Abstract:
A method (400; 500) is disclosed comprising transmitting (409; 510) a challenge from a locker system (2) to a mobile device (3; 4); receiving (413; 515) a response from the mobile device (3; 4) at the locker system (2), wherein the response has been generated (411; 512) by a backend system (5), which received (410;511) the challenge from the mobile device (3; 4), at least based on the challenge received by the backend system (5) and on a first key stored at the backend system (5) and has been transmitted (412; 514) to the mobile device (3; 4); checking at the locker system (2) whether the received response has been generated under usage of at least the challenge and a key that corresponds to a second key stored at the locker system (2); and granting access (415; 517) to a compartment of the locker system (2) at least depending on a result of the checking. Further disclosed are corresponding methods performed by the mobile device (3; 4) and the backend system (5), respectively, and according apparatuses, systems, computer programs and computer-readable media that pertain to these methods.
Abstract:
The invention relates to a closable container with a lock, comprising a wirelessly controllable actuator unit, by which the lock can optionally be brought into a locked or unlocked state.
Abstract:
An RFID cabinet system is provided for monitoring items having an RFID tag. System includes cabinet having open interior where items are stored and at least one door providing access to items. Static RFID system is provided for reading and identifying data embedded on RFID tag located on at least some of the items placed within cabinet. Static RFID system is configured to monitor substantially all items located within the interior of cabinet when door is closed. Transaction RFID system is provided for reading one of the RFID tags upon removal or return of the associated item from cabinet. Transaction RFID system is operable when door is open. Computer system is configured to sense opening and closing of door. Computer system is configured to receive input that identifies user, and computer system is configured to periodically record data read from RFID tags by static RFID system and transaction RFID system.
Abstract:
The present invention relates to the field of identity recognition, and particularly relates to a face recognition system and a face recognition method, mainly comprising a lighting preprocessing module, a feature generation module, a facial feature library module, and a feature matching and recognition module. In the face recognition method, the inputted face image is first light-difference optimized by means of the lighting preprocessing module, then a feature vector of the face image is generated by means of the feature generation module; then, the feature vector to be recognized is matched with all of the feature vectors in the feature library and computed to arrive at an identity result corresponding to the feature vector to be recognized. In the technical solutions of the present invention, the identity of a face image to be recognized may be determined in real time for a system whose computing resources are limited, using a short period of time and having high accuracy.
Abstract:
Procédé de surveillance d'un lieu au moyen d'un réseau de capteurs d'images reliés à un dispositif de reconnaissance biométrique agencé pour extraire des caractéristiques biométriques d'individus dans des images fournies par les capteurs et pour comparer les caractéristiques biométriques extraites d'images de capteurs distincts pour y détecter la présence d'un même individu en fonction d'un score de proximité entre les caractéristiques biométriques, le procédé comprenant les étapes de déterminer des informations positionnelles et des informations temporelles représentative d'un temps intermédiaire entre les deux images et vérifier une cohérence entre les informations positionnelles et temporelles nouvellement déterminées et les informations positionnelles et temporelles préalablement mémorisées.
Abstract:
An apparatus comprising: at least one time of flight (ToF) single photon avalanche diode (SPAD) based range detecting module configured to generate at least one distance determination between the apparatus and an object within a module field of view; and a processor configured to receive the at least one distance determination from the ToF SPAD based range detecting module output and control at least one camera module configured to capture at least one image based on the at least one distance determination.
Abstract:
In a personal authentication device, a storing unit of each group stores therein biometric information of the persons belonging to that group. When a subject is to be authenticated, an acquiring unit acquires subject biometric information that is biometric information of the subject. A collating unit decides whether the subject is authentic based on whether there is a match for the subject biometric information in the biometric information in the storing unit. If the subject is determined to be not authentic, the subject biometric information is collated with biometric information in the storing unit of another group.
Abstract:
Described is an apparatus (1) for safeguarding users during use of apparatuses (2) with at least a part in motion, comprising a management device (3) of the motion in use connected to the apparatus (2) and configurable between an enabling condition of the motion and a condition of interrupting the motion. The apparatus (1) comprises a device (7) for measuring at least one biometric value associated in use with the body of the user to measure this value biometric and a processing unit (9) operatively connected to the management device (3) and to the measuring device (7) configured to interrupt the movement of the part when the measured biometric value moves away from reference biometric value.
Abstract:
Various embodiments of access control systems and fingerprint sensing systems are disclosed. One or more fingerprints of an authorized person are recorded in a fingerprint database together with a sequence of angular positions. The authorized person may subsequently gain access to a secured item by scanning the authorized person's finger or fingers in accordance with the sequence of angular positions. Various embodiments of fingerprint sensors for determining the angular position of a finger on the sensor are also disclosed.