It is provided a method for determining intent to open a door. The method is performed by an intent determiner. The method comprises: obtaining an image of a physical space near the door; determining a position and orientation of a person in the image by providing the image to an image machine learning model, wherein the image machine learning model is configured to determine position and orientation of a person in the image, wherein the image machine learning model is configured to determine a stick figure of the person based on the image; adding a data item, comprising an indicator of the position and an indicator of the orientation, to a data structure; determining based on the data structure, whether there is intent of the person to open the door; and repeating the method until an exit condition is true.
G06V 40/10 - Corps d’êtres humains ou d’animaux, p.ex. occupants de véhicules automobiles ou piétons; Parties du corps, p.ex. mains
G06V 40/20 - Mouvements ou comportement, p.ex. reconnaissance des gestes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
E05F 15/73 - Mécanismes pour battants mus par une force motrice avec déclenchement automatique sensible au déplacement ou à la présence de personnes ou d’objets
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
An access control system, processor-implemented method, and computer readable medium optionally includes an electronic memory and a processor. The processor and computer readable medium are configured to receive a command from a user to access the secure asset, determine access rights by the user to the secure asset, based on the access rights of the user, determine general authentication for the user to access the secure asset, and grant access to the user conditional on the general authentication determined for the user.
It is provided a method for communicating a media stream between a guest device (1) and an approval device (2) for evaluating whether to unlock an electronic lock (12). The method comprises: obtaining (40) a pointer to the coordination server (3) for establishing contact with the approval device (2); connecting (41 ) to the coordination server (3); establishing (42) a peer-to-peer connection between the guest device (1) and the approval device (2); providing (43) a media stream to the approval device (2) over the peer-to-peer connection; receiving (53) the media stream from the guest device (1) over the peer-to-peer connection; presenting (44) the media stream to an approval user (6); receiving (45) user input indicating to unlock the electronic lock (12); providing (46) a first unlock signal to unlock the electronic lock; and transmitting (47) the first unlock signal to unlock the electronic lock (12).
11F)) to a magnitude of the actuation force by decreasing its input impedance when the magnitude of the actuation force increases, and by increasing its input impedance when the magnitude of the actuation force decreases. A corresponding power converter assembly and an electronic lock (148) including the energy harvesting system are also provided.
H02J 7/32 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries pour la charge de batteries par un ensemble comprenant une machine motrice non électrique
H02J 7/34 - Fonctionnement en parallèle, dans des réseaux, de batteries avec d'autres sources à courant continu, p.ex. batterie tampon
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
5.
METHOD AND GUIDANCE DEVICE FOR PROVIDING NON-VISUAL GUIDANCE
It is provided a method for providing non-visual guidance for passing through a door (15). The method being performed by a guidance device (1). The method comprises: determining (40) that a person (5) is near the door (15) and that non-visual guidance is to be provided to the person (5); determining (42) an indication of location of the person (5) in relation to the guidance device (1) or the door (15); and providing (44) non-visual guidance to the person for passing through the door (15), wherein the non- visual guidance is based on the indication of location.
It is provided a method for alerting difference in user (5) sentiment of a user using a door (15). The method is performed in a user analysis device (1). The method comprises: receiving (40) sensor data from at least two sensors (7a-c) of different sensor types, the sensor data comprising data relating to a user (5) in the vicinity of a door (15); determining (42), based on the sensor data, a first user sentiment prior to using the door (15); determining (44), based on the sensor data, a second user sentiment after using the door (15); deriving (46) a difference in user sentiment between the first user sentiment and the second user sentiment; detecting (48) that the difference in user sentiment is greater than a threshold; and generating (50) an alert signal, indicating that the difference in user sentiment is greater than the threshold.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
It is provided a lock assembly (20) for controlling its power state, the lock assembly being configured to control access to a restricted physical space (16) secured by a door (15). The lock assembly (20) comprises: an access control module (23), configured to selectively control the lock assembly (20) to be in an unlocked state or a locked state, wherein the access control module (23) comprises a processor (60) and a magnetically controllable switch (25), configured to control an operative state of the processor (60) based on an applied magnetic field; and a rotary member (24) configured to rotate when a connected door handle (13) rotates. The rotary member (24) comprises a magnet (26) for controlling the state of the magnetically controllable switch (25).
Systems and methods may be used for providing wireless power from a mobile device to a digital lock. The mobile device may include a proximity communication antenna to receive an authentication request from the digital lock. The proximity communication antenna may facilitate the mobile device providing wireless power to the digital lock via a wireless power protocol. The proximity communication antenna may send an authorization to the digital lock to cause the digital lock to open.
Systems and methods may be used for controlling physical access using a cloud transaction. A method may include receiving an authentication attempt for a user from a mobile device, and authenticating the user for access to a physical space based on the authentication attempt. The method may include receiving identification information corresponding to the user from an access control device, and sending authorization to the access control device to permit the user to access the physical space based on the authenticating the user.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
10.
METHOD OF GENERATING A MULTIPLEXED IMAGE FOR PRINTING
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventeur(s)
Ayala, Stéphane
Destouches, Nathalie
Hébert, Mathieu
Dalloz, Nicolas
Abrégé
A method of generating a multiplexed image (18) for printing that can be observed in a plurality of modes includes determining a finite shape (22) of a multiplexed palette (10) in a combined color space. The contrast of the multiplexed image (18) in each mode can be optimized by determining a maximum volume hyperrectangle (20) enclosed in the finite shape (22). Gamut mapping to this maximum volume hyperrectangle (20) allows for generation of a multiplexed image (18) that has a maximum contrast and is free from artifacts caused by an interdependency between the colors in each mode. Performing a dimensionality reduction using PCA allows for reducing the complexity of the optimization problem.
A lock device (12a; 12b) comprising an input member (18) rotatable about an input axis (46); an output member (20) rotatable about an output axis (48); an electromechanical coupling device (22a; 22b) configured to adopt an uncoupled state (68), where rotation of the input member about the input axis is not transmitted to a rotation of the output member about the output axis, and a coupled state (98), where rotation of the input member about the input axis can be transmitted to a rotation of the output member about the output axis; an electric control system (24) configured to control the coupling device to switch between the uncoupled state and the coupled state; and a sensor (90) in signal communication with the control system, the sensor being configured to generate a position signal (92) indicative of a position of the output member about the output axis. A lock system (10) comprising a lock device is also provided.
E05B 47/06 - Commande des pênes à fonctionnement mécanique par des cliquets à déclenchement électro-magnétique
F16D 11/14 - Embrayages dans lesquels les organes ont des parties qui se pénètrent mutuellement avec des organes d'embrayage mobiles selon l'axe uniquement
E05B 15/00 - SERRURES; LEURS ACCESSOIRES; MENOTTES Éléments permettant l'enclenchement par pênes des dispositifs de fermeture
E05B 17/22 - Moyens de fonctionnement ou de commande d'accessoires de serrures ou dispositifs d'immobilisation, c. à d. autres que les moyens d'immobilisation, p.ex. interrupteurs, indicateurs
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
E05B 15/04 - Dispositifs à ressorts dans les serrures
12.
ARRANGEMENT FOR ACCESS MEMBER, ACCESS MEMBER SYSTEM AND METHOD
An arrangement (22a; 22b) for closing an access member (14) rotatable relative to a frame (16) about a hinge axis (18), the arrangement comprising a primary element (24) for fixation to either the frame or the access member; a secondary element (32) for fixation to the other of the frame and the access member; a connection device (34) arranged between the primary element and the secondary element and engaging the secondary element; and a force device (40) comprising a drive element (42) rotatable about a pivot axis (36) and engaging the connection device, the force device being arranged to force rotation of the connection device relative to the primary element about the pivot axis, wherein a position of the force device relative to the primary element is adjustable after fixation of the primary element and the secondary element to adjust a distance (38) between the pivot axis and the hinge axis. An access member system (10) and a method are also provided.
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
E05F 3/10 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide avec freins à piston à liquide avec ressort, autre qu'un ressort de torsion, et un piston, dont les axes sont les mêmes ou sont dans la même direction
E05F 3/22 - Dispositions complémentaires pour appareils de fermeture, p.ex. pour maintenir en position ouverte ou autre position le battant
It is provided a method for routing data in a communication network (8). The method being performed by a routing node (3). The method comprises: receiving (40) an uplink message from an end node (2) over a multicast wireless transmission; forwarding (42) the uplink message towards a destination node over a unicast transmission; receiving (44) a downlink message over a unicast transmission; determining (46) that a recipient of the downlink message is the end node (2); and transmitting (48) the downlink message over multicast to the end node (2). Corresponding routing node, gateway, computer programs and computer program products are also provided.
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
It is provided a receptacle holder (1, 1a-b) for selectively allowing a receptacle (4, 4a-b) to be removed. The receptacle holder (1, 1a-b) comprises: an attachment member (10) being configured to engage with a receptacle (4, 4a-b) to selectively keep the receptacle (4, 4a-b) in a locked engagement with the receptacle holder (1, 1a-b); a processor (60); and a memory (64) storing instructions (67) that, when executed by the processor, cause the receptacle holder (1, 1a-b) to: determine to unlock the attachment member (10); and unlock the receptable (4, 4a-b) from the attachment member (10). A corresponding receptacle holder, computer program and computer program product are also provided.
A47G 29/14 - Récipients pour déposer des aliments, p.ex. petit déjeuner, lait; Récipients similaires pour colis avec accessoires pour éviter que les articles déposés ne soient indûment retirés
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
G06Q 50/28 - Logistique, p.ex. stockage, chargement, distribution ou expédition
15.
APPLYING A SERVER PARTIAL SECRET KEY CONDITIONAL ON BLOCKED STATUS
It is provided a method for applying a server partial secret key conditional on blocked status, wherein the server partial secret key (10b) and a user partial secret key (10a) form part of a threshold cryptography scheme (11), the method comprises: receiving (40) a request to apply a server partial secret key (10b) for a requested cryptographic operation for a user device (2); determining (42) that the server partial secret key (10b) can validly be applied by determining that the server partial secret key (10b) is not blocked from being applied; and interacting (44) with the user device (2) to perform the requested cryptographic operation, such that the user device (2) applies the user partial secret key (10a) and the validation server applies the server partial secret key (10b).
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
It is provided a method for recovering access to a user account, the method being performed by a recovery control device (1). The method comprises: triggering (40) generation of a plurality of partial secret keys (10a-g) by respective recovery devices (4a- g), the plurality of partial secret keys forming part of a threshold cryptography scheme (11) associated with a public key (12), wherein the threshold cryptography scheme (11) is associated with the user account; providing (42) the public key (12) to an access verification device (2, 3); and triggering (44) an access recovery, whereby access recovery messages are transmitted to the recovery devices (4a-g), wherein a threshold number of the plurality of partial secret keys (10a-g) are required to be applied in the threshold cryptography scheme (11) for recovering access to the user account.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
17.
IDENTIFYING POSITION AND DETERMINING INTENT BASED ON UWB TEMPORAL SIGNATURES
Methods and program code for determining the position and/or intent of a user (or device) holding, carrying, wearing, or mounted with a UWB-enabled device. Example computer readable medium for determining the position and/or intent of a user comprises program code that when executed by one or more processors, causes the one or more processors to determine a current temporal signature for a first device moving within an environment; compare the current temporal signature with at least a portion of a stored reference temporal signature corresponding to a secure asset within the environment; and base an access control decision corresponding to the secure asset on whether it is determined that the current temporal signature corresponds to the at least a portion of the stored reference temporal signature.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
It is provided a method for performing an action by an electronic device (2), based on a first partial secret key (10a) and a corresponding second partial secret key (10b), wherein the first partial secret key (10a) and the second partial secret key (10b) form part of a threshold cryptography scheme (11) associated with a public key (12). The method comprises: transmitting (40), upon the device initialising, a request for a first partial secret key (10a) to a key server (3); receiving (42) the first partial secret key (10a) from the key server (3); storing (44) the first partial secret key (10a) only in volatile memory (70); retrieving (46) a second partial secret key (10b) from non-volatile memory (71); and performing (48) an action based on applying both the first partial secret key (10a) and the second partial secret key (10b).
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
19.
HARDWARE INTEGRITY CONTROL OF AN ELECTRONIC DEVICE
It is provided a method for providing hardware integrity control of an electronic device (2). The method comprising: triggering (40) each one of a plurality of components (4a- d) of the electronic device to generate of respective partial secret keys (10a-d) forming part of a threshold cryptography scheme (11) associated with a public key (12), wherein a threshold number of the plurality of partial secret keys (10a-d) are required to be applied in the threshold cryptography scheme (11) for verification against the public key (12); and providing (42) the public key (12) to a hardware verification device (3). A corresponding hardware integrity device (1), computer program (67, 91) and computer program product (64, 90) are also provided.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
It is provided a method for enabling detecting suspicious activity by an electronic lock (2). The method comprises: obtaining (40) communication data being metadata of communication to and/or from the electronic lock (2); obtaining (42) internal state data being metadata of an internal state of the electronic lock; obtaining (44) event data indicating at least one event and a time of for the event, wherein the event has occurred for the electronic lock; and transmitting (46) the communication data, the internal state data and the event data to a monitoring server (3). Corresponding electronic lock (2), monitoring server (3), computer programs (67, 167, 91) and computer program products (64, 164, 90) are also provided.
An energy harvesting arrangement (14a-14e) for an access member device (12a-12e), the energy harvesting arrangement (14a-14e) comprising a movable input member (16, 22b) arranged to provide an input torque (84); an electromagnetic generator (40a; 40b) having a stator (86) and a rotor (46) rotatable relative to the stator (86) to generate electric energy; a transmission (42a-42e) configured to transmit a movement of the input member (16, 22b) to a rotation of the rotor (46); and a torque limiter (44a-44g; 110a, 110b) configured to limit the input torque (84). An access member device (12a-12e) and an access member system (10a; 10b) are also provided.
A method and system for in-field encoding of credentials to a credential device. An example method comprises receiving a request to at least one of add or update credentials to a credential device; providing an invitation code for an in-field device, the in-field device being separate from the credential device; receiving, from the in-field device, the invitation code along with information from the credential device for establishing a secure communication channel with the credential device; establishing a secure communication channel with the credential device using the in-field device as an intermediate; generating one or more commands for encoding credentials to the credential device based on the request; and sending the one or more commands, via the secure communication channel using the in-field device as an intermediate, to the credential device.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
23.
DETERMINING WHEN TO ESTABLISH A COMMUNICATION CHANNEL FOR ACCESS CONTROL
It is provided a method for determining when to establish a communication channel using an electronic lock (12) controlling access to a restricted physical space (16). The method is performed by a portable key device (2). The method comprises: obtaining (40) a first time-indicator indicating when the portable key device (2) detects a stop in motion of the portable key device (2); receiving (42) a broadcast message from the electronic lock (12); deriving (44) a second time-indicator based on the received broadcast message, the second time-indicator indicating when the electronic lock (12) determines a stop in motion; determining (46) that a difference between the first time- indicator and the second time-indicator is less than a threshold; and establishing (48) a communication channel between the portable key device and the electronic lock when it is determined that the difference between the first time-indicator and the second time- indicator is less than the threshold.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 76/10 - Gestion de la connexion Établissement de la connexion
It is provided an electronic lock for controlling access to a restricted physical space. The electronic lock comprises: a first credential interface for accepting a credential from a user for evaluating whether access for the user should be granted; and a second credential interface for accepting a credential from a user for evaluating whether access for the user should be granted. The first credential interface is configured to be activated when the user causes an interaction with the first credential interface, without activating any other credential interfaces. The second credential interface is configured to be activated when a user causes an interaction with the second credential interface, without activating any other credential interfaces.
Methods and program code for determining a location of a device within an environment and for calibrating the environment. Example computer readable medium for determining a location of a device within an environment comprises program code that when executed by one or more processors, causes the one or more processors to determine a current path signature for a device moving within an environment, compare the current path signature with a stored reference path signature corresponding to a location of interest (LOI) within the environment, and if it is determined that the current path signature corresponds to the stored reference path signature, determine the location of the device to be the same as a location of the LOI within the environment.
G01C 21/20 - Instruments pour effectuer des calculs de navigation
G01C 21/16 - Navigation; Instruments de navigation non prévus dans les groupes en utilisant des mesures de la vitesse ou de l'accélération exécutées à bord de l'objet navigant; Navigation à l'estime en intégrant l'accélération ou la vitesse, c. à d. navigation par inertie
26.
CONTROL ARRANGEMENT FOR ACCESS MEMBER, AND ACCESS MEMBER SYSTEM
A control arrangement (20) for controlling movements of an access member (14), the control arrangement comprising a base structure (22); a drive member (32) rotatable about a rotation axis (28); an input member (38) arranged to be driven along an actuation axis (40) by rotation of the drive member, and arranged to move in a lateral direction (74, 76); an output member (50) arranged to be driven by the input member along the actuation axis; an electromagnetic generator (58) arranged to be driven by movement of the output member along the actuation axis to generate electric energy; and a force transmitting arrangement (42, 52; 116) arranged to transmit a relative movement between the input member and the output member along the actuation axis to a movement of the input member in the lateral direction towards the base structure for frictional braking between the input member and the base structure.
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide à freins à friction
A method for offline delegation of authorization to access a secure asset. The method comprises receiving an offline delegation request from a delegating device at a receiving device while the receiving device is not in communication with a server of an authorization management system, the offline delegation request indicating a delegation of authorization from the delegating device to the receiving device for access to a secure asset; after establishing communication with the server, transmitting the offline delegation request from the receiving device to the server; and receiving, at the receiving device, authorization data from the server in exchange for the offline delegation request, the authorization data permitting access to the secure asset by the receiving device; wherein the offline delegation request comprises an identity of the receiving device or user of the receiving device and is digitally signed by the delegating device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method for creating a secure channel between devices for secure communication therebetween. The method comprises transmitting a first nonce from an initiator device to a responder device; receiving, at the initiator device, a second nonce and an identity of the responder device; transmitting an identity of the initiator device and a first set of one or more encrypted data objects from the initiator device to the responder device; receiving, at the initiator device, a second set of one or more encrypted data objects from the responder device; and generating, at the initiator device, a session key for secure communication between the initiator and responder devices.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
It is provided it is provided a keypad comprising: a voltage bus configured to distribute power in the keypad; and a plurality of keys; a plurality of row key connections; and a plurality of column key connections; A wake-up signal causes a microcontroller to transition from a low-power state to an active state such that the microcontroller can detect which one of the plurality of keys was actuated. Each key is connected to a single row key connection and a single column key connection. Each row key connection and/or each column key connection is provided with a respective port circuit that is configured to connect the key connection with keys of the keypad when the wake-up signal is activated. Each port circuit comprises a respective port switch that is turned off in the low-power state to disconnect the column key connections/row key connections from the keys of the keypad.
G06F 1/3234 - Gestion de l’alimentation, c. à d. passage en mode d’économie d’énergie amorcé par événements Économie d’énergie caractérisée par l'action entreprise
30.
ARRANGEMENTS FOR CLOSING ACCESS MEMBER, AND ACCESS MEMBER SYSTEMS
An arrangement 20a-20c) for closing an access member (14) rotatable relative to a frame (12), the arrangement comprising a frame part (30) for fixation to the frame; an access member part (32) for fixation to the access member, the access member part being rotatable relative to the frame part about a hinge axis (16) between a closed position (18) and an open position (24); a mechanical force device (40, 92) configured to store mechanical energy from an opening movement (26) of the access member part from the closed position to the open position, and configured to release the stored mechanical energy to a closing movement (28) of the access member part from the open position to the closed position; an electromagnetic generator (48) arranged to be driven by the closing movement to generate electric energy; and a freewheel (58) arranged to disengage during the opening movement and to engage during the closing movement to drive the generator.
E05F 1/06 - Mécanismes ayant la forme de charnières, gonds ou pivots, manœuvrés par le poids du battant
E05F 1/12 - Mécanismes ayant la forme de charnières, gonds ou pivots, actionnés par ressorts
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide à freins à friction
E05F 3/18 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide à ressorts à action contraire
E05F 3/20 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide dans les charnières ou gonds
31.
ARRANGEMENT FOR ACCESS MEMBER, AND ACCESS MEMBER SYSTEM
An arrangement (18) for closing an access member (14) rotatable relative to a frame (12), the arrangement comprising a frame part (20) for fixation to the frame; an access member part (22) for fixation to the access member, the access member part being movable relative to the frame part between a closed position (26) and an open position (34); a movable element (24) movable between a first position (28) and a second position (36) relative to the frame part; a forcing device (52) arranged to force the movable element from the second position to the first position; and a cam transmission (42) comprising a cam profile (44) and a cam follower (46) arranged to follow the cam profile, the cam transmission being configured to transmit a movement of the movable element from the second position to the first position to a movement of the access member part from the open position to the closed position.
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
32.
SYSTEMS AND METHODS FOR DYNAMIC, POWER-EFFICIENCY-BASED CRYPTOGRAPHIC PROTOCOL NEGOTIATION WITH INTERNET OF THINGS (IOT) DEVICES
Disclosed herein are systems and methods for dynamic, power-efficiency -based cryptographic-protocol negotiation with Internet of Things (loT) devices. In an embodiment, a computer system (e.g., an identity-management system) receives, from an loT device, a device-side authentication-initiation message containing a unique device identifier of the loT device. The computer system uses the unique device identifier of the loT device to identity, from a stored power-efficiency reference table, a suitable cryptographic security protocol for the loT device. The computer system transmits, to the loT device, a server-side authentication-initiation message containing an indication of the identified protocol, and the computer system authenticates the loT device according to the identified protocol.
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
33.
PROVIDING A CREDENTIAL FOR USE WITH AN ELECTRONIC LOCK
It is provided a method for providing a credential for use with an electronic lock (7) to access to restricted physical space (16). The method comprises: receiving (40) a credential that unlocks the electronic lock (7); generating (42) a credential identifier associated with the credential; sending (44) the credential identifier to an EAC (5); receiving (46), from an electronic wallet provider (6), a request for the credential, wherein the request comprises the credential identifier; packaging (48) the credential, resulting in packaged credential, wherein the packaging complies with a format, selected from a plurality of formats for different electronic wallet providers, corresponding to the electronic wallet provider from which the request is received, enabling the credential to be provided to an electronic wallet in a user device (2) for unlocking the electronic lock (7); and sending (50) the packaged credential to the electronic wallet provider (6).
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
34.
RFID DEVICE AND METHOD OF MANUFACTURING A MAIN ANTENNA OF AN RFID DEVICE
The present disclosure refers to an RFID device (1) and a method of manufacturing a main antenna (10) of an RFID device (1). The RFID devices (1) comprises a substrate (5), a main antenna (10) embedded in the substrate (5), and a chip module (15) including an integrated circuit (16) and a chip antenna (20) electrically connected to the integrated circuit (16). The main antenna (10) is inductively coupled to the chip antenna (20) and formed by multiple single-strand wires (25) extending adjacent to each other.
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
D06H 1/04 - Marquage des matériaux textiles; Marquage combiné à la mesure ou à la visite par fixation de fils, étiquettes ou analogues
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p.ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
H01Q 1/22 - Supports; Moyens de montage par association structurale avec d'autres équipements ou objets
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
35.
PERSONALIZABLE SECURITY DOCUMENT AND METHOD OF MANUFACTURING THE SAME
A personalizable security document (10) includes a security feature (3b) including a combination of a plurality of different features. In particular, the security feature (3b) may include a laser-engraved image in a first layer (16), and one or more fluorescent inks (7a, 7b) in further layers (27a, 27b), which are disposed below the first layer. Optionally, a watermark (8) may also be provided in a lower layer (18). A laser-engraving of the image is performed from a first side (SI) of the substrate (1) such that patterns formed by the inks (7 a, 7b) are not affected. Under white light, the laser-engraved image can be viewed from the first side of the substrate, whereas multi-color fluorescence of the patterns can be observed from the second side (S2) under UV light.
It is provided an electronic lock (12) for controlling access to a restricted physical space (16). The electronic lock (12) comprises: electronically-controllable lock hardware (68); a system-on-chip, SoC, (61) comprising a processor (60) and memory (64). The SoC (61) comprises: a trusted environment (67a) comprising a secure data storage (22) and a lock-core software module (20) comprising instructions that, when executed by the processor, cause the electronic lock (12) to: evaluate access for a user (6) based on data stored in the secure data storage (22) and control the lock hardware (68) based on the evaluation; and an untrusted environment (67b) comprising untrusted software (25, 26) that is prevented from bypassing the lock-core software module (20) to control the electronically-controllable lock hardware (68).
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/87 - Boîtiers fiables ou inviolables par encapsulation, p.ex. de circuits intégrés
G06F 21/74 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information opérant en mode dual ou compartimenté, c. à d. avec au moins un mode sécurisé
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
An actuating device (12a, 12b, 12c) for a lock device (10) comprising a stationary structure (90) having a credential receiver (40) for receiving a credential input (42) from a user; an actuating element (16) rotatable about an actuation axis (18) relative to the stationary structure by direct manipulation by the user, where the stationary structure is arranged at least partly inside the actuating element; a locking member (24) movable between a locked position (106) and an unlocked position (no); and an electromechanical transfer device (y2a-y2c) arranged, based on the credential input, to adopt a disabled state (104), in which the locking member cannot be moved from the locked position to the unlocked position by rotation of the actuating element, and an enabled state (108) in which the locking member can be moved from the locked position to the unlocked position by rotation of the actuating element; wherein the credential receiver is at least partly arranged radially inside the actuating element with respect to the actuation axis.
It is provided a method for finding faults in firmware for a lock device. The method is performed by a test device. The method comprises the steps of: receiving data indicating an event that results in operation of the firmware in a test lock device, the test lock device being capable of performing at least some of the functions of the lock device; sampling a plurality of measurements that are indicative of power use by the test lock device over time, wherein the measurements are captured to cover at least part of the operation of the firmware by the test lock device based on the event; and determining that a potential fault occurs in the firmware for the event when the sampled measurements fail to correspond to the event, based on previously recorded data for the same type of event.
A method of integrating a logical access control system with a physical access control system is disclosed. A soft token is received at a hardware accessory from a client device of a user. The soft token includes a payload. The payload includes information about the user that is stored in a user profile of the logical access control system. Based on a verifying of the soft token using a certificate extracted from a trust store of the hardware accessory, the information about the user that is included in the payload is parsed. Based on the information about the user satisfying one or more access criteria of a reader associated with a physical access control system, the reader is triggered. The triggering includes emulating a transaction associated with the physical access control system.
Systems and methods may be used for preconditioning a model, such as for face recognition. The preconditioning may include obtaining a set of facial images, generating, from a plurality of facial images of the set, a plurality of sets of cropped images, each cropped image in the plurality of sets of cropped images including a portion of a face of an image representing a respective set, and preconditioning a machine learning model using the plurality of sets of cropped images. The machine learning model may be refined, such as using a labeled set of captured images of real faces, in an example.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
It is provided a method for providing a privacy-enhanced delegated access right to unlock a physical lock. The method comprises: obtaining a derivation scalar; receiving a cryptographically signed delegation from the delegator device, the delegation being a data object comprising a public key of the delegator device, a public key of the physical lock, and a derived public key for the delegatee device, and wherein the delegation is cryptographically signed using a secret key that is paired with the public key of the delegator device; obtaining a source secret key for the delegatee device, the source secret key being paired with the source public key; calculating a derived secret key for the delegatee device using the source secret key for the delegatee device and the derivation scalar; providing the delegation to the physical lock; and authenticating the delegatee device with the physical lock using the derived secret key.
It is provided a method for handling access rights for access to a physical space (16a-g), comprising: communicating (40) with a credential (2) of a user (5), based on short-range wireless communication; determining (42) that the credential (2) does not currently have access rights to access the physical space (16a-g); finding (44) a communication address to a superior (6) to the user (5); generating (46) an increased-access request message, comprising a link that, when activated, adds a first access role to the user (5); sending (48) the increased-access request message to the address of the superior (6); receiving (50) an indication that the superior has activated the link, adding the first access role to the user (5); and granting (52) access for the user (5) to the physical space (16a-g).
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
It is provided a people detector for detecting when people pass through a doorway of a door by which the people detector is installed. The people detector comprises: a people sensor; a processor; and a memory storing instructions that, when executed by the processor, cause the people detector to: receive a door status signal indicating opening status of the door; determine when a person passes through the doorway based on the people sensor and the door status signal.
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
E05F 15/73 - Mécanismes pour battants mus par une force motrice avec déclenchement automatique sensible au déplacement ou à la présence de personnes ou d’objets
44.
BRAKE DEVICE, ARRANGEMENT FOR CONTROLLING MOVEMENTS OF ACCESS MEMBER, AND ACCESS MEMBER SYSTEM
A brake device (12a, 12b) comprising a hard magnet (20); a soft magnet (22) configured to switch polarity between a first polarity and a second polarity when being subjected to a magnetic field and configured to maintain the polarity when the magnetic field is removed; an electric coil (24) located around the soft magnet; an electric control system (16) configured to apply a current pulse to the electric coil to generate the magnetic field for changing the polarization of the soft magnet; and a brake element (18) comprising a magnetic target section (28), the brake element being arranged to move to a released position (40) when the soft magnet adopts the first polarity, and arranged to move to a braking position (64) due to a magnetic field generated by the hard magnet and the soft magnet in combination and acting on the magnetic target section when the soft magnet adopts the second polarity.
It is provided a method for enabling training of a machine learning, ML, model, for monitoring a person based on a data feed capable of depicting a person. The method is performed by a training data provider (i). The method comprises: obtaining (40) a data feed capable of depicting the person; selecting (42) a level of anonymisation, from a plurality of levels of anonymisation; anonymising (44) the data feed according to the selected level of anonymisation, resulting in a processed data feed; and transmitting (47) the processed data feed as training data for training a central ML model in a central node. Different levels of anonymisation are available and a change in level can be requested by the central node.
G08B 21/04 - Alarmes pour assurer la sécurité des personnes réagissant à la non-activité, p.ex. de personnes âgées
G08B 29/24 - Auto-étalonnage, p.ex. pour la correction de la dérive ambiante ou du vieillissement de composants
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 29/18 - Prévention ou correction d'erreurs de fonctionnement
A method of provisioning an authentication device of an authentication system comprises sending an authentication application from an authentication system backend server to a backend network of a cellular network operator; verifying, by the backend network of the cellular operator, the authentication application and including the authentication application in an operator profile; sending the authentication application with the operator profile from the backend network of the cellular network operator to a local profile assistant (LPA) of the authentication device; and installing the authentication application in a secure zone of the authentication device using the LPA.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 8/20 - Transfert de données utilisateur ou abonné
A method of encoding a credential device of an authentication system comprises sending credential device information to a backend server of the authentication system using a mobile device, verifying ownership of the credential device and the mobile device using the backend server, generating, using the backend server, a quick response (QR) code that includes encoding information for the credential device, generating using the backend server a quick response (QR) code that includes encoding information for the credential device, decoding the QR code to retrieve the encoding information, and encoding the credential device with the encoding information.
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
A method of operating an access control system comprises detecting one or more physical access portals using an application of a mobile device; displaying notifications for the one or more physical access portals on a display screen of the mobile device; receiving a selection of a physical access portal using a user interface of the mobile device; establishing a secure communication channel with a secure relay device associated with the selected physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the selected physical access portal according to the encrypted access token.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
G06F 21/44 - Authentification de programme ou de dispositif
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method of operating an access control system comprises receiving, by a mobile device, an identification of a physical access portal; verifying access credential information stored in the mobile device using a verification application of the mobile device; establishing a secure communication channel with a secure relay device associated with the physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the physical access portal according to the encrypted access token.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/20 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p.ex. des cartes à puce
50.
FACIAL EXPRESSION TO AUGMENT FACE ID AND PRESENTATION ATTACK DETECTION
A system, computer readable medium, and method are configured to control access to a secure asset. A scanning system includes a lens system configured to sense light rays and a sensor board configured to capture image data. An electronic memory is configured to store a credential of a subject and a gesture key sequence. A processor is configured to acquire images over time of a biometric presentation of the subject, identify at least one of the images as corresponding to the subject, access the gesture key sequence from the electronic memory, identify gestures performed over time by the subject in the images, compare the gestures as identified to the gesture key sequence, and grant access to the secure asset to the subject based on the gestures as identified matching the gesture key sequence and the subject being identified in at least one of the images.
It is provided a method for enabling access, using a temporary passcode (25. 25a-f), to a physical space (16) secured by an electronic lock (12). The method is performed in a passcode provider (1). The method comprises: synchronising (40) with the electronic lock (12) to align times for temporary passcode generation; receiving (42) a signal to provide a temporary passcode for unlocking the electronic lock; determining (44) a temporary passcode, the temporary passcode being valid only until an end time at the electronic lock (12); and providing (46) the temporary passcode for forwarding to a temporary passcode recipient.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
It is provided a method a method for identifying a health emergency of a user. The method is performed in a behaviour determiner. The method comprises: obtaining, from an access control system, access data of the user, the access data indicating when the user has accessed an electronic lock in the access control system to gain access to a physical space secured by the electronic lock; determining that the access data indicates a health emergency; and transmitting an alert message, indicating the health emergency for the user.
Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).
G01C 21/20 - Instruments pour effectuer des calculs de navigation
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H04W 4/33 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les environnements intérieurs, p.ex. les bâtiments
H04W 12/63 - Sécurité dépendant du contexte dépendant de la proximité
It is provided a method for enabling training of a hidden Markov model, HMM, for monitoring a person based on a data feed capable of depicting a person. The method is performed by a local training device (1) and comprises: receiving (40) a central HMM from a central node (9); obtaining (42) a data feed capable of depicting the person; training (44) the received HMM based on the data feed, resulting in a locally trained HMM; transmitting (46) the locally trained HMM to the central node (9) for aggregation with other locally trained HMMs; receiving (48) an updated HMM from the central node (9); and assigning (50) each state in the updated HMM to one state of a set of monitoring states, wherein each monitoring state indicates a state of the person.
A coupling arrangement (12) for a lock device (10), the coupling arrangement comprising an input and an output element (14, 18) rotatable about a rotation axis (16); an engaging member (34) movable between a first and second position (80, 88); an electric motor (36) arranged to affect movement of the engaging member between the first and second position; a coupling member (38) rotationally locked to the input element and axially movable relative to the input element between a decoupled position (82), where a rotation of the input element is not transmitted by the coupling member to a rotation of the output element, and a coupled position (90), where a rotation of the input element is transmitted by the coupling member to a rotation of the output element; and a transmission mechanism (56) arranged to transmit a rotation of the coupling member to a movement of the coupling member from the decoupled position to the coupled position when the engaging member adopts the second position.
An actuator (10a-10d) comprising a primary core member (12) having a first and second primary section (44, 46) and a primary coil section (48), the primary core member being arranged to adopt a first and second primary polarity; a primary electric coil (30) wound around the primary coil section and arranged to provide the first and/or second primary polarity in the primary core member; a secondary core member (14) having a first and second secondary section (50, 52), the secondary core member being arranged to adopt a first and second secondary polarity; and a movable member (16) comprising at least one magnet (20, 84, 86) and being movable between a first position (18), in which the at least one magnet is magnetically forced towards the first primary section and towards the first secondary section, and a second position (40), in which the at least one magnet is magnetically forced towards the second primary section and towards the second secondary section.
H02K 33/12 - Moteurs avec un aimant, un induit ou un système de bobines à mouvement alternatif, oscillant ou vibrant avec des induits se déplaçant dans des directions opposées par alimentation alternée de systèmes à deux bobines
H01F 7/122 - Guidage ou positionnement d'armatures, p.ex. maintien des armatures dans leur position extrême au moyen d'un aimant permanent
Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
H04W 12/63 - Sécurité dépendant du contexte dépendant de la proximité
58.
MULTIPLE TAMPER DETECTION TECHNIQUES FOR SECURE ACCESS DEVICE
Techniques for detecting tapering of a physical access control device or a barrier secured by the physical access control device are provided. In an example, an apparatus to control physical access to a secure area via an opening can include multiple tamper sensors. The controller can generate a tamper signal based on a discrepancy between signals received form the multiple tamper sensors and one or more profile signals.
It is provided a method for providing training data for a machine learning model for monitoring a person based on video data. The method is performed by a training data provider (1). The method comprises: obtaining (40) a data feed of the person, wherein the data feed comprises a series of images that preserves a privacy of the person; generating (42) fake video data of a fictive person, such that a face of the fake video data is a computer-generated face; combining (44) the data feed with the fake video data, resulting in training data; and providing (46) the training data for training the machine learning model.
It is provided a method for configuring access rights for an electronic key (2) forming part of an access control system (10) comprising a plurality of electronic locks (12a-c, 13a-c, 14a-c) for securing access to respective physical spaces. The method is performed in a configuration device (1) and comprising: setting (40) a baseline configuration of access rights for the electronic key (2); receiving (42) access data, indicating at least one instance of the electronic key (2) being granted access by one of the plurality of electronic locks (12a-c, 13a-c, 14a-c); and adjusting (44) the configuration of access rights for the electronic key to restrict access compared to the baseline configuration, based on the access data.
A method of device authentication comprises transmitting a data stream from a first endpoint device to a second endpoint device. The data stream includes a first data stream portion including unencrypted data that includes an ephemeral public key of an ephemeral key pair, and an encryption algorithm identifier; a second data stream portion including encrypted data that includes a first counter value and an identity of the first endpoint device; and a third data stream portion including encrypted data that includes a second counter value and an identity of the second endpoint device. The method of device authentication further comprises the second endpoint device authenticating the first endpoint device using the first, second, and third data stream portions.
It is provided a method for enabling training a machine-learning, ML, model for trigger-word detection, the method being performed in a training data provider (1). The method comprises: receiving (40) sound-based data, the sound-based data being based on sounds captured in a space to be monitored; determining (42) that the sound-based data corresponds to a trigger word, and labelling this sound-based data to correspond to the trigger word; and providing (44) the labelled sound-based data to train the ML model.
G10L 15/06 - Création de gabarits de référence; Entraînement des systèmes de reconnaissance de la parole, p.ex. adaptation aux caractéristiques de la voix du locuteur
G10L 15/18 - Classement ou recherche de la parole utilisant une modélisation du langage naturel
G10L 15/30 - Reconnaissance distribuée, p.ex. dans les systèmes client-serveur, pour les applications en téléphonie mobile ou réseaux
G10L 25/24 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant le cepstre
63.
CONTROLLING ACCESS BASED ON A MACHINE-LEARNING MODEL
It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
64.
SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS
Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
H04L 1/18 - Systèmes de répétition automatique, p.ex. systèmes Van Duuren
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
65.
ACCESS CONTROL WITH FACE RECOGNITION AND HETEROGENEOUS INFORMATION
The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
66.
PROVIDING DATA FOR TRAINING A MACHINE LEARNING MODEL
It is provided a method for providing data for training a machine learning model. The method is performed in a training data provider (l) and comprises the steps of: obtaining (40) a data structure comprising a chain of delegations, the chain of delegations covering a delegation path from a media capturing device (3) to the training data provider (1) such that, in the chain of delegations, each delegation is a delegation from a delegator to a receiver; sending (42) a key request to a delegation verifier (2), the key request comprising the data structure; receiving (44) a decryption key from the delegation verifier (2); obtaining (46) encrypted media data captured by the media capturing device (3); decrypting (48) the encrypted media data, resulting in decrypted media data; and providing (50) the decrypted media data for training the machine learning model.
G08B 21/02 - Alarmes pour assurer la sécurité des personnes
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicales; TIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p.ex. basé sur des systèmes experts médicaux
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
A verifier device of an authentication system comprises physical layer circuitry and processing circuitry coupled to the physical layer circuitry. The processing circuitry is configured to encode an authentication command for sending to a credential device; decode a response communication received from the credential device, wherein the response communication includes a first random number; encrypt the first random number, a second random number, and verifier keying material for sending to the credential device; decrypt encrypted information received from the credential device, wherein the encrypted information includes the first random number, the second random number, and receiver keying material; and calculate a session encryption key using the verifier keying material and the receiver keying material.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
68.
ARRANGEMENT FOR LOCK DEVICE, LOCK DEVICE COMPRISING ARRANGEMENT, AND METHOD
An arrangement (10, 82) for locking and unlocking a lock device (58, 74), the arrangement (10, 82) comprising a transfer element (12) movable between a protruded position (42) and a retracted position (56); a core member (14) of soft magnetic material, the core member (14) comprising a coil section (20); an electric coil (16) wound around the coil section (20); and a blocking member (48) comprising a magnet (18), the blocking member (48) being movable between a blocking position (50), in which the magnet (18) establishes a magnetic circuit through the coil section (20) and the blocking member (48) blocks movement of the transfer element (12) to the retracted position (56), and an unblocking position (54), in which the magnet (18) establishes a magnetic circuit through the coil section (20) and the blocking member (48) unblocks movement of the transfer element (12) to the retracted position (56). A lock device (58, 74) comprising an arrangement (10, 82), and a method of controlling a lock device (58, 74), are also provided.
An arrangement (10) for a lock device (88a, 88b), the arrangement (10) comprising an input member (12, 106); a coupling member (26) movable between an uncoupled position (34) and a coupled position (80); an electromechanical actuator (28) comprising an actuating member (42) linearly movable between an uncoupling actuating position (44) and a coupling actuating position (78); and a torsion spring (30) having a first leg (62) and a second leg (64) movable away from each other against a deformation of the torsion spring (30), wherein the actuating member (42) is arranged to engage the first leg (62) and the second leg (64) is arranged to engage the coupling member (26) when the coupling member (26) is in the uncoupled position (34) and the actuating member (42) moves from the uncoupling actuating position (44) to the coupling actuating position (78). A lock device (88a, 88b) comprising an arrangement (10) is also provided.
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
E05B 47/06 - Commande des pênes à fonctionnement mécanique par des cliquets à déclenchement électro-magnétique
F16D 11/14 - Embrayages dans lesquels les organes ont des parties qui se pénètrent mutuellement avec des organes d'embrayage mobiles selon l'axe uniquement
E05B 15/04 - Dispositifs à ressorts dans les serrures
70.
SYSTEM, LOCK DEVICE AND KEY DEVICE BASED ON MAGNET AND MAGNETICALLY CONTROLLABLE SWITCH
It is provided a system comprising a lock device and a key device for use in access control to a physical space. The key device comprises: an electronic key module configured to communicate with an electronic lock module of the lock device for access control; and a permanent magnet configured to close a magnetically controllable switch of the lock device to thereby power an electronic lock module of the lock device. The lock device comprises: the electronic lock module configured to communicate with the electronic key module to evaluate whether to grant access; a power source; and the magnetically controllable switch provided between the power source and the electronic lock module such that the magnetically controllable switch is closable by the permanent magnet of the key device to power the electronic lock module.
A reader device of an access control system comprises physical layer circuitry and processing circuitry. The processing circuitry is operatively coupled to the physical layer circuitry and is configured to initiate transmission of a command to a credential device; determine a time duration from sending the command to the credential device to receiving a response to the command from the credential device; and generate an indication when the time duration exceeds a relay attack detection threshold time duration.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
An actuating device (12) comprising a stationary structure (20); an actuating element (22) rotatable relative to the stationary structure (20); an electric power source (24, 82); a spindle (26) arranged to be rotated by rotation of the actuating element (22); a locking member (28) movable between a locked position (66) and an unlocked position (86); an electromechanical transfer device (30, 84) arranged in the spindle (26), the transfer device (30, 84) being configured to adopt a locked state (68) and an unlocked state (78); a receiver device (34) fixed with respect to the spindle (26), the receiver device (34) being electrically connected to the transfer device (30, 84); and a transmitter device (32) fixed with respect to the stationary structure (20) and arranged to be electrically powered by the power source (24, 82), the transmitter device (32) being configured to wirelessly transmit power to the receiver device (34).
A computing machine accesses conventional image data comprising a photograph of a first person. The computing machine converts, using a conventional image neural network adapter engine, the conventional image data into a model data format representing the first person, wherein the model data format is a format that is standardized for both conventional image data and stereo pair image data. The computing machine generates, using a biometric task neural network engine and based on the model data format data representing the first person, a task output representing the first person. The computing machine transmits a representation of the task output representing the first person.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
74.
ARRANGEMENT FOR CONTROLLING MOVEMENTS OF ACCESS MEMBER, ACCESS MEMBER, FRAME, ACCESS MEMBER SYSTEM AND METHOD
An arrangement (16) for controlling movements of an access member (12) relative to a frame (14), the arrangement (16) comprising a base section (18) for connection to either the access member (12) or the frame (14); a fixation part (20) for connection to the other of the access member (12) and the frame (14); a flexible elongated element (22) configured to be tensioned to thereby force the base section (18) and the fixation part (20) to move towards each other in a relative closing movement (86); and a braking device (82) arranged to brake a speed of the relative closing movement (86).
E05F 1/02 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par gravité
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide à freins à friction
E05F 15/627 - Mécanismes pour battants mus par une force motrice utilisant des actionneurs électriques utilisant des électromoteurs rotatifs pour battants pivotants manœuvrés par des éléments de traction allongés souples, p.ex. des bandes, des chaînes ou des câbles
75.
ARRANGEMENT FOR CONTROLLING MOVEMENTS OF ACCESS MEMBER, ACCESS MEMBER, FRAME, AND ACCESS MEMBER SYSTEM
An arrangement (16) for controlling movements of an access member (12) relative to a frame (14), the arrangement (16) comprising a base section (18) for connection to either the access member (12) or the frame (14); a fixation part (20) for connection to the other of the access member (12) and the frame (14); a connection device (22, 64) arranged between the base section (18) and the fixation part (20), and connected to the base section (18) and the fixation part (20); a closing force device (44) configured to exert a force on the connection device (22, 64) to thereby force the base section (18) and the fixation part (20) to move towards each other in a relative closing movement (60); and a magnet (50) arranged to force the base section (18) and the fixation part (20) towards each other by means of magnetic force.
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p.ex. ralentisseurs; Structure des dispositifs de freinage pneumatique ou à liquide à freins à friction
E05F 5/02 - Dispositifs de freinage, p.ex. ralentisseurs; Butées; Tampons particulièrement pour éviter le claquement des battants
76.
DETERMINING WHEN A PORTABLE KEY DEVICE IS LOCATED ON A FRONT SIDE OR ON A BACK SIDE
It is provided a method for determining when a portable key device is located on a front side or on a back side in relation to a barrier secured by an electronic lock. The method is performed in a location determiner and comprises the steps of: obtaining a channel impulse response, CIR, based on an impulse signal transmitted from the portable key device, the CIR being based on a plurality of samples of the impulse signal as received by an antenna being fixedly mounted in relation to the electronic lock; and determining, based on the CIR, whether the portable key device is located on the front side or on the back side.
It is provided a location determiner comprising: a first antenna; a radio signal modification device, wherein the radio signal modification device is configured to improve an ability to determine whether the portable key device is located on a back side or on a front side of the location determiner, based on obtaining a channel impulse response, CIR, of an impulse signal transmitted from the portable key device, wherein the location determiner is installable such that the back side is in a space being restricted by selectively unlockable a physical barrier and the front side is opposite the back side.
A test system comprises a radio frequency (RF) shielded container, the shielded container to house a UWB receiver device under test; an RF antenna arranged within the RF shielded container; and a UWB transmitter device operatively coupled to the RF antenna. The UWB transmitter device is configured to transmit a UWB signal within the RF shielded container using the antenna, wherein the transmitted UWB signal is representative of multi- path components (MPCs) of resulting signals in an end-use environment of the UWB receiver device resulting from transmitting a UWB ranging signal in the end-use environment.
A bumping preventing arrangement (10) for a lock device (38, 52, 68), the bumping preventing arrangement (10) comprising a transfer member (12, 46, 64, 74) having a magnet (14), the transfer member (12, 46, 64, 74) being movable along an actuation axis (18) between a locked position (16) and an unlocked position (36); a plurality of electric conductors (20), each electric conductor (20) enclosing the actuation axis (18); and a plurality of switches (22), each switch (22) being associated with a respective electric conductor (20), and being arranged to selectively close an electric circuit comprising the associated electric conductor (20) such that eddy currents are induced in the electric conductors (20) when the magnet (14) moves along the actuation axis (18) from the locked position (16) towards the unlocked position (36). A lock device (38, 52, 68) and a method of controlling a lock device (38, 52, 68) are also provided.
A reader device of a physical access control system comprises an ultra-wide band (UWB) physical layer and processing circuitry. The processing circuitry is operatively coupled to the UWB physical layer and is configured to: receive access credential information from a separate second device; receive ranging information from the second device; grant access through a physical portal according to the access credential information and ranging information; determine a number of people intending to pass through the physical portal; and generate an indication according to the determined number.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/15 - Barrières mobiles avec moyens d’enregistrement munies de dispositions empêchant le passage de plus d’une personne à la fois
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
81.
ENABLING DETERMINATION OF PROXIMITY BASED ON DETECTABLE PROXIMITY DETERMINERS
It is provided a method for enabling determination of proximity of a mobile device (2a, 2b) to a selected proximity determiner (3a). The method comprises the steps of: determining a base set of proximity determiners (3b-e) whereby an enlarged set of proximity determiners is defined as the selected proximity determiner and the base set of proximity determiners; receiving beacon measurements of signal strength of other proximity determiners in the enlarged set of proximity determiners; generating a two-dimensional graph based on the beacon measurements; receiving respective device measurements indicating signal strength of a signal from the mobile device at each proximity determiner in the enlarged set of proximity determiners; finding an optimum in a space defined by the two- dimensional graph; and determining the most probable position of the mobile device in the graph based on the optimum.
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
82.
ENABLING DETERMINATION OF PROXIMITY OF A MOBILE DEVICE BASED ON DETECTABLE BEACON DEVICES
It is provided a method for enabling determination of proximity of a mobile device (2a, 2b) to a beacon device (3a). The method is performed by a proximity determiner (1) and comprises the steps of: determining a set of beacon devices (3a-e) being detectable from the mobile device; obtaining beacon measurements of one or two beacon devices in each pair; generating a two-dimensional graph based on the beacon measurements; obtaining device measurements of signal strength of beacons from the beacon devices in the set of beacon devices; finding an optimum in a space defined by the two- dimensional graph; and determining the most probable position of the mobile device in the graph based on the optimum.
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
It is provided a protection circuit for protecting a battery comprising a plurality of lithium primary cells. The protection circuit comprises: a switch configured to control when the battery supplies power to a load; and a control circuit being configured to: detect, at a first point in time, when a voltage across at least part of the battery falls below a threshold voltage; and open the switch when the voltage across at least part of the battery is remains below the threshold voltage during a preconfigured duration from the first point in time, wherein the opening of the switch is irreversible.
It is provided a key reader comprising: a key interface for communicating with an electronic key; a wire-based power interface for receiving power over a wire pair; wherein the wire-based power interface is configured to also be used for bi-directional communication by modulating and demodulating the communication over the wire pair used for receiving power; and a wireless interface for providing a short-range wireless communication channel with one or more external devices.
An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/03 - Détection ou correction d'erreurs, p.ex. par une seconde exploration
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
86.
NEAR FIELD WITH FAR FIELD TO VERIFY THAT DEVICE IS CONNECTED OR SECURED
The present disclosure relates to a method to check if a connector system with a Connector Position Assurance ("CPA") member (9) is in closed position. The method includes providing an RFID-tag reader (6) that is positioned at a distance D to the integrated circuit (10) enabling far-field RFID communication and not permitting near-field RFID communication. Further, the method includes checking the readability of the integrated circuit (10) with the RFID-tag reader (6) and issuing an alert signal if the integrated circuit (10) is not readable by the RFID-tag reader (6) indicating that the CPA member (9) is not in the closed position.
H01R 13/639 - Moyens additionnels pour maintenir ou verrouiller les pièces de couplage entre elles après l'engagement
H01R 13/641 - Moyens pour empêcher, bloquer ou éviter le couplage incorrect par l'indication d'un engagement complet ou correct
H01R 43/26 - Appareils ou procédés spécialement adaptés à la fabrication, l'assemblage, l'entretien ou la réparation de connecteurs de lignes ou de collecteurs de courant ou pour relier les conducteurs électriques pour engager ou séparer les deux pièces d'un dispositif de couplage
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H01R 13/66 - Association structurelle avec des composants électriques incorporés
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
An actuating device (12) comprising an actuating element (14); an electric generator (16); and an electromechanical coupling device (18) configured to adopt a decoupled state, for decoupling the actuating element (14) from a locking member (22), and a coupled state, for coupling the actuating element (14) to the locking member (22); wherein the coupling device (18) comprises a blocker (26), a holder (38) and a release mechanism (40); wherein the holder (38) is arranged to adopt a holding position, in which the holder (38) holds the blocker (26), when the coupling device (18) adopts the coupled state; wherein the holder (38) is arranged to adopt a released position, in which the holder (38) does not hold the blocker (26), when the coupling device (18) adopts the decoupled state; and wherein the release mechanism (40) is arranged to mechanically force the holder (38) from the holding position to the released position by manual rotation of the actuating element (14) about the actuating axis (20).
This disclosure describes operations for operating a touch-sensitive keypad. The operations include: detecting, during a normal operating mode of the keypad, activation of one or more keys of the keypad, the normal operating mode causing the keypad to register a value corresponding to a given key when the given key is activated for a first amount of time; determining that the activation of the keys of the keypad satisfies a visual impaired mode criterion; in response to determining that the activation of the keys of the keypad satisfies the visual impaired mode criterion, transitioning the operating mode of the keypad from the normal operating mode to a visual impaired mode; and registering, during the visual impaired mode, the value corresponding to the given key in response to determining that the given key has been activated for a second amount of time that is longer than the first amount of time.
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p.ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
G09B 21/00 - Moyens d'enseignement ou de communication destinés aux aveugles, sourds ou muets
Methods and systems are provided for performing operations comprising: receiving, by a credential gateway from a client device, a request to obtain a digital credential for accessing a secure resource, the credential gateway being configured to coordinate an exchange of digital credentials associated with different secure resource types with a plurality of client devices; communicating the request to a server associated with the secure resource; receiving, by the credential gateway from the server associated with the secure resource, a data object that includes the digital credential; selecting, by the credential gateway, based on the data object, a security protocol from a plurality of security protocols; and providing, by the credential gateway, the digital credential to the client device in accordance with the selected security protocol.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
An RFID assembly (10) that includes both a UHF patch antenna (14) and an HF loop antenna (16) is provided. The patch antenna (14) and the loop antenna (16) are arranged inside a housing (50) in such a manner that the loop antenna (16) partially overlaps an end portion (18) of the patch antenna (14), thereby forming an extension of the patch antenna (14). In this manner, a performance of the UHF patch antenna (14) can be maintained despite decreasing the size of the same, while an interference between the patch antenna (14) and the loop antenna (16) can be suppressed, in particular, by providing a gap between the same.
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
91.
IMPROVING MACHINE LEARNING FOR MONITORING A PERSON
According to a first aspect, it is provided a method for training a machine learning model based on respective data feeds for monitoring a person, the method being performed by a machine learning device. The method comprises the steps of: determining, based on a first data feed and a first machine learning model, that the person is in a first state, wherein the first state is associated with a first label, wherein the first data feed is captured using a first data capturing device; and training a second machine learning model which is based on a second data feed, the second data feed at least partly overlapping the first data feed in time, the second data feed being captured using a second data capturing device, wherein the training comprises providing the first label to the second machine learning model.
According to a first aspect, it is provided a method for processing an input media feed for monitoring a person. The method is performed by a media processing device comprising a media capturing device. The method comprises the steps of: obtaining an input media feed using the media capturing device; providing the input media feed to a local artificial, AI, intelligence engine, to extract at least one feature of the input media feed; and transmitting intermediate results comprising the extracted at least one feature to train a central AI model, while refraining from transmitting the input media feed. The local AI engine forms part of the media processing device. The intermediate results comprise a label of the extracted at least one feature. The label is obtained from an end result of another local AI engine.
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
93.
DETERMINING WHEN AN UNLOCK PROCEDURE SHOULD BE PERFORMED BASED ON DISTANCE AND PROXIMITY
It is provided a method for determining when an unlock procedure of an electronic lock should be performed. The electronic lock controls access to a restricted physical space via an openable barrier. The method is performed in an intent determiner and comprises the steps of: obtaining a proximity indicator from a proximity sensor, the proximity indicator indicating when a person is proximate to the barrier in the restricted physical space; obtaining a distance indicator from a distance sensor, the distance indicator being indicative of distance between the electronic lock and a portable key device; determining when there is user intent to unlock only when the proximity indicator indicates that there is no person proximate to the barrier in the restricted physical space and when the distance indicator indicates a distance less than a distance threshold; and triggering an unlock procedure to be performed only when user intent has been determined.
It is provided an electronic lock for controlling access to a physical space secured by a barrier. The electronic lock comprises: a processor; a connector configured to receive power from a connected mobile phone, to thereby power the electronic lock; and a memory storing instructions that, when executed by the processor, cause the electronic lock to: communicate with a credential to evaluate whether access to the physical space is to be granted wherein the electronic lock is configured to perform a hard reset when a power source connects to the connector.
This disclosure describes techniques for updating firmware of a secure element. The techniques include operations comprising: receiving, by a gateway device, from a remote source, a firmware file; receiving, by a processing element implemented on the gateway device, ephemeral session specific key material for a first secure element implemented on the gateway device; dividing the firmware file into a plurality of data chunks; applying, by the processing element, the ephemeral session specific key material to a first data chunk of the plurality of data chunks to generate a first data packet; and sending, by the processing element, the first data packet to the first secure element.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/77 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les cartes à puce intelligentes
96.
DETUNING DETECTION AND COMPENSATION FOR INDUCTIVE COUPLING SYSTEMS
This disclosure describes techniques for operating an inductive coupling reader. The techniques include operations comprising: detecting a change in a resonance frequency of the inductive coupling reader; comparing the change in the resonance frequency to a threshold; determining that the change in the resonance frequency falls outside the threshold; and activating a compensation circuit to offset the change in the resonance frequency of the inductive coupling reader in response to determining that the change in the resonance frequency falls outside the threshold.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
97.
DYNAMIC FREQUENCY TUNING FOR INDUCTIVE COUPLING SYSTEMS
This disclosure describes techniques for operating an inductive coupling reader. The techniques include operations comprising: applying an excitation frequency to a resonance circuit of the inductive coupling reader; detecting a change to a resonance frequency of the resonance circuit of the inductive coupling reader; and in response to detecting the change to the resonance frequency of the inductive coupling reader, adjusting the excitation frequency being applied to the resonance circuit.
It is provided a method for configuring a target device. The method comprises the steps of: transmitting a configuration request message to the target device, the configuration request message comprising a configuration request and a request signature, wherein the request signature is based on the configuration request; receiving a configuration response message from the target device, the configuration response message comprising a configuration response and a response signature, wherein the response signature is based on the configuration response and the request signature; verifying the response signature to determine whether the configuration response message is valid, based on the configuration response, the request signature and a public key for the target device; and transmitting a configuration commit message to the target device only when the configuration response message is valid, the configuration commit message comprising a configuration commit indicator and a commit signature.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A secure image for a security document is generated by performing a rasterization process for each of a plurality of mono-color base images using a plurality of different threshold functions. For each base image, the plurality of threshold functions cover different intensity regions and result in a complex rasterization pattern depending on the intensity of the input image. The resulting binary images obtained by the rasterization process are combined using offset printing with fluorescent inks of different colors, to result in a multi-color fluorescent output image including a plurality of different complex rasterization patterns.
H04N 1/405 - Conversion en demi-teintes, c.à d. conversion du signal d'image d'un original à tons continus en un signal correspondant ne possédant que deux niveaux
100.
UPPER LAYER DEVICE ARCHITECTURE FOR ULTRA-WIDE BAND ENABLED DEVICE
A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.