Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
H04W 12/64 - Location-dependent; Proximity-dependent using geofenced areas
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/10 - Movable barriers with registering means
G07C 9/00 - Individual registration on entry or exit
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Systems and methods may he used for authenticating and validating a credential for performing an action. A method may include using an access control device to exchange public keys with a user device. The method may include sending, to the user device, a first authentication cryptogram including a first signature, a public key certificate, and a Credential Trust Information (CTI), and receiving, from the user device, a second authentication cryptogram including a second signature, a public key of the user device, and a credential. The access control device may authenticate the user device based on the credential and the second signature The access control device may determine whether the credential received in the second authentication cryptogram is signed by a trusted credential issuer to validate the user device. The method may include causing the action to be performed.
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Locks of metal; mechanical locks; keys; safes; electronic safes and safe deposit boxes; parts and equipment for all the aforementioned goods. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic or magnetic access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; CCTV systems and devices; electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; computer software, apparatus and systems for managing and operating mini bars and energy consumption devices; apparatus and instruments for recording, monitoring, asset tracking, signalling and checking; magnetic and electronic identity cards; magnetic data carriers and computer software. Installation, maintenance and repair of locks, locking mechanisms, access control apparatus and instruments, and its parts and fittings; installation, maintenance and repair of security and access control systems and devices; installation, maintenance and repair of apparatus and instruments used for facilities management and asset tracking systems. Design and development of computers, computer systems, computer software, technology solutions, internet of things (IoT) solutions, mobile and web applications in the field of access control and security, including secure identity solutions and asset tracking systems; design and development of apparatus and instruments in the field of access control, security, facilities management; consultancy services regarding energy efficiency in buildings; consultancy and information regarding the aforesaid services. Security services for the protection of property and individuals; data lifecycle management services for others, namely, issuance, authentication and revocation of digital signature and digital rights for physical and logical access control systems and secure identity solutions; security consultants.
4.
RFID TAG FOR A TAMPER PROOF ATTACHMENT TO AN OBJECT SUCH AS A LICENCE PLATE
An RFID tag (1) for tamper proof attachment to an object (100) such as a license plate, comprising a lower housing (10), an upper housing (20) and an antenna unit (30). The lower housing (10) is configured to be attached to the object (100). The upper housing (20) is placed on the lower housing (10) and comprises a peripheral portion (22). The peripheral portion (22) laterally surrounds the lower housing (10) and is configured to be attached to the object (100). The antenna unit (30) is positioned between the lower housing (10) and the upper housing (20). At least one first portion of the antenna unit (35) is attached to the lower housing (20) and at least one second portion of the antenna unit (36) is attached to the upper housing (10). When the distance (D) between the upper housing (20) and the lower housing (10) changes in case someone attempts to remove the RFID tag from the object, the at least one first portion of the antenna unit (35) remains attached to the lower housing (10) and the at least one second portion of the antenna unit (36) remains attached to the upper housing (20). Due to this specific arrangement the antenna unit (30) is being damaged in case of detachment of the RFID tag as disclosed herein.
The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G07C 9/00 - Individual registration on entry or exit
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
6.
PROVIDING DATA FOR TRAINING A MACHINE LEARNING MODEL
It is provided a method for providing data for training a machine learning model. The method is performed in a training data provider (1) and comprises the steps of: obtaining (40) a data structure comprising a chain of delegations, the chain of delegations covering a delegation path from a media capturing device (3) to the training data provider (1) such that, in the chain of delegations, each delegation is a delegation from a delegator to a receiver; sending (42) a key request to a delegation verifier (2), the key request comprising the data structure; receiving (44) a decryption key from the delegation verifier (2); obtaining (46) encrypted media data captured by the media capturing device (3); decrypting (48) the encrypted media data, resulting in decrypted media data; and providing (50) the decrypted media data for training the machine learning model.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
It is provided a method for determining whether a portable key device is located inside or outside a metal door. The method is performed by a credential communication device and comprises the steps of: obtaining a first time-of-flight, ToF, measurement between a first antenna and the portable key device, wherein the first antenna is located on the outside of the metal door; obtaining a second ToF measurement between a second antenna and the portable key device, wherein the second antenna is located on the inside of the metal door; and determining the portable key device to be located on the outside of the metal door when the first ToF measurement is less than the second ToF measurement by an amount which is greater than a threshold value.
It is provided a method for determining when to perform maintenance of a door (15). The method is performed by a maintenance determiner (1). The method comprises: obtaining (40), from a first sensor (6), sensor data indicating kinetic performance of the door; defining (42) a start time of the sensor data based on a first event detected by a second sensor (7), to enable synchronisation of the sensor data; dividing (46) the sensor data in a plurality of time periods (24a-e); evaluating (48) the sensor data in each one of the plurality of time periods by comparing to reference data respectively associated with each one of the plurality of time periods; and determining (50) to perform maintenance, based on the evaluation of the sensor data.
Various systems and methods for securely sharing private information are described herein. A mobile device comprises instruction to configured the mobile device to identify a verifier device having an available wireless connection, the wireless connection having a wireless connection strength; determine that a triggering event occurs, the triggering event based on the wireless connection strength; when the triggering event occurs: connect to the verifier device; transmit a digital credential to the verifier device, each of a plurality of data elements of the digital credential separately encrypted using distinct encryption keys; receive a request to access a requested data element of the digital credential; prompt a user of the mobile device for consent to share the requested data element; and transmit information to the verifier device when the user consents sharing the requested data element, the information used to decrypt only the requested data element.
A method for maintaining a log of events in a shared computing environment is provided. One example of the disclosed method includes receiving one or more data streams from the shared computing environment that include transactions conducted in the shared computing environment by a first entity and a second entity that is different from the first entity. The method further includes creating a first blockchain entry for a first transaction conducted in the shared computing environment for the first entity, creating a second blockchain entry for a second transaction conducted in the shared computing environment for the second entity, where the second blockchain entry includes a signature that points to the first blockchain entry, and then causing the first and second blockchain entries to be written to a common blockchain data structure in a database that is made accessible to both the first entity and the second entity.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An arrangement (10) for a lock device (88a, 88b), the arrangement (10) comprising an input member (12, 106); a coupling member (26) movable between an uncoupled position (34) and a coupled position (80); an electromechanical actuator (28) comprising an actuating member (42) linearly movable between an uncoupling actuating position (44) and a coupling actuating position (78); and a torsion spring (30) having a first leg (62) and a second leg (64) movable away from each other against a deformation of the torsion spring (30), wherein the actuating member (42) is arranged to engage the first leg (62) and the second leg (64) is arranged to engage the coupling member (26) when the coupling member (26) is in the uncoupled position (34) and the actuating member (42) moves from the uncoupling actuating position (44) to the coupling actuating position (78). A lock device (88a, 88b) comprising an arrangement (10) is also provided.
According to a first aspect, it is provided a method for requesting access to a physical space secured by a lock. The method is performed in a mobile device of a user and comprises the steps of: authenticating the mobile device with an authentication server, resulting in a token, being a data item, indicating one or more access groups to which the user belongs, wherein the token is cryptographically signed by the authentication server; storing the token in the mobile device; obtain a lock identifier of the lock; and transmitting an access request to an access control device, the access request comprising the token and the lock identifier.
An arrangement (10, 82) for locking and unlocking a lock device (58, 74), the arrangement (10, 82) comprising a transfer element (12) movable between a protruded position (42) and a retracted position (56); a core member (14) of soft magnetic material, the core member (14) comprising a coil section (20); an electric coil (16) wound around the coil section (20); and a blocking member (48) comprising a magnet (18), the blocking member (48) being movable between a blocking position (50), in which the magnet (18) establishes a magnetic circuit through the coil section (20) and the blocking member (48) blocks movement of the transfer element (12) to the retracted position (56), and an unblocking position (54), in which the magnet (18) establishes a magnetic circuit through the coil section (20) and the blocking member (48) unblocks movement of the transfer element (12) to the retracted position (56). A lock device (58, 74) comprising an arrangement (10, 82), and a method of controlling a lock device (58, 74), are also provided.
It is provided a system comprising a lock device and a key device for use in access control to a physical space. The key device comprises: an electronic key module configured to communicate with an electronic lock module of the lock device for access control; and a permanent magnet configured to close a magnetically controllable switch of the lock device to thereby power an electronic lock module of the lock device. The lock device comprises: the electronic lock module configured to communicate with the electronic key module to evaluate whether to grant access; a power source; and the magnetically controllable switch provided between the power source and the electronic lock module such that the magnetically controllable switch is closable by the permanent magnet of the key device to power the electronic lock module.
Disclosed herein are systems and methods for threshold cryptography for cloud-based software-implemented hardware security modules. In an embodiment, an encryption system collects at least a decryption-threshold number of private-key shares from a secure store, where the private-key shares correspond to a public key generated in a first secure enclave as part of a secret key set, which also includes a first plural quantity of the private-key shares. The encryption system obtains an ephemeral-hardware-security-module-(eHSM)-encryption key by decrypting the collected private-key shares. The encryption system initializes, in a second secure enclave, a second instance of a first eHSM. The initialized second instance of the first eHSM is encrypted with the obtained eHSM-encryption key.
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
Goods & Services
Metal hardware; Architectural hardware made of common metals and alloys thereof; fittings and mountings for doors and windows; locks; lock cylinders; Metal locksets; lock cases; lock mechanisms; push button locks; cabinet locks; door locks; furniture locks, of metal; rim locks; gate locks; Metal locks for windows; lockable window handles; window bolts; deadbolts; door bolts; metal escutcheon plates for locks; hinges; padlocks; keys; Metal key blanks; safes; Door springs, non-electric; Door bells, non-electric; Door cases of metal; Door frames of metal; Non-electric metal door closers; Door openers, non-electric; Door holders of metal; Door panels of metal; Door stops of metal; Doors of metal; Metal windows. Electric, electronic and electromechanical locks and lock goods; electronic locks that can be controlled from a remote location; electronic locks that can be controlled using a smartphone, tablet or other mobile device; apparatus for recording, transmission or reproduction of sound and images, apparatus for transmission of communications; electric and electronic security or alarm apparatus; electric and electromechanical door and window hardware; electrical control apparatus for doors; electronic keys; alarm locks; electric and electronic door bells; push button electric and electronic locks; electronic lock cylinders; electric striking plates; Computer software; parts and fittings included in this class for all the aforesaid goods.
It is provided a method for determining intent to open a door. The method is performed by an intent determiner. The method comprises: obtaining an image of a physical space near the door; determining a position and orientation of a person in the image by providing the image to an image machine learning model, wherein the image machine learning model is configured to determine position and orientation of a person in the image, wherein the image machine learning model is configured to determine a stick figure of the person based on the image; adding a data item, comprising an indicator of the position and an indicator of the orientation, to a data structure; determining based on the data structure, whether there is intent of the person to open the door; and repeating the method until an exit condition is true.
An access control system, processor-implemented method, and computer readable medium optionally includes an electronic memory and a processor. The processor and computer readable medium are configured to receive a command from a user to access the secure asset, determine access rights by the user to the secure asset, based on the access rights of the user, determine general authentication for the user to access the secure asset, and grant access to the user conditional on the general authentication determined for the user.
It is provided a sensor device comprising: a proximity sensor; a processor; a wireless communication module; and a memory. The memory stores instructions that, when executed by the processor, cause the sensor device to: receive a user input signal; determine when the received user input signal matches a signal template being associated with an event; store in the memory a record indicating an occurrence of the event associated with the user input signal; and transmit, once the wireless communication module is active, any stored records.
An arrangement (16) for controlling movements of an access member (12) relative to a frame (14), the arrangement (16) comprising abase section (18) for connection to either the access member (12) or the frame (14); a fixation part (20) for connection to the other of the access member (12) and the frame (14); a flexible elongated element (22) configured to be tensioned to thereby force the base section (18) and the fixation part (20) to move towards each other in a relative closing movement (86); and a braking device (82) arranged to brake a speed of the relative closing movement (86).
It is provided a method for communicating a media stream between a guest device (1) and an approval device (2) for evaluating whether to unlock an electronic lock (12). The method comprises: obtaining (40) a pointer to the coordination server (3) for establishing contact with the approval device (2); connecting (41 ) to the coordination server (3); establishing (42) a peer-to-peer connection between the guest device (1) and the approval device (2); providing (43) a media stream to the approval device (2) over the peer-to-peer connection; receiving (53) the media stream from the guest device (1) over the peer-to-peer connection; presenting (44) the media stream to an approval user (6); receiving (45) user input indicating to unlock the electronic lock (12); providing (46) a first unlock signal to unlock the electronic lock; and transmitting (47) the first unlock signal to unlock the electronic lock (12).
11F)) to a magnitude of the actuation force by decreasing its input impedance when the magnitude of the actuation force increases, and by increasing its input impedance when the magnitude of the actuation force decreases. A corresponding power converter assembly and an electronic lock (148) including the energy harvesting system are also provided.
H02J 7/32 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries for charging batteries from a charging set comprising a non-electric prime mover
H02J 7/34 - Parallel operation in networks using both storage and other dc sources, e.g. providing buffering
E05B 47/00 - Operating or controlling locks or other fastening devices by electric or magnetic means
26.
SYSTEMS AND METHODS FOR AUTHENTICATING USERS WITHIN A COMPUTING OR ACCESS CONTROL ENVIRONMENT
Authentication methods and systems are disclosed. In one non-limiting example, an authentication method may include detecting a user within an image, determining that the image further includes additional recognizable data, analyzing the additional recognizable data and one or more biometric features of the user, and determining that the additional recognizable data and the one or more biometric features of the user correspond to valid additional recognizable data and valid biometric features of an enrolled user, respectively. The method may further include enabling the user to access a protected asset based on determining that the additional recognizable data and the one or more biometric features of the user correspond to valid additional recognizable data and valid biometric features of an enrolled user, respectively.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06V 20/30 - Scenes; Scene-specific elements in albums, collections or shared content, e.g. social network photos or video
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
An actuating device (12) comprising a stationary structure (20); an actuating element (22) rotatable relative to the stationary structure (20); an electric power source (24, 82); a spindle (26) arranged to be rotated by rotation of the actuating element (22); a locking member (28) movable between a locked position (66) and an unlocked position (86); an electromechanical transfer device (30, 84) arranged in the spindle (26), the transfer device (30, 84) being configured to adopt a locked state (68) and an unlocked state (78); a receiver device (34) fixed with respect to the spindle (26), the receiver device (34) being electrically connected 62 to the transfer device (30, 84); and a transmitter device (32) fixed with respect to the stationary structure (20) and arranged to be electrically powered by the power source (24, 82), the transmitter device (32) being configured to wirelessly transmit power to the receiver device (34).
It is provided a method for providing non-visual guidance for passing through a door (15). The method being performed by a guidance device (1). The method comprises: determining (40) that a person (5) is near the door (15) and that non-visual guidance is to be provided to the person (5); determining (42) an indication of location of the person (5) in relation to the guidance device (1) or the door (15); and providing (44) non-visual guidance to the person for passing through the door (15), wherein the non- visual guidance is based on the indication of location.
It is provided a method for alerting difference in user (5) sentiment of a user using a door (15). The method is performed in a user analysis device (1). The method comprises: receiving (40) sensor data from at least two sensors (7a-c) of different sensor types, the sensor data comprising data relating to a user (5) in the vicinity of a door (15); determining (42), based on the sensor data, a first user sentiment prior to using the door (15); determining (44), based on the sensor data, a second user sentiment after using the door (15); deriving (46) a difference in user sentiment between the first user sentiment and the second user sentiment; detecting (48) that the difference in user sentiment is greater than a threshold; and generating (50) an alert signal, indicating that the difference in user sentiment is greater than the threshold.
It is provided a lock assembly (20) for controlling its power state, the lock assembly being configured to control access to a restricted physical space (16) secured by a door (15). The lock assembly (20) comprises: an access control module (23), configured to selectively control the lock assembly (20) to be in an unlocked state or a locked state, wherein the access control module (23) comprises a processor (60) and a magnetically controllable switch (25), configured to control an operative state of the processor (60) based on an applied magnetic field; and a rotary member (24) configured to rotate when a connected door handle (13) rotates. The rotary member (24) comprises a magnet (26) for controlling the state of the magnetically controllable switch (25).
Systems and methods may be used for providing wireless power from a mobile device to a digital lock. The mobile device may include a proximity communication antenna to receive an authentication request from the digital lock. The proximity communication antenna may facilitate the mobile device providing wireless power to the digital lock via a wireless power protocol. The proximity communication antenna may send an authorization to the digital lock to cause the digital lock to open.
Systems and methods may be used for controlling physical access using a cloud transaction. A method may include receiving an authentication attempt for a user from a mobile device, and authenticating the user for access to a physical space based on the authentication attempt. The method may include receiving identification information corresponding to the user from an access control device, and sending authorization to the access control device to permit the user to access the physical space based on the authenticating the user.
It is provided a location determiner comprising: a first antenna; a radio signal modification device, wherein the radio signal modification device is configured to improve an ability to determine whether the portable key device is located on a back side or on a front side of the location determiner, based on obtaining a channel impulse response, CIR, of an impulse signal transmitted from the portable key device, wherein the location determiner is installable such that the back side is in a space being restricted by selectively unlockable a physical barrier and the front side is opposite the back side.
It is provided a method for determining when a portable key device is located on a front side or on a back side in relation to a barrier secured by an electronic lock. The method is performed in a location determiner and comprises the steps of: obtaining a channel impulse response, CIR, based on an impulse signal transmitted from the portable key device, the CIR being based on a plurality of samples of the impulse signal as received by an antenna being fixedly mounted in relation to the electronic lock; and determining, based on the CIR, whether the portable key device is located on the front side or on the back side.
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventor
Ayala, Stéphane
Destouches, Nathalie
Hébert, Mathieu
Dalloz, Nicolas
Abstract
A method of generating a multiplexed image (18) for printing that can be observed in a plurality of modes includes determining a finite shape (22) of a multiplexed palette (10) in a combined color space. The contrast of the multiplexed image (18) in each mode can be optimized by determining a maximum volume hyperrectangle (20) enclosed in the finite shape (22). Gamut mapping to this maximum volume hyperrectangle (20) allows for generation of a multiplexed image (18) that has a maximum contrast and is free from artifacts caused by an interdependency between the colors in each mode. Performing a dimensionality reduction using PCA allows for reducing the complexity of the optimization problem.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Developing, arranging, and conducting in-person, on-line, and virtual conferences, seminars, workshops, programs, symposia, classes, lectures, webinars, exhibitions, and courses of instruction in the fields of secure identity products and services, access control products and services, mobile devices, mobile access services, and mobile-enabled access control; developing, arranging, and conducting in-person, on-line, and virtual conferences, seminars, workshops, programs, symposia, classes, lectures, webinars, exhibitions, and courses of instruction in the fields of identity verification, data authentication, encryption, credentials management, network security, locks, biometric identification products and services, and anti-counterfeiting products; distribution of course, educational, and training materials in printed or electronic format related to all of the aforesaid.
09 - Scientific and electric apparatus and instruments
Goods & Services
systems of radio frequency identification (RFID systems); smart tags; computer software for smart tags; electrified and electronic locking systems; electronically controlled locks; push button electric and electronic locks.
41 - Education, entertainment, sporting and cultural services
Goods & Services
(1) Developing, arranging, and conducting in-person, on-line, and virtual conferences, seminars, workshops, programs, symposia, classes, lectures, webinars, exhibitions, and courses of instruction in the fields of secure identity products and services, access control products and services, mobile devices, mobile access services, mobile-enabled access control, identity verification, data authentication, encryption, credentials management, network security, locks, biometric identification products and services, and anti-counterfeiting products, and distribution of course, educational, and training materials in connection therewith in printed or electronic format;
41 - Education, entertainment, sporting and cultural services
Goods & Services
Developing, arranging, and conducting in-person, on-line, and virtual conferences, seminars, workshops, programs, symposia, classes, lectures, webinars, exhibitions, and courses of instruction in the fields of secure identity products and services, access control products and services, mobile devices, mobile access services, mobile-enabled access control, identity verification, data authentication, encryption, credentials management, network security, locks, biometric identification products and services, and anti-counterfeiting products, and distribution of course, educational, and training materials in connection therewith in printed or electronic format
A lock device (12a; 12b) comprising an input member (18) rotatable about an input axis (46); an output member (20) rotatable about an output axis (48); an electromechanical coupling device (22a; 22b) configured to adopt an uncoupled state (68), where rotation of the input member about the input axis is not transmitted to a rotation of the output member about the output axis, and a coupled state (98), where rotation of the input member about the input axis can be transmitted to a rotation of the output member about the output axis; an electric control system (24) configured to control the coupling device to switch between the uncoupled state and the coupled state; and a sensor (90) in signal communication with the control system, the sensor being configured to generate a position signal (92) indicative of a position of the output member about the output axis. A lock system (10) comprising a lock device is also provided.
An arrangement (22a; 22b) for closing an access member (14) rotatable relative to a frame (16) about a hinge axis (18), the arrangement comprising a primary element (24) for fixation to either the frame or the access member; a secondary element (32) for fixation to the other of the frame and the access member; a connection device (34) arranged between the primary element and the secondary element and engaging the secondary element; and a force device (40) comprising a drive element (42) rotatable about a pivot axis (36) and engaging the connection device, the force device being arranged to force rotation of the connection device relative to the primary element about the pivot axis, wherein a position of the force device relative to the primary element is adjustable after fixation of the primary element and the secondary element to adjust a distance (38) between the pivot axis and the hinge axis. An access member system (10) and a method are also provided.
E05F 1/10 - Closers or openers for wings, not otherwise provided for in this subclass spring-actuated for swinging wings
E05F 3/10 - Closers or openers with braking devices, e.g. checks; Construction of pneumatic or liquid braking devices with liquid piston brakes with a spring, other than a torsion spring, and a piston, the axes of which are the same or lie in the same direction
E05F 3/22 - Additional arrangements for closers, e.g. for holding the wing in opened or other position
It is provided a method for routing data in a communication network (8). The method being performed by a routing node (3). The method comprises: receiving (40) an uplink message from an end node (2) over a multicast wireless transmission; forwarding (42) the uplink message towards a destination node over a unicast transmission; receiving (44) a downlink message over a unicast transmission; determining (46) that a recipient of the downlink message is the end node (2); and transmitting (48) the downlink message over multicast to the end node (2). Corresponding routing node, gateway, computer programs and computer program products are also provided.
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
A reader device of a physical access control system comprises an ultra-wide band (UWB) physical layer and processing circuitry. The processing circuitry is operatively coupled to the UWB physical layer and is configured to: receive access credential information from a separate second device; receive ranging information from the second device; grant access through a physical portal according to the access credential information and ranging information; determine a number of people intending to pass through the physical portal; and generate an indication according to the determined number.
G07C 9/15 - Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
G01S 7/41 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group using analysis of echo signal for target characterisation; Target signature; Target cross-section
G01S 13/76 - Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
G01S 13/02 - Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
A test system comprises a radio frequency (RF) shielded container, the shielded container to house a UWB receiver device under test; an RF antenna arranged within the RF shielded container; and a UWB transmitter device operatively coupled to the RF antenna. The UWB transmitter device is configured to transmit a UWB signal within the RF shielded container using the antenna, wherein the transmitted UWB signal is representative of multi-path components (MPCs) of resulting signals in an end-use environment of the UWB receiver device resulting from transmitting a UWB ranging signal in the end-use environment.
It is provided a receptacle holder (1, 1a-b) for selectively allowing a receptacle (4, 4a-b) to be removed. The receptacle holder (1, 1a-b) comprises: an attachment member (10) being configured to engage with a receptacle (4, 4a-b) to selectively keep the receptacle (4, 4a-b) in a locked engagement with the receptacle holder (1, 1a-b); a processor (60); and a memory (64) storing instructions (67) that, when executed by the processor, cause the receptacle holder (1, 1a-b) to: determine to unlock the attachment member (10); and unlock the receptable (4, 4a-b) from the attachment member (10). A corresponding receptacle holder, computer program and computer program product are also provided.
A47G 29/14 - Deposit receptacles for food, e.g. breakfast, milk; Similar receptacles for large parcels with appliances for preventing unauthorised removal of the deposited articles
G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
G06Q 50/28 - Logistics, e.g. warehousing, loading, distribution or shipping
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
G07C 9/20 - Individual registration on entry or exit involving the use of a pass
G07C 9/00 - Individual registration on entry or exit
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
It is provided a wearable device for determining when a user has fallen down. The wearable device comprises: a first biometric sensor for obtaining first biometric data of the user, wherein the first biometric sensor is a first accelerometer configured to measure acceleration of a part of a first limb of the user; a second biometric sensor for obtaining second biometric data of the user comprising a finger pressure parameter; and a third biometric sensor for obtaining third biometric data, the third biometric sensor being a second accelerometer configured to measure acceleration of a body part of the user being distinct from the first limb. The wearable device is configured to determine an identity of the user is based on the first biometric data, the second biometric data and the third biometric data, the identity being used to control access to a physical space, and to determine when the user has fallen down.
B60R 25/01 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
G06F 17/14 - Fourier, Walsh or analogous domain transformations
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Physical access control systems and devices; logical access
control systems and devices; data processing readers,
scanners, printers, and apparatus for reading, scanning,
verifying, authenticating, and processing credential and
identity data; fixed readers, scanners, and printers; photo
identification readers; readers, scanners, and printers used
for government credentials, driver’s licenses, national
identification cards, passports, tickets, frequent flier
materials, credit cards, and other identity credentials
carried in tangible form and on smart phones, tablets, and
other wireless mobile devices; biometric readers, scanners,
printers, and locks; fingerprint readers, scanners,
printers, and locks; airport boarding pass readers; bar code
readers, scanners, printers, and apparatus for reading
and/or scanning bar codes; optical character readers,
scanners, printers, and apparatus for optical character
recognition; magnetic and smart payment card readers and
scanners; readers used for anti-counterfeiting purposes;
electronic data input or entry apparatus, instruments, and
machines; electronic data capture apparatus, instruments,
and machines; radio-frequency identification, near-field
communication, and matrix bar code readers and controllers;
radio-frequency identification, near-field communication,
and matrix bar code systems and their individual components;
electronic card readers; reading devices used to read data
from optical security media; magnetic and smartcard readers
and their components; contact smart chips; hardware,
software, and firmware for networking and interfacing
readers, writers, and host computers used in the fields of
security, access control, and identification; computer
programs; recorded computer software; software providing
interconnection with other systems and interfaces for
computers; data processing apparatus; data processing
equipment; computer peripheral devices; computer software
for authenticating data and for use in computer access
control; mobile device software for downloading and
implementing access control functionality for identity
verification and access or denial of access to physical
premises; downloadable software and downloadable
applications for storing, managing, and authenticating
identity credentials carried on smart phones, tablets, and
other wireless mobile devices; downloadable software and
downloadable mobile applications for administration and
management of access control devices and systems;
downloadable software and downloadable mobile applications
for use in managing, configuring, upgrading, locating, and
performing diagnostics on readers, scanners, printers, and
other access control devices and systems. Professional consultancy in the field of computers; computer
programming services; computer and software rental services;
provision of maintenance services for computer software;
services updating of computer software; providing the use of
online computer software for the search and retrieval of
information from a computer database; product research and
development services; scientific and technological services
and research and design relating thereto; design and
development of computer hardware and software; design and
development of radio-frequency identification, near-field
communication, and matrix bar code systems; computer system
and software design; installation and maintenance of
computer software; database services, namely, maintaining
databases, database design and development, rental of
database management software, and/or rental of computer
database software; technical computer services;
customization of computer software; software as a service
(saas) and providing temporary use of non-downloadable
software for managing and authenticating government
credentials, driver's licenses, national identification
cards, passports, tickets, frequent flier materials, credit
cards, and other identity credentials carried in tangible
form and on smart phones, tablets, and other wireless mobile
devices; providing temporary use of web-based software
applications and on-line non-downloadable software for use
in managing, configuring, and performing diagnostics on
readers, scanners, printers, and other access control
devices and systems; cloud computing and software as a
service (saas) services featuring software for use in
managing, configuring, and performing diagnostics on
readers, scanners, printers, and other access control
devices and systems; software as a service (saas) services
featuring software for monitoring and providing of physical
access control of premises; access control services namely,
providing the temporary use of on-line non-downloadable
software for monitoring, providing, and restricting physical
access to premises.
49.
BUMPING PREVENTING ARRANGEMENT FOR LOCK DEVICE, LOCK DEVICE AND METHOD
A bumping preventing arrangement (10) for a lock device (38, 52, 68), the bumping preventing arrangement (10) comprising transfer member (12, 46, 64, 74) having a magnet (14), the transfer member (12, 46, 64, 74) being movable along an actuation axis (18) between a locked position (16) and an unlocked position (36); a plurality of electric conductors (20), each electric conductor (20) enclosing the actuation axis (18); and a plurality of switches (22), each switch (22) being associated with a respective electric conductor (20), and being arranged to selectively close an electric circuit comprising the associated electric conductor (20) such that eddy currents are induced in the electric conductors (20) when the magnet (14) moves along the actuation axis (18) from the locked position (16) towards the unlocked position (36). A lock device (38, 52, 68) and a method of controlling a lock device (38, 52, 68) are also provided.
It is provided a method for applying a server partial secret key conditional on blocked status, wherein the server partial secret key (10b) and a user partial secret key (10a) form part of a threshold cryptography scheme (11), the method comprises: receiving (40) a request to apply a server partial secret key (10b) for a requested cryptographic operation for a user device (2); determining (42) that the server partial secret key (10b) can validly be applied by determining that the server partial secret key (10b) is not blocked from being applied; and interacting (44) with the user device (2) to perform the requested cryptographic operation, such that the user device (2) applies the user partial secret key (10a) and the validation server applies the server partial secret key (10b).
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
It is provided a method for recovering access to a user account, the method being performed by a recovery control device (1). The method comprises: triggering (40) generation of a plurality of partial secret keys (10a-g) by respective recovery devices (4a- g), the plurality of partial secret keys forming part of a threshold cryptography scheme (11) associated with a public key (12), wherein the threshold cryptography scheme (11) is associated with the user account; providing (42) the public key (12) to an access verification device (2, 3); and triggering (44) an access recovery, whereby access recovery messages are transmitted to the recovery devices (4a-g), wherein a threshold number of the plurality of partial secret keys (10a-g) are required to be applied in the threshold cryptography scheme (11) for recovering access to the user account.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
52.
IDENTIFYING POSITION AND DETERMINING INTENT BASED ON UWB TEMPORAL SIGNATURES
Methods and program code for determining the position and/or intent of a user (or device) holding, carrying, wearing, or mounted with a UWB-enabled device. Example computer readable medium for determining the position and/or intent of a user comprises program code that when executed by one or more processors, causes the one or more processors to determine a current temporal signature for a first device moving within an environment; compare the current temporal signature with at least a portion of a stored reference temporal signature corresponding to a secure asset within the environment; and base an access control decision corresponding to the secure asset on whether it is determined that the current temporal signature corresponds to the at least a portion of the stored reference temporal signature.
It is provided a protection circuit for protecting a battery comprising a plurality of lithium primary cells. The protection circuit comprises: a switch configured to control when the battery supplies power to a load; and a control circuit being configured to: detect, at a first point in time, when a voltage across at least part of the battery falls below a threshold voltage; and open the switch when the voltage across at least part of the battery is remains below the threshold voltage during a preconfigured duration from the first point in time, wherein the opening of the switch is irreversible.
It is provided a method for performing an action by an electronic device (2), based on a first partial secret key (10a) and a corresponding second partial secret key (10b), wherein the first partial secret key (10a) and the second partial secret key (10b) form part of a threshold cryptography scheme (11) associated with a public key (12). The method comprises: transmitting (40), upon the device initialising, a request for a first partial secret key (10a) to a key server (3); receiving (42) the first partial secret key (10a) from the key server (3); storing (44) the first partial secret key (10a) only in volatile memory (70); retrieving (46) a second partial secret key (10b) from non-volatile memory (71); and performing (48) an action based on applying both the first partial secret key (10a) and the second partial secret key (10b).
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
55.
HARDWARE INTEGRITY CONTROL OF AN ELECTRONIC DEVICE
It is provided a method for providing hardware integrity control of an electronic device (2). The method comprising: triggering (40) each one of a plurality of components (4a- d) of the electronic device to generate of respective partial secret keys (10a-d) forming part of a threshold cryptography scheme (11) associated with a public key (12), wherein a threshold number of the plurality of partial secret keys (10a-d) are required to be applied in the threshold cryptography scheme (11) for verification against the public key (12); and providing (42) the public key (12) to a hardware verification device (3). A corresponding hardware integrity device (1), computer program (67, 91) and computer program product (64, 90) are also provided.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
It is provided a method for enabling detecting suspicious activity by an electronic lock (2). The method comprises: obtaining (40) communication data being metadata of communication to and/or from the electronic lock (2); obtaining (42) internal state data being metadata of an internal state of the electronic lock; obtaining (44) event data indicating at least one event and a time of for the event, wherein the event has occurred for the electronic lock; and transmitting (46) the communication data, the internal state data and the event data to a monitoring server (3). Corresponding electronic lock (2), monitoring server (3), computer programs (67, 167, 91) and computer program products (64, 164, 90) are also provided.
An energy harvesting arrangement (14a-14e) for an access member device (12a-12e), the energy harvesting arrangement (14a-14e) comprising a movable input member (16, 22b) arranged to provide an input torque (84); an electromagnetic generator (40a; 40b) having a stator (86) and a rotor (46) rotatable relative to the stator (86) to generate electric energy; a transmission (42a-42e) configured to transmit a movement of the input member (16, 22b) to a rotation of the rotor (46); and a torque limiter (44a-44g; 110a, 110b) configured to limit the input torque (84). An access member device (12a-12e) and an access member system (10a; 10b) are also provided.
A method and system for in-field encoding of credentials to a credential device. An example method comprises receiving a request to at least one of add or update credentials to a credential device; providing an invitation code for an in-field device, the in-field device being separate from the credential device; receiving, from the in-field device, the invitation code along with information from the credential device for establishing a secure communication channel with the credential device; establishing a secure communication channel with the credential device using the in-field device as an intermediate; generating one or more commands for encoding credentials to the credential device based on the request; and sending the one or more commands, via the secure communication channel using the in-field device as an intermediate, to the credential device.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G07C 9/00 - Individual registration on entry or exit
It is provided a method for enabling determination of proximity of a mobile device (2a, 2b) to a beacon device (3a). The method is performed by a proximity determiner (1) and comprises the steps of: determining a set of beacon devices (3a-e) being detectable from the mobile device; obtaining beacon measurements of one or two beacon devices in each pair; generating a two-dimensional graph based on the beacon measurements; obtaining device measurements of signal strength of beacons from the beacon devices in the set of beacon devices; finding an optimum in a space defined by the two- dimensional graph; and determining the most probable position of the mobile device in the graph based on the optimum.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/14 - Determining absolute distances from a plurality of spaced points of known location
A method and system for in-field encoding of credentials to a credential device. An example method comprises receiving a request to at least one of add or update credentials to a credential device; providing an invitation code for an in-field device, the in-field device being separate from the credential device; receiving, from the in-field device, the invitation code along with information from the credential device for establishing a secure communication channel with the credential device; establishing a secure communication channel with the credential device using the in-field device as an intermediate; generating one or more commands for encoding credentials to the credential device based on the request; and sending the one or more commands, via the secure communication channel using the in-field device as an intermediate, to the credential device.
It is provided a method for determining when to establish a communication channel using an electronic lock (12) controlling access to a restricted physical space (16). The method is performed by a portable key device (2). The method comprises: obtaining (40) a first time-indicator indicating when the portable key device (2) detects a stop in motion of the portable key device (2); receiving (42) a broadcast message from the electronic lock (12); deriving (44) a second time-indicator based on the received broadcast message, the second time-indicator indicating when the electronic lock (12) determines a stop in motion; determining (46) that a difference between the first time- indicator and the second time-indicator is less than a threshold; and establishing (48) a communication channel between the portable key device and the electronic lock when it is determined that the difference between the first time-indicator and the second time- indicator is less than the threshold.
G07C 9/00 - Individual registration on entry or exit
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
It is provided a method for enabling determination of proximity of a mobile device (2a, 2b) to a selected proximity determiner (3a). The method comprises the steps of: determining a base set of proximity determiners (3b-e) whereby an enlarged set of proximity determiners is defined as the selected proximity determiner and the base set of proximity determiners; receiving beacon measurements of signal strength of other proximity determiners in the enlarged set of proximity determiners; generating a two-dimensional graph based on the beacon measurements; receiving respective device measurements indicating signal strength of a signal from the mobile device at each proximity determiner in the enlarged set of proximity determiners; finding an optimum in a space defined by the two-dimensional graph; and determining the most probable position of the mobile device in the graph based on the optimum.
G01S 5/14 - Determining absolute distances from a plurality of spaced points of known location
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
It is provided an electronic lock for controlling access to a restricted physical space. The electronic lock comprises: a first credential interface for accepting a credential from a user for evaluating whether access for the user should be granted; and a second credential interface for accepting a credential from a user for evaluating whether access for the user should be granted. The first credential interface is configured to be activated when the user causes an interaction with the first credential interface, without activating any other credential interfaces. The second credential interface is configured to be activated when a user causes an interaction with the second credential interface, without activating any other credential interfaces.
According to a first aspect, it is provided a method for processing an input media feed for monitoring a person. The method is performed by a media processing device comprising a media capturing device. The method comprises the steps of: obtaining an input media feed using the media capturing device; providing the input media feed to a local artificial, AI, intelligence engine, to extract at least one feature of the input media feed; and transmitting intermediate results comprising the extracted at least one feature to train a central AI model, while refraining from transmitting the input media feed. The local AI engine forms part of the media processing device. The intermediate results comprise a label of the extracted at least one feature. The label is obtained from an end result of another local AI engine.
G06V 10/774 - Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/77 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
G01S 7/41 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group using analysis of echo signal for target characterisation; Target signature; Target cross-section
66.
LOCATION RECOGNITION USING INERTIAL MEASUREMENT UNIT
Methods and program code for determining a location of a device within an environment and for calibrating the environment. Example computer readable medium for determining a location of a device within an environment comprises program code that when executed by one or more processors, causes the one or more processors to determine a current path signature for a device moving within an environment, compare the current path signature with a stored reference path signature corresponding to a location of interest (LOI) within the environment, and if it is determined that the current path signature corresponds to the stored reference path signature, determine the location of the device to be the same as a location of the LOI within the environment.
G01C 21/20 - Instruments for performing navigational calculations
G01C 21/16 - Navigation; Navigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigated; Dead reckoning by integrating acceleration or speed, i.e. inertial navigation
A method for creating a secure channel between devices for secure communication therebetween. The method comprises transmitting a first nonce from an initiator device to a responder device; receiving, at the initiator device, a second nonce and an identity of the responder device; transmitting an identity of the initiator device and a first set of one or more encrypted data objects from the initiator device to the responder device; receiving, at the initiator device, a second set of one or more encrypted data objects from the responder device; and generating, at the initiator device, a session key for secure communication between the initiator and responder devices.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
A method for offline delegation of authorization to access a secure asset. The method comprises receiving an offline delegation request from a delegating device at a receiving device while the receiving device is not in communication with a server of an authorization management system, the offline delegation request indicating a delegation of authorization from the delegating device to the receiving device for access to a secure asset; after establishing communication with the server, transmitting the offline delegation request from the receiving device to the server; and receiving, at the receiving device, authorization data from the server in exchange for the offline delegation request, the authorization data permitting access to the secure asset by the receiving device; wherein the offline delegation request comprises an identity of the receiving device or user of the receiving device and is digitally signed by the delegating device.
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
69.
CONTROL ARRANGEMENT FOR ACCESS MEMBER, AND ACCESS MEMBER SYSTEM
A control arrangement (20) for controlling movements of an access member (14), the control arrangement comprising a base structure (22); a drive member (32) rotatable about a rotation axis (28); an input member (38) arranged to be driven along an actuation axis (40) by rotation of the drive member, and arranged to move in a lateral direction (74, 76); an output member (50) arranged to be driven by the input member along the actuation axis; an electromagnetic generator (58) arranged to be driven by movement of the output member along the actuation axis to generate electric energy; and a force transmitting arrangement (42, 52; 116) arranged to transmit a relative movement between the input member and the output member along the actuation axis to a movement of the input member in the lateral direction towards the base structure for frictional braking between the input member and the base structure.
A method for offline delegation of authorization to access a secure asset. The method comprises receiving an offline delegation request from a delegating device at a receiving device while the receiving device is not in communication with a server of an authorization management system, the offline delegation request indicating a delegation of authorization from the delegating device to the receiving device for access to a secure asset; after establishing communication with the server, transmitting the offline delegation request from the receiving device to the server; and receiving, at the receiving device, authorization data from the server in exchange for the offline delegation request, the authorization data permitting access to the secure asset by the receiving device; wherein the offline delegation request comprises an identity of the receiving device or user of the receiving device and is digitally signed by the delegating device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A method for creating a secure channel between devices for secure communication therebetween. The method comprises transmitting a first nonce from an initiator device to a responder device; receiving, at the initiator device, a second nonce and an identity of the responder device; transmitting an identity of the initiator device and a first set of one or more encrypted data objects from the initiator device to the responder device; receiving, at the initiator device, a second set of one or more encrypted data objects from the responder device; and generating, at the initiator device, a session key for secure communication between the initiator and responder devices.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
It is provided it is provided a keypad comprising: a voltage bus configured to distribute power in the keypad; and a plurality of keys; a plurality of row key connections; and a plurality of column key connections; A wake-up signal causes a microcontroller to transition from a low-power state to an active state such that the microcontroller can detect which one of the plurality of keys was actuated. Each key is connected to a single row key connection and a single column key connection. Each row key connection and/or each column key connection is provided with a respective port circuit that is configured to connect the key connection with keys of the keypad when the wake-up signal is activated. Each port circuit comprises a respective port switch that is turned off in the low-power state to disconnect the column key connections/row key connections from the keys of the keypad.
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electric, electronic and electromechanical locks and lock
goods, also including electronic lock cylinders, electric
striking plates, door magnets, electronic keys, key cards,
also including electronic or magnetic access control cards
and smart cards, and key card readers, also including
electronic or magnetic access control card readers and smart
card readers; units for programming locks, lock cylinders,
keys, key cards, key card readers and safes; computer
software for managing and operating minibars; electric and
electronic panels for doors, gates, barriers and windows;
electronic and magnetic sensors; closed circuit television
systems and devices (CCTV); electric, electronic and
electromechanical access control apparatus and systems;
security or alarm apparatus and systems; apparatus and
systems for providing identification and authentication data
for near field communication (NFC) tags, digital keys and
identity data; apparatus and systems for implementing access
control functionality for identity verification and access
or denial of access to digital data, physical premises or
computer networks; apparatus and monitoring systems for
managing mini bars and energy consumption in hotels, homes,
companies, public establishments; apparatus and instruments
for recording, monitoring, signalling and checking, also
including checking and/or controlling people's movement
within, entrance to and exit from buildings and through
doors, gates, barriers and/or for use with locks; system for
connecting and remotely controlling entrance installations
including docking equipment; magnetic and electronic
identity cards; magnetic data carriers and computer
software. Design and development of computers, computer systems,
computer software, technology solutions, mobile and web
applications in the field of access control and security,
including secure identity solutions; design and development
of apparatus and instruments in the field of access control
and security; consultancy and information regarding the
aforesaid services; architectural and engineering services
relating to doors, barriers, gates, loading dock
superstructures and related parts and components;
consultancy services relating to the design of doors,
barriers, gates, loading superstructures and associated
parts and components; data lifecycle management (for
others), namely the issuance, authentication and revocation
of digital signatures and digital rights for physical and
logical access control systems and secure identity
solutions; consultancy services regarding energy efficiency
in buildings.
77.
NEAR-FIELD WITH FAR-FIELD TO VERIFY THAT DEVICE IS CONNECTED OR SECURED
The present disclosure relates to a method to check if a connector system with a Connector Position Assurance (“CPA”) member is in a closed position. The method includes providing an RFID-tag reader that is positioned at a distance D to the integrated circuit enabling far-field RFID communication and not permitting near-field RFID communication. Further, the method includes checking the readability of the integrated circuit with the RFID-tag reader and issuing an alert signal if the integrated circuit is not readable by the RFID-tag reader indicating that the CPA member is not in the closed position.
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
An actuating device (12) comprising an actuating element (14); an electric generator (16); and an electromechanical coupling device (18) configured to adopt a decoupled state, for decoupling the actuating element (14) from a locking member (22), and a coupled state, for coupling the actuating element (14) to the locking member (22); wherein the coupling device (18) comprises a blocker (26), a holder (38) and a release mechanism (40); wherein the holder (38) is arranged to adopt a holding position, in which the holder (38) holds the blocker (26), when the coupling device (18) adopts the coupled state; wherein the holder (38) is arranged to adopt a released position, in which the holder (38) does not hold the blocker (26), when the coupling device (18) adopts the decoupled state; and wherein the release mechanism (40) is arranged to mechanically force the holder (38) from the holding position to the released position by manual rotation of the actuating element (14) about the actuating axis (20).
Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess. A freewheel mechanism and assemblies for an electronic locking system are also provided.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Physical access control systems and devices; logical access
control systems and devices; data processing readers,
scanners, and apparatus for reading, scanning, verifying,
authenticating, and processing credential and identity data;
bar code readers, scanners, and apparatus for reading and/or
scanning bar codes; optical character readers, scanners, and
apparatus for optical character recognition; fixed scanners;
airport boarding pass readers; magnetic and smart payment
card readers and scanners; biometric readers; readers used
for anti-counterfeiting purposes; photo identification
readers; electronic data input or entry apparatus,
instruments, and machines; electronic data capture
apparatus, instruments, and machines; RFID, NFC, and QR code
readers and controllers; RFID, NFC, and QR code systems and
their individual components, including RFID, NFC, and QR
credentials in the nature of digital and electronic
components, readers, scanners, and computer system apparatus
for communicating with the credentials, and programs for
programming the RFID, NFC, and QR credentials, including
wherein the credentials are in the form of digital and
electronic cards, fobs, or tags; electronic card readers;
reading devices used to read data from optical security
media; magnetic and smart card readers and their components;
contact smart chips; hardware, software, and firmware for
networking and interfacing readers, writers, and host
computers used in the fields of security, access control,
and identification; computer hardware, software, and
firmware for issuing and managing RFID, NFC, and QR
credentials in the form of electronic and digital cards,
fobs, or tags; computer programs; recorded computer
software; software providing interconnection with other
systems and interfaces for computers; data processing
apparatus; data processing equipment; computer peripheral
devices; computer software for authenticating data and for
use in computer access control; mobile device software for
downloading and implementing access control functionality
for identity verification and access or denial of access to
physical premises; downloadable software and downloadable
applications for storing, managing, and authenticating
identity credentials carried on smart phones, tablets, and
other wireless mobile devices; downloadable software and
downloadable mobile applications for administration and
management of access control devices and systems;
downloadable software and downloadable mobile applications
for use in managing, configuring, upgrading, locating, and
performing diagnostics on readers, controllers, and other
access control devices. Technological consultancy in the field of computers;
computer programming services; computer and software rental
services; provision of maintenance services for computer
software; services updating of computer software; providing
temporary use of online non-downloadable computer software
for the search and retrieval of information from a computer
database; research and development services; scientific and
technological services and research and design relating
thereto; design and development of computer hardware and
software; design and development of RFID, NFC, and QR code
systems; computer system and software design; installation
and maintenance of computer software; database services,
namely, maintaining databases, database design and
development, rental of database management software, and/or
rental of computer database software; technical computer
services; customization of computer software; software as a
service (saas) and providing temporary use of
non-downloadable software for managing and authenticating
government credentials, driver's licenses, national
identification cards, passports, and other identity
credentials carried in tangible form and on fobs, cards,
smart phones, tablets, and other wireless mobile devices;
providing temporary use of web-based software applications
and on-line non-downloadable software for use in managing,
configuring, and performing diagnostics on readers,
controllers, fobs, cards, and other access control devices
and systems; cloud computing and software as a service
(saas) services featuring software for use in managing,
configuring, and performing diagnostics on readers,
controllers, fobs, cards, and other access control devices
and systems; software as a service (saas) services featuring
software for monitoring and provisioning of physical access
control of premises; access control services, namely,
providing temporary use of on-line non-downloadable software
for monitoring, providing, and restricting physical access
to premises.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Physical access control systems and devices; logical access
control systems and devices; data processing readers,
scanners, and apparatus for reading, scanning, verifying,
authenticating, and processing credential and identity data;
bar code readers, scanners, and apparatus for reading and/or
scanning bar codes; optical character readers, scanners, and
apparatus for optical character recognition; fixed scanners;
airport boarding pass readers; magnetic and EMV readers and
scanners; biometric readers; readers used for
anti-counterfeiting purposes; photo identification readers;
electronic data input or entry apparatus, instruments, and
machines; electronic data capture apparatus, instruments,
and machines; RFID, NFC, and QR code readers and
controllers; RFID, NFC, and QR code systems and their
individual components; electronic card readers; reading
devices used to read data from optical security media;
magnetic and smartcard readers and their components; contact
smart chips; hardware, software, and firmware for networking
and interfacing readers, writers, and host computers used in
the fields of security, access control, and identification;
computer programs; recorded computer software; software
providing interconnection with other systems and interfaces
for computers; data processing apparatus; data processing
equipment; computer peripheral devices; computer software
for authenticating data and for use in computer access
control; mobile device software for downloading and
implementing access control functionality for identity
verification and access or denial of access to physical
premises; downloadable software and downloadable
applications for storing, managing, and authenticating
identity credentials carried on smart phones, tablets, and
other wireless mobile devices; downloadable software and
downloadable mobile applications for administration and
management of access control devices and systems;
downloadable software and downloadable mobile applications
for use in managing, configuring, upgrading, locating, and
performing diagnostics on readers, controllers, and other
access control devices. Professional consultancy in the field of computers; computer
programming services; computer and software rental services;
provision of maintenance services for computer software;
services updating of computer software; providing the use of
online computer software for the search and retrieval of
information from a computer database; research and
development services relating to physical and logical access
control systems and devices, apparatus for reading,
scanning, verifying, authenticating, and processing
credential and identity data, apparatus for optical
character recognition, and apparatus for reading and/or
scanning bar codes, magnetic and smart payment cards, and
radio-frequency identification, and near-field communication
apparatus; scientific and technological services and
research and design relating thereto; design and development
of computer hardware and software; design and development of
RFID, NFC, and QR code systems; computer system and software
design; installation and maintenance of computer software;
database services, namely, maintaining databases, database
design and development, rental of database management
software, and/or rental of computer database software;
technical computer services, namely, information technology
[IT] services, computer hardware, software and peripherals
design and technical consultancy, and computer programming
and customisation services; customization of computer
software; software as a service (SaaS) and providing
temporary use of non-downloadable software for managing and
authenticating government credentials, driver's licenses,
national identification cards, passports, and other identity
credentials carried in tangible form and on smart phones,
tablets, and other wireless mobile devices; providing
temporary use of web-based software applications and on-line
non-downloadable software for use in managing, configuring,
and performing diagnostics on readers, controllers, and
other access control devices and systems; cloud computing
and software as a service (SaaS) services featuring software
for use in managing, configuring, and performing diagnostics
on readers, controllers, and other access control devices
and systems; software as a service (SaaS) services featuring
software for monitoring and provisioning of physical access
control of premises; access control services namely,
providing the temporary use of on-line non-downloadable
software for monitoring, providing, and restricting physical
access to premises.
82.
MATCHING AN USER TAKEN IMAGE WITH ACCESS CONTROL APPARATUS REFERENCES FOR PHYSICAL ACCESS CONTROL
It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.
Methods and systems are provided for performing operations comprising: receiving, by a credential gateway from a client device, a request to obtain a digital credential for accessing a secure resource, the credential gateway being configured to coordinate an exchange of digital credentials associated with different secure resource types with a plurality of client devices; communicating the request to a server associated with the secure resource; receiving, by the credential gateway from the server associated with the secure resource, a data object that includes the digital credential; selecting, by the credential gateway, based on the data object, a security protocol from a plurality of security protocols; and providing, by the credential gateway, the digital credential to the client device in accordance with the selected security protocol.
An RFID assembly that includes both a UHF patch antenna and an HF or LF loop antenna is provided. The patch antenna and the loop antenna are arranged inside a housing in such a manner that the loop antenna partially overlaps an end portion of the patch antenna, thereby forming an extension of the patch antenna. In this manner, a performance of the UHF patch antenna can be maintained despite decreasing the size of the same, while an interference between the patch antenna and the loop antenna can be suppressed, in particular, by providing a gap between the same.
An arrangement 20a-20c) for closing an access member (14) rotatable relative to a frame (12), the arrangement comprising a frame part (30) for fixation to the frame; an access member part (32) for fixation to the access member, the access member part being rotatable relative to the frame part about a hinge axis (16) between a closed position (18) and an open position (24); a mechanical force device (40, 92) configured to store mechanical energy from an opening movement (26) of the access member part from the closed position to the open position, and configured to release the stored mechanical energy to a closing movement (28) of the access member part from the open position to the closed position; an electromagnetic generator (48) arranged to be driven by the closing movement to generate electric energy; and a freewheel (58) arranged to disengage during the opening movement and to engage during the closing movement to drive the generator.
An arrangement (18) for closing an access member (14) rotatable relative to a frame (12), the arrangement comprising a frame part (20) for fixation to the frame; an access member part (22) for fixation to the access member, the access member part being movable relative to the frame part between a closed position (26) and an open position (34); a movable element (24) movable between a first position (28) and a second position (36) relative to the frame part; a forcing device (52) arranged to force the movable element from the second position to the first position; and a cam transmission (42) comprising a cam profile (44) and a cam follower (46) arranged to follow the cam profile, the cam transmission being configured to transmit a movement of the movable element from the second position to the first position to a movement of the access member part from the open position to the closed position.
Disclosed herein are systems and methods for dynamic, power-efficiency -based cryptographic-protocol negotiation with Internet of Things (loT) devices. In an embodiment, a computer system (e.g., an identity-management system) receives, from an loT device, a device-side authentication-initiation message containing a unique device identifier of the loT device. The computer system uses the unique device identifier of the loT device to identity, from a stored power-efficiency reference table, a suitable cryptographic security protocol for the loT device. The computer system transmits, to the loT device, a server-side authentication-initiation message containing an indication of the identified protocol, and the computer system authenticates the loT device according to the identified protocol.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Physical access control systems and devices; logical access control systems and devices; data processing readers, scanners, printers, and apparatus for reading, scanning, verifying, authenticating, and processing credential and identity data; fixed readers, scanners, and printers; photo identification readers used in connection with identify verification, access control, data authentication, and credentials management; readers, scanners, and printers used for government credentials, driver's licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; biometric readers, scanners, printers, and locks; fingerprint readers, scanners, printers, and locks; airport boarding pass readers; bar code readers, scanners, printers, and apparatus for reading and/or scanning bar codes; optical character readers, scanners, printers, and apparatus for optical character recognition; magnetic and smart payment card readers and scanners; readers used for anti-counterfeiting purposes in the nature of electronic data input or data capture apparatus, instruments, and machines; electronic data input or entry apparatus, instruments, and machines; electronic data capture apparatus, instruments, and machines; radio-frequency identification, near-field communication, and matrix bar code readers and controllers; radio-frequency identification, near-field communication, and matrix bar code systems and their individual components; electronic card readers; reading devices used to read data from optical security media in connection with identify verification, access control, data authentication, and credentials management; magnetic and smartcard readers and their components; electronic chips; hardware, software, and firmware for networking and interfacing readers, writers, and host computers used in the fields of security, access control, and identification; computer programs; recorded computer software; software providing interconnection with other systems and interfaces for computers; data processing apparatus; data processing equipment; computer peripheral devices; computer software for authenticating data and for use in computer access control; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to physical premises; downloadable software and downloadable applications for storing, managing, and authenticating identity credentials carried on smart phones, tablets, and other wireless mobile devices; downloadable software and downloadable mobile applications for administration and management of access control devices and systems; downloadable software and downloadable mobile applications for use in managing, configuring, upgrading, locating, and performing diagnostics on readers, scanners, printers, and other access control devices and systems. (1) Professional consultancy in the field of computers; computer programming services; computer and software rental services; provision of maintenance services for computer software; services updating of computer software; providing the use of online computer software for the search and retrieval of information from a computer database; product research and development services; scientific and technological services and research and design relating thereto; design and development of computer hardware and software; design and development of radio-frequency identification, near-field communication, and matrix bar code systems; computer system and software design; installation and maintenance of computer software; database services, namely, maintaining databases, database design and development, rental of database management software, and/or rental of computer database software; technical computer services; customization of computer software; software as a service (saas) and providing temporary use of non-downloadable software for managing and authenticating government credentials, driver's licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; providing temporary use of web-based software applications and on-line non-downloadable software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; cloud computing and software as a service (saas) services featuring software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; software as a service (saas) services featuring software for monitoring and providing of physical access control of premises; access control services namely, providing the temporary use of on-line non-downloadable software for monitoring, providing, and restricting physical access to premises.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Physical access control systems and devices; logical access control systems and devices; data processing readers, scanners, printers, and apparatus for reading, scanning, verifying, authenticating, and processing credential and identity data; fixed readers, scanners, and printers; photo identification readers used in connection with identify verification, access control, data authentication, and credentials management; readers, scanners, and printers used for government credentials, driver's licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; biometric readers, scanners, printers, and locks; fingerprint readers, scanners, printers, and locks; airport boarding pass readers; bar code readers, scanners, printers, and apparatus for reading and/or scanning bar codes; optical character readers, scanners, printers, and apparatus for optical character recognition; magnetic and smart payment card readers and scanners; readers used for anti-counterfeiting purposes in the nature of electronic data input or data capture apparatus, instruments, and machines; electronic data input or entry apparatus, instruments, and machines; electronic data capture apparatus, instruments, and machines; radio-frequency identification, near-field communication, and matrix bar code readers and controllers; radio-frequency identification, near-field communication, and matrix bar code systems and their individual components; electronic card readers; reading devices used to read data from optical security media in connection with identify verification, access control, data authentication, and credentials management; magnetic and smartcard readers and their components; electronic chips; hardware, software, and firmware for networking and interfacing readers, writers, and host computers used in the fields of security, access control, and identification; computer programs; recorded computer software; software providing interconnection with other systems and interfaces for computers; data processing apparatus; data processing equipment; computer peripheral devices; computer software for authenticating data and for use in computer access control; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to physical premises; downloadable software and downloadable applications for storing, managing, and authenticating identity credentials carried on smart phones, tablets, and other wireless mobile devices; downloadable software and downloadable mobile applications for administration and management of access control devices and systems; downloadable software and downloadable mobile applications for use in managing, configuring, upgrading, locating, and performing diagnostics on readers, scanners, printers, and other access control devices and systems Professional consultancy in the field of computers; computer programming services; computer and software rental services; provision of maintenance services for computer software; services updating of computer software; providing the use of online computer software for the search and retrieval of information from a computer database; product research and development services; scientific and technological services and research and design relating thereto; design and development of computer hardware and software; design and development of radio-frequency identification, near-field communication, and matrix bar code systems; computer system and software design; installation and maintenance of computer software; database services, namely, maintaining databases, database design and development, rental of database management software, and/or rental of computer database software; technical computer services; customization of computer software; software as a service (saas) and providing temporary use of non-downloadable software for managing and authenticating government credentials, driver's licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; providing temporary use of web-based software applications and on-line non-downloadable software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; cloud computing and software as a service (saas) services featuring software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; software as a service (saas) services featuring software for monitoring and providing of physical access control of premises; access control services, namely, providing the temporary use of on-line non-downloadable software for monitoring, providing, and restricting physical access to premises
90.
DETECTING PEOPLE USING A PEOPLE DETECTOR PROVIDED BY A DOORWAY
It is provided a method for detecting people, the method being performed by a people detector provided by a doorway. The method comprises the steps of: receiving an open signal indicating that a door of the doorway is open; setting a people sensor of the people detector in an active mode based on receiving the open signal; detecting when a person passes through the doorway, using the people sensor; receiving a closed signal indicating that the door of the doorway is closed; transmitting a result of the step of detecting, wherein the step of transmitting is performed based on receiving the closed signal; and setting the people sensor in a power save mode based on receiving the closed signal.
Techniques for handling and reducing ink overspray of an ink jet printer are provided. In an example, an ink overspray collector for an ink jet printer can include a first opening defining a first print area of the ink jet printer, and a frame about the first opening. The frame is configured to receive overspray from operation of the ink jet printer and can be formed of a woven material. In some examples, a controller of the ink jet printer can reduce an amount of ink ejected near the edges of the print media to reduce overspray.
B41J 2/045 - Ink jet characterised by the jet generation process generating single droplets or particles on demand by pressure, e.g. electromechanical transducers
It is provided a method for configuring a target device. The method comprises the steps of: transmitting a configuration request message to the target device, the configuration request message comprising a configuration request and a request signature, wherein the request signature is based on the configuration request; receiving a configuration response message from the target device, the configuration response message comprising a configuration response and a response signature, wherein the response signature is based on the configuration response and the request signature; verifying the response signature to determine whether the configuration response message is valid, based on the configuration response, the request signature and a public key for the target device; and transmitting a configuration commit message to the target device only when the configuration response message is valid, the configuration commit message comprising a configuration commit indicator and a commit signature.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/133 - Protocols for remote procedure calls [RPC]
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electric, electronic and electromechanical locks and lock
goods, also including electronic lock cylinders, electric
striking plates, door magnets, electronic keys, key cards,
also including electronic or magnetic access control cards
and smart cards, and key card readers, also including
electronic or magnetic access control card readers and smart
card readers; units for programming locks, lock cylinders,
keys, key cards, key card readers and safes; computer
software for managing and operating minibars; electric and
electronic panels for doors, gates, barriers and windows;
electronic and magnetic sensors; closed circuit television
systems and devices (CCTV); electric, electronic and
electromechanical access control apparatus and systems;
security or alarm apparatus and systems; apparatus and
systems for providing identification and authentication data
for near field communication (NFC) tags, digital keys and
identity data; apparatus and systems for implementing access
control functionality for identity verification and access
or denial of access to digital data, physical premises or
computer networks; apparatus and systems for managing mini
bars and energy consumption in hotels, homes, companies,
public establishments; apparatus and instruments for
recording, monitoring, signalling and checking, also
including checking and/or controlling people's movement
within, entrance to and exit from buildings and through
doors, gates, barriers and/or for use with locks; system for
connecting and remotely controlling entrance installations
including docking equipment; magnetic and electronic
identity cards; magnetic data carriers and computer
software. Design and development of computers, computer systems,
computer software, technology solutions, mobile and web
applications in the field of access control and security,
including secure identity solutions; design and development
of apparatus and instruments in the field of access control
and security; consultancy and information regarding the
aforesaid services; architectural and engineering services
relating to doors, barriers, gates, loading dock
superstructures and related parts and components;
consultancy services relating to the design of doors,
barriers, gates, loading superstructures and associated
parts and components; data lifecycle management (for
others), namely the issuance, authentication and revocation
of digital signatures and digital rights for physical and
logical access control systems and secure identity
solutions; consultancy services regarding energy efficiency
in buildings.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electric, electronic and electromechanical locks and lock
goods, also including electronic lock cylinders, electric
striking plates, door magnets, electronic keys, key cards,
also including electronic or magnetic access control cards
and smart cards, and key card readers, also including
electronic or magnetic access control card readers and smart
card readers; units for programming locks, lock cylinders,
keys, key cards, key card readers and safes; computer
software for managing and operating minibars; electric and
electronic panels for doors, gates, barriers and windows;
electronic and magnetic sensors; Closed circuit television
systems and devices (CCTV); electric, electronic and
electromechanical access control apparatus and systems;
security or alarm apparatus and systems; apparatus and
systems for providing identification and authentication data
for near field communication (NFC) tags, digital keys and
identity data; apparatus and systems for implementing access
control functionality for identity verification and access
or denial of access to digital data, physical premises or
computer networks; apparatus and systems for managing mini
bars and energy consumption in hotels, homes, companies,
public establishments; apparatus and instruments for
recording, monitoring, signalling and checking, also
including checking and/or controlling people's movement
within, entrance to and exit from buildings and through
doors, gates, barriers and/or for use with locks; system for
connecting and remotely controlling entrance installations
including docking equipment; magnetic and electronic
identity cards; magnetic data carriers and computer
software. Design and development of computers, computer systems,
computer software, technology solutions, mobile and web
applications in the field of access control and security,
including secure identity solutions; design and development
of apparatus and instruments in the field of access control
and security; consultancy and information regarding the
aforesaid services; architectural and engineering services
relating to doors, barriers, gates, loading dock
superstructures and related parts and components;
consultancy services relating to the design of doors,
barriers, gates, loading superstructures and associated
parts and components; data lifecycle management (for
others), namely the issuance, authentication and revocation
of digital signatures and digital rights for physical and
logical access control systems and secure identity
solutions; consultancy services regarding energy efficiency
in buildings.
95.
METHODS & PROCESSES TO SECURELY UPDATE SECURE ELEMENTS
This disclosure describes techniques for updating firmware of a secure element. The techniques include operations comprising: receiving, by a gateway device, from a remote source, a firmware file; receiving, by a processing element implemented on the gateway device, ephemeral session specific key material for a first secure element implemented on the gateway device; dividing the firmware file into a plurality of data chunks; applying, by the processing element, the ephemeral session specific key material to a first data chunk of the plurality of data chunks to generate a first data packet; and sending, by the processing element, the first data packet to the first secure element.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
It is provided a method for controlling camera-based supervision of a physical space. The method is performed in a supervision controller and comprises the steps of: determining that a person enters the physical space; deactivating camera-based supervision of the physical space based on the person entering the physical space, by turning off a video feed of the camera-based supervision; determining that a person exits the physical space; and activating camera-based supervision of the physical space based on the person exiting the physical space.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
97.
RELAY ATTACK DETECTION FOR INTERFACES USING COMMAND-RESPONSE PAIR
A reader device of an access control system comprises physical layer circuitry and processing circuitry. The processing circuitry is operatively coupled to the physical layer circuitry and is configured to initiate transmission of a command to a credential device; determine a time duration from sending the command to the credential device to receiving a response to the command from the credential device; and generate an indication when the time duration exceeds a relay attack detection threshold time duration.
It is provided a method for providing a credential for use with an electronic lock (7) to access to restricted physical space (16). The method comprises: receiving (40) a credential that unlocks the electronic lock (7); generating (42) a credential identifier associated with the credential; sending (44) the credential identifier to an EAC (5); receiving (46), from an electronic wallet provider (6), a request for the credential, wherein the request comprises the credential identifier; packaging (48) the credential, resulting in packaged credential, wherein the packaging complies with a format, selected from a plurality of formats for different electronic wallet providers, corresponding to the electronic wallet provider from which the request is received, enabling the credential to be provided to an electronic wallet in a user device (2) for unlocking the electronic lock (7); and sending (50) the packaged credential to the electronic wallet provider (6).
The present disclosure refers to an RFID device (1) and a method of manufacturing a main antenna (10) of an RFID device (1). The RFID devices (1) comprises a substrate (5), a main antenna (10) embedded in the substrate (5), and a chip module (15) including an integrated circuit (16) and a chip antenna (20) electrically connected to the integrated circuit (16). The main antenna (10) is inductively coupled to the chip antenna (20) and formed by multiple single-strand wires (25) extending adjacent to each other.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
D06H 1/04 - Marking textile materials; Marking in combination with metering or inspecting by attaching threads, tags, or the like
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H01Q 1/22 - Supports; Mounting means by structural association with other equipment or articles
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Physical access control systems and devices; logical access control systems and devices; data processing readers, scanners, printers, and apparatus for reading, scanning, verifying, authenticating, and processing credential and identity data; fixed readers, scanners, and printers; Photo identification readers used in connection with identify verification, access control, data authentication, and credentials management; readers, scanners, and printers used for government credentials, driver’s licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; biometric readers, scanners, printers, and locks; fingerprint readers, scanners, printers, and locks; airport boarding pass readers; bar code readers, scanners, printers, and apparatus for reading and/or scanning bar codes; optical character readers, scanners, printers, and apparatus for optical character recognition; magnetic and smart payment card readers and scanners; Readers used for anti-counterfeiting purposes in the nature of electronic data input or data capture apparatus, instruments, and machines; electronic data input or entry apparatus, instruments, and machines; electronic data capture apparatus, instruments, and machines; radio-frequency identification, near-field communication, and matrix bar code readers and controllers; radio-frequency identification, near-field communication, and matrix bar code systems and their individual components; electronic card readers; rReading devices used to read data from optical security media in connection with identify verification, access control, data authentication, and credentials management; magnetic and smartcard readers and their components; electronic chips; hardware, software, and firmware for networking and interfacing readers, writers, and host computers used in the fields of security, access control, and identification; computer programs; recorded computer software; software providing interconnection with other systems and interfaces for computers; data processing apparatus; data processing equipment; computer peripheral devices; computer software for authenticating data and for use in computer access control; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to physical premises; downloadable software and downloadable applications for storing, managing, and authenticating identity credentials carried on smart phones, tablets, and other wireless mobile devices; downloadable software and downloadable mobile applications for administration and management of access control devices and systems; downloadable software and downloadable mobile applications for use in managing, configuring, upgrading, locating, and performing diagnostics on readers, scanners, printers, and other access control devices and systems. Professional consultancy in the field of computers; computer programming services; computer and software rental services; provision of maintenance services for computer software; services updating of computer software; providing the use of online computer software for the search and retrieval of information from a computer database; research and development services; scientific and technological services and research and design relating thereto; design and development of computer hardware and software; design and development of radio-frequency identification, near-field communication, and matrix bar code systems; computer system and software design; installation and maintenance of computer software; database services, namely, maintaining databases, database design and development, rental of database management software, and/or rental of computer database software; technical computer services; customization of computer software; software as a service (saas) and providing temporary use of non-downloadable software for managing and authenticating government credentials, driver’s licenses, national identification cards, passports, tickets, frequent flier materials, credit cards, and other identity credentials carried in tangible form and on smart phones, tablets, and other wireless mobile devices; providing temporary use of web-based software applications and on-line non-downloadable software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; cloud computing and software as a service (saas) services featuring software for use in managing, configuring, and performing diagnostics on readers, scanners, printers, and other access control devices and systems; software as a service (saas) services featuring software for monitoring and providing of physical access control of premises; access control services namely, providing the temporary use of on-line non-downloadable software for monitoring, providing, and restricting physical access to premises.