A method, access control system, and readers for use in an access control system are described. One example of the disclosed method providers the ability to securely augment an existing physical access control system that relies on access control tokens (e.g., credentials) with a secure mobile-based solution allowing the secure local offline exchange of a new access control token for another that can be used with the existing installed access control system.
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An RFID device (10) is provided. The RFID device (10) includes a first loop antenna (14) embedded in a device body (12), and a second loop antenna (16) embedded in the device body (12). The first loop antenna (14) and the second loop antenna (16) partially overlap each other by a set distance (d). This results in a suppression of a cross-coupling between the first loop antenna (14) and the second loop antenna (16), and allows for an optimum use of the space that is available for the antennas on the device body (12). In this manner, a reliable operation of the two antennas within desired communication ranges can be obtained.
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility. receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
G06Q 10/1093 - Calendar-based scheduling for persons or groups
G07C 9/00 - Individual registration on entry or exit
G07C 9/10 - Movable barriers with registering means
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
H04W 4/02 - Services making use of location information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
It is provided a method for providing a privacy-enhanced delegated access right to unlock a physical lock. The method comprises: obtaining a derivation scalar; receiving a cryptographically signed delegation from the delegator device, the delegation being a data object comprising a public key of the delegator device, a public key of the physical lock, and a derived public key for the delegatee device, and wherein the delegation is cryptographically signed using a secret key that is paired with the public key of the delegator device; obtaining a source secret key for the delegatee device, the source secret key being paired with the source public key; calculating a derived secret key for the delegatee device using the source secret key for the delegatee device and the derivation scalar; providing the delegation to the physical lock; and authenticating the delegatee device with the physical lock using the derived secret key.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
5.
PROVIDING A CREDENTIAL FOR USE WITH AN ELECTRONIC LOCK
It is provided a method for providing a credential for use with an electronic lock (7) to access to restricted physical space (16). The method comprises: receiving (40) a credential that unlocks the electronic lock (7); generating (42) a credential identifier associated with the credential; sending (44) the credential identifier to an EAC (5); receiving (46), from an electronic wallet provider (6), a request for the credential, wherein the request comprises the credential identifier; packaging (48) the credential, resulting in packaged credential, wherein the packaging complies with a format, selected from a plurality of formats for different electronic wallet providers, corresponding to the electronic wallet provider from which the request is received, enabling the credential to be provided to an electronic wallet in a user device (2) for unlocking the electronic lock (7); and sending (50) the packaged credential to the electronic wallet provider (6).
The present disclosure refers to a battery module (10), a main module (20) and a modular RFID reader (30). The battery module (10) is configured to be releasably connected to the main module (20) such that when connected the battery module (10) and the main module (20) together form an RFID reader (30) attachable to a fuel dispensing nozzle (50). The battery module (10) comprises a first antenna (12), a battery control circuitry (13), a battery cell (11), a first electrical connector (70) and a battery case (15). The main module comprises a second antenna (22), a main control circuitry (23), a second electrical connector (71) and a main case (25). The modular RFID reader (30) comprises multiple battery modules (10), a main module (20) and a connecting means such as bolts (6) configured to connect one of the multiple battery modules (10) with the main module (20). Each of the multiple battery modules (10) is individually connectable to the main module (20) to form an RFID reader (30).
G07F 13/02 - Coin-freed apparatus for controlling dispensing of fluids, semiliquids or granular material from reservoirs by volume
G06F 3/08 - Digital input from, or digital output to, record carriers from or to individual record carriers, e.g. punched card
B67D 7/14 - Arrangements of devices for controlling, indicating, metering or registering quantity or price of liquid transferred responsive to input of recorded programmed information, e.g. on punched cards
B67D 7/34 - Means for preventing unauthorised delivery of liquid
7.
CONTROLLING A SLIDING DOOR COMPRISING A FIRST DOOR LEAF AND A SECOND DOOR LEAF
It is provided a method for controlling a sliding door comprising a first door leaf and a second door leaf. The method is performed by a door controller. The method comprises: determining a position of a person approaching sliding door, in relation to the sliding door; predicting an entry position, where the person is expected to enter through the sliding door, based on the position; determining a near door leaf, being the door leaf, of the first door leaf and the second door leaf, whose centre point, in a horizontal plane, is closer to the predicted entry position, and a far door leaf being the other door leaf, of the first door leaf and the second door leaf; and opening the sliding door asymmetrically, such that a near door leaf opens more than the far door leaf.
A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.
It is provided a method for enabling access, using a temporary passcode (25. 25a-f), to a physical space (16) secured by an electronic lock (12). The method is performed in a passcode provider (1). The method comprises: synchronising (40) with the electronic lock (12) to align times for temporary passcode generation: receiving (42) a signal to provide a temporary passcode for unlocking the electronic lock: determining (44) a temporary passcode, the temporary passcode being valid only until an end time at the electronic lock (12); and providing (46) the temporary passcode for forwarding to a temporary passcode recipient.
A verifier device for an access control system includes physical layer circuitry configured to transmit and receive radio frequency (RF) electrical signals; processing circuitry operatively coupled to the physical layer circuitry and including at least one hardware processor; and a memory. The memory stores instructions that cause the at least one hardware processor to perform operations including: decoding credential information included in a received RF signal; determining an RF fingerprint of the received RF signal, wherein the RF fingerprint includes one or more RF signal parameters determined for the received RF signal; authenticating the credential information and the RF fingerprint; and initiating access to a physical access portal in response to authentication of the credential information and the RF fingerprint.
An electronic lock for controlling access to a restricted physical space. The electronic lock comprises: electronically-controllable lock hardware; and a system-on-chip, SoC, comprising a processor and memory. The SoC comprises: a trusted environment comprising a secure data storage and a lock-core software module comprising instructions that, when executed by the processor, cause the electronic lock to: evaluate access for a user based on data stored in the secure data storage and control the lock hardware based on the evaluation; and an untrusted environment comprising untrusted software that is prevented from bypassing the lock-core software module to control the electronically-controllable lock hardware.
Systems and techniques for a are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.
G06Q 10/1093 - Calendar-based scheduling for persons or groups
G07C 9/00 - Individual registration on entry or exit
G07C 9/10 - Movable barriers with registering means
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
H04W 4/02 - Services making use of location information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
Still further a System is provided comprising a device (D) and an App stored on the device (D) which is adapted to carry out the method.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially
adapted parts therefor; door and window locksets of metal;
metal push button locks; metal door locks; metal mortise
cylinders; metal mortise locksets; metal multi-point locks;
metal nightlatch locks; metal rim locks; metal rim
cylinders; metal deadbolts; deadlocks of metal for doors,
and specially adapted parts therefor; metal padlocks;
padlocks and specially adapted parts therefor; latchbolts of
metal; metal keys; metal key blanks; tumbler key cylinders
of metal; metal tubular locksets; metal master key systems
consisting of interchangeable core lock cylinders and master
keys of metal; non-electric metal door closers; non-electric
metal door openers; emergency and panic devices for doors
and windows of metal being door and window latching axels,
bars and mounting bridges incorporating a release latch in
the event of an emergency; emergency and panic devices,
namely, metal mechanical exit devices; emergency and panic
devices, namely, mechanical exit pushbars of metal; metal
mechanical door closers; exit push bars and exit door trim;
metal mortise dead locks; metal exit device trim; metal
cylindrical locksets; metal indicator locks and locksets,
namely, privacy locks with vacant/occupied indicators; kits
for metal indicator locks and locksets comprised of metal
escutcheons, visual occupancy indicators, and back plates;
metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and
operators; hydraulic door controls. Software for controlling and communicating with electronic
lock systems, wired and wireless locking and access control
apparatus, systems and devices; cloud-based lock management
software; software for computers, computer operative
systems, electronic devices, mobile phones in the access
control field for controlling and managing building
environment access and security systems; electric and
electronic locks, electronic keycards, blank smart cards and
RFID (radio-frequency identification) credentials, namely,
cards for radio frequency identification credentials; all of
the aforesaid goods in the field of lock and access control
management solutions for buildings, dwellings, premises and
their facilities; digital door viewer peepholes; electric
and electronic apparatus, namely, electrified and electronic
control systems, namely, electronic control systems for room
locking systems and door locking systems; electrified and
electronic control apparatus being electrified fences and
electrified door handles; electrified and electronic locking
systems being digital locks and electromagnetic locks;
fingerprint door locks, electric and electromechanical door
and window hardware, namely, electronic lock assemblies;
electric, electronic and electromechanical locks and lock
goods, namely, electronic locking mechanisms for doors and
safes; electronic or magnetic access control cards and smart
cards, namely, electronic identification cards,
identification smart cards, encoded magnetic cards, encoded
identity cards, encoded integrated circuit cards; electronic
or magnetic access control card readers, namely, reading
devices for cards incorporating electronic chips, electronic
card readers, card readers for magnetically encoded cards,
magnetic encoded card readers, chip card readers, and smart
card readers; keycards namely, encoded key cards, hotel room
key smart cards; keycard readers, namely, encoded key card
readers; digital and electromagnetic door locks actuated by
a keyboard; electronically controlled window locks and door
locks; electronic keys for doors and windows; electrical and
electronic locking devices being electronic lock assemblies;
door ajar alarm locks; electronic computer keypads; electric
door strikes; magnetic and electronic identity cards; door
access control systems and operators in the nature of
electronic access control systems for doors; door access
control systems and operators, namely, electromechanical
exit devices being digital door locks consisting of
electromechanical door latches and digital door locks that
secure doors and allow for ingress and egress to facilities;
keypad locks; pushbutton keypad locks; capacitive
touchscreen keypad locks; downloadable mobile software
application for computerized management and control of
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices, dry contact-controlled
appliances, environmental control devices; downloadable
mobile software application for computerized management and
control of Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for enabling premises access and
security authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric identification apparatuses;
downloadable software for integration of computer systems,
applications, data, and databases as it relates to physical
premises security, electronic door hardware, electronic
locks, readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software for integration of computer systems, applications,
data, and databases as it relates to dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems;
downloadable mobile software application for physical
premises security access authentication; downloadable
software in the nature of a mobile application for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software in the nature of a mobile application for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; downloadable application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
downloadable application programming interface (API)
software for integration control of IP enabled devices
including dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for displaying, sorting, and sharing
data in the field of access control, facilities management,
and physical premises security. Providing temporary use of non-downloadable on-line software
and applications for managing, locating, activating and
revoking electronic, electromechanical, electric locks,
digital keys, and access rights; design and development of
computers, computer systems, computer software, technology
solutions, and mobile and web applications in the field of
facilities access control; product design and development of
apparatus and instruments in the field of facilities access
control; providing technical information regarding the
aforesaid services; all of the above services in the field
of lock and access control management solutions for
buildings, dwellings, premises and their facilities;
providing temporary use of online, non-downloadable software
for computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices, dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses; providing temporary use
of online, non-downloadable software for computerized
management and control of cameras, fire systems, and
security and surveillance systems and devices; Software as a
Service (SaaS) featuring software and Platform as a Service
(PaaS) featuring computer software platforms, all for
computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices; Software as a Service (SaaS) featuring software and
Platform as a Service (PaaS) featuring computer software
platforms, all for computerized management and control of
dry contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
integration of computer systems, applications, data, and
databases as it relates to physical premises security,
cameras, fire systems; Software as a Service (SaaS)
featuring software and Platform as a Service (PaaS)
featuring computer software platforms, all for integration
of computer systems, applications, data, and databases as it
relates to physical premises security, cameras, fire
systems; providing temporary use of online, non-downloadable
software for enabling premises access and security
authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric and gesture identification apparatuses;
Software as a Service (SaaS) featuring software and Platform
as a Service (PaaS) featuring computer software platforms,
all for enabling premises access and security authentication
by means of encoded security cards, electronic key fobs
being remote control apparatuses, mobile credentials,
electronic personal identification (PIN) pad codes, and
biometric and gesture identification apparatuses; providing
temporary use of online, non-downloadable cloud-based
software for connecting, operating, and managing networked
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable cloud-based software for
connecting, operating, and managing networked dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
physical premises security access authentication; providing
temporary use of online, non-downloadable software for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; providing
temporary use of online, non-downloadable software for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; providing temporary use of
online, non-downloadable software for use in managing
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable software for use in managing dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems, and
security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security; Software as a
Service (SaaS) featuring software and Platform as a Service
(PaaS) featuring computer software platforms, all for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security.
15.
SMART ADAPTIVE POWER SAVING FOR MULTIPLE TECHNOLOGY CREDENTIAL READER
A method and system for adaptive power saving for a multiple technology credential reader may provide improved credential reader power management. The multiple technology credential reader may poll for a first credential type using a first credential radio within the plurality of credential radios. The multiple technology credential reader may discover a first device associated with the first credential type within a radio frequency range of the first credential radio and may cause, responsive to discovering the first device, a second credential radio associated with a second credential type to enter a low power mode. The multiple technology credential reader may determine the first device is positioned within a close proximity threshold range of the multiple technology credential reader, and may authorize a credential access (e.g., physical access, logical access) for the first device responsive to determining the first device is positioned within the close proximity threshold range.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially
adapted parts therefor; door and window locksets of metal;
metal push button locks; metal door locks; metal mortise
cylinders; metal mortise locksets; metal multi-point locks;
metal nightlatch locks; metal rim locks; metal rim
cylinders; metal deadbolts; deadlocks of metal for doors,
and specially adapted parts therefor; metal padlocks; metal
padlocks, other than electronic, and specially adapted parts
therefor; latchbolts of metal; metal keys; metal key blanks;
tumbler key cylinders of metal; metal tubular locksets;
metal master key systems consisting of interchangeable core
lock cylinders and master keys of metal; non-electric metal
door closers; non-electric metal door openers; emergency and
panic devices for doors and windows of metal being door and
window latching axels, bars and mounting bridges
incorporating a release latch in the event of an emergency;
emergency and panic devices, namely, metal mechanical exit
devices; emergency and panic devices, namely, mechanical
exit pushbars of metal; metal mechanical door closers; exit
push bars and exit door trim; metal mortise dead locks;
metal exit device trim; metal cylindrical locksets; metal
indicator locks and locksets, namely, privacy locks with
vacant/occupied indicators; kits for metal indicator locks
and locksets comprised of metal escutcheons, visual
occupancy indicators, and back plates; metal thumbturn
levers. Hydraulic, pneumatic, and electric door closers and
operators; hydraulic door controls. Software for controlling and communicating with electronic
lock systems, wired and wireless locking and access control
apparatus, systems and devices; cloud-based lock management
software; software for computers, computer operative
systems, electronic devices, mobile phones in the access
control field for controlling and managing building
environment access and security systems; electric and
electronic locks, electronic keycards, blank smart cards and
RFID (radio-frequency identification) credentials, namely,
cards for radio frequency identification credentials; all of
the aforesaid goods in the field of lock and access control
management solutions for buildings, dwellings, premises and
their facilities; digital door viewer peepholes; electric
and electronic apparatus, namely, electrified and electronic
control systems, namely, electronic control systems for room
locking systems and door locking systems; electrified and
electronic control apparatus being electrified fences and
electrified door handles; electrified and electronic locking
systems being digital locks and electromagnetic locks;
fingerprint door locks, electric and electromechanical door
and window hardware, namely, electronic lock assemblies;
electric, electronic and electromechanical locks and lock
goods, namely, electronic locking mechanisms for doors and
safes; electronic or magnetic access control cards and smart
cards, namely, electronic identification cards,
identification smart cards, encoded magnetic cards, encoded
identity cards, encoded integrated circuit cards; electronic
or magnetic access control card readers, namely, reading
devices for cards incorporating electronic chips, electronic
card readers, card readers for magnetically encoded cards,
magnetic encoded card readers, chip card readers, and smart
card readers; keycards namely, encoded key cards, hotel room
key smart cards; keycard readers, namely, encoded key card
readers; digital and electromagnetic door locks actuated by
a keyboard; electronically controlled window locks and door
locks; electronic keys for doors and windows; electrical and
electronic locking devices being electronic lock assemblies;
door ajar alarm locks; electronic computer keypads; electric
door strikes; magnetic and electronic identity cards; door
access control systems and operators in the nature of
electronic access control systems for doors; door access
control systems and operators, namely, electromechanical
exit devices being digital door locks consisting of
electromechanical door latches and digital door locks that
secure doors and allow for ingress and egress to facilities;
keypad locks; pushbutton keypad locks; capacitive
touchscreen keypad locks; downloadable mobile software
application for computerized management and control of
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices, dry contact-controlled
appliances, environmental control devices; downloadable
mobile software application for computerized management and
control of Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for enabling premises access and
security authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric identification apparatuses;
downloadable software for integration of computer systems,
applications, data, and databases as it relates to physical
premises security, electronic door hardware, electronic
locks, readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software for integration of computer systems, applications,
data, and databases as it relates to dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems;
downloadable mobile software application for physical
premises security access authentication; downloadable
software in the nature of a mobile application for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software in the nature of a mobile application for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; downloadable application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
downloadable application programming interface (API)
software for integration control of IP enabled devices
including dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for displaying, sorting, and sharing
data in the field of access control, facilities management,
and physical premises security. Providing temporary use of non-downloadable on-line software
and applications for managing, locating, activating and
revoking electronic, electromechanical, electric locks,
digital keys, and access rights; design and development of
computers, computer systems, computer software, technology
solutions, and mobile and web applications in the field of
facilities access control; product design and development of
apparatus and instruments in the field of facilities access
control; providing technical information regarding the
aforesaid services; all of the above services in the field
of lock and access control management solutions for
buildings, dwellings, premises and their facilities;
providing temporary use of online, non-downloadable software
for computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices, dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses; providing temporary use
of online, non-downloadable software for computerized
management and control of cameras, fire systems, and
security and surveillance systems and devices; software as a
service (SaaS) featuring software and platform as a service
(PaaS) featuring computer software platforms, all for
computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices; software as a service (SaaS) featuring software and
platform as a aervice (PaaS) featuring computer software
platforms, all for computerized management and control of
dry contact-controlled appliances, environmental control
devices, Internet of things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
integration of computer systems, applications, data, and
databases as it relates to physical premises security,
cameras, fire systems; software as a service (SaaS)
featuring software and platform as a service (PaaS)
featuring computer software platforms, all for integration
of computer systems, applications, data, and databases as it
relates to physical premises security, cameras, fire
systems; providing temporary use of online, non-downloadable
software for enabling premises access and security
authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric and gesture identification apparatuses;
software as a service (SaaS) featuring software and platform
as a service (PaaS) featuring computer software platforms,
all for enabling premises access and security authentication
by means of encoded security cards, electronic key fobs
being remote control apparatuses, mobile credentials,
electronic personal identification (PIN) pad codes, and
biometric and gesture identification apparatuses; providing
temporary use of online, non-downloadable cloud-based
software for connecting, operating, and managing networked
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable cloud-based software for
connecting, operating, and managing networked dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
physical premises security access authentication; providing
temporary use of online, non-downloadable software for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; providing
temporary use of online, non-downloadable software for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; providing temporary use of
online, non-downloadable software for use in managing
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable software for use in managing dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems, and
security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security; software as a
service (SaaS) featuring software and platform as a service
(PaaS) featuring computer software platforms, all for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security.
An actuating device (12a, 12b, 12c) for a lock device (10) comprising a stationary structure (90) having a credential receiver (40) for receiving a credential input (42) from a user; an actuating element (16) rotatable about an actuation axis (18) relative to the stationary structure by direct manipulation by the user, where the stationary structure is arranged at least partly inside the actuating element; a locking member (24) movable between a locked position (106) and an unlocked position (no); and an electromechanical transfer device (y2a-y2c) arranged, based on the credential input, to adopt a disabled state (104), in which the locking member cannot be moved from the locked position to the unlocked position by rotation of the actuating element, and an enabled state (108) in which the locking member can be moved from the locked position to the unlocked position by rotation of the actuating element; wherein the credential receiver is at least partly arranged radially inside the actuating element with respect to the actuation axis.
Lock device for an electronic locking system, the lock device comprising an input member arranged to rotate about an input rotational axis; an output member arranged to rotate about an output rotational axis; an energy harvesting arrangement configured to generate electric energy from rotation of the input member in a first direction about the input rotational axis; and a selective transfer device movable between a locking state, in which the output member cannot be rotated about the output rotational axis by means of rotation of the input member about the input rotational axis, and an unlocking state, in which the output member can be rotated about the output rotational axis by means of rotation of the input member in the first direction about the input rotational axis; wherein the transfer device is powered by the energy harvesting arrangement. An electronic locking system and a method are also provided.
The present disclosure relates to a reader, such as a reader for a physical access control system. The reader can include first and second antennas, each designed or configured for receiving ultra-wide band (UWB) signals. The reader can also include a mounting plane configured for mounting the reader to a surface. An axis aligning the first and second antennas can be arranged substantially perpendicular relative the mounting plane. A material can be provided between the first and second antennas. The material can have a thickness that defines a distance between the first and second antennas of less than a half wavelength of the UWB signal through air (λA/2), the material configured to slow down electromagnetic waves passing therethrough such that the thickness of the material provides an effective separation distance of the first and second antennas of at least a half wavelength of the UWB signal through air (λA/2).
An arrangement (12) for controlling movements of an access member (16) relative to a frame (14), the arrangement (12) comprising an input element (26) arranged to perform a closing input movement (44) for causing a closing movement (38) of the access member (16); an electromagnetic generator (48) drivingly connected to the input element (26) for generating electric energy by the closing input movement (44); and a brake device (64) arranged to mechanically brake the generator (48) to hold the generator (48) stationary. An access member system (10) comprising the arrangement (12), the access member (16) and the frame (14), is also provided.
An arrangement (12; 12b-12e) for controlling movements of an access member (16) relative to a frame (14), the arrangement comprising an input element (26) arranged to perform a closing input movement (44) for causing a closing movement (38) of the access member; an output element (76a-76c) drivingly connected to the input element; a brake device (64a; 64b) arranged to adopt an active state (33) where the brake device mechanically brakes the output element and holds the brake device stationary, and an inactive state (27) where the brake device does not brake the output element; and a state transmission (11; 11a-11c) arranged to transmit a load (45) acting on the input element to a switching of the brake device from the active state to the inactive state. An access member system (10) comprising the arrangement is also provided.
An arrangement (12) for controlling movements of an access member (16) relative to a frame (14), the arrangement (12) comprising an input element (26); a mechanical closing force device (52) arranged to force the input element (26) to perform an closing input movement (44) to a closed input position (28) for causing a closing movement (38) of the access member (16) to a closed position (20); a mechanical opening force device (64) arranged to assist the input element (26) to perform an opening input movement (40), opposite to the closing input movement (44); and an opening motor (66) arranged to preload the opening force device (64) while the input element (26) is in the closed input position (28). An access member system (10) comprising an arrangement (12), an access member (16) and a frame (14) is also provided.
It is provided a method for managing a door closer (1) for closing a door (15). The door closer (1) comprises a generator (6) and an energy storage device (7). The method is performed by the door closer (1). The method comprises: obtaining (40) a target parameter for the door closer; obtaining (44) at least one measurement when a door closing operation of the door closer is in progress; and adjusting (46), based on the at least one parameter, braking of the door closer to approach the target parameter. Corresponding door closer, computer program and computer program product are also provided.
In an embodiment, an initiating device and a responding device exchange ephemeral public keys. The initiating device generates a signature that includes a first value and both ephemeral public keys, and that is signed with an initiating-device static secret key. The initiating device calculates a shared secret from the responding-device ephemeral public key and the initiating-device ephemeral secret key, and then generates a symmetric key based on (i) the shared secret and (ii) context-binding identifiers of both ephemeral public keys. The initiating device generates an encryption package that includes the signature and a public-key certificate that includes an initiating-device static public key and a cryptographic signature of a trusted authority, and that is encrypted with the generated symmetric key. The initiating device transmits the encryption package to the responding device. The responding device performs similar complementary operations, and a secure mutual authentication flow is achieved.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Systems and techniques for preserving and improving ink jet nozzle health and printing reliability are disclosed herein. The method may include monitoring whether a triggering event has occurred. In response to detecting the triggering event has occurred, pumping at least a portion of ink contained in a header tank in a direction toward an ink cartridge through a tube connecting the header tank to the ink cartridge. The header tank connected to a print head included as a part of a scan head. The method may further include circulating the ink through the tube back into the header tank, and agitating the scan head by moving the scan head along an x-y gantry. Additional methods may include reverse purging, ejecting a portion of ink through nozzles on the print head while simultaneously wiping a nozzle plate included on the print head, and randomizing print head location when printing.
B41J 2/045 - Ink jet characterised by the jet generation process generating single droplets or particles on demand by pressure, e.g. electromechanical transducers
B41J 2/165 - Prevention of nozzle clogging, e.g. cleaning, capping or moistening for nozzles
Systems and techniques for preserving and improving ink jet nozzle health and printing reliability are disclosed herein. The method may include monitoring whether a triggering event has occurred. In response to detecting the triggering event has occurred, pumping at least a portion of ink contained in a header tank in a direction toward an ink cartridge through a tube connecting the header tank to the ink cartridge. The header tank connected to a print head included as a part of a scan head. The method may further include circulating the ink through the tube back into the header tank, and agitating the scan head by moving the scan head along an x-y gantry. Additional methods may include reverse purging, ejecting a portion of ink through nozzles on the print head while simultaneously wiping a nozzle plate included on the print head, and randomizing print head location when printing.
B41J 2/045 - Ink jet characterised by the jet generation process generating single droplets or particles on demand by pressure, e.g. electromechanical transducers
B41J 2/165 - Prevention of nozzle clogging, e.g. cleaning, capping or moistening for nozzles
09 - Scientific and electric apparatus and instruments
Goods & Services
Radio frequency identification devices, namely transponders; identification devices consisting of an assembly of an electronic circuit and an antenna contained in a housing, namely transponders.
28.
PACS MODIFICATION TO INCORPORATE LACS AUTHENTICATION
A method of integrating a logical access control system with a physical access control system is disclosed. A soft token is received at a hard-ware accessory from a client device of a user. The soft token includes a payload. The payload includes information about the user that is stored in a user profile of the logical access control system. Based on a verifying of the soft token using a certificate extracted from a trust store of the hardware accessory, the information about the user that is included in the payload is parsed. Based on the information about the user satisfying one or more access criteria of a reader associated with a physical access control system, the reader is triggered. The triggering includes emulating a transaction associated with the physical access control system.
An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.
It is provided a method for providing a time reading. The method is performed by a mobile device (2) comprising a secure element (1) comprising a real-time clock (7). The method comprises: synchronising (40), by the secure element, the real-time clock (7) with a time server (3); letting (42) the real-time clock (7) run in the secure element (1); receiving (44), by the secure element (1), a current time request (30) from a time reader (6), via a mobile device (2); generating (46), by the secure element (1), a response, the response comprising a current time reading from the real-time clock (7), and cryptographic verification data; and sending (48), by the secure element (1), the response (32), via the mobile device (2), to the time reader (6).
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed herein are systems and methods for deterministic and handsfree engagement for data transfer of mobile identification and other data. In an embodiment, a computer system presents disambiguation data via a user interface, and also broadcasts one or more advertising packets containing the disambiguation data. The computer system establishes a wireless connection with a mobile device. This includes receiving, from the mobile device, at least one message that contains shared-secret data that is based on the disambiguation data. The computer system receives, from the mobile device via the established wireless connection, a mobile driver' s license (mDL) of a user of the mobile device.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
32.
SYSTEMS AND METHODS FOR EXTENDING CRYPTOGRAPHIC CERTIFICATES WITH TARGET-BINDING INFORMATION
A first computing device maintains multiple resource-specific asymmetric keypairs that are each uniquely associated with a different protected resource on the first device, including a first resource-specific asymmetric keypair that is uniquely associated with a first protected resource. The first device engages with a second device in an authentication flow based on the first resource-specific asymmetric keypair. The first device receives, from the second device, a public-key certificate that contains target-binding data that indicates a specified asymmetric keypair. The first device checks whether the specified asymmetric keypair matches the first resource-specific asymmetric keypair. If so, and assuming any other authentication conditions are also met, the first device authenticates the second device to the first resource-specific asymmetric keypair, and grants the second device access to the first protected resource.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
33.
PEOPLE DETECTOR FOR DETECTING WHEN PEOPLE PASS THROUGH A DOORWAY
It is provided a people detector (1) for detecting when people pass through a doorway. The people detector (1) comprises: a first image source (11); a second image source (12); a processor (60); and a memory (64) storing instructions (67) that, when executed by the processor, cause the people detector (1) to: receive a first stream of images from the first image source (11); determine, based on the first stream of images, a confidence indicator that a single person passes through the doorway; when the confidence indicator indicates confidence, determine that a single person has passed through the doorway; and when the confidence indicator indicates non-confidence, receive a second stream of images from the second image source (12), and determine, based on the second stream of images, how many people has passed through the doorway.
G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G07C 9/00 - Individual registration on entry or exit
It is provided a people detector for detecting when people pass through a doorway of a door by which the people detector is installed. The people detector comprises: a people sensor; a processor; and a memory storing instructions that, when executed by the processor, cause the people detector to: receive a door status signal indicating opening status of the door; determine when a person passes through the doorway based on the people sensor and the door status signal.
Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.
G06F 3/06 - Digital input from, or digital output to, record carriers
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Locks and lock goods, also including lock cases, lock cylinders, striking plates, keys and key blanks; Door springs, non-electric; safes and safety boxes; doors, gates, barriers and windows; frames, hinges and handles; door, gate and barrier closers (not electric); emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; fittings and mountings for doors, gates, barriers and windows; wind breaks; loading dock levelers, bridges, ramps and plates; wheel chocks; panels and wires; turnstiles; all the aforesaid goods being of metal or predominantly of metal; small items of metal hardware. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic devices and access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; computer software for managing and operating minibars; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; Closed circuit television systems and devices (CCTV); electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; apparatus and systems for managing mini bars and energy consumption in hotels, homes, companies, public establishments; apparatus and instruments for recording, monitoring, signalling and checking, also including checking and/or controlling people's movement within, entrance to and exit from buildings and through doors, gates, barriers and/or for use with locks; system for connecting and remotely controlling entrance installations including docking equipment; magnetic and electronic identity cards; cloud-based lock management software; wired and wireless locks, locking and access control apparatus, devices and software for buildings, dwellings, premises and their facilities; magnetic data carriers and computer software. Design and development of computers, computer systems, computer software, technology solutions, mobile and web applications in the field of access control and security, including secure identity solutions; design and development of apparatus and instruments in the field of access control and security; consultancy and information regarding the aforesaid services; architectural and engineering services relating to doors, barriers, gates, loading dock superstructures and related parts and components; consultancy services relating to the design of doors, barriers, gates, loading superstructures and associated parts and components; data lifecycle management (for others), namely the issuance, authentication and revocation of digital signatures and digital rights for physical and logical access control systems and secure identity solutions; providing use of on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, access rights for buildings, dwellings, premises and their facilities; consultancy services regarding energy efficiency in buildings.
37.
REMOTE ACCESS VIA SYSTEM-LEVEL TRUSTED AUTHORITIES
Methods and systems for establishing a system specific trust system are provided. The methods and systems establish a secure channel between a first device and a second device using a system specific trusted authority. The methods and systems determine, by the first device, using a first certificate associated with the second device, a first set of access rights of the second device and determine, by the second device, using a credential associated with the first device, a second set of access rights of the first device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
A computing device implemented method of provisioning credential information includes activating a credentialing application stored in an authenticator device; receiving, by the credentialing application, user information entered into the authenticator device; establishing a secure channel between the authenticator device and an authentication server; sending the user information to the authentication server via the secure channel; generating a challenge by the authentication server in response to the user information and presenting the challenge to the user; sending a response to the challenge from the authenticator device to the authentication server via the secure channel; receiving a command from the authentication server to generate the credential information including a key pair; and registering a key of the key pair with the authentication server.
A handle assembly (12a, 12b) comprising a base structure (26a, 26b) for fixation to an access member (18a, 18b); a handing element (38a, 38b); a spring (40a, 40b); and a handle (28a, 28b); wherein the handing element is rotatable relative to the base structure about a rotation axis (30) together with the spring and the handle between a first handing position (54a) and a second handing position (54b); wherein the handle is rotatable relative to the handing element about the rotation axis against a deformation of the spring when the handing element is in the first handing position and in the second handing position; and wherein the base structure comprises a first stop (48a) arranged to be engaged by the handing element to define the first handing position and a second stop (48b) arranged to be engaged by the handing element to define the second handing position.
Techniques for detecting tapering of a physical access control device or a barrier secured by the physical access control device are provided. In an example, an apparatus to control physical access to a secure area via an opening can include multiple tamper sensors. The controller can generate a tamper signal based on a discrepancy between signals received form the multiple tamper sensors and one or more profile signals.
A verifier device of an authentication system comprises physical layer circuitry and processing circuitry coupled to the physical layer circuitry. The processing circuitry is configured to encode an authentication command for sending to a credential device; decode a response communication received from the credential device, wherein the response communication includes a first random number; encrypt the first random number, a second random number, and verifier keying material for sending to the credential device; decrypt encrypted information received from the credential device, wherein the encrypted information includes the first random number, the second random number, and receiver keying material; and calculate a session encryption key using the verifier keying material and the receiver keying material.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A lock device (12) comprising a bolt (28) movable between an extended bolt position (44) and a retracted bolt position (82), the bolt having a bolt structure (60); an auxiliary member (30) movable between an extended auxiliary position (46) and a retracted auxiliary position (84), the auxiliary member having an auxiliary structure (66); a sensor (48); and a trigger member (50) movable between a deactivated position (52) where the trigger member does not cause activation of the sensor, and an activated position (86) where the trigger member causes activation of the sensor, the trigger member being forced towards the activated position; wherein the bolt structure and the auxiliary structure are arranged to allow the trigger member to move from the deactivated position to the activated position when the bolt adopts the extended bolt position and the auxiliary member adopts the retracted auxiliary position.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers.
(2) Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls.
(3) Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. (1) Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
45.
NON-REPUDIATION-FREE PUBLIC KEY AUTHENTICATION PROTOCOLS
Methods and systems for securely communicating with an access control system are provided. The methods and systems establish, between first and second devices, a communication session based on a plurality of ephemeral keys. The methods and systems compute, by the first device, a shared session key as a function of a second public key of the second device and a sum of a first private key of the first device and a first ephemeral key of the plurality of ephemeral keys; and compute, by the second device, the shared session key as a function of a second private key of the second device and a sum of a first public key of the first device and a second ephemeral key of the plurality of ephemeral keys. The methods and systems exchange one or more messages securely between the first device and the second device using the shared session key.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An arrangement (12a; 12b) comprising a drive element (26a; 26b) movable between a closed drive position (28) and an open drive position (44); a mechanical force device (56a; 56b) arranged to force the drive element in a closing drive movement (46); a force device transmission (62a; 62b) arranged to transmit movements of the drive element to movements of the mechanical force device; and an electric machine (58) drivingly connected to the drive element; wherein the mechanical force device and the force device transmission are configured to act more forcefully on the drive element during a latching drive movement (50) than during a closing initial drive movement (48); and wherein the arrangement further comprises an electronic control system (70a; 70b) configured to control the electric machine to operate as an electric generator during the closing initial drive movement, and to control the electric machine to operate as an electric motor during the latching drive movement.
E05F 3/10 - Closers or openers with braking devices, e.g. checks; Construction of pneumatic or liquid braking devices with liquid piston brakes with a spring, other than a torsion spring, and a piston, the axes of which are the same or lie in the same direction
E05F 3/22 - Additional arrangements for closers, e.g. for holding the wing in opened or other position
E05F 15/63 - Power-operated mechanisms for wings using electrical actuators using rotary electromotors for swinging wings operated by swinging arms
Methods and systems for protecting user credentials from swapping attacks are provided. The methods and systems establish, between a first device and a second device, a communication session and receive, by the second device from the first device, a certificate associated with the first device. The methods and systems obtain credential selection information from the certificate associated with the first device and transmit a credential corresponding to the credential selection information from the second device to the first device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed herein are systems and methods for using a web/Bluetooth API for mobile access control. In an embodiment, a computing system receives an endpoint identifier associated with a visitor. The system generates a URL associated with the endpoint identifier, and transmits the URL to an endpoint associated with the endpoint identifier. The system receives, from a mobile device associated with the visitor, a request for a web/Bluetooth Low Energy (BLE) webpage corresponding to the URL. The system generates the requested webpage, and transmits the webpage to the mobile device. The webpage contains a valid credential for access to a secured resource, and also contains executable code for calling at least one function of a web/BLE API. The system transmits the webpage to the mobile device, and thereafter receives the credential from the mobile device via a BLE communication, verifies the credential, and accordingly grants access to the secured resource.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
An RFID assembly (10) includes an RFID chip (14) having a coupling loop (15) formed as part of the RFID chip (14). In this manner, the RFID chip (14) can be inductively coupled to a far-field antenna (16) for RFID communications, without any physical connections between the RFID chip (14) and the coupling loop (15) and/or the far-field antenna (16). This results in a high temperature resistance of the RFID assembly (10), which can be advantageously used, in particular, during tracking of parts in assembly processes requiring higher temperatures.
Methods and systems for communicating with an access control system preserving privacy are provided. The methods and systems establish, between a first device and a second device, a privacy key pair using a group generator, the privacy key pair comprising a privacy public key and a privacy private key, and compute, by the first and second devices, ephemeral key pairs based on the privacy key pair. The methods and systems establish a shared session key based on the ephemeral key pairs and transmit, by the first device to the second device, a message comprising a certificate of the first device using the shared session key that has been established based on the ephemeral key pairs.
Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).
G01C 21/20 - Instruments for performing navigational calculations
G01C 21/12 - Navigation; Navigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigated; Dead reckoning
G07C 9/00 - Individual registration on entry or exit
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
53.
ULTRA-WIDE BAND DEVICE FOR ACCESS CONTROL READER SYSTEM
A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G07C 9/00 - Individual registration on entry or exit
H01Q 5/25 - Ultra-wideband [UWB] systems, e.g. multiple resonance systems; Pulse systems
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; metal padlocks, other than electronic, and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers.
(2) Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls.
(3) Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. (1) Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; software as a service (SaaS) featuring software and platform as a aervice (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; metal padlocks, other than electronic, and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; software as a service (SaaS) featuring software and platform as a aervice (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; software as a service (SaaS) featuring software and platform as a service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
56.
CONNECTION AND SERVICE DISCOVERY FOR FINE RANGING APPLICATIONS
Various systems and methods for providing discovering smart card slots in a device are described herein. A server device for discovering smart card slots in a client device may be implemented with a processor subsystem; and memory including instructions, which when executed by the processor subsystem, cause the processor subsystem to perform operations comprising: receiving, at the server device from the client device, over an established Bluetooth connection, smart card connector parameters, the client device having a plurality of smart card slots; iterating through the plurality of smart card slots; at each slot of the plurality of smart card slots, using a smart card protocol to attempt to access an application at each slot, the application pre-associated with the server device; and in response to identifying the application exists in a slot of the plurality of smart card slots, connecting with the application.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
A brake device (12a, 12b) comprising a hard magnet (20); a soft magnet (22) configured to switch polarity between a first polarity and a second polarity when being subjected to a magnetic field and configured to maintain the polarity when the magnetic field is removed; an electric coil (24) located around the soft magnet; an electric control system (16) configured to apply a current pulse to the electric coil to generate the magnetic field for changing the polarization of the soft magnet; and a brake element (18) comprising a magnetic target section (28), the brake element being arranged to move to a released position (40) when the soft magnet adopts the first polarity, and arranged to move to a braking position (64) due to a magnetic field generated by the hard magnet and the soft magnet in combination and acting on the magnetic target section when the soft magnet adopts the second polarity.
A method of provisioning an authentication device of an authentication system comprises sending an authentication application from an authentication system backend server to a backend network of a cellular network operator; verifying, by the backend network of the cellular operator, the authentication application and including the authentication application in an operator profile; sending the authentication application with the operator profile from the backend network of the cellular network operator to a local profile assistant (LPA) of the authentication device; and installing the authentication application in a secure zone of the authentication device using the LPA.
A method of encoding a credential device of an authentication system comprises sending credential device information to a backend server of the authentication system using a mobile device, verifying ownership of the credential device and the mobile device using the backend server, generating, using the backend server, a quick response (QR) code that includes encoding information for the credential device, generating using the backend server a quick response (QR) code that includes encoding information for the credential device, decoding the QR code to retrieve the encoding information, and encoding the credential device with the encoding information.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Methods and systems are provided for performing operations comprising: storing a plurality of credentials on a client device; establishing, locally on the client device, a dependency relationship between a first credential of the plurality7 of credentials and a second credential of the plurality of credentials; determining, by the client device, that the first credential has been used to access a secure resource; and in response to determining that the first credential has been used to access the secure resource, triggering an access condition associated with the second credential based on the dependency relationship established between the first and second credentials
It is provided a method for enabling training of a machine learning, ML, model, for monitoring a person based on a data feed capable of depicting a person. The method is performed by a training data provider (i). The method comprises: obtaining (40) a data feed capable of depicting the person; selecting (42) a level of anonymisation, from a plurality of levels of anonymisation; anonymising (44) the data feed according to the selected level of anonymisation, resulting in a processed data feed; and feed transmitting (47) the processed data feed as training data for training a central ML model in a central node.
It is provided a method for finding faults in firmware for a lock device. The method is performed by a test device. The method comprises the steps of: receiving data indicating an event that results in operation of the firmware in a test lock device, the test lock device being capable of performing at least some of the functions of the lock device; sampling a plurality of measurements that are indicative of power use by the test lock device over time, wherein the measurements are captured to cover at least part of the operation of the firmware by the test lock device based on the event; and determining that a potential fault occurs in the firmware for the event when the sampled measurements fail to correspond to the event, based on previously recorded data for the same type of event.
It is provided a method for adapting an intent model (20), being a machine learning, ML, model for determining intent of a person to pass through a door (15). The method is performed by an intent determiner (1). The method comprises: determining (40) that a physical environment outside a door has changed; increasing (42) a rate of training of the intent model (20), wherein the training is based on input features based on image data from an image capturing device (11) covering an area near the door (15); and applying (44) the intent model (20) for inferring when a person exhibits intent to pass through the door, based on image data from the image capturing device (11).
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
A method of operating an access control system comprises detecting one or more physical access portals using an application of a mobile device; displaying notifications for the one or more physical access portals on a display screen of the mobile device; receiving a selection of a physical access portal using a user interface of the mobile device; establishing a secure communication channel with a secure relay device associated with the selected physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the selected physical access portal according to the encrypted access token.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A wi-fi sensing systems and techniques using receiving devices with two radio chains are described herein. The receiving devices may utilize the first radio chain to receive messages from a transmitter in a first wireless communication network and may generate environment characterization information based on those received messages. The receiving devices may utilize the second radio chain to transmit the environment characterization information to a host device using a second wireless communication network.
H04B 1/00 - TRANSMISSION - Details of transmission systems not characterised by the medium used for transmission
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
H04B 17/309 - Measuring or estimating channel quality parameters
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
G01S 13/74 - Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
A method of operating an access control system comprises receiving, by a mobile device, an identification of a physical access portal; verifying access credential information stored in the mobile device using a verification application of the mobile device; establishing a secure communication channel with a secure relay device associated with the physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the physical access portal according to the encrypted access token.
It is provided a method for providing training data for a machine learning model for monitoring a person based on video data. The method is performed by a training data provider (1). The method comprises: obtaining (40) a data feed of the person, wherein the data feed comprises a series of images that preserves a privacy of the person; generating (42) fake video data of a fictive person, such that a face of the fake video data is a computer-generated face; combining (44) the data feed with the fake video data, resulting in training data; and providing (46) the training data for training the machine learning model.
Coupling arrangement for a lock device, the coupling arrangement comprising an input and an output element rotatable about a rotation axis; an engaging member movable between a first and second position; an electric motor arranged to affect movement of the engaging member between the first and second positions; a coupling member rotationally locked to the input element and axially movable relative to the input element between a decoupled position, where a rotation of the input element is not transmitted by the coupling member to a rotation of the output element, and a coupled position where a rotation of the input element is transmitted by the coupling member to a rotation of the output element; and a transmission mechanism arranged to transmit a rotation of the coupling member to a movement of the coupling member from the decoupled position to the coupled position when the engaging member adopts the second position.
Methods and systems are provided for performing operations comprising: establishing a secure channel between an authenticator device and a client device; generating, by the authenticator device, a one-time passcode (OTP) based on a token received from the client device; storing the OTP in a memory of the authenticator device; transmitting the OTP to the client device over the secure channel; receiving the OTP from the client device over an unsecure channel; and enabling access to a secure resource in response to determining that the OTP received from the client device matches the OTP stored in the memory of the authenticator device.
Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
G07C 9/20 - Individual registration on entry or exit involving the use of a pass
G07C 9/00 - Individual registration on entry or exit
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A secure RFID device (10) is provided. The RFID device (10) includes one or more switch modules (26) that can be actuated by a user to selectively couple an integrated circuit (42) provided in a switch module (26) to a main RFID antenna (14) of the RFID device (10). It is therefore not necessary to provide a separate integrated circuit (42) coupled to the main RFID antenna (14). The integrated circuit (42) provided in each switch module (26) can be electrically or inductively coupled to the main RFID antenna (14) when a user actuates an actuation portion (36) of the corresponding switch module (26).
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
73.
NEAR-FIELD WITH FAR-FIELD TO VERIFY THAT DEVICE IS CONNECTED OR SECURED
The present disclosure relates to a method to check if a connector system with a Connector Position Assurance (“CPA”) member is in closed position. The method includes providing an RFID-tag reader that is positioned at a distance D to the integrated circuit enabling far-field RFID communication and not permitting near-field RFID communication. Further, the method includes checking the readability of the integrated circuit with the RFID-tag reader and issuing an alert signal if the integrated circuit is not readable by the RFID-tag reader indicating that the CPA member is not in the closed position.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
74.
SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS
Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
An arrangement (12) for a lock system (10) comprising a latch spindle (42) for engaging a follower (52) and comprising a handing structure (48); an outer spindle (44) comprising an outer engaging structure (74) configured to engage the handing structure; and an inner spindle (46) comprising an inner engaging structure (68) configured to engage the handing structure independently of the outer engaging structure; wherein the handing structure, the inner engaging structure and the outer engaging structure are configured to cooperate such that a first handing (20a) can be set by a first latch position (82) of the latch spindle, and a second handing (20b) can be set by a second latch position (92) of the latch spindle; and wherein the handing structure comprises an angular clearance (60) such that the inner spindle can drive the latch spindle relative to the outer spindle by engagement between the inner engaging structure and the handing structure.
Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess. A freewheel mechanism and assemblies for an electronic locking system are also provided.
It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.
A method of device authentication comprises transmitting a data stream from a first endpoint device to a second endpoint device. The data stream includes a first data stream portion including unencrypted data that includes an ephemeral public key of an ephemeral key pair, and an encryption algorithm identifier; a second data stream portion including encrypted data that includes a first counter value and an identity of the first endpoint device; and a third data stream portion including encrypted data that includes a second counter value and an identity of the second endpoint device. The method of device authentication further comprises the second endpoint device authenticating the first endpoint device using the first, second, and third data stream portions.
It is provided a method for enabling training a machine-learning, ML, model for trigger-word detection, the method being performed in a training data provider (1). The method comprises: receiving (40) sound-based data, the sound-based data being based on sounds captured in a space to be monitored; determining (42) that the sound-based data corresponds to a trigger word, and labelling this sound-based data to correspond to the trigger word; and providing (44) the labelled sound-based data to train the ML model.
It is provided a method for configuring access rights for an electronic key (2) forming part of an access control system (10) comprising a plurality of electronic locks (12a-c, 13a-c, 14a-c) for securing access to respective physical spaces. The method is performed in a configuration device (1) and comprising: setting (40) a baseline configuration of access rights for the electronic key (2); receiving (42) access data, indicating at least one instance of the electronic key (2) being granted access by one of the plurality of electronic locks (12a-c, 13a-c, 14a-c); and adjusting (44) the configuration of access rights for the electronic key to restrict access compared to the baseline configuration, based on the access data.
A method of operating a real-time location services (RTLS) system includes obtaining, by a processing device of the RTLS system, location information identifying an object or person and a building-area location of the object or person; obtaining, by the processing device, access-event information of a access of a physical access portal associated with the building-area location; and matching the location information of the identified object or person and the access-event information and generating an indication of the building-area location of the object or person using the processing device in response to the matching.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
82.
CHANGING THE COMMUNICATION MODE OF AN ACCESS CONTROL PROTOCOL
A method of operating an access control system includes sending, by an access reader of the access control system, a message to a user device to activate an access application or access applet of the user device, wherein the access reader is an Initiator device and the user device is a Responder device for a communication transaction; authenticating the user device; sending, by the access reader, a command to change the user device to the Initiator device for the communication transaction and the access reader to the Responder device; initiating, by the user device, an action of the access control system including sending a message to the access reader; and performing, by the access reader, at least a portion of the action in response to the message sent by the user device.
Disclosed herein are systems and methods for homomorphic-encryption-supported provisioning of secure devices. In an embodiment, a provisioning server (e.g., a cloud-based provisioning server) receives a request, associated with (e.g., from) a secure device (e.g., a keycard), for a homomorphically encrypted diversified key that is based on (e.g., derived from) a master key of an encryption system. The secure device stores a copy of a homomorphic-encryption key. The provisioning server derives a homomorphically encrypted diversified key from a homomorphically encrypted master key, which is the master key previously encrypted with the homomorphic-encryption key. The provisioning server transmits the homomorphically encrypted diversified key to the secure device. The secure device may then be operable to access at least one resource using a diversified master key, which is the homomorphically encrypted diversified key after having been decrypted on the secure device using its stored copy of the homomorphic-encryption key.
A deadbolt (22) comprising a base body (28), a first ridge (40) and a second ridge (42) for frictionally sliding against a first, respectively a second, lock device opening side, the ridges (40, 42) being parallel with an actuating direction (26) of the deadbolt; furthermore, at least a first and a second inclined section (44a, 44b, 46a, 46b) for frictionally sliding against a first (58), respectively a second (60), strike opening side are provided, the inclined sections protrude from a first, respectively a second, base side of the deadbolt, are formed separately from the ridges, and are inclined towards an end (34) of the deadbolt; Furthermore, a lock device with such a deadbolt and a system with such a lock device are claimed. Invention aims at providing low friction locking components with a simple structure.
E05B 63/20 - Locks with special structural characteristics with arrangements independent of the locking mechanism for retaining the bolt in the retracted position released automatically when the wing is closed
E05B 47/00 - Operating or controlling locks or other fastening devices by electric or magnetic means
E05B 15/00 - Other details of locks; Parts for engagement by bolts of fastening devices
A blocker (10) for a lock device (52), the blocker (10) comprising a blocking member (12) rotatable about a blocker axis (18) between a blocking position (44) and an unblocking position (48); a resilient device (14) movable between a blocking forcing state (46) where the resilient device (14) forces the blocking member (12) towards the blocking position (44), and an unblocking forcing state (50) in which the resilient device (14) forces the blocking member (12) towards the unblocking position (48); and an actuator (16) arranged to move the resilient device (14) between the blocking forcing state (46) and the unblocking forcing state (50). An arrangement (54) and a lock device (52) are also provided.
It is provided an electronic lock (12) comprising: a first power bus (20); a battery holder (23) configured to hold at least one battery (19) to thereby supply power of a first voltage to the first power bus (20); a boost converter (24) configured to selectively increase a voltage of the first power bus (20) from the first voltage to a second voltage; a first processor (60) connected to the boost converter (24); a first memory (64) storing instructions (67) that, when executed by the first processor (60), cause the electronic lock (12) to: determine a need for increased voltage; and trigger the boost converter (24) to activate to thereby increase a voltage on the first power bus (20). It is also provided a corresponding method, computer program (67) and computer program product (67).
Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device. The authorization data may be provided by postal message, email message, an SMS text message, and/or a visual code provided on a screen of a computer used to access the customization server. The user may use a computer to provide credential information to access the customization server. Customizing the application may allow the mobile device to access a user service on behalf of the user.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A switch (28) comprising a printed circuit board assembly, PCBA, (74) including a printed circuit board, PCB, (75) and a stationary contact (72); a cap (30) in contact with the PCB (75) such that the cap (30) and the PCB (75) define a switch chamber (68) for the stationary contact (72), the cap (30) carrying a movable contact (70), the cap (30) being arranged to be deformed from a disconnected state (36) where the movable contact (70) is separated from the stationary contact (72) to a connected state (92) where the movable contact (70) contacts the stationary contact (72), and the cap (30) being forced towards the disconnected state (36); an actuator (32) movable relative to the stationary contact (72) between an activated position (90) where the actuator (32) pushes the cap (30) to the connected state (92), and a deactivated position (34) allowing the cap (30) to be forced to the disconnected state (36); and a potting compound (76) enclosing the PCB (75) and the cap (30). A lock device (10) comprising a switch (28) is also provided.
H01H 13/18 - Operating parts, e.g. push-button adapted for actuation at a limit or other predetermined position in the path of a body, the relative movement of switch and body being primarily for a purpose other than the actuation of the switch, e.g. door switch, limit switch, floor-levelling swi
H01H 13/16 - Operating parts, e.g. push-button adapted for operation by a part of the human body other than the hand, e.g. by foot
H01H 13/52 - Switches having rectilinearly-movable operating part or parts adapted for pushing or pulling in one direction only, e.g. push-button switch having a single operating member the contact returning to its original state immediately upon removal of operating force, e.g. bell push switch
A lock device (22) for installation in an access member (12), the lock device comprising a lock case (28); a forend (30); an adjustment screw (40, 42) passing through the forend and threadingly engaging the lock case, the adjustment screw being manipulatable between an adjustment position (66) where the forend is allowed to move relative to the lock case and where the adjustment screw prevents removal of the forend from the lock case, and a secured position (48) where the forend is secured to the lock case by the adjustment screw; and at least one locking element (44a, 44b, 46a, 46b) allowing the adjustment screw to be adjusted between the adjustment position and the secured position, and preventing the adjustment screw from being removed from the lock case. A system (10) comprising a lock device (22) and an access member (12) is also provided.
Method for determining when to provide assistance to open a door (15), the method being performed by an assistance determiner (1). The method comprises: converting (40) mechanical energy from when the door is opened without assistance to electrical energy and storing the electrical energy in an energy storage device (25); determining (42) to provide assistance in opening the door (15) for a person; and providing (44) assistance to open the door (15), when it is determined to provide assistance, by causing a motor to convert electrical energy from the energy storage device (25) to mechanical energy for providing assistance to open the door (15).
E05F 15/74 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects using photoelectric cells
E05F 15/76 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects responsive to devices carried by persons or objects, e.g. magnets or reflectors
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
Goods & Services
(1) Metal locks and lock boxes; lock cylinders of metal; keys; key blanks; lock bodies; striker plates; handles and fittings (made of metal) for doors and windows; door closers and door openers (non-electric); emergency and panic latches for doors and windows (made of metal); door frames, hinges and handles (made of metal); components and accessories for mentioned goods, all made of metal.
(2) Machines and machine tools for treatment of materials and for manufacturing; electric door openers and closers; door openers and door closers (hydraulic, pneumatic or electronic) including components therefore and installations consisting thereof; door drives (hydraulic, pneumatic or electronic), in particular revolving door drives or sliding door drives; electrically operated door openers and door closers and their control systems.
(3) Computer software and applications for locking devices and apparatus, safety, security, protection and signaling devices and apparatus and door opening and closing devices and apparatus; electric and electronic safety, security, protection and signaling devices and apparatus; electric, electronic, electromechanical and magnetic locks and control and decoding apparatus for locks; electric, electronic and electromechanical locking devices and apparatus; electric, electronic and electromechanical lock cylinder devices and apparatus; electric, electronic or optical identification apparatus, card readers and identification equipment and their cards; electronic or magnetic keys; access control cards, key cards, smart cards and their readers; control and monitoring systems, namely access control systems, burglar alarms and video surveillance systems; electric and electronic locking systems and apparatus, gate and door automation systems, access control and time tracking systems, electric and electronic security systems and apparatus. (1) Wholesale and retail services for locks and lock cases, lock cylinders, keys, key blanks, lock bodies, striker plates, handles and fittings for doors and windows, door closers and door openers, emergency and panic latches for doors and windows, frames, hinges, handles and components and accessories of mentioned goods; wholesale and retail services for key machines and key machine tools, electric door opening apparatus and door closers and their control systems and door actuating apparatus (hydraulic, pneumatic or electronic); wholesale and retail services for computer software and applications for locking devices and apparatus, safety, security, protection and signaling devices and apparatus or door opening and closing devices and apparatus; wholesale and retail services for electric and electronic safety, security, protection and signaling devices and apparatus; wholesale and retail services for electric, electronic, electromechanical and magnetic locks and control and decoding apparatus for locks; wholesale and retail services for electric, electronic and electromechanical locking devices and apparatus and electric, electronic and electromechanical lock cylinder devices and apparatus; wholesale and retail services for electric, electronic or optical identification apparatus, card readers and identification equipment and their cards; wholesale and retail services for access control cards, key cards, smart cards and their readers; wholesale and retail services for access control systems, burglar alarms and video surveillance systems.
92.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
H04W 12/64 - Location-dependent; Proximity-dependent using geofenced areas
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/10 - Movable barriers with registering means
G07C 9/00 - Individual registration on entry or exit
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Systems and methods may he used for authenticating and validating a credential for performing an action. A method may include using an access control device to exchange public keys with a user device. The method may include sending, to the user device, a first authentication cryptogram including a first signature, a public key certificate, and a Credential Trust Information (CTI), and receiving, from the user device, a second authentication cryptogram including a second signature, a public key of the user device, and a credential. The access control device may authenticate the user device based on the credential and the second signature The access control device may determine whether the credential received in the second authentication cryptogram is signed by a trusted credential issuer to validate the user device. The method may include causing the action to be performed.
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Locks of metal; mechanical locks; keys; safes; electronic safes and safe deposit boxes; parts and equipment for all the aforementioned goods. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic or magnetic access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; CCTV systems and devices; electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; computer software, apparatus and systems for managing and operating mini bars and energy consumption devices; apparatus and instruments for recording, monitoring, asset tracking, signalling and checking; magnetic and electronic identity cards; magnetic data carriers and computer software. Installation, maintenance and repair of locks, locking mechanisms, access control apparatus and instruments, and its parts and fittings; installation, maintenance and repair of security and access control systems and devices; installation, maintenance and repair of apparatus and instruments used for facilities management and asset tracking systems. Design and development of computers, computer systems, computer software, technology solutions, internet of things (IoT) solutions, mobile and web applications in the field of access control and security, including secure identity solutions and asset tracking systems; design and development of apparatus and instruments in the field of access control, security, facilities management; consultancy services regarding energy efficiency in buildings; consultancy and information regarding the aforesaid services. Security services for the protection of property and individuals; data lifecycle management services for others, namely, issuance, authentication and revocation of digital signature and digital rights for physical and logical access control systems and secure identity solutions; security consultants.
95.
RFID TAG FOR A TAMPER PROOF ATTACHMENT TO AN OBJECT SUCH AS A LICENCE PLATE
An RFID tag (1) for tamper proof attachment to an object (100) such as a license plate, comprising a lower housing (10), an upper housing (20) and an antenna unit (30). The lower housing (10) is configured to be attached to the object (100). The upper housing (20) is placed on the lower housing (10) and comprises a peripheral portion (22). The peripheral portion (22) laterally surrounds the lower housing (10) and is configured to be attached to the object (100). The antenna unit (30) is positioned between the lower housing (10) and the upper housing (20). At least one first portion of the antenna unit (35) is attached to the lower housing (20) and at least one second portion of the antenna unit (36) is attached to the upper housing (10). When the distance (D) between the upper housing (20) and the lower housing (10) changes in case someone attempts to remove the RFID tag from the object, the at least one first portion of the antenna unit (35) remains attached to the lower housing (10) and the at least one second portion of the antenna unit (36) remains attached to the upper housing (20). Due to this specific arrangement the antenna unit (30) is being damaged in case of detachment of the RFID tag as disclosed herein.
The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G07C 9/00 - Individual registration on entry or exit
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
97.
PROVIDING DATA FOR TRAINING A MACHINE LEARNING MODEL
It is provided a method for providing data for training a machine learning model. The method is performed in a training data provider (1) and comprises the steps of: obtaining (40) a data structure comprising a chain of delegations, the chain of delegations covering a delegation path from a media capturing device (3) to the training data provider (1) such that, in the chain of delegations, each delegation is a delegation from a delegator to a receiver; sending (42) a key request to a delegation verifier (2), the key request comprising the data structure; receiving (44) a decryption key from the delegation verifier (2); obtaining (46) encrypted media data captured by the media capturing device (3); decrypting (48) the encrypted media data, resulting in decrypted media data; and providing (50) the decrypted media data for training the machine learning model.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
It is provided a method for determining whether a portable key device is located inside or outside a metal door. The method is performed by a credential communication device and comprises the steps of: obtaining a first time-of-flight, ToF, measurement between a first antenna and the portable key device, wherein the first antenna is located on the outside of the metal door; obtaining a second ToF measurement between a second antenna and the portable key device, wherein the second antenna is located on the inside of the metal door; and determining the portable key device to be located on the outside of the metal door when the first ToF measurement is less than the second ToF measurement by an amount which is greater than a threshold value.