Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Wireless transceiver

Subclass of:

340 - Communications: electrical

340825000 - SELECTIVE

340500100 - Intelligence comparison for controlling

340500200 - Authorization control (e.g., entry into an area)

340500600 - Coded record input (e.g., IC card or key)

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
340500620 Including manual switching means 10
340500630 Including timing means (e.g., clock) 3
20110025460VEHICLE AND FOB COMMUNICATION ARRANGEMENT - An example base station assembly includes a transmitter configured to communicate a challenge signal and at least one timing signal to a plurality of fobs. The base station initiates a vehicle operation in response to at least one return signal. The return signal is communicated to the base station from at least one of the fobs in response to the timing signal.02-03-2011
20100164683METHOD AND APPARATUS FOR AUTOMATICALLY DISARMING A SECURITY SYSTEM - A security system comprises a system control panel for arming and disarming the security system. A door sensing unit comprises a first radio frequency (RF) transceiver interconnected with the system control panel over a network. The first RF transceiver is mounted proximate to a door that defines at least a portion of a perimeter around an area to be monitored by the security system. The first RF transceiver has an RF detection field proximate to the door. A disarm device comprises a second RF transceiver that automatically transmits a disarm device packet. The first RF transceiver receives the disarm device packet when the second RF transceiver is within the RF detection field. The first RF transceiver sends a disarm message to the system control panel over the network to disarm the security system based on at least the disarm device packet.07-01-2010
20120154114ELECTRONIC KEY SYSTEM AND ELECTRONIC KEY - An electronic key system that performs ID verification communication to verify an ID of an electronic key. The ID verification communication is started by transmission of a wireless signal from a vehicle and performed between the vehicle and the electronic key. The electronic key system determines the location of the electronic key in accordance with the received signal strength of a radio wave used for the ID verification communication. A signal strength measurement circuit measures a first signal strength, which is the received signal strength when a signal from the electronic key is received, and a second signal strength, which is the received signal strength of the radio wave during a vacant time when the electronic key is performing the ID verification communication. A control unit controls operation of the electronic key in accordance with a measurement result of the first and second signal strengths.06-21-2012
Entries
DocumentTitleDate
20100141381ACCESS CONTROL SYSTEM, LOCK DEVICE, ADMINISTRATION DEVICE, AND ASSOCIATED METHODS AND COMPUTER PROGRAM PRODUCTS - An access control system uses an existing file format standard, e.g. for personal data interchange (PDI) or image file interchange, for novel access control purposes to provide temporary access for a wireless key device to a lock device and its protected environment by creating appropriate temporary access defining data in a data object compliant with the file format standard and communicating the data object to the lock device via the wireless key device.06-10-2010
20130043974Systematic distillation of status data relating to regimen compliance - Configuration technologies for cost-effectively monitoring indicia of regimen compliance or noncompliance in response to one or more indications of symptoms or actions or other data on data-bearing media or in wireless transmissions, such as implementing techniques for providing or preventing access or otherwise acting on or communicating incremental or definitive indicia of compliance or noncompliance.02-21-2013
20130082820UNATTENDED FLEET VEHICLE SECURITY SYSTEM AND METHOD - A communication system and method to allow authorized access to a vehicle. The system communicates with an internet server and a mobile communication device such as a smart phone or RFID transponder to determine if a person attempting to access the vehicle is authorized. The system includes an in-vehicle security module configured to be installed on the vehicle and to receive an authorization signal from the internet server. The in-vehicle security module includes a keyless entry transmitter configured to communicate with a keyless entry system of the vehicle effective to allow access to the vehicle if the authorization signal is received. By using a keyless entry transmitter to operate the vehicle's security system, the communication system is easy to install as opposed to systems that require a wired interface with the vehicle. Such a system is useful for unattended operation of vehicle rental fleets or employee vehicle fleets.04-04-2013
20100109836VEHICLE AUTHENTICATION CONTROL DEVICE - A vehicle authentication control device has a first, second, and third determination units, and a registration unit. When identification information unique to a vehicle is registered in both a portable device and an authentication device on the vehicle, the first determination unit matches first identification information returned from the portable device in response to a request from the authentication device and second identification information registered in the authentication device to determine whether a combination of the portable device and the authentication device is legitimate. When third identification information is registered in a part different from the authentication device, the part performing a predetermined operation when the first determination unit is legitimate, the second determination unit matches the third identification information registered in the part and the second identification information registered in the authentication device to determine whether a combination of the part and the authentication device is legitimate. The second determination unit determines that the part is a non-used article if the third identification information is not registered in the part. If the determination results of the first determination unit and the second determination unit are both positive, then the third determination unit determines that a combination of the part, the portable device, and the authentication device is legitimate. If the second determination unit determines that the part is a non-used vehicle, the registration unit registers the second identification information registered in the authentication device as third identification information.05-06-2010
20100328030 RFID PET DOOR - An RFID reader for use in a pet door to control access for a pet bearing an RFID tag or implant. The RFID reader incorporates and is operable in two modes, a learn mode and a normal mode. In learn mode, the reader stores the ID code of an RFID transponder in the vicinity of the reader and also derives additional reader information corresponding to the RFID transponder. In normal mode, the reader compares the ID codes stored in memory to the RFID signal returned from an RFID transponder in the vicinity of said the reader. The RFID reader behavior is at least in part determined by the additional reader information corresponding to said ID codes stored in memory. We also describe a confidence threshold for acceptance of an ID code in learn mode and normal mode. The confidence threshold in normal mode may be less than in learn mode.12-30-2010
20130069760METHOD TO INCREASE ACCURACY OF LOCATING UNIT IN WIRELESS VEHICLE SYSTEM - A wireless unit for a wireless vehicle system includes a receiver for receiving a vehicle-originating signal, a transmitter for transmitting a reply signal, a received signal strength indicator (RSSI) for determining a received signal strength of the vehicle-originating signal, a memory for storing sensitivity data, and a control unit in electrical communication with the receiver, the transmitter, the RSSI and the memory. The receiver has a sensitivity, and the memory is for storing sensitivity data corresponding to the sensitivity of the receiver. The control unit is configured to communicate with the transmitter to direct the transmitter to transmit the reply signal. The reply signal includes received signal strength data used for determining a distance between the wireless unit and an associated vehicle-side transmitter on an associated vehicle. The received signal strength data is based on the received signal strength and the sensitivity data.03-21-2013
20130088325SYSTEM AND METHOD FOR USER AUTHENTICATION IN IN-HOME DISPLAY - A system for authenticating a user of an in-home display (IHD) and an authentication method are provided. A user of an IHD is authenticated by using a mobile terminal including an authentication application. The authentication system receive authentication request data from the mobile terminal and allows the IHD to display a message in relation to user confirmation, and when certain requirements are met, the authentication system performs user authentication to permit a user to use the IHD.04-11-2013
20090115571RF PAYMENT VIA A MOBILE DEVICE - A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (RF) communication and/or authentication to facilitate completion of a transaction. Secondary identification information, for example voice recognition data, biometric recognition data, or alphanumeric data, may be utilized for secondary end user authentication. For security reasons, the mobile device account data may transmitted after the secondary identification information is verified.05-07-2009
20090302998METHOD FOR PROVIDING TO AN END DEVICE ACCESS TO A SERVICE, TO AN END DEVICE AND TO A MOBILE TERMINAL REALIZING SUCH A METHOD - The invention relates to a method for providing to an end device access to a service in accordance with a specific profile. The method including the steps of: 12-10-2009
20120218076WIRELESS CAPABLE SECURITY DOOR ANTENNA - A door security system comprises a door, and a handle assembly attached to the door. The handle assembly includes a lock mechanism, a handle, and an escutcheon. The lock mechanism has an unlocked state and a locked state for securing access to the door, and the handle is rotatably supported by the handle assembly as a means of access through the door when the lock mechanism is in the unlocked state. At least one of the handle and the escutcheon acts as an antenna capable of wirelessly receiving and transmitting radio frequency signals and capable of communicating with the lock mechanism to switch the lock mechanism between the unlocked and locked state.08-30-2012
20120218075METHODS AND APPARATUS TO CONTROL ACCESS - Methods and apparatus to support personal information management are described. One example method includes receiving personal information of a user from a mobile device through close-proximity communication, wherein the personal information includes government-issued credentials of the user; accessing verification information related to the personal information; and verifying the personal information based on a comparison of the verification information and the personal information. Other implementations are possible.08-30-2012
20090040019USER-ASSISTED PROGRAMMABLE APPLIANCE CONTROL - A system for activating an appliance responsive to one of many transmission schemes includes a transmitter, memory holding data describing the transmission schemes, and a controller in communication with the transmitter and the memory. The controller is operable to store a fixed code. If a fixed code is stored, then the controller transmits a sequence of fixed code activation schemes, based on the fixed code and data held in the memory, until input indicating activation of the appliance is received. If no fixed code is stored, then the controller transmits a sequence of rolling code activation schemes, based on data held in the memory, until input indicating activation of the appliance is received. The controller stores in the memory an indication as to which activation scheme activated the appliance based on the received input. The controller generates an activation signal based on the stored indication and a received activation input.02-12-2009
20100090799COMMUNICATION SYSTEM INCLUDING A VEHICLE ELECTRONIC KEY, ELECTRONIC KEY FOR USE IN A COMMUNICATION SYSTEM AND METHOD FOR COMMUNICATING INFORMATION FROM A VEHICLE TO A PORTABLE TELECOMMUNICATION TERMINAL - The invention relates to a communication system that comprises a vehicle electronic key, a vehicle telecommunication device and a portable telecommunication terminal, the electronic key including a first transmitter and the vehicle including a first receiver, the first transmitter and the first receiver being provided for carrying out the transmission of at least one information request from the electronic key to the vehicle, the vehicle telecommunication device including at least a second transmitter, the portable telecommunication terminal including at least a second receiver, the second transmitter and the second receiver being provided for carrying out the transmission of information from the vehicle to the portable telecommunication terminal, the portable telecommunication terminal being provided for displaying at least a portion of the information on a display member of the portable telecommunication terminal. The invention also relates to an electronic key and to a method for communicating information from a vehicle to a portable telecommunication terminal.04-15-2010
20090267733ELECTRONIC CONTROL APPARATUS - Disclosed is an electronic control apparatus for a vehicle which includes: 1) first storage means for storing vehicle identification information unique to the vehicle; 2) second storage means for storing immobilizer identification information unique to the vehicle; 3) command receiving means for receiving, from an external control apparatus, an update command that commands the electronic control apparatus to update the vehicle identification information stored in the first storage means; and 4) information handling means for handling all the information stored in the first and second storage means. Moreover, in the electronic control apparatus, upon receipt of the update command by the command receiving means, the information handling means updates the immobilizer identification information stored in the second storage means as well as the vehicle identification information stored in the first storage means.10-29-2009
20120223809TRANSPONDER, METHOD AND READER FOR MONITORING ACCESS TO APPLICATION DATA IN THE TRANSPONDER - A transponder for wirelessly receiving external data and for monitoring access to application data, the transponder including: a data storage storing application data; a data storage control region; and a data storage access controller configured to store, in the data storage control region, data indicative of an access to the application data stored in the data storage, when the application data was accessed based on the external data. Further, a method and a reader for monitoring access to application data stored in a transponder are described.09-06-2012
20110012709METHOD AND SYSTEM FOR DATA CONTROL IN ELECTRONIC LOCKS - Disclosed are apparatus and corresponding methodologies for data control in an electronic access control system. A plurality of electronic locks are connected to a central server over a network such as an 802.11 WiFi wireless network that may be used to provide data updates and management for the individual electronic locks. To address power management problems associated with electronic locks having the capability to communicate over an 802.11 WiFi network, the present disclosure provides method and apparatus for selectively powering on and off an 802.11 WiFi communications module integrated into the electronic lock to conserve power resources. An electronic access control system is disclosed which allows efficient data exchange between a central server and a plurality of electronic locks using a database structure, and which allows for multiple simultaneous database manipulations in a cost effective manner.01-20-2011
20090027160ENTRY SYSTEM FOR VEHICLE - An engine starting apparatus having the function of adjusting the transmission power of an electronic key to an intensity appropriate for transportation when the vehicle is transported is provided. An on-vehicle control means (key collating ECU) checks the presence of a fuse which is removed when the vehicle is transported before a request signal for ID authentication is transmitted and wirelessly transmits information on the presence of the fuse obtained by the check to an electronic key. Based on the information of presence wirelessly transmitted from the on-vehicle control means, the electronic key sets the transmission power at a first intensity when it is determined that the fuse is present and sets the transmission power at a second intensity when it is determined that the fuse is not present.01-29-2009
20130162395Transponder - A transponder is disclosed to receive a wireless electromagnetic query signal and transmit a corresponding wireless electromagnetic response signal. The transponder comprises a first coil and at least one further coil that function as antennas to receive the wireless electromagnetic query signal and generate separate wired electrical incoming signals. An axis of the first coil and an axis of the at least one further coil are differently aligned in space, and each coil is associated with at least one means for limiting the voltage of the respective incoming signal. The separate wired electrical incoming signals are rectified and converted to current signals. The peak values of the current signals are detected and compared, such that a control signal is generated to identify one coil between the first coil and the at least one further coil that has a larger peak value of current.06-27-2013
20120112881Electronic component with time-limited use - An electronic device with a limited time of use. The electronic device comprises a physical interface for removable connection to a host device, a processor and a usage time limit module with a counter. When the counter reaches a pre-determined value, the usage time limit module is configured to disable the electronic device, preferably by modifying the hardware of the electronic device, e.g. by disabling a communication line between the processor and the physical interface, which may be effected by blowing a fuse. The usage time limit module is powered by the host device via a power supply from the physical interface. In a preferred embodiment, the electronic device is a storage device. In a further preferred embodiment, the physical interface is a USB interface.05-10-2012
20110279227SYSTEMS AND METHODS FOR IDENTIFYING AND COLLECTING BANNED WASTE - Systems and methods for authorizing a waste item to be removed from a site are disclosed. In one embodiment, a waste collection vehicle includes a reader configured to obtain identification information from an identification tag associated with the waste item. A transceiver associated with the vehicle is configured to: receive the identification information from the reader, wirelessly transmit the identification information to a remote computer for processing, and wirelessly receive an indication of whether the waste item should be collected and removed by the waste collection. The received indication is based on at least one hazardous characteristic associated with the identified waste item, a determination that the waste collection vehicle is authorized to collect the waste item having the at least one hazardous characteristic, and a determination that a driver of the waste collection vehicle is authorized to collect the waste item having the at least one hazardous characteristic.11-17-2011
20080284564Time-of-Flight Ranging Systems - A time-of-flight ranging system, such as a keyless access control system, comprises a first part (11-20-2008
20090206989ELECTRONIC COMMUNICATION SYSTEM, IN PARTICULAR ACCESS CONTROL SYSTEM FOR P(ASSIVE)K(EYLESS)E(NTRY), AS WELL AS METHOD FOR DETECTING A RELAY ATTACK THEREON - In order to provide an electronic communication system (08-20-2009
20110285502RFID-Based Data Collection, Correlation And Transmission System, And Method For Collecting Data And Correlating Same To System Participant Identities And Actions Thereof - An RFID-based data collection, correlation and transmission system and method carried out thereby is provided. The system, which comprises one or more RFID-readers, a radio frequency identification (RFID) recognition and control component. a storage device interface, a portable and/or internal data storage device in communication with the storage device interface, one or more antennas, and a configuration and command component, is operable to collect data of interest from detected RFID tags, and detect and identify system participants and data related thereto. In addition, the system is operable to correlate potential data of interest, such as product advertising information, to the detected system participants, and transmit the data of interest to the system participants via numerous methods of communication. Thus, the system provides a means of highly targeted information distribution, as well as providing user reports valuable in future planning.11-24-2011
20110291797BYPASS SYSTEM AND METHOD FOR THE REMOTE START OF A VEHICLE - A bypass module for bypassing an immobilizer of a vehicle. The immobilizer includes a transceiver for transmitting a security information request and receiving security information from a vehicle transponder key. The bypass module includes a first communication interface for interfacing with the immobilizer, a controller for processing the security information request; and a memory for storing the security information. The vehicle immobilizer of the vehicle is bypassed when the bypass module transmits via said first communication interface the security information stored on the memory to the immobilizer in response to the security information request.12-01-2011
20110291798Wireless Encrypted Control of Physical Access Systems - Physical access systems and methods securely grant physical access to restricted areas in high-volume applications. An electronic device, such as a smartphone, stores a digitally signed physical access rights file. An individual uses this rights file to gain access to a restricted area only after self-authenticating to the device. A physical access control system receives the rights file, validates it, and determines whether to permit passage through a physical barrier. The determination may be made by a physical barrier system, or by a remote access control headend. An access control gateway, which may be an access control headend, may either unlock the physical barrier system when the electronic device is near the physical barrier, or it may transmit an authorization code to the electronic device and the physical barrier system, whereby passage is only permitted if the barrier system subsequently receives the authorization code from the electronic device using near field communications.12-01-2011
20100265032ENGINE STARTUP SYSTEM OF VEHICLE - An engine startup system of a vehicle permits engine startup under a condition of establishing authentication between an in-vehicle device mounted in the vehicle and a portable device carried by a user. The engine startup system includes: a transponder circuit installed in the portable device and activated upon receiving a query signal transmitted from the in-vehicle device to generate a primary reply signal for the authentication of the in-vehicle device; and a transmitting circuit installed together with the transponder circuit in the portable device and converting the primary reply signal generated by the transponder circuit into a transmission signal of another wavelength band to transmit the transmission signal as a secondary reply signal for the authentication of the in-vehicle device.10-21-2010
20090153294MECHANICAL KEY CODE VERIFICATION SYSTEM - A mechanical key code verification system including a mechanical key and a lock apparatus into which the mechanical key is inserted. The mechanical key includes a key body. A key code pattern formed on the key body includes a plurality of recessed portions and a plurality of non-recessed portions. A wireless communication mechanism is incorporated in the key body which performs wireless communication with a communication device. The wireless communication device including an antenna arranged on the key body. The lock apparatus mechanically verifies the key code pattern of the mechanical key when the mechanical key is inserted therein. The recessed portions of the key code pattern of the mechanical key is located inward from the antenna on the key body.06-18-2009
20100007461METHOD FOR PASSIVE KEYLESS ENTRY OF A MOTOR VEHICLE ESPECIALLY OF AN INDUSTRIAL VEHICLE - A vehicle unlocking sequence includes passively authenticating a vehicle user, granting the authenticated vehicle user access to the vehicle and setting the vehicle main switch into an on-state. A vehicle locking sequence includes passively authenticating the vehicle user, configuring the vehicle, upon a first action from the authenticated vehicle user, into a first locking mode whereby access to the vehicle is denied to a non authenticated user, or configuring the vehicle, upon a second action from the authenticated vehicle user, into a second locking mode whereby access to the vehicle is denied to a non authenticated user and the vehicle main switch is set into an off-state.01-14-2010
20110148574MOBILE IDENTIFICATION TRANSMITTER OF A SECURITY SYSTEM - The invention relates to a mobile identification transmitter (06-23-2011
20110148573PASSIVE ENTRY SYSTEM AND METHOD FOR A VEHICLE - A passive entry system and method for determining the location of a remote transmitter positioned near a vehicle. The system and method may include an irregularly shaped authorization zone. The authorization zone may be formed using as least three LF antennas. Alternatively, at least two antennas may be used to form at least one elliptically shaped authorization zone. A controller may determine the location of the fob when the fob is physically positioned within the authorization zone.06-23-2011
20090212906MULTI-CHANNEL PASSIVE ENTRY SYSTEM FOR VEHICLES - A method and system for determining whether or not passive entry of a vehicle is permitted, includes allocating separate channels for each authorized key FOB for the vehicle. An indication of manual entry of the vehicle is detected. Upon such detection, a challenge from a transmitter of a passive entry system is output. The challenge is received by more than one key FOB in a vicinity of the vehicle, and outputting a respective remote keyless entry response at an assigned frequency channel for each respective key FOB. The remote keyless entry responses are received at a receiver of the passive entry system, at each respective channel allocated for the respective key FOBs. A determination is then made as to whether or not any of the respective key FOBs are assigned to authorized users of the vehicle, and if so, a vehicle door is set in an unlocked state to allow entry into the vehicle.08-27-2009
20090273440ELECTRONIC ACCESS CONTROL HANDLE SET FOR A DOOR LOCK - The present invention provides for a handle set for a lock with a latch, the handle set having an authentication circuit and actuator in the interior handle that allow access to authenticated transponders. The present invention also provides a device and method for transmitting a rotational movement and force in an electronic lock, wherein the transmission takes place in a coupled state and not in a decoupled state and wherein the transmission of force does not damage an actuator that requires little energy to change between the coupled and decoupled states. A coupling cartridge of an electronic lock can easily be handed. The electronic lock can be retrofitted in installed mortise locks and used with cylindrical locks. The electronic lock can include a security feature that prohibits the electronic lock from changing between the coupled and decoupled states.11-05-2009
20090273439Micro-chip ID - An electronic device worn by a person; in a exemplary embodiment comprising a radio-frequency receiver-transmitter, a CODEC, and a processing element having storage. The device is configured to operate within a location or venue, and if outside the location or venue, to transition to “sleep mode.” The device communicates and interacts with other external systems. Optionally a CODEC, which enables secure communications, encodes and decodes messages and data exchanged with external systems. The CODEC may receive data or codes from the processing element and may send decoded data and or messages to the processing element for storage. The processing element may receive and remit personal data related to the person, including records of personal data and information, events and times, financial or monetary data, important dates and times with reminders, security information including cryptographic keys and encodings.11-05-2009
20090284345PASSIVE ENTRY SYSTEM FOR AN AUTOMOTIVE VEHICLE - A passive entry system for an automotive vehicle may include a token capable of receiving a plurality of wireless signals. The token may generate a response signal to at least one of the plurality of wireless signals and reconfigure so that the token does not provide a response to at least one of the plurality of wireless signals.11-19-2009
20120293302IN-VEHICLE APPARATUS CONTROL SYSTEM - An onboard apparatus control system is disclosed. The onboard apparatus control system includes a portable apparatus and an in-vehicle apparatus which controls an onboard apparatus according to position of the portable apparatus. From multiple transmitting antennae, the in-vehicle apparatus transmits pulse pattern signals with different transmission frequencies at an overlapping timing, so that the pulse pattern signals are radio waves whose intensities are changed stepwise according to different patterns. The portable apparatus receives the radio waves transmitted from the multiple transmitting antennae. The position of the portable apparatus with respect to the vehicle is determined based on a combined pattern of the received pulse pattern signals, which a receiving unit is to receive at location with respect to the vehicle.11-22-2012
20130099893LOCK CONTROL SYSTEM USING RFID - A lock control system includes a detection unit positioned proximate to a lock, an RFID device neighboring at least one RFID antenna, and an RFID reading system detecting identifying information of the RFID device when the detection unit detects an event. The system also includes at least one microcontroller that determines, based on the identifying information, whether to grant the RFID device access to an area secured by the lock and instructs an actuator to unlock the lock when the RFID device is granted access.04-25-2013
20100201482SYSTEM AND METHOD FOR ACCESSING A STRUCTURE USING A MOBILE DEVICE - A wireless device access system employs short-range wireless communication to require the proximity of a user device to a structure prior to communicating an unlock request. The access system authenticates the unlock request and the proximity of the user to the structure prior to transmitting an unlock command to the structure. Additionally, the wireless device may require the proximity of a user token prior to operation and/or the access system may include an override within the structure blocking any unlock command.08-12-2010
20100201483MOBILE DEVICE FOR VEHICLE - A mobile device for a vehicle includes a receiving unit that receives transmission signals transmitted from individual transmitting antennas of a vehicle-side device; a control unit that determines distances to the individual transmitting antennas using the signal strengths of the received transmission signals; and a transmitting unit that transmits, to the vehicle-side device using wireless communication, data items indicating the distances. In a time period in which communication is not performed between the mobile device and the vehicle-side device, the signal strength of a received signal is measured, thereby obtaining a measurement value, and the measurement value is stored as a noise element in a memory. When communication between the mobile device and the vehicle-side device is performed, correction for noise is performed on the signal strengths of the transmission signals transmitted from the transmitting antennas, and the distances are determined.08-12-2010
20080258866Apparatus having a moveable component and method for controlling a movement of the moveable component - In the field of medical devices, for instance patient tables, it is known to block the movement of moveable components of a respective apparatus using blocking means and to release these only after actuating a switch. To be able to dispense with the foot switch, an authorized operator is equipped with a radio frequency identification tag and interrogation means for interrogating the radio frequency identification tag are provided on the apparatus. Once the operator initiates a movement by exerting a force, a sensor detects this force and activates the interrogation means. If the interrogation means identify that the radio frequency identification tag is sufficiently close thereto, it is concluded that the authorized operator would like to initiate the movement and the moveable part is released.10-23-2008
20130214902SYSTEMS AND METHODS FOR NETWORKS USING TOKEN BASED LOCATION - Devices are operated dependent on a user's location being confirmed as in the vicinity of an unpowered token, such as an NFC chip or QR code. The tokens may be attached to the devices which will only operate if triggered by a user scanning the corresponding token with a personal mobile device. In other cases, the scanning of a token may cause a remote server to perform an action that depends on the user being in proximity to the token.08-22-2013
20090160607VEHICLE KEY FOB HAVING A COMMUNICATIONS CIRCUIT - A vehicle key fob for communicating information between one or more electronic devices, such as a personal or laptop computer, and a wireless-enabled vehicle. In one embodiment, a wired communications link is established between the electronic device and the vehicle key fob over a wired connection, such as a USB cable. A separate wireless communications link is established between a wireless interface located in the vehicle key fob, such as a wireless adapter, and the wireless-enabled vehicle so that information can be sent from the electronic device to the vehicle, and vice-versa, in a secured manner.06-25-2009
20090251283Property management system - A property management system includes: a management server for managing a property item by a non-contact IC medium; a gate apparatus for reading medium information from the non-contact IC medium; and a destruction apparatus for destroying the property item. Gate passage permission/non-permission information is stored on the management server or the non-contact IC medium and, when destroying the property item, the destruction apparatus transmits the medium information to the management server to perform a destruction completion registration. The gate apparatus includes: a determination device for determining whether the gate passage permission/non-permission information represents permission or non-permission based on the medium information; and a passage prohibition device for prohibiting passage when the determination result is non-permission. Even when the gate passage permission/non-permission information represents non-permission, if the read medium information indicates that the destruction completion registration is already performed, the determination device permits the passage.10-08-2009
20110140839METHOD AND SYSTEM FOR DISABLING PASSIVE ENTRY KEY LOCATED INSIDE A VEHICLE - A method for disabling a passive entry key includes receiving a search request into an electronic control unit (“ECU”) on a vehicle to search for a passive key inside a vehicle cabin; emitting a search signal via an antenna in communication with the ECU in response to the received search request; receiving a reply signal via the antenna from the passive key inside the vehicle cabin; and recording in a memory in communication with the ECU an identification of the passive key inside the vehicle cabin in response to the received reply signal. In this method for disabling a passive entry key, the search request can be initiated by an operator at an input device. A passive entry key system is also disclosed.06-16-2011
20120105195WIRELESS TRANSCEIVER WITH RECALL INDICATOR - The invention is a wireless control system and method for wireless control of a remote electronic system from a vehicle. A trainable transceiver is configured to receive a feedback signal from a remote electronic system indicating success or failure of a requested operation. The feedback signal, which may include status information, is stored in memory of the wireless control system for retrieval at a later period. In response to the retrieved feedback signal and status, the control system may recall that status information and/or reissue a wireless control signal to the remote electronic system.05-03-2012
20090315673RFID Tag And Operating Method Thereof - An RFID tag and a method of operating the RFID tag are provided. The RFID tag comprises a memory block that stores at least one predetermined authorization code associated with an RFID reader. In this method, according to the predetermined authorization code and an approval request transmitted from the RFID reader, it is determined by the RFID tag whether the RFID reader is authenticated. When the RFID reader is not authenticated, the RFID tag is controlled to not respond to a subsequent request transmitted from the RFID reader. As a result, the risk that data in the RFID tag may be illegally acquired by an unauthorized RFID reader is reduced.12-24-2009
20130214900SYSTEM AND METHOD TO ENABLE PASSIVE ENTRY - A passive entry system is disclosed. The system comprises an unlocking module that performs a key operation in a keyless environment and a plurality of fobs configured to trigger the unlocking module to perform the key operation. each fob has a unique value associated thereto. The unlocking module determines a range of identification values, generates an authentication request packet based on the range, of identification values, and broadcasts the request packet. Each fob receives the request packet; and determines whether the unique identification value of the corresponding fob falls within the range of identification values. The fob also generates a response packet if the unique identification value falls within the range of identification values and transmits the response packet to the unlocking module. The unlocking module receives the response packets from the fobs, and performs the key operation based on one of the received response packets.08-22-2013
20130214901SYSTEM, STATION AND METHOD FOR MUSTERING - Mustering of persons from a building in an emergency situation is made possible by tagging mustering stations with unpowered, unique tokens which can be read by a user's personal mobile electronic device. The user's device transmits both mustering station identity and user identification to a remote server, where, upon successful validation, the user is removed from a list of persons to be mustered. The system may be part of a physical access security system for the building, in which single-use digital tokens as well as traditional cards may be used to open the doors. The permissions relating to doors or other physical assets may also be used to grant access to logical assets within the building.08-22-2013
20130214903SAFETY LOCKOUT SYSTEMS AND METHODS - A lockout-tagout system for use with at least one securing item may include at least one lock for locking the securing item in place. The lockout-tagout system may further include at least one lockout tag on or near the securing item or lock. The lockout tag may have a wireless identification device. The lockout-tagout system may further include a reader configured to read the wireless identification device.08-22-2013
20130214904FLUID DELIVERY CONTROL NOZZLE - A fluid delivery nozzle for wireless communication to either an active or a passive device located on a vehicle and for wireless communication from the fluid delivery nozzle to a central location for storage of vehicle data. Upon initiation of a fluid delivery transaction, a communication link is established between a vehicle communication device and the central location and between a fluid container of the vehicle and the fluid delivery nozzle. The information received from the vehicle and container is relayed to the central location to authorize delivery of a fluid to the vehicle. Information is also transferred from the central location back and forth to the fluid delivery nozzle to update and store information regarding the fluid delivery transaction.08-22-2013
20100237989GOODS MANAGEMENT DEVICE AND GOODS MANAGEMENT SYSTEM - According to one embodiment, the goods management device includes a carried out goods detecting portion that receives a reading result from a first wireless tag reader arranged in a depository storing goods attached with a wireless tag, and detects, based on the result, that the goods attached with tag data have been taken away from the depository; a user data receiving portion that receives, as a reading result, both of tag data, unique to a user, carried by the user who is taking away the goods and tag data attached to the goods being taken away from a second wireless tag reader arranged near a door, which is usually locked, of a building or a room in which the depository is installed; and an unlock direction portion that instructs unlocking of the door, only in a case where the tag data of the goods determined by the carried out goods detecting portion to have been taken away matches with the tag data attached to the goods being taken away and received by the user data receiving portion and where the tag data unique to the user belongs to the user who has a proper permission.09-23-2010
20110057772Automatic locking apparatus - An automatic locking apparatus which is installed in a vehicle, communicates with a portable-unit in areas inside/outside the vehicle, and automatically locks doors, based on whether a response-signal is received from the portable-unit and opening/closing of the doors. The apparatus includes a door-opening/closing-detecting-unit, an inside-of-vehicle-determining-unit forming a communication-area inside the vehicle when one door changes from the opened-state to the closed-state, and determining whether the response-signal is received, an outside-of-vehicle-determining-unit forming a communication-area outside the vehicle when the response-signal is not received, and determining whether the response-signal is received, a locking-control-unit automatically locking the doors when the response-signal is received, when all the doors are closed and presence-of-reception is changed to absence-of-reception, and a storing-unit storing history-information indicating that the response-signal is received. When the response-signal is not received, and the storing-unit stores history-information, the locking-control-unit automatically locks the doors when all the doors are closed and reception is absent.03-10-2011
20120139699RFID-based electric seal - An electric seal includes a lock member having a compartment and an orifice communicative with each other and having a spring blade, a latch device engaged in the lock member, an antenna device having a segment engaged with the spring blade, a lock shaft engageable through the orifice and into the compartment of the lock member and lockable to the lock member with the latch device, and a circuit board attached to the lock shaft and having an RFID chip coupled to an electric circuit, the electric circuit includes a contact for selectively engaging with the upper segment of the antenna device and for electrically connecting the electric circuit to the antenna device when the lock shaft is engaged into the orifice of the lock member.06-07-2012
20130127593Method of distributing stand-alone locks - An authentication server for a wireless lock system comprising a wireless lock and a key device is configured to receive and authenticate a validation message. The validation message is created at the wireless lock from a secret key contained in the wireless lock. The authentication server receives the validation message from the key device, receives a certificate of ownership provided by the user, and authenticates the validation message and key device using copies each stored in a database of the authentication server. The authentication is configured to associate the user with the lock ID upon successfully authenticating the validation message, thereby enabling the authorizations server to provide the user with digital credentials to open the lock.05-23-2013
20090184801Method for Unlocking a Lock by a Lock Device Enabled for Short-Range Wireless Data Communication in Compliance With a Communication Standard and Associated Device - A method is presented for unlocking a lock by a lock device enabled for short-range wireless data communication in compliance with a communication standard. In one embodiment, the method includes: a) detecting a key device within operative range of the lock device; b) determining a wireless communication address of the key device; c) evaluating the determined key device address by reference to a data storage with a number of wireless communication addresses stored therein; d) generating an evaluation result from said evaluating step c), wherein a match between the determined key device address and any of the wireless communication addresses stored in the data storage is a requisite for a positive evaluation result; and e) unlocking said lock if a positive evaluation result is generated in step d).07-23-2009
20090322474System for turning on and off power using door card key - Disclosed herein is a system for turning on and off power using a door card key. Transmission means includes a switch unit turned on and off depending on the insertion of the door card key, a switch monitoring unit configured to generate a clock signal, a microcomputer unit configured to generate an RF signal, a transmission signal amplification unit configured to amplify the RF signal generated by the microcomputer unit, and a transmission unit configured to transmit the amplified RF signal. Reception means includes a reception unit configured to receive the RF signal from the transmission means, a reception signal amplification unit configured to amplify the RF signal from the reception unit, a drive signal generation unit configured to convert the RF signal into a drive signal and then output the drive signal, and a control switch unit turned on and off in response to the drive signal.12-31-2009
20110018683MANAGEMENT OF THE IDENTITIES OF USERS IN A SYSTEM - The identity of a user to be associated with a terminal adapted for communication in a communication network is managed. The network provides a service based on the identity of the user. A contactless transaction is established at the terminal with an identification entity. During the transaction, a piece of information on the identity of the user stored in the identification entity is received. Finally, the identity of the user obtained from said information is stored. The identity of the user is erased at the terminal when the terminal is subjected to a specific action.01-27-2011
20120068817ELECTRONIC LOCK BOX PROXIMITY ACCESS CONTROL - An electronic lock box system includes a wireless portable transponder that communicates with an electronic lock box using a low power radio link. The portable transponder includes: a wide area network radio to communicate to a central clearinghouse computer, a motion sensor to activate its wide area network radio, and a connector to communicate with a secure memory device. The electronic lock box sends a hail message that is intercepted by the portable transponder; the hail message includes identification information. The portable transponder responds with a message that includes a time sensitive encryption key; the lock box authenticates this response message using its own time sensitive encryption key. If the messages are authenticated, the lock box sends an access event record to the portable transponder, and this access event record is stored in the secure memory device. If a wide area network is available, the portable transponder sends the access event record to the central clearinghouse computer.03-22-2012
20100164682IC CARD, DATA CONTROL METHOD AND PROGRAM - There is provided an IC card including a recording unit (card CPU) to record display request data for requesting display on a display unit and control data for controlling display on the display unit onto card memory in response to a request from an external device, and a verification unit (display CPU) to verify data consistency by comparing predetermined control commands contained in the display request data and the control data recorded on the card memory.07-01-2010
20100123547RFID DETECTION AND IDENTIFICATION SYSTEM INCLUDING AN RFID READER HAVING A LIMITED TRANSMIT TIME AND A TIME-OUT PERIOD TO PROTECT A MEDICAL DEVICE AGAINST RFID-ASSOCIATED ELECTROMAGNETIC INTERFERENCE - A system is provided for identifying implanted medical devices, leads and systems, as well as objects in close proximity to a patient having an implanted active medical device, using a radio frequency identification (RFID) tag having retrievable information relating to the AIMD, lead system and/or patient. An RFID tag communicator includes a circuit for limiting the total continuous transmit time of an interrogation signal, and a time-out circuit for delaying a second and any subsequent interrogation of the RFID tag.05-20-2010
20110102138System And Method For Authorizing A Remote Device - A system and method for authorizing a remote device amongst multiple remote devices for passive functions, such as passive entry and passive start, includes a vehicle having a plurality of strategically located antennas, combinations of which transmit a query signal and receive query responses, a challenge antenna amongst the plurality of antennas for transmitting a challenge signal to at least one of the multiple remote devices in accordance with a challenge order, and a control unit having a controller in communication with the antennas for determining the challenge order based upon the query responses. The controller can determine whether a remote device is located in an authorization zone, out of an authorization zone, or whether the remote device's location is indeterminate.05-05-2011
20110102139System And Method For Authorizing A Remote Device - A system and method for authorizing a remote device amongst multiple remote devices for passive functions, such as passive entry and passive start, includes a vehicle having a plurality of strategically located antennas, combinations of which transmit a query signal and receive query responses, a challenge antenna amongst the plurality of antennas for transmitting a challenge signal to at least one of the multiple remote devices in accordance with a challenge order, and a control unit having a controller in communication with the antennas for determining the challenge order based upon the query responses. Upon a failure, the system determines which of the remote devices to challenge next based upon the failure type and the number of retries remaining.05-05-2011
20120119877PROGRAMMABLE ELECTRONIC LOCKBOX SYSTEM - A programmable lock system is provided for access restricting and user tracking. The system includes a lock mechanism, a microcontroller, and an input device for receiving passing information. The microcontroller reads the received passing information and determines whether to unlock the lock mechanism. The system further includes an inlet for receiving an external storage with pre-programmed code. The microcontroller determines whether to access data contained therein based on the pre-programmed code.05-17-2012
20120200390System and method to streamline identity verification at airports and beyond - A system and method of performing identity verification based on the use of mobile phones or mobile computing devices in conjunction with a secure identity authority; said method to be used as an alternative to conventional identity verification using paper-based documents such as driver's licenses and passports. The new method improves speed, accuracy, cost, and reliability of identity verification for entities that need to verify identity, as well as convenience for end-users.08-09-2012
20090027159Method and Central Device for Controlling Access to Secure Areas or Devices - A mobile device which is assigned to a person transmits an identification to a central device where localization of the mobile device is initiated. After the mobile device has been located in an area of an access system, the identification is checked for authorization for access via the access system. Access via the access system is either allowed or denied based on the result of the check. Access by an authorized person to secure areas or devices with the aid of a wireless device which is usually carried along—for example a mobile radio terminal or a DECT terminal—thus becomes considerably easier and more convenient.01-29-2009
20100033301Automobile anti-theft remote control device and a charger therefor - The present invention relates to an automobile anti-theft remote control device and a charger therefor in the field of automobile electronic anti-theft technology and more particularly pertains to a chargeable automobile anti-theft remote control device with a voice prompt function and a charger therefor. The chargeable battery is disposed in the anti-theft remote control device and its body has a charging socket. The remote control device comprises a voice prompt circuit, a vibration circuit and a display unit. The charger for the remote control device is disposed with a charging plug which is adapted to engage with the charging socket of the remote control device and to charge the chargeable battery in the remote control device. The power source input plug of the charger is adapted to engage with the car cigarette lighter socket for the power source input. The charger comprises a voltage detection circuit and a charging indication unit. The technical proposal of the present invention can charge the battery directly in an automobile, thereby achieving the objects of being convenient for use, facilitating saving in resources, and reducing the uses of primary batteries. Besides, the sound prompts of the remote control device are so diverse that users can have their personalized selections, thereby increasing the alertness. The display of the remote control device is so colorful that it is more appealing.02-11-2010
20100245038AUTOMATIC WALK-AWAY DETECTION - A method and system for walk-away locking of a vehicle. The vehicle may be automatically locked when an occupant walks away from the vehicle in a passive manner. The automatic locking capabilities may be incorporated within an energy conservation strategy that allows one or more vehicle components and a fob to enter a sleep mode or otherwise become inactive at particular intervals when signals necessary to automatically locking the vehicle are less likely.09-30-2010
20110254661PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE - A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.10-20-2011
20100321154METHOD AND SYSTEM OF DETERMINING AND PREVENTING RELAY ATTACK FOR PASSIVE ENTRY SYSTEM - A system and method for preventing relay attack on a passive entry system (PES) or other passive system (PS) included within a vehicle or other entity. The relay attack prevention may be based in part on an assessment of whether the fob is able to distinguish signal strength relative to messages communicated form different antennas within the vehicle and/or amongst different signal amplitude communicated from the same antenna.12-23-2010
20100321153APPARATUS AND METHOD FOR PERFORMING A SEQUENCE OF OPERATIONAL INSTRUCTIONS - An apparatus and method of performing a sequence of steps is provided. The apparatus includes a controller that stores the sequence of steps and displays the steps in order to the operator. The apparatus includes a positioning module that confirms the operator position and a reader module to confirm the identification of the equipment to be worked on. An programmable key is also provided for storing a sequence of unlock codes that allows the operator open the equipment and cabinets in the same sequence as the sequence of steps.12-23-2010
20110133886MOBILE IDENTIFICATION TRANSMITTER IN A SAFETY SYSTEM - The invention relates to a mobile identification transmitter (06-09-2011
20110084798System Interaction with a Movable Barrier Operator Method and Apparatus - A secure communication link (04-14-2011
20120146765SWITCH MODULE AND LIGHTING CONTROL SYSTEM COMPRISING THE SWITCH MODULE - A switch module is designed to facilitate user definition of a group of switch modules that control the same lamp. A lamp unit (06-14-2012
20100214061ALL WEATHER HOUSING ASSEMBLY FOR ELECTRONIC COMPONENTS - An all weather housing assembly for protection of electrical components includes a first housing having an open end and defining a first compartment for receipt therein of electronic components; a cover attached to the first housing for enclosing the first compartment, the cover further including a mounting structure for receiving and retaining a power source which structure is mounted on a side of the cover that is exterior to the enclosed first compartment; and a second housing having an open end and defining a second compartment that is dimensioned to cover and protect a power source when received and retained by the mounting structure of the cover, the second housing being connected to the first housing independent of the attachment of the cover to the first housing.08-26-2010
20110181390VEHICLE KEY FOR STORING A VEHICLE IDENTIFICATION - A vehicle key for storing a vehicle identifier with a communication unit and a memory unit, wherein the communication unit is designed to receive the vehicle identifier from a transmitter, and wherein the memory unit is designed to store the received vehicle identifier.07-28-2011
20100176918Identification and tracking of information stored on radio frequency identification devices - A method and apparatus for detecting and tracking an object within a defined area, and determining its position, status, movement and identity therein, includes interrogating the defined area to communicate with an information device associated with an object and transmit information received to a master controller unit, which determines the object's presence, position, status, movement and identity within the defined area. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.07-15-2010
20100237988Communications apparatus - An electrode group is provided in a portable terminal carried by a human body for transmitting a transmission signal to the human body functioning as a transmission medium. The electrode group contains three electrodes arranged respectively at three vertices of an equilateral triangle. Three types of driving electrode pairs are defined as respectively having different combination of optional two electrodes. While changing the driving electrode pairs for use in order one pair by one pair, the transmission signal based on the same transmission data is repeatedly transmitted as many times as the number of driving electrode pairs.09-23-2010
20100245039Mobile unit - A mobile unit includes a LF antenna having a predetermined receiving frequency band and gain to receive a LF signal, a determination circuit for determining whether the LF signal received by the LF antenna is an authorized LF signal, a controller activated in response to a determination by the determination circuit that the LF signal received by the LF antenna is the authorized LF signal, a damping resistor connected to the LF antenna, a switch for enabling and disabling the damping resistor, and an antenna gain adjuster for reducing the gain of the LF antenna in response to a determination by the determination circuit that the LF signal received by the LF antenna is different from the authorized LF signal by controlling the switch in such a manner that the damping resistor is enabled.09-30-2010
20110115605ENERGY HARVESTING SYSTEM - An energy harvesting system for use with a vehicle including an RF transmitter positionable in a vehicle and a key fob having an antenna configured to receive an RF signal from the RF transmitter and convert the RF signal to electrical energy, a power management circuit configured to distribute the electrical energy in the key fob, and an energy storage device configured to store at least some of the electrical energy converted from the RF signal.05-19-2011
20120038456THEFT PREVENTION SYSTEM AND METHOD - A theft prevention system includes an RFID reader configured to read an RFID tag to authenticate access to a predefined area, a laser scanner configured to scan the predefined area and detect an object in the predefined area, and a security component configured to initiate a security action when the detected object is at least one of an unauthenticated object and an unauthorized object.02-16-2012
20110316667MESH NETWORK DOOR LOCK - Systems and methods are disclosed for sending a code from a mesh network key and wirelessly communicating the code with one or more mesh network appliances over a mesh network such as ZigBee; receiving the code over the mesh network by a mesh network lock controller; and providing access to the secured area upon authenticating the code.12-29-2011
20110063076Apparatus for preventing unauthorized use of a vehicle - An apparatus for protecting a vehicle includes a fob in the possession of a person who whishes to use the vehicle. The fob includes a fob code. A proximity sensor mounted on the vehicle is used to actuate circuitry for interrogating the fob so as to retrieve the fob code. The fob code is then matched to a vehicle code to determine whether the person possessing the fob is authorized to use the vehicle. The proximity sensor may include a capacitive sensor, and inductive sensor, or both.03-17-2011
20120154113WIRELESS SIGNAL ACCESS APPARATUS AND METHOD FOR REMOTELY CONTROLLING APPLIANCE THROUGH THE SAME - A wireless signal access apparatus receives wireless signals of IEEE 802.11 standard for controlling at least one appliance. The appliance may receive control signals of IEEE 802.15 standard, to be controlled according to the control signals. The wireless signal access apparatus receives the wireless signals having control data to generate the control signal of IEEE 802.15 standard, and send it to the appliance for omnidirectional remote control of the appliance.06-21-2012
20120154112Integrated On-line Door Control System with Wireless Credential Interface - An access control unit can receive door specifying credentials wirelessly. Received credentials can be processed and a determination made to permit access. The unit can also receive signals from similar units. The received signals can be retransmitted.06-21-2012
20110074541LOCKER SYSTEM AND METHOD - The present disclosure describes a system for managing a plurality of lockers proximate a theme park attraction, the system having an electronically actuated lock disposed on the plurality of lockers, a guest identifier carriable on the guests person, the identifier usable as an electronic key configured to lock and unlock the lock, an egress sensor positioned at an exit of the theme park attraction and a processor in communication with the lock and the egress sensor and configured to unlock the lock subsequent to being signaled by the egress sensor. A method for using and managing a plurality of lockers is also described.03-31-2011
20100289619ANTENNA DEVICE - An antenna device includes an antenna element, a wireless circuit, and electronic circuit, a substrate, a conductor, and a stub. The antenna element transmits or receives a communication signal. The wireless circuit is connected to the antenna element. The electronic circuit differs from the wireless circuit. The wireless circuit and electronic circuit are arranged in positional isolation on the substrate. The conductor is connected to the substrate to connect the antenna device to another device. The stub is arranged in a substrate part in which the wireless circuit is located. The stub has a pattern length that causes resonance at one fourth of a wavelength of the communication signal.11-18-2010
20100289618SYSTEMS, METHODS, AND KITS FOR AUTOMATICALLY ACTIVATING A GARAGE DOOR OPENER - Systems, methods, and kits for automatically activating a garage door opener. A garage door opener system is supplemented with motion sensor technology or RFID technology to allow for automatic activation of a garage door opener. An automobile that is moving near or is proximate to a garage associated with at least one garage door opener can cause the garage door opener to be automatically activated to open or close a garage door that is operatively connected to the garage door opener.11-18-2010
20100289617RFID Reader - Embodiments of the invention relate to the field of RFED (radio frequency identification). Some particularly preferred embodiments relate to a high-Q, so-called “full duplex” (FDX) RFID Reader. An RFID tag reader, the reader comprising: an electromagnetic (em) field generator for generating an electromagnetic (em) field for modulation by said tag, said modulation comprising modulated load of said em field by said tag; a detector system responsive to fluctuations in strength of said em field at said reader; a negative feedback system responsive to said detector system to provide a control signal for said em field generator for controlling said em field generator to reduce said detected fluctuations; and a demodulator responsive to said control of said em field to demodulate said em field modulation by said tag.11-18-2010
20120126942TRAINABLE WIRELESS CONTROL SYSTEM - The invention relates to a trainable wireless control system (05-24-2012
20100207723ELECTRICALLY LOCKING DEVICE AND ELECTRIC LOCK SYSTEM AND UNLOCKING METHOD THEREOF - An electric lock system includes an electrically locking device including a memory unit, a first communication unit, an electric lock and a first processing unit, and a wireless communication device including a second communication unit, a second processing unit, and a second input unit. The memory unit stores an unlock code, a request code and a message. The first processing unit compares an input code with the request code and controls the first communication unit to transmit the message to the communication device if the input code matches the request code. The second processing unit controls the second communication unit to transmit an unlock request code to the first communication unit according to the message received by the second communication unit. The first processing unit compares the unlock request code with the unlock code, and unlocks the electric lock if the unlock request code matches the unlock code.08-19-2010
20120169461ELECTRONIC PHYSICAL ACCESS CONTROL WITH REMOTE AUTHENTICATION - The system has an authorizing device, such as a cellular telephone, and a mechanism for receiving information related to a particular facility and the user's access rights based on the location of the authorizing device. The authorizing device is placed in proximity to a secured portal. The user is required to authenticate theirself to the authorizing device via biometric and/or a PIN. The authorizing device then sends a signal to a locking device associated with the secured portal.07-05-2012
20120313751SYSTEM AND METHOD FOR INDIVIDUALLY PROVIDING A FUNCTION TO A USER - A system and method are provided for user-specific provision of at least one function to a user that has a mobile unit storing user data of the user, wherein the user data is transmitted via a background system to a controllable device that provides the functions to the particular user individually according to the transmitted user data of the user. The device may be suitable for a wide variety of application areas, in particular for vehicle units, production devices, media playback devices and devices that are made available to the user by a third party, for example, a rental car agency. The functions can be provided in a manner familiar to the user by a device made available to the user by a third party.12-13-2012
20120313750Security System, Modules and Method of Operation Thereof - The present invention is concerned with a security system. The system may comprise at least a first handheld device, a second handheld device, a first secure entity, and a second secure entity. The first handheld device and the first secure entity are electronically pre-registered with each other, the first handheld device and the second secure entity are electronically pre-registered with each other, the second handheld device and the first secure entity are electronically pre-registered with each other, and the second handheld device and the second secure entity are electronically pre-registered with each other, with pre-registration of each respective handheld device and secure entity pair establishing a unique channel for the respective handheld device and secure entity pair.12-13-2012
20120176219ACCESS IDENTIFICATION AND CONTROL DEVICE - An access identification and control device, especially suitable for being used for all those applications wherein the use of an apparatus or a service must be allowed only to the users that have the requirements imposed by the apparatus/service itself or if a check must be carried out on an apparatus or service, including at least one fixed part or reader (07-12-2012
20120075062METHOD AND SYSTEM FOR ACCESS TO SECURE RESOURCES - A system and method for accessing secured resources using a portable device. When a user with such a portable device is within close proximity to a locked door or other secured resource, a verification process can be automatically initiated on the device. The user verification could utilize all the input and sensor methods on the device. Once the identification process has successfully completed, an access code can be transmitted to the locked door or device via wired or wireless network. This allows for reduced electronics required at these locked doors and allows for more dynamic security measures.03-29-2012
20120075061AUTOMATIC ASSOCIATION OF MEDICAL ELEMENTS - A system and method of associating a plurality of objects is disclosed. A physical space is defined and a real-time locating system (RTLS) is used to determine objects that are within the physical space. The objects determined by the RTLS to be within the physical space are associated. The objects include at least one of a caregiver, a patient, a medical device, a medication, and a medical substance.03-29-2012
20120182122DETECTION DEVICE, DETECTION SYSTEM AND DETECTION METHOD OF RADIO WAVE TRANSMITTING/RECEIVING BODY - A detection device that detects existence of a radio wave transmitting/receiving body inside a specific space has a first antenna, a second antenna, a controller that controls a first detection signal and a second detection signal that the first antenna transmits to an inside of the specific space, and a disturbing signal that the second antenna transmits, a third antenna that receives a response signal transmitted to the first detection signal and the second detection signal, which have been received by the radio wave transmitting/receiving body, and a determination unit that determines an existence position of the radio wave transmitting/receiving body, based on the response signal received by the third antenna.07-19-2012
20120262272MONITORING UNIT CONFIGURATION MANAGEMENT - A monitoring device in accordance with the disclosure stores a serial number list in non-volatile memory, the serial number list including data indicative of at least one valid serial number associated with one or more key fobs permitted to interact with the monitoring device. The monitoring device is configured to receive a wakeup signal via a key fob interface configured to communicate with a key fob. The monitoring device reads a serial number from a key fob via the key fob interface and searches the stored serial number list for data indicative of a valid serial number matching the serial number read via the key fob interface. The monitoring device reads action data from the key fob via the key fob interface, the action data being indicative of an action to be taken by the monitoring device. The monitoring device, in response to the read serial number matching a valid serial number of the stored serial number list, takes an action based on the action data.10-18-2012
20120188054REMOTE SECURITY ENTRANCE APPLICATION - A security system and method for a restricted entrance such as a vehicle gate is disclosed where requests for entry are issued from a device such as a computer or smartphone and directed to a dispatch operator. The dispatch operator locates the position of the requested entrance and sends a request to a control computer that verifies the user's authority to enter. If the user is authorized for entry, the control computer sends a command to a gate opening device or other mechanical device to open or unlock the gate. The system can also be used with software running in background to automatically send a request for entry when the user is within a predefined distance from the gate using GPS technology or other means.07-26-2012
20120229254Field Superposition System and Method Therefor - Wireless communications between a vehicle base station and a transponder are authenticated. Interior and exterior antennas are respectively driven using first driving currents, the interior antenna being separated from the transponder by a portion of a vehicle in which the vehicle base station resides. Separate vector components of the respective fields emitted by the interior and exterior antennas are received and detected at the transponder. Superposition factors are calculated for the interior and exterior antennas based upon the separate vector components. Each of the interior and exterior antennas is concurrently driven using the same phase, respectively using the driving currents multiplied by the superposition factors. Superposed vector components are detected for a superposed signal including signals from both antennas received at the transponder. The transponder is authenticated based on the detected superposed vector components for the superposed signal being within a noise-based range of the sum of the separate vector components for each of the interior and exterior antennas as multiplied respectively by the superposition factors for the interior and exterior antennas.09-13-2012
20120229253AFTERMARKET SOUND ACTIVATED WIRELESS VEHICLE DOOR UNLOCKER - An aftermarket, sound activated, wireless, vehicle door unlocking device comprising a sound sensor, processor, memory, and an RF transmitter, transponder, or transceiver capable of generating an unlocking signal, and method of using the device. The device may be easily installed by unskilled users without modifying the vehicle wires or structure. The operator of the device will program the device with an unlocking sound sequence, and the RF unlocking codes needed to unlock the vehicle door. The device continually monitors the sensor for unlocking sounds, and delivers a door unlocking signal when this sound is detected. Various embodiments, including embedded RF key embodiments, solar powered embodiments, and alternative ways of programming the device are also discussed.09-13-2012
20120235787METHOD AND NEAR FIELD COMMUNICATION DEVICE AND CORRESPONDING COMPUTER PROGRAMME - A method and apparatus are provided for near field communication, which implement at least one communication reader configured to exchange data with at least one nomadic object. The method includes detecting a presence in the vicinity of the communication reader, delivering activation information, when a presence is detected, activating the power supply of the communication reader, upon reception of the activation information, and authorizing a self-service access according to at least one of said data exchanged.09-20-2012
20120268243DISTRIBUTION OF PREMISES ACCESS INFORMATION - Premises access information can be distributed using a system having a ticket server coupled to a remotely located premises server. The ticket server receives a ticket request from a host device. After interacting with the premises server, the ticket server sends access-related information to a visitor device. The visitor device can later use the access-related information to gain access to a premises.10-25-2012
20120268242VEHICLE SECURITY SYSTEM AND METHOD OF OPERATION BASED ON A NOMADIC DEVICE LOCATION - A vehicle security system for a vehicle equipped with a passive keyless entry/passive start (PEPS) security system including a nomadic device configured to determine a present location of the nomadic device (e.g. key fob, smart phone), and a controller configured to control a security-status based on the present location. The controller determines the security status based on the proximity of the nomadic device in order to thwart theft of the vehicle using a relay attack.10-25-2012
20110241830Portable transmitter - A portable transmitter has an inner cover, an outer cover, outer knobs, a cover, a circuit substrate, etc. The cover has projection parts made of elastic material. Each projection part projects toward a corresponding opening part of the outer cover through a corresponding penetration hole of the inner case. The front end of the projection part is contacted to the corresponding outer knob. The opposite part of the projection part is contacted to a corresponding tact switch formed on the circuit substrate while the projection part is elastically deformed and the inner case accommodates the cover. Each of the outer knobs is placed in the corresponding opening part of the outer case while the outer peripheral part of the outer knob is pushed onto the outer peripheral part of the wall surface of the opening part formed in the outer case by repulsive elastic force applied from the cover.10-06-2011
20120286927Wake Channel Indication for Passive Entry System - A passive entry system receives an electromagnetic interrogation signal transmitted from an interrogation antenna to a remote transponder, wherein the interrogation signal includes a wakeup pattern data sequence. A plurality of channel signals is generated within the transponder from a corresponding plurality of antennas in response to the electromagnetic interrogation signal. Bit detection is performed on each of the plurality of channel signals to detect the wakeup pattern sequence. A received signal strength indicator (RSSI) of the interrogation signal is determined using the plurality of channel signals, wherein only channel signals on which a valid wakeup pattern sequence is detected are used for determining the RSSI. A wakeup signal is asserted to wake up a processing module in the remote transponder only when the wakeup pattern sequence is detected on at least one of the plurality of channel signals.11-15-2012
20120286926WIRELESS KEY SYSTEM AND KEY LOCATION DETERMINATION METHOD - A wireless key system and location detection method determine whether a wireless key is located inside or outside a main body. A communication device in the main body transmits a wireless signal using an inner antenna and an outer antenna outside the main body having a different directivity. A wireless key measures direction of movement of the wireless key when the wireless signal is received by one of antennas having different directivities, detects one of the antennas receiving the highest signal level of the wireless signal as a first antenna, selects one of the antennas having the same directivity as the inner antenna as a second antenna according to the measured direction of movement and detected directivity of the antenna, and decides that the wireless key is inside the main body based on the signal levels of the wireless signals received by the first and second antennas.11-15-2012
20120286928SYSTEMS AND METHODS FOR MOBILE AUTHORIZATIONS - A mobile device may receive security credentials from a contactless device via a contactless communication channel to authorize functions that may be performed by the mobile device. For example, purchase transactions may be authorized to be completed by a mobile device after payment information communicated from a physical payment card to the mobile device is confirmed to match at least a portion of payment information stored within a memory of the mobile device. A mobile device may forward the security credentials to a network entity for remote authorization of a requested function.11-15-2012
20120139702Protection of a Medical Device Against RFID-Associated Electromagnetic Interference Like an Automobile Keyless Entry System Having an RFID Interrogator - A keyless entry system for an automobile is described. The keyless entry system comprises a radio frequency identification (RFID) tag that has been programmed to selectively unlock an automobile when the RFID tag is within a predetermined distance and, optionally, to lock the automobile when the RFID is outside the predetermined distance. An interrogator housed on or within the automobile comprises an actuatable RF signal generator for transmitting an electromagnetic signal and a time-out circuit. Regardless whether the programmed RFID tag is detected, or not, the RF signal generator transmits a first electromagnetic signal having a first limited total continuous transmit time, followed by an interim period of a defined length where the time-out circuit renders the interrogator incapable of transmitting the electromagnetic signal, followed by the RF signal generator transmitting a second electromagnetic signal having a second limited total continuous transmit time.06-07-2012
20120139701SYSTEMS, METHODS, AND KITS FOR AUTOMATICALLY ACTIVATING A GARAGE DOOR OPENER - Systems, methods, and kits for automatically activating a garage door opener. A garage door opener system is supplemented with motion sensor technology or RFID technology to allow for automatic activation of a garage door opener. An automobile that is moving near or is proximate to a garage associated with at least one garage door opener can cause the garage door opener to be automatically activated to open or close a garage door that is operatively connected to the garage door opener.06-07-2012
20120139700SYSTEMS, METHODS, AND KITS FOR AUTOMATICALLY ACTIVATING A GARAGE DOOR OPENER - Systems, methods, and kits for automatically activating a garage door opener. A garage door opener system is supplemented with motion sensor technology or RFID technology to allow for automatic activation of a garage door opener. An automobile that is moving near or is proximate to a garage associated with at least one garage door opener can cause the garage door opener to be automatically activated to open or close a garage door that is operatively connected to the garage door opener.06-07-2012
20080224824Keyless Entry System - A keyless entry system that prevents a steering shaft and such from being unlocked without any intention of a passenger. A portable device is carried by a passenger and a vehicle control device for carrying out a certification process for the portable device to lock or unlock a device subject to locking is mounted to a vehicle. The portable device sends instruction information giving an instruction to limit unlocking of the device subject to locking to the vehicle control device in accordance with an instruction from the passenger. The vehicle control device maintains locking of the device subject to locking in the case of receiving the instruction information from the portable device.09-18-2008
20130176107WIRELESS ACCESS CONTROL SYSTEM AND RELATED METHODS - A wireless access control system includes a remote access device and an electronic lock. The electronic lock communicates with the remote access device. The electronic lock controls the ability to lock and unlock a door in which the electronic lock is disposed. The electronic lock determines when the remote access device is at a distance less than or equal to a predetermined distance from the lock to enable the lock to be unlocked.07-11-2013
20090261945PASSIVE ENTRY SYSTEM AND METHOD FOR PERFORMING FUNCTION THEREOF - Provided are a passive entry system for changing a scan method to reduce battery consumption of a smart key and a method for performing a function thereof. In the passive entry system, a smart key ECU periodically transmits a low-frequency scan signal for detecting the smart key. When the smart key being in a slip state is located within a receiving radius of the scan signal, the smart key receives the scan signal and is converted into an active state. Battery consumption of the smart key can be reduced because the smart key normally being in the slip state is converted into the active state when receiving the scan signal from the smart key ECU. Furthermore, the smart key is converted into the active state only within the low-frequency scan signal receiving radius formed near an automobile and requests the smart key ECU to perform a function of the automobile, for example, a function of closing/opening doors. Accordingly, a reliable passive entry system can be achieved.10-22-2009
20130099892ACCESSING A VEHICLE USING PORTABLE DEVICES - A primary portable device can access a vehicle by transmitting an activation message including a vehicle access credential to the vehicle. The primary portable device can additionally enable a secondary portable device to access the vehicle by transmitting the vehicle access credential to the secondary portable device. The connections between the primary portable device, secondary portable device, and vehicle can be based on a short-range wireless protocol, such as Bluetooth or Bluetooth LE.04-25-2013
20130141212VEHICLE ACCESS - A case for a mobile telephone or other nomadic device, the case comprising communication means for wirelessly communicating with a security and/or access system of a vehicle or property. The communication means may be embedded within the material forming the case or may be retained in a slot or recess within the case. The communication means comprises means arranged to transmit control or operation commands to the vehicle or property so as to operate or control one or more functions or devices. The case may comprise one or more buttons or switches configured to be actuated by the user to transmit said commands. A mobile telephone or other nomadic device having such a case. A vehicle adapted to work with a mobile telephone or a case as described hereinbefore.06-06-2013
20080211625METHOD FOR TEMPORARILY INHIBITING, WHEN IT HAS BEEN DETECTED INSIDE A LOCKED VEHICLE, A PORTABLE REMOTE CONTROL UNIT KNOWN AS A TAG BELONGING TO A KEYLESS ENTRY DEVICE - A method for temporarily inhibiting, when it is detected inside a locked vehicle, a portable remote control unit, known as a tag, of a keyless entry device designed to implement access authorization procedures to allow access to the vehicle, these including an initial identification procedure which includes causing a central processing unit to periodically transmit a data frame incorporating a preamble consisting of a predefined wake-up code that can be identified by the tag. The inhibition method include defining a first wake-up code at least intended for the procedure of temporarily inhibiting the tags, and a second wake-up code specifically intended for the procedure of identifying the tags, and in setting up temporary inhibition procedures which consist in causing a specific data frame incorporating, in its preamble, the first wake-up code and designed to deactivate the recognition, by each target tag, of the second wake-up code, to be transmitted.09-04-2008
20130147599WIRELESS CONTROL OF EMERGENCY NOTIFICATION DEVICES - A system for controlling devices in an emergency system, the system having one or more emergency notification devices and a control device. The emergency notification devices have one or more outputs and are capable of using the one or more outputs for both emergency notification and non-emergency purposes. The control device is used for controlling the outputs of the emergency notification devices, and is wirelessly coupled to the emergency notification devices.06-13-2013
20100308961PASSIVE ENTRY SYSTEM AND METHOD FOR A VEHICLE - A passive entry system and method for determining the location of a remote transmitter positioned near a vehicle. The system and method including a transmitter configured to transmit one or more polling sequences. The polling sequences including one or more polling signals indicative of a particular side and/or door of the vehicle. The system and method further including a receiver configured to receive an acknowledgement signal from a remote transmitter in response to one or more of the polling sequences. The system and method also including a controller configured to determine if the remote transmitter is positioned near the first side or second side of the vehicle based upon the acknowledgement signal being in response to the first or second polling sequence.12-09-2010
20120274443SAMPLE MEASURING DEVICE AND SAMPLE MEASURING SYSTEM - A sample measuring device according to the present invention includes a measuring unit for performing measurement with respect to a particular component contained in a sample, a measurement data storage unit for storing measurement data obtained by the measuring unit, a display unit for displaying the measurement data, a sensor strip detector for detecting insertion and removal of a sensor strip to which the sample is applied, and a first data transmitter/receiver for transmitting the measurement data via wireless communication. The first data transmitter/receiver performs initial authentication process for wireless communication after insertion of the sensor strip is detected by the sensor strip detector.11-01-2012
20110254660INTEGRATED SYSTEM AND METHOD FOR TIRE PRESSURE MONITORING AND REMOTE KEYLESS ENTRY - An integrated system and method for tire pressure monitoring and remote keyless entry are applied to a vehicle and an RKE (remote keyless entry) fob (10-20-2011
20130154794ACCESS KEY FOR A MOTOR VEHICLE WITH NEAR-FIELD COMMUNICATION EXCHANGE CAPABILITY - The invention relates to an access key (06-20-2013
20120280788COMMUNICATIONS APPARATUS AND METHOD THEREFOR - Wireless communications between a vehicle base station and a transponder are effected. In accordance with one or more example embodiments, a modulation circuit and a first capacitor electrode are used to establish a capacitive electric field between the first capacitor electrode and another capacitor electrode, the respective electrodes and space therebetween (e.g., air) forming a capacitor. A pulsed wake-up signal is communicated between a base station and a remote transponder via the electric field, to activate a circuit in the remote transponder. A wake-up response signal (i.e., generated in response to the wake-up signal) is communicated between the remote transponder and the base station over a wireless channel. An authentication signal is then communicated between the base station and the remote transponder, via the electric field, in response to the wake-up response signal. An authentication response signal is then communicated between the remote transponder and the base station over a wireless channel.11-08-2012
20120280790SYSTEMS AND METHODS FOR CONTROLLING A LOCKING MECHANISM USING A PORTABLE ELECTRONIC DEVICE - Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises authenticating, at a web service, credentials received from a portable electronic device, detecting the proximity of the portable electronic device to the lock, and issuing a command for receipt by the lock from the web service or portable electronic device.11-08-2012
20120280789SYSTEMS AND METHODS FOR CONTROLLING A LOCKING MECHANISM USING A PORTABLE ELECTRONIC DEVICE - Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device.11-08-2012
20130120111KEYLESS ENTRY SYSTEM AND CONTROL METHOD THEREOF - A keyless entry system comprises a resonant unit, a control unit and a portable device. The resonant unit is disposed to at least one door and generates a sensing signal when sensing a user approaching or touching the door. The control unit receives the sensing signal and controls the resonant unit to transmit a first authentication signal. The portable device receives the first authentication signal and transmits a second authentication signal according to the first authentication signal. The control unit receives the second authentication signal and controls the door according to the second authentication signal.05-16-2013
20130187756ELECTRONIC KEY LOCKOUT CONTROL IN LOCKBOX SYSTEM - An electronic lockbox system includes a wireless portable transponder that communicates with an electronic lockbox using a low power radio link. The portable transponder includes: a wide area network radio to communicate to a central clearinghouse computer, a motion sensor to activate its wide area network radio, and a connector to communicate with a secure memory device. The electronic lockbox sends a hail message that is intercepted by the portable transponder; the hail message includes identification information. The portable transponder responds with a message that includes a time sensitive encryption key; the lockbox authenticates this response message using its own time sensitive encryption key. If an electronic key is used to access the lockbox, the improved system effectively disables the electronic key during a showing, so that the electronic key cannot be used to access another lockbox until the correct dwelling key has been placed back into the lockbox.07-25-2013
20130187755SYSTEMS AND METHODS FOR MANAGING SHOPPING CART AND OTHER WHEELED CONVEYANCE ASSETS - The inventive subject matter relates to systems and methods relating to managing shopping cart and other wheeled conveyance assets of an enterprise. More particularly, one aspect of the inventive subject matter relates to using radio frequency identification (RFID) tags and control units to track, manage, and maintain shopping cart and other wheeled conveyance assets of a enterprise, in order to immobilize such wheeled conveyance if an unauthorized attempt is made to move it outside a prescribed use area into a restricted area. In a further aspect of the inventive subject matter, said systems and methods permit authorized uses of such assets to take them into a restricted area.07-25-2013
20120019357ACCESS CONTROL DEVICE - The invention relates to an access control device, in particular for a switchgear cabinet system, having a central unit, which is designed to receive and evaluate access authorization data stored on personal transponders and to output release signals via a wireless signal transmission link and to release a relevant interlocking unit, and which has an authentication device with a testing stage in which comparison data for testing the received access authorization data for access authorization is present. Increased security is achieved in that, in addition, at least one input station having an input unit is present, which is or can be used to establish a wireless data transmission connection to the central unit for the transmission of input data that is different from the access authorization data, the authentication device is designed to operate in two stages and has a further testing stage, which is designed for the direct or indirect allocation of the input data to the access authorization data and to check agreement between the access authorization data and the input data with regard to the access authorization, and the central unit is designed to output the release signals when the access authorization has been established after checking by means of the further testing stage.01-26-2012
20130194068METHOD FOR PROVIDING WIRELESS VEHICLE ACCESS - To provide motor vehicle access, a connection is set up between an ID signal generator assigned to the vehicle and a wireless communication device. A first identification code, stored in the ID signal generator, is transmitted to the communication device. A connection is set up between the communication device and a service provider via a public communication network. The identification code is sent together with a second identification code which identifies the wireless communication device. A multi-part authorization message is generated by the service provider. Parts of the authorization message are sent to the communication device and parts transmitted to a control device in the vehicle. Access authorization of the communication device is checked on the basis of the part of the authorization message from the vehicle and the part from the communication device, via a connection between the communication device and the control device of the vehicle.08-01-2013
20120068818ACCESS CONTROL SYSTEM - An access control method can include sending an identification code to an access node using a mobile telephone. If the identification code is recognized as valid, an access code is sent from the access node to the mobile telephone and presented on the display of the mobile telephone. The access code is detected using a camera, and if the access code is recognized as valid, the access is granted.03-22-2012
20120086549FACILITATING ENTRY INTO AN ACCESS-CONTROLLED LOCATION USING A MOBILE COMMUNICATION DEVICE - Systems and methods facilitate entry into an access-controlled location using a mobile communication device. The method comprises receiving at the mobile communication device via a communication network an entry code that facilitates access to the access-controlled location, storing the entry code in a memory associated with the mobile communication device, and, in response to determining that the mobile communication device is within the predetermined distance of the access-controlled location, transmitting the entry code from the mobile communication device to an entry-control computer system, which determines whether the entry code is valid. The method may further comprise receiving at the mobile communication device an indication that the entry code is valid, and, in order to gain entry into the access-controlled location at an entrance to the access-controlled location, providing to the entry-control computer system via the mobile communication device the indication that the entry code is valid.04-12-2012
20130207778ACCESSORY FOR A MOBILE DEVICE - A mobile device includes an accessory. The accessory may include two communication modules. The accessory is configured to receive data from the mobile device wirelessly. The accessory is configured to store the data. The accessory is configured to transmit at least a portion of the data to a reader device.08-15-2013
20130207777EMULATED RADIO FREQUENCY IDENTIFICATION - A mobile communication device is equipped with hardware and/or software components to enable the device to output a data in a form of a radio frequency signal, emulating outputting of the data by either an active or a passive RFID transponder. The data may be a security key or an identifier. Emulation of an active RFID transponder includes facilitating selection of the data and instruction to output by a user. Emulation of a passive RFID transponder includes detecting for proximal presence of a RFID reader. Either case, provision of the data to the mobile communication device may include provision of associated signal attribute(s).08-15-2013

Patent applications in class Wireless transceiver

Patent applications in all subclasses Wireless transceiver