摘要:
A vehicle includes: receiver(s), a timer counting time, memory, and processor(s) configured to: receive a timestamped signal from a fob; compare the timestamp to a time window; reject the timestamp if the timestamp is outside the time window; expand the time window with the counted time; compute the time window as a trigonometric function of the counted time and a predetermined angle.
摘要:
In the case where the scheduled use start time has been acquired, the controller shortens the interval between the adjacent working time periods of the transceiver as the scheduled use start time approaches. Thus, in a case where there is a long time before the scheduled use start time, the power consumption is decreased. As the scheduled use start time approaches, the transceiver verifies the user immediately.
摘要:
A method for more efficiently delivering goods to recipients is disclosed. Such a method includes receiving a communication, such as an email or text message, containing a unique identifier (e.g., tracking number, order number, product number, etc.). The unique identifier is associated with an order of goods intended for delivery to a recipient. The method extracts the unique identifier from the communication and generates an access code for association with the unique identifier. The access code enables a delivery agent to gain access to an enclosure of the recipient for deposit of the goods therein. In certain embodiments, the access code is derived from the unique identifier, such as by using certain digits or portions of the unique identifier to generate the access code. A corresponding system is also disclosed.
摘要:
A WiFi Wallet includes an app that installs on a smartphone or other mobile device having a wireless local area network connection manager and mobile telephone network access. Local preexisting wireless access points and routers are adjusted to transmit type (R)SSID service set identifiers in their beacons and to invite brand-named guest network logons. The WiFi wallet app is provisioned with a matching password for the (R)SSID that will gain it Internet access. Once on the Internet, the WiFi wallet app logs onto a network server to deposit an encrypted cardholder token. A location identifier for the particular local wireless access points and router naturally tags on. The network server generates an anonymous WiFi Wallet token and sends it to the user over mobile telephone network and the host location over secure Internet. At checkout, lock-open, or secure log-in, the user displays their token to the host location security barrier.
摘要:
The present invention relates to access control systems using proximity cards, and in particular, to a proximity card and an associated method for controlling activation of the proximity card. The proximity card includes an actuation sensor and an access electronics system connected to the actuation sensor, the access electronics system configured to activate the proximity card in response to an input from the actuation sensor to enable communication of the access information from the proximity card.
摘要:
A delivery system uses secure containers each equipped with means such as a keypad (8) or barcode reader (10) to input a single use delivery key. The delivery key is generated by an external code generator that produces pseudo noise codes. A generator (20) that produces the same sequence is provided in the lock and synchronization between the two generators is provided by the delivered items.
摘要:
The invention relates to a method for authorizing a communication with a portable electronic device, such as access to at least one memory area. The portable electronic device has a display for presenting an item of information visible to the outside and an interface for communication with the outside of the portable electronic device. The item of information is at least in part taken into account by the portable electronic device in order to authorize the communication. The method includes a step of optical reading of the item of information outside the portable electronic device. The method is distinguished in that it also includes a step of varying the item of information, the step of varying causing the item of information, termed the variable item of information, to vary at least in part. The invention also relates to the portable electronic device, and the system comprising the portable electronic device and an electronic communication or reading device.
摘要:
A portable electronic device comprising a service provision unit capable of providing a service to a user, a communication unit capable of receiving authorization data from an authorization device and a validation unit capable of analyzing the received authorization data to determine whether it meets a validation requirement and being arranged to inhibit provision of the service by the service provision unit if the authorization data does not meet the validation requirement, the communication unit being arranged to receive authorization data from the authorization device and the validation unit being arranged to analyze the received authorization data whenever the communication unit and the authorization device are capable of communicating with each other.
摘要:
Access control devices are implemented at an access point of a plurality of remote properties. Each access control device has information unique to the access control device including the access control device unique identifier as well as a time determined, by an internal clock located at each access control device. A user can obtain a generated electronic key by forwarding a requesting application to a key generation system. The key generation system will generate the key and return it to the user for input to the access control device at the user desired property. The requesting application may comprise a property identifier indicative of an access control device at the user desired location. When generating the electronic key, the key generation system executes an encryption algorithm to convert some of the information in the requesting application into cyphertext.
摘要:
The present invention relates to a method or process concerning the transportation of an alarmed container (1), particularly with regard to the transportation of valuable objects or valuable documents. The container (1) includes a first electronic unit (2) which functions to accept and permit deactivation and/or opening of the container, wherein the container is opened with the aid of a primary key (10) which includes a second electronic unit (12) that communicates with the first electronic unit (2) in respect of initiating opening of the container. The primary key (10) accompanies a person transporting the container (1) and the container is opened and/or its alarm system deactivated at its destination, with the aid of a code subset (AB) from the person-carried primary key (10) in co-action with a code subset (CD) obtained from a destination-located secondary key (20), therewith providing a total code-set (ABCD) required for initiating opening/deactivation of the container. When a transportation route (100) includes a number of delivery destinations/collection destinations (110, 120, 130), the secondary keys (20) having mutually varying code subsets are placed at said destinations, wherewith the aforesaid person-carried primary key (10) enables the container to be opened/deactivated in co-action with code subsets (CD, EF, GH) obtained from respective secondary keys (20) at respective destinations (110, 120, 130) over a chosen transportation route (100), for instance.