obligations. | 10-21-2010 |
20100276487 | Method and system for controlling access to an enclosed area - A method and system for controlling access to an enclosed area is described. One illustrative embodiment is an access card reader and controller that is powered via a Power-over-Ethernet (PoE) interface. The access card reader and controller may include a plurality of operating modes, including a network mode in which the access card reader and controller relies on an external access control server to authenticate received card identifiers and a standalone mode in which the access card reader and controller authenticates card identifiers independently of the access control server based on information stored locally in the access card reader and controller. In this illustrative embodiment, the access card reader and controller may also include a local tamper detector configured to detect when the access card reader and controller is being tampered with. | 11-04-2010 |
20100282839 | Method and system for the mobile tracking and accounting of individuals in a closed community - The present invention relates to a real time computer system and method as implemented on the computer system for providing interactive access control, monitoring, identifying and accounting for individuals gaining access to a closed community, comprising: registering individuals having access to the closed community, and one of mustering said individuals, tendering said individuals, verifying age of said individuals, searching said individuals, tracking said individuals for purposes of conducting a triage, responding to incidents wherein said individuals are in jeopardy, tracking excursion events of said individuals, tracking said individuals who are children and clearing enclosed spaces occupied by said individual. | 11-11-2010 |
20100282840 | STOCK MONITORING - System(s) and method(s) for stock monitoring are provided. Stock monitoring system(s) may include, e.g., a housing, one or more doors disposed in or on the housing, a sensor for sensing the condition of the door(s) and providing a door closed signal indicative of the door(s) having been closed by a user; one or more containers for stock items, located within the housing, the or each container having associated therewith a weight sensor for providing a weight signal indicative of the current weight of the container, and control circuitry, coupled for communication with the weight sensor(s). Method(s) may include, e.g., receiving a door closed signal; receiving one or more weight signals; and determining, for the or each container, the number of stock items removed from the container(s) by the user, from the weight signal(s) occurring during a predetermined sensing period, the predetermined sensing period being dependent upon the door closed signal. | 11-11-2010 |
20100294835 | METHOD AND APPARATUS FOR MANAGING SERVICES USING REUSABLE BEARER TAGS - An approach is provided for managing one or more services corresponding to a reusable prepaid bearer tag (e.g., near field communication (NFC) tag, radio frequency identification (RFID) tag, contactless card, or barcode). A request to manage a service is initiated by reading service information from a reusable prepaid bearer tag corresponding to the one or more services. | 11-25-2010 |
20100308108 | APPARATUS AND METHOD OF AUTOMATING ARRIVAL AND DEPARTURE PROCEDURES IN AIRPORT - The present invention relates to an apparatus and method of automating arrival and departure procedures in an airport, by which the forgery of a passport, the identity of a passport bearer, the arrival or departure permission according to a result of arrival and departure examinations, and the carry-on of prohibited items on the plane are automatically checked. The apparatus for automating arrival and departure procedures according to the present invention includes an exit gate, a departure automation apparatus, and may further include an entrance gate and a scanner. In the apparatus for automating arrival and departure procedures according to the present invention, a departure area entry procedure, a security screening procedure, and a departure examination procedure for departure passengers, which are conventionally performed separately in different areas, may be incorporated in the same area and performed therein. | 12-09-2010 |
20100320268 | PROGRAMMABLE TICKETING SYSTEM - A smart-card based system and methods to control access to a plurality of attractions within a geographical area. The system may include one or more reward terminals that are located at attractions and are configured to read smart cards presented to them and, assuming the card is valid for that location, allow the card holder to access the attraction. Each smart card may be programmed with a product code that defines the attractions at which the card may be used. Product codes may be stored in a central database along with a list of the attractions associated with the each product code. The list of attractions may be updated as desired, thereby updating and changing the attractions at which any given card may be used. | 12-23-2010 |
20100320269 | CONTACT-LESS TAG WITH SIGNATURE, AND APPLICATIONS THEREOF - A method, comprising: obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain (i) a candidate identifier and (ii) a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature. Also, a system, comprising: at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain (i) a candidate identifier, and (ii) a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature. | 12-23-2010 |
20110000961 | ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION - An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. The system preferably has the ability to read or scan transaction and account information printed or encoded on the transaction token, digitally encode biometric data, scan drivers' licenses or other identification cards, and take a signature of a customer, all at a transaction location for purposes of account verification. The electronic transaction verification system preferably digitizes various indicia of the token, such as the magnetic ink (MICR) line on a presented check or the magnetic strip on a credit card or debit card, and transmits the transaction information data to a central processing system, at which the central processing system compares the inputted data with an existing database of information to determine if the customer at the point of the transaction is in fact authorized to use the account, and if the account is in satisfactory condition for approval of the transaction. The electronic verification system includes a biometric data device for recording and/or transmitting biometric data taken at the transaction location. The electronic transaction verification system can be used in conjunction with a transaction processing system to determine if the transaction instrument presented for payment is associated with an account established for an authorized user. | 01-06-2011 |
20110000962 | Transit Access System and Method Including Device Authentication - A system, apparatus, and method for enabling effective use of a contactless payment device in a transit system. The invention may be implemented in a manner that separates the authentication process from the pre-authorization process, thereby permitting a transit system patron to access and begin use of the transit system prior to authorization of the transaction by the issuer of the device. | 01-06-2011 |
20110011930 | PARKING METER WITH EV RECHARGING CAPABILITY - A parking meter includes a credit or debit reader to capture financial information; a printer to print parking slips; and a controller coupled to a power receptacle, the controller receiving financial information from the card reader and upon receiving authorization for a credit or debit transaction, printing a parking slip and applying power to the power receptacle to recharge a vehicle battery. | 01-20-2011 |
20110017821 | ACCESS TO A REMOTE MACHINE FROM A LOCAL MACHINE VIA SMART CARD - A method and apparatus for accessing a remote machine from a local machine via a smart card. In one embodiment, the presence of the smart card coupled to the local machine is detected. A card reader reads the credentials from the smart card and communicates them to a remote access client application of the local machine. The remote access client application transmits the credentials to the remote machine. The remote machine sends a query for login information to the local machine upon valid credentials. The local machine transmits the login information to the remote machine and is granted permission to access the remote machine upon valid login information. | 01-27-2011 |
20110024499 | ENTRANCE TICKET WITH LIGHTING EFFECT - A ticket having an embedded processor in a substrate for creating a synchronous lighting effect at a controlled access venue and a method for creating a lighting effect at a controlled access venue while controlling access to the venue simultaneously using a ticket that coordinates with the performance allowing a holder of the ticket to perform with the performance. | 02-03-2011 |
20110057033 | Method for Storing, Delivering, and Receiving Secure Background-Investigation Information - A method for storing, delivering, and receiving background information includes receiving, by a subject, a request for background information from a requesting party. The subject then requests performance of a background information inquiry from a searching party and subsequently receives a background information inquiry result from the searching party. The background information inquiry result is stored on a tangible medium that has at least one mechanism for preventing editing of the background information inquiry result by the subject. The subject then presents the tangible medium to the requesting party, the requesting party knowing that the information has not been tampered with. | 03-10-2011 |
20110057034 | SECURE TRANSACTION DEVICE AND SYSTEM - A portable transaction-enabling device ( | 03-10-2011 |
20110073643 | DATA STORAGE AND ACCESS SYSTEMS - Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable data carrier has an interface for sending and receiving data, data memory for storing received content data, and payment validation memory for providing payment validation data to an external device. The carrier may also store a record of access made to the stored content, and content use rules for controlling access to the stored content. Embodiments store further access control data and supplementary data such as hot links to web sites and/or advertising data. A complementary data access terminal, data supply computer system, and data access device are also described. The combination of payment data and stored content data and use rule data helps reduce the risk of unauthorized access to data such as compressed music and video data, especially over the Internet. | 03-31-2011 |
20110073644 | NETWORK FOR BLOOD PRESSURE DATA MANAGEMENT AND RECHARGEABLE SMART CARD - Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart Cards and synchronized to a database via a secure network. Also, enabling the providers of automated blood pressure readings, such as pharmacies, corporate work sites, health clubs and other customers, to charge a fee for the long-term use of a memory card to record non-invasive physiological test data and make the data available for health consultations. In an automated blood pressure system with one or more memory-card interface devices, a custom-formatted end-user memory card keeps track of the user's non-invasive physiological test data, and a recharge memory card controls the provider's recharging of the end-user memory card after the end-user memory card expires. The contents of the recharge memory card are updated in order to track its use by the provider of the readings. | 03-31-2011 |
20110079646 | COMPOSITE CHIP CARD WITH A SECURITY PROTECTION INTERFACE AND A METHOD FOR CONTROLLING THE SAME - A composite chip card with a security protection interface and a method for controlling the same are provided. The chip card comprises a carrier, at least one induction coil, at least one chip module, and at least one security protection interface. The security protection interface further comprises a mechanical security protection module and a control unit. The induction coil, the chip module, and the security protection interface are all provided on the carrier. The chip module is electrically connected to the induction coil. The mechanical security protection module is electrically connected to the chip module. The control unit is electrically connected to the mechanical security protection module. The method for controlling the composite chip card includes: contacting a system related to issue of the chip card, by a user of the composite chip card; then activating the security protection interface of the composite chip card; and finally performing a contactless payment transaction. | 04-07-2011 |
20110101095 | METHOD AND DEVICE FOR AUTHENTICATING ECONOMIC TRANSACTIONS - A method of conducting an economic transaction includes the steps of wirelessly receiving a card-transmitted signal, where the card-transmitted signal includes user account information and an indicator of an amount of elapsed time between a recognition of a vibration applied to a wirelessly-transmitting credit or debit card and a transmission of the card-transmitted signal from the card. The method further includes determining a last detected vibration at a point-of-sale device, calculating an amount of time elapsed since the identification of the last detected vibration, and comparing the amount of time elapsed since the identification of the last detected vibration with the amount of elapsed time between a recognition of a vibration applied to a card and a transmission of the card-transmitted signal from the card. | 05-05-2011 |
20110101096 | IDENTIFICATION CARD AND NETWORK SYSTEM USING THE SAME - An identification card contains an identification portion that contains identification information for identifying a person, a wireless-information-receiving portion that receives wireless information, an output-information-generating portion that generates output information from the wireless information received by the wireless-information-receiving portion, and an output-information-displaying portion that receives the output information from the output-information-generating portion to display the output information. The identification card can identify the person and receives the output information from the output-information-generating portion to display the output information. | 05-05-2011 |
20110108623 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 05-12-2011 |
20110114722 | MIFARE CARD, MIFARE ACCESS APPARATUS, AND ACCESS METHOD THEREOF - A Mifare card, a Mifare access apparatus, and an access method thereof are provided. The Mifare card has an application index. The Mifare access apparatus may obtain the application index when the Mifare card approaches. The Mifare access apparatus may access the application data according to an application entry address of the application index which corresponds to the application data. Thereby, the application of Mifare card is becoming more flexible. | 05-19-2011 |
20110114723 | DATA STORAGE AND ACCESS SYSTEMS - Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable data carrier has an interface for sending and receiving data, data memory for storing received content data, and payment validation memory for providing payment validation data to an external device. The carrier may also store a record of access made to the stored content, and content use rules for controlling access to the stored content. Embodiments store further access control data and supplementary data such as hot links to web sites and/or advertising data. A complementary data access terminal, data supply computer system, and data access device are also described. The combination of payment data and stored content data and use rule data helps reduce the risk of unauthorized access to data such as compressed music and video data, especially over the Internet. | 05-19-2011 |
20110121073 | METHOD AND APPARATUS FOR OPTICALLY READING INFORMATION - The present invention relates to a novel type of information carrier, on which information is stored in the form of diffraction structures. The information carrier according to the invention can be read by being drawn manually through a reading device. The present invention also relates to a device with which an information carrier according to the invention can be read. | 05-26-2011 |
20110121074 | METHOD FOR REPAYMENT OF ELEVATOR INVESTMENT COSTS - The invention relates to a method for repayment of the investment costs of an elevator on the basis of personal identification of the passenger, by providing the aforesaid passenger with a card comprising the personal data of the aforesaid passenger, on the basis of which card a remote reader installed in connection with the elevator identifies the passenger. | 05-26-2011 |
20110139870 | SECURITY APPARATUS - Disclosed is apparatus for use with an RFID proximity card and with a steel door and frame assembly. The door is of the type having a magnet and the frame is of the type having a bore, which, when the door is closed in the frame, presents towards the magnet. The bore is of the type provided to permit the mounting of a magnetic door contact in the frame. The apparatus comprises a sensor assembly which: in use, is received by the bore and grippingly engages said frame; produces a first signal when the card is operatively presented thereto; and produces a second signal when the door is closed to bring the magnet adjacent the sensor assembly and into alignment with the bore. | 06-16-2011 |
20110192899 | Identification System - The invention concerns generally systems and methods to provide emergency information related to and identification of an individual, such as an infant, separated from a parent or guardian. The system can be designed such that it increases the likelihood that emergency aid providers can gain access to critical information about those individuals who cannot themselves provide such information. The system generally does not require emergency personnel to use any special devices to access information, and instead allows them to access the information using devices that they commonly use. Moreover, the system is designed to increase the possibility that the information accessed by the emergency personnel is up-to-date. | 08-11-2011 |
20110210171 | METHODS AND DEVICES FOR TRANSMITTING AND RECEIVING DATA USED TO ACTIVATE A DEVICE TO OPERATE WITH A SERVER - Embodiments of the systems, devices, and methods described herein generally facilitate transmission and reception of activation data for use in activating a mobile device to operate with a server. In accordance with one example embodiment, an activation barcode is received from a server by reading an image comprising the activation barcode via a computing device, wherein the image is displayed on a display associated with the computing device, and wherein the activation barcode encodes activation data comprising an activation password. The activation barcode is decoded at the mobile device to obtain the activation password, and an authentication is performed using the activation password after a device activation request is transmitted to the server, wherein the mobile device is activated to operate with the server if the authentication is successful. | 09-01-2011 |
20110240736 | Web Service for Enabling Network Access to Hardware Peripherals - The present specification discloses methods and systems to enable a peripheral device, which otherwise lacks intrinsic networking capabilities, to be accessible over a network once attached to a local multi-function device, such as computers, laptops, printers, copiers, or other computing devices. An enabling application executing on the multi-function device includes a first layer that communicates with the local peripheral device using a driver specific to the peripheral device, a second layer that abstracts a subset of functions from the first layer and exposes the subset of functions to a third layer, and the third layer which communicates over the network with a client and provides the client access to the subset of functions through standardized calls. | 10-06-2011 |
20120018512 | SYSTEM AND METHODS FOR VENUE CONTROLLED BUY-BACK AND RESELLING OF ACCESS PRIVILEGES AND TICKETS TO CLOSED GROUP EVENTS - Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription. | 01-26-2012 |
20120037698 | METHOD AND APPARATUS FOR OPTICALLY READING INFORMATION - The present invention relates to a novel type of information carrier, on which information is stored in the form of diffraction structures. The information carrier according to the invention can be read by being drawn manually through a reading device. The present invention also relates to a device with which an information carrier according to the invention can be read. | 02-16-2012 |
20120074223 | CARD CREDENTIAL METHOD AND SYSTEM - In one implementation, a method for providing access to a secure facility includes authenticating the user; generating a card credential, transmitting the card credential to an access card carried by of the user, and transmitting the card key to the access card in a form that is usable by the access card. The generating the card credential includes encrypting the card key using a server encryption key. The card key is usable for a challenge-response interaction during subsequent access requests by the user. | 03-29-2012 |
20120080520 | SITE-SPECIFIC ACCESS MANAGEMENT - A system for ensuring access management of a given site by providing integrated and comprehensive assessment of persons, livestock or objects that are given access to the site. The system includes a database of information about the site and potential accessors, a mobile wireless communication and scanning device to collect, retrieve and facilitate communication between a device user at the site as well as an administrator console. This system is flexible enough to maintain current information about the persons, livestock or objects requesting access to the site and communicating those results to the device user in real time. The system is further enabled through the Internet and the World Wide Web. | 04-05-2012 |
20120080521 | METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device. | 04-05-2012 |
20120091202 | MOBILE APPLICATION BAR CODE IDENTIFICATION METHOD AND SYSTEM - Applicant's Smartphone application provides ticket-holding patrons an alternative, digital means of verifying personal identification at entry to a venue or event. The Smartphone application periodically generates a unique QR code (barcode) that contains a unique identifier (i.e., mobile device ID) which prompts the venue/event entry system to recognize the patron. No barcode (serving as a ticket, or authentication/verification, or otherwise) is downloaded from the system server to the Smartphone/mobile device client in contrast to prior art systems. | 04-19-2012 |
20120125999 | KEYCARD AND KEYCARD-LOCK - To acquire a keycard, the creation of whose clone is impossible, and a keycard-lock that is locked/unlocked by the keycard. | 05-24-2012 |
20120145783 | POWERED AUTHENTICATING CARDS - The present invention provides systems and methods for powered video game playing cards, powered voter authentication cards, powered financial transaction cards, and methods for administering the use of each. The cards generally include a thin, flexible substrate and a battery disposed within the substrate. A dynamic token value generator and/or biometric sensor is disposed within the substrate and is powered by the battery. An electronic display is mounted on the substrate for displaying a token value generated by the dynamic token value generator. The token value is configured to be used in conjunction with a back-end token value secure identification system to provide access to secure electronic information or capabilities. | 06-14-2012 |
20120168500 | IC Card and IC Card Security Authentication System - An integrated circuit (IC) card is adapted for exchanging data with an external computer device, and includes an IC chip for storing owner fingerprint data, a fingerprint scanner, and a control unit coupled electrically to the IC chip and the fingerprint scanner. The control unit includes a central processing unit operatively associated with the IC chip and the fingerprint scanner. The central processing unit is configured to compare user fingerprint data inputted via the fingerprint scanner with the owner fingerprint data stored in the IC chip, and to enable the control unit to conduct a transaction with the external computer device when the user fingerprint data matches the owner fingerprint data. | 07-05-2012 |
20120168501 | CONTROLLING DEVICE AND METHOD FOR CONTROLLING AN APPARATUS - A controlling device that controls an apparatus includes a display unit configured to display an image representing a certain scene included in content that is being played back by the apparatus; and an obtaining unit configured to obtain image data of the image from an apparatus that is providing the content. | 07-05-2012 |
20120187187 | TWO-WAY SYMBOLOGICAL COMMUNICATION BETWEEN ELECTRONIC DEVICES - Symbological communication operates to communicate information and data between mobile and electronic devices. Using certain information, an optical symbology is generated and displayed on the display screen of the mobile device. The optical symbology is read by an optical scanner coupled to the electronic device to read the optical symbology and decode the information contained therein. The electronic device uses the decoded information for different tasks, including providing authorized access to additional functionality of the electronic device by the user. After user interaction with the electronic device, it generates another optical symbology for on its display screen. The user of the mobile device would then capture the image of this optical symbology using the camera function of the mobile device. Applications operating on the mobile device decode all of a part of the additional information for local use or to communicate further to remote servers for additional use or tracking. | 07-26-2012 |
20120199653 | BIOMETRIC IDENTIFICATION SYSTEM - A system and method for locally and centrally identifying individuals based on a combination of biometric data and personal data. An identification document suitable for use in embodiments of such a system and method, and a combination document scanner and biometric data reader that enables and performs some or all of the identification functions such a system and method. | 08-09-2012 |
20120228377 | Automated Passenger Screening Checkpoint - As automated screening system and method. A method includes receiving a personal identifier from an individual at an induction kiosk and issuing a scanning unit at the induction kiosk. The method includes associating the scanning unit with the personal identifier and inducting the scanning unit, including at least one item added by the individual, at the induction kiosk. The method includes conveying the scanning unit to an imaging device, and imaging the scanning unit and the item to produce a scanned image. The method includes receiving the personal identifier at a return kiosk and returning the scanning unit and the item to the individual based on the association between the scanning unit and the personal identifier. | 09-13-2012 |
20120267433 | SYSTEM AND METHOD FOR MONITORING A VALIDATOR - A system for monitoring a validator that assesses a token includes an input device for receiving messages from a machine including a validator. The messages contain data indicative of validator events such as an assessment of a token resulting in acceptance of the token and an assessment of a token resulting in rejection of the token. The system further includes a processor for deriving timing information for the validator events and for comparing the data and timing information with predetermined criteria. Personnel alerts are raised when predetermined criteria are satisfied, and maintenance of validators may be scheduled in dependence upon criteria related to assessments of tokens resulting in rejection. | 10-25-2012 |
20120286039 | SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution. | 11-15-2012 |
20120292391 | COUNTERMEASURES TO SECURE SMART CARDS - The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than cryptography may act as a countermeasure to prevent extraction of cryptographic information such as passwords. In one embodiment, the smart card system of the present disclosure may be used to authenticate a smart card user. A password may be stored within a hidden memory location of a smart card. A smart card may interface with an external device. Data representing the hidden memory location of the stored password may be transmitted to an external device. Access to the hidden memory location of the smart card by the external device may be allowed. The password stored within the smart card memory is compared to input data entered into the external device. If the input data matches the password stored within the smart card, a user may be authenticated. | 11-22-2012 |
20130008958 | PAYMENT AUTHORIZED LOCK SYSTEM AND METHODS OF MAKING AND USING THE SAME - A payment authorized door and/or gate lock system that controls access to a given area through the processing, storage and recollection of data input through a touchscreen user interface. | 01-10-2013 |
20130043306 | Systems and Methods for Accessing Charging Capabilities of Electric Vehicle Charging Stations - Embodiments of the invention can provide systems and methods for accessing charging capabilities of electric vehicle charging stations. According to one embodiment of the invention, a system can be provided. The system can include a computer processor. The system can also include a memory operable to store computer-executable instructions operable to receive a readable code associated with an electric vehicle charging station, and further receive a unique identifier associated with a mobile device; and based at least in part on the readable code and unique identifier, authorize a consumer associated with the mobile device to access charging capabilities associated with the electric vehicle charging station. | 02-21-2013 |
20130048720 | VIRTUAL BADGE, DEVICE AND METHOD - A system, method, and device comprising a virtual badge are disclosed. A virtual badge can be displayed on a cell phone or in another linked portable device, and for security purposes, has images which can be scanned, and the capability to alternate colors and/or self-destruct on a pre-set schedule. Whether for after a disaster or for daily use, the system uses cell phones or mobile devices loaded with specialized software. Using plugin technologies, the system optionally can enable field collected photos and notes on customizable forms to be mapped, tracked, and time/date stamped—including in a 100% disconnected environment. A modifiable virtual badge can aid in inventory, accountability, organization, and efficiency. The system can be employed by the “Whole Community”—citizens, businesses, not-for-profits, and government agencies—for social media, business, cleanup, insurance adjusters, or personnel focused on day to day operations or on mitigation, preparedness, response, and recovery. | 02-28-2013 |
20130056536 | NETWORK FOR BLOOD PRESSURE DATA MANAGEMENT AND RECHARGEABLE SMART CARD - Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart Cards and synchronized to a database via a secure network. Also, enabling the providers of automated blood pressure readings, such as pharmacies, corporate work sites, health clubs and other customers, to charge a fee for the long-term use of a memory card to record non-invasive physiological test data and make the data available for health consultations. In an automated blood pressure system with one or more memory-card interface devices, a custom-formatted end-user memory card keeps track of the user's non-invasive physiological test data, and a recharge memory card controls the provider's recharging of the end-user memory card after the end-user memory card expires. The contents of the recharge memory card are updated in order to track its use by the provider of the readings. | 03-07-2013 |
20130105575 | SYSTEM AND METHOD OF SECURELY DELIVERING AND VERIFYING A MOBILE BOARDING PASS | 05-02-2013 |
20130119130 | SMART CARD READER WITH A SECURE LOGGING FEATURE - A secure smart card reader is disclosed that is enabled to make reader signatures on data representative of events and actions which may be security related and which may include data representative of reader commands received from a host or remote application, smart card commands exchanged with an inserted smart card, data presented to a user for approval, and/or configuration parameters applied when dealing with any of the foregoing. The smart card reader may be adapted to maintain logs of events and actions which may include exchanging reader commands, exchanging smart card commands, and/or interactions with a user. The logs may include data representative of the reader commands received, the smart card commands exchanged, data presented to the user for approval, and/or configuration parameters applied when dealing with any of the foregoing. The secure smart card reader may be adapted to generate a reader signature over the logs. | 05-16-2013 |
20130221094 | Method and System for Providing Identity, Authentication, and Access Services - Described herein are methods and systems for providing identity, authentication, and access control services in a mobile environment utilizing data encoded tags. A server computing device receives tag data and user data from a mobile device, the tag data read from a data-encoded tag in proximity to the mobile device using a short-range communication protocol, and the user data stored on the mobile device. The server computing device authenticates a user of the mobile device based on the user data, determines whether the user is authorized to access an access point associated with the data-encoded tag, transmits a message to the access point that instructs the access point to grant user access if the user is authorized, receives a response from the access point indicating that user access is granted and transmits a message to the mobile device indicating to the user that access is granted to the access point. | 08-29-2013 |
20130256407 | WIRELESS 2D BARCODE COMMUNICATION CONNECTION METHOD - A wireless 2D barcode communication connection method for allowing communication between a handheld device and an electronic device via a wireless access point by: enabling the electronic device to encode and convert the data of the name of the wireless access point, password, encryption and information of the electronic device into a 2D barcode image and to display the 2D barcode image on a display screen so that the handheld device can drive an image capture module thereof to catch the 2D barcode image and a processor thereof to process and decode the 2D barcode image into the original text string data containing the name of the wireless access point, password, encryption and information of the electronic device by which the handheld device can connect to the electronic device via the wireless access point. | 10-03-2013 |
20130264386 | Tap to enter: Method and system for unlocking secured areas/vestibules via contactless enabled financial instruments, cards and devices - Method and system for allowing entry to physically secured areas based on the detected presence of a contactless enabled financial instrument, financial card or financial device, including the ability to unlock or allow entry to a secured area. One embodiment includes the unlocking/allowing of entry into a secured/locked A.T.M. vestibule when a contactless enabled financial instrument, financial card or financial device is detected or tapped on a Contactless Card/Device Reader. Embodiments may include integrating into existing locking systems or working in parallel/complimentary fashion without direct integration. | 10-10-2013 |
20130264387 | Drop Safe System - A drop safe comprising a vault, a computing means within the vault, at least one bill validator, a code reader, and a currency compartment. The computing means is connected to the bill validator and a code reader. The currency compartment receives and stores paper currency from the bill validator. The computing means, initially in idle mode, switches to deposit mode when the code reader detects a deposit initiation code. While in the deposit mode, the computing means monitors the bill validator and the code reader for detection of a deposit of paper currency, deposit termination code, and a time-out condition. The deposit mode terminates when a deposit termination code or a time-out condition is detected, in which case the computing means switches back to idle mode. Methods of depositing cash into the drop safe, and removing cash the drop safe are also disclosed. | 10-10-2013 |
20130284806 | AUTOMATED PURCHASING SYSTEM - Disclosed is an automated purchasing system that utilizes wireless purchaser identifier weight sensing shelves that wirelessly communicate with a store server. Purchasers can utilize a wireless identifier that may comprise an RFID or NFC device, such as a smart phone or tablet computer, which is placed in front of the weight sensing shelf and identifies the purchaser. The purchaser can then remove products from the shelves and the store server keeps track of the items removed. The automated purchasing system eliminates the costly and time consuming checkout process in various stores, such as grocery stores, department stores, hardware stores and other similar stores. Locked compartments and access portals can also be accessed. Also disclosed is a weight measuring hanger that comprises a hanger rod. The hanger rod employs a weight sensor that is sufficiently sensitive to detect the removal or addition of a product from the hanger rod. | 10-31-2013 |
20130292469 | Systems and Methods for Accessing Charging Capabilities of Electric Vehicle Charging Stations - Embodiments of the invention can provide systems and methods for accessing charging capabilities of electric vehicle charging stations. According to one embodiment of the invention, a system can be provided. The system can include a computer processor. The system can also include a memory operable to store computer-executable instructions operable to receive a readable code associated with an electric vehicle charging station, and further receive a unique identifier associated with a mobile device; and based at least in part on the readable code and unique identifier, authorize a consumer associated with the mobile device to access charging capabilities associated with the electric vehicle charging station. | 11-07-2013 |
20130334307 | SYSTEMS AND METHODS FOR MAINTAINING ORDER OF INDIVIDUALS IN A PUBLIC TRANSPORTATION QUEUE - Systems and methods for facilitating and maintaining orderly queuing and boarding of a public transportation vehicle are provided. The system and method generally employ a smart card reader placed at a public transportation vehicle stop (e.g. a bus stop). Each passenger, upon arriving at the stop before the vehicle has, presents a smart card to the card reader in order to secure a position in the queue for the vehicle. When it comes time to board the vehicle, the passengers must board in order according to their assigned position. Enforcement of such may involve the passenger presenting their smart card another time before boarding. If the passenger's position has been reached in the queue, the passenger shall be permitted to board. Otherwise, the passenger is denied entry to the vehicle. The system and method may further comprise a camera and/or a second card reader placed in the vehicle. | 12-19-2013 |
20130341396 | Method for Quick Connection with Network Device and Controller - A method for quick connection with a network device and a controller are provided to connect the controller and the network device through a communication platform. The controller may select at least a login Account ID desired to generate a barcode pattern from the recorded login Account IDs of at least one of the network device for generating the barcode pattern corresponding to the selected at least login Account ID. Another controller may interpret the login Account ID of the network device by the barcode pattern and find out the identification information corresponding to the network device in the communication platform and perform connection. | 12-26-2013 |
20140014720 | NETWORK FOR HEALTH MANAGEMENT AND MOBILE DEVICE CONTROLLED ACCESS - A system comprises a database configured to be coupled to a public wide area network. One or more non-invasive physiological test machines are also configured to be coupled to the public wide area network and are registered at the database for performing one or more non-invasive physiological tests for authorized users. A plurality of electronic readers and/or scanners are each associated with at least one of the physiological test machines for controlling use thereof and for reading machine readable codes presented to the electronic reader/scanner. The machine readable code has associated therewith a number of remaining authorized uses, an authorized time period, and an identification code associated with an authorized user. Records of the non-invasive physiological test results are stored in the database according to the identification code, wherein the machine readable code, the identification code, and the data representative of the non-invasive physiological test results do not carry information representative of the identity of the authorized user. | 01-16-2014 |
20140027507 | INTEGRATED ANTENNA COIL IN A METALLIC BODY - Locking devices, electronic locks, and detection assemblies are provided. One locking device includes an antenna and a conductive body having a cavity disposed around the antenna and formed in an interior portion of the conductive body. The conductive body further includes a slot extending from the cavity to an outer surface of the conductive body. | 01-30-2014 |
20140027508 | Controlling Connectivity of a Wireless-Enabled Peripheral Device - A system includes a wireless-enabled peripheral device configured to be coupled to a personalized security device. The wireless-enabled peripheral device has a wireless communication interface. The system also includes a mobile device configured to establish a wireless connection with the wireless-enabled peripheral device via the wireless communication interface. Upon establishment of the wireless connection, the mobile device is further configured to control establishment of at least one contemporaneous connection of the wireless-enabled peripheral device to one or more other devices attempting to access the personalized security device. | 01-30-2014 |
20140061302 | INTEGRATION OF VERIFICATION TOKENS WITH PORTABLE COMPUTING DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 03-06-2014 |
20140070002 | SYSTEM AND METHOD FOR PRINTER OPERATION BASED ON USER PROXIMITY - Secure, shared operation of a group printer is made possible by tagging a printer with an unpowered, unique, identifying token which can be read by a user's personal mobile electronic device. The user's device transmits both printer and user identification to a remote server or computer, from which a command to start the printer is issued. Commands may be sent using the IP suite of protocols. The system may also support single-use digital tokens to allow users external to the group to print on an occasional basis. | 03-13-2014 |
20140070003 | SYSTEM AND METHOD FOR INTEGRATING AND ADAPTING SECURITY CONTROL SYSTEMS - A system for controlling access to one or more enclosed areas comprises at least one access card reader and controller powered via a Power-over-Ethernet (PoE) interface, each access card reader and controller being capable of controlling access through a particular entrance to a particular enclosed area and an access control server in communication with the at least one access card reader and controller, the access control server being capable of controlling the operation of the at least one access card reader and controller, and a signal converter disposed between the access card reader and the access control server. In a network mode of operation, the access control server is configured to perform authentication of a card identifier (ID) received from the at least one access card reader and controller and to signal the at least one access card reader and controller to unlock a door at the particular entrance to the particular enclosed area when the access control server has successfully authenticated the received card ID. In a standalone mode of operation, the at least one access card reader and controller is configured to perform local authentication of a received card ID independently of the access control server and to unlock a door at the particular entrance to the particular enclosed area when the at least one access card reader and controller has successfully authenticated the received card ID. | 03-13-2014 |
20140076968 | System and Method for Registering Entrants In A Pass Control System Using An Automated Installation Entrants (AIE) System - Disclosed herein is a system and method for registering entrants in a pass control system using an Automated Installation Entry (AIE) system. The method can comprise placing the AIE system in a registration mode. AIE system can further comprise an enclosure having a first surface and a second surface. AIE system can also comprise a first screen mounted within the first surface and a second screen mounted within the second surface. AIE system can also comprise a card reader and a biometric reader mounted on the first surface. | 03-20-2014 |
20140076969 | Access Control Reader Enabling Remote Applications - A system and method for enabling users to run remote applications on access control readers located throughout office buildings. A system administrator creates different remote applications groups such as admin, engineer or cardholder and then assigns users to one of the remote application groups. Users are then able to run the remote applications assigned to their remote application group from any of the access control readers located throughout the office building. | 03-20-2014 |
20140110477 | INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 04-24-2014 |
20140138439 | CLOSING UNIT, CLOSING APPARATUS, AND METHOD FOR UNLOCKING AND/OR LOCKING A LOCK - A closing unit, closing apparatus, and method for locking and/or unlocking a lock is provided. The closing unit can include an actuator for moving or for blocking and releasing a locking and unlocking unit of the lock, an electrical energy supply arrangement, a switch between the electrical energy supply arrangement and the actuator, an encryption/decryption unit, a key memory, as well as a passive RFID basic circuit having an antenna, where at least the actuator, the switch between the electrical energy supply arrangement and the actuator, the encryption/decryption unit, and the key memory are disposed in a housing that cannot be opened without destroying it. | 05-22-2014 |
20140144985 | INTERACTIVE READER COMMANDER - An access control system and a method of operating the same are provided. The access control system includes an interactive reader commander that intercepts commands transmitted from a computing device to a reader and determines if the intercepted commands are security-relevant. Security-relevant commands and possibly other commands are stored unless and until a valid user input is received at the interactive reader commander. | 05-29-2014 |
20140203077 | INTELLIGENT ELECTRIC VEHICLE CHARGING SYSTEM - A battery charging system for an electric vehicle in which an addressable RFID tag, an RFID receiver, an electrical charger, and a controller operate to charge the battery of an electric vehicle according to a user profile and a charging profile in response to a signal received by the RFID reader from the RFID tag. In an interconnected system, multiple charging stations are connected to the electrical power grid and communicate with a central controller through communications links. A grid converter can be provided to allow for backfilling power from an electric vehicle to the power grid in response to a command from the central controller. | 07-24-2014 |
20140203078 | Security control access system - An access control system for controlling access to an enclosed area, the access control system comprising a radio-frequency communication module configured to receive a card identification signal, a mode module configured to determine an operational mode of the access control system, the operational modes including a standalone mode and a network mode, a communication module configured to authenticate the card identification signal by transmitting the card identification signal to an access control server when the access control system is determined to be operating in the network mode, a local authentication module configured to authenticate the card identification signal against entries of one or more internal tables stored in the access control system when the access control system is determined to be operating in the standalone mode, and a local input/output module configured to send a signal to unlock a door at an entrance to the enclosed area when the card identification signal has been successfully authenticated. | 07-24-2014 |
20140209674 | ACCESS LEVEL MANAGEMENT TECHNIQUES - Access level management techniques which require less manual intervention. In one example, a registration system registers an individual for an access level and receives a mobile device identifier from the individual. The registration system generates an electronic pass, which may include a mobile barcode, granting the individual access at the requested access level, and provides the electronic pass to a mobile communication device of the individual using the mobile device identifier. In one application, an individual with a mobile barcode associated with priority access level privileges may be allowed to bypass a queue by using a priority lane. | 07-31-2014 |
20140252088 | CONSUMABLE DATA MANAGEMENT - The present invention relates to methods, devices and systems for associating consumable data with an assay consumable used in a biological assay. Provided are assay systems and associated consumables, wherein the assay system adjusts one or more steps of an assay protocol based on consumable data specific for that consumable. Various types of consumable data are described, as well as methods of using such information in the conduct of an assay by an assay system. | 09-11-2014 |
20140367465 | METHOD FOR VERIFYING THE AUTHENTICITY OF A PRODUCT - In order to verify the authenticity of a product associated with a host device, the product contains, in segments of a non-volatile memory, several different functions stored in ciphered fashion. The host device sends a control signal for selecting and activating one of those ciphered functions. The product then deciphers and executes the function. The result of the function execution is then communicated back to host device when a decision on product authenticity is made. | 12-18-2014 |
20150021393 | Currency Keeper - An electronic safe which incorporates consumer programmable buttons, along with an on-board central processing unit. | 01-22-2015 |
20150034717 | METHOD OF AND SYSTEM FOR AUTHENTICATING A USER TO OPERATE AN ELECTRICAL DEVICE - A user is authenticated to operate an electrical device in a network, by encoding an identification symbol with identification data that identifies the user, and by encoding a composite symbol with the identification data and with operating data that enables the electrical device to be operated. The composite symbol is associated with the electrical device to be operated. An image of the identification symbol, and an image of the composite symbol, are captured and compared. The user is enabled to operate the electrical device when the identification data in the composite symbol matches the identification data in the identification symbol. | 02-05-2015 |
20150041536 | INDUCTION VEHICLE DETECTION AND IDENTIFICATION SYSTEM, INDUCTION LICENSE PLATE, AND INDUCTION READER - An induction vehicle detection and identification system comprising electronic identification devices with electronic memory, mounted on vehicles, and a reader capable of reading and/or writing data obtained from devices in HF-band. Devices have a non-volatile memory and are integrated into the vehicle's license plate. The reader combined with a magnetic frame is in a dielectric casing, which is mounted under the roadway. It generates an alternating magnetic field, which determines the detection and identification range. Minimum time the reader requires to read discrete responses generated by electronic identification devices and to identify the vehicle is less than 25 ms. The identification devices and the reader exchange data at the rate of 1 Kbit/sec or higher, and provide data encoding and decoding, as well as data access restriction. | 02-12-2015 |
20150090785 | System Incorporating Actively Authenticated Multifactor Proximity Card - A portable card including a resonance circuit of that portable card that wirelessly receives power from an external source, a processor of the portable card that wirelessly transmits a predetermined data sequence in response to the resonance circuit receiving power from the external source and a set of at least three contacts on an exterior of the portable card, wherein a user bridges the contacts with the user's fingers in a predetermined combination to create a circuit and activate the processor for transmission of the predetermined data sequence. | 04-02-2015 |
20150102102 | SYSTEM FOR INVENTORY TRACKING AND MONITORING USING A DATABASE OF LOW-POWER ACTIVE TAGS AND A METHOD FOR ITS USE - Described herein is a device and system for very low power wireless communication between small transceivers, which are applied to objects and remote databases or programs. The disclosed device and system requires so little energy that ordinary inexpensive coin cells can power a transceiver for many years. The system disclosed herein gives the benefits of true bi-directional interactive communication but at a very low cost and power requirement. The ability of the transceiver to respond using its own power source represents a fundamental advance in the state of the art over traditional RFID methods. | 04-16-2015 |
20150115028 | TRANSIT FARE COLLECTION SYSTEM - A method and apparatus for collecting transit fares is disclosed. The method implements databases contained within a central database that receive data indicating value. Detectable objects are associated with an identifier, which is then associated with one of the databases. Each identifier stores available fare value data in a database. Detectors that read the identifiers are placed at trip starting and/or endings locations and are coupled or couplable to a local memory that stores the identifiers and associated available fare data. Data sets from the central database comprising an available fare value and its associated identifier are downloaded on to the local memories from the databases. Once a detectable object is detected, its associated identifier is read and a fare is debited from the available fare value. The databases and local memories are periodically updated with updated fare values associated with each identifier. | 04-30-2015 |
20150129657 | System and method for controlling locks - A system and method for opening locks, primarily door locks like the locks on hotel room doors using a handheld mobile device and a QR code. A mobile user can be provided with a QR code either via email or from a mobile phone application (App.). The QRC will be their room key. The handheld mobile device will display the QRC on its display. A QRC scanner is connected to the door lock through a processor that can decode the QRC. The processor sends a command to the door lock to open when the proper QRC is decoded. | 05-14-2015 |
20150136848 | Systems and Methods for Authorizing Access to Facilities - Systems and methods are provided for authorizing access to facilities. In connection therewith, a first request comprising data indicative of a card number is received at a first node. When the first request comprises a request for access to a facility, a set of rules associated with the card number are identified and access to the requested facility is authorized in accordance with the identified set of rules. In addition, a second request comprising data indicative of the card number is received at a second node. When the second request comprises a payment request, a payment provider associated with the card number is identified and the payment request is transmitted to the payment provider. | 05-21-2015 |
20150317856 | REMOTELY OPERABLE LOCKOUT SYSTEM - A lockout system that includes a lock portion and a key portion that removably cooperate with one another to allow selective interference with a throw lever associated with operation of an electrical panel. The lock portion and key portion each include a guide arrangement and an electrical interface that cooperate with one another. The guide arrangements cooperate with one another to align the electrical interfaces of the respective key and lock portions. The lock portion includes a movable lock arm that selectively interferes with motion of the throw lever. The position of the lock arm relative to the throw lever can be manipulated when the electrical interfaces of the key portion and the lock portion are engaged with one another. Preferably, the lock and key interface includes an RFID protocol associated with authorizing respective key portions to communicate with respective lock portions. | 11-05-2015 |
20150318122 | RFID ACTUATED BREAKER CODING INTERLOCK - The disclosed concept pertains to systems and methods to control the passing or entering of a circuit breaker into a cell. The concept relates to employing a RFID-actuated circuit breaker coding interlock. The interlock includes a circuit breaker having a RFID tag that stores information relating to the circuit breaker and a cell structured to receive the circuit breaker. The cell includes a blocking mechanism moveable between a blocking condition which prevents insertion of the circuit breaker into the cell and a non-blocking condition which permits insertion of the circuit breaker into the cell, and an RFID reader module structured to wirelessly receive the information from the RFID tag and determine whether to move the blocking mechanism from the blocking condition to the non-blocking condition based on the information. | 11-05-2015 |
20150356799 | COMMAND INPUT BASED ON DATA-CARRIER ORIENTATION - A command can be input into a system using a data carrier such as, for example, a card. The command is determined based on the orientation of the data carrier relative to a reader of the system. Different commands can be input by changing the orientation of the data carrier. | 12-10-2015 |
20160019736 | SECURITY CONTROL AND ACCESS SYSTEM - The present disclosure provides methods, devices, and systems for controlling access to a controlled area. The method may comprise receiving a card identification signal in an access card controller through an access card reader associated with an entrance to the enclosed area, and then authenticating the card identification signal. The method may then comprise sending an unlock signal through a solid state relay to unlock a door at the entrance to the enclosed area associated with the access card reader when the card identification signal has been successfully authenticated. | 01-21-2016 |
20160035166 | LOCKER SYSTEM USING BARCODED WRISTBANDS - A locker system includes one or more banks of electronic lockers. Each locker has a door lock that releasably retains the door in the closed position. The locker system also includes at least one barcode scanner selectively unlocks the door of at least one of the lockers. A locker manager is coupled to each of the electronic lockers via an electronic network. The locker manager stores a list of unique barcodes that are each associated with a locker rental plan including at least one locker account. Each locker account includes an activation indication, a use indication, a locker type indication, and a duration. The unique barcodes are printed or otherwise included on wristbands, which may be scanned at the barcode scanner to gain access to one or more of the lockers. | 02-04-2016 |
20160104062 | TEMPORARY CUTANEOUS INFORMATION DEVICE, ASSOCIATED METHOD AND RESORT INFRASTRUCTURE - A method for associating a guest with information relating to said guest, comprises accepting a guest for hotel services and associating an identifier with said guest. The identifier is also stored in a storage device guest information is also stored in a storage device. A temporary cutaneous identification device which comprises an adhesive layer with markings deposited there on formed by depositing ink in a configuration representing guest identification and at least a portion of associated guest information. The same is applied to the skin of said guest. | 04-14-2016 |
20160125661 | ELECTRONIC ACCESS AUTHORIZATION AND METHOD FOR ITS USE - An electronic access authorization system maintains location-dependent and/or time-dependent validity data which can be read out wirelessly by an access control device ( | 05-05-2016 |
20160133073 | PAYMENT AUTHORIZED LOCK SYSTEM AND METHODS OF MAKING AND USING THE SAME - A payment authorized door and/or gate lock system that controls access to a given area through the processing, storage and recollection of data input through a touchscreen user interface. | 05-12-2016 |
20160180620 | SMART DOOR LOCK | 06-23-2016 |
20160189452 | SYSTEM AND METHOD FOR INTEGRATING AND ADAPTING SECURITY CONTROL SYSTEMS - A system for controlling access to one or more enclosed areas comprises at least one access card reader and controller powered via a Power-over-Ethernet (PoE) interface, each access card reader and controller being capable of controlling access through a particular entrance to a particular enclosed area and an access control server in communication with the at least one access card reader and controller, the access control server being capable of controlling the operation of the at least one access card reader and controller, and a signal converter disposed between the access card reader and the access control server. In a network mode of operation, the access control server is configured to perform authentication of a card identifier (ID) received from the at least one access card reader and controller and to signal the at least one access card reader and controller to unlock a door at the particular entrance to the particular enclosed area when the access control server has successfully authenticated the received card ID. In a standalone mode of operation, the at least one access card reader and controller is configured to perform local authentication of a received card ID independently of the access control server and to unlock a door at the particular entrance to the particular enclosed area when the at least one access card reader and controller has successfully authenticated the received card ID. | 06-30-2016 |
20180025295 | SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY | 01-25-2018 |