Class / Patent application number | Description | Number of patent applications / Date published |
340500650 | Electronic coded record | 58 |
20090219133 | SHOWING MANAGEMENT SYSTEM TO AUTOMATICALLY MATCH AND CONTROL ELECTRONIC LOCKBOXES - A showing management system for automatically controlling access to an electronic lockbox utilizing showing appointment data maintained by the showing management system, whereby the showing appointment data is transmitted to the electronic lockbox and/or electronic key device. The electronic lockbox will open only when the actual access time is within the scheduled showing appointment time. The showing management system further programmatically matching a specific electronic lockbox with a specific Listing ID, whereby lockbox access data from an electronic lockbox are matched with showing appointment records maintained in the showing management system to complete the lockbox access records when the Listing ID for a particular showing appointment is missing from the lockbox access record. | 09-03-2009 |
20090237205 | METHOD AND SYSTEM FOR SECURING A VEHICLE AGAINST THEFT - Method and system for securing a vehicle against theft where at least one essential operational element of the vehicle can be switched between three operating states, and the essential operational elements are switched into a substantially unrestricted operation-ready operating state A by an external usage authorization device independent of the vehicle over means for transmitting the authorization data, at least one essential operational element is switched into an operation-ready operating state B by an event-dependent circuit through at least one event for a period of time, the period of time depending on predefined operating parameters and either at least one essential operational element of the vehicle is switched after the passage of time for putting out of operation the vehicle into a non-operation-ready or restrictively operation-ready operating state C, or the essential operational elements are switched before the passage of the time period into operation-ready operating state A according to first step by means of the usage authorization device via transmitting the authorization data. The vehicle and the usage authorization device, before it is initially operated for the first time, are individualized once through an authorization code or the operating parameters are set at the usage authorization device or the events, which trigger the switching of the operating state of the essential operational element of the vehicle, are selected on the usage authorization device. | 09-24-2009 |
20090256676 | SMART LOCK SYSTEM - An electronic access control and recording system includes a lock, a card reader, a key card configured to communicate with the lock and with the card reader, a database, and an administrator microprocessor configured to provide a user interface and to communicate with the database and with the card reader. At least one of the lock and the card contain a microprocessor and a non-volatile memory storing encrypted information. In use, the key card provides access to the lock and transfers the encrypted information between the lock and the database via the card reader and the administrator microprocessor. The administrator microprocessor provides a user interface for reviewing and administering the database. The user interface also provides account and password qualification for users. | 10-15-2009 |
20100073132 | IGNITION SYSTEM FOR A VEHICLE - An ignition system for a vehicle includes an ignition port, a vehicle processor coupled to the ignition port and an engine of the vehicle and a portable ignition module. The portable ignition module includes a memory for storing data therein and a USB interface for engaging the ignition port. The portable ignition module stores a security code therein, that when transferred to the vehicle processor when the portable ignition module is inserted into the ignition port, enables operation of the vehicle. The portable ignition module includes an ignition switch and a touch screen display coupled to the ignition switch. An operator controls the vehicle by touching the touch screen display to activate the ignition switch, thereby signaling the processor to start and/or stop the engine. | 03-25-2010 |
20100079241 | Integrated vehicle entry/data transfer device and method - An integrated vehicle entry/data transfer device ( | 04-01-2010 |
20100109837 | KEY MANAGEMENT BOX - In a key management box ( | 05-06-2010 |
20100127824 | Method and Device for the Safe, Systematic, Exclusive Assignment of the Command Authorization of an Operator to a Controllable Technical Installation - The invention relates to methods and appropriate devices for safely, unequivocally and exclusively, temporarily assigning the command authority of an operator ( | 05-27-2010 |
20100194529 | MANAGEMENT SYSTEM FOR CHARGING PLUG-IN VEHICLE - A plug-in vehicle has a door lock system which uses an electronic certification key. The electronic certification key stores a certification code and has a wireless communication device to transmit the code. A management system for charging the plug-in vehicle has a wireless communication device which can receive the certification code from the key, and a key verification module which verifies whether a proper key exists at the charging station or not. If a proper key is detected, the system permits charging the plug-in vehicle from a power outlet. On the other hand, if a proper key is not detected, the system denies and prohibits charging the plug-in vehicle from the power outlet. | 08-05-2010 |
20100301998 | Multi-sensor alarm apparatus, system and/or method for securing articles - A multi-sensor alarm apparatus, system and method may prevent and/or may deter a theft and/or a removal of one or more articles from a display stand. A base, a main body and a head unit are provided. The base and the main body are secured to the display stand. The multi-sensor alarm apparatus monitors an integrity of the attachment of the main body to the base with a separation sensor. Further, the multi-sensor alarm apparatus monitors sensors connected to the head unit and/or to the main body. The sensors may be removed and/or added as needed depending on the articles to be secured. | 12-02-2010 |
20110084799 | LOCK SYSTEM INCLUDING AN ELECTRONIC KEY AND A PASSIVE LOCK - A lock system that includes a passively powered lock device having an electric lock mechanism and a key device having a power supply, wherein the key device stores a lock credential associated with the lock device. The key device is structured to be operatively coupled to the lock device. The key device is also structured to provide power to the lock device for powering the lock device and moving the electric lock mechanism from a locked condition to an unlocked condition when the key device is operatively coupled to the lock device. The lock device is structured to receive an authentication message from the key device, verify based on the authentication message that the key device stores the lock credential, and move the electric lock mechanism from the locked condition to the unlocked condition based on the verification that the key device stores the lock credential. | 04-14-2011 |
20120019358 | SYSTEMS AND METHODS FOR MANAGING INVENTORY OF ITEMS HELD IN A CABINET USING RADIO FREQUENCY IDENTIFICATION (RFID) - A RFID cabinet comprises a cabinet structure and one or more drawers or shelves. Chambers are formed within the cabinet to house the one or more drawers or shelves. An RFID scanner is configured to scan items tagged with RFID tags in the chambers via one or more antennas. The antennas can include transmit and receive antennas or antennas configured to perform both transmit and receive functions. The drawers can have a access cover, or lid that can be controlled so as to control access to the drawer. The scanner can be configured to perform inventory control for the tagged items. | 01-26-2012 |
20120154116 | Cleaning Apparatus and Method for Controlling Access to a Cleaning Apparatus - The invention relates to a cleaning apparatus, comprising an operating unit for operating the cleaning apparatus, at least one functional unit for carrying out an operating instruction, and a control unit for receiving operating instructions performed on the operating unit and controlling the at least one functional unit based on said operating instructions, wherein an access authorization stored on an authorization carrier is required in order to operate the cleaning apparatus. In order to provide such a cleaning apparatus with a more user-friendly access control, it is proposed that the cleaning apparatus have a detection unit operatively connected to the control unit and configured for contactless detection of the access authorization and transmission thereof to the control unit, and that the access authorization be verifiable for its validity by the control unit. The invention further relates to a method for controlling access to a cleaning apparatus. | 06-21-2012 |
20120169462 | METHOD AND APPARATUS FOR ACCESS AUTHENTICATION USING MOBILE TERMINAL - An access authentication method and apparatus in which access authentication is performed using positional data associated with access information data. | 07-05-2012 |
20120182123 | MULTIPLE RADIO FREQUENCY NETWORK NODE RFID TAG - In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that provide enhanced memory capabilities, redundant functionality, and multiple frequency capabilities to the RFID tag using an inter-RF network node communication connection. The inter-RF network node communication may allow the coordination of RFID tag memory and functionality. | 07-19-2012 |
20120182124 | Control and Monitoring Method - Control and monitoring method using:
| 07-19-2012 |
20120249296 | METHOD OF PROTECTION IN A CONTACTLESS RADIOFREQUENCY COMMUNICATION - A method of protection of a near-field contactless communication system against malicious attacks. The method includes exchange of information between a reader and a contactless card of duration T, measured with respect to a starting instant t | 10-04-2012 |
20120262274 | Medical system and method for operating a medical system - A medical system and method to operating the medical system is presented. A patient storage element is assigned to a patient comprising identification information identifying the patient. A medical device has a contaminating patient application. A medical device storage element on the medical device comprises use information. A clearing device receives the identification information from the patient storage element and the use information from the medical device storage element and analyzes the use information. If in analyzing the use information it is found that application of the medical device to the patient is allowed, a clearance signal is outputted. If in analyzing the use information it is found that application of the medical device to the patient is not allowed, the identification information is analyzed. If in analyzing the identification information it is found that application of the medical device to the patient is allowed, a clearance signal is outputted. | 10-18-2012 |
20120268244 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR ANONYMOUS TRACKING OF OBJECTS - Systems and methods of providing location information associated with moveable objects include receiving tag identification (ID) information reports from a plurality of tag sensors. A movable object associated with each of the ID information reports received from the tag sensors is identified. Location information associated with the movable objects is updated responsive to the received ID information reports to provide updated location information for the moveable objects and an owner associated with each of the movable objects is determined. Access to the location information associated with respective ones of the movable objects is allowed only to requestors authorized by the owner associated with the respective ones of the movable objects, wherein the tag sensors have not been provided notification of ID information associated with the movable objects or of the owners associated with the moveable objects. | 10-25-2012 |
20120274444 | PHYSICAL ACCESS CONTROL - A system and method are disclosed for controlling physical access through a digital certificate validation process that works with standard certificate formats and that enables a certifying authority (CA) to prove the validity status of each certificate C at any time interval (e.g., every day, hour, or minute) starting with C's issue date, D | 11-01-2012 |
20120313752 | SMART LOCK SYSTEM - An electronic access control and recording system includes a lock, a card reader, a key card configured to communicate with the lock and with the card reader, a database, and an administrator microprocessor configured to provide a user interface and to communicate with the database and with the card reader. At least one of the lock and the card contain a microprocessor and a non-volatile memory storing encrypted information. In use, the key card provides access to the lock and transfers the encrypted information between the lock and the database via the card reader and the administrator microprocessor. The administrator microprocessor provides a user interface for reviewing and administering the database. The user interface also provides account and password qualification for users. | 12-13-2012 |
20120326840 | LOCK BOX SYSTEM FOR DEPOSITING AND RETRIEVING OBJECTS AND METHOD FOR OPERATING SUCH A LOCK BOX SYSTEM - There is provided a lock box system that is adapted to deposit objects into and retrieve objects from a plurality of compartments of the lock box system, each compartment having an unambiguous identifier and a door that can be locked by an associated locking device. An exemplary lock box system comprises a data processing unit that is adapted to determine which compartments contain an object, whereby dimensions of at least two of the compartments differ from each other and these dimensions of the compartments are stored in the data processing unit. The exemplary lock box system also comprises a centralized facility reading device that is connected to the data processing unit, the centralized facility reading device having a detector that is adapted to simultaneously detect a plurality of RFID transponders located within a defined area around the centralized facility reading device, the centralized facility reading device additionally comprising a data reading device that is adapted to simultaneously read out data from the plurality of RFID transponders, wherein the data read out from a particular one of the plurality of RFID transponders contains at least dimensions of an associated object. The exemplary lock box system further comprises a receiving and processing device connected to the data processing unit, the receiving and processing device being adapted to receive the data read out from the particular one of the plurality of RFID transponders, the receiving and processing device being adapted to, based on dimensions of the associated object and a query of an occupation status of the plurality of compartments, identify a free one of the plurality of compartments having dimensions sufficiently large to accommodate the associated object. The exemplary lock box system additionally comprises a transmitter that is adapted to transmit the identity of the free one of the plurality of compartments to the control unit. In addition, the exemplary lock box system comprises a control unit connected to the data processing unit, the control unit having an actuator that is adapted to actuate the locking device via control signals, the control unit being adapted to simultaneously or consecutively generate and/or transmit control signals to the locking device associated with the identified free one of the plurality of compartments to open the door of the identified free one of the plurality of compartments. | 12-27-2012 |
20130043976 | SYSTEM AND METHOD FOR DETECTING PRESENCE OF ONE OR MORE USER IDENTIFICATION DEVICE - A method for detecting presence of one or more security token comprises a host device transmitting a wake-up message for receipt by the security token. Based on the wake-up message and a condition of the one or more security token, the security token either awakens or returns to an inactive state. The wake-up message comprises a security code that is unique to a host device and an instruction code that is configured to selectively instruct at least one of the one or more security tokens associated with the vehicle to awaken. A system for detecting presence of a user includes a host device configured for transmitting a wake-up message to be received by a security token. The wake-up message comprises a unique security code and an instruction code that is configured to instruct security tokens associated with the vehicle to awaken. | 02-21-2013 |
20130063246 | SYSTEM AND METHOD FOR ELECTRONICALLY PROVIDING AN ACCESS AUTHORIZATION - System for electronically providing an access authorisation for a user, to a location selected by a user, comprising at least one access report device, which reports a user identification of the user, which is in each case stored on at least one portable data carrier of an user having access authorisation, via a data network to a forwarding device, which electronically forwards the reported user identification via the data network to at least one access read device, which is provided at the respective selected location and which grants the user access to the selected location if the user identification which is stored on the user's portable data carrier and is read off from the data carrier by the access read device corresponds to the user identification which is electronically forwarded to the access read device. | 03-14-2013 |
20130069762 | Long Range Radio Frequency Identification System - A method, apparatus and system for radio frequency identification provides a modulated illumination signal containing a sequence of bits configured to illuminate a radio frequency identification (RFID) tag, The illumination signal is received at the RFID tag, rectified to generate a wake signal for waking a processor which is subsequently powered by a battery. The received illumination signal is sampled and subjected to a thresholding process. Mobile telephone band interference is countered by correlating the sampled illumination signal to determine its bit sequence and then correlating the bit sequence against a predetermined key. An identification signal from the RFID tag is sent in response to a match. | 03-21-2013 |
20130082821 | PROXIMITY-BASED GLUCOSE METER FUNCTION ACTIVATION - A method and system in which a short range wireless signal containing an activation code is received with a glucose meter. Upon receiving the signal, the glucose meter awakens from a low power state. A dormant function on the glucose meter that corresponds to the activation code is activated in response to receiving the short range wireless signal. In one example, the glucose meter includes an RFID tag configured to receive an RFID signal. A device reader coupled to a health care provider computer transmits the RFID signal. The dormant function on the glucose meter can include any number of functions, such as a structured glucose test and/or the ability to automatically generate reports. | 04-04-2013 |
20130106571 | APPARATUS AND METHOD FOR AUTOMATICALLY BOOTING UP ELECTRONIC DEVICE | 05-02-2013 |
20130120113 | ANTITHEFT SYSTEM - In an antitheft system for preventing an equipment comprising moving objects such as electric vehicles or operating machine such as lawnmower from theft, an electronic key is prepared to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key. An authenticator is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key, whereas an electronic key copier is provided separately from the equipment and copies the electronic key, thereby enabling to make a copy of the electronic key without activating equipment, while ensuring to prevent the equipment from theft. | 05-16-2013 |
20130154795 | DATA MEDIUM FOR THE CONTROL OF ENTITIES, AND DEVICE AND METHOD FOR THE CONTROL OF ENTITIES - The invention relates to a data medium ( | 06-20-2013 |
20130154796 | Secure Profile Setting In A Shared Device - There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared device. The system further includes a database that is in communication with the at least one shared device. In the system, an RFID transponder module associated with a user transmits a signal that enables the at least one shared device to identify the user. The RFID transponder module can include a fingerprint scanner module, which can be used to acquire a user's fingerprint data to authenticate the user. Thus, after identifying the user, the at least one shared device retrieves a profile corresponding to the user from the database and sets the profile. | 06-20-2013 |
20130200999 | PORTABLE E-WALLET AND UNIVERSAL CARD - Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card. | 08-08-2013 |
20130222111 | PLUG LOCK DEVICE - A plug lock device includes a release switch arranged in a vehicle and a lock mechanism switched between a lock state and an unlock state. The lock mechanism restricts removal of a power plug from an inlet of the vehicle when in the lock state and permits removal of the power plug from the inlet when in the unlock state. The lock mechanism is switched from the lock state to the unlock state when the release switch is operated and wireless communication is established between the vehicle and an authentic electronic key. The lock mechanism is switched to the unlock state even though the wireless communication between the vehicle and the electronic key is not established when the release switch is operated as long as an ignition of the vehicle is activated and a particular switch arranged in the vehicle is operated. | 08-29-2013 |
20130257590 | METHODS AND SYSTEMS FOR AN AUTHENTICATING LOCK WITH BAR CODE - Exemplary embodiments provide systems and methods for opening electronic locks employing an image, such as the image of a bar code, (e.g., a QR code), and using the hardware and software resources commonly found on a mobile device such as a cell phone or tablet computer. An application on the mobile device obtains information identifying a lock, such as a series of numbers displayed by the lock or encoded in a bar code on the lock, and inputs it along with information identifying a particular user to an algorithm that generates a key code for the lock. The application on the mobile device displays the key code (e.g., as a numeric code or embedded in a bar code image) and the lock receives the displayed key code and opens. In various embodiments, the key code may be entered into a control interface on the lock, or captured by a camera connected to the lock. | 10-03-2013 |
20130271261 | ELECTRONIC LOCKING SYSTEMS, METHODS, AND APPARATUS - Electronic locking devices, systems, and methods may require the utilization of an electronic key generated by an electronic key generation device. The electronic key may be generated using a data payload received from server and/or an administrative device. The administrative device is enabled to remotely manage the locking device and locking system via, for example, a software application running on the administrative device and/or a website. | 10-17-2013 |
20130278382 | SYSTEMS AND METHODS FOR OBJECT LOCALIZATION AND PATH IDENTIFICATION BASED ON RFID SENSING - A networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device. | 10-24-2013 |
20130293350 | ACCESS CONTROL SYSTEM AND METHOD - An access control system is provided for controlling access between a secured side and a non-secured side of an access control point. A reader module is disposed on the secured side of the access control point for receiving authentication data from an individual. A controller unit is disposed on the non-secured side of the access control point, and has a housing that encloses an access control panel and a request-to-exit motion sensor. The access control panel is in communication with the reader module, an electronic lock mechanism, and the request-to-exit motion sensor. In response to receiving a data signal from the reader, the access control panel determines whether or not to unlock the lock. When it is determined that the lock should be unlocked, the access control panel provides a signal to the electronic lock for switching the lock from a secured condition to a released condition. | 11-07-2013 |
20130314209 | IDENTIFYING FLUID SUPPLIED THROUGH HOSE - Apparatus for identifying fluid to be supplied through an RFID-tagged fluid-supply hose. The hose connects to one of several movable, RFID-tagged fluid containers. A fluid station includes a plurality of antenna mounts at fixed locations so that a respective plurality of fluid-container locations is defined. An RFID reading unit connects to antennas on the mounts. A controller reads the respective RFID tags of the hose and of the containers in the fluid-container locations using the RFID reading unit. It then determines which of the plurality of movable fluid containers is positioned in the fluid-container location corresponding to the antenna range in which the fluid-supply hose is positioned, so that the fluid in the determined fluid container is identified as the fluid to be supplied through the fluid-supply hose. | 11-28-2013 |
20130335194 | KEY, OPERATION METHOD THEREFOR, KEY MANAGEMENT DEVICE, KEY MANAGEMENT METHOD, KEY MANAGEMENT SYSTEM, AND PROGRAM - A key managed by a key management device has an operation detecting unit configured to detect an operating state thereof, and a transmitter configured to transmit information of the operating state detected by the operation detecting unit to receiving devices through wireless communication. The operation detecting unit includes an acceleration sensor, and detects information of acceleration measured by the acceleration sensor as the operating state thereof. | 12-19-2013 |
20130342314 | SMART LOCK STRUCTURE AND OPERATING METHOD THEREOF - The present invention relates to a smart lock structure and an operating method thereof. The smart lock structure comprises a key hole for access keys, an interrogating device for using radio frequency technology to communicate with a mobile device and accept access requests from the mobile device to unlock the smart key structure, and a lock mechanism in response to interaction between the key hole and the access keys and communication between the interrogating device and the mobile device for unlocking the smart lock structure and gaining access thereof. The smart lock structure further comprises a falling proof device equipped beside the interrogating device to prevent falling of the mobile device. An operating method is also provided for normal operation and/or configuration of the smart lock structure. | 12-26-2013 |
20140015638 | UNIVERSAL ACCESS DEVICE - Systems, methods, and computer-readable and executable instructions are provided for providing a universal access device. Providing a universal access device can include storing access data for each of a number RFID readers, wherein each of the RFID readers accepts a particular RFID protocol. Providing a universal access device can also include selecting a particular RFID protocol for one of the number of RFID readers while the universal access device is within an activation zone of the RFID reader. Furthermore, providing a universal access device can include providing the access data for the particular RFID reader via the particular RFID protocol. | 01-16-2014 |
20140015639 | SMARTCARD RECEIVING DEVICE FOR PROVIDING A REMOTE COMMUNICATION WITH SWITCHING MEANS - The invention relates to a smartcard receiving device, comprising a contact interface ( | 01-16-2014 |
20140035723 | MOBILE APPLICATION SYSTEM AND METHOD - Systems and methods of the invention relate to authorize a driver to enter and/or exit a distribution center. A device associated with the driver communicates a request to enter and/or exit the distribution center in which a remote authentication component verifies in order to issue a confirmation. An interchange manager can grant access for exit and/or entry to the driver based on receipt of the confirmation via the device. Moreover, the device can request services from the distribution center as well as, or in the alternative receive message(s). | 02-06-2014 |
20140055238 | COMMUNICATIONS SYSTEM AND COMMUNICATIONS APPARATUS - A communications system configured to execute data transmission between a transponder having no radio wave generating source thereof and a reader/writer is provided. The communications system includes, a service permission level notifier configured to tell a service permission level for associated with a received signal level for permitting service acceptance from the reader/writer to the transponder, and an access controller configured to determine in the transponder whether the received signal level from the reader/writer is at the notified service permission level to determine accessibility to the transponder from the reader/writer. | 02-27-2014 |
20140091907 | Keyed Memory Device to Record Input User Signals and Output Recorded User Signals - An electronic system is configured to receive input content (e.g., audio content, video content and/or other content) from a user and convert the input content to input signals (e.g., audio signals, video signals, etc.) that are stored in an electronic storage medium, where the input signals correspond with specific code signals. The recorded input signals are output based upon specific code signals input to the electronic device. For example, the electronic system can include an electronic device and at least one accessory associated with the electronic device, where the accessory includes an accessory code that is readable by a code reader of the electronic device. | 04-03-2014 |
20140218168 | MULTI-CONTROL ENTRY DOOR HARDWARE - An electronic coded entry lock that includes a multifunction switch having an actuator and a circuit member. The actuator is configured to be displaced to a plurality of input positions. For example, the actuator may be displaced to at least four, and in some instances at least eight, input positions. Further, the actuator may have at least two axes of movement. Moreover, the actuator may be configured for two or three dimensional movement. When the actuator is displaced to an input position, the circuit member may provide a signal associated with that input position. The controller may determine whether the signals provided by the circuit member correspond to a security code for the electronic coded entry lock. If the signal(s) does/do correspond to the security code, the controller may generate a command to actuate a lock actuator that displaces at least a component of a lock mechanism. | 08-07-2014 |
20140247113 | ELECTRONIC DOOR ACCESS CONTROL SYSTEM - An electronic door lock system comprising a door control unit, a key reader and an encrypted binding between the key reader and the door control unit. When tampering is detected the encrypted binding is terminated thereby preventing the door from being opened. There is also disclosed a method for retrofitting a door comprising a key reader with a door control unit. The door control unit, key reader and the latch release mechanism may also be powered by a key comprising a power supply, the key also supplying a coded sequence to the door control unit. | 09-04-2014 |
20140266590 | Reconfigurable Smart Identification Badges - This invention provides a smart badge having a processor connected to a viewable display where both the processor and the display are embedded in the smart badge. The embedded components may be powered by an embedded battery or by RF energy generated by a smart badge reader. The badge can be uploaded with a digital image of the badge holder and predetermined criteria uploaded into an embedded memory location in the smart badge. Such predetermined criteria may include the name and contact information of the badge holder as well as the buildings or secure areas the badge holder is authorized to access. The smart badge may also be capable of generating secure codes for the badge holder to use as pass codes for accessing computer networks. The smart badge may also contain embedded location sensors that when merged with maps stored in the smart badge's memory can assist the badge holder in determining location. | 09-18-2014 |
20140266591 | RFID SECURE AUTHENTICATION - Authentication systems and methods for a population of devices each associated with an RFID tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (UID) of an RFID tag to obtain a unique authorization signature. The RFID tag is prepared utilizing the unique authorization signature as memory-access and/or tag-operation password(s). The systems and methods may safeguard against attacks whereby compromise of a single tag will not compromise the entire population of devices and may reduce or eliminate the use of inappropriate surgical devices during a surgical procedure. | 09-18-2014 |
20150015368 | PASSIVE IGNITION INTERLOCK IDENTIFICATION APPARATUS AND METHOD OF USE THEREOF - The invention comprises a personal identification device used in function of a peripheral device and/or for communication with an external network. In one embodiment, a non-removable personal identification device communicates presence of a specific individual to a peripheral device, such as an ignition interlock device, a tracking system, and/or a communication system or person, such as a police network, an enforcement agency, a regulatory network, a supervisor, and/or a parent or guardian. For example, information related to the peripheral device reliant in part on the presence of the personal identification device is communicated with the remote system. Optionally, any information associated with the personal identification device and/or the peripheral device is maintained in a secure format warranting true information, usable in a legal setting. | 01-15-2015 |
20150048928 | ELECTRONIC CREDENTIAL SIGNAL ACTIVATION SYSTEMS AND METHODS - Various electronic credentials comprising signal activation are disclosed. An electronic credential core comprises a controller configured to maintain an off-state until activated by a received signal during a personalization process. The electronic credential core further comprises an antenna configured to receive a first signal. The energy in the first signal is harvested by a signal interface. The signal interface generates a second signal using the harvested energy of the first signal. The second signal is provided to the controller. The controller transitions to an active state and continuously performs one or more functions until an onboard battery is depleted. By maintaining an off-state until personalization, the electronic credential can be stored without draining power from the battery, extending the shelf life of the electronic credential. | 02-19-2015 |
20150061831 | KEY AND SECURITY DEVICE - A key for a security device is provided. The key may include a housing and an actuation member operably engaged with the housing. The key may also include a mechanical component configured to disengage a mechanical member of a security device. The key may further include an electronic component configured to arm and/or disarm a monitoring circuit in electrical communication with a security device. The actuation member is configured to actuate the mechanical component and/or the electronic component. | 03-05-2015 |
20150109104 | SMART INVITATION HANDLING AT A SMART-HOME - This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives. | 04-23-2015 |
20150116084 | Gatekeeper Lock System - Disclosed is an electronic lock for a door having a locking mechanism, a file transfer and storage interface and programmable control circuit. This system also provides a communication interface and data transmission. The locking mechanism is coupled to the door and movable between a locked position in which the door opening is inhibited and an unlocked position in which the door is allowed to open. File transfer and storage interface and programmable control circuit is coupled to the gate and is operable to validate user credentials. The programmable control circuit is coupled to the gate and is operable to move the locking mechanism between the locked position and the unlocked position at least partially in response to user credentials read. | 04-30-2015 |
20150130590 | SYSTEMS AND METHODS FOR OBJECT LOCALIZATION AND PATH IDENTIFICATION BASED ON RFID SENSING - A networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device. | 05-14-2015 |
20150137942 | Security Token, Control System and Control Method - According to an aspect of the invention, a security token is conceived, in particular a smart card, comprising a tactile sensing user interface, wherein said tactile sensing user interface is adapted to capture a stream of authentication data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for accessing at least one function of a controllable object, said security token being adapted to transmit said stream of authentication data to the controllable object in order to access said function. | 05-21-2015 |
20150291128 | ELECTRONIC KEY SYSTEM - An electronic key system enabling to improve security against vehicle theft is provided. A smart ECU acquires encrypted data from an electronic key. When all identification data stored in a memory and a memory of an electronic component embedding connector correspond to the identification data transmitted from the electronic key, the smart ECU cancels security and permits operations of a door lock driving unit, a steering lock driving unit, and an engine control unit. | 10-15-2015 |
20150325067 | ACCESS MANAGEMENT SYSTEM AND METHOD - An access management system and method are provided. The access management system includes an authentication means having an authentication key indicating an identity of a visitor, an authentication terminal configured to register by receiving user information corresponding to the authentication key, and store the user information matched with the authentication key recognized when the visitor accesses as an access history information of the visitor, and a user terminal configured to provide the user information corresponding to the authentication key to the authentication terminal. | 11-12-2015 |
20150371453 | NEAR FIELD COMMUNICATION SYSTEM - The disclosure relates to a method of operating a system, the system comprising a near field communication, NFC, tag, an NFC device associated with a user of the system and a computer, the method comprising: the NFC device requesting a message from the NFC tag; the NFC tag generating a message comprising a representation of a counter value; the NFC tag sending the message to the NFC device; the NFC device generating a request comprising the representation of the counter value in response to receiving the message; | 12-24-2015 |
20160125678 | PERSON IDENTIFICATION SYSTEM - A person identification device | 05-05-2016 |