Class / Patent application number | Description | Number of patent applications / Date published |
340500210 | Varying authorization | 85 |
20080204191 | System and method for controlling information access on a mobile platform - A method and system are provided for controlling extra-vehicle communications to a device of a mobile platform. The method comprises establishing a policy comprising attributes for permitting communications to the device, the attributes having selectable states. Access to communicate with the device is authorized based upon a least privilege of the selectable states of the attributes. An information requestor is permitted to communicate with the device when the access is authorized, and the information requestor is denied access to the device when one of the selectable states of the attributes is not satisfied | 08-28-2008 |
20080258865 | BINARY VERIFICATION SERVICE - A binary is received at a binary verification service from a binary verification client agent. The binary verification service performs binary verification of the binary, wherein binary verification includes determining whether the binary is complicit with a set of usage rules. The binary verification service sends a binary verification result to the binary verification client agent. | 10-23-2008 |
20090184800 | Cellular phone Entry Techniques - A cell phone is mated with the vehicle system and thereafter used to obtain access to the vehicle. A user who has a cell phone automatically can obtain access to the vehicle. An embodiment describes a USB key that provides access to the vehicle, and in an emergency, either a complete or partial version of the key can be downloaded from a server. | 07-23-2009 |
20100045426 | INFORMATION COMMUNICATION SYSTEM, INFORMATION COMMUNICATION METHOD, INFORMATION COMMUNICATION APPARATUS AND RECORDING MEDIUM - An information communication system includes a first terminal apparatus which includes a notifying unit for notifying of presence information including status information of an object, a second terminal apparatus which includes a transmitting unit for transmitting a subscribe request of the presence information, and a central apparatus which includes a relay unit for relaying the first and second terminal apparatuses to each other; and a control unit capable of performing operations of determining whether or not a subscription of presence information by the second terminal apparatus is permitted, when the update of the presence information is received from the first terminal apparatus and providing the notification of the presence information to the second terminal apparatus to which the presence information is permitted to be notified. | 02-25-2010 |
20100079239 | Repurposing User Identity Tokens - An exemplary method for repurposing user identity tokens comprises receiving identification information from a user, the user having an existing user identity token and seeking to repurpose the token, obtaining a repurpose identifier associated with the user, enabling a configuration of an identification tag based on the repurpose identifier, and associating the identification tag with the identity token. | 04-01-2010 |
20100117790 | System for regulating access to a resource - A system for regulating access to a resource by a plurality of users is provided. The system comprises: a plurality of portable access keys, each being provided to one of the users and having an associated variable access parameter; an access barrier, having an open state allowing passage through and a closed state denying access to the resource, and defining an access queue; a sensor that determines an access queue characteristic related to a number of users in the access queue; a controller, which sets an access criterion based on the determined access queue characteristic; and a detector, located at the access barrier and which determines the variable access parameter of a portable access key when it is brought into the vicinity of the detector. The controller sets the access barrier in its open state if the variable access parameter determined by the detector meets the access criterion. | 05-13-2010 |
20100277276 | SYSTEM FOR REGULATING ACCESS TO A RESOURCE - A system for regulating access to a resource by a plurality of users is provided. The system comprises: a plurality of portable access keys, each being provided to one of the users and having an associated variable access parameter; an access barrier, having an open state allowing passage through and a closed state denying access to the resource, and defining an access queue; a sensor that determines an access queue characteristic related to a number of users in the access queue; a controller, which sets an access criterion based on the determined access queue characteristic; and a detector, located at the access barrier and which determines the variable access parameter of a portable access key when it is brought into the vicinity of the detector. The controller sets the access barrier in its open state if the variable access parameter determined by the detector meets the access criterion. | 11-04-2010 |
20120038454 | Gate Control System and Method of Remote Unlocking by Validated Users - An access control system includes: a lock control apparatus, an authentication terminal and a terminal to be authenticated; said authentication terminal sends own identity information to the lock control apparatus to be authenticated, and generates a random authorization code after receiving an authentication passing message responded by said lock control apparatus, and sends it to said terminal to be authenticated and lock control apparatus respectively; said lock control apparatus stores the identity information of a legal user, and authenticates the identity information sent by said authentication terminal, and responds said authentication passing message after passing authentication; and the lock control apparatus interworks with said terminal to be authenticated after receiving said random authorization code, and if judging that both of the random authorization codes are consistent, then unlocks; said terminal to be authenticated stores a received random authorization code, and interworks said random authorization code with said lock control apparatus. | 02-16-2012 |
20120075059 | SECURITY SYSTEM PROVIDING TEMPORARY PERSONNEL ACCESS BASED UPON NEAR-FIELD COMMUNICATION AND RELATED METHODS - A security system may include a plurality of electronic devices, each having a unique identification (ID) associated therewith and configured to generate a temporary security code based upon the unique ID. The system may further include at least one mobile wireless communications device including a first Near-Field Communication (NFC) circuit, and a mobile controller configured to receive the temporary security code from a given electronic device from among the plurality of electronic devices. The system may also include an access control device associated with a personnel access position and including a second NFC sensor and a security controller. The security controller may be configured to receive the temporary security code from the first NFC sensor via NFC communications, selectively grant personnel access based upon the received temporary security code, and determine the unique ID associated with the given electronic device. | 03-29-2012 |
20130088324 | Method and System for Training Users Related to a Physical Access Control System - A system and method for training users of an access control system. In particular, the system and method allow for the imposition of “penalties” for improper behavior so as to balance the training of the user with the burden placed on the operators of the system reacting to violations, while allowing the users to accomplish their tasks. The system can also track the location of users or items, determine if a request to pass through a control point is proper based on various factors, and if appropriate, administer a “penalty” based on several contributing factors. | 04-11-2013 |
20130141211 | CLEANING APPLIANCE - The invention relates to a cleaning appliance, wherein in order to access same, an access authorization stored on an authorization carrier is required, the appliance including two or more authorization carriers with access authorizations stored thereon which are linked to different authorization profiles, and a detection unit for detecting the access authorization of an authorization carrier, wherein a range of functions dependent on the authorization profile linked to the access authorization can be provided to an operator by the cleaning appliance. In order to provide such a cleaning appliance which is more user-friendly in operation, it is proposed that each authorization carrier comprises an identification device for providing an identifier which is associated with the particular authorization profile of the authorization carrier and which is perceivable by the operator using a sensory organ, wherein identifiers associated with different authorization profiles are different from one another. | 06-06-2013 |
20130207775 | BOOTSTRAPPING ACCESS MODELS IN THE ABSENCE OF TRAINING DATA - A plurality of access models comprise patterns of accesses to resources protected by an Access Control System (ACS). The access models are used to classify the accesses to the resources as either normal or anomalous. The system stores attributes for the individuals for whom the access models are available, receives attributes of an individual not associated with an access model, and compares the attributes of the individual not associated with an access model to the attributes of the individuals for whom access models are available. The system further selects an access model for the individual not associated with an access model based on the comparison, and uses the selected access model for the individual not associated with an access model to classify access to the one or more resources protected by the ACS by the individual not associated with an access model as either normal or anomalous. | 08-15-2013 |
20130229258 | SYSTEM AND METHOD FOR EXTENDING TRANSMITTER TRAINING WINDOW - A method for configuring a transmitter device to transmit a recognized transmission to a receiving device is provided. The method includes transmitting a first transmission and transmitting a second transmission after the first transmission. The method further includes receiving, during the second transmission, a user input signal from an interface for receiving signals from one or more user interface elements. The method further includes storing an attribute associated with the second transmission in a memory device in response to the user input signal. | 09-05-2013 |
20140132391 | Relay Attack Prevention Using RSSIPPLX - The disclosed invention relates to a passive keyless entry receiver system having an application controller that is activated upon receipt of an entire payload of a data packet to determine if peak RSSI levels for a plurality of RSSI steps within the payload match an expected sequence of peak RSSI levels (i.e., if a fingerprint is genuine). The receiver system has a receiver that receives a wireless signal having a data packet with a plurality of power levels within a plurality of RSSI steps of the payload. The receiver system writes a plurality of peak RSSI levels to a plurality of RSSI peak payload registers that store the peak RSSI levels for RSSI steps of the payload. Once an entire payload of a data packet has been received an application controller determines if the peak payloads correspond to an expected sequence of power levels. | 05-15-2014 |
20150332257 | SAFE CARD - A safe card system comprising: a plurality of safe cards, at least one safe card reader and a service provider computer. Each safe card: Capable of generating at a specific time a temporary number based on combination of a first number representing at least one biometric identifier, and a temporary second number, and a card signal based on the temporary number; The at least one safe card reader capable of reading the card signal, and converting the card signal into a card reader number, The service provider: Capable of drawing at a specific time at least one fifth number associated with said time, generating at least one sixth number derived from the fifth numbers, and comparing the sixth numbers to the card reader number so as to allow service to the safe card when a sixth number is identical to the card reader number. | 11-19-2015 |
20160180617 | GRANTING CONTROL OF A SHARED SYSTEM | 06-23-2016 |
20160379426 | Access System Employing Dynamic Badges - Techniques pertaining to management of and construction of a dynamic badge having at least one display device on the badge are described. A computer receives a message that identifies a user to which the badge is assigned, receive geographic location information that indicates a current location of the badge, access a database that stores information associated with the user; determining by the computer based on the accessed information and the current location of the badge the specific information to display on the display device; and forwards the determined information over a network to a communication node for delivery to the badge. | 12-29-2016 |
340500220 | Code programming | 55 |
20080246584 | Locking digital pen - A locking digital pen system includes memory means which is available for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen or provide an entry to a coupled computer to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system. | 10-09-2008 |
20090121831 | DYNAMIC REPROGRAMMING OF AN INTELLIGENT CONTROLLER UTILLIZING A SMART CARD - A system for updating remote control devices includes a portable programmable medium having a data storage device for storing data. The control devices include a processor or a computer having a data storage device for storing data. The system further includes a network for transferring data between a local reader and one or more remote control devices communicating via the network. | 05-14-2009 |
20090212904 | Electronic device provided with theft prevention function, and method for preventing theft of electronic devices - An electronic device includes: a memory storing a first lock release code; a comparing portion comparing the first lock release code with a second lock release code that is input with an input device; a controlling portion releasing a lock if the comparing portion finds that the first lock release code matches the second lock release code, and permitting the electronic device to operate normally; and a lock release portion releasing the lock, even if the comparing portion finds that the first lock release code does not match the second lock release code, or no code input is made, when a first predetermined time elapses from a predetermined time point. | 08-27-2009 |
20090309696 | VEHICLE FUNCTION RESTRICTION SYSTEM - A vehicle function restriction system for installation in a vehicle. The vehicle includes a master key allowed to activate any function of the vehicle. The system includes a valet key mounted in the vehicle and configured to dismountable from the vehicle to be lent to a person to whom the vehicle is lent. A restriction setting unit sets the vehicle in a restriction state when the valet key is dismounted from the vehicle. The restriction setting unit sets at least one restricted vehicle functions which is not activated by the valet key, in accordance with the person to whom the vehicle is lent. | 12-17-2009 |
20100090797 | VEHICLE SECURITY SYSTEM - A vehicle is disclosed which includes a controller having at least one of a vehicle security module and a playback module. The vehicle security module may operate in a secure once mode of operation or in a secure all mode of operation. The playback module records ride information associated with the vehicle. The ride information may be provided to an external device. | 04-15-2010 |
20110133884 | METHOD AND APPARATUS FOR CONFIGURING AN ACCESS CONTROL SYSTEM - A method and apparatus is provided for configuring a security system. The method includes the steps of providing a plurality of configuration files on a computer readable medium where each configuration file defines an access control system or integrated security system and each configuration file is different than any other configuration file of the plurality of configuration files, presenting the plurality of configuration files to a person on a display, a configuration processor receiving a selection of a configuration file of the plurality of configuration files from the person and the processor automatically configuring an access control system or integrated security system in accordance with the selected configuration file. | 06-09-2011 |
20110241826 | Reconfigurable Security Systems and Methods - Reconfigurable security systems, devices, and methods are provided. These can include systems having a configuration device, a reconfigurable lock system, and a reconfigurable key system, where transferable tumbler code carriers, having transferable tumbler codes, may be exchanged in order to provide controlled access to the devices or structures secured by the security system. By way of metaphor, the particular teeth configuration of a manual key may be understood as reflecting a single or fixed tumbler code. In embodiments, such a tumbler code may be exchanged, compared, and stored to allow for selective configuration of keys, mating of keys and locks, and selective access to security systems by a key system configured with a proper tumbler code. | 10-06-2011 |
20140055234 | UNIVERSAL REMOTE CONTROL SYSTEM - A universal remote control system is disclosed. The universal remote control includes a receiver that has a wireless signal receiver unit, an electric motor that drives a mechanical arm and a microprocessor. When the receiver receives a control signal from a wireless signal transmitter, the microprocessor will energize the motor which drives the mechanical arm toward a pushbutton switch of a controlled device, such as a garage door opener, and depresses the push button, therefore activating the garage door opener. A feedback signal, for example, from the mechanical arm or the motor, may be provided to the microprocessor to inform the microprocessor when the pushbutton switch is sufficiently depressed and is in an engaged state. When the switch is in the engaged state, the motor will reverse its direction, causing the mechanical arm to raise and move back to a standby position. | 02-27-2014 |
20140118107 | Electronic Lock Having a Mobile Device User Interface - An electronic lock having one or more lock settings that can be updated using a mobile device. The mobile device includes an app that provides a user interface through which one or more lock settings of the electronic lock can be selected and modified. When the user has made the desired selections to the lock settings on the mobile device, the mobile device wirelessly transmits these settings to the electronic lock. The electronic lock is configured to update its lock settings based on the wireless communication from the mobile device. | 05-01-2014 |
20140320258 | KEY WRITING DEVICE AND KEY WRITING METHOD THEREOF - A key writing device electrically connected to an electronic device for automating the writing of multiple keys for activating one or more functions of the electronic device, via a key writer. The key writing device includes a storage storing multiple keys, at least two of the keys to be written into the electronic device are selected from the storage and are packed into a key package. The package including the at least two keys is then written into the electronic device using the key writer. | 10-30-2014 |
20150022315 | Method of Programming a Programmable Electronic Lockbox System - A programmable lock system is provided for access restricting and user tracking The system includes a lock mechanism, a microcontroller, and an input device for receiving passing information. The microcontroller reads the received passing information and determines whether to unlock the lock mechanism. The system further includes an inlet for receiving an external storage with pre-programmed code. The microcontroller determines whether to access date contained therein base on the pre-programmed code. | 01-22-2015 |
20150061823 | REMOTE CONTROL UNIT FOR ACTIVATING AND DEACTIVATING MEANS FOR PAYMENT AND FOR DISPLAYING PAYMENT STATUS - The invention relates to a remote control unit for intelligent digital audiovisual reproduction systems, comprising storage means, payment means, a sound control circuit, display means and a metal chassis wherein said remote control unit comprises a distant radio frequency transmitter that is associated with a radio frequency receiver connected to the sound control circuit of the audiovisual reproduction system. | 03-05-2015 |
20150294518 | REMOTELY PROGRAMMED KEYLESS VEHICLE ENTRY SYSTEM - A vehicle system includes a memory device, a communication interface, and a processing device. The memory device stores a primary keyless entry code associated with a vehicle. The communication interface receives an update command to change the primary keyless entry code to an updated keyless entry code. The processing device stores the updated keyless entry code in the memory device. When an authorized person provides the updated keyless entry code to the vehicle via, e.g., a keypad, the authorized person may gain access to the vehicle. | 10-15-2015 |
20160019738 | SHARING A KEY FOR A VEHICLE - A method for sharing a key of a vehicle that electronically controls the vehicle includes: setting a control value limiting a use of the vehicle through a terminal of a user of the vehicle which includes the key of the vehicle, and transferring the key of the vehicle from the terminal of the user to a terminal of an additional user of the vehicle using short-distance communication. | 01-21-2016 |
20160021140 | Method and Apparatus to Facilitate Message Transmission and Reception Using Different Transmission Characteristics - Upon providing ( | 01-21-2016 |
340500230 | Programming from coded record to controller | 11 |
20100045427 | Microdermabrasion System with Security Mechanism - A microdermabrasion system includes a security mechanism that allows the system to be used upon receiving a proper input code; otherwise the security mechanism prevents the system from being used. In an implementation, even after receiving a proper input code, the security mechanism disables the system after a certain amount of time has elapsed. | 02-25-2010 |
20130027177 | Electronic Security System for Monitoring Mechanical Keys and Other Items - A method or system for controlling and recording the security of an enclosure is disclosed. A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors. | 01-31-2013 |
20140232520 | ELECTRONIC KEY REGISTRATION METHOD AND ELECTRONIC KEY REGISTRATION SYSTEM - A method for registering an electronic key to a controller of a communication subject includes locating an electronic key ID of a registered electronic key, which is registered to a first controller that was previously installed in the communication subject, based on a communication subject ID unique to the communication subject, and reregistering the registered electronic key to a second controller installed in the communication subject in lieu of the first controller by storing the electronic key ID of the registered electronic key and an encryption code corresponding to the electronic key ID in the second controller. | 08-21-2014 |
20150355636 | IDENTIFICATION NUMBER SETTING APPARATUS AND IDENTIFICATION NUMBER SETTING METHOD OF OUTBOARD MOTORS - There is provided an identification number setting apparatus of a plurality of outboard motors attached to a ship body. A plurality of engine control modules are provided in the plurality of outboard motors. A keyless controller is configured to perform an authentication process for keyless control between the keyless controller and the plurality of engine control modules. During initial registration of authentication information for the authentication process, the keyless controller sets identification numbers in the plurality of engine control modules. | 12-10-2015 |
20160063785 | METHOD FOR THE AUTHENTICATION OF AT LEAST ONE FIRST UNIT ON AT LEAST ONE SECOND UNIT - A method for unilaterally or mutually authenticating at least one first unit, especially a mobile device, on at least one second unit, especially a field device, within a plant, especially in the area of process automation technology, with a communication line, preferably a wireless communication line, in place between the first unit and the second unit, comprising the steps of: establishing a security policy, with the security policy including rules for granting access of the first unit on the basis of at least one unlock key, and information to check the unlock key for validity; providing the security policy to the second unit; generating an unlock key for the first unit and providing the unlock key at the first unit; transfer of the unlock key from the first unit to the second unit and verification of the unlock key by the second unit using the security policy and, if applicable, granting access. Furthermore, a computer program product executes the method and a machine-readable data carrier includes the computer program product. | 03-03-2016 |
20160078698 | System and Method for Auto-Configuration of Devices in BIM Using Bluetooth Low Energy Devices - A system that includes a building information model (BIM) defined by a set of geographic coordinates of a secured area embodied in a memory, a plurality of security devices located within the secured area where each of the plurality of security devices has a short range wireless transceiver and a portable user device having a wireless transceiver, a global positioning system (GPS) and a programmed processor that interrogates the short range wireless transceiver of each of the plurality of security devices for identification and functional information of the security device as a user of the portable user device traverses the secured area and saves the identification and functional information along with geographic coordinates of each of the plurality of security devices under the BIM into a memory. | 03-17-2016 |
340500240 | Using additional record or carrier code | 5 |
20110128121 | REMOTE ACCESS PROCEDURE FOR ELECTRONIC LOCKS - There is provided an electronic lock and method for unlocking an electronic lock using an access code. In particular, the electronic lock of the present disclosure may be unlocked by an authorized user even if the access code is forgotten or lost. The electronic lock generates a random number, which a user may provide, after having been authenticated, to a remote location, where the random number is used to compute a temporary access code using a secret algorithm. This same secret algorithm is also present on the electronic lock, and therefore the electronic lock may recognize the temporary access code when entered by the user. | 06-02-2011 |
20110215899 | METHOD AND SYSTEM FOR AUTHORIZING A VEHICLE DRIVEAWAY - Various embodiments may include methods and systems for authorizing a vehicle driveaway. A vehicle driveaway authorization code may be received by, for example, a computer system and circuit configured to receive the vehicle authorization code. The vehicle driveaway authorization code may have a corresponding user authorization code. Input may be received at the vehicle that defines the user authorization code. An identifying signal may also be wirelessly received to identify a wireless nomadic device in a vicinity of the vehicle. It may be determined whether the nomadic device was previously wirelessly paired with the vehicle based on the identifying signal. The vehicle driveaway authorization code may be compared to the user authorization code. If the nomadic device was previously wirelessly paired with the vehicle and if the vehicle driveaway authorization code corresponds to the user authorization code, a vehicle drive may be enabled. | 09-08-2011 |
20130027178 | CIRCUIT FOR AND METHOD OF IMPLEMENTING A SECODARY IDENTIFICATION CODE IN A GARAGE DOOR OPENER SYSTEM - A circuit for implementing a secondary identification code stored in a memory associated with a wireless garage door opener keypad unit is disclosed. The circuit comprises a first memory element storing a primary identification code; a second memory element storing a secondary identification code; and a control circuit coupled to receive a disable signal from an input actuator on the wireless garage door opener keypad unit, wherein the control circuit enables and disables the use of the secondary identification code. A method of implementing a secondary identification code is also disclosed. | 01-31-2013 |
20140028438 | SYSTEMS AND METHODS FOR LOCKING DEVICE MANAGEMENT - A system for locking device management is disclosed. A server can transmit locking device programming instructions for a locking device to a mobile device based on a locking device programming trigger. The mobile device can search for the locking device and transmit the programming instructions to the locking device via wireless signals. The locking device can communicate with the mobile device via wireless signals and execute the programming instructions. | 01-30-2014 |
20150302731 | TRAINABLE TRANSCEIVER AND CLOUD COMPUTING SYSTEM ARCHITECTURE SYSTEMS AND METHODS - A system for controlling a remote device includes a first trainable transceiver, a second trainable transceiver, and a cloud computing system configured to be in communication with the first trainable transceiver and the second trainable transceiver. The cloud computing system stores a code roll, and the cloud computing system transmits a current value of the code roll to the first trainable transceiver or the second trainable transceiver upon receiving a request transmission from the first trainable transceiver or the second trainable transceiver respectively. | 10-22-2015 |
340500250 | Programming of coded record | 29 |
20090021346 | WIRELESS MODULE SECURITY SYSTEM AND METHOD - A wireless module security system and method is provided which includes, in one embodiment providing security data to a wireless module. The security data including a security code provided to the wireless module after the wireless module has been activated. The method for providing the security code. includes encrypting the security code after establishing a wireless module account, issuing the security code through wireless transmission to the wireless module, and decrypting and storing the security code inside the wireless module. The security system and method also utilizes user authorized associated peripheral devices which may be connected to the wireless module to provide further combinations of security data. In one embodiment, the wireless module is provided with an electronic serial number and that electronic serial number is stored to the peripheral device for a security measure. In another embodiment, the peripheral device is provided with peripheral device data and that peripheral device data is stored inside the wireless module for a further security measure. The wireless module is removably connected to any number of user authorized peripheral devices, and thus the wireless module security system and method is provided upon wireless module and peripheral device initialization. | 01-22-2009 |
20090051486 | ELECTRONIC KEY CONTROL AND MANAGEMENT SYSTEM FOR VENDING MACHINES AND THE LIKE - A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, etc. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. | 02-26-2009 |
20090309697 | SYSTEM AND METHOD FOR PROGRAMMING KEYS TO VEHICLE TO ESTABLISH PRIMARY AND SECONDARY DRIVERS - In at least one embodiment, a method for programming keys to a vehicle to establish primary keys and secondary keys to control vehicle functionality is disclosed. The method comprises receiving a key identification signal from a first key. The method further comprises generating a key status signal indicative of whether the first key is one of a primary key and a secondary key in response to the key identification signal. The method further comprises transmitting the key status signal to a vehicle interface display. The method further comprises allowing a user to change a status of at least one of the first key and an additional key with the vehicle interface display in response to determining that the key status signal corresponds to the primary key. | 12-17-2009 |
20120068816 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units physically distributed at different physical locations within the secured facility, comprises: processing the first data, by software executed on one or more processor based systems, against the defined topology to define second data that is reflective of role-based user norms within the secured facility across respective event sequences within the secured facility, wherein at least some of the event sequences include at least three event nodes; and processing substantially real-time event data, by software executed on one or more processor based systems, against the second data to identify current activity of users within the secured facility as anomalous user activity for increased security inspection. | 03-22-2012 |
20120086548 | ELECTRONIC ACCESS CONTROL SYSTEMS AND METHODS - An embodiment of an electronic access control system includes an electronic key, an electronic lock, and an access control administration program. The electronic key can include program code for switching between a lock mode and a computer mode. In some embodiments, the lock mode and computer mode allow for simplified administration and operation of the access control system. Some embodiments of the electronic key include a rechargeable battery. In some embodiments, the access control system includes a hybrid power supply system having a rechargeable battery and a generator. In some embodiments, the electronic lock includes a piezoelectric latch. In some embodiments, the electronic key is configured to act as a storage device for a computer system. Some embodiments provide an electronic access control system with a streamlined user interface. | 04-12-2012 |
20120280786 | SYSTEM AND METHOD FOR PROGRAMMING KEYS TO VEHICLE TO ESTABLISH PRIMARY AND SECONDARY DRIVERS - In at least one embodiment, a method for programming keys to a vehicle to establish primary keys and secondary keys to control vehicle functionality is disclosed. The method comprises receiving a key identification signal from a first key. The method further comprises generating a key status signal indicative of whether the first key is one of a primary key and a secondary key in response to the key identification signal. The method further comprises transmitting the key status signal to a vehicle interface display. The method further comprises allowing a user to change a status of at least one of the first key and an additional key with the vehicle interface display in response to determining that the key status signal corresponds to the primary key. | 11-08-2012 |
20130307668 | CABINET LOCK KEY WITH AUDIO INDICATORS - An electronic key for a merchandise security device is provided. The electronic key may include electronic circuitry for providing electrical power to a lock mechanism for locking and unlocking the lock mechanism. The electronic key may also include an audio component configured to indicate a status of the lock mechanism. | 11-21-2013 |
20140218165 | METHOD AND APPARATUS FOR IMPLEMENTING MULTI-VENDOR ROLLING CODE KEYLESS ENTRY SYSTEMS - The present invention relates generally a system and method for providing rolling code remote device functions to provide keyless entry to multiple makes and models of cars. The present invention is adapted to produce the radio signal type and transmitted data of an original manufacturer's keyless entry remote device system by implementing multiple modulation schema and data encoding techniques. | 08-07-2014 |
20140266582 | PROGRAMMING A REMOTE ACCESS DEVICE WITH A VEHICLE - A computer storage medium encoded with a computer program for programming a remote access device with an access system of a plurality of vehicle types. The computer program comprises instructions that, when executed by a handheld device, cause the handheld device to guide the user to program the access system and sends signals to initiate the programming sequence. | 09-18-2014 |
20150042450 | WEARABLE DATA TRANSMISSION DEVICE AND METHOD - The present disclosure relates to a wearable radio device for access control. The radio device has an inside portion and an outside portion. The inside portion includes a first transponder and a second transponder. A first barrier is located between the first transponder and the second transponder. A second barrier is located between the first transponder and the second transponder in an outside portion of the wearable device. | 02-12-2015 |
20150091693 | REUSABLE ELECTRONIC SEAL - A container including a reusable electronic seal, as well as a system and method for using the electronic seal are described. The container includes a closure member configured to detachably affix to a portion of the container, thereby sealing the container. In response to the closure member sealing the container, a signal generating component generates an electronic signal and transmits the electronic signal to a processing circuit operably connected to the signal generating component. The processing circuit includes a processing device configured to generate a unique code when the closure member is manipulated to open or close the container and an output device operably connected to the processing device and configured to output the unique code. The unique code is updated each time the container is opened, thereby providing a recipient with a way to determine whether the container has been opened during delivery. | 04-02-2015 |
20150102900 | KEY FOB DONGLE - Disclosed herein is an improvement of methods and systems used to configure electronic components and modules to a vehicle. A low cost programmer tool, or key fob dongle, may manage devices coupled to a vehicle communication network. The system is designed for on-board management of multiple vehicle network protocols to support configuration of various electronic modules to a vehicle. A method for using a key fob dongle is disclosed herein. The method includes inserting the key fob dongle into an on-board diagnostic (OBD)-II connector of a vehicle, transmitting a communication detection request to the OBD-II connector, and beeping a predetermined amount of times in response to the communication detection request, wherein the beeping a predetermined amount of times identifies a vehicle communication protocol. | 04-16-2015 |
20150302729 | FREQUENCY SHIFTING METHOD FOR UNIVERSAL TRANSMITTERS - Methods and systems for modifying a carrier frequency for a trainable transmitter may include receiving a request to transmit a control signal from the trainable transmitter to a receiver. A transmission of a first control signal may be made using a trained carrier frequency and a control data. At least part of the carrier frequency may be shifted by a frequency increment. A second control signal may then be generated using the carrier frequency shifted by the frequency increment and the control data. The second control signal may then be transmitted. | 10-22-2015 |
20150302730 | TRAINABLE TRANSCEIVER AND CLOUD COMPUTING SYSTEM ARCHITECTURE SYSTEMS AND METHODS - A system for installation in a vehicle and for controlling a device, the system including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to train the trainable transceiver to control a device using information received from a cloud computing system remote from the device and vehicle via the communications electronics. | 10-22-2015 |
20150302732 | TRAINABLE TRANSCEIVER AND MOBILE COMMUNICATIONS DEVICE TRAINING SYSTEMS AND METHODS - A system for controlling a remote device includes a mobile communications device and a trainable transceiver. The mobile communications device includes a display, a camera flash, a speaker, and a processing circuit coupled to the display, the camera flash, and the speaker. The trainable transceiver includes a transceiver circuit, a communications device, and a control circuit coupled to the transceiver circuit and the communications device. The trainable transceiver is configured to be in communication with the mobile communications device using the communications device, and the control circuit is configured to receive training information from the mobile communications device and train the trainable transceiver to communicate with the remote device based on the training information. | 10-22-2015 |
20150302733 | TRAINABLE TRANSCEIVER AND MOBILE COMMUNICATIONS DEVICE DIAGNOSTIC SYSTEMS AND METHODS - A trainable transceiver for installation in a vehicle and for controlling a remote device includes a transceiver circuit configured based on training information to communicate with the remote device, a communications device configured to communicate with a mobile communications device, and a control circuit coupled to the transceiver circuit, and coupled to the communications device. The control circuit is configured to transmit diagnostic information related to the trainable transceiver to a mobile communications device via the communications device. | 10-22-2015 |
20150302734 | TRAINABLE TRANSCEIVER AND CLOUD COMPUTING SYSTEM ARCHITECTURE SYSTEMS AND METHODS - A system for controlling a remote device including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to cause the trainable transceiver to control a remote device in response to a signal received from a cloud computing system, wherein the signal is received from the cloud computing system using the communications electronics. | 10-22-2015 |
20150302735 | TRAINABLE TRANSCEIVER AND CAMERA SYSTEMS AND METHODS - A system for installation in a vehicle and for controlling a remote device including a trainable transceiver, a camera, and a control circuit coupled to the trainable transceiver and the camera. The control circuit is configured to use the camera to identify the remote device by comparing information received via the camera to information stored in memory, and the control circuit is configured to automatically transmit an activation signal formatted to control the remote device in response to identifying the remote device. | 10-22-2015 |
20150302737 | TRAINABLE TRANSCEIVER AND CAMERA SYSTEMS AND METHODS - A system for installation in a vehicle and for controlling a remote device including a trainable transceiver, a camera, an output device, and a control circuit coupled to the trainable transceiver and the camera. The control circuit is configured to use data received from the camera to determine if the vehicle is well positioned within a garage, and the control circuit is configured to provide an indication that the vehicle is well positioned using the output device in response to determining that the vehicle is well positioned within a garage. | 10-22-2015 |
20150302738 | TRAINABLE TRANSCEIVER AND MOBILE COMMUNICATIONS DEVICE SYSTEMS AND METHODS - A trainable transceiver for installation in a vehicle and for controlling a remote device includes a transceiver circuit configured, based on training information, to control the remote device, a communications device configured to communicate with a mobile communications device, an output device, and a control circuit coupled to the transceiver circuit, coupled to the communications device, and coupled to the output device. The control circuit is configured to receive notification information from the mobile communications device via the communications device, and wherein the control circuit is configured to generate an output using the output device based on the notification information. | 10-22-2015 |
20150325113 | FIXED LOCATION BASED TRAINABLE TRANSCEIVER FOR THE CONTROL OF REMOTE DEVICES SYSTEMS AND METHODS - A system for controlling a remote device from a vehicle includes a control device in the vehicle. The control device includes an operator input device configured to receive a user, input, a control circuit coupled to the operator input device, and a first communications device coupled to the control circuit. The control circuit is configured to transmit a control signal in response to the user input. The system further includes a trainable transceiver remote from the vehicle including a second communications device configured to receive the control signal, a processing circuit coupled to the second communications device, and a transceiver circuit coupled to the processing circuit. The processing circuit configured to format an activation signal in response to the control signal, and the processing circuit is further configured to transmit the activation signal via the transceiver circuit, wherein the activation signal is configured to control the remote device. | 11-12-2015 |
20150364033 | TRAINABLE TRANSCEIVER SYSTEMS AND METHODS FOR CHANNEL FREQUENCY OFFSET ADJUSTMENT - A trainable transceiver for controlling a device includes a transceiver circuit, a control circuit coupled to the transceiver circuit, and memory coupled to the control circuit. The control circuit is configured to receive a signal from the device via the transceiver circuit. The control circuit is configured to determine a frequency of a channel used by the device based on the signal strength of the signal received from the device. | 12-17-2015 |
20160049031 | BIO-IMPLANTABLE IDENTIFICATION DEVICE AND CORRESPONDING OPERATING METHODS - A bio-implantable identification device configured for implantation in a user's body is provided. The bio-implantable identification device includes at least one memory configured to store a key, a receiver configured to receive an identification request, at least one processor configured to sign the identification request using the key stored in the at least one memory of the device, and a transmitter configured to transmit the signed request. | 02-18-2016 |
20160101736 | BATTERY POWERED REAR VIEW MIRROR DISPLAY AND INTEGRATED TRAINABLE TRANSCEIVER UNIT - A trainable transceiver unit for mounting in a vehicle includes a transceiver circuit configured to reproduce the transmit control signals for operating a plurality of remote electronic devices, a user interface element, a battery configured to power the transceiver circuit and the user interface element, and a housing. The housing contains the transceiver circuit, the user interface element, and the battery and is integrated with a component of the vehicle. | 04-14-2016 |
20160104373 | Trainable Transceiver And Method Of Operation Utilizing Existing Vehicle User Interfaces - A transmitter device for coupling to a vehicle and for conducting a transmission to a remote system includes a transmitter and a processing circuit coupled to the transmitter and having an input interface. The input interface is coupled to an existing user interface of the vehicle for receiving an input to cause the transmitter to conduct its transmission to the remote system. The input interface is coupled to a vehicle sensor for receiving a vehicle sensor input including a motion status of the vehicle. The processing circuit is configured to prevent the transmitter from conducting its transmission to the remote system unless the motion status of the vehicle indicates the vehicle is travelling at a speed less than a threshold speed. | 04-14-2016 |
20160104374 | SECONDARY SECURITY AND AUTHENTICATION FOR TRAINABLE TRANSCEIVER - A transmitter for mounting to a vehicle and for sending a transmission to a remote system is shown and described. The transmitter includes a processing circuit, a transmitter, and a battery powering the processing circuit and the transmitter. The processing circuit is configured to restrict transmission to the remote system unless a security module checks one or more parameters. | 04-14-2016 |
20160203661 | VIRTUAL KEYFOB FOR VEHICLE SHARING | 07-14-2016 |
20190143939 | VALET KEY AND METHOD FOR CONTROLLING VALET KEY | 05-16-2019 |
20190147675 | MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS | 05-16-2019 |
340500260 | Code rotating or scrambling | 13 |
20090315672 | METHOD OF PROGRAMMING A WIRELESS TRANSMITTER TO A WIRELESS RECEIVER - A wireless remote control system includes a wireless receiver having a normal operating mode in which the wireless receiver may be actuated by a wireless transmitter programmed to the wireless receiver and a programming mode in which the receiver is placed to learn a new wireless transmitter and programming information for the new transmitter is sent to the wireless receiver. Programming a wireless transmitter to the wireless receiver includes actuating the receiver with an existing transmitter already programmed to the receiver, and repeating the actuation of the receiver in a predetermined sequence. In response to the receiver receiving the predetermined sequence of actuations, the receiver enters the programming mode. Programming information for the new transmitter is sent to the receiver, and the receiver programs the new transmitter to the receiver. | 12-24-2009 |
20120200387 | DIGITAL ACCESS CONTROL SYSTEM - A digital access control system including an input mechanism which can be operated from an unprotected area and a barrier which opens in response to operation of the input mechanism, wherein an energy store for supplying the barrier with opening power and a communication line for communication with a remote unit in the secure area are provided and the energy store is in a form of a low voltage buffer store and, for supplying power to the low voltage buffer store, a low voltage communication line is provided which has an associated low voltage Power Over Ethernet unit or an associated unit from a similar standard. | 08-09-2012 |
20120229251 | LOCK - An electro-mechanical lock for cargo containers or similar enclosed spaces such as storage units. The locking mechanism includes a dual-ratcheting mechanism, which is normally in the locked position, and which firmly secures doors of a container or other enclosure. To unlock the device, the user obtains a temporary access code and unlocks the device, either by a wireless interface or by, for example, a key pad. The device incorporates a rolling access code algorithm that changes the access code based upon a pre-defined customer selected time period during which the code is valid. Once the validity period expires the user must obtain a new access code from a secure access code source to unlock the device. When access is desired, the user contacts a remote secure access code source, which provides the access code for the associated lock and time period. | 09-13-2012 |
20130021137 | Rolling Code Security System - A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier. | 01-24-2013 |
20130278379 | System Interaction with a Movable Barrier Operator Method and Apparatus - A secure communication link is provided between a movable barrier operator and a peripheral system. Information conveyed via this link is used by one, the other, or both such elements to further inform or direct their respective actions. | 10-24-2013 |
20130342312 | SPARSE CODING SYSTEMS FOR HIGHLY SECURE OPERATIONS OF GARAGE DOORS, ALARMS AND REMOTE KEYLESS ENTRY - A system for remote entry includes at least one trainable radio frequency transmitter having a plurality of selectable codes, any of which selected in accordance with a corresponding training code data. At least one receiver is configured to receive signals from said radio frequency transmitter, where the radio frequency transmitter is configured to transmit, and the receiver is configured to receive, coded radio frequency transmissions containing at least sparse binary codes that include binary transmissions implemented with a small duty cycle, corresponding to the training code data. | 12-26-2013 |
20140145820 | METHOD FOR GENERATING A CURRENTLY VALID ONE-TIME RELEASE CODE FOR AN ELECTRONIC LOCK - The invention relates to a method for generating a currently valid one-time release code ( | 05-29-2014 |
20140176301 | Remote Function Fob for Enabling Communication Between a Vehicle and a Device and Method for Same - A remote function fob associated with a vehicle is disclosed, the fob for enabling secure communication between the vehicle and a device. The fob may include a transceiver configured for communication with the device. The fob may further include a controller which may be configured to enable secure communication with the device via the transceiver. The controller may be further configured for operation with a code generated using a security protocol, the code to be used in secure communication between the device and the vehicle, the code for transmission to the device via the transceiver. | 06-26-2014 |
20140232521 | ELECTRONIC KEY REGISTRATION METHOD AND ELECTRONIC KEY REGISTRATION SYSTEM - A method for registering an electronic key includes storing an electronic key ID and an encryption code in a controller to register the electronic key to the controller, and associating a communication subject ID, which is unique to a communication subject, with a controller ID, which is unique to the controller storing the electronic key ID and the encryption code, and the electronic key ID. | 08-21-2014 |
20140266583 | Capturing Code Sequences - A subset of codes is efficiently captured from a remote generator and used in a remote access device. The subset of codes contains more codes for common functions than for uncommon functions and enables operation of special functions. | 09-18-2014 |
20150015364 | CRYPTOGRAPHIC KEY MANAGEMENT VIA A COMPUTER SERVER - Some embodiments include a computer server. The computer server can be configured to: add a security system associated with a user account; provision one or more communication devices associated with the security system; configure a cryptographic key to associate at least a communication device amongst the communication devices with the security system; configure an access control file that is cryptographically signed by the computer server and encrypted with the cryptographic key associated with the security system, wherein the access control file contains permissions of the communication devices to the security system; and provide a data payload including the access control file to a first communication device of the communication devices. | 01-15-2015 |
20150371467 | LOCK CONTROL METHOD - An activate signal is sent out from a remote controller via a first channel. An authorization process is activated after the activate signal is received by an access control terminal. A control signal is sent out from the remote controller via a second channel to the access control terminal. The access control terminal is unlocked if the control signal received by the access control terminal is verified by the authorization process to be consistent with a predetermined rule. The first channel is different from the second channel. | 12-24-2015 |
20150371468 | DELIVERY AND COLLECTION APPARATUS, METHOD AND SYSTEM - A storage container for storing postal items, the container comprising: a container with a door, a locking means for locking the door shut, code input means for inputting a code to unlock the locking means, weighing means for measuring the weight of contents of the container, and communication means for communicating the measured weight of the contents when the door is locked shut, wherein a code for unlocking the locking means varies over time. | 12-24-2015 |