WO2018090059A1 - Systems, devices, and methods for access control and identification of user devices - Google Patents

Systems, devices, and methods for access control and identification of user devices Download PDF

Info

Publication number
WO2018090059A1
WO2018090059A1 PCT/US2017/061648 US2017061648W WO2018090059A1 WO 2018090059 A1 WO2018090059 A1 WO 2018090059A1 US 2017061648 W US2017061648 W US 2017061648W WO 2018090059 A1 WO2018090059 A1 WO 2018090059A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
computing device
zone
user
processor
Prior art date
Application number
PCT/US2017/061648
Other languages
French (fr)
Inventor
Clarence J. GIDEON III, III
Original Assignee
Instrinsic Value, LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Instrinsic Value, LLC filed Critical Instrinsic Value, LLC
Priority to EP17869810.6A priority Critical patent/EP3539090A4/en
Publication of WO2018090059A1 publication Critical patent/WO2018090059A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/0088Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed centrally
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • FIG. 1 presents an example of an operational environment for access control and identification of user devices, according to one or more embodiments of the present disclosure.
  • FIG. 1A presents an example of a server device for access control and identification of user devices, according to one or more embodiments of the present disclosure.
  • FIG. 2 presents an example of a client device for access control and identification of user devices, according to one or more embodiments of the present disclosure.
  • FIG. 3 presents an example of a radio unit in accordance with one or more embodiments of the disclosure.
  • FIG. 4 presents an example of an operational environment for identification of user devices, according to one or more embodiments of the disclosure.
  • FIG. 5 presents an example of another operational environment for access control and identification of user devices, according to one or more embodiments of the disclosure.
  • FIG. 6 presents an example of a computing environment for access control and identification in accordance with one or more embodiments of this disclosure.
  • FIG. 7A presents an example of a method for generating an access rule in accordance with one or more embodiments of the present disclosure.
  • FIG. 7B presents an example of a method for generating an access rule, according to one or more embodiments of the present disclosure.
  • FIG. 8 presents an example of a method for changing access rules, according to one or more embodiments of the present disclosure.
  • FIG. 9 presents an example of a method for exchanging contact information, according to one or more embodiments of the present disclosure.
  • FIG. 10 presents an example of a method for activating a client device for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 11 presents an example of a method for interaction between a client device and a beacon device, according to one or more embodiments of the present disclosure.
  • FIG. 12 presents an example of a method for notifying a client device, according to one or more embodiments of the present disclosure.
  • FIG. 13 presents an example of a method for determining features from data associated with access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 14 illustrates an example of a user interface for access control
  • FIG. 15 illustrates an example of a user interface for access control
  • FIG. 16 illustrates an example of a user interface for access control
  • FIG. 17 illustrates an example of a user interface for access control
  • FIG. 18 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 19 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 20 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 21 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 22 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 23 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 24 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 25 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 26 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 27 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 28 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 29 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 30 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 31 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 32 illustrates an example of a user interface for access control
  • FIG. 33 illustrates an example of a user interface for access control
  • FIG. 34 illustrates an example of a user interface for access control
  • FIG. 35 illustrates an example of a user interface for access control
  • FIG. 36 illustrates an example of a user interface for access control
  • FIG. 37 illustrates an example of a user interface for access control
  • FIG. 38 illustrates an example of a user interface for access control
  • FIG. 39 illustrates an example operation environment for access control and identification, according to one or more embodiments of the present disclosure.
  • FIG. 40 illustrates views of a wall mount of a housing unit tied to an access control and identification system, according to one or more embodiments of the present disclosure.
  • FIG. 41 illustrates views of a wall mount of a housing unit tied to an access control and identification, system according to an exemplary embodiment of the present disclosure.
  • FIG. 42 illustrates views of a plate of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 43 illustrates views of a scanner mount of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 44 illustrates views of a scanner mount of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 45 illustrates views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 46 illustrates views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 47 includes views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
  • FIG. 48 illustrates an example of a user interface for access control
  • FIG. 49 illustrates an example of a user interface for access control
  • FIG. 50 illustrates an example of a user interface for access control
  • FIG. 51 illustrates an example of a user interface for access control
  • FIG. 52 illustrates an example of a user interface for access control
  • FIG. 53 illustrates an example of a user interface for access control
  • Exemplary embodiments of the present disclosure provide for an improved digital identification, networking, communication, and security system, devices, and methods.
  • Embodiments of the disclosure can be utilized as a time-saving enterprise system including a multi-faceted mobile software application ("mobile app") and a command and access control web app ("web app").
  • the systems, devices, and methods may be configured as an "all-in-one" software application that may act as a comprehensive digital identification, networking, communication, and security system, as well as a communication, command, and control system.
  • FIG. 1 presents an example of an operational environment 100 for identification and safety and access control in accordance with one or more embodiments of the disclosure.
  • the operational environment 100 can include a first zone 102a associated with a beacon device 104a.
  • the first zone 102a can be embodied in or can include a defined region secured by a locking device 106a.
  • the defined region can include a confined area indoors, a confined area outdoors, or a confined area that includes a combination of outdoors space and indoors space.
  • the beacon device 104a and the locking device 106a can be functionally coupled (e.g., electrically coupled, mechanically coupled, and/or electromechanically coupled).
  • the coupling can include wireless coupling and/or wireline coupling, and is represented by link(s) 107.
  • the locking device 104a can be actuated to transition between a locked state and an unlocked state, thus unlocking or locking a gate, a door, a turnstile, a padlock, or another type of access structure.
  • the beacon device 104a and the locking device 106a can be referred to collectively as a point-of-entry device.
  • a zone e.g., zone 102a or zone 102b
  • the point-of-entry device can include the locking device (e.g., locking device 106a), where the locking device can be configured to exchange wireless signals with a mobile computing device according to one or more defined protocols of a radio technology (e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)).
  • a radio technology e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)
  • the radio technology can include Bluetooth
  • the locking device e.g., locking device 106a
  • the locking device can include a Bluetooth locking pad.
  • the operational environment 100 also can include a second zone 102b associated with a beacon device 104b.
  • the second zone 102b can be embodied in or can include a defined region secured by a locking device 106b.
  • the defined region associated with the second zone 102b also can include a confined area indoors, a confined area outdoors, or a confined area that includes a combination of outdoors space and indoors space.
  • the second zone 102b can be geographically distinct from the first zone 102a.
  • the beacon device 104a and the locking device 106a can be functionally coupled (e.g., electrically coupled, mechanically coupled, and/or electromechanically coupled).
  • the coupling can include wireless coupling and/or wireline coupling, and is represented by link(s) 107.
  • the locking device 104b can be actuated to transition between a locked state and an unlocked state, thus unlocking or locking a gate, a door, a padlock, a turnstile, or another type of access structure.
  • the beacon device 104b and the locking device 106b also can be referred to collectively as a point-of-entry device.
  • a zone e.g., zone 102a or zone 102b
  • the point-of-entry device can include the locking device (e.g., locking device 106b), where the locking device can be configured to exchange wireless signals with a mobile computing device according to one or more defined protocols of a radio technology (e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)).
  • a radio technology e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)
  • the radio technology can include Bluetooth
  • the locking device e.g., locking device 106a
  • the locking device can include a Bluetooth locking pad.
  • the operational environment 100 also can include a server device 120a.
  • the server device 120a and the beacon device 104a can be functionally coupled via at least one of the one or more network 130.
  • the server device 120a is associated with the beacon device 104b.
  • the server device 120a also can be associated with one or more other beacon devices.
  • the server device 120a can be functionally coupled to beacon device 104b.
  • the server device 120a can configure a zone associated with a point-of-entry device. To that end, in one aspect, the server device 120 can generate a logical association between a beacon device and a region spanned by the zone. Specifically, the server device 120a can generate a logical association between the region spanned by the zone 102a and one or more of the beacon device 104b and the locking device 106a. The server device 120a also can generate a record of the logical association. As is illustrated in FIG. 1, the server device 120a can be functionally coupled to one or more interface units 140 (represented as interface unit 140).
  • interface unit 140 represented as interface unit 140
  • the interface unit 140 can be embodied in or can include a computing device (e.g., a server device) that includes one or more APIs that permit the exchange of information between the interface unit 140 and the server device 120a. Therefore, the server device 120a can utilize or otherwise leverage the interface unit 140 in order to retain a record of the logical association between zone 102a and the beacon device 104b and/or the locking device 106a. Such a record can be retained in one or more memory devices 154 (collectively referred to as zone information repository 154). As mentioned, in some embodiments, the server device 120a can be functionally coupled to the zone 102b and, thus, the server device 120a also can configure the zone 102b.
  • a computing device e.g., a server device
  • the server device 120a can utilize or otherwise leverage the interface unit 140 in order to retain a record of the logical association between zone 102a and the beacon device 104b and/or the locking device 106a. Such a record can be retained in one or more memory devices 154
  • the server device 120a also can generate a user record including first user information (e.g., a name an address, a role within an organization, or the like) and a
  • the server device 120a can generate an access rule using at least the user record, where the access rule can regulate entry to a zone (e.g., zone 102a and/or, in some embodiments, zone 102b).
  • the server device 120a can generate a schedule for authorized entry to the zone, the schedule being one of a daily schedule having a recurring group of authorized periods over a 24 hour interval; a weekly schedule having a second recurring group of authorized periods over seven days; a monthly schedule having a third recurring group of authorized periods over a month; a defined non-recurring authorized period.
  • the access rule can include a start time and an end time for authorized access.
  • the server device 120a can receive input information indicative of a schedule for authorized entry to a zone (e.g., zone 102a and/or, in some embodiments, zone 102b) and can generate the access rule using at least the input information.
  • the input information can be input at a user interface, such as a graphical user interface (GUI), and can be sent to the server device 120a.
  • GUI graphical user interface
  • the server device 120a can validate the access rule. For instance, the server device 120a can determine that the received schedule has logic integrity, e.g., an end time is later than a start time, times are adequate, and so forth.
  • the server device 120a also can utilize or otherwise leverage the interface unit 140 to retain or store the access rule in one or more memory devices 156 (collectively referred to as access rule repository 156).
  • the server device 120a can activate a user device to serve as access control instrument for a specific zone.
  • the server device 120 can generate an activation code (e.g., a numeric code or an alphanumeric code), and can send the activation code to the communication address associated with a user record.
  • the activation code can be received and displayed (or otherwise presented) at a user device 110, which can be embodied in or can include a mobile computing device that can communicate wirelessly according to one or more radio technologies (e.g., 3G, Long Term Evolution (LTE), LTE-Advanced, 5G, IEEE 802.11, IEEE 802.16, Bluetooth, ZigBee, or near-field
  • radio technologies e.g., 3G, Long Term Evolution (LTE), LTE-Advanced, 5G, IEEE 802.11, IEEE 802.16, Bluetooth, ZigBee, or near-field
  • Such a mobile computing device can have a defined form factor, and can be embodied in or can include a smartphone, tablet computer, a wearable device, a keyfob, a pocket card, or the like.
  • the user device 110 can generate user information including a telephone number or another type of communication address (e.g., an email address) of the mobile computing device. To that end, in one embodiment, the user device 110 can receive input information indicative or otherwise representative of the user information. More specifically, as described herein, the user device 110 also can include one or more identification units (not depicted in FIG. 1) that can cause the user device 110 to display, via a display device or display unit, for example, a user interface that includes one or more selectable visual elements. At least one of the selectable visual element(s) can be fillable, and can permit or otherwise facilitate receiving input information at the user device 110. The user device 110 can communicate wirelessly with a beacon device or other types of devices. Wireless links can permit such communication.
  • a beacon device or other types of devices can permit such communication.
  • the user device 110 can send, to the server device 120a, the user information that includes a telephone number or another type of communication address (e.g., an email address) of the mobile computing device.
  • the user device 110 and the server device 120a can be functionally via coupled to one or more wireless links 112, at least one of the network(s) 130, and one or more links 124.
  • the server device 120a can receive such user information, and can generate a user profile using at least one of the user record associated with (e.g., that prompted transmission of) the activation code.
  • the user profile can include the telephone number (or another type of communication address) of the user device 110.
  • the server device 120a can utilize or otherwise leverage the interface unit 140 in order to retain a record of the user profile. Such a record can be retained in one or more memory devices 150 (collectively referred to as user repository 154. More specifically, the user profile can retained in one or more memory elements 151 (referred to as user profiles) which can embody or can constitute a database or another type of data structure. [0068]
  • the server device 120a also can associate the access rule created for the user record that is associated with the generated user profile. Such an association can permit assigning or otherwise associating the access rule (which also may be referred to as access right in this disclosure) to the user device 110. In one embodiment, to associate the access rule with the user profile, the server device 120a can define a relationship between the user profile and the access rule.
  • the server device 120a can update the user profile to include the access rule.
  • the server device 120a also can generate an access key indicative of a unique user identifier associated with the user profile.
  • the access key itself is unique.
  • the access key can be embodied in or can include one of a linear barcode or a matrix barcode (e.g., a QR code).
  • the access key can be embodied in or can include a unique code that can correspond to a radio technology that the user device 110 can utilized to transmit the unique code.
  • the unique code can correspond to a code to be transmitted by means of Bluetooth radio technology.
  • the unique code can correspond to a code to be transmitted by means of near field communication (NFC) radio technology.
  • NFC near field communication
  • the disclosure is not limited to Bluetooth or NCF radio technologies, and the access key can be embodied in or can include a code that can be transmitted, by the user device 110, via other radio technologies, e.g., ZigBee.
  • the server device 120a can send an access key associated with a zone to the communication address of the user device 110.
  • the access key can be associated with zone 102a.
  • the server device 120a can generate a first access key for zone 120a and a second access key for zone 102b, and can send the first access key and the second access key to the user device 110.
  • Access keys in accordance with this disclosure can unlock respective locking devices associated respective zones.
  • an access key can permit or otherwise facilitate access to a credentialed zone.
  • the operational environment 100 also can include a server device 120b.
  • the server device 120a and the beacon device 104a can be functionally coupled via at least one of the one or more network 130.
  • the server device 120b is associated with the beacon device 104b.
  • the server device 120b also can be associated with one or more other beacon devices.
  • the server device 120b can be associated with the beacon device 104 and therefore, zone 102a.
  • the server device 120b can be have similar architecture to that of the server device 120a and can provide similar functionality.
  • the server device 120b also can generate an access key as described herein, and can send the access key to the user device 110.
  • the access key generated by the server device 120b can be associated with zone 102b, and can permit or otherwise facilitate access to the zone 102b in accordance with an access rule configured for a user profile associated with the user device 110, for the zone 102b.
  • the server device 120a and the server device 120b can serve as zone access controller devices (or regulator devices) that can grant respective types of access to respective zones for a user device.
  • user devices e.g., mobile computing devices
  • the server device can provide a notification to one or more user devices (e.g., user device 110) that an access rule is configured.
  • the one or more user devices are associated with a user profile associated with the access key and/or the access rule.
  • the notification can be directed to an initial configuration of the access rule or to a subsequent change to the access rule. More specifically, in some embodiments, a subsequent change to an access rule can be determined at one or more rules.
  • the server device e.g., server device 120a, can determine that an update rule is satisfied, and can update the access rule.
  • the server device e.g., server device 120a
  • the server device can determine that a deletion rule is satisfied, and the server device can delete the access rule.
  • a notification of a change to an access rule can be embodied in or can include a push notification.
  • the server device e.g., server device 120a or server device 120b
  • the server device can determine one or more communication addresses (e.g., telephone number, email address, or the like) of respective one or more user devices (e.g., mobile computing devices) associated with the user profile.
  • the server device can send a notification request to a messaging system to deliver the push notification, where the notification request can include including the one or more communication addresses.
  • the messaging system can deliver the push notification.
  • the messaging system can be a third-party messaging system.
  • a notification of an updated to an access rule is embodied in or includes an email notification.
  • the server device e.g., server device 120a or server device 120b, that updates or otherwise configures the access rule can provide the email notification.
  • the server device can determine an email addresses associated with a user profile associated with the updated access rule, and can generate or otherwise compose the email notification.
  • the server device e.g., server device 120a or server device 120b, also can send the email notification to the email address.
  • one or more server devices can generate access keys can grant the access keys to the user device 110 or any other type of mobile computing device.
  • the user device 110 can transmit first wireless signals and can receive second wireless signals according to one or more defined protocols of a radio technology.
  • the user device 110 can include a radio having one or more antennas and a communication processing unit. The one or more antennas can receive the second wireless signals, and the communication processing unit can processes the second wireless signals.
  • the communication processing unit can convert analog signals associated with the second wireless signals into digital signal that can be further processed by the user device 110.
  • the communication processing unit can process digital signals to generate the first wireless signals, and the one or more antennas transmit the first wireless signals.
  • the user device 110 can attempt to enter zone 102a.
  • the user device 110 can be proximate to the beacon device 104a and can initiate the establishment of a connection with the beacon device 104a. After or upon establishing the connection, the user device 110 can send an access key associated with the zone 102a to the beacon device 104.
  • the beacon device 104a can process the access key (e.g., apply access logic) or can send the access key to the server device 120a or another device to process the key.
  • the beacon device 104 can determine that access to zone 102a is to be granted. In response, the beacon device 104 can cause the locking device 106a to transition from a locked state to an unlocked state.
  • the beacon device 104 also can send, to the server device 120a, for example, an indication of granted entry to zone 102a.
  • the server device 120a can receive the indication of granted entry to zone 102a and, in some embodiments, can retain such an indication in the access record repository 152. In other embodiments, the server device 120a can generate a record of access granted by using the indication, and can retain the record in the access record repository.
  • the record can include a timestamp indicative of a date and/or time of the denial of entry; an identifier for zone 102; an identifier of the user device 1 10 or a user profile associated with the user device; a combination thereof; or the like.
  • the beacon device 104a can determine that access to zone 102a is to be denied. In response, the locking device 106a can remain in a locked state.
  • the beacon device 104 can send, to the server device 120a, for example, an indication of denied entry to zone 102a.
  • the server device 120a can receive the indication of denied entry to zone 102a and, in some embodiments, can retain such an indication in the access record repository 152. In other embodiments, the server device 120a can generate a record of access denied by using the indication, and can retain the record in the access record repository.
  • the record can include a timestamp indicative of a date and/or time of the denial of entry; an identifier for zone 102; an identifier of the user device 1 10 or a user profile associated with the user device; a combination thereof; or the like.
  • the operational environment 100 also can include one or more interface units 140 (represented as interface unit 140) that can be functionally coupled with the server device 120a and/or the server device 120b.
  • the interface unit 140 can be embodied in or can include a computing device (e.g., a server device) that includes one or more APIs that permit the exchange of information between the interface unit 140 and the server device 120a and/or the server device 120b.
  • the interface unit 140 also can be functionally coupled to various repositories, e.g., multiple memory devices (or storage devices), that can retain various information associated with end-users, access rules, zones, access records, and the like.
  • repositories can include a user repository 150 that can retain one or more user profiles 152.
  • the repositories can include an access record repository 152 that can retain records (or other types of information) indicative of access attempts to zones by user devices (e.g., user device 1 10) and/or outcomes of the access attempts— e.g., access granted or access denied.
  • Such zones can be associated with one or more server devices, such as server device 120a and/or server device 120b.
  • the access record repository 152 can include records (or other type of information) indicative of access attempts to enter zone 102a and/or zone 102b by user device 110.
  • the information retained in access record repository 152 can permit or otherwise facilitate, amongst other things, the tracking of a user device within zone(s)— either from a single organization or multiple organizations associated with the user device— thus providing clarity and record of actions; legal defensibility; or the like.
  • the repositories can include a zone information repository 154 that can retain information (e.g., data and/or metadata) indicative or otherwise representative of one or more zones.
  • the information can include first information indicative of beacon devices associated with respective zones.
  • the repositories can include an access rule repository 156 that can retain information indicative of access rules (e.g., a schedule of permitted entry to a zone).
  • the server device 120a and the sever device 120b can implement the functionality described herein via identification unit(s) 122a and identification unit(s) 122b.
  • a server device 160 (which can embody or can include server device 120a or sever device 120b) can include one or more memory devices 164 having one or more access and identification components 166.
  • the identification component(s) 166 can configure the server device 120b to provide the functionality described herein.
  • the server device 120b can implement or otherwise provide the various functionalities described herein.
  • the server device 160 can include one or more processors 172 that can execute the access and identification component(s) 166.
  • the server device 160 can include or can be coupled to a display unit 168 that can present numerous interfaces that can permit administering access rules, addition of user devices, removal of user devices, and the like. In some aspects, as is illustrated in FIG. 15, 16, 17, 18, 19, 20, and 21.
  • the server device 160 can permit monitoring recent activity, such as zones access activity and/or contact information exchange (e.g., card exchanges). .
  • the server device 160 can permit create, controlling and terminating zone access rights to zones controlled or otherwise configured by the server device 160 or other server devices in accordance with aspects of this disclosure..
  • the server device 160 can permit viewing all employees or other end-users for which a user profile is available within the user repository 150.
  • the information that can be presented can include name, picture, email, department if applicable, address, fax number, and/or phone number.
  • the server device 160 can permit managing employees.
  • the server device 160 can permit sending and updating access rights, deactivating user mobile devices, terminating zone access, uploading business cards for employees/users, and view employee's recent activity.
  • a manager device can deactivate the user's zone access at any time by electing an option to "deactivate device". The manager may also manage the user's access rights.
  • the server device 160 also can permit adding and creating employees/users and define their access levels to zones. See, for example, FIG. 21.
  • the server device 160 can permit creating roles for employees/users within an organization that leverages or otherwise utilizes the server devices in accordance with this disclosure.
  • the server device 160 can permit creating departments for employees/users within an organization that leverages or otherwise utilizes the server devices in accordance with this disclosure.
  • the server device 160 can permit or otherwise facilitate zone creation and defining zone access rights.
  • the server device also can permit, via at least a user interface, editing company settings and/or adding new managers authorized to operate the web app.
  • the server device 160 can permit or otherwise facilitate sending messages to employees/clients mobile devices directly via SMS text message. Furthermore, as is also illustrated in FIGS. 27-28, the sever device 160 can generate access key for new user devices. Upon or Once a new user's profile has been created, the manager may send the access code to that individual's mobile device, activating all of their access keys to specified zones.
  • server device 160 also can permit to login to access various functionalities remotely.
  • server device 160 can permit an end-user to log into a portal provide by the server device 160.
  • FIG. 2 illustrates an example of a client device 210 for access control
  • the client device 210 can include one or more input/output (I/O) units 202 that can permit or otherwise facilitate receiving input information at the client device 210.
  • the I/O interface unit(s) 202 can include a display unit 204.
  • the client device 210 can include an audio input unit and an audio output unit (collectively referred to as audio I/O unit(s) 206.
  • the client device 210 can include one or more camera modules 210. At least one of the camera module(s) 210 can permit or otherwise facilitate collecting information by focusing on an object (e.g., an image displayed on another client device) and generating a digital image of at least a portion of the object.
  • the client device 210 also can include a wireless scanning unit 208 that can generate pilot signals (e.g., beacon signals) that can be transmitted wirelessly, for example, by means of a radio unit 220 (also referred to as radio 220).
  • the radio unit 220 can include one or more antennas 222 functionally coupled to a multi-mode communication processing unit 324.
  • the radio unit 210 via the multi-mode communication processing unit 224, can process the pilot signals according to one or more defined protocols of a radio technology.
  • the radio technology can include, for example, 3G, Long Term Evolution (LTE), LTE-Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC), or the like.
  • the radio unit 220 can include the antenna(s) 222, and one or more transmitters and one or more receivers, collectively referred to as transceiver(s) 310.
  • the radio unit 220 can include a multiplexer/demultiplexer 320, a coder/decoder (codec) unit 330, and a modulator/demodulator (modem) unit 340.
  • the antenna(s) 222 can be embodied in or can include directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals.
  • at least some of the antenna(s) 222 can be physically separated to leverage spatial diversity and related different channel characteristics associated with such diversity.
  • the multi-mode communication processing unit 224 can process at least wireless signals in accordance with one or more radio technology protocols and/or modes (such as MTMO, single-input-multiple-output (SEVIO), multiple-input-single-output (MISO), and the like.
  • MTMO single-input-multiple-output
  • MISO multiple-input-single-output
  • Each of such protocol(s) can be configured to communicate (e.g., transmit, receive, or exchange) data, metadata, and/or signaling over a specific air interface.
  • the one or more radio technology protocols can
  • 3GPP Universal Mobile Telecommunication System
  • LTE Long Term Evolution
  • LTE-A LTE Advanced
  • Wi-Fi protocols such as those of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards
  • the multi-mode communication processing unit 224 also can process non-wireless signals (analogic, digital, a combination thereof, or the like). While illustrated as separate blocks in the computing device 210, it should be appreciated that in certain embodiments, at least a portion of the multi-mode communication processing unit 224 and the communication unit 224 can be integrated into a single unit (e.g., a single chipset or other type of solid state circuitry).
  • the multi-mode communication processing unit 222 can comprise a set of one or more transmitters/receivers 304, and components therein (amplifiers, filters, analog-to-digital (A/D) converters, etc.), functionally coupled to a multiplexer/demultiplexer (mux/demux) unit 308, a modulator/demodulator (mod/demod) unit 316 (also referred to as modem 316), and a coder/decoder unit 312 (also referred to as codec 312).
  • a multiplexer/demultiplexer (mux/demux) unit 308, a modulator/demodulator (mod/demod) unit 316 (also referred to as modem 316), and a coder/decoder unit 312 also referred to as codec 312).
  • Each of the transmitter(s)/receiver(s) can form respective
  • the multi- mode communication processing unit 224 can include other functional elements, such as one or more sensors, a sensor hub, an offload engine or unit, a combination thereof, or the like.
  • Electronic components and associated circuitry can permit or facilitate processing and manipulation, e.g., coding/decoding, deciphering, and/or modulation/demodulation, of signal(s) received by the computing device 210 and signal(s) to be transmitted by the computing device 210.
  • processing and manipulation e.g., coding/decoding, deciphering, and/or modulation/demodulation
  • signal(s) received by the computing device 210 and signal(s) to be transmitted by the computing device 210.
  • received and transmitted wireless signals can be modulated and/or coded, or otherwise processed, in accordance with one or more radio technology protocols.
  • radio technology protocol(s) can include 3 GPP UMTS; 3 GPP LTE; LTE-A; Wi-Fi protocols, such as the IEEE 802.11 family of standards (IEEE 802.ac, IEEE 802.ax, and the like); WiMAX; radio
  • the electronic components in the described communication unit can exchange information (e.g., data, metadata, code instructions, signaling and related payload data, combinations thereof, or the like) through a bus 314, which can embody or can comprise at least one of a system bus, an address bus, a data bus, a message bus, a reference link or interface, a combination thereof, or the like.
  • a bus 314 can embody or can comprise at least one of a system bus, an address bus, a data bus, a message bus, a reference link or interface, a combination thereof, or the like.
  • Each of the one or more receivers/transmitters 304 can convert signal from analog to digital and vice versa.
  • the one or more receivers/transmitters 304 can convert signal from analog to digital and vice versa.
  • the one or more receivers/transmitters 304 can convert signal from analog to digital and vice versa.
  • the receiver(s)/transmitter(s) 304 can divide a single data stream into multiple parallel data streams, or perform the reciprocal operation. Such operations may be conducted as part of various multiplexing schemes.
  • the mux/demux unit 308 is functionally coupled to the one or more receivers/transmitters 304 and can permit processing of signals in time and frequency domain.
  • the mux/demux unit 308 can multiplex and demultiplex information (e.g., data, metadata, and/or signaling) according to various multiplexing schemes such as time division multiplexing (TDM), frequency division multiplexing (FDM), orthogonal frequency division multiplexing (OFDM), code division multiplexing (CDM), or space division
  • TDM time division multiplexing
  • FDM frequency division multiplexing
  • OFDM orthogonal frequency division multiplexing
  • CDM code division multiplexing
  • the mux/demux unit 308 can scramble and spread information (e.g., codes) according to most any code, such as
  • the modem 316 can modulate and demodulate information (e.g., data, metadata, signaling, or a combination thereof) according to various modulation techniques, such as frequency modulation (e.g., frequency- shift keying), amplitude modulation (e.g., Q-ary quadrature amplitude modulation (QAM), with Q a positive integer; amplitude-shift keying (ASK)), phase-shift keying (PSK), and the like).
  • frequency modulation e.g., frequency- shift keying
  • amplitude modulation e.g., Q-ary quadrature amplitude modulation (QAM), with Q a positive integer; amplitude-shift keying (ASK)), phase-shift keying (PSK), and the like.
  • ASK amplitude-shift keying
  • PSK phase-shift keying
  • processor(s) that can be included in the computing device 310 can permit processing data (e.g., symbols, bits, or chips) for
  • multiplexing/demultiplexing such as implementing direct and inverse fast Fourier transforms
  • modulation/demodulation such as implementing direct and inverse fast Fourier transforms
  • selection of modulation rates selection of data packet formats, inter- packet times, and the like.
  • the codec 312 can operate on information (e.g., data, metadata, signaling, or a combination thereof) in accordance with one or more coding/decoding schemes suitable for communication, at least in part, through the one or more transceivers formed from respective transmitter(s)/receiver(s) 304.
  • information e.g., data, metadata, signaling, or a combination thereof
  • coding/decoding schemes, or related procedure(s) can be retained as a group of one or more computer-accessible instructions (computer-readable instructions, computer-executable instructions, or a combination thereof) in one or more memory devices 240 (referred to as memory 240).
  • the codec 312 can implement at least one of space-time block coding (STBC) and associated decoding, or space-frequency block coding (SFBC) coding and associated decoding.
  • STBC space-time block coding
  • SFBC space-frequency block coding
  • the codec 312 can extract information from data streams coded in accordance with spatial multiplexing scheme.
  • the codec 312 can implement at least one of computation of log-likelihood ratios (LLRs) associated with constellation realization for a specific
  • the codec 312 can utilize, at least in part, mux/demux unit 308 and mod/demod unit 316 to operate in accordance with aspects described herein.
  • the client device 210 can be utilized as a digital ID badge for an end-user.
  • the display unit 204 can present There may be multiple ID badges stored within MyCard. For example, a user may have their digital work ID badge and
  • the proper ID may be displayed as needed.
  • a badge cannot be altered by a mobile user.
  • the client device 210 can be utilized as an access key.
  • Digital business and/or contact card creation, exchange, storage and interactivity mobile app may be exchanged from mobile device to mobile device using wireless connections such as for e.g., NFC, Bluetooth, SMS text messages, and/or email.
  • the exchanged card may be uploaded into the receiving MyCard mobile app and saved in the app's contact list.
  • This contact's profile may now contain that contact's digital business card, the GPS location of the exchange, date and time of the exchange, and any notes the receiving user wanted to add on their new contact.
  • the client device 210 and other client devices described herein can serve a business card, as is illustrated in FIG. 14.
  • the user may either upload a file of an existing physical business card to the mobile app, or create his or her own contact card within the mobile app.
  • the functionality provided by the access and identification component(s) 246 can be activated in accordance with aspects described herein.
  • the client device can begin receiving access keys and ID badges from the web app.
  • digital business card transfer via SMS, NFC, Bluetooth and/or email.
  • Received cards may be stored, or uploaded directly to the MyCard mobile app.
  • Cards business or personal contact cards
  • exchanged contacts can be searched in a contact database, which can be retained in the client device 210 or remotely.
  • contact cards uploaded into the system may reflect date and time of the exchange, as well as GPS coordinates of the exact place where the exchange took place.
  • end-users may search for contact cards by people, places, organizations, dates/times, position/titles.
  • the client device 210 can cause the display device 210 to present selectable visual elements representative of options for communication with other client devices. Users may communicate with contacts within the MyCard mobile app by for e.g., finding the contact they are searching for and emailing, calling, or texting that client, as well as viewing their business card and the GPS coordinates of where that exchange took place. See, for example, FIG. 34.
  • users may add notes to the new contact - allowing the users to make a digital record of the exchange or meeting.
  • cards may be exported/uploaded to an Excel, Apple numbers, or other type of spreadsheet.
  • camera module(s) 211 can permit or otherwise facilitate taking a picture of a business card and scan that card image into their own existing card slot or apply it to the card slot of a person they just met and handed them a physical card.
  • the main interface of the mobile app may be a personal badge for the user.
  • This main page may include options taking the user to the key and card libraries.
  • the user may choose a personal image for their "main badge" on the homepage.
  • a badge library of saved badges to be pulled by the user.
  • These badges include, but are not limited to work ID badges, government IDs, school IDs, driver's licenses, boarding passes, concert and venue tickets, etc.
  • ID badges may include unique barcodes or QR codes (see, e.g., FIG. 53) as would appear on a physical identification. These barcodes attached to one of a user's digital id badges may be read by an appropriate reader.
  • the client device 210 also can include a location unit 214 that can permit or otherwise facilitate generating a location estimate of a current location of the client device 210.
  • the location unit 214 can be configured to receive timing messages from a global navigation system (e.g., global positioning system (GPS)), and to generate the location estimate using at least the timing messages.
  • GPS global positioning system
  • the client device 210 also can include one or more processors 230 and one or more memory devices (collectively referred to as memory 240).
  • the memory 240 can include one or more access and identification (A&I) component(s) 246 that can configure the processor(s) 230 to provide one or more functionalities described herein.
  • the A&I component(s) can be executed by at least one of the processor(s) 230 and can cause the at least one processor, and the client device, to provide the one or more functionalities. More specifically, in response to execution of the A&I component(s) 246 by at least one of the processor(s) 230, for example, can cause the client device 210 to perform or facilitate operations that provide the one or more functionalities described herein.
  • the memory 240 also can include A&I information 246 that includes multiple access keys 248 and card information 250.
  • the multiple access keys 248 can embody or can constitute a library of access keys available to an end-user of the mobile device.
  • the card information 250 can include a user profile for the end-user. In other embodiments, card information 250 may be absent.
  • at least a first one (or, in some embodiments, each one) of the access keys 248 can be embodied in or can include an identification badge associated with an end-user of the client device 210.
  • FIG. 4 presents an example of an operational environment 400 for identification of user devices, according to one or more embodiments of the disclosure.
  • the operational environment 400 can include a client device A 210a and a client device 210b. Each one of such devices can include the functional elements described herein in connection with client device 210. As is illustrated, the client device A 210a can establish a connection with the client device B 210b.
  • the client device A 210a can send a connection request message to connect with the client device B 210b, and in response, the client device A 210a can receive a response message (e.g., an ACK message) indicating that the connection is established. Establishment of such a connection is represented as pairing 405 in FIG. 4.
  • the client device A 210a can send the connection request message in response to receiving input information indicative of a selection to exchange contact information (e.g., business information or other type of identification (ID) information).
  • ID identification
  • the input information can be received via a GUI displayed at the client device 210a, for example.
  • the client device A 210a can be configured to broadcast an indication of availability to supply contact information.
  • the indication can be broadcasted wirelessly, within pilot signals. Broadcasting such an indication can permit or otherwise facilitate reaching out to other client device(s), including the client device B 210b, that can be configured to "listen" (e.g., monitor wireless signals) for an opportunity to receive, send, or exchange contact information. Therefore, in one aspect, user devices can detect other user devices in proximity and available to exchange contact information regardless of a prior association between such user devices.
  • the client device A 210a can send, to the client device B 210b, a request message to 410 to supply contact information.
  • the client device B 210b can send contact information 420.
  • the client device A 210a can receive the contact information 420 and can retain at least a portion of the contact information 420 in a memory device 240 (not shown in FIG. 4) of the client device A 210a.
  • the client device 210a can send a request message 430 to record an exchange of contact information 420.
  • the request message 430 can include location information indicative or otherwise representative of a location of client device A 210a at the time of the exchange or at a time shortly (e.g., tens of milliseconds, hundreds of millisecond, a second, a few seconds) after the exchange.
  • the request message 430 also can include a timestamp (or other type of information) indicative of a date and a time at which the contact information 420 is received.
  • the request message 430 can be sent to a server device 440 that includes one or more identification units 450 in accordance with this disclosure.
  • the identification unit(s) 450 can be the same as or similar to the identification unit(s) 122a.
  • the server device 440 can receive the request message 430 and, in response, can determine that a user profile associated with the client device B 210b is present in a user repository (e.g., user repository 150; not shown in FIG. 4).
  • the server device 440 can generate a record of the exchange (which can be referred to as a card exchange record) and can retain such a record in a card exchange repository (not shown in FIG. 4).
  • the service device 440 can determine that a user profile associated with the client device B 210b is not present or otherwise available in the user repository. In response, in one aspect, the server device 440 can generate a user profile using the at least a contact information of the contact information 420. The user profile can be associated with the client device B 210b. In addition or in the alternative, the server device 440 can generate a record of the exchange and can retain such a record in the card exchange repository.
  • the client device A 210a can operate on card information retained at a memory device of the client device A 210a and/or the card exchange repository.
  • zones are accessed—e.g., access denied or access granted— an indication of the access occurrence may be logged and saved in access record repository 152 or any other memory device accessible to a server device, e.g., server device 120a or server device 120b.
  • a server device e.g., server device 120a or server device 120b.
  • an operation environment 500 in accordance with this disclosure can include an insight engine unit 510 functionally coupled to user repository 150; access records storage 152; zone information storage 154; and/or access rule storage 156.
  • the insight engine unit 510 can determine that a correlation is present between (a) first entry records (first access granted records, first access denied records, or a combination thereof) associated with a first zone and (b) second entry records associated with a zone.
  • the first zone can include zone 102a and the second zone can include zone 102b.
  • the insight engine unit 510 can send information indicative of the correlation to server device 120a and/or server device 120b. Based on at least one of the correlation, at least one of a portion of the first entry records, or a portion of the second entry records, the server device 120a and/or server device 120b can configure a second access rule associated with a user profile, the second access rule can regulate entry to a third zone.
  • the server device(s) that configure the access rule can generate an access key indicative of a unique user identifier associated with the user profile. Such server device(s) can associate the access key with the third zone, and can send the second access key to the communication address of the mobile computing device.
  • the insight engine 510 can perform or otherwise facilitate a data mining process that can include four groups of operations: (I) Data selection. Data is pulled into the engine from multiple sources. These sources can be log files, external data and even most likely a database. The selection process typically involves aggregating these different sources into a single source, normally a flat list of key value pairs. (II) Data selection.
  • the preprocessing operations can include normalizing the data from the selection process, running some basic validation rules and removing erroneous samples. Transformation is normally applied to the preprocessed data to prepare the sample set of data for processing in the next step. Different processing algorithms require different transformation. At times these transformations can be as simple as just ordering the data by a particular attribute. An example of a more complicated transformation might be running further calculations on the sample set producing derived attributes such as a sum of failed unlocked for a particular user or an average time a particular zone is accessed.
  • the insight engine unit 510 can implement (e.g., perform) numerous algorithms against a preprocessed and transformed set of data. Such algorithms can include various feature detection algorithms. Each one of the algorithms can produce different results depending of a specific feature of interest, such as type of pattern.
  • the algorithm can include clustering, classification like decision trees, and regression.
  • the insight engine can implement a decision tree, which is a type of classification.
  • the insight engine unit 510 can apply a set of rules to available data, where the set of rules can be modeled after a defined set of patterns.
  • the defined set of patterns can be determined based on an access behavior of interest.
  • the insight engine unit 500 can train one or more of the rules in the defined set of rules against a training set of data. Such rule(s) can be adjusted based at least on available non-training data.
  • the insight engine unit can further analyze data associated with the pattern. Such further analysis can permit adjusting a group of algorithms applied by the insight engine unit to extract feature(s) and, ultimately, determine an insight (e.g., an amount of actionable knowledge. Such adjustment can be implemented in learning stage of the data analysis.
  • an insight e.g., an amount of actionable knowledge.
  • Such adjustment can be implemented in learning stage of the data analysis.
  • FIG. 6 illustrates example of a computational environment 600 for access control and identification of a user device, in accordance with one or more embodiments of the disclosure.
  • the example computational environment 2300 is merely illustrative and is not intended to suggest or otherwise convey any limitation as to the scope of use or functionality of the computational environment's architecture.
  • the illustrative computational environment 2300 depicted in FIG. 6 should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the example operational environments of the disclosure.
  • the example computational environment 2300 or portions thereof can embody or can constitute the operational environments described hereinbefore.
  • the computing device 2310 can embody or can constitute, for example, any of the communication devices or servers (such as the caller analysis server 140) described herein.
  • the computing device 2310 can be embodied in a portable personal computer or a handheld computing device, such as a mobile tablet computer, an electronic-book reader, a mobile telephone (e.g., a smartphone), and the like.
  • the computing device 2310 can be embodied in a wearable computing device, such as a watch, goggles or head- mounted visors, or the like.
  • the computing device 2310 can be embodied in portable consumer electronics equipment, such as a camera, a portable television set, a gaming console, a navigation device, a voice-over-internet-protocol telephone, a media playback device, or the like.
  • portable consumer electronics equipment such as a camera, a portable television set, a gaming console, a navigation device, a voice-over-internet-protocol telephone, a media playback device, or the like.
  • the computational environment 2300 represents an example implementation of the various aspects or features of the disclosure in which the processing or execution of operations described in connection with the management of unknown callers in accordance with aspects disclosed herein can be performed in response to execution of one or more software components at the computing device 2310.
  • the one or more software components can render the computing device 2310, or any other computing device that contains such components, a particular machine for the management of unknown callers in accordance with aspects described herein, among other functional purposes.
  • a software component can be embodied in or can comprise one or more computer-accessible instructions, e.g., computer- readable and/or computer-executable instructions.
  • At least a portion of the computer-accessible instructions can embody and/or can be executed to perform at least a part of one or more of the example methods described herein, such as the example method presented in FIG. 6.
  • at least the portion of the computer-accessible instructions can be retained (e.g., stored, made available, or stored and made available) in a computer storage non-transitory medium and executed by a processor.
  • the one or more computer-accessible instructions that embody a software component can be assembled into one or more program modules, for example, that can be compiled, linked, and/or executed at the computing device 2310 or other computing devices.
  • program modules comprise computer code, routines, programs, objects, components, information structures (e.g., data structures and/or metadata structures), etc., that can perform particular tasks (e.g., one or more operations) in response to execution by one or more processors, which can be integrated into the computing device 2310 or functionally coupled thereto.
  • information structures e.g., data structures and/or metadata structures
  • configurations that can be suitable for implementation of various aspects or features of the disclosure in connection with the management of unknown callers in accordance with aspects described herein can comprise personal computers; server computers; laptop devices; handheld computing devices, such as mobile tablets or e-readers; wearable computing devices; and multiprocessor systems. Additional examples can include set-top boxes, programmable consumer electronics, network personal computers (PCs), minicomputers, mainframe computers, blade computers, programmable logic controllers, distributed computing environments that comprise any of the above systems or devices, and the like.
  • PCs network personal computers
  • minicomputers minicomputers
  • mainframe computers blade computers
  • programmable logic controllers programmable logic controllers
  • the computing device 610 can comprise one or more processors 614, one or more input/output (I/O) interfaces 616, a memory 630, and a bus architecture 632 (also termed bus 632) that functionally couples various functional elements of the computing device 610.
  • the computing device 610 can include, optionally, a radio unit 612.
  • the radio unit 612 can include one or more antennas and a communication processing unit that can permit wireless communication between the computing device 610 and another device, such as one of the computing device(s) 670.
  • the bus 632 can include at least one of a system bus, a memory bus, an address bus, or a message bus, and can permit the exchange of information (data, metadata, and/or signaling) between the processor(s) 614, the I/O interface(s) 616, and/or the memory 630, or respective functional elements therein.
  • the bus 632 in conjunction with one or more internal programming interfaces 650 (also referred to as interface(s) 650) can permit such exchange of information.
  • the processor(s) 614 include multiple processors
  • the computing device 610 can utilize parallel computing.
  • the I/O interface(s) 616 can permit communication of information between the computing device and an external device, such as another computing device, e.g., a network element or an end-user device. Such communication can include direct communication or indirect communication, such as the exchange of information between the computing device 610 and the external device via a network or elements thereof. As illustrated, the I/O interface(s) 616 can comprise one or more of network adapter(s) 618, peripheral adapter(s) 622, and display unit(s) 626. Such adapter(s) can permit or facilitate connectivity between the external device and one or more of the processor(s) 614 or the memory 630.
  • the peripheral adapter(s) 622 can include a group of ports, which can include at least one of parallel ports, serial ports, Ethernet ports, V.35 ports, or X.21 ports.
  • the parallel ports can comprise General Purpose Interface Bus (GPIB), IEEE- 1284, while the serial ports can include
  • GPIB General Purpose Interface Bus
  • IEEE- 1284 IEEE- 1284
  • At least one of the network adapter(s) 618 can functionally couple the computing device 610 to one or more computing devices 670 via one or more traffic and signaling pipes 660 that can permit or facilitate the exchange of traffic 662 and signaling 664 between the computing device 610 and the one or more computing devices 670.
  • traffic and signaling pipes 660 can permit or facilitate the exchange of traffic 662 and signaling 664 between the computing device 610 and the one or more computing devices 670.
  • Such network coupling provided at least in part by the at least one of the network adapter(s) 618 can be implemented in a wired environment, a wireless environment, or both.
  • the information that is communicated by the at least one of the network adapter(s) 618 can result from the
  • each of the computing device(s) 670 can have substantially the same architecture as the computing device 610.
  • the display unit(s) 626 can include functional elements (e.g., lights, such as light-emitting diodes; a display, such as a liquid crystal display (LCD), a plasma monitor, a light-emitting diode (LED) monitor, or an electrochromic monitor;
  • the bus 632 represents one or more of several possible types of bus structures, including a memory bus or a memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • bus architectures can comprise an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, an Accelerated Graphics Port (AGP) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express bus, a Personal Computer Memory Card International Association (PCMCIA) bus, a Universal Serial Bus (USB), and the like.
  • ISA Industry Standard Architecture
  • MCA Micro Channel Architecture
  • EISA Enhanced ISA
  • VESA Video Electronics Standards Association
  • AGP Accelerated Graphics Port
  • PCI Peripheral Component Interconnect
  • PCMCIA Personal Computer Memory Card International Association
  • USB Universal Serial Bus
  • the bus 632, and all buses described herein can be implemented over a wired or wireless network connection and each of the subsystems, including the processor(s) 614, the memory 630 and memory elements therein, and the I/O interface(s) 616 can be contained within one or more remote computing devices 670 at physically separate locations, connected through buses of this form, in effect implementing a fully distributed system.
  • such a distributed system can implement the functionality described herein in a client-host or client- server configuration in which the access and identification component(s) 636 or the access and identification information 640, or both, can be distributed between the computing device 610 and at least one of the computing device(s) 670, and the computing device 610 and at least one of the computing device(s) 670 can execute such components and/or leverage such information.
  • the access and identification component(s) 636 can be different from those in an embodiment in which the computing device 610 embodies or constitutes a server device (e.g., server device 160, server device 120a, or server device 120b) or an interface unit 140 in accordance with aspects of this disclosure.
  • the computing device 610 can comprise a variety of computer-readable media.
  • Computer-readable media can be any available media (transitory and non-transitory) that can be accessed by a computing device.
  • computer-readable media can comprise computer non-transitory storage media (or computer-readable non-transitory storage media) and communications media.
  • Example computer-readable non-transitory storage media can be any available media that can be accessed by the computing device 610, and can comprise, for example, both volatile and non-volatile media, and removable and/or non-removable media.
  • the memory 630 can comprise computer-readable media in the form of volatile memory, such as random access memory (RAM), and/or non-volatile memory, such as read-only memory (ROM).
  • RAM random access memory
  • ROM read-only memory
  • the memory 630 can comprise functionality instructions storage 634 and
  • the functionality instructions storage 634 can comprise computer-accessible instructions that, in response to execution (by at least one of the instructions
  • processor(s) 614 can implement one or more of the functionalities of the disclosure.
  • the computer-accessible instructions can embody or can comprise one or more software components illustrated as access and identification component(s) 636.
  • execution of at least one component of the access and identification component(s) 636 can implement one or more of the methods described herein, such as the example methods 700, 750, 800, 900, 1000, 1100, 1200, and 1300.
  • a processor e.g., one of the processor(s) 614) that executes the at least one component to carry out a disclosed example method.
  • a processor of the processor(s) 614 that executes at least one of the access and identification component(s) 636 can retrieve information from or retain information in one or more memory elements 640 in the functionality information storage 638 in order to operate in accordance with the functionality programmed or otherwise configured by the access and identification component(s) 636.
  • the one or more memory elements 640 may embody at least some of the repositories coupled to the interface unit 140. Such elements may be referred to as access and identification information and can include at least one of code instructions, information structures, or the like. For instance, at least a portion of such information structures can be indicative or otherwise representative of elements retained in the repositories functionally coupled to the interface 140, in accordance with aspects described herein.
  • At least one of the one or more interfaces 650 can permit or facilitate communication of information between two or more components within the functionality instructions storage 634.
  • communicated by the at least one interface can result from implementation of one or more operations in a method of the disclosure.
  • functionality instructions storage 634 and the functionality information storage 638 can be embodied in or can comprise removable/non-removable, and/or volatile/non-volatile computer storage media.
  • At least a portion of at least one of the access and identification component(s) 636 or the access and identification information 640 can program or otherwise configure one or more of the processors 614 to operate at least in accordance with the functionality described herein.
  • One or more of the processor(s) 614 can execute at least one of the access and identification component(s) 636 and leverage at least a portion of the information in the functionality information storage 638 in order to provide access control and identification of user devices in accordance with one or more aspects described herein.
  • the functionality instructions storage 634 can embody or can comprise a computer-readable non-transitory storage medium having computer-accessible instructions that, in response to execution, cause at least one processor (e.g., one or more of the processor(s) 614) to perform a group of operations comprising the operations or blocks described in connection with the disclosed methods.
  • processor e.g., one or more of the processor(s) 614.
  • the memory 630 can comprise computer-accessible instructions and information (e.g., data, metadata, and/or programming code instructions) that permit or facilitate the operation and/or administration (e.g., upgrades, software installation, any other configuration, or the like) of the computing device 610.
  • the memory 630 can comprise a memory element 642 (labeled operating system (OS) instruction(s) 642) that contains one or more program modules that embody or include one or more operating systems, such as Windows operating system, Unix, Linux, Symbian, Android, Chromium, and substantially any OS suitable for mobile computing devices or tethered computing devices.
  • OS operating system
  • the operational and/or architectural complexity of the computing device 610 can dictate a suitable OS.
  • the memory 630 also comprises a system information storage 646 having data, metadata, and/or programming code that permits or facilitates the operation and/or administration of the computing device 610. Elements of the OS instruction(s) 642 and the system information storage 646 can be accessible or can be operated on by at least one of the processor(s) 614.
  • functionality instructions storage 634 and other executable program components such as the OS instruction(s) 642 are illustrated herein as discrete blocks, such software components can reside at various times in different memory components of the computing device 610, and can be executed by at least one of the processor(s) 614.
  • an implementation of the access and identification component(s) 636 can be retained on or transmitted across some form of computer-readable media.
  • the computing device 610 and/or one of the computing device(s) 670 can include a power supply (not shown), which can power up components or functional elements within such devices.
  • the power supply can be a rechargeable power supply, e.g., a rechargeable battery, and it can include one or more transformers to achieve a power level suitable for the operation of the computing device 610 and/or one of the computing device(s) 670, and components, functional elements, and related circuitry therein.
  • the power supply can be attached to a conventional power grid to recharge and ensure that such devices can be operational.
  • the power supply can include an I/O interface (e.g., one of the network adapter(s) 618) to connect operationally to the conventional power grid.
  • the power supply can include an energy conversion component, such as a solar panel, to provide additional or alternative power resources or autonomy for the computing device 610 and/or one of the computing device(s) 670.
  • the computing device 610 can operate in a networked environment by utilizing connections to one or more remote computing devices 670.
  • a remote computing device can be a personal computer, a portable computer, a server, a router, a network computer, a peer device or other common network node, and so on.
  • connections (physical and/or logical) between the computing device 610 and a computing device of the one or more remote computing devices 670 can be made via one or more traffic and signaling pipes 660, which can comprise wired link(s) and/or wireless link(s) and several network elements (such as routers or switches, concentrators, servers, and the like) that form a LAN, a MAN, a WAN, and/or other networks (wireless or wired) having different footprints.
  • traffic and signaling pipes 660 can comprise wired link(s) and/or wireless link(s) and several network elements (such as routers or switches, concentrators, servers, and the like) that form a LAN, a MAN, a WAN, and/or other networks (wireless or wired) having different footprints.
  • traffic and signaling pipes 660 can comprise wired link(s) and/or wireless link(s) and several network elements (such as routers or switches, concentrators, servers, and the like) that form a LAN,
  • access keys may be received by barcode/QR code scanners, Bluetooth readers, chip readers, radio signal readers, among other electronic receiving and processing devices.
  • the reader devices also referred to as beacon devices) - whichever type they may be (or location of installment) may be functionally coupled (e.g., wirelessly coupled) to a client device.
  • client devices e.g., user device 110, client device 2
  • server devices e.g., server device 120a or server device 120b
  • client devices e.g., user device 110, client device 2
  • server devices e.g., server device 120a or server device 120b
  • FIGS. 40-47 such functionality can be utilized or otherwise leveraged in_a housing unit for a receiver device controlled in accordance with aspects of this disclosure, e.g., the functionality of server devices of this disclosure.
  • the housing unit may be configured to interact with the mobile app.
  • the housing unit may interact with the mobile app via at least one barcode scanner in the unit connected to a computing device such that the at least one barcode scanner or scanner responds to a signal from the mobile app to for e.g., unlock a door of a house.
  • multiple housing units may be secured to different areas in a house.
  • FIGS. 7A-13 various techniques for access control and/or identification of user devices (e.g., mobile computing devices) can be implemented in accordance with the disclosure.
  • An example of such techniques can be better appreciated with reference to the diagrams (flowcharts and callflows) in FIGS. 7A-13.
  • the examples of the method disclosed herein, with reference to such drawings are presented and described as a series of blocks (with each block representing an action or an operation in a method, for example).
  • such an example method or any other technique is not limited by the order of blocks and associated actions or operations, as some blocks may occur in different orders and/or concurrently with other blocks from those that are shown and described herein.
  • the methods (or processes or techniques) in accordance with this disclosure can be alternatively represented as a series of interrelated states or events, such as in a state diagram.
  • not all illustrated blocks, and associated action(s) may be required to implement a method in accordance with one or more aspects of the disclosure.
  • two or more of the disclosed methods or processes can be implemented in combination with each other, to accomplish one or more features or advantages described herein.
  • a computing device e.g., a desktop computer; a mobile computer, such as a tablet, or a smartphone; a gaming console, a mobile telephone; a blade computer; a programmable logic controller, and the like
  • a processor of the computing device for storage in a memory thereof or functionally coupled thereto.
  • one or more processors such as processor(s) that implement (e.g., execute) one or more of the disclosed techniques, can be employed to execute code instructions retained in a memory, or any computer- or machine-readable medium, to implement the one or more methods.
  • the code instructions can provide a computer-executable or machine-executable framework to implement the techniques described herein.
  • FIGS. 7A-24-25 illustrate examples of methods for access control and/or
  • FIG. 7A presents an example of a method 700 for generating an access rule in accordance with one or more embodiments of the present disclosure.
  • the example method 700 can be implemented by one or more computing devices.
  • the one or more computing devices can receive selection information indicative of a first zone.
  • the one or more computing devices can receive first information of a start time and an end time.
  • the one or more computing devices can receive second information indicative of a user device.
  • the one or more computing devices can determine if the first information and the second information are valid. In response to a negative determination ("No" branch), the one or more computing devices can send an error message at block 710.
  • the one or more computing devices in response to a positive determination ("Yes" branch), can generate a record of an access rule based at least on the first information and the second information at block 712.
  • the one or more computing devices can store the record of the access rule.
  • the one or more computing devices can send a notification to the user device in accordance with aspects of this disclosure.
  • FIG. 7B presents an example of a method 750 for generating an access rule, according to one or more embodiments of the present disclosure.
  • the example method 750 can be implemented by one or more computing devices.
  • the one or more computing devices can receive selection information indicative of a user device.
  • the one or more computing devices can receive first information indicative of a start time and an end time.
  • the one or more computing devices can receive second information indicative of a zone.
  • the one or more computing devices can determine if the first information and the second information are valid. In response to a negative determination ("No" branch), the one or more computing devices can send an error message at block 760.
  • the one or more computing devices in response to a positive determination ("Yes" branch), can generate a record of an access rule based at least on the first information and the second information at block 762.
  • the one or more computing devices can store the record of the access rule.
  • the one or more computing devices can send a notification to the user device in accordance with aspects of this disclosure.
  • FIG. 8 presents an example of a method 800 for changing access rules, according to one or more embodiments of the present disclosure.
  • the example method 800 can be
  • the one or more devices can determine if a criterion to update an access rule for a zone and user device is satisfied. In response to an affirmative determination ("Yes" branch), the one or more computing devices can update the access rule at block 820.
  • the one or more computing devices can send a notification to the user device.
  • the one or more computing devices can determine if a criterion to delete a second access rule for a second zone and a second user device is satisfied.
  • a negative determination e.g., "No” branch
  • the flow can return to block 810.
  • the one or more computing devices can delete the second access rule at block 850.
  • the one or more computing devices can send a notification to the second user device.
  • FIG. 9 presents an example of a method 900 for activating a client device for access control and identification, according to one or more embodiments of the present disclosure.
  • a client device A 910 can receive input information indicative of a selection to exchange contact information (e.g., a business card) with another client device (e.g., user device 110).
  • the client device 910 can determine if the exchange is a manual exchange or an automated exchange. In response to the exchange being manual ("Manual" branch), the client device A 910 can receive second input information indicative of contact information.
  • the client device A 910 can send a request to record the exchange of information.
  • the request can include location information, such as a GPS location estimate, representative of the location of the device at the time or nearly at the time the information is exchanged.
  • location information such as a GPS location estimate
  • the client device 910 and a client device B 920 can establish a connection by pairing or otherwise attaching to each other.
  • the client device B 920 can send contact information.
  • the server device 930 can determine, at block 928, if the client device B 920 has an associated user profile (e.g., one of the user profiles retained in user repository 150.
  • the server device 930 can generate a record of the exchange of the contact information.
  • the server device 930 can store the record of the exchange of the contact information.
  • the server device 930 can generate a user record associated with the client device B.
  • the server device 930 can generate a record of the exchange.
  • FIG. 10 presents an example of a method 1000 for exchanging contact information, according to one or more embodiments of the present disclosure.
  • a server device 1012 can receive input information indicative of an email address.
  • the server device 1010 can determine that a record of the email address is available. For instance, the server device can determine that the email address is available in a user profile retained in user repository 150.
  • the server device can send an email to the email address.
  • the email can include an activation code (e.g., a numeric code or an alphanumeric code).
  • a client device 1020 can receive the email and, at 1018, the client device 1020 can send a response email to the server device 1010.
  • the response email can include the email address and the activation code.
  • the server device 1010 can validate the email address and the activation code.
  • the server device can activate the client device 1020.
  • FIG. 11 presents an example of a method 1100 for interaction between a client device 1110 and a beacon device 1120, according to one or more embodiments of the present disclosure.
  • the client device 1110 and the beacon device 1120 e.g., beacon device 104a or beacon device 104b
  • the beacon device 1120 can determine if the client device is authorized for beacon device 1120.
  • the beacon device 1120 can send, to the server device 1130, a notification or another type of indication of successful access activity.
  • the beacon device 1120 can send, to the server device 1130, a notification or another type of indication of denied access activity.
  • the server device 1130 can send an access notification or another type of indication to the client device 1110.
  • the client device 1110 can present one or more visual elements indicative of access activity.
  • FIG. 12 presents an example of a method 1200 for notifying a client device, according to one or more embodiments of the present disclosure.
  • One or more computing devices can implement (e.g., execute) at least a portion of the method 1200.
  • the one or more computing devices can receive a notification request.
  • the one or more computing devices can determine a type notification, e.g., an email notification or a push notification. For a push notification ("Push" branch), the one or more computing devices can determine access information indication of one or more destination devices.
  • the one or more computing devices can send a request for notification to a notification system.
  • FIG. 13 presents an example of a method 1300 for determining features from data associated with access control and identification, according to one or more embodiments of the present disclosure.
  • the example method 1300 can be implemented by one or more computing devices. In one example, such devices can embody or can constitute the insight engine unit 510.
  • the one or more computing device can select data including information indicative of access activity to a zone.
  • the one or more computing devices can normalize the data.
  • the one or more computing devices can order data by zone (e.g., zone 102a or zone 102b).
  • the one or more computing devices can transform the ordered data.
  • the one or more computing devices can determine one or more patterns within the transformed data.
  • the one or more computing device can evaluate at least one of the one or more patterns.
  • Various embodiments of the disclosure may take the form of an entirely or partially hardware embodiment, an entirely or partially software embodiment, or a combination of software and hardware (e.g., a firmware embodiment).
  • various embodiments of the disclosure e.g., methods and systems
  • may take the form of a computer program product comprising a computer-readable non-transitory storage medium having computer-accessible instructions (e.g., computer-readable and/or computer-executable instructions) such as computer software, encoded or otherwise embodied in such storage medium.
  • Those instructions can be read or otherwise accessed and executed by one or more processors to perform or permit the performance of the operations described herein.
  • the instructions can be provided in any suitable form, such as source code, compiled code, interpreted code, executable code, static code, dynamic code, assembler code, combinations of the foregoing, and the like.
  • Any suitable computer-readable non-transitory storage medium may be utilized to form the computer program product.
  • the computer-readable medium may include any tangible non-transitory medium for storing information in a form readable or otherwise accessible by one or more computers or processor(s) functionally coupled thereto.
  • Non-transitory storage media can include read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory, etc.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable portion of software, a thread of execution, a program, and/or a computing device.
  • a software application executing on a computing device and the computing device can be a component.
  • One or more components may reside within a process and/or thread of execution.
  • a component may be localized on one computing device or distributed between two or more computing devices. As described herein, a component can execute from various computer- readable non-transitory media having various data structures stored thereon. Components can communicate via local and/or remote processes in accordance, for example, with a signal (either analogic or digital) having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as a wide area network with other systems via the signal).
  • a signal either analogic or digital
  • data packets e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as a wide area network with other systems via the signal.
  • a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry that is controlled by a software application or firmware application executed by a processor, wherein the processor can be internal or external to the apparatus and can execute at least a part of the software or firmware application.
  • a component can be an apparatus that provides specific functionality through electronic components without mechanical parts, and the electronic components can include a processor therein to execute software or firmware that provides, at least in part, the functionality of the electronic
  • components can communicate via local and/or remote processes in accordance, for example, with a signal (either analog or digital) having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as a wide area network with other systems via the signal).
  • components can communicate or otherwise be coupled via thermal, mechanical, electrical, and/or electromechanical coupling mechanisms (such as conduits, connectors, combinations thereof, or the like).
  • An interface can include input/output (I/O) components as well as associated processors, applications, and/or other programming components.
  • I/O input/output
  • the terms "component,” “environment,” “system,” “architecture,” “interface,” “unit,” “module,” and “pipe” can be utilized interchangeably and can be referred to collectively as functional elements.
  • processor can refer to any computing processing unit or device comprising single-core processors; single processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory.
  • a processor can refer to an integrated circuit (IC), an application-specific integrated circuit (ASIC), a digital signal processor (DSP), a field programmable gate array (FPGA), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
  • ASIC application-specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate array
  • PLC programmable logic controller
  • CPLD complex programmable logic device
  • a processor can be implemented as a combination of computing processing units.
  • processors can utilize nanoscale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance the performance of user equipment or other electronic equipment.
  • the memory components or memories can be either volatile memory or non-volatile memory, or can include both volatile and non-volatile memory.
  • the memory components or memories can be removable or non-removable, and/or internal or external to a computing device or component.
  • Examples of various types of non-transitory storage media can include hard-disc drives, zip drives, CD- ROMs, digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, flash memory cards or other types of memory cards, cartridges, or any other non-transitory medium suitable to retain the desired information and which can be accessed by a computing device.
  • non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as external cache memory.
  • RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • SRAM synchronous RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Synchlink DRAM
  • DRRAM direct Rambus RAM
  • Conditional language such as, among others, "can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain implementations could include, while other implementations do not include, certain features, elements, and/or operations. Thus, such conditional language generally is not intended to imply that features, elements, and/or operations are in any way required for one or more implementations or that one or more implementations necessarily include logic for deciding, with or without user input or prompting, whether these features, elements, and/or operations are included or are to be performed in any particular implementation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

An operational environment providing access control and/or identification of user devices, the operational environment comprising one or more zones associated with a point-of-entry device, one or more server devices including an identification unit, the user devices including a mobile computing device that can communicate wirelessly, and an interface unit functionally coupled with the server devices and various repositories.

Description

SYSTEMS, DEVICES, AND METHODS FOR ACCESS CONTROL AND IDENTIFICATION
OF USER DEVICES
CROSS-REFERENCE TO RELATED APPLICATION
[0001] The present application is related to and claims the benefit of U.S. Provisional Patent Application No. 62/421,770, filed November 14, 2016, the contents of which are incorporated herein by reference in their entirety.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] The accompanying drawings form part of the disclosure and are incorporated into the subject specification. The drawings illustrate example embodiments of the disclosure and, in conjunction with the present description and claims, serve to explain at least in part various principles, features, or aspects of the disclosure. Certain embodiments of the disclosure are described more fully below with reference to the accompanying drawings. However, various aspects of the disclosure can be implemented in many different forms and should not be construed as limited to the implementations set forth herein. Like numbers refer to like, but not necessarily the same or identical, elements throughout.
[0003] FIG. 1 presents an example of an operational environment for access control and identification of user devices, according to one or more embodiments of the present disclosure.
[0004] FIG. 1A presents an example of a server device for access control and identification of user devices, according to one or more embodiments of the present disclosure.
[0005] FIG. 2 presents an example of a client device for access control and identification of user devices, according to one or more embodiments of the present disclosure.
[0006] FIG. 3 presents an example of a radio unit in accordance with one or more embodiments of the disclosure.
[0007] FIG. 4 presents an example of an operational environment for identification of user devices, according to one or more embodiments of the disclosure.
[0008] FIG. 5 presents an example of another operational environment for access control and identification of user devices, according to one or more embodiments of the disclosure. [0009] FIG. 6 presents an example of a computing environment for access control and identification in accordance with one or more embodiments of this disclosure.
[0010] FIG. 7A presents an example of a method for generating an access rule in accordance with one or more embodiments of the present disclosure.
[0011] FIG. 7B presents an example of a method for generating an access rule, according to one or more embodiments of the present disclosure.
[0012] FIG. 8 presents an example of a method for changing access rules, according to one or more embodiments of the present disclosure.
[0013] FIG. 9 presents an example of a method for exchanging contact information, according to one or more embodiments of the present disclosure.
[0014] FIG. 10 presents an example of a method for activating a client device for access control and identification, according to one or more embodiments of the present disclosure.
[0015] FIG. 11 presents an example of a method for interaction between a client device and a beacon device, according to one or more embodiments of the present disclosure.
[0016] FIG. 12 presents an example of a method for notifying a client device, according to one or more embodiments of the present disclosure.
[0017] FIG. 13 presents an example of a method for determining features from data associated with access control and identification, according to one or more embodiments of the present disclosure.
[0018] FIG. 14 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0019] FIG. 15 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0020] FIG. 16 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0021] FIG. 17 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure. [0022] FIG. 18 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0023] FIG. 19 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0024] FIG. 20 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0025] FIG. 21 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0026] FIG. 22 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0027] FIG. 23 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0028] FIG. 24 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0029] FIG. 25 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0030] FIG. 26 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0031] FIG. 27 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0032] FIG. 28 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0033] FIG. 29 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0034] FIG. 30 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure. [0035] FIG. 31 illustrates an example of a user interface for access control and identification, according to one or more embodiments of the present disclosure.
[0036] FIG. 32 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0037] FIG. 33 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0038] FIG. 34 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0039] FIG. 35 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0040] FIG. 36 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0041] FIG. 37 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0042] FIG. 38 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure.
[0043] FIG. 39 illustrates an example operation environment for access control and identification, according to one or more embodiments of the present disclosure.
[0044] FIG. 40 illustrates views of a wall mount of a housing unit tied to an access control and identification system, according to one or more embodiments of the present disclosure.
[0045] FIG. 41 illustrates views of a wall mount of a housing unit tied to an access control and identification, system according to an exemplary embodiment of the present disclosure.
[0046] FIG. 42 illustrates views of a plate of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
[0047] FIG. 43 illustrates views of a scanner mount of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure. [0048] FIG. 44 illustrates views of a scanner mount of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
[0049] FIG. 45 illustrates views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
[0050] FIG. 46 illustrates views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
[0051] FIG. 47 includes views of a housing unit tied to an access control and identification system, according to an exemplary embodiment of the present disclosure.
[0052] FIG. 48 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
[0053] FIG. 49 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
[0054] FIG. 50 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
[0055] FIG. 51 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
[0056] FIG. 52 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
[0057] FIG. 53 illustrates an example of a user interface for access control and
identification, according to one or more embodiments of the present disclosure
DETAILED DESCRIPTION
[0058] Exemplary embodiments of the present disclosure provide for an improved digital identification, networking, communication, and security system, devices, and methods. Embodiments of the disclosure can be utilized as a time-saving enterprise system including a multi-faceted mobile software application ("mobile app") and a command and access control web app ("web app"). In various embodiments, the systems, devices, and methods may be configured as an "all-in-one" software application that may act as a comprehensive digital identification, networking, communication, and security system, as well as a communication, command, and control system.
[0059] FIG. 1 presents an example of an operational environment 100 for identification and safety and access control in accordance with one or more embodiments of the disclosure. As is illustrated, the operational environment 100 can include a first zone 102a associated with a beacon device 104a. The first zone 102a can be embodied in or can include a defined region secured by a locking device 106a. The defined region can include a confined area indoors, a confined area outdoors, or a confined area that includes a combination of outdoors space and indoors space. The beacon device 104a and the locking device 106a can be functionally coupled (e.g., electrically coupled, mechanically coupled, and/or electromechanically coupled). The coupling can include wireless coupling and/or wireline coupling, and is represented by link(s) 107. The locking device 104a can be actuated to transition between a locked state and an unlocked state, thus unlocking or locking a gate, a door, a turnstile, a padlock, or another type of access structure. As such, the beacon device 104a and the locking device 106a can be referred to collectively as a point-of-entry device. In some embodiments, a zone (e.g., zone 102a or zone 102b) may not include a beacon device and, thus, the zone can be associated exclusively with a locking device. In one of such embodiments, the point-of-entry device can include the locking device (e.g., locking device 106a), where the locking device can be configured to exchange wireless signals with a mobile computing device according to one or more defined protocols of a radio technology (e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)). As an example, the radio technology can include Bluetooth, and the locking device (e.g., locking device 106a) can include a Bluetooth locking pad.
[0060] The operational environment 100 also can include a second zone 102b associated with a beacon device 104b. The second zone 102b can be embodied in or can include a defined region secured by a locking device 106b. The defined region associated with the second zone 102b also can include a confined area indoors, a confined area outdoors, or a confined area that includes a combination of outdoors space and indoors space. The second zone 102b can be geographically distinct from the first zone 102a. The beacon device 104a and the locking device 106a can be functionally coupled (e.g., electrically coupled, mechanically coupled, and/or electromechanically coupled). The coupling can include wireless coupling and/or wireline coupling, and is represented by link(s) 107. The locking device 104b can be actuated to transition between a locked state and an unlocked state, thus unlocking or locking a gate, a door, a padlock, a turnstile, or another type of access structure. As such, the beacon device 104b and the locking device 106b also can be referred to collectively as a point-of-entry device. As described herein, in some embodiments, a zone (e.g., zone 102a or zone 102b) may not include a beacon device and, thus, the zone can be associated exclusively with a locking device. In one of such embodiments, the point-of-entry device can include the locking device (e.g., locking device 106b), where the locking device can be configured to exchange wireless signals with a mobile computing device according to one or more defined protocols of a radio technology (e.g., 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC)). As an example, the radio technology can include Bluetooth, and the locking device (e.g., locking device 106a) can include a Bluetooth locking pad.
[0061] The operational environment 100 also can include a server device 120a. In one aspect, the server device 120a and the beacon device 104a can be functionally coupled via at least one of the one or more network 130. The server device 120a is associated with the beacon device 104b. The server device 120a also can be associated with one or more other beacon devices. For instance, in one embodiment, the server device 120a can be functionally coupled to beacon device 104b.
[0062] The server device 120a can configure a zone associated with a point-of-entry device. To that end, in one aspect, the server device 120 can generate a logical association between a beacon device and a region spanned by the zone. Specifically, the server device 120a can generate a logical association between the region spanned by the zone 102a and one or more of the beacon device 104b and the locking device 106a. The server device 120a also can generate a record of the logical association. As is illustrated in FIG. 1, the server device 120a can be functionally coupled to one or more interface units 140 (represented as interface unit 140). In some embodiments, the interface unit 140 can be embodied in or can include a computing device (e.g., a server device) that includes one or more APIs that permit the exchange of information between the interface unit 140 and the server device 120a. Therefore, the server device 120a can utilize or otherwise leverage the interface unit 140 in order to retain a record of the logical association between zone 102a and the beacon device 104b and/or the locking device 106a. Such a record can be retained in one or more memory devices 154 (collectively referred to as zone information repository 154). As mentioned, in some embodiments, the server device 120a can be functionally coupled to the zone 102b and, thus, the server device 120a also can configure the zone 102b.
[0063] In addition, the server device 120a also can generate a user record including first user information (e.g., a name an address, a role within an organization, or the like) and a
communication address, such as an email address. In addition, the server device 120a can generate an access rule using at least the user record, where the access rule can regulate entry to a zone (e.g., zone 102a and/or, in some embodiments, zone 102b). To that end, in some embodiments, the server device 120a can generate a schedule for authorized entry to the zone, the schedule being one of a daily schedule having a recurring group of authorized periods over a 24 hour interval; a weekly schedule having a second recurring group of authorized periods over seven days; a monthly schedule having a third recurring group of authorized periods over a month; a defined non-recurring authorized period. Accordingly, in some instances, the access rule can include a start time and an end time for authorized access.
[0064] In addition or in other embodiments, to configure the access rule, the server device 120a can receive input information indicative of a schedule for authorized entry to a zone (e.g., zone 102a and/or, in some embodiments, zone 102b) and can generate the access rule using at least the input information. In some instances, the input information can be input at a user interface, such as a graphical user interface (GUI), and can be sent to the server device 120a. The server device 120a can validate the access rule. For instance, the server device 120a can determine that the received schedule has logic integrity, e.g., an end time is later than a start time, times are adequate, and so forth. The server device 120a also can utilize or otherwise leverage the interface unit 140 to retain or store the access rule in one or more memory devices 156 (collectively referred to as access rule repository 156).
[0065] In some embodiments, the server device 120a can activate a user device to serve as access control instrument for a specific zone. For instance, the server device 120 can generate an activation code (e.g., a numeric code or an alphanumeric code), and can send the activation code to the communication address associated with a user record. In one of such embodiments, the activation code can be received and displayed (or otherwise presented) at a user device 110, which can be embodied in or can include a mobile computing device that can communicate wirelessly according to one or more radio technologies (e.g., 3G, Long Term Evolution (LTE), LTE-Advanced, 5G, IEEE 802.11, IEEE 802.16, Bluetooth, ZigBee, or near-field
communication (NFC)). Such a mobile computing device can have a defined form factor, and can be embodied in or can include a smartphone, tablet computer, a wearable device, a keyfob, a pocket card, or the like.
[0066] In response to receiving the activation code, the user device 110 can generate user information including a telephone number or another type of communication address (e.g., an email address) of the mobile computing device. To that end, in one embodiment, the user device 110 can receive input information indicative or otherwise representative of the user information. More specifically, as described herein, the user device 110 also can include one or more identification units (not depicted in FIG. 1) that can cause the user device 110 to display, via a display device or display unit, for example, a user interface that includes one or more selectable visual elements. At least one of the selectable visual element(s) can be fillable, and can permit or otherwise facilitate receiving input information at the user device 110. The user device 110 can communicate wirelessly with a beacon device or other types of devices. Wireless links can permit such communication.
[0067] The user device 110 can send, to the server device 120a, the user information that includes a telephone number or another type of communication address (e.g., an email address) of the mobile computing device. As is illustrated in FIG. 1, the user device 110 and the server device 120a can be functionally via coupled to one or more wireless links 112, at least one of the network(s) 130, and one or more links 124. The server device 120a can receive such user information, and can generate a user profile using at least one of the user record associated with (e.g., that prompted transmission of) the activation code. In one aspect, the user profile can include the telephone number (or another type of communication address) of the user device 110. The server device 120a can utilize or otherwise leverage the interface unit 140 in order to retain a record of the user profile. Such a record can be retained in one or more memory devices 150 (collectively referred to as user repository 154. More specifically, the user profile can retained in one or more memory elements 151 (referred to as user profiles) which can embody or can constitute a database or another type of data structure. [0068] The server device 120a also can associate the access rule created for the user record that is associated with the generated user profile. Such an association can permit assigning or otherwise associating the access rule (which also may be referred to as access right in this disclosure) to the user device 110. In one embodiment, to associate the access rule with the user profile, the server device 120a can define a relationship between the user profile and the access rule. In addition or in another embodiment, to associate the access rule with the user profile, the server device 120a can update the user profile to include the access rule. The server device 120a also can generate an access key indicative of a unique user identifier associated with the user profile. As such, the access key itself is unique. In some embodiments, the access key can be embodied in or can include one of a linear barcode or a matrix barcode (e.g., a QR code). In other embodiments, the access key can be embodied in or can include a unique code that can correspond to a radio technology that the user device 110 can utilized to transmit the unique code. In one example, the unique code can correspond to a code to be transmitted by means of Bluetooth radio technology. In another example, the unique code can correspond to a code to be transmitted by means of near field communication (NFC) radio technology. The disclosure is not limited to Bluetooth or NCF radio technologies, and the access key can be embodied in or can include a code that can be transmitted, by the user device 110, via other radio technologies, e.g., ZigBee.
[0069] The server device 120a can send an access key associated with a zone to the communication address of the user device 110. For example, the access key can be associated with zone 102a. In some embodiments, the server device 120a can generate a first access key for zone 120a and a second access key for zone 102b, and can send the first access key and the second access key to the user device 110. Access keys in accordance with this disclosure can unlock respective locking devices associated respective zones. Thus, an access key can permit or otherwise facilitate access to a credentialed zone.
[0070] As is illustrated in FIG. 1, the operational environment 100 also can include a server device 120b. In one aspect, the server device 120a and the beacon device 104a can be functionally coupled via at least one of the one or more network 130. The server device 120b is associated with the beacon device 104b. While not illustrated in FIG. 1, in some embodiments, the server device 120b also can be associated with one or more other beacon devices. For instance, in one embodiment, the server device 120b can be associated with the beacon device 104 and therefore, zone 102a. The server device 120b can be have similar architecture to that of the server device 120a and can provide similar functionality. As such, in some embodiments, the server device 120b also can generate an access key as described herein, and can send the access key to the user device 110. The access key generated by the server device 120b can be associated with zone 102b, and can permit or otherwise facilitate access to the zone 102b in accordance with an access rule configured for a user profile associated with the user device 110, for the zone 102b.
[0071] Therefore, in one aspect, the server device 120a and the server device 120b can serve as zone access controller devices (or regulator devices) that can grant respective types of access to respective zones for a user device. Accordingly, in one aspect, user devices (e.g., mobile computing devices) can include access keys issued from different zone access controller devices, the access keys providing the user devices with credentialed access to different locations and/or devices (e.g., locking devices for rental car access, front door, checking in for an appointment with the dentist, etc.) while the user device utilize respective identification units included therein.
[0072] Regardless the server device that configures a zone and/or generates an access key, the server device can provide a notification to one or more user devices (e.g., user device 110) that an access rule is configured. The one or more user devices are associated with a user profile associated with the access key and/or the access rule. The notification can be directed to an initial configuration of the access rule or to a subsequent change to the access rule. More specifically, in some embodiments, a subsequent change to an access rule can be determined at one or more rules. In one example, the server device, e.g., server device 120a, can determine that an update rule is satisfied, and can update the access rule. In another example, the server device, e.g., server device 120a, can determine that a deletion rule is satisfied, and the server device can delete the access rule. A notification of a change to an access rule can be embodied in or can include a push notification. In order to provide the push notification, the server device (e.g., server device 120a or server device 120b) can determine one or more communication addresses (e.g., telephone number, email address, or the like) of respective one or more user devices (e.g., mobile computing devices) associated with the user profile. In addition, in some embodiments, the server device can send a notification request to a messaging system to deliver the push notification, where the notification request can include including the one or more communication addresses. The messaging system can deliver the push notification. In one of such embodiments, depending on the type of notification, the messaging system can be a third-party messaging system.
[0073] In embodiments in which a notification of an updated to an access rule is embodied in or includes an email notification. The server device, e.g., server device 120a or server device 120b, that updates or otherwise configures the access rule can provide the email notification. To that end, in some aspects, the server device can determine an email addresses associated with a user profile associated with the updated access rule, and can generate or otherwise compose the email notification. The server device, e.g., server device 120a or server device 120b, also can send the email notification to the email address.
[0074] As described herein, one or more server devices (e.g., server device 120a and/or server device 120b) can generate access keys can grant the access keys to the user device 110 or any other type of mobile computing device. In addition, the user device 110 can transmit first wireless signals and can receive second wireless signals according to one or more defined protocols of a radio technology. To that, in some embodiments, the user device 110 can include a radio having one or more antennas and a communication processing unit. The one or more antennas can receive the second wireless signals, and the communication processing unit can processes the second wireless signals. In some aspects, the communication processing unit can convert analog signals associated with the second wireless signals into digital signal that can be further processed by the user device 110. Similarly, the communication processing unit can process digital signals to generate the first wireless signals, and the one or more antennas transmit the first wireless signals. In some instances, the user device 110 can attempt to enter zone 102a. To that end, in one aspect, the user device 110 can be proximate to the beacon device 104a and can initiate the establishment of a connection with the beacon device 104a. After or upon establishing the connection, the user device 110 can send an access key associated with the zone 102a to the beacon device 104. The beacon device 104a can process the access key (e.g., apply access logic) or can send the access key to the server device 120a or another device to process the key. In some instances, after or upon the access key is processed, the beacon device 104 can determine that access to zone 102a is to be granted. In response, the beacon device 104 can cause the locking device 106a to transition from a locked state to an unlocked state. The beacon device 104 also can send, to the server device 120a, for example, an indication of granted entry to zone 102a. The server device 120a can receive the indication of granted entry to zone 102a and, in some embodiments, can retain such an indication in the access record repository 152. In other embodiments, the server device 120a can generate a record of access granted by using the indication, and can retain the record in the access record repository. The record can include a timestamp indicative of a date and/or time of the denial of entry; an identifier for zone 102; an identifier of the user device 1 10 or a user profile associated with the user device; a combination thereof; or the like.
[0075] In addition or in other instances, after or upon the access key is processed, the beacon device 104a can determine that access to zone 102a is to be denied. In response, the locking device 106a can remain in a locked state. The beacon device 104 can send, to the server device 120a, for example, an indication of denied entry to zone 102a. The server device 120a can receive the indication of denied entry to zone 102a and, in some embodiments, can retain such an indication in the access record repository 152. In other embodiments, the server device 120a can generate a record of access denied by using the indication, and can retain the record in the access record repository. As mentioned, the record can include a timestamp indicative of a date and/or time of the denial of entry; an identifier for zone 102; an identifier of the user device 1 10 or a user profile associated with the user device; a combination thereof; or the like.
[0076] As described herein, the operational environment 100 also can include one or more interface units 140 (represented as interface unit 140) that can be functionally coupled with the server device 120a and/or the server device 120b. In one aspect, the interface unit 140 can be embodied in or can include a computing device (e.g., a server device) that includes one or more APIs that permit the exchange of information between the interface unit 140 and the server device 120a and/or the server device 120b. As is illustrated in FIG. 1, the interface unit 140 also can be functionally coupled to various repositories, e.g., multiple memory devices (or storage devices), that can retain various information associated with end-users, access rules, zones, access records, and the like. More specifically, in some embodiments, such repositories can include a user repository 150 that can retain one or more user profiles 152. In addition or in other embodiments, the repositories can include an access record repository 152 that can retain records (or other types of information) indicative of access attempts to zones by user devices (e.g., user device 1 10) and/or outcomes of the access attempts— e.g., access granted or access denied. Such zones can be associated with one or more server devices, such as server device 120a and/or server device 120b. For instance, the access record repository 152 can include records (or other type of information) indicative of access attempts to enter zone 102a and/or zone 102b by user device 110. The information retained in access record repository 152 can permit or otherwise facilitate, amongst other things, the tracking of a user device within zone(s)— either from a single organization or multiple organizations associated with the user device— thus providing clarity and record of actions; legal defensibility; or the like. Further or in other embodiments, the repositories can include a zone information repository 154 that can retain information (e.g., data and/or metadata) indicative or otherwise representative of one or more zones. For instance, the information can include first information indicative of beacon devices associated with respective zones. Still further or in yet other embodiments, the repositories can include an access rule repository 156 that can retain information indicative of access rules (e.g., a schedule of permitted entry to a zone).
[0077] The server device 120a and the sever device 120b can implement the functionality described herein via identification unit(s) 122a and identification unit(s) 122b. In some embodiments, as is illustrated in FIG. 1A, a server device 160 (which can embody or can include server device 120a or sever device 120b) can include one or more memory devices 164 having one or more access and identification components 166. The identification component(s) 166 can configure the server device 120b to provide the functionality described herein. In addition, in response to execution, the server device 120b can implement or otherwise provide the various functionalities described herein. The server device 160 can include one or more processors 172 that can execute the access and identification component(s) 166. In addition, the server device 160 can include or can be coupled to a display unit 168 that can present numerous interfaces that can permit administering access rules, addition of user devices, removal of user devices, and the like. In some aspects, as is illustrated in FIG. 15, 16, 17, 18, 19, 20, and 21. The server device 160 can permit monitoring recent activity, such as zones access activity and/or contact information exchange (e.g., card exchanges). . In addition, as is illustrated in FIGS. 24-25, the server device 160 can permit create, controlling and terminating zone access rights to zones controlled or otherwise configured by the server device 160 or other server devices in accordance with aspects of this disclosure..
[0078] In other aspects, as is illustrated in FIGS. 22-23, the server device 160 can permit viewing all employees or other end-users for which a user profile is available within the user repository 150. The information that can be presented can include name, picture, email, department if applicable, address, fax number, and/or phone number.
[0079] In still other aspects, as is illustrate in FIG. 24, the server device 160 can permit managing employees. For example the server device 160 can permit sending and updating access rights, deactivating user mobile devices, terminating zone access, uploading business cards for employees/users, and view employee's recent activity. In one aspect, a manager device can deactivate the user's zone access at any time by electing an option to "deactivate device". The manager may also manage the user's access rights.
[0080] In other aspects, the server device 160 also can permit adding and creating employees/users and define their access levels to zones. See, for example, FIG. 21. In addition, as is illustrated in FIG. 23, the server device 160 can permit creating roles for employees/users within an organization that leverages or otherwise utilizes the server devices in accordance with this disclosure. Similarly, as is illustrated in FIG. 25, the server device 160 can permit creating departments for employees/users within an organization that leverages or otherwise utilizes the server devices in accordance with this disclosure. Further as describe herein, the server device 160 can permit or otherwise facilitate zone creation and defining zone access rights. In addition, the server device also can permit, via at least a user interface, editing company settings and/or adding new managers authorized to operate the web app. Further, in some aspects, as is illustrated in FIGS. 28-27, the server device 160 can permit or otherwise facilitate sending messages to employees/clients mobile devices directly via SMS text message. Furthermore, as is also illustrated in FIGS. 27-28, the sever device 160 can generate access key for new user devices. Upon or Once a new user's profile has been created, the manager may send the access code to that individual's mobile device, activating all of their access keys to specified zones.
[0081] In addition, the server device 160 also can permit to login to access various functionalities remotely. Thus, the server device 160 can permit an end-user to log into a portal provide by the server device 160.
[0082] FIG. 2 illustrates an example of a client device 210 for access control and
identification, according to one or more embodiments of this disclosure. The client device 210 can include one or more input/output (I/O) units 202 that can permit or otherwise facilitate receiving input information at the client device 210. To that end, in one embodiment, the I/O interface unit(s) 202 can include a display unit 204. In addition or in another embodiment, the client device 210 can include an audio input unit and an audio output unit (collectively referred to as audio I/O unit(s) 206. Further or in yet other embodiments, the client device 210 can include one or more camera modules 210. At least one of the camera module(s) 210 can permit or otherwise facilitate collecting information by focusing on an object (e.g., an image displayed on another client device) and generating a digital image of at least a portion of the object.
[0083] The client device 210 also can include a wireless scanning unit 208 that can generate pilot signals (e.g., beacon signals) that can be transmitted wirelessly, for example, by means of a radio unit 220 (also referred to as radio 220). To that end, the radio unit 220 can include one or more antennas 222 functionally coupled to a multi-mode communication processing unit 324. The radio unit 210, via the multi-mode communication processing unit 224, can process the pilot signals according to one or more defined protocols of a radio technology. The radio technology can include, for example, 3G, Long Term Evolution (LTE), LTE-Advanced, 5G, IEEE 802.1 1, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC), or the like. At least one of the antenna(s) 222 can send wirelessly the processed pilot signals. As is illustrated in FIG. 3, in some embodiments, the radio unit 220 can include the antenna(s) 222, and one or more transmitters and one or more receivers, collectively referred to as transceiver(s) 310. In addition, the radio unit 220 can include a multiplexer/demultiplexer 320, a coder/decoder (codec) unit 330, and a modulator/demodulator (modem) unit 340. More specifically, in certain embodiments, the antenna(s) 222 can be embodied in or can include directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals. In addition, or in other embodiments, at least some of the antenna(s) 222 can be physically separated to leverage spatial diversity and related different channel characteristics associated with such diversity. In addition or in other embodiments, the multi-mode communication processing unit 224 can process at least wireless signals in accordance with one or more radio technology protocols and/or modes (such as MTMO, single-input-multiple-output (SEVIO), multiple-input-single-output (MISO), and the like. Each of such protocol(s) can be configured to communicate (e.g., transmit, receive, or exchange) data, metadata, and/or signaling over a specific air interface. The one or more radio technology protocols can include 3.sup.rd
Generation Partnership Project (3GPP) Universal Mobile Telecommunication System (UMTS); 3GPP Long Term Evolution (LTE); LTE Advanced (LTE-A); Wi-Fi protocols, such as those of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards;
Worldwide Interoperability for Microwave Access (WiMAX); radio technologies and related protocols for ad hoc networks, such as Bluetooth or ZigBee; other protocols for packetized wireless communication; or the like). The multi-mode communication processing unit 224 also can process non-wireless signals (analogic, digital, a combination thereof, or the like). While illustrated as separate blocks in the computing device 210, it should be appreciated that in certain embodiments, at least a portion of the multi-mode communication processing unit 224 and the communication unit 224 can be integrated into a single unit (e.g., a single chipset or other type of solid state circuitry).
[0084] In one embodiment, e.g., example embodiment shown in FIG. 3, the multi-mode communication processing unit 222 can comprise a set of one or more transmitters/receivers 304, and components therein (amplifiers, filters, analog-to-digital (A/D) converters, etc.), functionally coupled to a multiplexer/demultiplexer (mux/demux) unit 308, a modulator/demodulator (mod/demod) unit 316 (also referred to as modem 316), and a coder/decoder unit 312 (also referred to as codec 312). Each of the transmitter(s)/receiver(s) can form respective
transceiver(s) that can transmit and receive wireless signal (e.g., electromagnetic radiation) via the one or more antennas 222. It should be appreciated that in other embodiments, the multi- mode communication processing unit 224 can include other functional elements, such as one or more sensors, a sensor hub, an offload engine or unit, a combination thereof, or the like.
[0085] Electronic components and associated circuitry, such as mux/demux unit 308, codec 312, and modem 316 can permit or facilitate processing and manipulation, e.g., coding/decoding, deciphering, and/or modulation/demodulation, of signal(s) received by the computing device 210 and signal(s) to be transmitted by the computing device 210. In one aspect, as described herein, received and transmitted wireless signals can be modulated and/or coded, or otherwise processed, in accordance with one or more radio technology protocols. Such radio technology protocol(s) can include 3 GPP UMTS; 3 GPP LTE; LTE-A; Wi-Fi protocols, such as the IEEE 802.11 family of standards (IEEE 802.ac, IEEE 802.ax, and the like); WiMAX; radio
technologies and related protocols for ad hoc networks, such as Bluetooth or ZigBee; other protocols for packetized wireless communication; or the like. The electronic components in the described communication unit, including the one or more transmitters/receivers 304, can exchange information (e.g., data, metadata, code instructions, signaling and related payload data, combinations thereof, or the like) through a bus 314, which can embody or can comprise at least one of a system bus, an address bus, a data bus, a message bus, a reference link or interface, a combination thereof, or the like. Each of the one or more receivers/transmitters 304 can convert signal from analog to digital and vice versa. In addition or in the alternative, the
receiver(s)/transmitter(s) 304 can divide a single data stream into multiple parallel data streams, or perform the reciprocal operation. Such operations may be conducted as part of various multiplexing schemes. As illustrated, the mux/demux unit 308 is functionally coupled to the one or more receivers/transmitters 304 and can permit processing of signals in time and frequency domain. In one aspect, the mux/demux unit 308 can multiplex and demultiplex information (e.g., data, metadata, and/or signaling) according to various multiplexing schemes such as time division multiplexing (TDM), frequency division multiplexing (FDM), orthogonal frequency division multiplexing (OFDM), code division multiplexing (CDM), or space division
multiplexing (SDM). In addition or in the alternative, in another aspect, the mux/demux unit 308 can scramble and spread information (e.g., codes) according to most any code, such as
Hadamard -Walsh codes, Baker codes, Kasami codes, polyphase codes, and the like. The modem 316 can modulate and demodulate information (e.g., data, metadata, signaling, or a combination thereof) according to various modulation techniques, such as frequency modulation (e.g., frequency- shift keying), amplitude modulation (e.g., Q-ary quadrature amplitude modulation (QAM), with Q a positive integer; amplitude-shift keying (ASK)), phase-shift keying (PSK), and the like). In addition, processor(s) that can be included in the computing device 310 (e.g., processor(s) included in the radio unit 224 or other functional element(s) of the computing device 210) can permit processing data (e.g., symbols, bits, or chips) for
multiplexing/demultiplexing, modulation/demodulation (such as implementing direct and inverse fast Fourier transforms), selection of modulation rates, selection of data packet formats, inter- packet times, and the like.
[0086] The codec 312 can operate on information (e.g., data, metadata, signaling, or a combination thereof) in accordance with one or more coding/decoding schemes suitable for communication, at least in part, through the one or more transceivers formed from respective transmitter(s)/receiver(s) 304. In one aspect, such coding/decoding schemes, or related procedure(s), can be retained as a group of one or more computer-accessible instructions (computer-readable instructions, computer-executable instructions, or a combination thereof) in one or more memory devices 240 (referred to as memory 240). In a scenario in which wireless communication among the computing device 210 and another computing device (e.g., a station or other type of user equipment) utilizes MTMO, MISO, SEVIO, or SISO operation, the codec 312 can implement at least one of space-time block coding (STBC) and associated decoding, or space-frequency block coding (SFBC) coding and associated decoding. In addition or in the alternative, the codec 312 can extract information from data streams coded in accordance with spatial multiplexing scheme. In one aspect, to decode received information (e.g., data, metadata, signaling, or a combination thereof), the codec 312 can implement at least one of computation of log-likelihood ratios (LLRs) associated with constellation realization for a specific
demodulation; maximal ratio combining (MRC) filtering, maximum-likelihood (ML) detection, successive interference cancellation (SIC) detection, zero forcing (ZF) and minimum mean square error estimation (MMSE) detection, or the like. The codec 312 can utilize, at least in part, mux/demux unit 308 and mod/demod unit 316 to operate in accordance with aspects described herein.
[0087] As is illustrated by FIG. 29, the client device 210 can be utilized as a digital ID badge for an end-user. To that end, the display unit 204 can present There may be multiple ID badges stored within MyCard. For example, a user may have their digital work ID badge and
government driver's license saved. In one aspect, the proper ID may be displayed as needed. A badge cannot be altered by a mobile user. Further, as is illustrated by FIGS. 49, 50, 51, 52, and 43, and as is described herein, the client device 210 can be utilized as an access key.
Digital business and/or contact card creation, exchange, storage and interactivity mobile app. Cards may be exchanged from mobile device to mobile device using wireless connections such as for e.g., NFC, Bluetooth, SMS text messages, and/or email. The exchanged card may be uploaded into the receiving MyCard mobile app and saved in the app's contact list. This contact's profile may now contain that contact's digital business card, the GPS location of the exchange, date and time of the exchange, and any notes the receiving user wanted to add on their new contact.
[0088] In some aspects, the client device 210 and other client devices described herein can serve a business card, as is illustrated in FIG. 14. The user may either upload a file of an existing physical business card to the mobile app, or create his or her own contact card within the mobile app. The functionality provided by the access and identification component(s) 246 can be activated in accordance with aspects described herein. After or upon activation, the client device can begin receiving access keys and ID badges from the web app.
[0089] In some aspects, as is illustrated in FIGS. 30-31, digital business card transfer via SMS, NFC, Bluetooth and/or email. Received cards may be stored, or uploaded directly to the MyCard mobile app. Cards (business or personal contact cards) may be created by either the manager (managing employees/clients) or the mobile user. In addition, as is illustrated in FIG. 30, exchanged contacts can be searched in a contact database, which can be retained in the client device 210 or remotely.'
[0090] In some embodiments, contact cards uploaded into the system may reflect date and time of the exchange, as well as GPS coordinates of the exact place where the exchange took place. In other embodiments, end-users may search for contact cards by people, places, organizations, dates/times, position/titles. In addition, as is illustrated in FIGS. 31, 32, the client device 210 can cause the display device 210 to present selectable visual elements representative of options for communication with other client devices. Users may communicate with contacts within the MyCard mobile app by for e.g., finding the contact they are searching for and emailing, calling, or texting that client, as well as viewing their business card and the GPS coordinates of where that exchange took place. See, for example, FIG. 34.
[0091] In some aspects, as is illustrated in FIG. 33, upon or after receiving an exchanged contact card, users may add notes to the new contact - allowing the users to make a digital record of the exchange or meeting.
[0092] In some embodiments, cards may be exported/uploaded to an Excel, Apple numbers, or other type of spreadsheet. In addition, camera module(s) 211 can permit or otherwise facilitate taking a picture of a business card and scan that card image into their own existing card slot or apply it to the card slot of a person they just met and handed them a physical card.
[0093] As is illustrated in FIGS. 50, the main interface of the mobile app may be a personal badge for the user. This main page may include options taking the user to the key and card libraries. The user may choose a personal image for their "main badge" on the homepage. Like the card and key libraries, there may be a badge library of saved badges to be pulled by the user. These badges include, but are not limited to work ID badges, government IDs, school IDs, driver's licenses, boarding passes, concert and venue tickets, etc.
[0094] ID badges may include unique barcodes or QR codes (see, e.g., FIG. 53) as would appear on a physical identification. These barcodes attached to one of a user's digital id badges may be read by an appropriate reader.
[0095] With further reference to FIG. 2, in some embodiments, the client device 210 also can include a location unit 214 that can permit or otherwise facilitate generating a location estimate of a current location of the client device 210. In one embodiment, the location unit 214 can be configured to receive timing messages from a global navigation system (e.g., global positioning system (GPS)), and to generate the location estimate using at least the timing messages.
[0096] The client device 210 also can include one or more processors 230 and one or more memory devices (collectively referred to as memory 240). The memory 240 can include one or more access and identification (A&I) component(s) 246 that can configure the processor(s) 230 to provide one or more functionalities described herein. The A&I component(s) can be executed by at least one of the processor(s) 230 and can cause the at least one processor, and the client device, to provide the one or more functionalities. More specifically, in response to execution of the A&I component(s) 246 by at least one of the processor(s) 230, for example, can cause the client device 210 to perform or facilitate operations that provide the one or more functionalities described herein.
[0097] The memory 240 also can include A&I information 246 that includes multiple access keys 248 and card information 250. In some embodiments, the multiple access keys 248 can embody or can constitute a library of access keys available to an end-user of the mobile device. In addition, in one of such embodiments, the card information 250 can include a user profile for the end-user. In other embodiments, card information 250 may be absent. As mentioned, in one example, at least a first one (or, in some embodiments, each one) of the access keys 248 can be embodied in or can include an identification badge associated with an end-user of the client device 210. In addition, at least a second one of the access keys 248 can be embodied in or can include an access code for use in attempting access (and, ultimately, being granted access or denied access) to a zone in accordance with this disclosure. [0098] FIG. 4 presents an example of an operational environment 400 for identification of user devices, according to one or more embodiments of the disclosure. The operational environment 400 can include a client device A 210a and a client device 210b. Each one of such devices can include the functional elements described herein in connection with client device 210. As is illustrated, the client device A 210a can establish a connection with the client device B 210b. In one example, to establish such a connection, the client device A 210a can send a connection request message to connect with the client device B 210b, and in response, the client device A 210a can receive a response message (e.g., an ACK message) indicating that the connection is established. Establishment of such a connection is represented as pairing 405 in FIG. 4. In some instances, the client device A 210a can send the connection request message in response to receiving input information indicative of a selection to exchange contact information (e.g., business information or other type of identification (ID) information). The input information can be received via a GUI displayed at the client device 210a, for example. In other instances, the client device A 210a can be configured to broadcast an indication of availability to supply contact information. The indication can be broadcasted wirelessly, within pilot signals. Broadcasting such an indication can permit or otherwise facilitate reaching out to other client device(s), including the client device B 210b, that can be configured to "listen" (e.g., monitor wireless signals) for an opportunity to receive, send, or exchange contact information. Therefore, in one aspect, user devices can detect other user devices in proximity and available to exchange contact information regardless of a prior association between such user devices.
[0099] After or upon the connection has been established, the client device A 210a can send, to the client device B 210b, a request message to 410 to supply contact information. In response, the client device B 210b can send contact information 420. The client device A 210a can receive the contact information 420 and can retain at least a portion of the contact information 420 in a memory device 240 (not shown in FIG. 4) of the client device A 210a.
[0100] In addition or in some embodiments, upon or after receiving at least a portion of the contact information 420, the client device 210a can send a request message 430 to record an exchange of contact information 420. The request message 430 can include location information indicative or otherwise representative of a location of client device A 210a at the time of the exchange or at a time shortly (e.g., tens of milliseconds, hundreds of millisecond, a second, a few seconds) after the exchange. In addition or in some embodiments, the request message 430 also can include a timestamp (or other type of information) indicative of a date and a time at which the contact information 420 is received.
[0101] As is illustrated in FIG. 4, the request message 430 can be sent to a server device 440 that includes one or more identification units 450 in accordance with this disclosure. The identification unit(s) 450 can be the same as or similar to the identification unit(s) 122a. In one instance, the server device 440 can receive the request message 430 and, in response, can determine that a user profile associated with the client device B 210b is present in a user repository (e.g., user repository 150; not shown in FIG. 4). In response, in one aspect, the server device 440 can generate a record of the exchange (which can be referred to as a card exchange record) and can retain such a record in a card exchange repository (not shown in FIG. 4). In another instance, the service device 440 can determine that a user profile associated with the client device B 210b is not present or otherwise available in the user repository. In response, in one aspect, the server device 440 can generate a user profile using the at least a contact information of the contact information 420. The user profile can be associated with the client device B 210b. In addition or in the alternative, the server device 440 can generate a record of the exchange and can retain such a record in the card exchange repository.
[0102] The client device A 210a can operate on card information retained at a memory device of the client device A 210a and/or the card exchange repository.
[0103] As described herein, whenever zones are accessed— e.g., access denied or access granted— an indication of the access occurrence may be logged and saved in access record repository 152 or any other memory device accessible to a server device, e.g., server device 120a or server device 120b. Thus, an audit trail applicable to one or more zones can be created.
[0104] In addition, records indicative of access granted and/or access denied for one or more zones and/or one or more user devices (e.g., mobile device(s)) can be utilized or otherwise leveraged to generate insights related to access behavior of a user device or a group of user devices. To that end, as is illustrated in FIG. 5, an operation environment 500 in accordance with this disclosure can include an insight engine unit 510 functionally coupled to user repository 150; access records storage 152; zone information storage 154; and/or access rule storage 156. As such, in one embodiment, the insight engine unit 510 can determine that a correlation is present between (a) first entry records (first access granted records, first access denied records, or a combination thereof) associated with a first zone and (b) second entry records associated with a zone. The first zone can include zone 102a and the second zone can include zone 102b. The insight engine unit 510 can send information indicative of the correlation to server device 120a and/or server device 120b. Based on at least one of the correlation, at least one of a portion of the first entry records, or a portion of the second entry records, the server device 120a and/or server device 120b can configure a second access rule associated with a user profile, the second access rule can regulate entry to a third zone. In addition, the server device(s) that configure the access rule can generate an access key indicative of a unique user identifier associated with the user profile. Such server device(s) can associate the access key with the third zone, and can send the second access key to the communication address of the mobile computing device.
[0105] In addition or in other embodiments, the insight engine 510 can perform or otherwise facilitate a data mining process that can include four groups of operations: (I) Data selection. Data is pulled into the engine from multiple sources. These sources can be log files, external data and even most likely a database. The selection process typically involves aggregating these different sources into a single source, normally a flat list of key value pairs. (II) Data
preprocessing and transformation. The preprocessing operations can include normalizing the data from the selection process, running some basic validation rules and removing erroneous samples. Transformation is normally applied to the preprocessed data to prepare the sample set of data for processing in the next step. Different processing algorithms require different transformation. At times these transformations can be as simple as just ordering the data by a particular attribute. An example of a more complicated transformation might be running further calculations on the sample set producing derived attributes such as a sum of failed unlocked for a particular user or an average time a particular zone is accessed.
[0106] (III) Data analysis (or data mining). This group of operations can include the determination of patterns or other types of features presents in the pre-processed and transformed data. That end, the insight engine unit 510 can implement (e.g., perform) numerous algorithms against a preprocessed and transformed set of data. Such algorithms can include various feature detection algorithms. Each one of the algorithms can produce different results depending of a specific feature of interest, such as type of pattern. The algorithm can include clustering, classification like decision trees, and regression. In one embodiment, the insight engine can implement a decision tree, which is a type of classification. In such an embodiment, the insight engine unit 510 can apply a set of rules to available data, where the set of rules can be modeled after a defined set of patterns. The defined set of patterns can be determined based on an access behavior of interest. As part of the implementation of the decision tree, the insight engine unit 500 can train one or more of the rules in the defined set of rules against a training set of data. Such rule(s) can be adjusted based at least on available non-training data.
[0107] (IV) Generation of insight and/or interpolation. After or upon a pattern is determined or otherwise identified, the insight engine unit can further analyze data associated with the pattern. Such further analysis can permit adjusting a group of algorithms applied by the insight engine unit to extract feature(s) and, ultimately, determine an insight (e.g., an amount of actionable knowledge. Such adjustment can be implemented in learning stage of the data analysis. Once we have a set found patterns we can report them in various ways, storing them in a database for later review by the system. The system can also at this point perform some predefined automated actions. As discussed herein, push notifications or other types of notification can be sent to one or more specific devices, for example.
[0108] FIG. 6 illustrates example of a computational environment 600 for access control and identification of a user device, in accordance with one or more embodiments of the disclosure. The example computational environment 2300 is merely illustrative and is not intended to suggest or otherwise convey any limitation as to the scope of use or functionality of the computational environment's architecture. In addition, the illustrative computational environment 2300 depicted in FIG. 6 should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the example operational environments of the disclosure. The example computational environment 2300 or portions thereof can embody or can constitute the operational environments described hereinbefore. As such, the computing device 2310 can embody or can constitute, for example, any of the communication devices or servers (such as the caller analysis server 140) described herein. In one example, the computing device 2310 can be embodied in a portable personal computer or a handheld computing device, such as a mobile tablet computer, an electronic-book reader, a mobile telephone (e.g., a smartphone), and the like. In another example, the computing device 2310 can be embodied in a wearable computing device, such as a watch, goggles or head- mounted visors, or the like. In yet another example, the computing device 2310 can be embodied in portable consumer electronics equipment, such as a camera, a portable television set, a gaming console, a navigation device, a voice-over-internet-protocol telephone, a media playback device, or the like.
[0109] The computational environment 2300 represents an example implementation of the various aspects or features of the disclosure in which the processing or execution of operations described in connection with the management of unknown callers in accordance with aspects disclosed herein can be performed in response to execution of one or more software components at the computing device 2310. It should be appreciated that the one or more software components can render the computing device 2310, or any other computing device that contains such components, a particular machine for the management of unknown callers in accordance with aspects described herein, among other functional purposes. A software component can be embodied in or can comprise one or more computer-accessible instructions, e.g., computer- readable and/or computer-executable instructions. In one scenario, at least a portion of the computer-accessible instructions can embody and/or can be executed to perform at least a part of one or more of the example methods described herein, such as the example method presented in FIG. 6. For instance, to embody one such method, at least the portion of the computer-accessible instructions can be retained (e.g., stored, made available, or stored and made available) in a computer storage non-transitory medium and executed by a processor. The one or more computer-accessible instructions that embody a software component can be assembled into one or more program modules, for example, that can be compiled, linked, and/or executed at the computing device 2310 or other computing devices. Generally, such program modules comprise computer code, routines, programs, objects, components, information structures (e.g., data structures and/or metadata structures), etc., that can perform particular tasks (e.g., one or more operations) in response to execution by one or more processors, which can be integrated into the computing device 2310 or functionally coupled thereto.
[0110] The various example embodiments of the disclosure can be operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or
configurations that can be suitable for implementation of various aspects or features of the disclosure in connection with the management of unknown callers in accordance with aspects described herein can comprise personal computers; server computers; laptop devices; handheld computing devices, such as mobile tablets or e-readers; wearable computing devices; and multiprocessor systems. Additional examples can include set-top boxes, programmable consumer electronics, network personal computers (PCs), minicomputers, mainframe computers, blade computers, programmable logic controllers, distributed computing environments that comprise any of the above systems or devices, and the like.
[0111] As illustrated in FIG. 6, the computing device 610 can comprise one or more processors 614, one or more input/output (I/O) interfaces 616, a memory 630, and a bus architecture 632 (also termed bus 632) that functionally couples various functional elements of the computing device 610. In certain embodiments, the computing device 610 can include, optionally, a radio unit 612. The radio unit 612 can include one or more antennas and a communication processing unit that can permit wireless communication between the computing device 610 and another device, such as one of the computing device(s) 670. The bus 632 can include at least one of a system bus, a memory bus, an address bus, or a message bus, and can permit the exchange of information (data, metadata, and/or signaling) between the processor(s) 614, the I/O interface(s) 616, and/or the memory 630, or respective functional elements therein. In certain scenarios, the bus 632 in conjunction with one or more internal programming interfaces 650 (also referred to as interface(s) 650) can permit such exchange of information. In scenarios in which the processor(s) 614 include multiple processors, the computing device 610 can utilize parallel computing.
[0112] The I/O interface(s) 616 can permit communication of information between the computing device and an external device, such as another computing device, e.g., a network element or an end-user device. Such communication can include direct communication or indirect communication, such as the exchange of information between the computing device 610 and the external device via a network or elements thereof. As illustrated, the I/O interface(s) 616 can comprise one or more of network adapter(s) 618, peripheral adapter(s) 622, and display unit(s) 626. Such adapter(s) can permit or facilitate connectivity between the external device and one or more of the processor(s) 614 or the memory 630. For example, the peripheral adapter(s) 622 can include a group of ports, which can include at least one of parallel ports, serial ports, Ethernet ports, V.35 ports, or X.21 ports. In certain embodiments, the parallel ports can comprise General Purpose Interface Bus (GPIB), IEEE- 1284, while the serial ports can include
Recommended Standard (RS)-232, V. l l, Universal Serial Bus (USB), Fire Wire or IEEE-1394. [0113] In one aspect, at least one of the network adapter(s) 618 can functionally couple the computing device 610 to one or more computing devices 670 via one or more traffic and signaling pipes 660 that can permit or facilitate the exchange of traffic 662 and signaling 664 between the computing device 610 and the one or more computing devices 670. Such network coupling provided at least in part by the at least one of the network adapter(s) 618 can be implemented in a wired environment, a wireless environment, or both. The information that is communicated by the at least one of the network adapter(s) 618 can result from the
implementation of one or more operations of a method in accordance with aspects of this disclosure. Such output can be any form of visual representation, including, but not limited to, textual, graphical, animation, audio, tactile, and the like. In certain scenarios, each of the computing device(s) 670 can have substantially the same architecture as the computing device 610. In addition or in the alternative, the display unit(s) 626 can include functional elements (e.g., lights, such as light-emitting diodes; a display, such as a liquid crystal display (LCD), a plasma monitor, a light-emitting diode (LED) monitor, or an electrochromic monitor;
combinations thereof; or the like) that can permit control of the operation of the computing device 610, or can permit conveying or revealing the operational conditions of the computing device 610.
[0114] In one aspect, the bus 632 represents one or more of several possible types of bus structures, including a memory bus or a memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. As an illustration, such architectures can comprise an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, an Accelerated Graphics Port (AGP) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express bus, a Personal Computer Memory Card International Association (PCMCIA) bus, a Universal Serial Bus (USB), and the like. The bus 632, and all buses described herein can be implemented over a wired or wireless network connection and each of the subsystems, including the processor(s) 614, the memory 630 and memory elements therein, and the I/O interface(s) 616 can be contained within one or more remote computing devices 670 at physically separate locations, connected through buses of this form, in effect implementing a fully distributed system. In certain embodiments, such a distributed system can implement the functionality described herein in a client-host or client- server configuration in which the access and identification component(s) 636 or the access and identification information 640, or both, can be distributed between the computing device 610 and at least one of the computing device(s) 670, and the computing device 610 and at least one of the computing device(s) 670 can execute such components and/or leverage such information. It should be appreciated that, in an embodiment in which the computing device 610 embodies or constitutes a client device (e.g., client device 210), the access and identification component(s) 636 can be different from those in an embodiment in which the computing device 610 embodies or constitutes a server device (e.g., server device 160, server device 120a, or server device 120b) or an interface unit 140 in accordance with aspects of this disclosure.
[0115] The computing device 610 can comprise a variety of computer-readable media.
Computer-readable media can be any available media (transitory and non-transitory) that can be accessed by a computing device. In one aspect, computer-readable media can comprise computer non-transitory storage media (or computer-readable non-transitory storage media) and communications media. Example computer-readable non-transitory storage media can be any available media that can be accessed by the computing device 610, and can comprise, for example, both volatile and non-volatile media, and removable and/or non-removable media. In one aspect, the memory 630 can comprise computer-readable media in the form of volatile memory, such as random access memory (RAM), and/or non-volatile memory, such as read-only memory (ROM).
[0116] The memory 630 can comprise functionality instructions storage 634 and
functionality information storage 638. The functionality instructions storage 634 can comprise computer-accessible instructions that, in response to execution (by at least one of the
processor(s) 614), can implement one or more of the functionalities of the disclosure. The computer-accessible instructions can embody or can comprise one or more software components illustrated as access and identification component(s) 636. In one scenario, execution of at least one component of the access and identification component(s) 636 can implement one or more of the methods described herein, such as the example methods 700, 750, 800, 900, 1000, 1100, 1200, and 1300. For instance, such execution can cause a processor (e.g., one of the processor(s) 614) that executes the at least one component to carry out a disclosed example method. It should be appreciated that, in one aspect, a processor of the processor(s) 614 that executes at least one of the access and identification component(s) 636 can retrieve information from or retain information in one or more memory elements 640 in the functionality information storage 638 in order to operate in accordance with the functionality programmed or otherwise configured by the access and identification component(s) 636. The one or more memory elements 640 may embody at least some of the repositories coupled to the interface unit 140. Such elements may be referred to as access and identification information and can include at least one of code instructions, information structures, or the like. For instance, at least a portion of such information structures can be indicative or otherwise representative of elements retained in the repositories functionally coupled to the interface 140, in accordance with aspects described herein.
[0117] At least one of the one or more interfaces 650 (e.g., application programming interface(s)) can permit or facilitate communication of information between two or more components within the functionality instructions storage 634. The information that is
communicated by the at least one interface can result from implementation of one or more operations in a method of the disclosure. In certain embodiments, one or more of the
functionality instructions storage 634 and the functionality information storage 638 can be embodied in or can comprise removable/non-removable, and/or volatile/non-volatile computer storage media.
[0118] At least a portion of at least one of the access and identification component(s) 636 or the access and identification information 640 can program or otherwise configure one or more of the processors 614 to operate at least in accordance with the functionality described herein. One or more of the processor(s) 614 can execute at least one of the access and identification component(s) 636 and leverage at least a portion of the information in the functionality information storage 638 in order to provide access control and identification of user devices in accordance with one or more aspects described herein.
[0119] It should be appreciated that, in certain scenarios, the functionality instructions storage 634 can embody or can comprise a computer-readable non-transitory storage medium having computer-accessible instructions that, in response to execution, cause at least one processor (e.g., one or more of the processor(s) 614) to perform a group of operations comprising the operations or blocks described in connection with the disclosed methods.
[0120] In addition, the memory 630 can comprise computer-accessible instructions and information (e.g., data, metadata, and/or programming code instructions) that permit or facilitate the operation and/or administration (e.g., upgrades, software installation, any other configuration, or the like) of the computing device 610. Accordingly, as illustrated, the memory 630 can comprise a memory element 642 (labeled operating system (OS) instruction(s) 642) that contains one or more program modules that embody or include one or more operating systems, such as Windows operating system, Unix, Linux, Symbian, Android, Chromium, and substantially any OS suitable for mobile computing devices or tethered computing devices. In one aspect, the operational and/or architectural complexity of the computing device 610 can dictate a suitable OS. The memory 630 also comprises a system information storage 646 having data, metadata, and/or programming code that permits or facilitates the operation and/or administration of the computing device 610. Elements of the OS instruction(s) 642 and the system information storage 646 can be accessible or can be operated on by at least one of the processor(s) 614.
[0121] It should be recognized that while the functionality instructions storage 634 and other executable program components, such as the OS instruction(s) 642, are illustrated herein as discrete blocks, such software components can reside at various times in different memory components of the computing device 610, and can be executed by at least one of the processor(s) 614. In certain scenarios, an implementation of the access and identification component(s) 636 can be retained on or transmitted across some form of computer-readable media.
[0122] The computing device 610 and/or one of the computing device(s) 670 can include a power supply (not shown), which can power up components or functional elements within such devices. The power supply can be a rechargeable power supply, e.g., a rechargeable battery, and it can include one or more transformers to achieve a power level suitable for the operation of the computing device 610 and/or one of the computing device(s) 670, and components, functional elements, and related circuitry therein. In certain scenarios, the power supply can be attached to a conventional power grid to recharge and ensure that such devices can be operational. In one aspect, the power supply can include an I/O interface (e.g., one of the network adapter(s) 618) to connect operationally to the conventional power grid. In another aspect, the power supply can include an energy conversion component, such as a solar panel, to provide additional or alternative power resources or autonomy for the computing device 610 and/or one of the computing device(s) 670.
[0123] The computing device 610 can operate in a networked environment by utilizing connections to one or more remote computing devices 670. As an illustration, a remote computing device can be a personal computer, a portable computer, a server, a router, a network computer, a peer device or other common network node, and so on. As described herein, connections (physical and/or logical) between the computing device 610 and a computing device of the one or more remote computing devices 670 can be made via one or more traffic and signaling pipes 660, which can comprise wired link(s) and/or wireless link(s) and several network elements (such as routers or switches, concentrators, servers, and the like) that form a LAN, a MAN, a WAN, and/or other networks (wireless or wired) having different footprints. Such networking environments are conventional and commonplace in dwellings, offices, enterprise-wide computer networks, intranets, local area networks, and wide area networks.
[0124] In some embodiments, access keys may be received by barcode/QR code scanners, Bluetooth readers, chip readers, radio signal readers, among other electronic receiving and processing devices. The reader devices (also referred to as beacon devices) - whichever type they may be (or location of installment) may be functionally coupled (e.g., wirelessly coupled) to a client device.
[0125] The functionality of client devices (e.g., user device 110, client device 210) and server devices (e.g., server device 120a or server device 120b) can be leveraged or utilized in multiple scenarios. In some embodiments, as is illustrated in FIGS. 40-47, such functionality can be utilized or otherwise leveraged in_a housing unit for a receiver device controlled in accordance with aspects of this disclosure, e.g., the functionality of server devices of this disclosure. The housing unit may be configured to interact with the mobile app. In an
embodiment, the housing unit may interact with the mobile app via at least one barcode scanner in the unit connected to a computing device such that the at least one barcode scanner or scanner responds to a signal from the mobile app to for e.g., unlock a door of a house. In some embodiments, multiple housing units may be secured to different areas in a house.
[0126] In view of the aspects described herein, various techniques for access control and/or identification of user devices (e.g., mobile computing devices) can be implemented in accordance with the disclosure. An example of such techniques can be better appreciated with reference to the diagrams (flowcharts and callflows) in FIGS. 7A-13. For purposes of simplicity of explanation, the examples of the method disclosed herein, with reference to such drawings, are presented and described as a series of blocks (with each block representing an action or an operation in a method, for example). However, it is to be understood and appreciated that such an example method or any other technique is not limited by the order of blocks and associated actions or operations, as some blocks may occur in different orders and/or concurrently with other blocks from those that are shown and described herein. For example, the methods (or processes or techniques) in accordance with this disclosure can be alternatively represented as a series of interrelated states or events, such as in a state diagram. Furthermore, not all illustrated blocks, and associated action(s), may be required to implement a method in accordance with one or more aspects of the disclosure. Further yet, two or more of the disclosed methods or processes can be implemented in combination with each other, to accomplish one or more features or advantages described herein.
[0127] It should be appreciated that the techniques of the disclosure can be retained on an article of manufacture, or computer-readable medium, to permit or facilitate transporting and transferring such methods to a computing device (e.g., a desktop computer; a mobile computer, such as a tablet, or a smartphone; a gaming console, a mobile telephone; a blade computer; a programmable logic controller, and the like) for execution, and thus implementation, by a processor of the computing device or for storage in a memory thereof or functionally coupled thereto. In one aspect, one or more processors, such as processor(s) that implement (e.g., execute) one or more of the disclosed techniques, can be employed to execute code instructions retained in a memory, or any computer- or machine-readable medium, to implement the one or more methods. The code instructions can provide a computer-executable or machine-executable framework to implement the techniques described herein.
[0128] FIGS. 7A-24-25 illustrate examples of methods for access control and/or
identification of user devices, responses in accordance with one or more embodiments of the disclosure. More specifically, FIG. 7A presents an example of a method 700 for generating an access rule in accordance with one or more embodiments of the present disclosure. The example method 700 can be implemented by one or more computing devices. At block 702, the one or more computing devices can receive selection information indicative of a first zone. At block 704, the one or more computing devices can receive first information of a start time and an end time. At block 706, the one or more computing devices can receive second information indicative of a user device. At block 708, the one or more computing devices can determine if the first information and the second information are valid. In response to a negative determination ("No" branch), the one or more computing devices can send an error message at block 710. In the alternative, in response to a positive determination ("Yes" branch), the one or more computing devices can generate a record of an access rule based at least on the first information and the second information at block 712. At block 714, the one or more computing devices can store the record of the access rule. At block 716, the one or more computing devices can send a notification to the user device in accordance with aspects of this disclosure.
[0129] FIG. 7B presents an example of a method 750 for generating an access rule, according to one or more embodiments of the present disclosure. The example method 750 can be implemented by one or more computing devices. At block 752, the one or more computing devices can receive selection information indicative of a user device. At block 754, the one or more computing devices can receive first information indicative of a start time and an end time. At block 756, the one or more computing devices can receive second information indicative of a zone. At block 758, the one or more computing devices can determine if the first information and the second information are valid. In response to a negative determination ("No" branch), the one or more computing devices can send an error message at block 760. In the alternative, in response to a positive determination ("Yes" branch), the one or more computing devices can generate a record of an access rule based at least on the first information and the second information at block 762. At block 764, the one or more computing devices can store the record of the access rule. At block 766, the one or more computing devices can send a notification to the user device in accordance with aspects of this disclosure.
[0130] FIG. 8 presents an example of a method 800 for changing access rules, according to one or more embodiments of the present disclosure. The example method 800 can be
implemented by one or more computing devices. At block 810, the one or more devices can determine if a criterion to update an access rule for a zone and user device is satisfied. In response to an affirmative determination ("Yes" branch), the one or more computing devices can update the access rule at block 820. At block 830, the one or more computing devices can send a notification to the user device. In response to a negative determination, the one or more computing devices can determine if a criterion to delete a second access rule for a second zone and a second user device is satisfied. In response to a negative determination (e.g., "No" branch), the flow can return to block 810. In response to an affirmative determination ("Yes" branch), the one or more computing devices can delete the second access rule at block 850. At block 860, the one or more computing devices can send a notification to the second user device.
[0131] FIG. 9 presents an example of a method 900 for activating a client device for access control and identification, according to one or more embodiments of the present disclosure. At block 912, a client device A 910 can receive input information indicative of a selection to exchange contact information (e.g., a business card) with another client device (e.g., user device 110). At block 914, the client device 910 can determine if the exchange is a manual exchange or an automated exchange. In response to the exchange being manual ("Manual" branch), the client device A 910 can receive second input information indicative of contact information. At 926, the client device A 910 can send a request to record the exchange of information. The request can include location information, such as a GPS location estimate, representative of the location of the device at the time or nearly at the time the information is exchanged. In the alternative, in response to an automated exchange ("Auto" branch), the client device 910 and a client device B 920 can establish a connection by pairing or otherwise attaching to each other.
[0132] After or upon the connection is established, at 922, the client device B 920 can send contact information. In response to the contact information (e.g., name(s), address, place of business, etc.), the server device 930 can determine, at block 928, if the client device B 920 has an associated user profile (e.g., one of the user profiles retained in user repository 150. In response to a positive determination ("Yes" branch), at block 932, the server device 930 can generate a record of the exchange of the contact information. At block 938, the server device 930 can store the record of the exchange of the contact information. In response to a negative determination ("No" branch) the server device 930 can generate a user record associated with the client device B. At block 940, the server device 930 can generate a record of the exchange.
[0133] FIG. 10 presents an example of a method 1000 for exchanging contact information, according to one or more embodiments of the present disclosure. As is illustrated, at block 1012, a server device 1012 can receive input information indicative of an email address. At block 1014, the server device 1010 can determine that a record of the email address is available. For instance, the server device can determine that the email address is available in a user profile retained in user repository 150. At 1016, the server device can send an email to the email address. The email can include an activation code (e.g., a numeric code or an alphanumeric code). A client device 1020 can receive the email and, at 1018, the client device 1020 can send a response email to the server device 1010. The response email can include the email address and the activation code. At block 1030, the server device 1010 can validate the email address and the activation code. At block 1040, the server device can activate the client device 1020.
[0134] FIG. 11 presents an example of a method 1100 for interaction between a client device 1110 and a beacon device 1120, according to one or more embodiments of the present disclosure. At block 1112, the client device 1110 and the beacon device 1120 (e.g., beacon device 104a or beacon device 104b) can establish a connection for wireless communication between such devices. At block 1114, the beacon device 1120 can determine if the client device is authorized for beacon device 1120. In response to a negative determination, at 1116, the beacon device 1120 can send, to the server device 1130, a notification or another type of indication of successful access activity. In response to a positive determination, at 1118, the beacon device 1120 can send, to the server device 1130, a notification or another type of indication of denied access activity. At 1120, the server device 1130 can send an access notification or another type of indication to the client device 1110. At block 1122, the client device 1110 can present one or more visual elements indicative of access activity.
[0135] FIG. 12 presents an example of a method 1200 for notifying a client device, according to one or more embodiments of the present disclosure. One or more computing devices can implement (e.g., execute) at least a portion of the method 1200. At block 1210, the one or more computing devices can receive a notification request. At block 1220, the one or more computing devices, the one or more computing devices can determine a type notification, e.g., an email notification or a push notification. For a push notification ("Push" branch), the one or more computing devices can determine access information indication of one or more destination devices. At block 1250, the one or more computing devices can send a request for notification to a notification system. For an email notification ("Email" branch), the one or more computing devices can access an email address associated with a user profile related to the notification. At block 1260, the one or more computing devices can compose or otherwise generate an email notification. At block 1270, the one or more computing devices can send the email notification via an email service. [0136] FIG. 13 presents an example of a method 1300 for determining features from data associated with access control and identification, according to one or more embodiments of the present disclosure. The example method 1300 can be implemented by one or more computing devices. In one example, such devices can embody or can constitute the insight engine unit 510. At block 1310, the one or more computing device can select data including information indicative of access activity to a zone. At block 1320, the one or more computing devices can normalize the data. At block 1330, the one or more computing devices can order data by zone (e.g., zone 102a or zone 102b). At block 1340, the one or more computing devices can transform the ordered data. At block 1350, the one or more computing devices can determine one or more patterns within the transformed data. At block 1360, the one or more computing device can evaluate at least one of the one or more patterns.
[0137] Various embodiments of the disclosure may take the form of an entirely or partially hardware embodiment, an entirely or partially software embodiment, or a combination of software and hardware (e.g., a firmware embodiment). Furthermore, as described herein, various embodiments of the disclosure (e.g., methods and systems) may take the form of a computer program product comprising a computer-readable non-transitory storage medium having computer-accessible instructions (e.g., computer-readable and/or computer-executable instructions) such as computer software, encoded or otherwise embodied in such storage medium. Those instructions can be read or otherwise accessed and executed by one or more processors to perform or permit the performance of the operations described herein. The instructions can be provided in any suitable form, such as source code, compiled code, interpreted code, executable code, static code, dynamic code, assembler code, combinations of the foregoing, and the like. Any suitable computer-readable non-transitory storage medium may be utilized to form the computer program product. For instance, the computer-readable medium may include any tangible non-transitory medium for storing information in a form readable or otherwise accessible by one or more computers or processor(s) functionally coupled thereto. Non-transitory storage media can include read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory, etc.
[0138] Embodiments of the operational environments and methods (or techniques) are described herein with reference to block diagrams and flowchart illustrations of methods, systems, apparatuses and computer program products. It can be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by computer-accessible instructions. In certain implementations, the computer-accessible instructions may be loaded or otherwise incorporated into a general purpose computer, special purpose computer, or other programmable information processing apparatus to produce a particular machine, such that the operations or functions specified in the flowchart block or blocks can be implemented in response to execution at the computer or processing apparatus.
[0139] Unless otherwise expressly stated, it is in no way intended that any protocol, procedure, process, or method set forth herein be construed as requiring that its acts or steps be performed in a specific order. Accordingly, where a process or a method claim does not actually recite an order to be followed by its acts or steps or it is not otherwise specifically recited in the claims or descriptions of the subject disclosure that the steps are to be limited to a specific order, it is in no way intended that an order be inferred, in any respect. This holds for any possible non- express basis for interpretation, including: matters of logic with respect to the arrangement of steps or operational flow; plain meaning derived from grammatical organization or punctuation; the number or type of embodiments described in the specification or annexed drawings, or the like.
[0140] As used in this application, the terms "component," "environment," "system," "architecture," "interface," "unit," "module," "pipe," and the like are intended to refer to a computer-related entity or an entity related to an operational apparatus with one or more specific functionalities. Such entities may be either hardware, a combination of hardware and software, software, or software in execution. As an example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable portion of software, a thread of execution, a program, and/or a computing device. For example, both a software application executing on a computing device and the computing device can be a component. One or more components may reside within a process and/or thread of execution. A component may be localized on one computing device or distributed between two or more computing devices. As described herein, a component can execute from various computer- readable non-transitory media having various data structures stored thereon. Components can communicate via local and/or remote processes in accordance, for example, with a signal (either analogic or digital) having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as a wide area network with other systems via the signal). As another example, a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry that is controlled by a software application or firmware application executed by a processor, wherein the processor can be internal or external to the apparatus and can execute at least a part of the software or firmware application. As yet another example, a component can be an apparatus that provides specific functionality through electronic components without mechanical parts, and the electronic components can include a processor therein to execute software or firmware that provides, at least in part, the functionality of the electronic
components. In certain embodiments, components can communicate via local and/or remote processes in accordance, for example, with a signal (either analog or digital) having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as a wide area network with other systems via the signal). In other embodiments, components can communicate or otherwise be coupled via thermal, mechanical, electrical, and/or electromechanical coupling mechanisms (such as conduits, connectors, combinations thereof, or the like). An interface can include input/output (I/O) components as well as associated processors, applications, and/or other programming components. The terms "component," "environment," "system," "architecture," "interface," "unit," "module," and "pipe" can be utilized interchangeably and can be referred to collectively as functional elements.
[0141] As utilized in this disclosure, the term "processor" can refer to any computing processing unit or device comprising single-core processors; single processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory. Additionally, a processor can refer to an integrated circuit (IC), an application-specific integrated circuit (ASIC), a digital signal processor (DSP), a field programmable gate array (FPGA), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be implemented as a combination of computing processing units. In certain embodiments, processors can utilize nanoscale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance the performance of user equipment or other electronic equipment.
[0142] In addition, in the present specification and annexed drawings, terms such as "store," "storage," "data store," "data storage," "memory," "repository," and substantially any other information storage component relevant to the operation and functionality of a component of the disclosure, refer to "memory components," entities embodied in a "memory," or components forming the memory. It can be appreciated that the memory components or memories described herein embody or comprise non-transitory computer storage media that can be readable or otherwise accessible by a computing device. Such media can be implemented in any methods or technology for storage of information such as computer-readable instructions, information structures, program modules, or other information objects. The memory components or memories can be either volatile memory or non-volatile memory, or can include both volatile and non-volatile memory. In addition, the memory components or memories can be removable or non-removable, and/or internal or external to a computing device or component. Examples of various types of non-transitory storage media can include hard-disc drives, zip drives, CD- ROMs, digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, flash memory cards or other types of memory cards, cartridges, or any other non-transitory medium suitable to retain the desired information and which can be accessed by a computing device.
[0143] As an illustration, non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). The disclosed memory components or memories of the operational or computational environments described herein are intended to include one or more of these and/or any other suitable types of memory.
[0144] Conditional language, such as, among others, "can," "could," "might," or "may," unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain implementations could include, while other implementations do not include, certain features, elements, and/or operations. Thus, such conditional language generally is not intended to imply that features, elements, and/or operations are in any way required for one or more implementations or that one or more implementations necessarily include logic for deciding, with or without user input or prompting, whether these features, elements, and/or operations are included or are to be performed in any particular implementation.
[0145] What has been described herein in the present specification and annexed drawings includes examples of systems, devices, and techniques that can provide access control and/or identification of user devices. It is, of course, not possible to describe every conceivable combination of elements and/or methods for purposes of describing the various features of the disclosure, but it can be recognized that many further combinations and permutations of the disclosed features are possible. Accordingly, it may be apparent that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and annexed drawings, and practice of the disclosure as presented herein. It is intended that the examples put forward in the specification and annexed drawings be considered, in all respects, as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

s claimed is:
A computing system, comprising:
at least one memory device having instructions encoded thereon; and
at least one processor coupled to the at least one memory device and configured, by the instructions, at least to:
configure a zone associated with a point-of-entry device;
generate a user record including a communication address and first user information; configure an access rule using at least the user record, the access rule regulates entry to the zone;
send an activation code to the communication address;
receive second user information generated at a mobile computing device in response to the activation code, the second user information including a communication address of the mobile computing device;
generate a user profile using at least one of the user record or the second user
information, the user profile includes the communication address of the mobile computing device;
associate the access rule with the user profile;
generate an access key indicative of a unique user identifier associated with the user profile;
associate the access key with the zone; and
send the access key to the communication address of the mobile computing device.
The computing system of claim 1, wherein to configure the access rule, the at least one processor is further configured to generate a schedule for authorized entry to the zone, the schedule being one of a daily schedule having a recurring group of authorized periods over a 24 hour interval; a weekly schedule having a second recurring group of authorized periods over seven days; a monthly schedule having a third recurring group of authorized periods over a month; a defined non-recurring authorized period. The computing system of claim 1, wherein to configure the access rule, the at least one processor is further configured to receive input information indicative of a schedule for authorized entry to the zone;
to generate the access rule using the input information;
to validate the access rule; and
to store the access rule in a first memory device of the at least one memory device.
The computing system of claim 1, wherein the access key comprises one of a linear barcode or a matrix barcode.
The computing system of claim 1, wherein the at least one processor is further configured to determine that a first rule is satisfied, and to update the access rule.
The computing system of claim 5, wherein the at least one processor is further configured to determine that a second rule is satisfied, and to delete the access rule.
The computing system of claim 1, wherein the at least one processor is further configured to determine that a correlation is present between first entry records associated with the zone and second entry records associated with a second zone;
to configure a second access rule associated that regulates entry to a third zone using at least one of a portion of the first entry records or a portion of the second entry records;
to generate a second access key indicative of the unique user identifier associated with the user profile;
to associate the second access key with the third zone; and
to send the second access key to the communication address of the mobile computing device.
The computing system of claim 1, wherein the at least one processor is further configured to provide a notification that the access rule is configured. The computing system of claim 8, wherein the notification comprises a push notification, and wherein to provide the notification, the at least one processor is further configured to determine one or more communication addresses of respective one or more mobile computing devices associated with the user profile, and
send a notification request to a messaging system to deliver the push notification, the notification request including the one or more communication addresses.
The computing system of claim 8, wherein the notification comprises an email notification, and wherein to provide the notification, the at least one processor is further configured to determine an email addresses associated with the user profile;
generate an the email notification; and
send the email notification to the email address.
The computing system of claim 1, wherein the at least one processor is further configured to receive a first indication of granted entry to the zone or a second indication of denied entry to the zone, and
to store in a first memory device of the at least one memory device the first indication and the second indication.
The computing device of claim 1, wherein to associate the access rule with the user profile, the at least one processor is further configured to define a relationship between the user profile and the access rule.
The computing device of claim 1, wherein to associate the access rule with the user profile, the at least one processor is further configured to update the user profile to include the access rule.
The computing system of claim 1, wherein the mobile computing device is configured to transmit first wireless signals and receive second wireless signals according to one or more defined protocols of a radio technology, the mobile computing device comprising one or more antennas and a communication processing unit, wherein the one or more antennas receive the second wireless signals and the radio unit processes the second wireless signals, and
wherein the communication processing unit unit processes digital signals to generate the second wireless signals and the one or more antennas transmit the second wireless signals.
15. The computing system of claim 14, wherein the mobile computing device comprises a smartphone, tablet computer, a wearable device, a keyfob, or a pocket card.
16. The computing system of claim 15, wherein the radio technology includes 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.11, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC).
17. The computing system of claim 1, wherein the point-of-entry device comprises a locking device configured to exchange wireless signals with the mobile computing device according to one or more defined protocols of a radio technology.
18. The computing system of claim 17, wherein the radio technology comprises Bluetooth, and the locking device comprises a Bluetooth locking pad.
19. A computing device, comprising:
at least one memory device having instructions encoded thereon; and
at least one processor coupled to the at least one memory device and configured, by the instructions, at least to:
receive a plurality of access keys, a first access key of the plurality of access keys associated with a user profile and a first zone, and a second access key of the plurality of access keys associated with the user profile and a second zone;
store the plurality of access keys in a first memory device of the at least one memory device;
establish a connection with a reader device associated with the first zone; cause a radio of the computing device to send wireless signals indicative of the first access key; and
receive a first response message indicative of unlocking of a locking device
associated with the first zone.
The computing device of claim 19, wherein the at least one processor is further configured to establish a second connection with a reader device associated with the second zone;
cause a display device of the computing device to present a visual element
representative of the second access key; and
to receive a second response message indicative of unlocking of a second locking device associated with the second zone.
The computing device of claim 20, wherein the at least one processor is further configured to supply at least one of the first response message or the second response message to a destination server device.
The computing device of claim 20, wherein to establish the connection, the at least one processor is further configured to cause the radio to send a connection request message to connect the computing device with the reader device; and
receive a response message indicating that the connection is established with the reader device.
The computing device of claim 22, wherein to establish the second connection, the at least one processor is further configured to cause the radio to send a second connection request message to connect the computing device with the reader device associated with the second zone; and
receive a second response message indicating that the second connection is
established with the second reader device.
24. The computing device of claim 19, wherein the radio comprises a communication processing unit and at least one antenna, and is configured to send the wireless signal according to one or more defined protocols of a radio technology.
25. The computing device of claim 24, wherein the radio technology includes 3G, Long Term Evolution (LTE), LTE- Advanced, 5G, IEEE 802.11, IEEE 802.16, Bluetooth, ZigBee, or near-field communication (NFC).
26. The computing device of claim 19, wherein the at least one processor is further
configured to receive input information indicative of a selection to exchange information representative of an organization;
to establish a wireless connection with a remote computing device; and
to receive at least a portion of the information from the remote computing device.
27. The computing device of claim 26, wherein the at least one processor is further
configured to send a request message to generate a record representative of reception of at least the portion of the information, the request message including location information indicative of a location of the reception of at least the portion of the information.
28. The computing device of claim 27, wherein the at least one processor is further
configured to cause a display device of the computing device to present selectable visual elements representative of respective options to communicate with the remote computing device.
29. The computing device of claim 28, wherein the at least one processor is further
configured to cause the display device to present visual elements indicative of the location of the reception of at least the portion of the information.
30. The computing device of claim 26, wherein the at least one processor is further
configured to broadcast an indication of availability to supply contact information; to receive a request message to supply the contact information, the request message including identification information of an end-user associated with a sender computing device; and
to cause a display device of the computing device to present visual elements representative of the end-user and a selectable visual element to respond to the request message.
PCT/US2017/061648 2016-11-14 2017-11-14 Systems, devices, and methods for access control and identification of user devices WO2018090059A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP17869810.6A EP3539090A4 (en) 2016-11-14 2017-11-14 Systems, devices, and methods for access control and identification of user devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662421770P 2016-11-14 2016-11-14
US62/421,770 2016-11-14

Publications (1)

Publication Number Publication Date
WO2018090059A1 true WO2018090059A1 (en) 2018-05-17

Family

ID=62108091

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2017/061648 WO2018090059A1 (en) 2016-11-14 2017-11-14 Systems, devices, and methods for access control and identification of user devices

Country Status (3)

Country Link
US (2) US10979437B2 (en)
EP (1) EP3539090A4 (en)
WO (1) WO2018090059A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102605A (en) * 2018-08-02 2018-12-28 金洲集团有限公司 A kind of intelligent lock system opened based on permission
WO2024080876A1 (en) * 2022-10-14 2024-04-18 Boekit B.V. Proximity card addon

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8271025B2 (en) * 2008-10-20 2012-09-18 At&T Mobility Ii Llc Device network technology selection and display in multi-technology wireless environments
US11017106B2 (en) * 2012-11-12 2021-05-25 Sielox, Llc Emergency notification, access control, and monitoring systems and methods
US11163901B2 (en) 2012-11-12 2021-11-02 Sielox, Llc Emergency notification system and methods
CA2890863A1 (en) 2012-11-12 2014-05-15 Sielox, Llc Emergency notification system and methods
US10708771B2 (en) * 2017-12-21 2020-07-07 Fortinet, Inc. Transfering soft tokens from one mobile device to another
EP3553755B1 (en) * 2018-04-11 2021-05-26 Assa Abloy AB Method for providing access to a physical space
JP2021530071A (en) * 2018-06-29 2021-11-04 クラウデンティティー インコーポレーテッド Data stream identity
US11374922B2 (en) * 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
US11477181B2 (en) * 2019-02-06 2022-10-18 Hewlett Packard Enterprise Development Lp Network enabled control of security devices
US11146515B2 (en) * 2019-03-14 2021-10-12 International Business Machines Corporation Visitor invitation management
US11556642B2 (en) * 2020-02-18 2023-01-17 BluBracket, Inc. Code monitoring and restricting of egress operations
US20230394025A1 (en) * 2022-06-02 2023-12-07 Connoisseur Technology Holdings, LLC Digital information management system, method, and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004019339A (en) * 2002-06-19 2004-01-22 Mitsubishi Electric Corp Device and method for management entrance and exit
KR20070001477A (en) * 2005-06-29 2007-01-04 삼성전자주식회사 System for preservation exit and entry control using mobile terminal
JP2009084872A (en) * 2007-09-28 2009-04-23 Sogo Keibi Hosho Co Ltd In-and-out management device and locking/unlocking control method
KR20100097644A (en) * 2010-08-16 2010-09-03 (주)테슬라시스템 A method of making, exchanging and management of electronic business cards using personal digital assistant
US20160248782A1 (en) * 2013-10-01 2016-08-25 Inevtio Ag Access control using portable electronic devices

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US1015653A (en) 1910-10-10 1912-01-23 Louis Szczyglinski Flushing system for closets.
US5314059A (en) 1992-10-29 1994-05-24 Tekno, Inc. Conveyor frame for chain conveyor
HK1024824A2 (en) * 1999-02-05 2000-09-08 Toymax Inc Hide and find toy game
US7061367B2 (en) * 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US8611919B2 (en) * 2002-05-23 2013-12-17 Wounder Gmbh., Llc System, method, and computer program product for providing location based services and mobile e-commerce
US7703128B2 (en) 2003-02-13 2010-04-20 Microsoft Corporation Digital identity management
JP2007529797A (en) * 2004-03-19 2007-10-25 フンベル ローガー All-in-one key or control software card in mobile phones for wireless bicycle keys, cars, houses, RFID tags with authentication and payment functions
EP1804220A1 (en) * 2005-12-29 2007-07-04 AXSionics AG Method for authorised provision of a service and portable device for the implementation thereof
US20070176739A1 (en) * 2006-01-19 2007-08-02 Fonekey, Inc. Multifunction keyless and cardless method and system of securely operating and managing housing facilities with electronic door locks
US7636033B2 (en) * 2006-04-05 2009-12-22 Larry Golden Multi sensor detection, stall to stop and lock disabling system
US8058971B2 (en) * 2006-06-07 2011-11-15 Utc Fire & Security Americas Corporation, Inc. Access control system
US7880584B2 (en) * 2006-06-07 2011-02-01 Utc Fire & Security Americas Corporation, Inc. Lockbox key with callback feature
US9135807B2 (en) * 2007-03-14 2015-09-15 Seth Cirker Mobile wireless device with location-dependent capability
US8659427B2 (en) * 2007-11-09 2014-02-25 Proxense, Llc Proximity-sensor supporting multiple application services
US8340726B1 (en) * 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
EP2395780B1 (en) * 2010-06-14 2019-08-07 Koninklijke KPN N.V. Authenticity verification of authentication messages
US8803214B2 (en) * 2010-06-28 2014-08-12 Micron Technology, Inc. Three dimensional memory and methods of forming the same
US20120169457A1 (en) * 2010-12-31 2012-07-05 Schneider Electric Buildings Ab Method and system for dynamically assigning access rights
US8682243B2 (en) * 2011-07-27 2014-03-25 Intel Mobile Communications GmbH Network selection device and method for selecting a communication network
US20140075075A1 (en) * 2012-09-11 2014-03-13 Google Inc. Context-Dependent Home Automation Controller and Docking Station
US9704153B2 (en) * 2013-01-14 2017-07-11 Conduent Business Services, Llc System and method for enabling transactions on an associated network
US10229548B2 (en) * 2013-03-15 2019-03-12 The Chamberlain Group, Inc. Remote guest access to a secured premises
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9979438B2 (en) * 2013-06-07 2018-05-22 Apple Inc. Controlling a media device using a mobile device
US9763086B2 (en) 2013-08-27 2017-09-12 Qualcomm Incorporated Owner access point to control the unlocking of an entry
WO2015107006A1 (en) * 2014-01-14 2015-07-23 Bekey A/S A key box
US9763094B2 (en) * 2014-01-31 2017-09-12 Qualcomm Incorporated Methods, devices and systems for dynamic network access administration
US10068077B2 (en) 2014-02-11 2018-09-04 Tyco Fire & Security Gmbh False alarm avoidance
US9276914B2 (en) * 2014-04-15 2016-03-01 Google Inc. Auto-user registration and unlocking of a computing device
US10255736B2 (en) * 2014-04-18 2019-04-09 Ademco Inc. System and method to access/restrict a security system for temporary users using a mobile application
US10171935B1 (en) 2014-07-07 2019-01-01 Microstrategy Incorporated Healthcare proximity services
US9824193B2 (en) 2014-07-29 2017-11-21 Aruba Networks, Inc. Method for using mobile devices with validated user network identity as physical identity proof
US9600949B2 (en) 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
US9501881B2 (en) * 2014-08-20 2016-11-22 Gate Labs Inc. Access management and resource sharing system based on biometric identity
EP3120334B1 (en) 2014-08-21 2022-04-27 Cordiner, Peter Alexander An electronic locking system
US9996998B2 (en) 2014-12-05 2018-06-12 HomeAway.com, Inc. Adaptive advisory engine and methods to predict preferential activities available at a region associated with lodging
EP3411548B1 (en) 2015-02-05 2022-12-21 Intelity, Inc. System for entry control
US9824515B2 (en) 2015-03-24 2017-11-21 At&T Intellectual Property I, L.P. Automatic calendric physical access
US9792747B2 (en) 2015-06-22 2017-10-17 Allegion, Inc. Multifunctional access control device
US10102697B2 (en) 2015-10-31 2018-10-16 Disney Enterprises, Inc. High-Q and over-coupled near-field RFID reader antenna for improved tag read range
US20170214802A1 (en) 2016-01-22 2017-07-27 DropBy, Inc. Door entry systems and methods
US10045184B2 (en) 2016-11-11 2018-08-07 Carnival Corporation Wireless guest engagement system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004019339A (en) * 2002-06-19 2004-01-22 Mitsubishi Electric Corp Device and method for management entrance and exit
KR20070001477A (en) * 2005-06-29 2007-01-04 삼성전자주식회사 System for preservation exit and entry control using mobile terminal
JP2009084872A (en) * 2007-09-28 2009-04-23 Sogo Keibi Hosho Co Ltd In-and-out management device and locking/unlocking control method
KR20100097644A (en) * 2010-08-16 2010-09-03 (주)테슬라시스템 A method of making, exchanging and management of electronic business cards using personal digital assistant
US20160248782A1 (en) * 2013-10-01 2016-08-25 Inevtio Ag Access control using portable electronic devices

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3539090A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102605A (en) * 2018-08-02 2018-12-28 金洲集团有限公司 A kind of intelligent lock system opened based on permission
WO2024080876A1 (en) * 2022-10-14 2024-04-18 Boekit B.V. Proximity card addon
NL2033317B1 (en) * 2022-10-14 2024-05-03 Boekit B V proximity card arrangement

Also Published As

Publication number Publication date
EP3539090A1 (en) 2019-09-18
EP3539090A4 (en) 2020-11-04
US20200053097A1 (en) 2020-02-13
US10979437B2 (en) 2021-04-13
US20180139210A1 (en) 2018-05-17
US11050760B2 (en) 2021-06-29

Similar Documents

Publication Publication Date Title
US11050760B2 (en) Systems, devices, and methods for access control and identification of user devices
US10970948B2 (en) Systems, devices, and methods for access control and identification of user devices
US20210166303A1 (en) Systems, devices, and methods for emergency responses and safety
US11423723B2 (en) Enhanced access control based on key proximity
US10187754B1 (en) Time and location-based user tracking and presence confirmation
US10645582B2 (en) Management of access to service in an access point
US11580801B2 (en) Access control system with dynamic access permission processing
US9913134B2 (en) Method and apparatus for initializing an RFID tag via an optical display
EP3296917B1 (en) Electromagnetic persona generation based on radio frequency fingerprints
US8761661B2 (en) Regulation of service in restricted telecommunication service area
US20150194000A1 (en) Methods and systems for multi-unit real estate management
US20140043141A1 (en) Service identification authentication
EP3380975B1 (en) Short-range device communications for secured resource access
CN104584589A (en) Airplane mode for wireless transmitter device and system using short-range wireless broadcasts
US11531744B1 (en) Secure unlock of a device
US10460540B2 (en) Smart doorman
Ali et al. [Retracted] TC‐PSLAP: Temporal Credential‐Based Provably Secure and Lightweight Authentication Protocol for IoT‐Enabled Drone Environments
KR20180078780A (en) Remote controllable smart door lock system
US8615265B2 (en) Coded system for radio frequency communication
CN110110011B (en) Data classification management method and device of intelligent lock system
CN114268440B (en) Production operation room management system and method
KR101828571B1 (en) Social network service application system
Capano Wi-Fi acronyms, wireless buzzwords, WLAN nomenclature, wireless terms

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17869810

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017869810

Country of ref document: EP

Effective date: 20190614