METHODS AND SYSTEMS FOR ACCESS CONTROL
    52.
    发明公开

    公开(公告)号:US20240312277A1

    公开(公告)日:2024-09-19

    申请号:US18675054

    申请日:2024-05-27

    申请人: GENETEC INC.

    IPC分类号: G07C9/20 G06F16/955 G07C9/00

    摘要: A method of requesting access through a door by a mobile computing device may involve: receiving a Uniform Resource Locator (URL); directing a web browser application of the mobile computing device to a webpage based on the received URL; receiving an access code from an access-control system, the access code associated with access rights of a user of the mobile computing device; and transmitting an access request to the access-control system, the access request comprising data representing at least an identifier of the door and the access code.

    METHODS AND SYSTEMS FOR ROUTING MEDIA
    54.
    发明公开

    公开(公告)号:US20240146791A1

    公开(公告)日:2024-05-02

    申请号:US18376419

    申请日:2023-10-03

    申请人: GENETEC INC.

    摘要: A method for routing media comprising, at one of a plurality of media devices placed on a local network deployed at a location being surveilled, each media device configured to generate media stream data as the location is being surveilled, detecting networked device(s) placed on the local network, the networked device(s) comprising gateway device(s) each having network connectivity to a cloud computing device, obtaining, based on the detecting, rule(s) from the cloud computing device and/or the gateway device(s), the rule(s) indicative of when the media stream data is to be routed via the gateway device(s) and when the media stream data is to be routed directly to the cloud computing device for processing, monitoring parameter(s) associated with the local network and/or an environment of the location being surveilled to determine whether the rule(s) is satisfied, and, when the rule(s) is satisfied, routing the media stream data according to the rule(s).

    SYSTEM AND METHOD FOR PROVISIONING A PHYSICAL SECURITY TOKEN

    公开(公告)号:US20240143719A1

    公开(公告)日:2024-05-02

    申请号:US18383838

    申请日:2023-10-25

    申请人: GENETEC INC.

    IPC分类号: G06F21/34 G06F21/60

    CPC分类号: G06F21/34 G06F21/602

    摘要: A computer-implemented system and methods for provisioning a security token are provided. An example method may include steps of: receiving, at a secure appliance and from a remote server, a command to encode a set of access information into the physical security token; generating, at the secure appliance, encrypted access information, comprising: providing the set of access information to a secure cryptoprocessor; and instructing the secure cryptoprocessor to use a cryptographic key stored in the secure cryptoprocessor to encrypt the set of access information; obtaining, from a security token reader, an indication of a presence of the physical security token being inserted into or presented to the security token reader; and provisioning the physical security token by transmitting, via a secured channel, the encrypted access information from the secure appliance to the security token reader for encoding the physical security token with the encrypted access information.

    CONFIGURATION OF UNPOWERED DEVICES
    56.
    发明公开

    公开(公告)号:US20240143336A1

    公开(公告)日:2024-05-02

    申请号:US18050121

    申请日:2022-10-27

    申请人: GENETEC INC.

    IPC分类号: G06F9/4401 G06K19/06

    CPC分类号: G06F9/4401 G06K19/06037

    摘要: The present disclosure relates to configurable electronic devices, packaging therefor, electronic device products, as well as methods and systems for configuring configurable electronic devices whilst unpowered. The electronic device includes a housing and a configuration system contained therein. The housing bears a first visual indicia indicative of a location for applying an external electromagnetic field to the electronic device for configuring the same in an unpowered state. The packaging includes a main enclosure for removably retaining the electronic device therein, at least part of the main enclosure being composed of a material transparent to the external electromagnetic field, and a second visual indicia which is born on an outward-facing surface of the main enclosure. The second visual indicia is indicative of the location for applying the external electromagnetic field and disposed in proximity to the first visual indicia when the electronic device is received within the packaging.

    METHODS AND SYSTEMS FOR PRIVACY PROTECTING A LIVE VIDEO STREAM WITH AN ARCHIVED VIDEO STREAM

    公开(公告)号:US20240137601A1

    公开(公告)日:2024-04-25

    申请号:US17970673

    申请日:2022-10-20

    申请人: GENETEC INC.

    摘要: Methods, systems, and computer-readable media for producing a privacy-protected video stream are described herein. A request to display a live video stream of a camera is received. The live video stream is received in real-time and comprises a plurality of live image frames from the camera. An archived video stream of the camera is accessed in a data repository. A plurality of archived image frames of the archived video stream is processed to generate a background model comprising imagery common to multiple ones of the plurality of archived image frames. The plurality of archived image frames occurring in time prior to the request to display the live video stream. The privacy-protected video stream is processed in real-time. The privacy-protected video stream is output for display.

    SYSTEMS AND METHODS FOR PERFORMING PARKING POLICY ENFORCEMENT USING A MOBILE DEVICE

    公开(公告)号:US20240005793A1

    公开(公告)日:2024-01-04

    申请号:US18468821

    申请日:2023-09-18

    申请人: GENETEC INC.

    摘要: Performing parking policy enforcement using a mobile device includes presenting a set of street-and-zone pairs, each street-and-zone pair identifying a street and a zone within which at least a portion of the street is located, the street and the zone, in combination, being associated with one or more parking rules. A street-and-zone pair is selected corresponding to a location of a subject vehicle. The license plate number is transmitted to a remote parking enforcement system. Parking rights of the subject vehicle are determined based on the license plate number. It is determined whether the subject vehicle is in violation of parking rules associated with the street and the zone, in combination, of the selected street-and-zone pair based on the parking rights of the subject vehicle. A violation indication is presented indicating whether the subject vehicle is in violation of the parking rules associated with the selected street-and-zone pair.

    Systems and methods for performing parking policy enforcement using a mobile device

    公开(公告)号:US11798416B2

    公开(公告)日:2023-10-24

    申请号:US17080637

    申请日:2020-10-26

    申请人: GENETEC INC.

    摘要: Performing parking policy enforcement using a mobile device includes presenting a set of street-and-zone pairs, each street-and-zone pair identifying a street and a zone within which at least a portion of the street is located, the street and the zone, in combination, being associated with one or more parking rules. A street-and-zone pair is selected corresponding to a location of a subject vehicle. The license plate number is transmitted to a remote parking enforcement system. Parking rights of the subject vehicle are determined based on the license plate number. It is determined whether the subject vehicle is in violation of parking rules associated with the street and the zone, in combination, of the selected street-and-zone pair based on the parking rights of the subject vehicle. A violation indication is presented indicating whether the subject vehicle is in violation of the parking rules associated with the selected street-and-zone pair.

    SECURE LAYERED ENCRYPTION OF DATA STREAMS
    60.
    发明公开

    公开(公告)号:US20230336331A1

    公开(公告)日:2023-10-19

    申请号:US18306294

    申请日:2023-04-25

    申请人: GENETEC INC.

    摘要: Technology permitting secure storage and transmission of data stream as well as tiered access to multiple data stream according to permission. Data streams may be encrypted using symmetric encryption performed with varying symmetric keys according to a key stream of symmetric keys. Native data may be discarded for safety. Whole or partial key streams may be encrypted using the public keys of authorized entities having permission to access respective data streams or portions thereof. Only the corresponding private keys can decrypt the encrypted key streams required to decrypt the encrypted data streams. Thus rigorous access control is provided. IT personnel accessing data stream files on a server or intruders maliciously obtaining files will not be able to derive the data stream. Sensitive data streams may be stored using cloud services despite inherent risks.