Class / Patent application number | Description | Number of patent applications / Date published |
340500540 | Password | 74 |
20080278284 | LOCKABLE DOCUMENT STORAGE SYSTEM AND METHODS OF USING THE SAME - Methods and systems of a lockable document storage system for communicating physical documents between an entity and a customer are provided. The system includes a plurality of document storage bins coupled together to form a modular document storage unit, a first access portal associated with more than one of the plurality of document storage bins, and a second access portal associated with each of the plurality of document storage bins wherein the second access portal includes at least one of a door and a drawer configured to control access to one of the plurality of document storage bins and wherein the at least one of a door and a drawer includes a reprogrammable locking device. | 11-13-2008 |
20090015372 | Locking System for Electronic Equipment - The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device, programming a single or multiple devices, enables the input of user access data by a primary user for multiple modes. Access for secondary users can be controlled and monitored by the primary user. The system requires password entry upon the total loss of power, shutting down the system if the password is not obtained. In another embodiment the system differentiates between power outages, removal of power, loss due to water and normal loss of power due to use. A further embodiment tracks usage of the device by units, enabling primary user refill of the units. | 01-15-2009 |
20090121832 | ASSIGNING CONTROLLED ACCESS TO SECURABLE DEVICES - Controlled access to a securable device is assigned whereby a kiosk is operable to assign an authorized user an ability to access a securable device selected from among a plurality of securable devices located remotely from the kiosk. The kiosk associates a unique personal identification number (PIN) with the authorized user and with the selected securable device, and is operable to transmit the unique PIN to the selected securable device, inform the user of the unique PIN; provide the user with location information of the selected securable device. The selected securable device is adapted to accept entry, at the securable device, of a PIN, and permits access upon entry of the unique PIN. | 05-14-2009 |
20090160606 | Lock System with User Self-Enrollment Method - A lock system ( | 06-25-2009 |
20090212905 | Wireless remote control system for vehicle functions - The invention relates to a wireless remote control system ( | 08-27-2009 |
20090237204 | Secure keyless entry system - A secure keyless entry system integrates into an existing motorized garage door opening system to replace the one button transmitters typically placed in a vehicle. The one button transmitters are replaced with remote modules having alpha numeric key pads. The remote modules accept a string of input and compare the last four to eight entries to a previously set designated PIN. In order to obfuscate the designated PIN from on lookers, a user of the system may first enter a random string of decoy characters before finally entering the designated PIN. The disclosed system may also be used to replace the metal keys typically used to secure entry doors to a dwelling. | 09-24-2009 |
20090256675 | PASSENGER SCREENING SYSTEM - A system, method and program product for providing passenger screening. A method is disclosed that includes: providing a third party service to collect profile information from a user and provide the user with a unique ID; submitting the unique ID from the user to a reservation system when the user books a reservation; passing the unique ID from the reservation system to a government agency; submitting the unique ID from the government agency to the third party service and returning associated profile information to the government agency; checking the associated profile information against a watch list within the government agency and generating a screening level for the user; and communicating the screening level to a screening agent. | 10-15-2009 |
20090284344 | METHOD AND APPARATUS FOR VERIFYING A PERSON'S IDENTITY OR ENTITLEMENT USING ONE-TIME TRANSACTION CODES - A method for verifying a person's identity is of the general type which comprises storing a personal pattern of a pre-determined number of locations on a grid in association with personal identification data, and subsequently using the pattern in a verification process. According to the invention, the subsequent verification process comprises the steps of: (a) presenting to the person a challenge grid of locations occupied by a pseudo-random set of symbols, and challenging the person to identify a response set of symbols occupying locations in the challenge grid corresponding to the stored personal pattern; (b) receiving from the person the response set; (c) generating from the challenge grid and the stored pattern a verification set of symbols occupying locations in the challenge grid corresponding to the stored personal pattern; (d) comparing the response set of symbols with the verification set | 11-19-2009 |
20090302997 | Third-party access control - Techniques for third-party access control include performing a communication to a third-party in response to an attempt by an individual to access an object. A control input from the third-party is obtained using the communication and a determination is made whether to allow the individual to access the object in response to the control input. | 12-10-2009 |
20100060414 | ELECTRIC DOOR LOCK DEVICE - An electric door lock device is provided, including a user identification (ID) device provided on a manipulation body installed on the outside of a door and configured to input user's unique ID information; an operation body connected to the manipulation body and including a locking rod driver driving a locking rod for opening/closing the door to be in an unlocked/locked state; and a controller controlling the locking rod driver to drive the locking rod to a retracted position when user's unique ID information input through the user identification device is identical with user information registered in a memory device, transmitting access information of the user to an administrator's wireless communication terminal registered through a communication device, and storing the access information in the memory device. According to the electric door lock device, access information of a person who entered/exited can be notified to the administrator's wireless communication terminal. | 03-11-2010 |
20100079240 | RFID CABINET - An RFID cabinet for monitoring items having an RFID tag includes a cabinet having at least one locking front door. An RFID detector is used for monitoring each item placed within the cabinet and is located within the interior of the cabinet. A computer is coupled to the RFID cabinet and controls opening and closing of the front door and is configured to receive an input that identifies the user. In this way, the computer is configured to periodically record data read from the RFID tags by the RFID detector. | 04-01-2010 |
20100164681 | Electronics antitheft Authorizing Unit - Locked electronic device, e.g., a device which produces a video output, such as a game console or TV. The device is shipped in a locked state, and cannot be used as a game console or a TV until it is unlocked. The unlocking is carried out by a code. The code is provided separately from the device, and only once authorized sale is detected. | 07-01-2010 |
20100219935 | KEYLESS ENTRY SYSTEM INCORPORATING CONCEALABLE KEYPAD - A keyless entry system has a handle housing and a grip cover defining a door handle grip, a keyless entry pad defining a plurality of keys, each identified with a corresponding symbol, a plurality of sensors in proximity to the keys for detecting an object in the vicinity of the keys, an illumination source to selectively backlight the sensors and symbols, and a light-controlling membrane extending over the keyless entry pad. Entering a keyless entry code into the keyless entry pad by selecting keys in a predetermined sequence enables a latch to be selectively disposed in either a locked condition or an unlocked condition. In ambient light, the light-controlling membrane renders the symbol invisible. When the illumination source backlights the sensor and the symbol, the light-controlling membrane renders the symbol visible. | 09-02-2010 |
20100237987 | COMPUTER PROGRAM CONTROLLED SECURITY MECHANISM - An apparatus is provided in one example embodiment and includes a locking member configured to be coupled to a case that contacts an electronic component, the locking member being part of a security protocol having a secure mode and a disabled mode. The secure mode restricts access to the electronic component and the disabled mode provides access to the electronic component. A signal receiver is configured to be coupled to the locking member to electronically control the locking member in order to switch between the modes. In more specific embodiments, the signal receiver receives instructions for switching the modes from a remote device configured to be coupled to a network. The remote device receives a password from an end user seeking to switch to one of the modes and the remote device switches between the modes if the password is authenticated. | 09-23-2010 |
20110140838 | Access control system - This comprises a control centre ( | 06-16-2011 |
20110156866 | Electronic Access Control Device and Management System - A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, etc. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors. | 06-30-2011 |
20110181389 | ELECTRONIC DEVICE WITH CODING/DECODING SYSTEM - An electronic device includes an input unit, a processing unit and a coding/decoding system. The coding/decoding system includes a reflector array, a knob group, an infrared emission unit, an infrared receiving unit and a coding/decoding unit. The reflector array includes at least one mirror mounted rotatably in the electronic device. The knob group is configured for adjusting angles of the reflector array. The infrared receiving unit is configured for receiving infrared rays reflected by the reflector array and generating a password signal according to the received infrared rays. The coding/decoding unit is configured for receiving the password signal and converting the password signal into a password. The coding/decoding unit stores the password and locks the electronic device according to the password. To unlock the electronic device, the coding/decoding unit compares the password with a pre-stored password to determine whether to unlock the electronic device. | 07-28-2011 |
20110187497 | COMPARISON OF AN APPLIED GESTURE ON A TOUCH SCREEN OF A MOBILE DEVICE WITH A REMOTELY STORED SECURITY GESTURE - A method of a mobile device comparing an applied gesture on a touch screen of a mobile device with a remotely stored security gesture is disclosed. In one embodiment, a method of a mobile device includes determining that an applied gesture on a touch screen of a mobile device in a locked state is associated with a user-defined gesture, comparing the applied gesture on the touch screen of the mobile device with a designated security gesture stored in a remote computer server, and unlocking the mobile device when the applied gesture on the touch screen of the mobile device in a dormant state matches the designated security gesture stored in the remote computer server. | 08-04-2011 |
20110215901 | METHOD AND SYSTEM FOR ENABLING AN AUTHORIZED VEHICLE DRIVEAWAY - Various embodiments may include methods and system for enabling an authorized vehicle driveaway. A vehicle driveaway authorization code for authorizing a vehicle to be driven and a user authorization code that corresponds to the vehicle driveaway authorization code may be generated. The codes may be generated by, for example, at least one server configured to generate the authorization codes. The at least one server may be communicating with a nomadic device and a vehicle driveaway authorization system. A vehicle driveaway request signal may be received. In response to a receipt of the vehicle driveaway request signal, the vehicle driveaway authorization code may be transmitted to the vehicle driveaway authorization system and the user authorization code may be transmitted to the nomadic device for input to the vehicle driveaway authorization system in order to enable the vehicle to be driven. | 09-08-2011 |
20110241829 | REMOTE KEYLESS ENTRY DEVICE - A remote keyless entry device for keyless entry into a vehicle comprising: a first side, where said first side includes a numerical keypad; a second side, where said second side includes a plurality of activation buttons; a memory device, where said memory device stores a numerical code; and a means to activate the plurality of activation buttons upon entry of the numerical code. The numerical keypad includes numerical keys, which may range from 0 to 9. The numerical code may include either a four-digit number or six-digit number. The remote keyless entry device according to claim | 10-06-2011 |
20120032779 | METHOD AND APPARATUS FOR ACCESSING CONTENT WITHIN A DEVICE - An apparatus includes at least one a processor, and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to determine that a character input has been recognized by an apparatus, determine that an audible word starting with the character has been recognized by the apparatus, and initiate an unlocking operation of the apparatus. | 02-09-2012 |
20120038455 | ASSOCIATING A TRANSMITTER AND A RECEIVER IN A SUPPLEMENTAL REMOTE CONTROL SYSTEM FOR MATERIALS HANDLING VEHICLES - A method of associating a transmitter and a receiver in a supplemental remote control system for materials handling vehicles includes initiating a power on sequence to enable a vehicle for operation, the vehicle having a receiver for receiving wirelessly transmitted travel commands, and pairing and synchronizing the receiver and a corresponding vehicle controller to a select one of a plurality of wireless remote control devices. Pairing mode confidence signals are received at the vehicle receiver, wherein each pairing mode confidence signal provides a transmitter identification that uniquely identifies a corresponding wireless remote control device within range of the receiver. A known transmitter identification code associated with the select wireless remote control device is matched with a corresponding one of the pairing mode confidence signals received by the receiver, and the matched wireless remote control device is synchronized to the receiver and the controller of the vehicle for communication therebetween. | 02-16-2012 |
20120075060 | SYSTEMS AND METHODS FOR SECURE PORTABLE PATIENT MONITORING - A patient monitoring system that enables a healthcare provide to request access to patient data via interaction directly with a local patient monitor and subsequently provide patient data to the healthcare provider's portable communication device regardless of device location. | 03-29-2012 |
20120112880 | System For Establishing Geo-Fence For Dispersing Volunteer Skill Sets - The present invention provides a system for establishing a geo-fence for assigning and dispersing human resource assets in a disaster relief situation. The system of the present invention provides a method for deploying a ready-response volunteer force in which volunteers are assigned based on their skill sets and the needs or the situation. Volunteers may be notified, updated, and contacted via location based devices. The geo-fence of the present invention may incorporate mobilization centers, communication centers and the logistic assets. | 05-10-2012 |
20120126940 | DETECTION OF DURESS CONDITION AT A COMMUNICATION DEVICE - A communication or computing device having a touchscreen interface is adapted to detect a duress condition upon user access through input of a gesture-based password or authentication code. One or more force sensors are provided for detection of force applied at the touchscreen surface, and interoperate with processing elements to detect input of a gesture-based password through contact at the touchscreen interface; determine that force detected by at least one of the force sensors during input of the password exceeds a predefined threshold; and compares the input password with previously stored information to determine that the input password substantially corresponds to the previously stored information. If the input password substantially corresponds to the previously stored information and the detected pressure exceeds the threshold, a duress condition is determined for the device. | 05-24-2012 |
20120126941 | PRESSURE PASSWORD FOR A TOUCHSCREEN DEVICE - A handheld communication or computing device having a touchscreen interface is configured to permit access in response to detection of a pressure-based password by a plurality of force sensors, each one of the force sensors corresponding to one of a plurality of sensing regions defined on the surface of the touchscreen interface. Upon detecting a sequence of presses applied to a plurality of the force sensors, the detected sequence is compared to previously stored information to determine if it matches. If there is a match, access to functions and/or data at the device is granted. | 05-24-2012 |
20120133484 | MULTIPLE-INPUT DEVICE LOCK AND UNLOCK - A device, such as a communication device or data processing device, is configured to transition between a locked and unlocked state in response to a detected action that is interpreted as a continuous or single action. In an embodiment a first input is detected at a first input mechanism of the device when the device is locked, then a second input is detected at the second input. If the inputs are determined to be continuous, for example if the second input is detected within a predetermined period after completion of the first input, the device is unlocked. The input may also be combined or interpreted as a password or security code. Conversely, if a detected action is interpreted as a continuous or single action by an unlocked device, the device may enter the locked state in response to the detected action. Methods for implementing this transition between locked and unlocked states are also provided. | 05-31-2012 |
20120133485 | Wireless Gate Control and Communication System - A gate control and communication system of the invention including a base unit located within a premises, a gate receiver unit positioned next to a remotely located gate, and a gate control unit located next to the gate. The base unit provides for voice communications with an individual at the gate and for issuing of commands to control the gate. The gate receiver unit includes a switching device which, in response to commands directs the opening and closing of the gate. The gate control unit includes a call button for initiating voice communication with the base unit and a keypad for entering an identification code or password. The information stored in an existing gate control unit may be cloned into an additional or replacement gate control unit by entering an appropriate identification code and command while positioning the units in range of each other. | 05-31-2012 |
20120139698 | REMOTE CONTROL DEVICE WITH PASSWORD FUNCTIONS - The invention provides a remote control device with password functions. Control function buttons can be used for sending control signals and for password entry. The remote control device is configured such that a user can enable and disable a password mode. When the password mode is enabled, the remote control is configured to require a password being entered using one or more control function buttons before a control signal will be transmitted in response to a control function being pressed or disabling the password mode. A user can also invoke a password programming function to enter, change or erase a password using one or more control function buttons. | 06-07-2012 |
20120161926 | DISPLAY APPARATUS WITH TOUCH-SENSITIVE SCREEN LOCK/UNLOCK FUNCTION AND METHOD THEREOF - A display apparatus and a method for locking and unlocking a touch-sensitive screen are provided. A user interface is provided on the display apparatus for a user to set at least two types of passwords. At least two types of passwords displayed on the user interface are stored when input of the at least two types of passwords ends. The touch-sensitive screen is locked according to any one of the at least two stored types of passwords. The touch-sensitive screen is unlocked if an input password matches any one of the at least two types of passwords. | 06-28-2012 |
20120176218 | UNMANNED SECURITY SYSTEM USING NETWORK, METHOD FOR PROVIDING UNMANNED SECURITY SERVICE, AND METHOD FOR SETTING UNMANNED SECURITY SYSTEM - The present invention relates to an unmanned security system using a network for sensing a trespasser and rapidly coping with the trespassing without a delay before the trespasser escapes, a method for providing an unmanned security service, and a method for setting an unmanned security system. | 07-12-2012 |
20120235786 | Intelligent Enclosures - The invention provides a system for controlling access for a storage enclosure. The storage enclosure has one or more walls and an opening defined by at least one of the walls. There is a closure for the opening and a fastener adapted to hold the closure in a closed position relative to the opening and adapted to allow the closure to assume an open position relative to the opening upon receipt of a suitable signal. The system includes a user interface adapted to enable the suitable signal to be received by the fastener upon entry of an access code, means for generating the access code after delivery of an item into the storage enclosure, and means for transmitting the access code to a recipient for the item. | 09-20-2012 |
20120249295 | USER INTERFACE, TOUCH-CONTROLLED DEVICE AND METHOD FOR AUTHENTICATING A USER OF A TOUCH-CONTROLLED DEVICE - A method for authenticating a user of a touch-controlled device having a touch screen may include touching the touch screen with a user's finger or stylus to initiate a core figure to start the authentication process. The core figure includes a center and a surrounding area. Therefore, user need only moving the finger or stylus within the surrounding area remaining contact with the touch screen to input an input code for authentication, without lifting the finger or stylus. | 10-04-2012 |
20120256724 | FOUR-WAY ELECTRONIC LOCK - An electronic lock has at least one display screen and at least one micro engine locking system in order to ensure locking operation in electronic lock embodiments used in items such as an electronic door, drawer, locker, casing, cabinet, safe storage boxes, sections and other applications. At least one direction selective key and/or sensor is placed inside the lock which provides reading of said display screen by the user when it is connected in four different directions to the equipment in which it would be placed. A browsing and confirmation key group is provided, which do not comprise a number or an alphanumeric sign, in order to provide safe entry of the password by the user. | 10-11-2012 |
20120280787 | Electronics antitheft Authorizing Unit - Locked electronic device, e.g., a device which produces a video output, such as a game console or TV. The device is shipped in a locked state, and cannot be used as a game console or a TV until it is unlocked. The unlocking is carried out by a code. The code is provided separately from the device, and only once authorized sale is detected. | 11-08-2012 |
20120299700 | Methods of controlling access to real estate properties - A method of controlling access to a real estate property includes installing a dynamic electronically-controlled lockset on an exterior door of a real estate property, maintaining, at a remote location, a reference device adapted to present a value of a second dynamic access code to one or more users located in the real estate office, receiving, at the real estate agent location, a request from a user for a current value of the second dynamic access code, examining the reference device to determine the current value of the second dynamic access code, and providing the current value of the second dynamic access code to the user for input into the electronically-controlled lockset. The lockset is adapted to unlock upon receiving a value corresponding to a first dynamic access code programmed therein. The second dynamic access code is time-synchronized with the first dynamic access code programmed in the electronically-controlled lockset. | 11-29-2012 |
20120299701 | METHOD AND APPARATUS FOR PASSCODE ENTRY - An apparatus and method for receiving a first user input comprising a first set of strokes; causing a representation of the first set of strokes to be displayed; whilst the representation of the first set of strokes is displayed, receiving a second user input comprising a second set of strokes; causing a representation of each of the second set of strokes to be displayed as it is received, the representation of the second set of strokes at least partially overlapping the representation of the first set of strokes; resolving the first user input into a first character; and resolving the second user input into a second character. | 11-29-2012 |
20120306617 | COMPOSITE LOCK - A composite lock includes a lock control unit and a Bluetooth unit. The Bluetooth unit is connected to the lock control unit, and the Bluetooth unit controls the lock control unit according to a result of pairing and authentication with a handheld unit, so as to enable the composite lock to be in a locking state or an unlocking state. | 12-06-2012 |
20120326839 | ELECTRONIC DEVICE AND PASSWORD INPUT METHOD THEREOF - An electronic device creates a table for mapping a plurality of pressure values corresponding to a plurality of numerical values, and stores the pressure mapping table in a memory. The electronic device detects a touch on a touch panel of the electronic device and detects a value of the pressure of the touch. The electronic device obtains a numerical value corresponding to the detected pressure value in the pressure mapping table. The electronic device generates a password code as a result of user input based on the numerical value. | 12-27-2012 |
20130015950 | CONTAINER, SYSTEM AND METHOD FOR GOODS TRANSPORTAANM Wip; Bastiaan CornelisAACI UithoornAACO NLAAGP Wip; Bastiaan Cornelis Uithoorn NL - The invention relates to a container for goods transport, comprising walls, enclosing a storage space for the goods, a closable entrance to the storage space, such as a door, a lock, for locking respectively unlocking the entrance to the storage space, means for reading a global destination position for the container in a database, means for determining an actual global position of the container, a controller configured to enable unlocking the lock based on at least the global destination position and the actual global position. In an embodiment, the controller is configured to enable unlocking the lock when the actual global position is within a predetermined range of the predetermined global position. The invention further relates to a system and method using the above container. | 01-17-2013 |
20130027181 | WIRELESS GARAGE DOOR OPENER KEYPAD UNIT AND A METHOD OF IMPLEMENTING A GARAGE DOOR OPENER KEYPAD UINT - According to an embodiment, a wireless garage door opener keypad unit may comprise a first memory element storing a primary identification code; a second memory element storing a secondary identification code; a keypad for receiving an identification code entered on the keypad; and a control circuit, responsive to entries on the keypad, for enabling and disabling the use of the secondary identification code. A method of implementing a secondary identification code is also disclosed. | 01-31-2013 |
20130027182 | Electronic locking device having a concealed notification function and the notification method thereof - An electronic locking device having a concealed notification function comprises an input module, an identification module connected to the input module, a lock-fastening module connected to the identification module, and a notifying module connected to the identification module, wherein the electronic locking device is characterized in that: the notifying module performs a notifying process according to a control signal output by the identification module, and at least one recipient end is notified by the notifying process and each recipient end is notified at least once to enhance the security function of the electronic locking device. | 01-31-2013 |
20130076483 | ELECTRONIC DEVICE - An electronic device and method for operating an electronic device are presented. An input for performing a predefined function is received. A lock function is deactivated to unlock the predefined function and the predefined function is displayed on a display module, if the input is received and if a correct password is entered. | 03-28-2013 |
20130093564 | SECURE KEYLESS ENTRY SYSTEM - A secure keyless entry system integrates into an existing motorized garage door opening system to replace the one button transmitters typically placed in a vehicle. The one button transmitters are replaced with remote modules having alpha numeric key pads. The remote modules accept a string of input and compare the last four to eight entries to a previously set designated PIN. In order to obfuscate the designated PIN from on lookers, a user of the system may first enter a random string of decoy characters before finally entering the designated PIN. The disclosed system may also be used to replace the metal keys typically used to secure entry doors to a dwelling. | 04-18-2013 |
20130106570 | SECURITY SYSTEM AND METHOD | 05-02-2013 |
20130120110 | ACCESS CODE MANAGEMENT SYSTEMS - In a method of managing access codes, a product is provided with an access restricting mechanism configured to permit operation of the product in response to entry of either one of first and second access codes using a code interface. The first access code is displayed on the product without displaying the second access code on the product. The second access code is identified to a user in response to user input of at least one of the first access code and a serial number into a terminal in communication with an electronically accessible code storage unit associating the second access code with the at least one of the first access code and the serial number. | 05-16-2013 |
20130169411 | METHOD FOR OPERATING AN ELECTRONIC LOCK - A method for operating an electronic lock is disclosed. The electronic lock includes a processing unit, an inner body and an outer body. The inner body includes an inner input portion, and the outer body includes an input device. The method includes operating the inner input portion of the inner body to output various signals according to operation of the inner input portion, wherein the various signals comprises a first signal and utilizing the input device to log in a manage menu of the electronic lock when the processing unit receives the first signal, wherein the manage menu of the electronic lock comprises a first controlling item for setting a left-handed mode or a right-handed mode by the input device. | 07-04-2013 |
20130194067 | METHOD AND SYSTEM FOR LOCKING AN ELECTRONIC DEVICE - A method and a system for locking an electronic device are provided. In one aspect, a method in an electronic device is provided comprising the steps of receiving, through a user input interface of the device when the device is in a locked state, a challenge response and a temporary automatic lock time indicator, and if the challenge response is accepted, unlocking the device, setting an automatic lock timer of the device to a temporary lock time value, and starting the automatic lock timer. In another aspect, an electronic device is provided for implementing the above method. According to another aspect, a locking mechanism is provided that utilizes information on an environment of the electronic device. According to another aspect, a stimulus based locking mechanism is provided that employs a different lock time after the device has issued a stimulus in response to an event on the device. | 08-01-2013 |
20130257588 | IMAGE DISPLAY DEVICE, IMAGE DISPLAY SYSTEM, AND METHOD OF CONTROLLING IMAGE DISPLAY DEVICE - An image display device includes: a clock section for timing current date/time information including a date and a time; an expiration date/time storage section for storing expiration date/time information as information of a date/time until which use of the image display device is allowed; a password accepting section for accepting input of a password encoded based on predetermined expiration date/time information; a decoding section for decoding the predetermined expiration date/time information from information of the password accepted by the password accepting section; a comparison section for comparing the predetermined expiration date/time information decoded by the decoding section and the current date/time information timed by the clock section with each other; and an expiration date/time update section for storing the predetermined expiration date/time information in the expiration date/time storage section if the predetermined expiration date/time information decoded is a date/time one of on and later than the current date/time information. | 10-03-2013 |
20140015637 | VIRTUAL VEHICLE ENTRY KEYPAD AND METHOD OF USE THEREOF - Keypad indicia are integral with a window of a vehicle. The keypad indicia are formed using a ultra-violet (UV) fluorescent dye that is nearly invisible to a human eye until exposed to UV light. A UV light emitting device of the vehicle is configured for outputting UV light. The light emitting device is mounted for enabling the keypad indicia to be exposed to the outputted UV light thereby causing the keypad indicia to become readily visible by the human eye. An imaging device of the vehicle captures user interaction with the keypad indicia while the keypad indicia is exposed to the outputted UV light. The keypad interaction processor determines if a sequence of body part movements with respect to the keypad indicia that is captured by the imaging device during exposure of the keypad indicia to the outputted light corresponds to an access code of the vehicle. | 01-16-2014 |
20140035721 | Accessing a Secure Locker Via A Mobile Device - System and/or method for accessing a locker are provided. In some aspects, a method may include receiving, from a server, a password for accessing a locker, where the locker meets a set of requirements. The method may also include transmitting, to a computing device associated with the locker, the password for facilitating unlocking the locker. The method may also include receiving, from the computing device associated with the locker, a first confirmation message that the locker has been unlocked. The method may also include transmitting, to the server, a second confirmation message indicating that the locker has been unlocked in response to the first confirmation message. | 02-06-2014 |
20140049366 | NEAR FIELD COMMUNICATION BASED KEY SHARING TECHNIQUES - A computer-implemented technique includes storing keychains in a memory of a computer. A login identifier and a password are received from a mobile device. The login identifier and the password are verified. Subsequent to the verification, one of the keychains is downloaded from the computer to the mobile device. The keychain includes N keys that are each associated with one of M physical locks of M locking devices, where N and M are integers greater than or equal to 1. The M locking devices or another locking device are monitored. Information in a key log is recorded when each of the N keys is used on one of the M locking devices or the other locking device. The information includes a locking device identifier and a key identifier. The mobile device is alerted when each of the N keys is used based on the key log. | 02-20-2014 |
20140062653 | LOCK RELEASING METHOD OF ELECTRONIC DEVICE, AND APPARATUS THEREOF - The present disclosure relates to a lock releasing method of an electronic device, an apparatus thereof, and a medium storing a program source for the method. The lock releasing method includes: in response to a request for lock releasing, outputting reference data to be used for deciphering of a password; receiving a password input by a user; and, determining a correlation between the reference data and the password input by the user, and releasing the lock when the password input by the user has a correlation with the reference data. According to the present disclosure, it is possible to flexibly change a password for releasing a lock of various electronic devices, so as prevent the leakage of a password, and thus protect private information of a user and improve system security. | 03-06-2014 |
20140091903 | MOBILE DEVICE AND KEY FOB PAIRING FOR MULTI-FACTOR SECURITY - Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy. | 04-03-2014 |
20140091904 | Secure Code Entry in Public Places - The disclosure provides an apparatus and method for secure code entry in public places. The code entry apparatus includes a display for displaying a code character, the display having a structure that assures that only the user of the apparatus can view the code character; a character selector for selecting the code character; and an input device for confirming selection of the code character. | 04-03-2014 |
20140091905 | METHOD, APPARATUS, AND SYSTEM FOR PASSWORD CONTROL - Embodiments of the present invention provide a method, an apparatus, and a system for password control, and relate to the field of password technologies. The method includes: receiving, by a combination lock, an unlock password that is sent by a mobile terminal through a network; matching, by the combination lock, the unlock password with an unlock password preset for the mobile terminal; when the unlock password matches the unlock password preset for the mobile terminal, executing, by the combination lock, an unlock operation. Embodiments of the present invention enhance the security of entering passwords. | 04-03-2014 |
20140132392 | OPERATING CONTROL SYSTEM FOR ELECTRONIC EQUIPMENT - The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device, programming a single or multiple devices, enables the input of user access data by a primary user for multiple modes. Through use of a black list, blocked numbers can be stored or immediately deleted with notification going to the user as well as the owner of the blocked number. A temporary shut down feature enables the device to be shut down for a programmed period of time and reactivated at the end of that time. | 05-15-2014 |
20140145821 | Screen Unlocking Method, Apparatus, and Device - The present invention discloses a screen unlocking method, apparatus, and device, and relates to the field of touch control technologies, which can shorten the unlocking time and improve user experience. The method includes: displaying a screen unlocking interface which includes a password unlocking area and a shortcut unlocking area on a screen; receiving an unlocking pattern which includes a password unlocking pattern input through the password unlocking area and a shortcut unlocking pattern input through the shortcut unlocking area; determining whether the password unlocking pattern input by the user is consistent with a preset password unlocking pattern; and if the password unlocking pattern input by the user is consistent with the preset password unlocking pattern, unlocking the screen to enter a function interface corresponding to the shortcut unlocking pattern. The present invention is applicable to unlocking technologies of touch devices. | 05-29-2014 |
20140203905 | Electronics Antitheft Authorizing Unit - Locked electronic device, e.g., a device which produces a video output, such as a game console or TV. The device is shipped in a locked state, and cannot be used as a game console or a TV until it is unlocked. The unlocking is carried out by a code. The code is provided separately from the device, and only once authorized sale is detected. | 07-24-2014 |
20140240087 | Access Control System Using Smart Phone - A door access control system associates a unique passive identifier with each one of a plurality of doors for which controlled access is desired. Each of the identifiers can be attached to a location adjacent to each respective door. A smartphone with a predetermined scanning app can scan, or read a respective identifier of a door for which access is desired. A representation of the door identifier along with an identifier of the smart phone can be transmitter to an access control unit. A data base of the access control unit can be interrogated to determine if that smartphone identifier is authorized to open the designated door. If authorized, an access command can be transmitted to a local access control module which can release a locking mechanism for the respective door. | 08-28-2014 |
20140285316 | SECURE KEYLESS ENTRY SYSTEM - A secure keyless entry system integrates into an existing motorized garage door opening system to replace the one button transmitters typically placed in a vehicle. The one button transmitters are replaced with remote modules having alpha numeric key pads. The remote modules accept a string of input and compare the last four to eight entries to a previously set designated PIN. In order to obfuscate the designated PIN from on lookers, a user of the system may first enter a random string of decoy characters before finally entering the designated PIN. The disclosed system may also be used to replace the metal keys typically used to secure entry doors to a dwelling. | 09-25-2014 |
20140354403 | USER SELECTABLE SECURABLE DEVICE - The principles of the present invention provide for a more flexible kiosk securable device system and method that enables users to select their own securable device, such as a locker, rather than having the kiosk assign one to them. In selecting a securable device, the user enters the same access indicia (e.g., PIN) that he or she entered in the kiosk into any available securable device, and, in response to the kiosk or securable device verifying that access indicia, the selected securable device may be provisioned to the access indicia in accordance with rental parameter(s), such as rental duration, size of securable device, and so forth. | 12-04-2014 |
20150077223 | CODE VERIFICATION - A method and/or computer program product verifies code. An input of an access code is received. A passcode comprising a set of one or more code elements is retrieved, wherein one or more of the code elements are associated with a respective time period. An input access code is compared to the retrieved passcode. In response to the input access code matching the passcode, a verification of the access code is output. | 03-19-2015 |
20150084739 | KEYPAD ASSEMBLY AND METHOD TO ACCESS A CAR - A system is provided for vehicle access. Advantageously, the present system includes an optical keypad and an RFID antenna working through a windscreen which can be athermal including a thin metal layer. The keypad measures the reflection of visible light on the fingers of the user. The keypad assembly has very low power consumption as it includes a capacitive sensor for a standby mode. The capacitive sensor shape limits the induction with the RFD antenna. The present system therefore proposes a new access system for which the installation is fully reversible and not harmful to the vehicle. | 03-26-2015 |
20150102902 | Bluetooth Remote-Control Electronic Lock - A Bluetooth remote-control electronic lock contains an electronic locking unit including a controlling unit; an infrared identifying unit connecting with the controlling unit, wherein after identifying a user, the controlling unit executes wireless Bluetooth transmission; a lock control unit coupling with the controlling unit, the lock control unit including an anti-theft module; and a Bluetooth receiving unit disposed in a remote set phone. After the controlling unit pairs with the Bluetooth receiving unit, the Bluetooth receiving unit keys in the at least one security password, and at least one inputted password is checked if it matches with the at least one security password, when the at least one inputted password matches with the at least one security password, the electronic locking unit unlocks the door, and when the at least one inputted password doesn't match with the at least one security password, the electronic locking unit remains locking the door. | 04-16-2015 |
20150109101 | System and Method for Reading Multiple RFIDs - A system and method for reading multiple RFIDs is herein disclosed. In this embodiment, the system for reading multiple RFIDs comprise an RFID reader capable of reading electronic data from a plurality of RFIDs and a computer that receives the electronic data from the RFID reader. Furthermore, the computer is capable of displaying the electronic data on a screen. The electronic data comprises a card information. Moreover, the computer is also capable of prompting a user to choose one of the card information, and performing a transaction with the card information chosen by the user. | 04-23-2015 |
20150109102 | APPARATUS AND METHOD FOR PROVIDING SECURITY KEYPAD THROUGH SHIFT OF KEYPAD - An apparatus and method for providing a security keypad are provided. The apparatus for providing a security keypad includes a coordinate generation unit, a keypad output unit, and a key value processing unit. The coordinate generation unit computes a displacement by which a security keypad is to be shifted, and rearranges at least some of keys included in the security keypad by shifting the at least some keys so that the central axis of the security keypad is translated by the displacement. The keypad output unit displays the rearranged security keypad to a user. The key value processing unit processes key values in response to the user's input to the rearranged security keypad, and transfers the processed key values to an application for which the rearranged, security keypad is used. | 04-23-2015 |
20150116080 | SYSTEMS AND METHODS TO CONTROL A DOOR KEYPAD - A door lock controller receives sensor data from a sensor, such as a motion sensor or an RF envelope sensor, and determines whether to permit operation of a keypad associated with the door lock based at least in part on the sensor data. The door lock controller further sends messages including key pad data to a local receiver, receives messages containing door lock commands from the local receiver, and controls a state of the door lock based at least in part on the door lock commands. | 04-30-2015 |
20150302674 | SYSTEM AND METHOD TO ACCESS/RESTRICT A SECURITY SYSTEM FOR TEMPORARY USERS USING A MOBILE APPLICATION - An apparatus that includes a mobile wireless device of an authorized person receiving an identifier of another person who is to be granted temporary access into a secured geographic area of the authorized person by a security system of the authorized person, a processor of the mobile device or the security system generating a temporary access code with specific features that is to be used by the other person for gaining entry into the secured area and the mobile device of the authorized person transferring the temporary password to a mobile wireless device of the other person. | 10-22-2015 |
20150360646 | SWIPE AND TAP VERIFICATION FOR ENTRY SYSTEM - A system and method for providing access to a vehicle operation includes a first user-input interface, a second user-input interface, and a vehicle controller. The first user-input interface is configured to interact with a user via a swipe-up input. The second user-input interface is configured to interact with the user via an application independent of the swipe-up input. The vehicle controller is configured to control the vehicle operation in response to detecting a first swipe-type user-input via the first user-input interface and a second user-input via the second user-input interface within a predetermined time. | 12-17-2015 |
20160012655 | Accessing Secure Areas Based on Identification via Personal Device | 01-14-2016 |
20160078696 | ACCESS METHOD AND SYSTEM WITH WEARABLE CONTROLLER - A control system and method for vehicle/house entry system with a wearable controller. A distance is determined between said control system and said vehicle or house. A message is prompt requesting for unlocking in a user interface in said controller if said distance is smaller than a threshold. A message is communicated with said vehicle or house requesting for unlocking if said prompted message is confirmed. | 03-17-2016 |
20160133074 | LOCKER RENTAL SYSTEM USING EXTERNAL CODES - A locker rental system includes electronic lockers centrally managed by a locker manager. The locker manager is in communication with a separate external system, which handles admissions and sales for a venue. Users are provided with a unique external identification (ID) code for purposes such as admission to the venue. Determinative sequences of the external ID codes are provided to the locker manager as validation codes. When the external ID code is scanned, the locker manager validates the external ID code using the validation codes. A valid external ID code may be used to rent and access lockers in the locker system. In some implementations, locker rights may be sold through the external system and details of the transaction provided to the locker manager. If the external ID code is valid, the locker manager generates a rental plan. | 05-12-2016 |
20190142126 | MULTIFUNCTIONAL INTELLIGENT SUITCASE | 05-16-2019 |