SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS

    公开(公告)号:US20240022389A1

    公开(公告)日:2024-01-18

    申请号:US18355858

    申请日:2023-07-20

    申请人: ASSA ABLOY AB

    IPC分类号: H04L5/14 H04L1/00 H04L1/18

    CPC分类号: H04L5/14 H04L1/0061 H04L1/18

    摘要: Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.

    PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

    公开(公告)号:US20220172529A1

    公开(公告)日:2022-06-02

    申请号:US17593340

    申请日:2020-03-24

    申请人: ASSA ABLOY AB

    IPC分类号: G07C9/00 G07C9/29

    摘要: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.

    TRAJECTORY AND INTENT PREDICTION
    8.
    发明公开

    公开(公告)号:US20240096155A1

    公开(公告)日:2024-03-21

    申请号:US18257182

    申请日:2021-12-07

    申请人: ASSA ABLOY AB

    摘要: Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.

    TRAJECTORY PREDICTION WITH DATA NORMALIZATION

    公开(公告)号:US20240094006A1

    公开(公告)日:2024-03-21

    申请号:US18257172

    申请日:2021-12-07

    申请人: ASSA ABLOY AB

    摘要: Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).