PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION

    公开(公告)号:US20220172529A1

    公开(公告)日:2022-06-02

    申请号:US17593340

    申请日:2020-03-24

    申请人: ASSA ABLOY AB

    IPC分类号: G07C9/00 G07C9/29

    摘要: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.

    READER COORDINATION FOR ACCESS CONTROL

    公开(公告)号:US20220189228A1

    公开(公告)日:2022-06-16

    申请号:US17593336

    申请日:2020-03-24

    申请人: ASSA ABLOY AB

    IPC分类号: G07C9/22 G07C9/27 G07C9/00

    摘要: Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.