Abstract:
A secure remote actuation system is described herein that operates based on voice commands provided by a user and/or owner of the system. The system may include: a remote input receptor having a user interface for receiving one or more user inputs from a user, the user interface having a voice input processor, and the user inputs including vocalization; and a cloud-based network storing one or acceptable inputs and including a network device for obtaining said one or more user inputs from the remote input receptor. The network device may obtain said one or more user inputs from the remote input receptor while the user is using the user interface. The cloud-based network may compare said one or more user inputs to said one or more acceptable inputs. The voice input processor may include a microphone, a speaker, or both, and may perform various types of voice recognition.
Abstract:
Low data rate wireless electronic devices utilizing a hub- or star-based network topology, operational at ranges of thousands of meters. Remote end-devices may be such things as keypads, door latches, occupancy monitors, sprinkler controllers and other devices controlled or monitored in a campus or a collection of buildings. End-devices operate at intermediate ranges in RF congested areas and failure-intolerant situations through the use of discrete programmable channels. Each end-device carries a unique identifier and uses a common default initialization channel to accept an operational channel assignment from the hub, without a configuring or programming step at the end-device by an installing person. After assignment the end-device can utilize a low-power listening mode that avoids processor-awakening events due to orthogonality of the operational channels. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claim
Abstract:
A secure remote actuation system may comprise a remote input receptor and a central signal switch. The remote input receptor may comprise a user interface for receiving user inputs from a user. The central signal switch may comprise acceptable inputs. The central signal switch may further comprise a microcontroller for obtaining and comparing the user inputs to the acceptable inputs. In the present invention, the microcontroller obtains the user inputs from the remote input receptor while the user is using the user interface.
Abstract:
An apparatus for more efficiently enabling secure access to an enclosure is described herein. The apparatus may include a wireless transmitter in a selectably opaque container, a wireless transceiver, a GPS receiver, an NFC transmitter and/or receiver, one or more hardware processors, and hardware memory. The hardware memory stores instructions for receiving a current location of the apparatus and comparing that location to a delivery address of the enclosure. As the location is within a certain range of the delivery address the apparatus sends a request to a cloud-based server for a hash digest masking an acceptable input for an access control mechanism associated with the enclosure. The apparatus receives the hash digest and forwards it to the access control mechanism via the wireless transmitter. Computer executable code for handling such tasks, and a cloud-based server for generating the hash digest, are also described herein.
Abstract:
A secure remote actuation system with a cloud-based network that performs a remotely-initiated operation is described herein. The system may comprise a remote input receptor and a network. The remote input receptor may comprise a user interface for receiving user inputs from a user. The network may comprise a combination of computer systems interconnected by telecommunications equipment or cables allowing information to be exchanged. The network may also comprise a network device for obtaining the user inputs from the remote input receptor. One or more acceptable inputs may be stored on the network. In the present invention, the network device obtains the user inputs from the remote input receptor while the user is using the user interface, compares the user inputs to the acceptable inputs, and performs an operation.
Abstract:
A secure remote actuation system with a low power function is described herein. The system may comprise a remote input receptor and a network. The remote input receptor may comprise a user interface for receiving user inputs from a user and firmware having stored thereon instruction for executing a low power function. The network may comprise a combination of computer systems interconnected by telecommunications equipment or cables allowing information to be exchanged. The network may also comprise a network device for obtaining the user inputs from the remote input receptor. One or more acceptable inputs may be stored on the network. In the present invention, the network device obtains the user inputs from the remote input receptor while the user is using the user interface and then the network compares the user inputs to the acceptable inputs.
Abstract:
A secure remote actuation system may comprise a remote input receptor and a network. The remote input receptor may comprise a user interface for receiving user inputs from a user. The network may store acceptable inputs. The network may further comprise a network device for obtaining the user inputs from the remote input receptor. In the present invention, the network device obtains the user inputs from the remote input receptor while the user is using the user interface. The network then compares the user inputs to the acceptable inputs.
Abstract:
A method for more efficiently enabling access to an enclosure is disclosed. Such a method includes designating, on a computing device, an access code intended to enable access to an enclosure. The method further communicates, over a network, a first copy of the access code to a control mechanism configure to control access to the enclosure. A second copy of the access code is communicated, over the network, to an end user device configured to directly communicate the second copy to the control mechanism. In certain embodiments, the end user device wirelessly communicates the second copy to the control mechanism using a short distance communication protocol. A corresponding system is also disclosed.
Abstract:
A method for more efficiently enabling access to an enclosure is disclosed. Such a method includes designating an access code intended to enable access to an enclosure, and identifying an end user for whom the access code is intended. The method automatically generates a communication addressed to the end user and informing the end user that the access code has been established. In certain embodiments, the communication further informs the end user of any parameters that have been established for the access code. The method sends the communication to the end user using, for example, an email address or phone number of the end user. The method further communicates the access code to a control mechanism configured to control access to the enclosure. A corresponding system is also disclosed.
Abstract:
A method for more efficiently delivering goods to recipients is disclosed herein. Such a method includes obtaining a unique identifier (e.g., tracking number, order number, product number, etc.), wherein the unique identifier is associated with an order of goods intended for delivery to a recipient. The method further includes obtaining an access code for association with the unique identifier. The access code enables a delivery agent to gain access to an enclosure of the recipient for deposit of the goods therein. In certain embodiments, the access code is a temporary access code that expires once the delivery is fulfilled or the enclosure is accessed, thereby reducing the chance of unauthorized access to the enclosure. The method may also enable parameters (e.g., restrictions, constraints, conditions, etc.) with regard to use of the access code to be established. A corresponding system is also disclosed.