Patent classifications
G07C2209/14
MULTI-FACTOR AUTHENTICATION ELECTRONIC LOCK SYSTEMS AND METHODS OF USING THE SAME
Present disclosure relates a multi-factor authentication electronic lock, a multi-factor authentication electronic lock system, and methods of using the multi-factor authentication electronic lock system. The multi-factor authentication electronic lock includes a user presence detection system, a biometrics authentication system, and a multi-factor authentication electronic lock controller. When a user approaches the multi-factor authentication electronic lock, the user presence detection system detects the presence of user and authenticates the user detected to determine whether the user detected is an authorized user registered. Once the user is determined to be the authorized users registered, the rest of the multi-factor authentication electronic lock including the biometrics authentication system and the multi-factor authentication electronic lock controller is powered on, and biometrics authentication system further authenticates the authorized user detected, and the multi-factor authentication electronic lock is operable only when the authorized user detected is authenticated again by the biometrics authentication system.
Multi-locking device using random password
Provided is a multi-locking device including a locking device management unit configured such that, when a user requests same to grant a right to open/close a door, same converts information regarding a granted right regarding the door into a QR code, outputs same, and provides same to the user, a door locking device configured to receive the information regarding a granted right regarding the door from the locking device management unit, and a QR code reader unit configured to receive the QR code from the user and provide same to the door locking device.
Identity Determination Using Biometric Data
A method for determining an identity of an individual is provided. The method can include receiving a first unique identifier from a first device associated with a first individual. The method can also include receiving biometric data associated with the first individual. The method can further include determining an identity of the first individual by filtering a database to generate a set of candidate identities. The database can include associations of a registered identity, a registered unique identifier, and registered biometric data for each of a plurality of individuals. Determining the identity of the first individual can also include comparing the received biometric data to registered biometric data in the database of at least one candidate identity, and selecting the identity from the set of candidate identities. The method can also include providing the identity. Related systems, apparatuses, and computer-readable mediums are also provided.
Geolocation based security in intrusion systems
Aspects of the invention are directed towards method and system for providing secure access to a user inside the premises. One or more embodiments of the invention describe receiving a user defined pre-access condition for a predetermined time by an input interface coupled to an intrusion panel. The pre-access condition for a user are authenticated and an authentication result is notified to a cloud server. The authentication is confirmed based on the pre-access condition together with geo-location information of the user within a defined geo-fencing boundary thereby satisfying dual authentication and transmitting the authentication result to the cloud server. A preset emergency notification and location tracking information are triggered on breach of the pre-access condition and/or geo-location information to a predefined user.
Easy unlocking method with safety using an electronic key and a biological feature
An unlocking method includes using an electronic key to execute a lock control app. An account number and a password are set and stored under guidance of the lock control app. A predetermined biological feature is inputted after login of the lock control app and is used to create an authenticated biological feature. The electronic key is used to match with a lock under guidance of the lock control app which is executed as a background program after matching is successful. An unlocking information is outputted to the lock when the authenticated biological feature matches with a biological feature inputted while the electronic key is connected to the lock. The lock switches to an unlocking state when the unlocking information is identified as being correct. When no biological feature is inputted while the electronic key is connected to the lock, the electronic key is disconnected from the lock.
FACE AUTHENTICATION APPARATUS
A face authentication apparatus includes a face image acquisition unit that acquires a face image of a user who passes through a first gate provided at a first boundary between zones, a collation unit that performs face authentication on the face image on the basis of a threshold, an operating state acquisition unit that acquires an operating state of a second gate provided at a second boundary that is different from the first boundary, and a threshold change unit that changes the threshold on the basis of the operating state of the second gate.
ENHANCED ENTRY AUTHORIZATION
Disclosed herein are apparatuses and methods for granting entry through a checkpoint. The implementations include receiving a request for entry of a person through a checkpoint. The implementations include estimating, via a thermal sensor, a body surface temperature of the person, and generating, via a user interface, a notification that prompts the person to answer at least one verification question. The implementations include receiving, via the user interface, at least one user response to the at least one verification question. The implementations include determining whether the at least one user response and the body surface temperature match criteria for gaining entry through the checkpoint. Additionally, the implementations include granting the request for entry in response to determining that the at least one user response and the body surface temperature match the criteria.
VEHICLE AND CONTROLLING METHOD THEREOF
A vehicle may include a camera configured to acquire a face image of a user approaching from outside the vehicle and a gesture image of the user; a communication module configured for communicating with a mobile device; a door locking device configured to lock a door of the vehicle or unlock the door of the vehicle; and a processor configured to perform user authentication based on the user's surface image, and unlock the door when the user authentication is successful, and the processor may be configured to control the communication module to transmit the user's face image to a pre-registered mobile device when the user authentication fails a preset number of times, control the communication module to receive an emergency access signal from the pre-registered mobile device, and control the door locking device to unlock the door when a user's gesture image satisfies an unlock condition.
SYSTEMS AND METHODS FOR ACCESS CONTROL USING MULTI-FACTOR VALIDATION
Aspects of the present disclosure provide systems and methods for access control using multi-factor validation. In an example, an access control system is designed to be used in conjunction with a first recognition system, such as facial recognition system, a gait recognition system, or audio recognition system, that uses a confidence level to determine whether individuals are authorized to access a restricted area. When the first recognition system is unable to confidently identify the individual, a second recognition system, such as a mobile device system or access card system, may be used to provide second factor verification. Further, stored recognition data may be updated to include information gathered by the first recognition system in response to use of the second factor verification.
Reducing latency in a passive entry system of a vehicle
Exemplary embodiments described in this disclosure are generally directed to systems and methods for reducing latency in a passive entry system of a vehicle. In an exemplary method, a computer detects a presence of a passive entry device inside a passive entry zone of the vehicle. The passive entry device may be a phone-as-a-key (PaaK) device or a key fob, and the passive entry zone is an area around the vehicle that is monitored by a wireless detection system of the vehicle. The computer authenticates the passive entry device, which can include determining an identity of an individual authorized to use the passive entry device. Upon successful authentication, the computer may unlock a door of the vehicle and provide a visual prompt to the individual to unlatch the unlocked door. The visual prompt can include an unlatch icon displayed upon a door access panel of the vehicle.