Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Permitting access

Subclass of:

235 - Registers

235375000 - SYSTEMS CONTROLLED BY DATA BEARING RECORDS

235380000 - Credit or identification card systems

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
235382500 Changeable authorization 13
Entries
DocumentTitleDate
20130043306Systems and Methods for Accessing Charging Capabilities of Electric Vehicle Charging Stations - Embodiments of the invention can provide systems and methods for accessing charging capabilities of electric vehicle charging stations. According to one embodiment of the invention, a system can be provided. The system can include a computer processor. The system can also include a memory operable to store computer-executable instructions operable to receive a readable code associated with an electric vehicle charging station, and further receive a unique identifier associated with a mobile device; and based at least in part on the readable code and unique identifier, authorize a consumer associated with the mobile device to access charging capabilities associated with the electric vehicle charging station.02-21-2013
20110192899Identification System - The invention concerns generally systems and methods to provide emergency information related to and identification of an individual, such as an infant, separated from a parent or guardian. The system can be designed such that it increases the likelihood that emergency aid providers can gain access to critical information about those individuals who cannot themselves provide such information. The system generally does not require emergency personnel to use any special devices to access information, and instead allows them to access the information using devices that they commonly use. Moreover, the system is designed to increase the possibility that the information accessed by the emergency personnel is up-to-date.08-11-2011
20100140350ELECTRONIC DEVICE, CARD ACCEPTING DEVICE, AND IMAGE HANDLING SYSTEM - An electronic device includes: a connection unit for connecting a card accepting device that outputs a card presence signal when the card for using the electronic device has been inserted and ejects the card by at least control with the electronic device; a detection unit that receives the card presence signal and detects that the card has been inserted into the card accepting device; a notification unit that notifies that the card has been inserted into the card accepting device; an operation key; and a control unit for notifying that the card has been inserted into the card accepting device and instructing the card accepting device to eject the card, if it is determined that the detection unit has detected that the card has been inserted into the card accepting device when no operation of the operation key has been accepted within a preset time after a job is completed.06-10-2010
20100072276METHOD AND SYSTEM FOR REWRITING CARD INFORMATION - A system for rewriting card information includes: a personal information acquiring unit that acquires personal identification information for identifying an individual; a card layout information acquiring unit that acquires card layout information indicating a format of a card which records availability information indicating availability of facilities within an area corresponding to the personal information acquiring unit; and a card information rewriting unit that rewrites a format of availability information recorded in a card of an individual identified by the personal identification information acquired by the personal information acquiring unit into the format of the availability information indicating availability of facilities within the area corresponding to the personal information acquiring unit, based on the card layout information acquired by the card layout information acquiring unit.03-25-2010
20090266885ACCESS CONTROL PROXIMITY CARD WITH ACTUATION SENSOR - The present invention relates to access control systems using proximity cards, and in particular, to a proximity card and an associated method for controlling activation of the proximity card. The proximity card includes an actuation sensor and an access electronics system connected to the actuation sensor, the access electronics system configured to activate the proximity card in response to an input from the actuation sensor to enable communication of the access information from the proximity card.10-29-2009
20090121016On-Line Authorization In Access Environment - A method for allowing on-line authorization in an access environment. The method includes receiving a request for access to a location at a gate access device from a user. After receiving the request for access to the location, an authorization request message is generated. The authorization request message includes an authorization to charge a predetermined amount of money. The authorization request message is then sent to an issuer for approval. An authorization response message is then received. The authorization response message indicates whether or not the charge is authorized or not authorized. If the authorization response message indicates that the authorization response message is authorized, then the user is allowed to access the location.05-14-2009
20090266887Method and Apparatus for Ferrous Object and/or Magnetic Field Detection for MRI Safety - A method and apparatus for ferrous object and/or magnetic field detection are provided. Embodiments can improve magnetic resonance imaging (MRI) safety and increase the safety of MRI facilities. Embodiments can detect a given magnetic field strength around a MRI machine and alert users to the field's presence. In an embodiment, the magnetic field warning system can rely on a single badge that warns its user. In another embodiment, the badge can utilize an RFID system. The RFID system can turn the badge on when it enters the MRI room and off when it leaves the MRI room. In another embodiment, a badge with a rechargeable battery and charger can be utilized with or without an RFID tag. The subject badges or other detection devices can be worn by a person, located on or near a ferrous object, embedded in clothing, or located in other positions convenient to a user.10-29-2009
20090173787INTEGRATED CIRCUIT DEVICE, INFORMATION PROCESSING APPARATUS, MEMORY MANAGEMENT METHOD FOR INFORMATION STORAGE DEVICE, MOBILE TERMINAL APPARATUS, SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE, AND COMMUNICATION METHOD USING MOBILE TERMINAL APPARATUS - A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region is managed in directory units. A personal identification code is set for each application and directory, and the access right is controlled in application units or directory units. If a mobile terminal is lost, the right to access each application in the IC card automatically disappears. Therefore, the right to access each application allocated to the memory region on the IC card is efficiently controlled.07-09-2009
20090159674PARKING METER AND A DEVICE THEREFOR - A single bay parking meter device is provided which accepts payment by means of a credit or debit card, an electronic purse, or coins. The device has a power supply unit, a solar power charging arrangement and power management, such that it does not need power supply cables to be installed for each meter. The parking meter device also transmits financial data to a financial institution in a wireless manner, also to avoid the need for cabling. The parking meter device is receivable in the base of a conventional single bay parking meter, such that the new parking meter device may be retrofitted to existing coin operated installed single bay parking meters, using a new cover that is also engageable with the conventional housing base.06-25-2009
20090134219Biometric Assurance Device And Method - The invention may be embodied as an identity assurance system or method. A system according to the invention may have a biometric sensor capable of providing static biometric indications, a strap capable of positioning the sensor on an organism, and a computer in communication with the sensor. The computer may have software running on the computer in order to (a) cause the computer to determine whether there is a match between a subsequent static biometric indication and an initial static biometric indication, and (b) cause the computer to send a signal indicating whether a match was determined in order to assure the identity of the organism.05-28-2009
20090166411HYBRID MULTI-SENSOR BIOMETRIC IDENTIFICATION DEVICE - An improved fingerprint sensing device is provided with multiple sensing apparatus, two or more of which operating on different sensing principles. For example, a capacitive sensor may be integrally formed with an optical sensor on a single substrate. Ideally, the multiple sensing apparatus are disposed such that they may sense nearly identical portions of a fingerprint simultaneously. A primary sensor may be employed to establish the identity of a user based on a fingerprint, while a secondary sensor may be employed to establish that the fingerprint is part of a live human (anti-spoofing). Integrated light sources may be provided to drive an optical sensor. The light sources may also provide visual cues for usage, and enhance the aesthetics of the device.07-02-2009
20130048720VIRTUAL BADGE, DEVICE AND METHOD - A system, method, and device comprising a virtual badge are disclosed. A virtual badge can be displayed on a cell phone or in another linked portable device, and for security purposes, has images which can be scanned, and the capability to alternate colors and/or self-destruct on a pre-set schedule. Whether for after a disaster or for daily use, the system uses cell phones or mobile devices loaded with specialized software. Using plugin technologies, the system optionally can enable field collected photos and notes on customizable forms to be mapped, tracked, and time/date stamped—including in a 100% disconnected environment. A modifiable virtual badge can aid in inventory, accountability, organization, and efficiency. The system can be employed by the “Whole Community”—citizens, businesses, not-for-profits, and government agencies—for social media, business, cleanup, insurance adjusters, or personnel focused on day to day operations or on mitigation, preparedness, response, and recovery.02-28-2013
20130056536NETWORK FOR BLOOD PRESSURE DATA MANAGEMENT AND RECHARGEABLE SMART CARD - Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart Cards and synchronized to a database via a secure network. Also, enabling the providers of automated blood pressure readings, such as pharmacies, corporate work sites, health clubs and other customers, to charge a fee for the long-term use of a memory card to record non-invasive physiological test data and make the data available for health consultations. In an automated blood pressure system with one or more memory-card interface devices, a custom-formatted end-user memory card keeps track of the user's non-invasive physiological test data, and a recharge memory card controls the provider's recharging of the end-user memory card after the end-user memory card expires. The contents of the recharge memory card are updated in order to track its use by the provider of the readings.03-07-2013
20110057034SECURE TRANSACTION DEVICE AND SYSTEM - A portable transaction-enabling device (03-10-2011
20090272800GAMING SMART CARD - A system has been developed which employs a Smart Card which is approximately the size and shape of an ordinary credit card that an individual can carry in their wallet. It contains a Smart Card chip or similar information storage device which contains information by which the person may be identified. It also contains financial information so the user can make purchases and receive credits. Wireless technologies are employed to provide communication between the Smart Card and a card reader. This card can be used in place of chips or coins in casinos and for on-line wagering.11-05-2009
20110011930PARKING METER WITH EV RECHARGING CAPABILITY - A parking meter includes a credit or debit reader to capture financial information; a printer to print parking slips; and a controller coupled to a power receptacle, the controller receiving financial information from the card reader and upon receiving authorization for a credit or debit transaction, printing a parking slip and applying power to the power receptacle to recharge a vehicle battery.01-20-2011
20100123004METHOD AND DEVICE FOR THE AUTOMATED ACCESS CONTROL OF AIR PASSENGERS IN AIRPORTS - In the method for automated access control of air passengers in airports, the boarding pass carried by an air passenger is evaluated. The data recorded as a bar code on the boarding pass is read by means of a bar code reader at a pass-through. A central database is used to check whether a blocking note is stored for the respective boarding pass. If this is not the case, the locking device of the pass-through is opened. As soon as the air passenger has passed through the pass-through, a blocking note relating to the boarding pass is dispatched and stored in the database.05-20-2010
20090057401SYSTEM AND METHODS FOR PROVIDING PREPAID CAR WASH OR LUBE SERVICES - Systems and methods are disclosed for operating an automated vehicle wash or lubrication system and providing user selected car wash or lubrication services according to a prepaid customer account, in which the customer's credit card is automatically charged at a regular interval or based on a certain number of services having been provided for the prepaid wash or lubrication services.03-05-2009
20090236418USB Card Reader with Auto-Execution and Method Thereof - A USB card reader with auto-execution and method thereof is disclosed. A HID and an auto-key-in device are included in the USB card reader to execute an on-access program automatically when the USB card reader is mounted with a host system. One or a plurality of characters are keyed in the host system by the auto-key-in device through the HID and they may comprises a hot key for on-access program execution, a website address, a password or a finger print identification data.09-24-2009
20100090001Method and terminal for providing controlled access to a memory card - There is provided a method for providing access to data securely stored in a memory card. An exemplary method comprises receiving the memory card in a terminal. The exemplary method also comprises transmitting a request for accessing the data via a communication link from the terminal to a device. The exemplary method additionally comprises sending first information from the device to the terminal via the communication link upon receipt of the request. In addition, the exemplary method comprises receiving the first information in the terminal and accessing the data using the first information.04-15-2010
20110139870SECURITY APPARATUS - Disclosed is apparatus for use with an RFID proximity card and with a steel door and frame assembly. The door is of the type having a magnet and the frame is of the type having a bore, which, when the door is closed in the frame, presents towards the magnet. The bore is of the type provided to permit the mounting of a magnetic door contact in the frame. The apparatus comprises a sensor assembly which: in use, is received by the bore and grippingly engages said frame; produces a first signal when the card is operatively presented thereto; and produces a second signal when the door is closed to bring the magnet adjacent the sensor assembly and into alignment with the bore.06-16-2011
20090101710Method and System for Unified Presentation of Event Booking Systems - In one embodiment, a system, that may be executed as a method, is provided for managing the booking of event tickets inside a single system, regardless of the source of the tickets and how the system of each ticket provider actually works.04-23-2009
20090101708SITE-SPECIFIC ACCESS MANAGEMENT - A system for ensuring access management of a given site by providing integrated and comprehensive assessment of persons, livestock or objects that are given access to the site. The system includes a database of information about the site and potential accessors, a mobile wireless communication and scanning device to collect, retrieve and facilitate communication between a device user at the site as well as an administrator console. This system is flexible enough to maintain current information about the persons, livestock or objects requesting access to the site and communicating those results to the device user in real time. The system is further enabled through the Internet and the World Wide Web.04-23-2009
20090152347DEVICE FOR SECURING AN ENCLOSED SPACE BY IDENTIFICATION - The present invention concerns a device for securing an enclosed space by identifying the persons authorized to access it (parking areas, laboratories, high-risk areas), including: 06-18-2009
20080308629TIME-VARYING SECURITY CODE FOR ENABLING AUTHORIZATIONS AND OTHER USES OF FINANCIAL ACCOUNTS - A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device.12-18-2008
20090039156Method for Authorized Granting of a Service and Device for Carrying out Said Method - Current electronic cards, such as, for example, proximity cards, smartcards for short, can transmit data to a reader unit over a range of up to about 10 cm. Boosters are used to improve convenience which in essence represent a wireless extension. This is however not adequate with regards to autonomy, function (as a result of termination) and for the differing applications. A method is disclosed in which the transmission of service-specific codes, stored on a number of different smartcards, to a portable device is carried out. The portable device then transmits one or more of the codes via several different communication connections so that access to a service can be activated. By providing services to the corresponding authorized communication connection a modular system is achieved, permitting multiple access for a user to services.02-12-2009
20100090000COMMUNICATION METHOD BETWEEN A HANDSET DEVICE AND IC CARDS - A communication method is between a handset device having a slot hosting a first IC card, and a second IC card. The method uses a plurality of commands based on a handset device-IC card interface and intended to drive a communication between the first IC card and the handset device. The method may include providing a second device, including a slot for hosting the second IC card, providing the first IC card and the second IC card with a wireless personal interface supporting a wireless communication, and inserting the second IC card inside the slot. A communication between the handset device and the second IC card is driven by forwarding a command received by the first IC card on the handset device/IC card interface to the wireless personal interface.04-15-2010
20100089999VEHICLE UNIT, VEHICLE SYSTEM AND PROGRAM FOR SAME - A portable terminal receives a settlement record information instruction from a user for reading settlement record information, and requests a vehicle unit for an output of corresponding information represented by the user instruction. The vehicle unit then reads the corresponding settlement record information from among all information readable by the portable terminal, and transmits the information to the portable terminal. The settlement record information becomes therefore more accessible for the user without compromising privacy.04-15-2010
20090206157Method and system for authenticating use of item - A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database.08-20-2009
20090090772METHOD OF CHECKING TRAIN TICKETS - A method of checking train tickets includes the steps of a) detecting authorization data stored in a ticket held by a passenger in a train station and identifiable by an RFID technology by first ticket detecting devices and sending the detected authorization data to a mainframe, b) detecting the authorization data of the ticket held by the passenger on the way of a train by at least one second ticket detecting device to check whether the authorization data detected is feasible for the passenger to take the train and sending the detected result to the mainframe, and c) detecting the authorization data of the ticket held by the passenger after the passenger gets off the train by third ticket detecting devices installed in a train station to determine whether the passenger intending to exit the train station needs to pay an excess train fare.04-09-2009
20090045257Federated ID Secure Virtual Terminal Emulation Smartcard - A smartcard using a combination of secure virtual terminal emulation implemented by the smartcard and Federated ID information stored on the smartcard (and optionally on a transaction processor server) to provide secure verification of the personal identity of the cardholder. The Federated ID information provides a high level personal identity verification for the cardholder while secure virtual terminal emulation by the smartcard prevents the Federated ID information from being exposed to the microprocessor and memory resources of a host computer station when the smartcard is used with the host computer station to engage in transactions. The Federated ID smartcard provides a flexible, dynamically adjustable, highly efficient and secure system for personal identity verification for online commerce and a wide range of other application involving personal identity verification.02-19-2009
20090294529PARSING AN IDENTIFICATION DOCUMENT IN ACCORDANCE WITH A JURISDICTIONAL FORMAT - An apparatus that authenticates the contents of identification documents provided by different issuers having machine-readable and/or human readable information is disclosed. The contents of the identification documents are verified without encountering any human error. The verified contents of the identification documents may be used for identification purposes such as age restricted purchases, preordained organ donors or possible criminal prosecution. The verified contents of the identification documents may be logged to provide ID checking compliance and/or may be transferred to a remote computer for additional processing or logging.12-03-2009
20090283591Public transit system fare processor for transfers - An implementation of a system and method for processing transfer rides associated with at least one public transit network is provided. The system and method preprocess transactions to consolidate or eliminate unnecessary transactions with a financial institution clearing and settlement network.11-19-2009
20120292391COUNTERMEASURES TO SECURE SMART CARDS - The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than cryptography may act as a countermeasure to prevent extraction of cryptographic information such as passwords. In one embodiment, the smart card system of the present disclosure may be used to authenticate a smart card user. A password may be stored within a hidden memory location of a smart card. A smart card may interface with an external device. Data representing the hidden memory location of the stored password may be transmitted to an external device. Access to the hidden memory location of the smart card by the external device may be allowed. The password stored within the smart card memory is compared to input data entered into the external device. If the input data matches the password stored within the smart card, a user may be authenticated.11-22-2012
20100264214METHOD AND SYSTEM FOR PROVIDING CONTRACT-FREE "PAY-AS-YOU-GO" OPTIONS FOR UTILIZATION OF MULTI-FUNCTION DEVICES - A method and system including a plurality of multifunctional devices being operatively associated with at least one controller and each having a preset amount of preloaded consumables at a time of initial use; and a software application for enabling at least one user to access the plurality of multifunctional devices, the software application being configured to receive information from a prepaid card, the information including a financial value relating to usage of some of the preset amount of preloaded consumables in the plurality of multifunctional devices; wherein the financial value of the prepaid card is applied by the at least one user across the plurality of multifunctional devices in any desired uniform or non-uniform financial proportions in accordance with usage determinations; and wherein the at least one user is enabled to pay for access to the plurality of multifunctional devices in time staggered installments without pre-established contractual obligations.10-21-2010
20080245861SYSTEM AND METHOD FOR CONTROLLING SECURED TRANSACTION USING COLOR CODED ACCOUNT IDENTIFIERS - A method and system provides coded access to a transactional or other type of system by acquiring account identification data corresponding to a combination of a plurality of colors. The account identification data is transmitted to, for example, a remote server to correlate the account identification data against an account database to evaluate corresponding account information. Based on the account information, access to the transactional or other type of system may be controlled.10-09-2008
20090166412AUTOMATIC INTEGRATED SENSING AND ACCESS CONTROL - An access control system for sensing exposure to items of interest for a person associated with a unique identifier of a fare card or ticket is disclosed. The access control system includes the unique identifier, an exposure detector and a processor. The unique identifier associated with the person that is flagged when exposure is detected. The exposure detector detects exposure to items of interest by the person. The processor is coupled to the exposure detector. The message is communicated away from the processor to a remote location when the unique identifier is flagged.07-02-2009
20120168501CONTROLLING DEVICE AND METHOD FOR CONTROLLING AN APPARATUS - A controlling device that controls an apparatus includes a display unit configured to display an image representing a certain scene included in content that is being played back by the apparatus; and an obtaining unit configured to obtain image data of the image from an apparatus that is providing the content.07-05-2012
20120168500IC Card and IC Card Security Authentication System - An integrated circuit (IC) card is adapted for exchanging data with an external computer device, and includes an IC chip for storing owner fingerprint data, a fingerprint scanner, and a control unit coupled electrically to the IC chip and the fingerprint scanner. The control unit includes a central processing unit operatively associated with the IC chip and the fingerprint scanner. The central processing unit is configured to compare user fingerprint data inputted via the fingerprint scanner with the owner fingerprint data stored in the IC chip, and to enable the control unit to conduct a transaction with the external computer device when the user fingerprint data matches the owner fingerprint data.07-05-2012
20080277466METHOD AND SERVICE FOR LINKING AND SYNCHRONIZING WASHING SUBSCRIPTIONS WITH RFID TECHNOLOGY - A method and service and computer program product to link and synchronize subscriptions to be used at multiple washing facilities. RFID technology is used in the method and service to keep track of active subscriptions and the types and prices of washing services that are available to the subscriber. In one embodiment, subscription and RFID tag information stored at the local washing facilities are linked together and stored in a host server. The host server will periodically synchronize data between all connected washing facilities so there is consistency as to the subscriptions, active RFID tags, and types and prices of washing services.11-13-2008
20080290160Contactless Electronic Microcircuit Document and Proximity Sensor - The document includes a support (11-27-2008
20080290161METHOD OF SECURE TRANSMISSION - A method, a system, and an apparatus for proving secure transmissions from a smartcard reader are described. A signal created by the smartcard reader dependent on the smartcard is encrypted. The signal comprises access information. The encrypted signal is transmitted to a remote location relative to the smartcard reader. The transmitted signal is translated at the remote location to another format useable by an access controller. An access mechanism is controlled using the access controller dependent upon the translated signal.11-27-2008
20090032586ADVERTISING AND MARKETING METHOD AND DEVICE - The event souvenir bracelet and card comprises a bracelet and card displaying an identifying name or logo of an event inside a transparent package with an information packet containing information about the event. The card contains stored, retrievable data allowing it to function as a money card, such as a stored value card or gift card. In a second aspect of the inventions, a wearable bracelet contains a device allowing data to be transmitted to and from the bracelet. The data is stored on an RFID device allowing use of the bracelet as a wearable ticket, as an identification and location device, and as a gift card, credit/debit card or stored value card.02-05-2009
20080265023Wireless Access Control Reader - A wireless access control system having a microcontroller, a field generator, an access card reader, a proximity detector, and a self-contained energy source. Energy demands are reduced by maintaining the reader and field generator in a powered off state until the proximity detector detects the possible presentation of an access control card. The microcontroller then activates the field generator and card reader for a predetermined time period for obtaining data from the control card. If data is received, the system determined whether to grant access, or transmits the data to a host for determination whether access should be granted, and then operates a security mechanism accordingly. If data is not received within the time period, the field generator and reader are power off until the next proximity detection.10-30-2008
20090184164Secure Commercial Transactions System - A secure financial transactions system. The system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number (PIN) that can include a panic digit or panic PIN. The panic digit or panic PIN can be used to begin an emergency notification sequence including sending emergency signals and video transmissions from the commercial transactions machine. The card can include several biometric devices as well as financial transaction records. The card can include data to interact with data gathered from biometric devices on the ATM or POP devices. The card can then be interfaced with a personal computer. The card could also be made into other formats such as a ring, key chain, or other jewelry.07-23-2009
20090050695EFFICIENT ACCESS RULES ENFORCEMENT MECHANISM FOR LABEL-BASED ACCESS CONTROL - A computer-program product for improving LBAC performance in a database may include assigning a security label to a user of a database. The security label may be one of multiple security labels associated with a security policy of the database. Each of the multiple security labels may then be compared to the user's security label to provide multiple comparison results. These comparison results may be stored in a persistent label comparison results table for later retrieval. Upon receiving a command to read or write to an object in the database, the comparison result associated with the object may be retrieved from the persistent label comparison results table. Access to the object may then be granted or denied based on the comparison result.02-26-2009
20090200373System and Method for Implementing an Automated Vault Machine - A system and method for remotely managing a security area such as a safe deposit box repository providing ready access by a community of users includes one or more identity-confirmation steps, followed by granting permission to enter a first secure area. Within the first secure area, further identity-confirmation steps arc performed before access to a second secure area is remotely authorized. Inside the second secure area, the user unlocks one mechanism which secures his specific safe deposit box and, if implemented in the particular vault, a second portion is remotely unlocked, permitting the user access to his box. Egress involves replacing the user's safe deposit box into the assigned location, then exiting to the first secure area. After the door between the second and first secure areas closes, exit from the first secure area is permitted. Identity-confirmation steps may include cards, PINs, biometric tests, visual identification, or other suitable steps.08-13-2009
20090026261CONTROL GATE - A control gate includes a first exciting coil, a first detection coil, a second exciting coil, a second detection coil, a signal determination unit and an amplification factor setting unit. The first exciting coil forms a first alternating magnetic field in a passage. The first detection coil detects a variation in the first alternating magnetic field. The second exciting coil forms a second alternating magnetic field in the passage. The second detection coil that detects a variation in the second magnetic field. The signal determination unit includes a first amplifier which (i) amplifies a first detection signal of the first detection coil and (ii) determines a passage of the magnetic material based on the amplified first detection signal. The amplification factor setting unit sets a first amplification factor for the first amplifier based on a second detection signal of the second detection coil.01-29-2009
20090050696System and method for valid period control - A system for valid period control, comprising: a user device and a paid service server. The user device comprises a device identification code; the paid service server accepts the device identification code; assigns an expiry date according to the device identification code, and then encrypts and sends the device identification code and the expiry date back to the user device. The paid service server of the system for valid period control may be located at a provider of paid services for securities, thus allowing the provider of paid services for securities to manage expiry dates of users independently, and does not require assistance from a securities information service provider.02-26-2009
20090101709ENTRANCE CONTROL SYSTEM AND ENTRANCE CONTROL DEVICE - An access control system and device is provided which is capable of preventing, if the system operates, and then, a door, etc., is opened, the entry of a third party due to abuse of an opportunity of the opening. An access control system (04-23-2009
20090057402Information processing apparatus and information processing system - An information processing system is supplied capable of holding a security; and transferring an output authority which is had by a transfer source portability terminal to a transfer destination portability terminal. In the information processing system, a transfer source sending section for sending authority information to the transfer destination portability terminal for transferring output authority is furnished in a transfer source portability terminal; a transfer destination receiving section for receiving the authority information from the transfer source portability terminal, a transfer destination storing section for storing the received authority information, and a transfer destination sending section for sending authority information to the information processing apparatus are furnished in a transfer destination portability terminal; and an apparatus receiving section for receiving the authority information from the transfer destination portability terminal, a releasing section for releasing an output limitation according to the received authority information and an outputting section for performing an output based on the data are furnished in an information processing apparatus.03-05-2009
20090230187CASH REGISTER SYSTEM AND METHOD OF OPERATING A CASH REGISTER SYSTEM - Aspects of the invention relate to a cash register system and a method of operating a cash register system. The cash register system comprises an age verification system. An image of a person is captured and transmitted to a remote age verification center. An authorization signal is subsequently received if from the image the person can be determined to have an age allowing purchase of the age-restricted item. A release signal is provided only if the authorization signal is received in order to allow payment of the age-restricted item.09-17-2009
20090224036System And Method Of Operation Control On An Electronic Device - Systems and methods of application control for use on an electronic device. A device can be configured to receive an operation request from an application. The device can determine whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application. The application is allowed to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application.09-10-2009
20090255989ELECTRONIC DELIVERY OF ADMISSION TICKETS DIRECT TO A PURCHASER - Electronic delivery of counterfeit-resistant documents exchangeable for value such as admission tickets, gift certificates, coupons, vouchers, etc. directly to the person who ordered the documents over an open communications network such at the Internet. A first party orders a document from a second party, and the second party electronically delivers the ordered, counterfeit-resistant document to a device designated by the first party. For example, the document may be electronically ordered using a PC, and a printer coupled to the PC may print the document. In one embodiment, the first party transmits unsolicited offers over the open communications network The document may be made counterfeit resistant by assigning unique information to each document of a given type, e.g., admission tickets, and checking the uniqueness of a document and whether the unique information was previously read prior to allowing it to be exchanged for value.10-15-2009
20090261163ELECTRONIC DEVICE AND INFORMATION TRANSMISSION METHOD THEREOF - An electronic device for transmitting control data according to an external user card includes a control interface, a switching module, and an information center. The information center includes a detection module, a verification module, a control module, and an information transmission module. The detection module detects insertion of the user card. The verification module verifies whether the user card is valid. The control module determines whether the switching module is activated based on the verification of the user card. The information transmission module transmits control data to the control interface when the switching module has been activated. A method for an electronic device for transmitting control data is also provided.10-22-2009
20100170947SYSTEM AND METHOD FOR ELECTRONIC TICKET VERIFICATION, IDENTIFICATION, AND AUTHORIZATION WITH A WIRELESS COMMUNICATION DEVICE - An enhanced security system utilizes a consumer wireless device and independent secure servers to enhance identification and authentication of the electronic ticketing. The consumer may make an eTicket purchase using a network, such as the Internet, in a conventional manner. The server involved in the purchase may send an eTicket confirmation to a consumer wireless device. However, master records of the transaction are sent via a secure link to a vendor server, typically associated with a wireless service provider. At a point just-in-time, the vendor server transmits symbology to the consumer wireless device and transmits additional data related to the symbology to a security server. When the consumer arrives with the eTicket, the consumer also uses the displayed symbology on the consumer wireless device. The symbology is scanned and compared with data transmitted from the vendor server to the security server. If authenticated, the eTicket may be authenticated. In addition, a near field communicator in the consumer wireless device may be programmed to provide additional security. The programmed NFC may be scanned to provide additional authentication.07-08-2010
20100276487Method and system for controlling access to an enclosed area - A method and system for controlling access to an enclosed area is described. One illustrative embodiment is an access card reader and controller that is powered via a Power-over-Ethernet (PoE) interface. The access card reader and controller may include a plurality of operating modes, including a network mode in which the access card reader and controller relies on an external access control server to authenticate received card identifiers and a standalone mode in which the access card reader and controller authenticates card identifiers independently of the access control server based on information stored locally in the access card reader and controller. In this illustrative embodiment, the access card reader and controller may also include a local tamper detector configured to detect when the access card reader and controller is being tampered with.11-04-2010
20090321517SECURITY DEVICE READER - A method performed by a device may include exchanging encryption information with a security card, generating validation information based on the exchanged encryption information with the security card and transmitting the validation information to the security card for display.12-31-2009
20100243733AUTHENTICATION USING PHYSICAL CHARACTERISTICS OF TOKENS - A portable consumer device having a substrate layer, a protective layer and a brittle material layer having an intentionally created unique fissure patterns and systems and methods for making and using same are disclosed. The unique fissure pattern of the brittle material layer is detected and used to authenticate the portable consumer device.09-30-2010
20100243735CONTROL DEVICE AND USE CONTROL METHOD FOR CONTROL OBJECT APPARATUS - A control device for controlling a use of control object apparatus, including a control section which is configured to read out information recorded in an IC card with noncontact state, to discriminates an attribute of a user based on readout information and previously stored information, and to switch between an authentication mode and a billing mode in accordance with the attribute of the user, wherein in the authentication mode, the control section permits the use of the control object apparatus only with an authentication, and in the billing mode, the control section executes a billing processing on the IC card in accordance with a use state of the control object apparatus.09-30-2010
20100127076IMAGE FORMING APPARATUS AND CONTROL METHOD OF IMAGE FORMING APPARATUS - An image forming apparatus includes a power supply unit supplying power to a plurality of components, the power supply unit including a first power mode and a second power mode, the second power mode supplying less power than the first power mode, a control unit controlling which power mode the power supply unit uses, an authentication unit performing a user authentication when power is supplied from the power supply unit in the second power mode and an authentication request received in the second power mode, and a sending unit sending a request signal requesting the control unit to shift the power supply unit to the first power mode when the authentication unit succeeds in the user authentication, wherein the control unit controls the power supply unit to shift from the second power mode to the first power mode upon receipt of the request signal.05-27-2010
20110057033Method for Storing, Delivering, and Receiving Secure Background-Investigation Information - A method for storing, delivering, and receiving background information includes receiving, by a subject, a request for background information from a requesting party. The subject then requests performance of a background information inquiry from a searching party and subsequently receives a background information inquiry result from the searching party. The background information inquiry result is stored on a tangible medium that has at least one mechanism for preventing editing of the background information inquiry result by the subject. The subject then presents the tangible medium to the requesting party, the requesting party knowing that the information has not been tampered with.03-10-2011
20090283590RADIO FREQUENCY IDENTIFICATION METHOD AND SYSTEM OF DISTRIBUTING PRODUCTS - A method and system for vending products from a defined area, such as a micro-warehouse with a door. The method includes fitting each product with a radio frequency identification tag, positioning the plurality of products in a micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the remote processor based on the message. The system is designed to be accessed by authorized individuals possessing some type of code or identifying mechanism. The micro-warehouses may be cabinets, refrigerators, secured rooms, or similar storage units or areas.11-19-2009
20090283589ON-LINE GENERATION AND AUTHENTICATION OF ITEMS - Items that require authentication, such as coupons or tickets are printed with a data carrier such as a data matrix or an RFID device. Encoded on the data carrier is a value based token, which comprises a header, a payload and a security portion. The header identifies the token type and also includes a unique identification of the token. A PIN flag may also be included. The payload may be encrypted and contain data which gives an authorised party access to a portion of a databases that stores information corresponding to the token identifier. The security portion may comprise a hash or a digital signature.11-19-2009
20090114721System having a plurality of service facilities with access control devices - A system has a plurality of groups (A, B) of service facilities (05-07-2009
20080265024Electronic device with functional module - A electronic device comprises a housing having a module bay configured to receive insertion of a modular biometric reader therein, the modular biometric reader located and usable within a periphery of the housing when disposed in the module bay.10-30-2008
20080265025Method and systems for providing merchant services with right-time creation and updating of merchant accounts - Systems and methods for providing merchant services with right-time creation and updating of merchant accounts. Merchant-specific information for each merchant is stored in a record and used to process purchase card transactions submitted by the merchant. When a user creates or updates a merchant account record, the user can indicate whether the update is to take effect immediately or at a user-specified later time. An immediate update is processed substantially without delay. Other updates are queued for later processing and processed at the user-specified later time.10-30-2008
20090039155Airport vehicular gate entry access system - A method of securing airport vehicular gate entries by providing mechanisms to check airport employee escorting a vehicle, as well as vehicle driver and passengers and match them against the TSA NO-FLY and SELECTEE lists. The system provides means of authenticating drivers' licenses, verifying employee status, printing temporary passes, printing a temporary vehicle entry pass and certificate, providing the airport police with a handheld apparatus capable of reading the entry certificate and wirelessly verifying its authenticity. The system provides a method of allowing entry for a group of individuals escorted by an airport employee. The system provides also a method for allowing entry of multiples vehicles, escorted by one airport employee. The system is fully automated and is touch screen capable, thus requiring a minimal amount of human interaction.02-12-2009
20090072027Subscription antenna strap - An antenna strap for the mobile device is being provided with an antenna extension (means) for receiving wireless broadcast in the mobile device. The antenna extension of the antenna strap extends beyond the traditional antenna of the mobile device so that the mobile broadcast is more feasible and that the antenna strap comprises parameters for initializing an access to the subscribed service delivered by the wireless broadcast. The parameters set the initializing phase for accessing and eventually obtaining at least one subscribed broadcast service.03-19-2009
20080230602BIOMETRIC AUTHENTICATION DEVICE AND METHOD - The invention may be embodied as an identity authentication system or method. A system according to the invention may have a biometric sensor capable of providing static biometric indications, an adhesive capable of positioning the sensor on an organism, and a computer in communication with the sensor. The computer may have software running on the computer in order to (a) cause the computer to determine whether there is a match between a subsequent static biometric indication and an initial static biometric indication, and (b) cause the computer to send a signal indicating whether a match was determined in order to authenticate the identity of the organism.09-25-2008
20100308108APPARATUS AND METHOD OF AUTOMATING ARRIVAL AND DEPARTURE PROCEDURES IN AIRPORT - The present invention relates to an apparatus and method of automating arrival and departure procedures in an airport, by which the forgery of a passport, the identity of a passport bearer, the arrival or departure permission according to a result of arrival and departure examinations, and the carry-on of prohibited items on the plane are automatically checked. The apparatus for automating arrival and departure procedures according to the present invention includes an exit gate, a departure automation apparatus, and may further include an entrance gate and a scanner. In the apparatus for automating arrival and departure procedures according to the present invention, a departure area entry procedure, a security screening procedure, and a departure examination procedure for departure passengers, which are conventionally performed separately in different areas, may be incorporated in the same area and performed therein.12-09-2010
20100294835METHOD AND APPARATUS FOR MANAGING SERVICES USING REUSABLE BEARER TAGS - An approach is provided for managing one or more services corresponding to a reusable prepaid bearer tag (e.g., near field communication (NFC) tag, radio frequency identification (RFID) tag, contactless card, or barcode). A request to manage a service is initiated by reading service information from a reusable prepaid bearer tag corresponding to the one or more services.11-25-2010
20110000961ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION - An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. The system preferably has the ability to read or scan transaction and account information printed or encoded on the transaction token, digitally encode biometric data, scan drivers' licenses or other identification cards, and take a signature of a customer, all at a transaction location for purposes of account verification. The electronic transaction verification system preferably digitizes various indicia of the token, such as the magnetic ink (MICR) line on a presented check or the magnetic strip on a credit card or debit card, and transmits the transaction information data to a central processing system, at which the central processing system compares the inputted data with an existing database of information to determine if the customer at the point of the transaction is in fact authorized to use the account, and if the account is in satisfactory condition for approval of the transaction. The electronic verification system includes a biometric data device for recording and/or transmitting biometric data taken at the transaction location. The electronic transaction verification system can be used in conjunction with a transaction processing system to determine if the transaction instrument presented for payment is associated with an account established for an authorized user.01-06-2011
20110000962Transit Access System and Method Including Device Authentication - A system, apparatus, and method for enabling effective use of a contactless payment device in a transit system. The invention may be implemented in a manner that separates the authentication process from the pre-authorization process, thereby permitting a transit system patron to access and begin use of the transit system prior to authorization of the transaction by the issuer of the device.01-06-2011
20110024499ENTRANCE TICKET WITH LIGHTING EFFECT - A ticket having an embedded processor in a substrate for creating a synchronous lighting effect at a controlled access venue and a method for creating a lighting effect at a controlled access venue while controlling access to the venue simultaneously using a ticket that coordinates with the performance allowing a holder of the ticket to perform with the performance.02-03-2011
20100133339SYSTEM AND METHODS FOR VARIABLE DISTRIBUTION AND ACCESS CONTROL FOR PURCHASED EVENT TICKETS - A system and methods for providing variable distribution and access control for purchased event tickets are described. In one embodiment, a network-based system receives an order for electronic tickets purchased by a buyer, receives one or more recipients other than the buyer for one or more of the electronic tickets, receives delivery options for the recipients from the buyer, receives delivery information for the recipients from the buyer, and delivers electronic ticket information to the recipients. Other embodiments are described and claimed.06-03-2010
20100133338METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device.06-03-2010
20110108623VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.05-12-2011
20090065578Location Dependent Control Access in a Process Control System - A method of accessing an element in a process control environment using a portable communicator includes defining a plurality of control areas within the process control environment, determining a position of a user operating a portable communicator with respect to one or more of the control areas, establishing an identity of the user, and selectively allowing the user to access an element within the process control environment via the portable communicator depending on the determined position of the user with respect to the one or more control areas and on the identity of the user.03-12-2009
20110240736Web Service for Enabling Network Access to Hardware Peripherals - The present specification discloses methods and systems to enable a peripheral device, which otherwise lacks intrinsic networking capabilities, to be accessible over a network once attached to a local multi-function device, such as computers, laptops, printers, copiers, or other computing devices. An enabling application executing on the multi-function device includes a first layer that communicates with the local peripheral device using a driver specific to the peripheral device, a second layer that abstracts a subset of functions from the first layer and exposes the subset of functions to a third layer, and the third layer which communicates over the network with a client and provides the client access to the subset of functions through standardized calls.10-06-2011
20110210171METHODS AND DEVICES FOR TRANSMITTING AND RECEIVING DATA USED TO ACTIVATE A DEVICE TO OPERATE WITH A SERVER - Embodiments of the systems, devices, and methods described herein generally facilitate transmission and reception of activation data for use in activating a mobile device to operate with a server. In accordance with one example embodiment, an activation barcode is received from a server by reading an image comprising the activation barcode via a computing device, wherein the image is displayed on a display associated with the computing device, and wherein the activation barcode encodes activation data comprising an activation password. The activation barcode is decoded at the mobile device to obtain the activation password, and an authentication is performed using the activation password after a device activation request is transmitted to the server, wherein the mobile device is activated to operate with the server if the authentication is successful.09-01-2011
20090032587User identification system - A user identification system includes a portable terminal device for holding user information for receiving a designated service and a user information inspection device for inspecting the user information, wherein provisions are made to prevent any person other than the rightful holder of the portable terminal device from receiving the service by using the portable terminal device. The user information inspection device acquires biometric data from the bearer of the portable terminal device when a designated part of his body is held over the inspection device, and transmits the acquired biometric data via radio directly to the portable terminal device passing in proximity to it. The portable terminal device receives the biometric data, compares it with prestored biometric data, and transmits the prestored user information via radio to the user information inspection device only when a data match is confirmed. Based on the received user information, the user information inspection device permits use by the bearer of the portable terminal device.02-05-2009
20100065628Multi Application Smartcard with Currency Exchange, Location, Tracking and Personal Identification Capabilities - A smart card capable of performing more than one function, said smart card comprising a first memory means comprising a first set of data to access a bank account, a second set of data to access a credit card account, a third set of data representing the identification of a holder of the smart card, and a fourth set of data to access telephone communication services. The smart card further comprises a microprocessor, said microprocessor being in electrical communication with a second memory means, and a location tracking means for determining a location of the smart card.03-18-2010
20110079646COMPOSITE CHIP CARD WITH A SECURITY PROTECTION INTERFACE AND A METHOD FOR CONTROLLING THE SAME - A composite chip card with a security protection interface and a method for controlling the same are provided. The chip card comprises a carrier, at least one induction coil, at least one chip module, and at least one security protection interface. The security protection interface further comprises a mechanical security protection module and a control unit. The induction coil, the chip module, and the security protection interface are all provided on the carrier. The chip module is electrically connected to the induction coil. The mechanical security protection module is electrically connected to the chip module. The control unit is electrically connected to the mechanical security protection module. The method for controlling the composite chip card includes: contacting a system related to issue of the chip card, by a user of the composite chip card; then activating the security protection interface of the composite chip card; and finally performing a contactless payment transaction.04-07-2011
20100065630COVERS HAVING RFID FUNCTIONALITY FOR PORTABLE ELECTRONIC DEVICES - A cover for electronic hand-held devices providing RFID-operability and/or other functional keypad overlay to extend or expand the operation of the device to permit the user to perform additional actions or transactions facilitated by the RFID-operable cover. Method of using the cover for conducting business transactions are also included.03-18-2010
20100065629TRANSACTION SECURED IN AN UNTRUSTED ENVIRONMENT - To secure communications in an untrusted environment for a commercial transaction on an account between the account's holder and a merchant, an identifier and a signature can be derived from a token. The identifier is associated by use of a directory with an application context that identifies the account's issuer. The merchant will provide the signature to the account's issuer, or agent thereof, to be verified. In practice, a merchant to the identified issuer of an account an authorization request message for a transaction that includes a signature and an identifier for the account upon which the transaction is to be conducted. The account's issuer responds with an authorization response message that includes an indicator that the signature has been verified. After notice of the signature's verification, the transaction on the account is deemed authorized and the merchant can proceed.03-18-2010
20110101095METHOD AND DEVICE FOR AUTHENTICATING ECONOMIC TRANSACTIONS - A method of conducting an economic transaction includes the steps of wirelessly receiving a card-transmitted signal, where the card-transmitted signal includes user account information and an indicator of an amount of elapsed time between a recognition of a vibration applied to a wirelessly-transmitting credit or debit card and a transmission of the card-transmitted signal from the card. The method further includes determining a last detected vibration at a point-of-sale device, calculating an amount of time elapsed since the identification of the last detected vibration, and comparing the amount of time elapsed since the identification of the last detected vibration with the amount of elapsed time between a recognition of a vibration applied to a card and a transmission of the card-transmitted signal from the card.05-05-2011
20110101096IDENTIFICATION CARD AND NETWORK SYSTEM USING THE SAME - An identification card contains an identification portion that contains identification information for identifying a person, a wireless-information-receiving portion that receives wireless information, an output-information-generating portion that generates output information from the wireless information received by the wireless-information-receiving portion, and an output-information-displaying portion that receives the output information from the output-information-generating portion to display the output information. The identification card can identify the person and receives the output information from the output-information-generating portion to display the output information.05-05-2011
20110017821ACCESS TO A REMOTE MACHINE FROM A LOCAL MACHINE VIA SMART CARD - A method and apparatus for accessing a remote machine from a local machine via a smart card. In one embodiment, the presence of the smart card coupled to the local machine is detected. A card reader reads the credentials from the smart card and communicates them to a remote access client application of the local machine. The remote access client application transmits the credentials to the remote machine. The remote machine sends a query for login information to the local machine upon valid credentials. The local machine transmits the login information to the remote machine and is granted permission to access the remote machine upon valid login information.01-27-2011
20090001161Information processing system and remote access method - An information processing system comprising a local machine performing an information processing, a remote machine making connection to the local machine via a network and performing operation to the local machine by a user and a management-authorization server performing management and authorization of the remote machine is provided. The management-authorization server includes a plurality of connection information files for the remote machine to make connection to the local machine, and the remote machine, at making connection to the local machine, makes connection to the local machine based on a connection information file provided from the management-authorization server, after the authorization by the management-authorization server.01-01-2009
20080245860Method and System for Remote Card Access, Computer Program Product Therefor - A method for providing an application access to a smart card includes the steps of providing a card reader device for receiving the smart card, providing a computer for running the application, the computer being equipped with a first portion of smart card middleware for interfacing the card reader device, associating with the card reader device a processing unit incorporating a second portion of smart card middleware, and providing a network ensuring communication between the first portion and the second portion of the smart card middleware, thereby permitting access to the smart card by the application.10-09-2008
20080203157STORAGE AND TRANSPORT MECHANISM FOR A SELF-SERVICE CARD KIOSK WITH RETURN AND REISSUE CAPABILITY - Improved mechanisms are described for use in an automated, self-service machine that is used to issue a card or other object to an individual, and allow return of the card or other object by the individual for later automated re-issuance of the card or object to the same or different individual. The mechanisms allow the machine to issue a card or object to a user, allow return of the card or object back into the machine, and later reissue of the card or object to the same or different user.08-28-2008
20100320269CONTACT-LESS TAG WITH SIGNATURE, AND APPLICATIONS THEREOF - A method, comprising: obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain (i) a candidate identifier and (ii) a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature. Also, a system, comprising: at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain (i) a candidate identifier, and (ii) a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature.12-23-2010
20100320268PROGRAMMABLE TICKETING SYSTEM - A smart-card based system and methods to control access to a plurality of attractions within a geographical area. The system may include one or more reward terminals that are located at attractions and are configured to read smart cards presented to them and, assuming the card is valid for that location, allow the card holder to access the attraction. Each smart card may be programmed with a product code that defines the attractions at which the card may be used. Product codes may be stored in a central database along with a list of the attractions associated with the each product code. The list of attractions may be updated as desired, thereby updating and changing the attractions at which any given card may be used.12-23-2010
20100282839Method and system for the mobile tracking and accounting of individuals in a closed community - The present invention relates to a real time computer system and method as implemented on the computer system for providing interactive access control, monitoring, identifying and accounting for individuals gaining access to a closed community, comprising: registering individuals having access to the closed community, and one of mustering said individuals, tendering said individuals, verifying age of said individuals, searching said individuals, tracking said individuals for purposes of conducting a triage, responding to incidents wherein said individuals are in jeopardy, tracking excursion events of said individuals, tracking said individuals who are children and clearing enclosed spaces occupied by said individual.11-11-2010
20100282840STOCK MONITORING - System(s) and method(s) for stock monitoring are provided. Stock monitoring system(s) may include, e.g., a housing, one or more doors disposed in or on the housing, a sensor for sensing the condition of the door(s) and providing a door closed signal indicative of the door(s) having been closed by a user; one or more containers for stock items, located within the housing, the or each container having associated therewith a weight sensor for providing a weight signal indicative of the current weight of the container, and control circuitry, coupled for communication with the weight sensor(s). Method(s) may include, e.g., receiving a door closed signal; receiving one or more weight signals; and determining, for the or each container, the number of stock items removed from the container(s) by the user, from the weight signal(s) occurring during a predetermined sensing period, the predetermined sensing period being dependent upon the door closed signal.11-11-2010
20110114723DATA STORAGE AND ACCESS SYSTEMS - Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable data carrier has an interface for sending and receiving data, data memory for storing received content data, and payment validation memory for providing payment validation data to an external device. The carrier may also store a record of access made to the stored content, and content use rules for controlling access to the stored content. Embodiments store further access control data and supplementary data such as hot links to web sites and/or advertising data. A complementary data access terminal, data supply computer system, and data access device are also described. The combination of payment data and stored content data and use rule data helps reduce the risk of unauthorized access to data such as compressed music and video data, especially over the Internet.05-19-2011
20110114722MIFARE CARD, MIFARE ACCESS APPARATUS, AND ACCESS METHOD THEREOF - A Mifare card, a Mifare access apparatus, and an access method thereof are provided. The Mifare card has an application index. The Mifare access apparatus may obtain the application index when the Mifare card approaches. The Mifare access apparatus may access the application data according to an application entry address of the application index which corresponds to the application data. Thereby, the application of Mifare card is becoming more flexible.05-19-2011
20120199653BIOMETRIC IDENTIFICATION SYSTEM - A system and method for locally and centrally identifying individuals based on a combination of biometric data and personal data. An identification document suitable for use in embodiments of such a system and method, and a combination document scanner and biometric data reader that enables and performs some or all of the identification functions such a system and method.08-09-2012
20100116884SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES - Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.05-13-2010
20110073643DATA STORAGE AND ACCESS SYSTEMS - Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable data carrier has an interface for sending and receiving data, data memory for storing received content data, and payment validation memory for providing payment validation data to an external device. The carrier may also store a record of access made to the stored content, and content use rules for controlling access to the stored content. Embodiments store further access control data and supplementary data such as hot links to web sites and/or advertising data. A complementary data access terminal, data supply computer system, and data access device are also described. The combination of payment data and stored content data and use rule data helps reduce the risk of unauthorized access to data such as compressed music and video data, especially over the Internet.03-31-2011
20100059588AUTHORIZATION VERIFICATION METHOD AND DEVICES SUITED THEREFOR - The invention relates to an authorization verification method and devices suited therefor, which play back authorization data via a user interface (03-11-2010
20090308921DYNAMIC CREDIT CARD WITH MAGNETIC STRIPE AND EMBEDDED ENCODER AND METHODS FOR USING THE SAME TO PROVIDE A COPY-PROOF CREDIT CARD - A dynamic credit card is provided in which a secure credit card number (e.g., a secret/hidden credit card number) is encoded based on a timing signal (e.g., an internal counter) to provide a dynamic credit card number. This dynamic number may be displayed to a user via a display (e.g., so that online purchases can be made) or written onto a magnetic stripe such that the number may be processed by traditional credit card merchants (e.g., swiped). At a remote facility, the dynamic number may be decoded based on time (and/or a counter/key number/equation) or the facility may have the secure number and perform the same function as the dynamic credit card (e.g., encode using time data as a parameter to the encoding equation) and compare the resultant dynamic number to the dynamic number received. Thus, a dynamic credit card number may change continually or periodically (e.g., every sixty seconds) such that credit card numbers may not be copied by thieves and used at later times. A dynamic verification code may be utilized in addition to, or in lieu of, a dynamic credit card number.12-17-2009
20080217402Maturity Rating Enforcement Via Rf-Tags - Maturity levels of those present to watch a television program are automatically and transparently determined and matched to a derived maturity rating of the candidate program (S09-11-2008
20100187304Diagnostic delivery service - Systems, methods, and other modalities are described for (a) obtaining an indication relating to an emission module (which may be dangerous, e.g.) or its user (who may be untrained, e.g.) and for (b) configuring the module or causing an irradiation (for imaging, e.g.) in response to the indication.07-29-2010
20100025463Digital transmission system (DTS) for bank automated teller machines (ATM) security - This invention describes a hand held digital transceiver to transmit a signal as light (visible and invisible) or sound (audible and inaudible) or other digitized code for alphanumeric in any language, special characters or symbols or graphic or pictures or any combination thereof, to the ATM that is equipped with a compatible digital transceiver card. This card can transmit and receive the said signals and codes using a driver and/or firmware for the operation, management and maintenance of this security system. Upon verification, of the transmitted code, by the ATM, access is granted. The ATM then transmits a randomly selected new code of any combination of the codes or signals stated above to the transceiver for storage in the said transceiver and recording on the client card. The said transmission from the ATM cannot be stored in any other hand held transceiver located within range of the transmission.02-04-2010
20100019034DEVICE AND METHOD FOR SMART CARD ASSISTED DIGITAL CONTENT PURCHASE AND STORAGE - The present invention discloses a device and a method useful for the provision of secure payment and certification of digital content access, while the devise comprises: at least one IC chip containing an operating system and memory provisions, an interface of a plurality of N plated electrical input contacts (PEICs); interconnected to said IC chip; N is an integer number equal or higher than 1; and, at least one operating system able to process information and recall it, stored on said IC chip; at least one encoding mathematical formula stored on said IC chip that generates a response to input provided by entering a prescribed sequence of electrical inputs to said PEICs by means of said card reader; at least one human interface that prompts the end user to enter data and enables the entry of said data, e.g., by means of an interconnected keypad.01-28-2010
20090200374METHOD AND DEVICE FOR ARMING AND DISARMING STATUS IN A FACILITY MONITORING SYSTEM - Security systems and methods are implemented using a variety of devices and methods. According to one such implementation, a controller arms or disarms a security system responsive to a contactless card reader. The contactless card reader includes a circuit for wirelessly interfacing with the controller, a battery circuit, and a sensor for detecting a contactless card. The card reader further includes a power-control circuit, responsive to the sensor, to control use of the battery circuit, and a coil for energizing the contactless card in response to the contactless card being detected by the sensor. The contactless card transmits data to the contactless card reader when the contactless card is energized. Responsive to the data transmitted by the contactless card, the contactless card reader wirelessly interfaces with the controller, which arms or disarms the security system based on the data transmitted by the card.08-13-2009
20100243734Smart cards and user terminals including the same - A smart card includes: a host integrated circuit (IC) and one or more secure authentication ICs disposed on a board. The host IC contacts a user's terminal. The host IC is configured to receive signals and execute services in accordance with the received signals. The one or more secure authentication ICs are also configured to receive signals from the host IC and accommodate an application independent of or relevant to the host IC to execute a function of the application. Accordingly, independence and security of the secure authentication ICs is improved.09-30-2010
20090166413 ENTRANCE GUARD SYSTEM USING ARBITRARY CARD - This invention relates an entrance guard system using arbitrary card comprising one or more card readers for entrance guard controlling, one or more entrance guard controllers, a CPU and one or more guest information input devices, wherein each of the guest information input device includes a guest information reader, a entrance card writing device and a manual input device used for inputting an instruction of registering guest information to the CPU. The CPU acquires the card information captured by a said guest information reader and stores the card information and other guest information in a guest information database as the guest's identification information. This system can use an arbitrary electron card as entrance card.07-02-2009
20120145783POWERED AUTHENTICATING CARDS - The present invention provides systems and methods for powered video game playing cards, powered voter authentication cards, powered financial transaction cards, and methods for administering the use of each. The cards generally include a thin, flexible substrate and a battery disposed within the substrate. A dynamic token value generator and/or biometric sensor is disposed within the substrate and is powered by the battery. An electronic display is mounted on the substrate for displaying a token value generated by the dynamic token value generator. The token value is configured to be used in conjunction with a back-end token value secure identification system to provide access to secure electronic information or capabilities.06-14-2012
20120037698METHOD AND APPARATUS FOR OPTICALLY READING INFORMATION - The present invention relates to a novel type of information carrier, on which information is stored in the form of diffraction structures. The information carrier according to the invention can be read by being drawn manually through a reading device. The present invention also relates to a device with which an information carrier according to the invention can be read.02-16-2012
20100252624APPARATUS AND METHOD FOR INTEGRATED PAYMENT AND ELECTRONIC MERCHANDISE TRANSFER - Interrogation of an electronic device by a first terminal is facilitated, to obtain an account number associated with the electronic device. The electronic device is configured according to a payment specification. The first terminal has a first terminal payment module configured according to the payment specification and a first terminal electronic merchandise module configured according to the electronic merchandise infrastructure and coupled to the first terminal payment module to permit transfer of non-payment e-merchandise related information from the first terminal electronic merchandise module to the first terminal payment module. The interrogation of the electronic device is performed by the first terminal payment module. Generation of non-payment e-merchandise related information by the first terminal electronic merchandise module is facilitated. Transfer of the non-payment e-merchandise related information from the first terminal electronic merchandise module to the electronic device via the first terminal payment module, within a transaction between the electronic device and the first terminal payment module that is conducted in accordance with the payment specification, is also facilitated. The non-payment e-merchandise related information is stored on the electronic device in accordance with the payment specification. The electronic device and the first terminal independently calculate a summary data item. The first terminal calculates a first message authentication code based on the non-payment e-merchandise related information and a terminal-calculated value of the summary data item. The non-payment e-merchandise related information is stored on the electronic device together with an electronic device-calculated value of the summary data item and the first message authentication code.10-07-2010
20090032585ACCESS CONTROL GATE - An access control gate with a mechanical guidance forms one or more access lanes for patrons. First electronic means include a contactless access reader which is connected to a software controlled verification system to identify the access right of patrons, second means comprise two motor driven flaps which protrude from left and right of the lateral lane boundaries into the access lane thereby forming the closed gate threshold 02-05-2009
20110073644NETWORK FOR BLOOD PRESSURE DATA MANAGEMENT AND RECHARGEABLE SMART CARD - Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart Cards and synchronized to a database via a secure network. Also, enabling the providers of automated blood pressure readings, such as pharmacies, corporate work sites, health clubs and other customers, to charge a fee for the long-term use of a memory card to record non-invasive physiological test data and make the data available for health consultations. In an automated blood pressure system with one or more memory-card interface devices, a custom-formatted end-user memory card keeps track of the user's non-invasive physiological test data, and a recharge memory card controls the provider's recharging of the end-user memory card after the end-user memory card expires. The contents of the recharge memory card are updated in order to track its use by the provider of the readings.03-31-2011
20090140045PIV card model # 6800 - A computerized centralized access management system having an access card with personal identification information, a server in communication an access control computer having an access card reader, an add-on computer program stored in the access control computer to perform a method of reading the access card, retrieving personal identification information, transmitting personal information to the server, receiving an access record and noticing the access control computer whether or not to allow access for the individual according to said access record received from said server.06-04-2009
20100096452Card Credential Method and System - In one implementation, a method for providing access to a secure facility includes authenticating the user; generating a card credential, transmitting the card credential to an access card carried by of the user, and transmitting the card key to the access card in a form that is usable by the access card. The generating the card credential includes encrypting the card key using a server encryption key. The card key is usable for a challenge-response interaction during subsequent access requests by the user.04-22-2010
20090134218Multifunction removable cover for portable payment device - Methods and devices for conducting financial transactions are provided. Aspects and embodiments include multifunction removable covers for portable payment devices; multifunction removable covers configured as password token type portable payment devices; and multifunction removable covers configured as radio frequency shields to prevent unintended data transmission.05-28-2009
20120125999KEYCARD AND KEYCARD-LOCK - To acquire a keycard, the creation of whose clone is impossible, and a keycard-lock that is locked/unlocked by the keycard.05-24-2012
20080296371METHOD OF ACTIVATING A FINGERPRINT IDENTIFICATION PROCESS OF A SMART CARD ACCORDING TO A GIVEN CONDITION AND A DEVICE THEREOF - The present invention relates to a method of activating a fingerprint identification process of a smart card according to a given condition and a device thereof. The present invention uses a contactless smart card as a carrier of the fingerprint identification technology and incorporates user identification during use of the card to make the transaction or access process more secure and efficient. The invention provides the steps of how to determine whether the fingerprint identification process of the smart card should be activated to verify the validation of the user before the transaction according to the comparison result between the transaction amount and the preset conditional value.12-04-2008
20120074223CARD CREDENTIAL METHOD AND SYSTEM - In one implementation, a method for providing access to a secure facility includes authenticating the user; generating a card credential, transmitting the card credential to an access card carried by of the user, and transmitting the card key to the access card in a form that is usable by the access card. The generating the card credential includes encrypting the card key using a server encryption key. The card key is usable for a challenge-response interaction during subsequent access requests by the user.03-29-2012
20090314833Ticket examining apparatus and ticket examining method - A ticket examining apparatus includes a transmitting and receiving direction switching unit that switches a transmitting and receiving direction of a signal to be transmitted and received by an antenna, provided within a gate, either toward an entrance direction or an exit direction where a user arrives, and a pass permission determining unit that determines whether to permit the user to pass through the gate, by wirelessly communicating with a portable apparatus of the user using a signal transmitted and received by the antenna and switchably directed by the transmitting and receiving direction switching unit toward one of the entrance direction and the exit direction.12-24-2009
20120187187TWO-WAY SYMBOLOGICAL COMMUNICATION BETWEEN ELECTRONIC DEVICES - Symbological communication operates to communicate information and data between mobile and electronic devices. Using certain information, an optical symbology is generated and displayed on the display screen of the mobile device. The optical symbology is read by an optical scanner coupled to the electronic device to read the optical symbology and decode the information contained therein. The electronic device uses the decoded information for different tasks, including providing authorized access to additional functionality of the electronic device by the user. After user interaction with the electronic device, it generates another optical symbology for on its display screen. The user of the mobile device would then capture the image of this optical symbology using the camera function of the mobile device. Applications operating on the mobile device decode all of a part of the additional information for local use or to communicate further to remote servers for additional use or tracking.07-26-2012
20120228377Automated Passenger Screening Checkpoint - As automated screening system and method. A method includes receiving a personal identifier from an individual at an induction kiosk and issuing a scanning unit at the induction kiosk. The method includes associating the scanning unit with the personal identifier and inducting the scanning unit, including at least one item added by the individual, at the induction kiosk. The method includes conveying the scanning unit to an imaging device, and imaging the scanning unit and the item to produce a scanned image. The method includes receiving the personal identifier at a return kiosk and returning the scanning unit and the item to the individual based on the association between the scanning unit and the personal identifier.09-13-2012
20110121074METHOD FOR REPAYMENT OF ELEVATOR INVESTMENT COSTS - The invention relates to a method for repayment of the investment costs of an elevator on the basis of personal identification of the passenger, by providing the aforesaid passenger with a card comprising the personal data of the aforesaid passenger, on the basis of which card a remote reader installed in connection with the elevator identifies the passenger.05-26-2011
20110121073METHOD AND APPARATUS FOR OPTICALLY READING INFORMATION - The present invention relates to a novel type of information carrier, on which information is stored in the form of diffraction structures. The information carrier according to the invention can be read by being drawn manually through a reading device. The present invention also relates to a device with which an information carrier according to the invention can be read.05-26-2011
20120267433SYSTEM AND METHOD FOR MONITORING A VALIDATOR - A system for monitoring a validator that assesses a token includes an input device for receiving messages from a machine including a validator. The messages contain data indicative of validator events such as an assessment of a token resulting in acceptance of the token and an assessment of a token resulting in rejection of the token. The system further includes a processor for deriving timing information for the validator events and for comparing the data and timing information with predetermined criteria. Personnel alerts are raised when predetermined criteria are satisfied, and maintenance of validators may be scheduled in dependence upon criteria related to assessments of tokens resulting in rejection.10-25-2012
20120080521METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device.04-05-2012
20120080520SITE-SPECIFIC ACCESS MANAGEMENT - A system for ensuring access management of a given site by providing integrated and comprehensive assessment of persons, livestock or objects that are given access to the site. The system includes a database of information about the site and potential accessors, a mobile wireless communication and scanning device to collect, retrieve and facilitate communication between a device user at the site as well as an administrator console. This system is flexible enough to maintain current information about the persons, livestock or objects requesting access to the site and communicating those results to the device user in real time. The system is further enabled through the Internet and the World Wide Web.04-05-2012
20100230490SECURE ACCESS MODULE FOR INTEGRATED CIRCUIT CARD APPLICATIONS - Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing device includes an unsecure computing environment and a secure computing environment. The secure computing environment is established with a secure access module that includes data and functions for executing the security-sensitive application on behalf of the unsecure computing environment.09-16-2010
20100230489COMMUNICATION DEVICE SYSTEM AND CARD-TYPE DEVICE - There is provided a communication device system and a card-type device, in which an attachable and detachable communication device can be attached later only when a control, maintenance or monitor function and an authentication function are required. A communication function, a function to convert an electric signal of a control object device into another communication protocol, and an encryption/decryption function are concentrated on one card, and this card is obtained only when necessary, and the control, maintenance or monitor can be performed remotely. The card is created by an appropriate certificate authority or a manufacture maker of the control object device, and necessary information can be set.09-16-2010
20120091202MOBILE APPLICATION BAR CODE IDENTIFICATION METHOD AND SYSTEM - Applicant's Smartphone application provides ticket-holding patrons an alternative, digital means of verifying personal identification at entry to a venue or event. The Smartphone application periodically generates a unique QR code (barcode) that contains a unique identifier (i.e., mobile device ID) which prompts the venue/event entry system to recognize the patron. No barcode (serving as a ticket, or authentication/verification, or otherwise) is downloaded from the system server to the Smartphone/mobile device client in contrast to prior art systems.04-19-2012
20120286039SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.11-15-2012
20100096451Key-Card Access System for Providing Selective Access to Medical Equipment - An access system for controlling access of a user to one of several unique operative modes of an electronic device used to communicate with an implantable medical device. The access system includes a portable keycard, which is held by a user. The keycard has embedded magnets arranged in a unique predetermined pattern. The electronic device has a housing that provides a slot and a channel for receiving the keycard by the user. A sensing circuit and a processing circuit are both provided. The sensing circuit includes Hall-effect transducers positioned next to the channel so that upon inserted of the keycard, certain ones of these Hall-effect transducers will reside adjacent a magnet, depending on the particular unique pattern. A magnet positioned adjacent a Hall-effect transducer will cause the transducer to send an output signal to the processor indicating the presence of a magnet at the location of the Hall-effect transducer. The Hall-effect transducers collectively generate an electronic pattern representing the particular identity of the keycard. The processor compares this electronic pattern with one of several stored in electronic memory and provides selective access to the device in response to successfully identifying a match. A doctor, a technician, a salesperson and a factory assembly worker are examples of users of this system and each will be granted predetermined access rights to operate the device. Additional Hall-effect transducers may be provided to help detect the intrusion of magnetic fields produced from magnets not located with the keycard. The process will deny any access to the device should any such remove magnetic fields be detected.04-22-2010
20130008958PAYMENT AUTHORIZED LOCK SYSTEM AND METHODS OF MAKING AND USING THE SAME - A payment authorized door and/or gate lock system that controls access to a given area through the processing, storage and recollection of data input through a touchscreen user interface.01-10-2013
20080223927ENTRY AND EXIT CONTROL APPARATUS - An entry and exit control apparatus wherein missing entry and exit information on a user entering and exiting a controlled area by tailgating is complemented by entry and exit information on another user presumed to enter and exit the controlled area along with the user that is tailgating. Therefore, reliability of user entry and exit history is improved to sufficiently suppress a decrease in security in the controlled area. The entry and exit control apparatus estimates entry and exit date and time concerning the missing entry and exit information based on the statistically processed staying time information of the user and the traveling time information for the entry and exit date information of the user determined that a missing item is generated, extracts complementary entry and exit information from pieces of entry and exit information stored in an entry and exit history DB based on the estimated entry and exit date and time, and complements the missing entry and exit information on the user using the extracted complementary entry and exit information.09-18-2008
20080223926BIOMETRIC CONTROL OF EQUIPMENT - An example apparatus for allowing operation of equipment by an authorized operator comprises a biometric scanner receiving a biometric input from an authorized operator, and transmitting an authorization signal. The apparatus may further includes a base station that allows the equipment to operate while the base station receives the authorization signal from the biometric scanner, and which prevents the equipment from operating shortly after the authorization signal is no longer received from the biometric scanner.09-18-2008
20130119130SMART CARD READER WITH A SECURE LOGGING FEATURE - A secure smart card reader is disclosed that is enabled to make reader signatures on data representative of events and actions which may be security related and which may include data representative of reader commands received from a host or remote application, smart card commands exchanged with an inserted smart card, data presented to a user for approval, and/or configuration parameters applied when dealing with any of the foregoing. The smart card reader may be adapted to maintain logs of events and actions which may include exchanging reader commands, exchanging smart card commands, and/or interactions with a user. The logs may include data representative of the reader commands received, the smart card commands exchanged, data presented to the user for approval, and/or configuration parameters applied when dealing with any of the foregoing. The secure smart card reader may be adapted to generate a reader signature over the logs.05-16-2013
20080197191IMAGE PROCESSING APPARATUS AND METHOD FOR OPERATING IMAGE PROCESSING APPARATUS - It is an object of the invention to provide an image processing apparatus and a method for operating the image processing apparatus that can effectively use electric power by preventing units not used by specified users from being brought into an operation state.08-21-2008
20090266886PORTABLE TERMINAL, NONCONTACT IC MODULE, READER/WRITER AND INFORMATION DISTRIBUTION METHOD - Provided is a portable terminal (10-29-2009
20120018512SYSTEM AND METHODS FOR VENUE CONTROLLED BUY-BACK AND RESELLING OF ACCESS PRIVILEGES AND TICKETS TO CLOSED GROUP EVENTS - Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription.01-26-2012

Patent applications in class Permitting access

Patent applications in all subclasses Permitting access