-
公开(公告)号:US20240282158A1
公开(公告)日:2024-08-22
申请号:US18649346
申请日:2024-04-29
申请人: ASSA ABLOY AB
CPC分类号: G07C9/00309 , G07C9/22 , H04B1/69 , H04W12/06 , H04W76/10 , G07C2009/00412
摘要: A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.
-
公开(公告)号:US20240022389A1
公开(公告)日:2024-01-18
申请号:US18355858
申请日:2023-07-20
申请人: ASSA ABLOY AB
CPC分类号: H04L5/14 , H04L1/0061 , H04L1/18
摘要: Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
-
公开(公告)号:US11875209B2
公开(公告)日:2024-01-16
申请号:US17250903
申请日:2020-10-01
申请人: ASSA ABLOY AB
摘要: Various systems and methods for providing discovering smart card slots in a device are described herein. A server device for discovering smart card slots in a client device may be implemented with a processor subsystem; and memory including instructions, which when executed by the processor subsystem, cause the processor subsystem to perform operations comprising: receiving, at the server device from the client device, over an established Bluetooth connection, smart card connector parameters, the client device having a plurality of smart card slots; iterating through the plurality of smart card slots; at each slot of the plurality of smart card slots, using a smart card protocol to attempt to access an application at each slot, the application pre-associated with the server device; and in response to identifying the application exists in a slot of the plurality of smart card slots, connecting with the application.
-
公开(公告)号:US11763551B2
公开(公告)日:2023-09-19
申请号:US16807825
申请日:2020-03-03
申请人: ASSA ABLOY AB
IPC分类号: G06N3/08 , G06N3/047 , G06V10/778 , G07C9/37 , G06N3/04 , G06V40/16 , G06F18/21 , G06F18/214 , G06V10/98
CPC分类号: G06V10/7784 , G06F18/2148 , G06F18/2155 , G06F18/2193 , G06N3/04 , G06N3/047 , G06N3/08 , G06V10/993 , G06V40/172 , G07C9/37
摘要: An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.
-
公开(公告)号:US20220172529A1
公开(公告)日:2022-06-02
申请号:US17593340
申请日:2020-03-24
申请人: ASSA ABLOY AB
发明人: Hans-Juergen Pirch , Fredrik Carl Stefan Einberg , Tomas Lars Jonsson , Sylvain Jacques Prevost , Jan Steffl , Hans Gunnar Frank
摘要: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.
-
公开(公告)号:US20240298179A1
公开(公告)日:2024-09-05
申请号:US18399309
申请日:2023-12-28
申请人: ASSA ABLOY AB
发明人: Hans-Juergen Pirch , Fredrik Carl Stefan Einberg , Tomas Lars Jonsson , Sylvain Jacques Prevost , Jan Steffl , Hans Gunnar Frank
IPC分类号: H04W12/08 , G06F12/14 , G06N3/08 , G06Q10/1093 , G07C9/00 , G07C9/10 , G07C9/21 , G07C9/22 , G07C9/25 , G07C9/27 , G07C9/28 , G07C9/29 , H04W4/02 , H04W4/80 , H04W12/06 , H04W12/64
CPC分类号: H04W12/08 , G06F12/1458 , G06N3/08 , G06Q10/1095 , G07C9/00174 , G07C9/00182 , G07C9/00309 , G07C9/00904 , G07C9/10 , G07C9/21 , G07C9/22 , G07C9/257 , G07C9/27 , G07C9/28 , G07C9/29 , H04W4/027 , H04W4/80 , H04W12/06 , H04W12/64 , G07C2009/00333 , G07C2009/00357 , G07C2009/00769 , G07C2209/08 , G07C2209/61 , G07C2209/63
摘要: Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility. receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
-
公开(公告)号:US20240096157A1
公开(公告)日:2024-03-21
申请号:US18507275
申请日:2023-11-13
申请人: ASSA ABLOY AB
发明人: Hans-Juergen Pirch , Fredrik Carl Stefan Einberg , Tomas Lars Jonsson , Sylvain Jacques Prevost , Jan Steffl , Hans Gunnar Frank
CPC分类号: G07C9/29 , G06K7/10297 , G06K7/10366 , G07C9/00182 , G07C9/00309 , H01Q5/25 , H04W4/80 , H04B1/69
摘要: A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
-
公开(公告)号:US20240096155A1
公开(公告)日:2024-03-21
申请号:US18257182
申请日:2021-12-07
申请人: ASSA ABLOY AB
CPC分类号: G07C9/28 , G06N20/00 , G07C9/00309 , G07C9/22 , G07C2009/00793 , G07C2209/63
摘要: Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
-
公开(公告)号:US20240094006A1
公开(公告)日:2024-03-21
申请号:US18257172
申请日:2021-12-07
申请人: ASSA ABLOY AB
CPC分类号: G01C21/206 , G01C21/12 , G07C9/00571 , G07C9/28 , H04W4/33
摘要: Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).
-
公开(公告)号:US20230368575A1
公开(公告)日:2023-11-16
申请号:US18247184
申请日:2020-10-12
申请人: ASSA ABLOY AB
CPC分类号: G06V40/172 , G06V10/809 , G07C9/00563 , G07C9/37
摘要: The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
-
-
-
-
-
-
-
-
-