Patent application number | Description | Published |
20080252415 | RESTRICTED RANGE LOCKBOX, ACCESS DEVICE AND METHODS - A lockbox includes a housing, a key storage area and a lockbox circuit. The key storage area is shaped to receive a stored key and is attached to or positioned within the housing. The key storage area is secured with a lock mechanism to prevent unauthorized access to the stored key. The lockbox circuit comprises a transceiver operable by a magnetically induced current generated by a closely positioned radio access device that can send and receive signals. The circuit is configured to unlock the key storage area upon determining that an access request is authorized to providing access to the stored key. Methods of operation are also disclosed. | 10-16-2008 |
20090058711 | METHOD OF AND SYSTEM FOR MONITORING SECURITY OF CONTAINERS - A system for monitoring the integrity of a container having at least one door. The system includes a data interpretation device disposed inside the container. The system further includes a radar sensor interoperably connected to the data interpretation device for monitoring internal conditions of the container and for providing radar data to the data interpretation device, a motion-detection sensor for monitoring motion inside the container, and an antenna interoperably connected to the data interpretation device for communicating information relative to the internal conditions of the container to a location outside the container. | 03-05-2009 |
20100176919 | ONE-TIME ACCESS FOR ELECTRONIC LOCKING DEVICES - Systems and methods for providing one-time access to electronic locking devices for non-keyholders. The one-time access rights are delivered from a server to the electronic locking device in real-time, or in near-real time, over short and long-range wireless communication links in a manner that is secure and traceable. A handheld device is coupled with the electronic locking device via the short-range communication link, and is coupled with the server via a long-range wireless communication link. | 07-15-2010 |
20110109433 | METHOD FOR ACCESSING A LOCKED OBJECT - A method for accessing a locked object. A first SMS message addressed to a short code and requesting access to the locked object is received by an Approval Authority computer and/or short code from one of a locked object and a requestor's wireless communication device. The Approval Authority computer determines whether to grant the requested access, and sends, back to one of the locked object and the requestor's wireless communication device, one of an access code for the locked object and a SMS reply containing the access code. If the requested access is granted, the Approval Authority also initiates billing the requestor a predetermined fee for the access. | 05-12-2011 |
20120180123 | TRUSTED VENDOR ACCESS - A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system access rights permitting access otherwise prevented by the device are assignable by the first entity to the second entity, the access rights are able to be administrated by the second entity to the third entity, and the access is obtainable by the third entity using a combination of the access rights and personal identification information to affect the device. | 07-12-2012 |
20120270496 | BATTERYLESS LOCK WITH TRUSTED TIME - An electronic lock controller comprises a trusted time provider, a near field communication transceiver, and a logic processor. The trusted time provider provides a trusted time value. The near field communication transceiver receives power and a digital credential from an operator-side interface device. The logic processor produces an open or close command for an electromechanical lock based on the trusted time value and the digital credential. The electronic lock controller is powered solely by the near field communication transceiver. | 10-25-2012 |
Patent application number | Description | Published |
20130125231 | Method and system for managing a multiplicity of credentials - A wireless key device is configured to execute a digital credential management method to manage a plurality of digital credentials. According to this digital credential management method, the wireless key device polls an access terminal for an access terminal identification which uniquely identifies the access terminal. The wireless key device identifies a filter based on the access terminal identification, and selects a subset of the plurality of digital credentials based on the filter. The wireless key device renders a list of the subset of the plurality of digital credentials on a display, receives a user input selecting one of the subset of the plurality of digital credentials, and transmits the selected credential to the access terminal. | 05-16-2013 |
20130127593 | Method of distributing stand-alone locks - An authentication server for a wireless lock system comprising a wireless lock and a key device is configured to receive and authenticate a validation message. The validation message is created at the wireless lock from a secret key contained in the wireless lock. The authentication server receives the validation message from the key device, receives a certificate of ownership provided by the user, and authenticates the validation message and key device using copies each stored in a database of the authentication server. The authentication is configured to associate the user with the lock ID upon successfully authenticating the validation message, thereby enabling the authorizations server to provide the user with digital credentials to open the lock. | 05-23-2013 |
20140028438 | SYSTEMS AND METHODS FOR LOCKING DEVICE MANAGEMENT - A system for locking device management is disclosed. A server can transmit locking device programming instructions for a locking device to a mobile device based on a locking device programming trigger. The mobile device can search for the locking device and transmit the programming instructions to the locking device via wireless signals. The locking device can communicate with the mobile device via wireless signals and execute the programming instructions. | 01-30-2014 |
20150264037 | TRUSTED VENDOR ACCESS - A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system access rights permitting access otherwise prevented by the device are assignable by the first entity to the second entity, the access rights are able to be administrated by the second entity to the third entity, and the access is obtainable by the third entity using a combination of the access rights and personal identification information to affect the device. | 09-17-2015 |
20160048673 | SECURE ELECTRONIC LOCK - Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level. | 02-18-2016 |
20160049027 | ELECTRONIC LOCK WITH SELECTABLE POWER SOURCES - Embodiments are directed to determining, by a processing device, a state of an internal power supply associated with a lock, and selecting, by the processing device, at least one of the internal power supply and an external power supply to power the lock based on the determination of the state of the internal power supply. | 02-18-2016 |
Patent application number | Description | Published |
20130257590 | METHODS AND SYSTEMS FOR AN AUTHENTICATING LOCK WITH BAR CODE - Exemplary embodiments provide systems and methods for opening electronic locks employing an image, such as the image of a bar code, (e.g., a QR code), and using the hardware and software resources commonly found on a mobile device such as a cell phone or tablet computer. An application on the mobile device obtains information identifying a lock, such as a series of numbers displayed by the lock or encoded in a bar code on the lock, and inputs it along with information identifying a particular user to an algorithm that generates a key code for the lock. The application on the mobile device displays the key code (e.g., as a numeric code or embedded in a bar code image) and the lock receives the displayed key code and opens. In various embodiments, the key code may be entered into a control interface on the lock, or captured by a camera connected to the lock. | 10-03-2013 |
20130293351 | Systems and Methods for Lock Access Control Management Using Social Networks - A system for managing accessing to a locking device is disclosed. A group of users can register with a social networking service and an access management application hosted by the social networking service. A first user can grant, to a second user connected to the first user, access to the locking device and contents thereof. The access management application can notify the second user of the access, and the second user can initialize a mobile application on a mobile device. The mobile application can synchronize with the access management application to verify credentials of the second user. The second user can use the mobile device to connect, via a short-range communication connection, to the locking device and open the locking device. | 11-07-2013 |