Entries |
Document | Title | Date |
20080211624 | Physical access control - A system and method are disclosed for controlling physical access through a digital certificate validation process that works with standard certificate formats and that enables a certifying authority (CA) to prove the validity status of each certificate C at any time interval (e.g., every day, hour, or minute) starting with C's issue date, D | 09-04-2008 |
20080284561 | Method for protecting data - The present invention is to provide a method for protecting data applied to an electronic communication device, which enables the electronic communication device to receive a wireless signal containing a data output instruction transmitted by a user of the electronic communication device when the electronic communication device is stolen or lost, output a plurality of preset protected data stored in the electronic communication device to an external storage device, and delete the preset protected data from the electronic communication device so that the preset protected data no more exists in the electronic communication device and can't be used by others who picked up or stole the electronic communication device. | 11-20-2008 |
20080290988 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS WITHIN A SYSTEM OF NETWORKED AND NON-NETWORKED PROCESSOR-BASED SYSTEMS - In one embodiment, a method controls access within a secured facility. The method comprises: temporarily denying access to the end-user by a non-networked access controller; indicating, by the non-networked access controller, to the end-user that the end-user should proceed to a validation point access controller, wherein the validation point access controller is a networked access controller; writing data to the access card by the non-networked access controller indicative of the temporarily denied access request; reading the access card of the end-user by a validation point access controller and, in response to the data written by the non-networked access controller, establishing a communication connection from the validation point access controller to permit auditory and/or visual data to be obtained from the end-user before authorization for the access is given; and writing access right data to the access card of the end-user by the validation point access controller. | 11-27-2008 |
20080303629 | VEHICLE-USE KEY, MAINTENANCE SUPPORT/MANAGEMENT SYSTEM OF VEHICLE, AND STOLEN VEHICLE CHECK SYSTEM - A vehicle-use key for storing and for acquisition of information on a vehicle. The vehicle-use key permits an individual to use the vehicle, to prevent the key from being taken away when the vehicle is stolen and for finding the stolen vehicle. A vehicle-use key is used for starting a vehicle, and is configured to include a radio communication part (RFID) which performs communication with an external communication device. By providing the radio communication part to the vehicle-use key which an owner of a vehicle carries with him/her, information (data) can be transmitted or received between the radio communication part and the reader/writer of a PC terminal installed in a dealer or the like by radio. Thus, vehicle history data, maintenance history data and the like on a vehicle associated with the vehicle-use key can be transmitted and received and stored when necessary. | 12-11-2008 |
20080309453 | APPARATUS AND METHOD FOR STARTING AUTOMOBILE ENGINE - Provided are an apparatus and a method for starting automobile engine by a radio communication between an automobile smart key and a smart key electronic control unit (ECU). According to this invention, it is decided whether or not a transmission lever position signal and a break pedal signal are ON. The smart key ECU requests a smart key for a smart key ID when both signals are ON, and receives the smart key ID from the smart key. Then the smart key ECU performs the verification of the smart key using the received smart key ID and turns the starting control relay ON when the smart key is verified. Additionally, when the ignition switch is turned ON within the prescribed time after the starting control relay is turned ON, the smart key ECU supplies the electric power from the ignition switch to the starting motor, thus starting the automobile engine. | 12-18-2008 |
20080309454 | Vehicle function execution system, vehicle apparatus, portable device, recording medium, and information center - A storage circuit of a portable device stores setting data concerning a function installed on a used vehicle or an in-use vehicle. Stored setting data of the portable device is read when the user gets in an in-use vehicle after use of a used vehicle. Setting data stored in the storage section of the vehicle apparatus is also read. The two read setting data are compared. When a comparison result shows a difference, execution of a function is permitted based on setting data read from the storage circuit of the portable device. The user can be notified of a function not used by the user or a new function when execution of the functions is permitted. | 12-18-2008 |
20090021345 | Dynamic Control Containment Unit - The present invention is a dynamic control containment unit for holding a plurality of discrete items, including a signal emitting mechanism associated with each of the plurality of discrete items, an enclosed housing having at least one receptacle accessible by a user and having at least one of the plurality of items contained therein, a passive signal receiving mechanism in communication with the receptacle for receiving signals emanating from the signal emitting mechanism and a securement system configured to prevent unauthorized access to the dynamic control containment unit. A controller is in communication with the signal receiving mechanism and initiates actions based upon the signal content. | 01-22-2009 |
20090121830 | EMPLOYING EXTERNAL STORAGE DEVICES AS MEDIA FOR ACCESS CONTROL PANEL CONTROL INFORMATION - The present invention advantageously provides a flexible system and method for a security system having a control panel with control information for performing security operations, and a token having its own control information, such that the panel reads control information from the token and determines if the token is authentic, and, if it is, the panel updates its control information in accordance with the token's control information and performs the security operations based on its updated control information, and the updated control information is copied from the panel to the token. | 05-14-2009 |
20090153290 | Secure interface for access control systems - An access control system and methods utilizing secure Wiegand communication interface are disclosed. In one example embodiment, an access control system includes an a plurality of RFID cards, a RFID reader and an access controller. The RFID reader collects user identification information communicated thereto via RFID cards and forwards it to the remote access controller. The access controller process the received identification information and determines whether to grant RFID card holder access to a restricted area or service. The RFID reader communicates with the access controller via a secure Wiegand interfaces, which utilized RFID reader identifiers, message sequence numbers and data encryption techniques to secure data transmissions between the RFID reader and access controller from various types of attacks. | 06-18-2009 |
20090201127 | Bicycle securing system - A bicycle securing system consisting of a bicycle station as well as at least one bicycle is described. | 08-13-2009 |
20090243792 | PROCESS VARIATION BASED MICROCHIP IDENTIFICATION - An apparatus comprising a multiplexer circuit, a plurality of bit generation circuits, and a control circuit. The multiplexer circuit may be configured to generate an intermediate signal in response to (i) a plurality of input bits and (ii) a control signal. The plurality of bit generation circuits may each be configured to generate one of the plurality of input bits. The control circuit may be configured to generate the control signal. | 10-01-2009 |
20090256674 | Programmable Selective Wake-Up for Radio Frequency Transponder - A remote keyless entry (RKE) transponder has a programmable selective wake-up filter for determining whether the RKE transponder should wake-up to process a received signal. The wake-up filter correlates the timing of an input signal's carrier amplitude on and off time periods to a predefined programmable time period profile for a desired signal which has a certain carrier on time (time period on) and a certain carrier off time (time period off) arranged into a coded “header.” When a received signal matches the predefined time period profile, then the RKE transponder will wake-up to process the incoming signal data. The predefined time period profile may be programmable and may be stored in a header configuration register. Each RKE transponder has unique predefined time period on and time period off profiles. | 10-15-2009 |
20090267728 | METHOD OF VISITING A SITE - A method and system for providing an interactive experience to a visitor of an entertainment venue comprising a plurality of locations. The visitor is assigned a portable identification device having stored thereon information uniquely identifying the visitor. A central computer then randomly directs the visitor to a first one of the locations and retrieves at the first location the information from the identification device in order to identify the visitor. In this manner, the visitor can be presented with content customized according to his/her unique profile. | 10-29-2009 |
20090273437 | KEY-OPERATED SWITCH - A key-operated switch includes a first excitation device which generates a first alternating magnetic field and has a first inductance. The key-operated switch is constructed in such a manner that the first alternating magnetic field can be used to scan a first coding of a key, with the first coding changing the first inductance of the first excitation device. The first coding is read by the key-operated switch in this manner. The key associated with the key-operated switch has a carrier element which is not electrically conductive and is not magnetizable. Arranged on the carrier element is the first coding which is made of an electrically conductive and/or magnetizable material. As a result, the key can be scanned without wear. | 11-05-2009 |
20100007459 | ANTITHEFT SYSTEM - In a system for preventing an equipment such as lawnmower from theft, there are equipped with an internal combustion engine that is mounted on the equipment and is equipped with a generator that generates electric operating power when the engine is operated, a recoil starter to be manipulatable by an operator to operate the engine, an electronic key that is adapted to be carried by the operator and stores authenticating data for identifying the operator who carries the electronic key; and an authenticator that is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key. In the system, the authenticator performs the authentication check when the electric operating power is supplied from the generator, thereby enabling to be installed in battery-less equipment and ensure to prevent the equipment from theft. | 01-14-2010 |
20100066487 | SYSTEM AND METHOD FOR AUTOMATIC KEY RECOGNITION - A system and method are disclosed for using a single key to authenticate a user with respect to multiple user access points and to allow a single access point to authenticate multiple keys having different physical characteristics. The system may comprise an access control system that includes an insertion receptacle for receiving a physical key, and a translation device for observing the physical characteristics of the key and translating those characteristics into electrical signals. In a learning mode, the electrical signals are transmitted to a processor and stored in memory. In a verification mode, the electrical signals are transmitted to the processor and compared with the previously-stored signals. If the processor concludes that the signals match the signals stored in memory, then the processor instructs a lock actuation mechanism to actuate an access control device to allow the user access to a location. The translation device may comprise a laser light reader, a piezoelectric crystal, a variable resistor, an electromagnet, or an image acquisition device. A method of using the system is also disclosed. | 03-18-2010 |
20100073127 | DEVICE USE RESTRICTING SYSTEM - A device is provided with a reader/writer that wirelessly communicates with an RFID module in a con-contact manner that resides within a wireless communications area of the device, and an optical transmitter transmitting a signal receivable by the RFID module in an area in the vicinity of the device within the wireless communication area of the device, the signal receivable area being narrower than the wireless communication area. The device determines whether an ID of an RFID currently performing wireless-communication is stored in its storage as an authorized ID, or not. The optical transmitter initiates signal transmission on the condition of the determination that the corresponding ID is stored. Upon receipt of the signal from the optical transmitter by a photoreceptor, the RFID module wirelessly transmits an authentication request signal to the device. Having received the authentication request signal from the RFID module, the device authenticates the ID and authorizes the use of the device based on the establishment of the authentication. Thus, the use of the device by unspecified users can be excluded at a high ratio without impairing the convenience of users of the device. | 03-25-2010 |
20100079236 | CONNECTION PARTNER DEVICE CONTROL APPARATUS AND CONNECTION PARTNER DEVICE CONTROL METHOD - According to one embodiment, a connection partner device control apparatus includes a reception module configured to receive a valid key codelist transmitted from a connection partner device, a storage module configured to store the valid key codelist, an information output module configured to output guide information used to guide operable keys based on the valid key codelist, an acceptance module configured to accept a key operation input, and a control module configured to check validity of the key operation accepted by the acceptance module based on the valid key codelist and to control the connection partner device based on the valid key operation. | 04-01-2010 |
20100097173 | Entry/Exit Managing Device and Information Communication Terminal - An entry/exit managing device for controlling entry and exit of a user, who carries a portable memory and an information communication terminal, to and from a predetermined place includes: a portable memory communication unit which reads and writes data from and to the portable memory; a user managing unit which executes user authentication on the basis of user information stored in the portable memory; and a network device use information managing unit which manages network device use information used to set a network device use setting parameter in the information communication terminal. The portable memory communication unit reads the user information from the portable memory when the user enters the predetermined place. The user managing unit executes the user authentication on the basis of the user information. The portable memory communication unit writes the network device use information in the portable memory, when the user authentication succeeds. | 04-22-2010 |
20100176917 | Access Control System - An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage device. In one example, the access controlled storage may include a first outer door having a physical lock and a second interior door having an electronic lock. The physical lock and the electronic lock may require different keys. Additionally or alternatively, unlocking the interior door may require unlocking of the first door in an authorized manner. Access and inventory data may be transmitted to or received from remote devices through wireless communication networks. | 07-15-2010 |
20100188189 | SAFETY SYSTEM FOR CONTROL OF THE ACCESS TO AN OBJECT - A safety system is provided for control of the access to an object with a lock, that can alternatively be locked or unlocked by a mechanical key subsystem and by a remote control key subsystem offers the possibility to intentionally deactivate a remote control key subsystem by using for example the mechanical key subsystem when locking the object. Later, the remote control key subsystem can be reactivated by using the mechanical key subsystem again for unlocking. This way, the use of the remote control key subsystem can be prevented in situations where a theft of a remote control key is more probable than in other situations. | 07-29-2010 |
20100188190 | ELECTROMECHANICAL LOCK - An electromechanical lock and its operation method is disclosed. The method includes: reading data from an external source; matching the data against a predetermined criterion; providing a fulcrum provided that the data matches the predetermined criterion; holding the lock by a locking pin, when engaged, in a locked state, and, when disengaged, in a mechanically openable state; and if the fulcrum is provided, levering mechanical power with the fulcrum to the locking pin to mechanically disengage the locking pin. | 07-29-2010 |
20100194527 | Tool Operated Combination Lock - A process for opening a combination lock having a known opening sequence with a tool having a driven portion operable only upon receipt of an authorization, the process including associating the tool's driven portion with the lock such that the driven portion automatically calibrates with the lock irrespective of the initial position of the lock and authorizing the driven portion to proceed through the known lock opening sequence of a predetermined series of clockwise and counterclockwise rotations to unlock the lock. A method of opening a combination lock with a tool, the combination lock having an opening sequence consisting of clockwise and counterclockwise rotations of a non finger manipulable lock opening component, the method including mating the tool with the lock opening component and operating the tool to rotate the lock opening component through a series of clockwise and counterclockwise rotations corresponding to the opening sequence to unlock the lock. | 08-05-2010 |
20100214058 | SECURITY ACCESS METHOD AND SYSTEM - A method includes transmitting a request for authorization to enter a physical space over a payment processing network that processes financial transactions. The financial transactions are transmitted between an acquirer institution and an issuing institution via the payment processing network. A response is received, granting or denying authorization to enter the physical space from the payment processing network. | 08-26-2010 |
20100231351 | SYSTEMS AND METHODS FOR CONTROLLING A SMART COMMUNICATION SYSTEM FOR A VEHICLE - A smart communication system and method for a vehicle includes a master switch for toggling smart functionality on and off. An actuation signal is received by a control unit corresponding to a particular vehicle function. The actuation signal indicates that a corresponding actuating operation is occurring. The control unit determines whether the master switch is in an ON position. A key fob of the vehicle is confirmed to be within a search field of the vehicle when the master switch is determined to be in the ON position. The particular vehicle function is actuated when the key fob is confirmed to be within the search field; otherwise, manual actuation of the particular vehicle function is required. | 09-16-2010 |
20100245034 | METHOD OF READING MRZ USING SAM FOR ELECTRONIC CHIP BASED TRAVEL DOCUMENT OR IDENTIFICATION DOCUMENT - Basic Access Control (BAC), as described in the ICAO specifications for machine readable travel documents, requires Basic Access Keys to establish a BAC session. Up to now, the information used to generate these keys has been optically scanned from the Machine Readable Zone (MRZ) of the document data page. This invention allows the Basic Access Control feature to be implemented securely without visually/optically scanning the data page of the MRTD. | 09-30-2010 |
20100271171 | KEYLESS ENTRY DEVICE OF VEHICLE - A keyless entry device of a vehicle includes: a transmission unit installed in the vehicle that transmits a search signal to a search range including an area inside the vehicle and a vicinity area outside the vehicle; a reply unit installed in a portable device carried by a user that transmits a reply signal when receiving the search signal at several locations within the search range; a determination unit that individually determines whether the portable device is present in the area inside the vehicle and the vicinity area outside the vehicle within the search range on the basis of the reply signal transmitted from the portable device; and a control unit that controls locking or unlocking of a door of the vehicle on the basis of the determination result of the determination unit. | 10-28-2010 |
20100277273 | SYSTEM AND METHOD FOR ASSIGNING DRIVER STATUS TO A SPARE KEY AND FOR PROGRAMMING THE SPARE KEY TO A VEHICLE - In at least one embodiment, a method and device for assigning a driver status of one of a primary driver and a secondary driver to a spare key is provided. A controller is configured to receive a first key identification signal from a first key indicative of the driver status for the first key being that of one of the primary and the secondary driver. The controller is configured to determine whether the driver status indicated on the first key identification signal corresponds to the one of the primary driver and the secondary driver. The controller is configured to receive a spare key identification signal and assign the spare key identification signal to correspond to the driver status as indicated on the first key identification signal. | 11-04-2010 |
20100283578 | Transponder Bolt Seal and a Housing for a Transponder - An electronic seal ( | 11-11-2010 |
20100328024 | DRUG-TRANSFER DEVICE, DRUG-DELIVERY SYSTEM INCORPORATING THE SAME, METHODS OF FABRICATING THE SAME, AND METHODS OF ENABLING ADMINISTRATION OF A DRUG - A method of enabling administration of a drug includes determining, within a drug-transfer device including cells, a location of at least one cell and generating information identifying the determined location. A user may be provided with the drug-transfer device. The drug is retained within the at least one cell when the user is provided with the drug-transfer device. The method also includes encoding a key with the information and providing the user with the key before, after or when the user is provided with the drug-transfer device. Drug retained within the at least one cell is selectively releasable when the key is operably proximate to the drug-transfer device and is encoded with the information. The key can be encoded with the information before and/or after being provided to the user. In some embodiments, the key is encoded based on instructions transmitted over a network. | 12-30-2010 |
20110001604 | AUTOMATIC INCIDENT REPORTING IN AN ACCESS CONTROL SYSTEM - A reporting facility for use with a portable access control system to generate an incident report in connection with identification information that is associated with an individual. The reporting facility compares at least some of the identification information with identification records corresponding to persons of interest, and when the identification information substantially matches a record corresponding to a person of interest, the reporting facility applies one or more access rules to determine whether the individual is to be granted or denied access to the location. The reporting facility automatically generates an incident report based on the received identification information. The amount and/or type of information included in an incident report may vary based on whether the identification information substantially matches a record corresponding to a person of interest, received environment information, such as a threat level, etc. The reporting facility transmits the generated incident report to an appropriate authority. | 01-06-2011 |
20110001605 | MEDICAL MONITORING SYSTEM - Medical patient monitoring devices that have the capability of detecting the physical proximity of a clinician are disclosed. The medical patient monitoring devices may be configured to perform a selected action when the presence of a clinician is detected. Systems and methods for facilitating communication between medical devices that use different medical communication protocol formats are also disclosed. For example, a medical communication protocol translator can be configured to receive an input message formatted according to a first protocol format from a first medical device and to output an output message formatted according to a second protocol format supported by a second medical device using a set of translation rules. Medical monitoring reporting systems are also disclosed. The medical monitoring reporting systems may be used to analyze a stored collection of physiological parameter data to simulate the effect of changing various medical monitoring options. | 01-06-2011 |
20110109426 | METHOD, DEVICE, AND SYSTEM FOR SECURED ACCESS TO GATED AREAS - Embodiments of the present invention allow vehicular ingress and egress to an automotive facility using a mobile communication device, such as a smart phone, having thereon a software application adapted to communicate with a gate unit. The mobile communication device may transmit one or more parameters to the gate unit, which may determine whether to open a gate or which may transmit the parameters to a server, which may determine whether to allow or deny access. | 05-12-2011 |
20110115602 | SYSTEMS AND METHODS FOR COMMISSIONING ACCESS CONTROL DEVICES - Described herein are systems and methods for commissioning access control devices. In overview, a carrier substrate such as a smartcard is used to commission a plurality of access control devices. Measures are implemented such that the individual access control devices are uniquely commissioned. That is, no two devices apply identical commissioning data, hi some embodiments this is achieved by, as part of the commissioning process at a given access control device, modifying one or more aspects of the data carried by the carrier substrate. | 05-19-2011 |
20110128119 | UNLOCKING A LOCKED USER DEVICE USING A COMPUTER GENERATED UNLOCK CODE PROVIDED BY A USER - According to one embodiment, a first unlock code is received | 06-02-2011 |
20110181388 | PORTABLE ELECTRONIC DEVICE AND METHOD FOR CONTROLLING PORTABLE ELECTRONIC DEVICE - According to one embodiment, a portable electronic device includes, a first communication module configured to communicate with an external device by a first communication scheme, a second communication module configured to communicate with the external device by a second communication scheme, a command processing module configured to process commands, a determination module configured to determine whether a command following a first command received by the first communication module exists or not, and a control module configured to perform a control to suspend a processing for a second command received by the second communication module after receiving the first command and to wait for reception of the following command following the first command by the first communication module, if the determination module determines that the following command following the first command exists. | 07-28-2011 |
20110187493 | METHOD AND SYSTEM FOR PERMITTING REMOTE CHECK-IN AND COORDINATING ACCESS CONTROL - Methods, systems, and devices for controlling access within a multi-facility room are provided. More specifically, a guest of the multi-room facility is allowed to remotely confirm reservations to the facility as well as bypass the front desk of the multi-room for check-in purposes. At a location within the facility, the guest is allowed to confirm their arrival, check-in, and have their access credential written with personalized access data that may be useable for the duration of the guest's stay. | 08-04-2011 |
20110205014 | Method and Apparatus for Training a Learning Movable Barrier Operator Transceiver - A system and method for training a learning transceiver to a movable barrier system includes a learning transceiver that is configured for being trained to the movable barrier system. To provide ease of use to consumers, a user is able to train the learning transceiver to the movable barrier system without needing to push a button on a movable barrier operator or use a pretrained transmitter. To this end, a movable barrier operator is configured to transmit a transmission signal to the learning transceiver including a rolling access code, which is used to train the learning transceiver. To maintain the security of the movable barrier system and to restrict unauthorized users from accessing the movable barrier system, the movable barrier operator waits to transmit the transmission signal, including the rolling access code, to the learning transceiver until it has received an indication that a predetermined event occurred. | 08-25-2011 |
20110210818 | Electronic Access Control Device and Management System - A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, etc. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors. | 09-01-2011 |
20110221565 | DYNAMIC ACCESS CONTROL IN RESPONSE TO FLEXIBLE RULES - A dynamic access control facility that enables an operator to determine whether to grant or deny access to an individual based, in part, on the status of the individual. The operator scans the individual's identification information from an identification record using a scanning device. To determine the status of the individual, the facility decodes the scanned identification information and identifies candidates based on the decoded identification information. The facility may identify a number of candidates or no candidates. For each authorized candidate, the facility selects for display the locations or resources that the candidate is authorized to access. When there is at least one candidate, the facility displays the selected candidate(s) to the operator indicating the status of the individual and/or whether access should be denied or granted. In some embodiments, when no candidates are identified, the facility indicates whether the individual should be denied or granted access. | 09-15-2011 |
20110227697 | PASSENGER FLOW MONITORING METHOD AND SYSTEM - A method for passenger flow is described. A boarding pass identifier of a boarding pass is electronically identified at a workstation of one or more first workstations at a first level. Boarding pass information associated with the identified boarding pass identifier is electronically retrieved at the workstation. It is determined, via one or more computers, whether the boarding pass is valid based on the retrieved boarding pass information. If the boarding pass is determined valid, a holder of the boarding pass is directed, via one or more computers, to a queue for one workstation of a plurality of second workstations at a second level based on the retrieved boarding pass information. Each workstation of the second workstations has a different queue arranged before the workstation. If the boarding pass is determined not valid, the boarding pass holder is directed away from entering the queues. A system is also described. | 09-22-2011 |
20110234370 | USER IDENTIFICATION DEVICE - A user identification device for an access system and/or starting system of a vehicle has an energy source such as a battery or an accumulator for making available a supply voltage. In addition, there are provided a measuring device for sensing the supply voltage currently made available by the energy source and an open-loop control and evaluation device for comparing the sensed current supply voltage with a first predetermined threshold value voltage and for detecting at least one function of a plurality of functions which can be carried out by the open-loop control and evaluation device when the current sensed supply voltage drops below the first predetermined threshold value voltage. By deactivating specific functions when the energy source becomes weak while other specific functions remain activated, the critical state of the energy source of the user identification device can be signaled to a user without additional display devices being necessary. | 09-29-2011 |
20110254659 | Electronic Locking System with Wireless Update and Cascade Lock Control - A wireless access control system comprising a central access control system connected through a wireless network to a remote access control system comprised of a plurality of localized remote access controllers (locking mechanisms). The plurality of remote access controllers will generally be used to lock parts of a facility, whether physical facilities, parts thereof or mobile components within the facilities, and will allow for a supervisory function to determine which users of the system are allowed to access which resources within a facility. Also disclosed herein is an interlinked cascade lock system coupled to a central access control system that is comprised of at least two levels of security. | 10-20-2011 |
20120001725 | Identification Processing Apparatus and Mobile Device Using the Same - An identification processing apparatus is provided for performing an identification procedure according to a smart card, including a storage unit for storing a first password; and an authentication unit for determining whether to perform the identification procedure according to a second password and the first password. | 01-05-2012 |
20120007711 | Method, system, and apparatus for secure media checkout - A method, system, and apparatus for secure media checkout of media contained within locked media cases that have information tags thereon identifying at least the media contained therein and the checkout status thereof, and specifically for controlling and effecting the unlocking of media cases presented for unlocking as part of a checkout process subsequent to a checkout match and recordation phase wherein media case matching occurs, utilizing a media case unlocking system that includes a media unlocking station or mechanism, a tag reader, such as a radio frequency identification transponder or bar code reader, a multicolor optical sensing array, a visual display, a microprocessor, and associated software, to control the media case unlocking phase of the checkout process and, preferably, to determine case type, case color, case position, and lock condition of the media case presented for unlocking. | 01-12-2012 |
20120019355 | PROTECTIVE-CONTROL MEASURING SYSTEM AND DEVICE AND DATA TRANSMISSION METHOD - According to one embodiment, when sending a transmission target main data | 01-26-2012 |
20120025947 | SECURITY SYSTEM WITH OFFLINE CREDENTIAL ANALYIS BASED ON LOCATION INFORMATION WHERE SECURED ACCESS IS DESIRED - An exemplary security system includes a credential holder having a credential database that contains specified secured area credential information indicating at least one secured access location between a specified secured area and a specified adjacent area where the credential information is valid for authorized access. An access control device at a selected position corresponding to the secured access location is configured to receive the credential information when the credential holder is near the access control device. A processor of the access control device has stored access control information including indications of the specified secured area, the specified adjacent area and the secured access location. The processor autonomously determines that access to the specified secured area will be granted when the received credential information corresponds to the stored indications. | 02-02-2012 |
20120025948 | POWER MANAGEMENT CIRCUITRY FOR ELECTRONIC DOOR LOCKS - A power management circuit decreases power consumption in an electronic door lock. The power management circuit includes an ON/OFF circuit, a load switch circuit and a electronic door lock circuit. The ON/OFF circuit generates an initial enable signal in response to a detected keycard that places the load switch circuit in an enabled state. When enabled, the load switch circuit provides dc power to the electronic door lock circuit that allows the electronic door lock circuit to receive identification input from the detected keycard and determine whether an output should be generated to actuate the door lock mechanism. Having completed the keycard detection operation, the electronic door lock circuit generates a self turn-off signal that is provided as feedback to the ON/OFF circuit to disable the load switch circuit. When disabled, the load switch circuit prevents any power from being provided to the electronic door lock circuit and thereby conserves energy otherwise consumed by the electronic door lock in times between activations. | 02-02-2012 |
20120032776 | ELECTRONIC SYSTEM AND METHOD OF CONTROLLING THE SAME - An electronic system and a method of controlling the same are provided. The electronic system has an electronic device and a remote controller. The electronic device has a storage unit for storing a first password. The remote controller is used to control the operations of the electronic device. When a switch module of the remote controller is pressed, the remote controller generates a power on signal. The power on signal has a power on command and a second password. When the first password and the second password are the same, the electronic device is permitted to complete a power on operation according to the power on command. Accordingly, the electronic system has an anti-theft function. | 02-09-2012 |
20120038453 | DATA KEY AND METHOD OF USING SAME - Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium. | 02-16-2012 |
20120068814 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units, comprises: generating second data reflective of dynamic events within the secured facility, the second data being indicative of the user of the at least one of the access control cards initiating one of the at least two separate event sequences; and performing access control decisions for the user of the at least one card according to the first data and the second data, wherein (i) the access control decisions permit the user of the at least one access cards to traverse through an event sequence initiated by the user, and (ii) the access control decisions prevent the user from traversing through another event sequence until the user completes the event sequence initiated by the user. | 03-22-2012 |
20120075058 | ENTRY/EXIT CONTROLLING SYSTEM AND METHOD - Comparison data required when a visitor enters/exits a region for which entry/exit is controlled, including one shared code that is shared between visitors and personal information of the visitor, is generated by a comparison data generating portion, where an entry/exit authorization evaluation for the visitor of a region is performed by an entry/exit evaluating portion through comparing, to entry/exit evaluation information, a shared code that is included in the comparison data that is obtained from a reader that is provided at the region, from a recording medium whereon the comparison data of the visitor is recorded, where the entry/exit of the visitor at the region is controlled based on the evaluation result by the entry/exit authorization evaluation, and where processing details of the entry/exit authorization evaluation and personal information included in the comparison data are recorded into a storing portion as historical information pertaining to the entry/exit authorization evaluations. | 03-29-2012 |
20120098638 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units physically distributed at different physical locations within the secured facility, comprises: performing access control decisions for the user of the at least one card according to the first data and the second data, wherein (i) the access control decisions determine whether a dynamic event variable set to a value determined by the second data satisfies a constraint defined by the first data or whether temporary tolerance data permits deviation from an applicable access control parameterized rule, and (ii) the access control decisions are performed in a de-centralized manner substantially where the access cards are presented to access control units without requiring access control logic being involved at a central access control system. | 04-26-2012 |
20120126937 | ASSET MANAGEMENT INFRASTRUCTURE - Asset management for control of electric appliances comprises a keycode unit and an equipment unit embedded in an appliance. The keycode unit is located in a protected environment and relates to an asset management area. The equipment unit may store an appliance identification code. The keycode unit and the equipment unit may be in communication contact, whereby the equipment unit sends positioning coordinates to the keycode unit, and wherein the equipment unit is adapted to lock the appliance via the lock unit, in response to a lock signal that the equipment unit receives from the keycode unit, if the appliance moves outside the asset management area. | 05-24-2012 |
20120139694 | System and Method for Interfacing Facility Access with Control - A system for interfacing facility access with control employs an electronic bridge that transparently conveys data between functional devices, such as remotely located card readers and door strikes, and a network incorporating a control and monitor computer that has access to a database of user identifications and permissions. The electronic bridge is flexibly configured to accept a wide range of protocols used by the devices and converts messages to data packets without prior knowledge of the length of the message. | 06-07-2012 |
20120139695 | ANTITHEFT SYSTEM OF CHARGER FOR ELECTRIC VEHICLE - An antitheft system of a charger for an electric vehicle that prevents theft of a charger during charging a battery of the electric vehicle is disclosed. | 06-07-2012 |
20120223808 | EMERGENCY OPERATION OF ELEVATORS - An access control system includes at least one door fitting to a secured area of a building and at least one identification code on a mobile data carrier. The identification code is read by a read device of a door fitting. If the read-in identification code is valid, access is granted to the area secured by the door fitting. An authorization code is transmitted from a processor via at least one communication connection to a central processor. A verification step is carried out to determine whether the transmitted authorization code corresponds to a valid authorization code for an area profile. Upon successful verification of the transmitted authorization code, write and read rights for the area profile are released to the processor transmitting the authorization code. The released area profile is changed by the processor via a communication connection. | 09-06-2012 |
20120235784 | METHOD AND APPARATUS FOR SENSING CAPACITANCE VALUE AND CONVERTING IT INTO DIGITAL FORMAT - A capacitive sensing system are configured to sense a capacitance value and convert the sensed capacitance value to a digital format. The capacitive sensing system provides good selectivity and immunity to noise and interference, which can be further enhanced by enabling spread spectrum excitation. In some embodiments, the capacitive sensing system utilizes a sinusoidal excitation signal that results in low electromagnetic emissions, limited to narrow frequency band. In some embodiments, the capacitive sensing system is configured to operate in a spread spectrum mode, in which the majority of the excitation signal power is carried in the assigned bandwidth. The excitation frequency and the bandwidth of the spread spectrum excitation signal are programmable in a wide range, which allows for avoiding frequency conflicts in the operating environment. | 09-20-2012 |
20120268236 | Security System for Containers - A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged. | 10-25-2012 |
20120280783 | SYSTEMS AND METHODS FOR CONTROLLING A LOCKING MECHANISM USING A PORTABLE ELECTRONIC DEVICE - Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises providing a first web service for receiving credentials or a command from a portable electronic device having a software application installed thereon, issuing a command for receipt by the lock from the web service, and providing an application programming interface at the first web service for integrating a second web service or the software application with the first web service to allow the portable electronic device to communicate with the lock or web service. | 11-08-2012 |
20130063242 | ELECTRONIC KEY FOR ACCESS TO A MECHATRONIC CYLINDER - A method of using an electronic key for access to one or more mechatronic locks when the key moves from place to place, including the key periodically transmitting its geographical location to an access management server so as to allow said server to identify location coordinates for the key, and receiving an access profile from the server where the access profile includes a set of one or more cylinders accessible to the key and is based at least in part on the key's location. If the key's new location causes a change in access profile information associated with the key, the key's previous access profile is preferably replaced with the key's new access profile in an irreversible manner. The key preferably self-supervises its communications with the server by deactivating its access profile if it no longer receives information from the server for a predetermined period of time. | 03-14-2013 |
20130069759 | AIRPORT SECURITY SCREENING SYSTEM AND METHOD - A system for performing airport security screening of canyon bags and other separately scanned carry-on items such as electronics. The system includes a number of airport divestment and luggage carts. Each of the carts includes a frame with a lower support for receiving carry-on luggage, and the frame further supports security bins for receiving separately scannable items (such as a computing device). The system includes a 3D scanner scanning items passed through a scanning tunnel. The system also includes a conveyance system engaging the carts and transporting the carts through the scanning tunnel for 3D scanning, with such scanning including the carry-on luggage and the separately scannable items in bins. Typically, the frame of each of the carts is formed of one or more non-metallic materials and is non-collapsible. Further, the carts may be oriented to be upright during transportation through the scanner. | 03-21-2013 |
20130088320 | Wireless Network Hotel Room Management System - A wireless network hotel room management system includes a communications network. The system includes a computer connected to the communications network and includes a memory configured to store programming and a processor to execute the programming. A guest room unit is situated in each guest room and is in data communication with the network. A housekeeping module is in communication with the network. The computer monitors real time status of the room. Each guest unit is configured to receive projected absence data from a guest and to communicate the same to the computer through the communications network. Programming executed by the processor determines if received projected absence data is indicative that a guest will be gone long enough for housekeeping to clean the room and, if so, communicates a housekeeping order. The system includes a room reservation module for reserving a room and receiving a room key. | 04-11-2013 |
20130088321 | METHODS AND SYSTEMS FOR USING RFID IN BIOLOGICAL FIELD - Biological reagent carrier devices and methods are disclosed, which employ RFID techniques to associate information with biological reagents. | 04-11-2013 |
20130088322 | METHODS AND SYSTEMS FOR USING RFID IN BIOLOGICAL FIELD - Biological reagent carrier devices and methods are disclosed, which employ RFID techniques to associate information with biological reagents. | 04-11-2013 |
20130135079 | CLEANING APPLIANCE - A cleaning appliance is provided including at least one authorization carrier with an access authorization which is provided thereon and is required for accessing the cleaning appliance, just one receptacle in which the at least one authorization carrier is positionable, and a detection unit, situated at the receptacle, for contact-based detection of the access authorization of an authorization carrier positioned in the receptacle, the detection unit having at least one detection contact element which contacts the access authorization. To provide a cleaning appliance of this type which is usable with greater versatility, it is proposed that the cleaning appliance include two or more authorization carriers with access authorizations provided thereon which are linked to different authorization profiles, wherein a range of functions dependent on the authorization profile linked to an access authorization can be provided to an operator by the cleaning appliance. | 05-30-2013 |
20130154793 | SECURE CUSTOMER ACKNOWLEDGEMENT OF RELAY ACTUATION - A request for an acknowledgement using a private key may be generated and transmitting to a customer device. The acknowledgement may be received from the customer device and verified using a public key associated with a customer operating the customer device. A request for a current location of the customer device may be transmitted and the current location may be received. A determination that the current location is proximate to a meter may be made, and, in response to determining that the current location is proximate to the meter, the meter may be manipulated. | 06-20-2013 |
20130162393 | SYSTEMS AND METHODS FOR ACCESS CONTROL - The disclosure describes various systems and methods for access control. One such method includes providing an access control module that includes a base portion and an update portion. The update portion is electrically coupled to the base portion via a detachable electrical connector, and wherein operation of the access control module is based at least in part on an interaction between the base portion and the update portion. | 06-27-2013 |
20130169408 | VEHICLE DOOR CONTROL APPARATUS AND VEHICLE DOOR CONTROL METHOD - A vehicle door control apparatus is provided with an authentication unit, a detection unit and a control unit. The authentication unit authenticates an ID information outputted from a mobile device carried by a user. The detection unit detects an object around a door. The control unit performs an opening operation of the door at least when both a first condition and a second condition are satisfied. In the first condition, the authentication unit authenticates the ID information. In the second condition, the detection unit detects that the object is separated from a predetermined determination area after the object is continuously located in the determination area over a predetermined time. | 07-04-2013 |
20130176103 | SAFE METHOD FOR CARD ISSUING, CARD ISSUING DEVICE AND SYSTEM - A safe method for card issuing, a card issuing device and system, which relate to the technical field of information security and solve the problem of low efficiency in existing card issuing methods. The embodiment of the safe method for card issuing in the present invention comprises: a managing card and a card issuing device performing a check and certification for card issuing; the card issuing device sending in sequence a card operating system download command sequence to at least one user card, and instructing the at least one user card to download the card operating system according to the card operating system download command sequence; the card issuing device activating the card operation system downloaded onto the at least one user card. The embodiments of the present invention are mainly used in various solutions which require card issuing technology, such as card issuing for public transport systems, and card issuing for bank cards and access cards. | 07-11-2013 |
20130187751 | PLANT OPERATION APPARATUS AND PLANT OPERATION TRAINING SIMULATOR APPARATUS - A controller includes an authentication unit, an operator information database, an operation unit, a plant control logic processor and an operation history database. The authentication unit performs authentication when the operator in touch with the touch electrode inputs an operation to the operation unit. The operation unit obtains operator information of an operator authenticated by the authentication unit, and records an operation history of an operation input to an operation unit by the operator in the operation history database in relation to the operator information. | 07-25-2013 |
20130194064 | UNIVERSAL VALIDATION MODULE FOR ACCESS CONTROL SYSTEMS - A validation module provides for the upgrading of a physical access control system (PACS) to full HSPD-12 compliance without requiring modification or replacement of the existing PACS. The validation module may contain all of the validation functionality required by federal specifications and technical requirements. The validation module may be installed between an existing PACS panel and a supported card/biometric reader. Readers may be selected based on assurance level requirements, e.g., contactless or contact readers for low and medium assurance level areas and full biometric readers for high assurance areas. The validation module may validate a card according to the assurance level setting, extract ID information from data on the card and then pass the ID information to the PACS panel for an access decision. Cardholder data captured by one validation module may be distributed to other validation modules of the PACS using a management station. | 08-01-2013 |
20130214898 | SYSTEM AND METHOD FOR SECURE ENTRY USING DOOR TOKENS - Secure door entry without a traditional card reader is made possible by tagging the door with an unpowered, unique token which can be read by a user's personal mobile electronic device. The user's device transmits both door and user identification to a remote server, where the decision is made whether to open the door. If so, the server sends an open door signal using the IP suite of protocols to an electronic bridge, which in turn passes the signal on to a door strike, opening the door. Another signal may be sent to an annunciator. Single-use digital tokens may also be used to open the doors. The permissions relating to doors or other physical assets may also be used to grant access to logical assets. | 08-22-2013 |
20130222107 | Cloud Secure Channel Access Control - Methods and systems are described herein for providing configuration and access control of a card reader using a secure channel between the card reader and a remote computing device. The card reader transmits a request for service to the remote computing device via a cloud-based communications network. The remote computing device receives the request for service via the cloud-based communications network and generates service instructions based on the received request for service. The remote computing device transmits the service instructions to the card reader via the cloud-based communications network. The card reader receives the service instructions from the remote computing device via the cloud-based communications network and configures operational settings based on the received service instructions. | 08-29-2013 |
20130222108 | AUTHORIZATION SCHEME TO MINIMIZE THE USE OF UNAUTHORIZED MEDICAL DEVICE DISPOSABLES ON A MEDICAL DEVICE INSTRUMENT - Systems, methods, apparatus, and computer readable media are provided for disposable component authentication with respect to a biological fluid processing device instrument. An example instrument authentication system includes a computer facilitating configuration and operation of the biological fluid processing instrument using a disposable component. A first interface is provided by the computer and is used by a service technician to configure the biological fluid processing instrument for a number of disposable components and to provide a service technician with a validation code. A key generator is to accept the validation code from the service technician and generate an authentication key in response to the entered validation code. A second interface is provided by the computer, the second interface prompting the service technician to enter an authentication key, wherein the authentication key authorizes use of a certain number of disposable components for the biological fluid processing instrument. | 08-29-2013 |
20130241693 | OPERATION MANAGEMENT SYSTEM, CONTROL SYSTEM AND OPERATION CONTROL METHOD - An operation management system includes an authentication system and a control system. The authentication system includes a first terminal identification information reception unit that receives terminal identification information from an operation portable terminal device as the terminal device enters an authentication zone, and a terminal identification information transmission unit that transmits the identification information to the control system. The control system includes a second terminal identification information reception unit that receives the identification information from the terminal identification information transmission unit, a first terminal identification information storage unit that stores the identification information, a third terminal identification information reception unit that receives the identification information from the terminal device, and a permission unit that permits operation of the control system by the terminal device as the identification information received by the third terminal identification information reception unit is stored in the first terminal identification information storage unit. | 09-19-2013 |
20130271260 | mLOCK Device and Associated Methods - A security device includes a processor defined to control operation of the security device. The security device also includes a radio defined in electrical communication with the processor. The security device also includes a location determination device defined in electrical communication with the processor. The processor, radio, and location determination device are defined to operate collaboratively to provide a wireless tracking and communication system. The security device also includes a shackle and a locking mechanism. The locking mechanism is defined in electrical communication with the processor. The processor is defined to operate the locking mechanism to control locking and unlocking of the shackle based on information obtained through the wireless tracking and communication system. | 10-17-2013 |
20130285792 | ELECTRONIC KEY REGISTRATION SYSTEM - An electronic key registration system includes a controller arranged in a communication subject communicable with an electronic key. A registration tool is in wired or wireless connection with the communication subject. The registration tool registers the electronic key to the controller when receiving a registration permission signal. An information center is connected to a network. The registration tool includes an operator ID acquisition unit that acquires an operator ID from a key registration operator. A communication unit sends the operator ID to the information center through the network. The information center includes an operator ID verification unit that verifies the operator ID received from the registration tool. A permission information notification unit sends, when the operator ID is verified, a registration permission signal to the registration tool through the network to permit the registration tool to perform the registration process. | 10-31-2013 |
20130293346 | RETEACHABLE SWITCHING CIRCUIT WITH ABILITY FOR LOCKING - A method for teaching a switching circuit is provided. The method includes presenting a target within a sensing range of a sensor of the switching circuit for a pre-determined duration and acquiring an identification code of the target via the sensor. The method also includes storing the acquired identification code for operating the switching circuit and locking the switching circuit against learning identification codes of any other target prior to reaching an allowed number of reteaching attempts. | 11-07-2013 |
20130307666 | ELECTRONIC ACCESS MEMORY DEVICE AND ACCESS POINT CONTROL - A lock system is provided including a plurality of access point controls and at least one access memory device. The access memory device is configured to communicate information between access point controls. | 11-21-2013 |
20130321124 | CONTROL DEVICE, UNDER-CONTROL DEVICE, CONTROL METHOD THEREOF, REMOTE CONTROL SYSTEM, AND RECORDING MEDIUM - By a user selecting a name of a device displayed in association with identification information identical to the identification information notified at an icon of an under-control device at a table of a control device, an under-control device subject to control by the control device can be selected while reliably identifying an under-control device. | 12-05-2013 |
20130335192 | CONTROL DEVICE FOR PROTECTIVE DOOR - A control device is used to open and close a protective door of an electronic device. The control device includes a control chip, a microcontroller, a driving circuit, and a motor. The control chip outputs control signals to the microcontroller, according to instructions from an operating system of the electronic device. The microcontroller controls the driving circuit to drive the motor according to the control signals, and the motor rotates to open or close the protective door. | 12-19-2013 |
20140002236 | Door Lock, System and Method for Remotely Controlled Access | 01-02-2014 |
20140049360 | DATA COLLECTION USING A CREDENTIAL - Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path. | 02-20-2014 |
20140055231 | System and Method for Credential Management and Administration - A credential management and administration system and method by which the documented eligibility of persons to receive benefits, services, access to premises or events, and the like is centrally administered. In one embodiment, credentials are distributed to the individuals electronically, via communication network, to respective portable device having a corresponding display. Each display is configured to visually present certain qualifying information that is updated at periodic intervals. Alternatively, the qualifying information may be presented via wireless means to a suitable receiver proximate the location where services are delivered. | 02-27-2014 |
20140062651 | Method and System for Airport Security - A method and system for airport or other building security where passengers or persons entering a building approach a check-in point or check-in counter and must undergo a positive identification (ID) by fingerprint scan, retinal or iris scan, face feature scan, or an other means of positive identification. A digital photograph can then be taken of the person. This data plus the positive ID data and optional data about the person including a scan of a government supplied ID like a drivers license or passport is entered in a database and checked against various law enforcement databases such as FBI or others for law enforcement interest in the person. | 03-06-2014 |
20140077926 | ELECTRONIC COMMUNICATION MODULE FOR LOCKING/UNLOCKING A MOVABLE PANEL OF A MOTOR VEHICLE, ASSOCIATED CONTROL CENTRAL PROCESSING UNIT, AND HANDS-FREE ACCESS SYSTEM - The invention relates to an electronic communication module ( | 03-20-2014 |
20140091900 | PROVIDING LIMITED ACCESS TO A SERVICE DEVICE VIA AN INTERMEDIARY - Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device. | 04-03-2014 |
20140152420 | CAPACITIVE DATA TRANSFER IN AN ELECTRONIC LOCK AND KEY ASSEMBLY - An electronic key may include a partial capacitor comprising a capacitive metal plate in communication with a processor. The capacitive metal plate of the partial capacitor is configured to form a capacitor with a corresponding capacitive metal plate of a lock when brought into proximity with the metal plate of the lock. Data may be transferred from the key to the lock using a capacitor formed by combining the two metal plates, wherein a common ground is established between the metal plate of the key and the metal plate of the lock through a parasitic capacitance present between the key and lock circuitry. | 06-05-2014 |
20140159857 | LOCK CONTROLLER AND ELECTRONIC KEY SYSTEM FOR VEHICLE - A verification result holding unit holds a result of ID verification performed on an electronic key through wireless communication. When an operation control unit detects an operation request signal for a lock mechanism, the operation control unit permits operation of the lock mechanism as long as the verification result holding unit holds a result indicating ID verification accomplishment. | 06-12-2014 |
20140159858 | Wireless Time and Attendance System - A wireless time and attendance system automatically collects data to compile attendance of various individuals at separate spaces within a facility for various time intervals. A coordinator terminal employs an integrated reader, a touchpad, a time display and a communication link which communicates with a host computer and a wireless communication module. Multiple point-of-entry/exit (“POE”) terminals are connected to the coordinator terminal via wireless communication links. Each of the POE terminals comprises an integrated ID input and an attendance indicator input. Time and attendance data entered on the POE terminals is compiled for transmission to the host computer. In one embodiment, a ZigBee wireless mesh network is employed. | 06-12-2014 |
20140184385 | Pairing Remote Controller to Display Device - A remote control device is authorized to command the presentation of information from an information presenting device by communicating with the information presenting device by a first mode of communications while the remote control device and the information presenting device are proximate. In response to the authorizing, the information presenting device is unlocked to permit the presentation of information in response to commands from the remote control device. After the unlocking, the information presenting device presents information in response to commands from the remote control device. | 07-03-2014 |
20140232518 | SYSTEMS AND METHODS FOR AN AUTOMATED PARKING FACILITY - Systems and methods for automated parking facilities are described herein. Users may purchase self-parking and/or valet parking with an access key. The access key may comprise various formats, such as, a barcode, a machine-readable representation of data, PIN code, or the like. The access key may be distributed via a print medium or a mobile computing device. The automated parking facility system may be interface with multiple parking facilities and/or may provide accounts across multiple parking facilities. The automated parking facility system may be configured to wirelessly open entrance and/or exit gates of parking facilities. | 08-21-2014 |
20140266578 | OPERATION CONTROL SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND NON-TRANSITORY RECORDING MEDIUM RECORDED WITH PROGRAM - An operation control system according to one aspect of the invention is disclosed, which includes: a wireless communication apparatus carried by a user; a receiving apparatus receiving information transmitted from the wireless communication apparatus; and an information processing apparatus controlling a control target apparatus, specifying a communication status of the wireless communication apparatus by determining if the receiving apparatus receives the information from the wireless communication apparatus, and controlling an operation status of the control target apparatus based on specified communication status. | 09-18-2014 |
20140266579 | Distributing Captured Codes - A method for distributing a sequence of access codes to a plurality of users, comprising comprises storing a set of sequences of access codes, wherein each sequence of access codes of the set can be programmed for use by a remote access device with an access system of a specific type. A same sequence of access codes is provided to both a first remote access device of a first user and to a second remote access device of a second user. | 09-18-2014 |
20140266580 | KEY STORAGE AND RETRIEVAL - Methods and systems for providing key storage and retrieval services to be performed by a service provider. The service provider provides a template to a client and instructs the client to use the template to capture, for each vehicle of a plurality of vehicles, both a vehicle identifier and a key of the vehicle in an image. The service provider stores the image in a computing system, extracts the vehicle identifier from the stored image, and associates the vehicle identifier with a location identifier corresponding to a location where the key is stored. When the service provider receives from the client a request for retrieving a key for a specific vehicle, the service provider searches a vehicle identifier of the specific vehicle in the computing system, retrieves the requested key from the location associated with the vehicle identifier, and sends the requested key to the client. | 09-18-2014 |
20140292475 | PERSONAL MINI-INTELLIGENT TERMINAL WITH COMBINED VERIFICATION ELECTRONIC LOCK - The present invention provides a personal mini-intelligent terminal with a combined verification electronic lock, which comprises: a micro-terminal and a locking device. The locking device is connected with the micro-terminal and provided with a mechanical lath. The micro-terminal is locked on a human body or unlocked by the mechanical lath, includes an electronic latch, and is configured to communicate with another uniquely corresponding micro-terminal so as to verify information about each other. When a user sets the micro-terminal to be in a single state, the locking or unlocking of the locking device is controlled by the mechanical latch; and when the user sets the micro-terminal to be in a married or love state and passes the verification, the locking or unlocking of the locking device is controlled by the electronic latch and the mechanical latch together. | 10-02-2014 |
20140327516 | METHOD, SYSTEM, AND KIT FOR MAKING AN ASSET MONITORABLE BY A SECURITY ASSET MANAGEMENT SYSTEM - An identification insert includes identification circuitry on a support layer and connected to a plug receptacle placing the circuitry in communication with another device when a plug of the device is inserted into the receptacle. A cavity in an asset, such as a firearm, can house the identification insert to enable a security asset management system or other device to monitor the presence or absence of the asset. A housing can carry the insert such that when the housing is inserted in the cavity the plug receptacle is accessible and substantially flush with an external surface of the asset. | 11-06-2014 |
20140361869 | SYSTEM AND METHOD FOR DEPLOYING HANDHELD DEVICES TO SECURE AN AREA - A handheld security system includes a set of handheld devices positioned at a group of access points to a secure area. The handheld device includes a set of input/output devices including a text and graphics display, a camera, a local security database and a set of security devices including an RFID reader, a bar code reader, a magnetic stripe card reader and a biometric scanner. The set of handheld devices are communicatively connected through wireless signaling and protocol to one another and to a server operating a global a global security database. The local security database is synchronized to the global security database. A location stack table is continuously updated with security events and monitored for violation of a set of anti-passback rules. An association table associates a set of assets and a set of personnel, allowing for visitor tracking and asset tracking on a schedule. | 12-11-2014 |
20150015363 | MONITORING POWERED ASSETS FOR FUELING - Systems, methods, apparatus, and computer program products are provided for monitoring powered assets for fueling. For example, in one embodiment, a fuel server can monitor the location of powered assets and fueling units. In response to determining, for example, that a powered asset that needs fuel is within a predetermined geofence defined around a fueling unit, the powered asset can emit a perceivable indication. The powered asset can then be authenticated for receiving fuel from the fueling unit. | 01-15-2015 |
20150028994 | ZONE BASED IDENTIFICATION FOR INTERACTIVE EXPERIENCES - This disclosure relates to a system configured to trigger interactive experiences for guests. The system may be a zone based identification system that uses identification technology (e.g., RFID, image recognition, etc.) to detect and/or identify guests in zones prior to, during, and after an interactive experience. The zones may be physical areas where guests approach, participate in, and leave the interactive experience. The system may be configured such that as guests progress through zones prior to, during, and after the interactive experience, the system may access guest specific information before the interactive experience, present the guest specific information during the interactive experience, and then stop presenting the information responsive to the guest exiting the interactive experience. In some implementations, the system may comprise one or more objects associated with guests, one or more sensors, one or more processors, one or more host systems, and/or other components. | 01-29-2015 |
20150061822 | SYSTEMS AND METHODS FOR IMPROVING A SENSING ABILITY OF AN INTERLOCK SWITCH SYSTEM - A system for improving a sensing ability of an interlock switch system may include an interlock switch and a target component. The interlock switch may include a first antenna coil that may receive one or more signals from one or more antenna coils within a sensing range of the first antenna coil. The target component may include an actuator that may interface with the interlock switch. The target component may also include at least two antenna coils. Each of the at least two antenna coils may then include an electronic identification (ID) associated with the target component. | 03-05-2015 |
20150084735 | WEARABLE INFORMATION HANDLING DEVICE OUTPUTS - An aspect provides a wearable information handling device, including: a display; a band; one or more processors operatively coupled to the display; and a memory device accessible to the one or more processors and storing code executable by the one or more processors to: after identifying information to be communicated, form an output directed to the band of the wearable information handling device; and provide the output to the band; the output actuating one or more elements of the band. Other aspects are described and claimed. | 03-26-2015 |
20150102898 | MOTOR VEHICLE UNLOCKING METHOD AND SYSTEM - A key-less entry system for motor vehicle uses actuations of one or more pre-existing vehicle components accessible from outside the vehicle, such as door handles, to generate an unlock an unlock code that is stored in a control unit. The code represents a sequence of actuations of component(s). Upon leaving the vehicle, the user locks the vehicle and sets the code by actuating the components in the desired sequence. To later unlock the vehicle, the user repeats the sequence of actuations, and the control unit sends an unlock signal to one or more door latches. | 04-16-2015 |
20150109098 | COMMUNICATION AND PROCESSING OF CREDENTIAL DATA - Credential data representing users seeking access to a well-defined space are registered in a reader unit associated with an access-control-related building component. A linked address associates the credential data with a first credential data receiver (EAC | 04-23-2015 |
20150109099 | MOBILE DEVICE AND KEY FOB PAIRING FOR MULTI-FACTOR SECURITY - Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy. | 04-23-2015 |
20150109100 | LIFESTYLE MULTIMEDIA SECURITY SYSTEM - A method is disclosed for remote monitoring of a premises, comprising the steps of operatively coupling a geographically remote client to a security system server which is capable of authenticating a user of the remote client, operatively coupling the remote client to a security gateway which is capable of managing the monitoring of the premises, activating a signal at the premises for notifying an occupant at the premises that remote monitoring is occurring, and transferring information between the security gateway and the remote client. The transfer of information between the security gateway and the remote client is controlled by the user of the remote client. The security gateway may be operably coupled to at least one camera at the premises and to at least one audio station at the premises. | 04-23-2015 |
20150137936 | Spoofing Bone Conduction Signals - Concepts and technologies are disclosed herein for spoofing bone conduction signals. According to one aspect, a device can compare a first unique body signature associated with a first user to a second unique body signature associated with a second user to determine a first unique effect of a first body of the first user on a signal and a second unique effect of a second body of the second user on the signal. The device can generate an authentication signal based upon the first unique effect and the second unique effect to include signal characteristics that, after propagating through the first body of the first user, are representative of the second unique body signature. The device can transmit the authentication signal through the first body of the first user to an authentication device that authenticates the first user on behalf of the second user. | 05-21-2015 |
20150302784 | INFORMATION PROCESSING SYSTEM, CONTROL METHOD, AND COMPUTER-READABLE MEDIUM - An information processing system, method and non-transitory computer-readable storage medium are disclosed. The information processing system may include a memory storing instructions; and one or more processors configured to process the instructions to detect an actual object, project a first image, detect a user's operation on the actual object, and execute a task regarding the first image on the basis of the user's operation. | 10-22-2015 |
20150317850 | METHOD FOR CONTROLLING ACCESS TO PREMISES BY READING A GRAPHICAL CODE PRESENT ON AN ACCESS TICKET, AND ASSOCIATED COMPUTER SYSTEM AND PROGRAM - A method and apparatus are provided for controlling access to given premises for a user. The method includes a prior step of creating an access ticket giving access to a travel service, the ticket being a reproduced transport ticket enabling this user to make a journey, a graphical identifier being integrated in the access ticket and associated with information making it possible to make the journey when the access ticket reproduced on a medium is read. The method further includes reading the ticket at at least one given premises independently of the journey, and subsequently unlocking an electric door opener triggered by the reading of the graphical identifier reproduced on the medium for allowing access to at least one of the given premises. | 11-05-2015 |
20150317852 | UNIVERSAL VALIDATION MODULE FOR ACCESS CONTROL SYSTEMS - A validation module provides for the upgrading of a physical access control system (PACS) to full HSPD-12 compliance without requiring modification or replacement of the existing PACS. The validation module may contain all of the validation functionality required by federal specifications and technical requirements. The validation module may be installed between an existing PACS panel and a supported card/biometric reader. Readers may be selected based on assurance level requirements, e.g., contactless or contact readers for low and medium assurance level areas and full biometric readers for high assurance areas. The validation module may validate a card according to the assurance level setting, extract ID information from data on the card and then pass the ID information to the PACS panel for an access decision. Cardholder data captured by one validation module may be distributed to other validation modules of the PACS using a management station. | 11-05-2015 |
20150321643 | FIELD MEASUREMENT COMPENSATION - A system and method of locating a key are disclosed. The key is configured to communicate with a base station through a plurality of antennas that are coupled to the base station. The method includes turning off each of the plurality of antennas, turning on one of the plurality of antennas, measuring a first received signal strength, turning off the one of the plurality of antennas and measuring a second received signal strength. The key is determined to be located within a predefined area if the difference between the first received signal strength and the second received signal strength is above a preset threshold. | 11-12-2015 |
20150348345 | PARKING LOCKERS - Methods and systems for retrieving or depositing a package using a beacon are described. A locker and parking space are assigned to a user or selected by the user, and the user is able to access the locker using a mobile device. The mobile device transmits identification information to a beacon associated with the locker. This information is passed to a service provider, who identifies the user or the locker and causes the locker to open. | 12-03-2015 |
20150348346 | VEHICLE SECURITY SYSTEM - A vehicle security system comprising a first interface, an immobilizer electronic control unit and an immobilizing electronic control unit, each of which is connected to a CAN bus. The security functions are installed on the immobilizer electronic control unit which can be accessed by a user using a vehicle access code. The information is communicated over the CAN bus in an encrypted format. | 12-03-2015 |
20160059826 | ELECTRONIC VEHICLE SECURITY SYSTEM DEVOID OF LOCK CYLINDERS - A vehicle security system includes a vehicle ignition switch, a door lock actuator, a primary vehicle entry and ignition control circuit, a backup vehicle access control circuit and a key including a principal vehicle control subsystem and a backup vehicle entry circuit. Advantageously, the system is devoid of any ignition lock cylinder, any door lock cylinder and any key blade thereby reducing vehicle manufacturing costs. A related method is also provided. | 03-03-2016 |
20160063779 | LOGGING ACCESS ATTEMPTS TO AN AREA - Logging events associated with accessing an area includes recording an event associated with accessing the area to provide an event recording and authenticating at least the event recording to provide an authenticated recording. Recording an event may include recording a time of the event. Recording an event may include recording a type of event. The event may be an attempt to access the area. Recording an event may include recording credentials/proofs used in connection with the attempt to access the area. Recording an event may include recording a result of the attempt. Recording an event may include recording the existence of data other than the credentials/proofs indicating that access should be denied. Recording an event may include recording additional data related to the area. Authenticating the recording may include digitally signing the recording. Authenticating at least the event recording may include authenticating the event recording and authenticating other event recordings to provide a single authenticated recording. | 03-03-2016 |
20160078699 | METHOD AND APPARATUS FOR NETWORK CONTROLLED ACCESS TO PHYSICAL SPACES - The system provides a method and apparatus for providing controlled access to premises. The system in one embodiment uses a reader/scanner associated with a controlled entrance that can receive credentials manually or via scanning or some other form of electronic communication. In one embodiment, the system uses NFC (Near Field Communication) from a mobile device to determine if access should be granted. The system contemplates a number of different tiers of users whose right of access to a location depends on the tier in which the user resides. For one time visitors, the system contemplates transmitting an access credential that can be used by a specific user for a limited time period. In some cases, the access credential is tied to a particular device. | 03-17-2016 |
20160086407 | DEVICES AND METHODS FOR LOCKING AND UNLOCKING MECHANICAL EQUIPMENT - An electronic locking device for selectively locking a medical device includes an antenna configured to wirelessly receive information from an identification tag, wherein the identification tag comprises unlocked duration period data, a motor coupled to the antenna, and a locking pin coupled to the motor, wherein the motor is configured to transition the locking pin from a locked position to an unlocked position for a predetermined period of time prescribed by the unlocked duration period data in response to an unlocking signal received by the antenna from the identification tag, wherein the locking pin is configured to prevent usage of the medical device in the locked position and allow usage of the medical device in the unlocked position. | 03-24-2016 |
20160093126 | Auto Enrollment For Configuring Access Control Systems - Disclosed is a system for a facility supporting an access controller, at least one ingress card reader and an auto-enrollment type controller including a front panel having a single button, a controller board, a terminal block for connecting at least the one ingress card reader to the auto-enrollment type controller board and to connect the auto-enrollment type controller to door locks, and a mounting plate, with the auto-enrollment type controller being configured by a user according to operational requirements of the facility by the user asserting the button for a defined period of time. | 03-31-2016 |
20160093128 | Door Access Control System - A door access control system ( | 03-31-2016 |
20160148449 | ACCESS SYSTEM FOR A VEHICLE AND METHOD FOR MANAGING ACCESS TO A VEHICLE - An access system for a vehicle is provided. The access system includes a central rights management unit, an access control device, and a portable identification medium. The access control device makes it possible to run verification mechanisms on the identification medium with the use of input means for interacting with a user. To this effect the identification medium includes an authentication unit and also a data part that depends on it which for viral epidemic propagation of privilege data may forward this data to access control devices without its own data connection. Even in the case of an incomplete infrastructure, extensive vehicle movements and very substantial fluctuations in personnel it is nevertheless possible to achieve very high security and reliability of enabling access and vehicle functions. | 05-26-2016 |
20160152209 | LID LOCK DEVICE | 06-02-2016 |
20180022313 | APPARATUS FOR CUTTING OFF DARK CURRENT, VEHICLE COMPRISING THE SAME, AND METHOD FOR CONTROLLING THE SAME | 01-25-2018 |
20190147672 | SYSTEMS AND METHODS FOR MULTIFACTOR PHYSICAL AUTHENTICATION | 05-16-2019 |