Class / Patent application number | Description | Number of patent applications / Date published |
340500300 | Having indication of improper access | 37 |
20080272881 | Authorisation System and a Method of Authorisation - An access control system ( | 11-06-2008 |
20090128284 | METHOD AND APPARATUS FOR AUTOMATED CONTROL OF A SECURED AREA - A method and apparatus that controls access to a secured area using an automated gate controlled secured environment is disclosed. The method may include receiving an indication that an individual attempting to pass through a clearance area has not been authorized to pass through the clearance area, automatically moving one or more gates to create a channel for the non-authorized individual to be directed to a manual screening area, determining if the non-authorized individual has passed one or more sensor; wherein if the non-authorized individual has been determined to have passed the one or more sensor, then moving a gate located behind the non-authorized individual to enable other authorized individuals to pass through the clearance area while maintaining the channel created to the manual screening area, and preventing the non-authorized individual from gaining access to the automated gate controlled secured environment once the non-authorized individual reaches the manual screening area. | 05-21-2009 |
20100066486 | Method and system for setting security of a portable terminal - The present invention relates to a method and system for setting security of a portable terminal by utilizing an RFID (Radio Frequency Identification) function of a USIM (Universal Subscriber Identity Module) card used in Third Generation portable terminals. For this, USIM card information is registered in an access control server, and the USIM card information of the portable terminal is sensed through a RFID reader installed at a point of entry of a secure area, and the security setting of the portable terminal is automatically performed according to the registration of USIM card information in the access control server. | 03-18-2010 |
20100207721 | SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE - This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message. | 08-19-2010 |
20110163843 | MEDICATION CHAMBER LOCK FOR MEDICATION REMINDER DEVICE - A medication reminder device may be programmed with a set of medication instructions comprising a medication regimen to be presented to an individual in order to promote compliance with a medication regimen, and may also include one or more medication chambers, each containing the medication doses of medications specified by a medication instruction. However, compliance with the medication regimen may nevertheless be reduced if the individual accesses a medication chamber in contravention of the medication regimen (e.g., due to an accident, a misunderstanding, an intentional misuse of the medication, or theft). Compliance with the medication regimen may be further improved by including a medication chamber lock that restricts access to a medication chamber, and a medication chamber lock controller that locks or unlocks the medication chamber lock in order to permit or restrict access to the medication doses of the medication contained therein according to the medication instructions. | 07-07-2011 |
20110279225 | Methods and Apparatus for a Security Electronic Drop Safe - Systems and techniques for providing an improved electronic safe are described. In one aspect, an electronic safe is provided with enhanced security, increased functionality and ease of use. The electronic safe may contain a camera, proximity sensor, vibration sensor and other sensors to sense and identify users. A wireless tag may be used to identify the person making deposits or also personnel making a cash pickup. The security is further enhanced by ensuring the power cannot be removed to the safe by having an internal battery backup power source and management electronics. | 11-17-2011 |
20120075057 | COMMUNICATIONS SYSTEM PROVIDING PERSONNEL ACCESS BASED UPON NEAR-FIELD COMMUNICATION AND RELATED METHODS - A security system may include an access control device associated with a personnel access position. The access control device may include a first Near-Field Communication (NFC) sensor, and a first controller configured to selectively grant personnel access based upon receiving a valid security code from the first NFC sensor, and to deny personnel access and generate an access denial electronic message(s) based upon receiving an invalid security code from the first NFC sensor. The system may also include a mobile wireless communications device(s) including a second NFC sensor and a second controller, which may be configured to communicate a security code via the second NFC sensor to the first NFC sensor based upon proximity therewith, and to receive a corresponding access denial electronic message from the first controller based upon the security code being invalid. | 03-29-2012 |
20120169458 | Method and System for Monitoring Physical Security and Notifying if Anomalies - A method and system for monitoring access requests for physical access to a location includes a plurality of access control devices for control accessing to specific locations. The system determines if access is authorized based on comparing information associated with the request with a database. Access is granted to a physical location based on the comparison of information. In addition, the system compares an access request to prior access requests. The system determines if the access request is an anomaly from previous requests. If the access request is an anomaly from previous requests, the system notifies an operator that the access request is an anomaly. | 07-05-2012 |
20120249288 | RF-ID TAG READING SYSTEM FOR USING PASSWORD AND METHOD THEREOF - Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to receive a tag data transmission request signal from an outer reader, and a tag controller to request the reader to transmit the password if the tag data transmission request signal is received, and then to transmit the tag data if the password received from the reader is identical with the pre-determined password. Accordingly, it can be prevented for a third-party, who does not know the password, to check the tag data. | 10-04-2012 |
20120280782 | FRAUD PREVENTION - A method of preventing fraud at a self-service terminal is described. The method comprises: receiving a signal from an electromagnetic sensor located in the vicinity of an electromagnetic signal transmitter; monitoring a drive signal being delivered to the electromagnetic signal transmitter; and comparing the drive signal with the electromagnetic sensor signal. The method then ascertains if a state of the electromagnetic sensor signal is inconsistent with a state of the drive signal; and triggers an alarm when the state of the electromagnetic sensor signal is inconsistent with a state of the drive signal. | 11-08-2012 |
20130076482 | SECURE ACCESS SYSTEM EMPLOYING BIOMETRIC IDENTIFICATION - A secure access system includes security stations | 03-28-2013 |
20140062650 | MOBILE TERMINAL DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, PROGRAM, AND INTEGRATED CIRCUIT - A mobile terminal device which a user carries includes: an entry determining unit for determining entry of the mobile terminal device in a residential area; an authentication information storage unit for storing authentication information indicating multiple authentication actions performed by the user carrying the mobile terminal device and an authentication order indicating an order of the authentication actions to be performed; an authentication processing unit for processing for authentication of the user by determining, based on the authentication information, whether or not the user has performed the authentication actions in the authentication order after the mobile terminal device enters the residential area; and an alarm processing unit for indicating a failure of the authentication when the result of the processing for the authentication is the failure. | 03-06-2014 |
20140104035 | CONCEPTS FOR ASSET IDENTIFICATION - Systems, methods, apparatus, and computer program products are provided for identifying assets (e.g., mobile assets and/or personnel assets). In one embodiment, a mobile asset can be uniquely identified from RFID tags. In another embodiment, mobile assets and personnel assets can be identified from captured image data. After identification, it can be determined whether the asset (e.g., mobile asset and/or personnel asset) is authorized for one or more activities and a corresponding perceivable indication can be generated. | 04-17-2014 |
20140104036 | CONCEPTS FOR ASSET IDENTIFICATION - Systems, methods, apparatus, and computer program products are provided for identifying assets (e.g., mobile assets and/or personnel assets). In one embodiment, a mobile asset can be uniquely identified from RFID tags. In another embodiment, mobile assets and personnel assets can be identified from captured image data. After identification, it can be determined whether the asset (e.g., mobile asset and/or personnel asset) is authorized for one or more activities and a corresponding perceivable indication can be generated. | 04-17-2014 |
20140203904 | COMMUNICATIONS SYSTEM PROVIDING PERSONNEL ACCESS BASED UPON NEAR-FIELD COMMUNICATION AND RELATED METHODS - A security system may include an access control device associated with a personnel access position. The access control device may include a first Near-Field Communication (NFC) sensor, and a first controller configured to selectively grant personnel access based upon receiving a valid security code from the first NFC sensor, and to deny personnel access and generate an access denial electronic message(s) based upon receiving an invalid security code from the first NFC sensor. The system may also include a mobile wireless communications device(s) including a second NFC sensor and a second controller, which may be configured to communicate a security code via the second NFC sensor to the first NFC sensor based upon proximity therewith, and to receive a corresponding access denial electronic message from the first controller based upon the security code being invalid. | 07-24-2014 |
20140285314 | PORTABLE MEDICATION DISPENSING CONTAINERS - A medication delivery system is disclosed that includes a portable container and a controller. The portable container includes a body and a lid that forms a securable storage compartment, and a latch that is coupled to the body and configured to releasably secure the lid. The portable container also includes a processor and a power source coupled to the latch, the processor causing the latch to release when an access signal based on a unique identifier is received. | 09-25-2014 |
20140354399 | ENHANCED SECURITY SYSTEM - A security system ( | 12-04-2014 |
20150015362 | Remote Control Unlocking and Locking System - A portable, temporary removable system for locking and unlocking a door knob, door lever or locking deadbolt without the requirement of using keyed entry. Several manners of automated locking and unlocking are introduced and the instant system is designed for quick installation and removal. Once attached, the system may be remotely controlled from the outside of the door via a pattern of knocks, via electronic communications or a combination of a knock pattern and electronic communication. | 01-15-2015 |
20150348340 | REMOTELY ACTUATED DOOR LOCK - A remotely actuated door lock is provided. The remotely actuated lock includes a transceiver for establishing telephone communication with a remote telephone and for receiving a transmitted identification code therefrom. The door lock includes a microprocessor, a programmable logic controller or the like for comparing the transmitted identification code with a stored identification code stored in memory associated with the processor or controller. The door lock further includes a lock bolt actuator in communication with a lock bolt for changing a state of the door lock. The lock bolt actuator is selectively actuated if the transmitted identification code matches the stored identification code. However, if the transmitted identification code does not match the stored identification code, then the transceiver transmits a first alert message to a user, alerting the user to possible unauthorized access. | 12-03-2015 |
340500310 | Lockout or disable | 9 |
20090146779 | Home entertainment system providing presence and mobility via remote control authentication - An apparatus in one embodiment is operable to receive, from a remote control device associated with a video display device, biometric input of a user. Responsive to a match of the biometric input with stored biometric data of the user, the user is authenticated. The remote control device and/or the video display device are then configured based on user settings associated with the stored biometric data of the user. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. | 06-11-2009 |
20090251282 | SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device. | 10-08-2009 |
20100039219 | ELECTRONIC ASSEMBLY HAVING MEANS TO PREVENT NON-PERMITTED DISASSEMBLING OF ITS COMPONENTS - An electronic assembly includes a terminal unit, a signal connector and a memory device. The terminal unit includes a plurality of terminals consisting of a set of coupler terminals and a set of control terminals. The signal connector is utilized for electrically connecting to the coupler terminals, wherein electrical connection of the signal connector to the coupler terminals results in a first relation signal. The memory device is utilized for storing a first relation data corresponding to the first relation signal. Once the signal connector is electrically disconnected from the coupler terminals and upon required the signal connector is again electrically connected to the terminal unit results in a second relation signal such that the electronic assembly is prevented from being operated in case the second relation signal fails to conform to the first relation signal. | 02-18-2010 |
20100283580 | DEVICE AND METHOD FOR DETECTING THE OPENING OF A VESSEL - A device and a method for detecting the opening of a vessel are disclosed, the device includes: a control circuit which stores and provides the identification data, an antenna which is connected to the control circuit forms a circuit loop together with the control circuit, and the antenna has an extending unit; the antenna provides the communication channel to the control circuit; the antenna and its extending unit and the control circuit are attached to the vessel, when the vessel is open, the antenna, the circuit loop or the control circuit is destroyed, thus the control circuit cannot provide the identification data. With the device and method, the vessel, such as container, is prevented from being illegally opened or replaced without knowing in the transporting or keeping process. | 11-11-2010 |
20140253286 | Wireless Tracking and Security System - A wireless tracking and security system for a facility has particular application for an academic facility. A coordinator terminal has an integrated reader, a touchpad and a time display and a communication link for communicating with a host computer, as well an RF communication module. In one embodiment, a plurality of point-of-entry/exit terminals are connected by RF communication links and are mounted at classroom entrances within the facility. Time and attendance data entered on the terminals is compiled for transmission to the host. A panic switch may be incorporated into the terminals to provide an emergency alert and, in some embodiments, automatically lock the entrance to the classroom. Various input readers and devices can be employed at the coordinator terminal and the point-of-entry/exit terminals. The wireless tracking and security system also interfaces with terminals of a mobile carrier, such as a bus. | 09-11-2014 |
20140292478 | ACCESS MANAGEMENT - Access management method and apparatus comprising a ticket data input device configured to acquire ticket data from a presented ticket. Network interface configured to communicate with one or more other ticket verification devices on a network and data storage. Processor configured to receive ticket data from the one or more other ticket verification devices. Send received and/or acquired ticket data to the one or more other ticket verification devices. Store the acquired and/or received ticket data on the data storage. Verify the acquired ticket data from the presented ticket by comparing it with stored valid ticket data | 10-02-2014 |
20140361870 | UNAUTHORIZED PERSON DETERRENT APPARATUS, SYSTEM, AND METHOD OF USE THEREOF - A unauthorized person deterrent apparatus is shown comprising a ingress cover, a ingress cover opening mechanism, a ingress cover opening mechanism deactivator, a ingress cover opening mechanism deactivator switch, a audible alarm deactivator, and a ingress cover locking mechanism. The ingress cover opening deactivator switch is configured to operate the ingress cover opening mechanism deactivator, the deactivator in turn to cause the ingress cover opening mechanism to deactivate, and the ingress cover to close and lock. | 12-11-2014 |
20140375420 | RELAY ATTACK PREVENTION FOR PASSIVE ENTRY/PASSIVE START SYSTEMS - A keyfob is disclosed for use in detecting an attack on a vehicle. The keyfob includes a microcontroller, a wake receiver and an accelerometer. The wake receiver is configured to measure received signal strength and save the measured value in received signal strength indicator (RSSI). The accelerometer is used to generate acceleration data. The microcontroller detects an attack based on the RSSI and the acceleration data. | 12-25-2014 |
20160040471 | Weapon Storage Assembly - A weapon storage assembly includes a housing that may be coupled to a vertical support surface. A door is movably coupled to the housing. A processor is coupled to the housing. A lock is coupled to the housing. The lock is operationally coupled to the processor. The lock engages the door so the door is retained in a closed position. A keypad is coupled to the housing. The keypad is operationally coupled to the processor. The user engages the keypad. The keypad unlocks the lock. A tazer is positioned within the housing. The user accesses the tazer after the door is opened. The tazer is used to subdue an assailant. | 02-11-2016 |
340500320 | Visual indication | 7 |
20100001829 | Anti-vehicle theft identification system - The present invention discloses an anti-vehicle theft identification system, which comprises an input device and at least one identification system. The input device is used to read data from a card, and the identification system is installed on a vehicle body. The identification system further comprises a memory unit, an identification unit, a control unit and a light emitting component. The memory unit stores data for comparison and identification. The identification unit compares the data read by the input device with the data stored in the memory unit to determine whether the two pieces of data coincide. If the two pieces of data coincide, the identification unit triggers the control unit to turn on the light emitting component. The light emitting component is arranged on an easy-to-see area of the vehicle body and lightens when the identification passes, whereby the status of the vehicle can be easily recognized, and everyone can learn at a glance whether a vehicle is in legal usage or a possible stolen vehicle. Therefore, an anti-vehicle theft identification system increases the vehicle identification rate and reduces the vehicle theft rates. | 01-07-2010 |
20100164680 | SYSTEM AND METHOD FOR IDENTIFYING PEOPLE - A system for identifying a person includes at least one biometric sensor for sensing a biometric characteristic of the person; at least one signal sensor for sensing a signal emitted from a device carried by the person; and a computing device for comparing the sensed biometric characteristic and the sensed signal to known characteristics of the person in an attempt to identify the person. | 07-01-2010 |
20120019356 | FINGERPRINT SCANNER - A machine including a processor, a power button, a fingerprint scanner coupled on the power button, and an authentication application executable by the processor for comparing a user fingerprint image with a stored fingerprint image. | 01-26-2012 |
20140002237 | Apparatus and Method for Vehicle Operation Using Biometric Fingerprint identification | 01-02-2014 |
20140009261 | IN-VEHICLE CHARGER - An in-vehicle charger includes a charger that charges a device to be charged including a wireless key of a keyless entry device, a controller connected to the charger, and a detection unit connected to the controller and that detects an installation state of the device to be charged relative to the charger. The controller turns on power supply to the charger and controls the keyless entry device to perform first communication verification when the installation state of the device to be charged relative to the charger is detected by the detection unit. The controller turns on the power supply to the charger when it is determined that the communication verification of the keyless entry device has been performed. | 01-09-2014 |
20140152421 | NEAR FIELD COMMUNICATION BASED KEY CONTROL SERVICE - Systems and techniques for providing a near field communication (NFC) based key control service and automated notification system are provided for automatically reporting unauthorized or restricted uses of an NFC-enabled physical key to the primary user or owner of the key via a communication network. An NFC reader is configured to communicate with a server of the NFC based key control service via a network in order to report attempted violations of one or more use restrictions defined for the key, as detected by the NFC reader when the NFC tag embedded within the key is located near a third-party device associated with a restricted use of the key. | 06-05-2014 |
20160042631 | DETECTING AND IDENTIFYING FARE EVASION AT AN ACCESS CONTROL POINT - Systems and techniques are presented for identifying fare evasion at an access control to a paid area. Received signal strength (RSS) is determined for wireless signals communicated between two or more wireless transceivers and a fare media. A position of the fare media is determined based on the RSS and the position is added to a collection of positions. A position of an object is detected and the position of the object is compared with each position in the collection of positions. A determination is made that the position of the object is not proximate to any position in the collection of positions and an indicator light is generated on the floor proximate to the position of the object. | 02-11-2016 |
340500330 | Including link to remote indicator | 2 |
20090153291 | METHOD AND APPARATUS FOR COMMUNICATING ACCESS TO A LOCKBOX - A real estate security system is described wherein access to a lockbox, that houses a key, causes automatic notification to an owner/occupant associated with the property. Such a communication can be used to alert the owner/occupant that a real estate showing is started or completed, that a friend or family member arrived home safely, that a property management accessed the house, or that emergency personnel accessed the house. The lockbox can include additional features that cause notification to the owner, such as automated sensing of tampering with the lockbox, or depressing a button on the lockbox to generate a signal to the owner/occupant of the property. | 06-18-2009 |
20170236347 | Pattern Analytics and Physical Access Control System Method of Operation | 08-17-2017 |