摘要:
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.
摘要:
Described are techniques for security access and control. The techniques use a system that includes a card reader system including a processor and memory. The card reader system is configured to execute a security application that configures the card reader system to receive an embedded electronic credential from an access badge, with the embedded electronic credential carried by the access badge and being associated with a user, determine whether the credential indicates an authorized access, generate a message according to a result of the determination, and send the message to a distributed ledger that logs the result in the distributed ledger.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
摘要:
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
摘要:
Disclosed are techniques that use user devices and a server system to process employee generated requests to allow guest access registration. A server system receives a request for guest registration and the server system sends in response to the request a message to a guest user device with the message including a request for user credentials. The user credentials are supplied from a user's PII wallet carried by the user. The server system receives from an employee user device a verification of the guest registration, produces an access policy for the guest user device and causes the produced policy and guest credentials to be stored in a distributed ledger system.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange scenarios in which a requesting system and user devices, the distributed ledger system, the broker system and the requesting system are interconnected via an electronic network through respective network interface devices.
摘要:
Apparatuses, systems for, and methods of transporting digital signals and radio-frequency (“RF”) signals are disclosed. In accordance with a preferred embodiment of the invention, an intelligent network (e.g., a combination router) and corresponding method are provided for transporting RF signals to, for example, an RFID antenna and transporting digital signals to, for example, a controller. In a preferred embodiment, the intelligent network is implemented with a manager unit for controlling a plurality of network devices to facilitate the efficient management of RFID-enabled devices. The network devices may include a combination router/switch, which has the capability of switching both digital data and RF data, RFID readers, RFID reader/writer pads, and other devices. In accordance with preferred embodiments, the intelligent network allows enhanced flexibility in controlling systems for interrogation of RFID antennae.