-
公开(公告)号:US20190226236A1
公开(公告)日:2019-07-25
申请号:US16196888
申请日:2018-11-20
发明人: Sundar Raj Dore Vasudevan , Dilip Bangaru , Adam M. Litwinski , William B. Ainley , Russell L. Steiner , Michelle Vickrey
CPC分类号: E05B47/0001 , E05B17/0091 , E05B47/00 , E05B47/0012 , E05B2047/0048 , E05B2047/0057 , E05B2047/0073 , E05B2047/0076 , Y10T70/7062
摘要: An apparatus and method is disclosed for electronic locks with a selectable power off function. The electronic lock includes an electronic controller disposed within a lock housing and operable to control a state of the lock between locked and unlocked positions. An electronic actuator electrically coupled to the controller is movable between first and second positions corresponding to a locked position and an unlocked position of the lock, respectively. The electronic lock further includes at least one electrical energy storage device and a selector switch coupled to the controller to define a desired state of the lock between one of an electrically locked (EL) and an electrically unlocked (EU) state in an electric power off condition.
-
公开(公告)号:US10044848B2
公开(公告)日:2018-08-07
申请号:US14728365
申请日:2015-06-02
摘要: A mobile device is configured to wirelessly authenticate with a reader device. The mobile device may receive an acoustic signal from a user, and a command may be determined based on the acoustic signal. The mobile device may transmit the command to the reader device if the mobile device and the reader device are authenticated. The reader device may receive the command, and may analyze the command to determine an action to be performed. The reader device may then perform the action if the mobile device is authorized to request the command to be performed.
-
公开(公告)号:US09852559B2
公开(公告)日:2017-12-26
申请号:US14728460
申请日:2015-06-02
IPC分类号: G06F3/00 , G06F3/01 , G07C9/00 , G06F3/0488 , G06F17/30
CPC分类号: G07C9/00182 , G06F3/011 , G06F3/017 , G06F3/0488 , G06F17/3087 , G06F2200/1636 , G07C2209/63 , G07C2209/64 , H04W4/027 , H04W4/046 , H04W48/04
摘要: A lock device is configured to receive a credential from a mobile device. The lock device is configured to monitor the distance between the mobile device and the lock device. The lock device is configured to detect an intent action by a user of the mobile device and unlock the lock device if the mobile device is within a predetermined distance from the lock device and the intent action is an approved intent action.
-
公开(公告)号:US11709825B2
公开(公告)日:2023-07-25
申请号:US17683937
申请日:2022-03-01
CPC分类号: G06F16/2379 , G06F16/27 , H04L63/102 , H04L63/20
摘要: A method according to one embodiment includes monitoring, by an access control device, for changes to a first access control database stored on the access control device, wherein the first access control database is associated with a first security ecosystem having a first set of security protocols; automatically updating a mediation database stored on the access control device to identify a change to the first access control database in response to a determination that the change occurred; and automatically updating a second access control database stored on the access control device based on the change identified in the mediation database and in response to the automatic update of the mediation database, wherein the second access control database is associated with a second security ecosystem different from the first security ecosystem and having a second set of security protocols different from the first set.
-
公开(公告)号:US11568032B2
公开(公告)日:2023-01-31
申请号:US16055597
申请日:2018-08-06
IPC分类号: H04W76/50 , G06F21/32 , H04W12/06 , H04W76/14 , H04W4/80 , G07C9/00 , G07C9/25 , H04M1/72415 , H04M1/72412
摘要: A mobile device is configured to wirelessly authenticate with a reader device. The mobile device may receive an acoustic signal from a user, and a command may be determined based on the acoustic signal. The mobile device may transmit the command to the reader device if the mobile device and the reader device are authenticated. The reader device may receive the command, and may analyze the command to determine an action to be performed. The reader device may then perform the action if the mobile device is authorized to request the command to be performed.
-
公开(公告)号:US20190045042A1
公开(公告)日:2019-02-07
申请号:US16055597
申请日:2018-08-06
摘要: A mobile device is configured to wirelessly authenticate with a reader device. The mobile device may receive an acoustic signal from a user, and a command may be determined based on the acoustic signal. The mobile device may transmit the command to the reader device if the mobile device and the reader device are authenticated. The reader device may receive the command, and may analyze the command to determine an action to be performed. The reader device may then perform the action if the mobile device is authorized to request the command to be performed.
-
公开(公告)号:US20180122169A1
公开(公告)日:2018-05-03
申请号:US15854349
申请日:2017-12-26
IPC分类号: G07C9/00 , G06F3/01 , G06F17/30 , G06F3/0488
CPC分类号: G07C9/00182 , G06F3/011 , G06F3/017 , G06F3/0488 , G06F17/3087 , G06F2200/1636 , G07C2209/63 , G07C2209/64 , H04W4/027 , H04W4/046 , H04W48/04
摘要: A lock device is configured to receive a credential from a mobile device. The lock device is configured to monitor the distance between the mobile device and the lock device. The lock device is configured to detect an intent action by a user of the mobile device and unlock the lock device if the mobile device is within a predetermined distance from the lock device and the intent action is an approved intent action.
-
公开(公告)号:US09870460B2
公开(公告)日:2018-01-16
申请号:US14728508
申请日:2015-06-02
CPC分类号: G06F21/34 , G06F2221/2113 , G07C9/00 , G07C9/00007 , H04L63/083 , H04L63/0853 , H04L63/102 , H04W12/06 , H04W12/08
摘要: A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second data of a second database type. The credential may further include a third sector including third data related to the second data. The first database type and the second database type may he different types.
-
公开(公告)号:US20170152680A1
公开(公告)日:2017-06-01
申请号:US15432473
申请日:2017-02-14
发明人: Sundar R. Dore Vasudevan , Dilip Bangaru , Adam M. Litwinski , William B. Ainley , Russell L. Steiner , Michelle Vickrey
CPC分类号: E05B47/0001 , E05B17/0091 , E05B47/00 , E05B47/0012 , E05B2047/0048 , E05B2047/0057 , E05B2047/0073 , E05B2047/0076 , Y10T70/7062
摘要: An apparatus and method is disclosed for electronic locks with a selectable power off function. The electronic lock includes an electronic controller disposed within a lock housing and operable to control a state of the lock between locked and unlocked positions. An electronic actuator electrically coupled to the controller is movable between first and second positions corresponding to a locked position and an unlocked position of the lock, respectively. The electronic lock further includes at least one electrical energy storage device and a selector switch coupled to the controller to define a desired state of the lock between one of an electrically locked (EL) and an electrically unlocked (EU) state in an electric power off condition.
-
公开(公告)号:US20220398242A1
公开(公告)日:2022-12-15
申请号:US17683937
申请日:2022-03-01
摘要: A method according to one embodiment includes monitoring, by an access control device, for changes to a first access control database stored on the access control device, wherein the first access control database is associated with a first security ecosystem having a first set of security protocols; automatically updating a mediation database stored on the access control device to identify a change to the first access control database in response to a determination that the change occurred; and automatically updating a second access control database stored on the access control device based on the change identified in the mediation database and in response to the automatic update of the mediation database, wherein the second access control database is associated with a second security ecosystem different from the first security ecosystem and having a second set of security protocols different from the first set.
-
-
-
-
-
-
-
-
-