摘要:
A system for deleting map data comprises an interface and a processor. The interface is configured to determine a location associated with a device. The processor is configured to determine one or more map bundles to delete based at least in part on the location and delete the one or more map bundles.
摘要:
A holder for a mobile telecommunications terminal, in particular a smartphone, has a receptacle for the terminal. The holder has a first locking mechanism by which the smartphone can be locked in the receptacle. There is also described a system for fastening a smartphone to a shopping trolley handle, a base station for accommodating a plurality of holders and a method for fastening a smartphone to a shopping trolley handle.
摘要:
The verification system of this invention comprises an image forming apparatus 1 having verification function and a card reader 2 for reading a user ID from a card. The image forming apparatus 1 is capable of performing short-range radio communication with a portable instrument 3. The portable instrument 3 receives a polling command transmitted by the image forming apparatus 1 and sends back its own identification code if it is located near the image forming apparatus 1. The image forming apparatus 1 permits usage of all the functions thereof if it verifies that user is an officially permitted person according to user ID read by the card reader 2 and the identification code sent back from the portable instrument 3. Consequently, there is provided a verification system having a high security level and convenient for use or a verification system which permits usage of its apparatus and other related devices within an appropriate range depending on the security level of a verified method.
摘要:
A method for granting access to a restricted access area using an approved list is disclosed. According to one embodiment, the method may include the steps of (1) receiving a card number for the access card; (2) comparing the card number to an approved list of approved card numbers; (3) granting access to the area if the card number is on the approved list; (4) comparing the card number to a card presented list of presented card numbers; (5) adding the card to the card presented list and the approved list and granting access to the area if the card number is not on the approved list and the card number is not on the card presented list; and (6) denying access to the area if the card number is not on the approved list but is on the card presented list.
摘要:
A secure electronic payment system and method for conducting a secure transaction using voice authentication is provided. A merchant's computer transmits an authorization request to an access control server. The access control server places a telephone call to the purchaser and performs voice authentication to confirm the identity of the purchaser. The access control server then transmits a response to the merchant's computer. If the purchaser is authorized to access the account, payment is processed by the merchant and the transaction is completed.
摘要:
A time limit function utilization apparatus includes a first function block, a second function block, a signal line which connects the first and second function blocks and allows using a desired function that is generated by accessing the first and second function blocks with each other, and a semiconductor time switch interposed in or connected to the signal line, and disables or enables mutual access between the first and second function blocks upon the lapse of a predetermined time.
摘要:
An electronic banking system having a host system comprising a processor and at least one first non-transitory computer readable medium storing a first set of instructions that when executed by the processor cause the processor to obtain and store banking records in a database, the banking records indicative of at least one bank account of a user. The electronic banking system further comprising a building having an internal space and a door providing selective access to the internal space. An interactive teller machine, a rolled coin machine, a recycler, and a drop box are located within the internal space of the building and connected to an interbank network. The rolled coin machine, recycler, and drop box are further connected to a network separate from the interbank network. An entry controller is programmed to allow selective access to the internal space through the door based on authentication of the user.
摘要:
An authorization approach to physical access uses identity attributes, doors/readers attributes, time of the day, and policies to determine access rights to facilities and physical spaces in real-time, based on three criteria: who, when, and what. Embodiments address the constantly changing physical access needs of companies as those needs evolve.
摘要:
A holder for a mobile telecommunications terminal, in particular a smartphone, has a receptacle for the terminal. The holder has a first locking mechanism by which the smartphone can be locked in the receptacle. There is also described a system for fastening a smartphone to a shopping trolley handle, a base station for accommodating a plurality of holders and a method for fastening a smartphone to a shopping trolley handle.
摘要:
The invention relates to a radio key (54) for authenticating a user of a vehicle (12) with respect to a door unlocking system (14) of the vehicle (12) and/or a drive start device (14) of the vehicle (10). The radio key (54) comprises a transponder unit (44) which is designed to receive a query signal (50) transmitted wirelessly from the vehicle (12) and to transmit, depending on the received query signal (50), an authentication signal (52) based on an authentication code. The transponder unit (44) is arranged in a casing (42). The invention is based on the problem of designing the use of a radio key to be more convenient. An area (54) of the casing (42) has a shape of an insertion area of a standardized memory card for a mobile terminal (10), by means of which the memory card is to be stuck in accordance with the standard in an insertion slot (E) of the mobile terminal (10). The radio key can thus be integrated in a mobile terminal.