G07C9/22

Machine learning-based platform for user identification

A system and method are disclosed for identifying a user based on the classification of user movement data. An identity verification system receives a sequence of motion data from a mobile device operated by a target user. From the sequences of motion data, the identity verification system identifies a plurality of identity blocks representing different movements performed by the target user and encodes a set of signature sequences from each identity block into a feature vector. Each feature vector is input to a confidence model to output an identity confidence value for an identity block. An identity confidence value describes a confidence that the movement in the identity block was performed by the target user. The identity confidence value is compared to an operational security threshold and if identity confidence value is above the threshold, the target user is granted access to an operational context.

Machine learning-based platform for user identification

A system and method are disclosed for identifying a user based on the classification of user movement data. An identity verification system receives a sequence of motion data from a mobile device operated by a target user. From the sequences of motion data, the identity verification system identifies a plurality of identity blocks representing different movements performed by the target user and encodes a set of signature sequences from each identity block into a feature vector. Each feature vector is input to a confidence model to output an identity confidence value for an identity block. An identity confidence value describes a confidence that the movement in the identity block was performed by the target user. The identity confidence value is compared to an operational security threshold and if identity confidence value is above the threshold, the target user is granted access to an operational context.

UPPER LAYER DEVICE ARCHITECTURE FOR ULTRA-WIDE BAND ENABLED DEVICE

A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.

UPPER LAYER DEVICE ARCHITECTURE FOR ULTRA-WIDE BAND ENABLED DEVICE

A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.

ENABLING REMOTE UNLOCK OF A LOCK
20220375288 · 2022-11-24 ·

It is provided a method for enabling remote unlock of a lock securing access to a physical space. The method is performed in a server and comprises the steps of: receiving, from a first mobile device, an access request to unlock a lock, wherein the request comprises an identifier of the lock and a user identifier associated with an access requester, being a user of the first mobile device; finding a remote credential device being associated with the lock; and transmitting an access request to the remote credential device, the access request comprising an identifier based on the user identifier.

ENABLING REMOTE UNLOCK OF A LOCK
20220375288 · 2022-11-24 ·

It is provided a method for enabling remote unlock of a lock securing access to a physical space. The method is performed in a server and comprises the steps of: receiving, from a first mobile device, an access request to unlock a lock, wherein the request comprises an identifier of the lock and a user identifier associated with an access requester, being a user of the first mobile device; finding a remote credential device being associated with the lock; and transmitting an access request to the remote credential device, the access request comprising an identifier based on the user identifier.

LOCKER APPARATUS, ASSOCIATED METHOD AND ASSOCIATED COMPUTER PROGRAM
20220375289 · 2022-11-24 ·

A locker apparatus, method and computer program are provided. The locker apparatus comprises: a plurality of lockers, wherein each locker is for storing a hand portable electronic device, and wherein each locker comprises a receiver configured to receive signals from a hand portable electronic device and comprises a locking mechanism for locking and unlocking the locker; user input circuitry configured to receive inputs from a user; a transmitter; at least one processor; and memory storing at least one computer program having computer program instructions that, when executed by the at least one processor, cause at least the following to be performed: in response to input being received at the user input circuitry identifying a user, identifying a hand portable electronic device for the user; causing the transmitter to a transmit a signal to the hand portable electronic device to cause the hand portable electronic device to output a signal for opening a locker; and if the signal output by the hand portable electronic device is received by one of the receivers, causing the locking mechanism of the locker comprising the receiver that received the signal output by the hand portable electronic device to unlock the locker.

LOCKER APPARATUS, ASSOCIATED METHOD AND ASSOCIATED COMPUTER PROGRAM
20220375289 · 2022-11-24 ·

A locker apparatus, method and computer program are provided. The locker apparatus comprises: a plurality of lockers, wherein each locker is for storing a hand portable electronic device, and wherein each locker comprises a receiver configured to receive signals from a hand portable electronic device and comprises a locking mechanism for locking and unlocking the locker; user input circuitry configured to receive inputs from a user; a transmitter; at least one processor; and memory storing at least one computer program having computer program instructions that, when executed by the at least one processor, cause at least the following to be performed: in response to input being received at the user input circuitry identifying a user, identifying a hand portable electronic device for the user; causing the transmitter to a transmit a signal to the hand portable electronic device to cause the hand portable electronic device to output a signal for opening a locker; and if the signal output by the hand portable electronic device is received by one of the receivers, causing the locking mechanism of the locker comprising the receiver that received the signal output by the hand portable electronic device to unlock the locker.

SECURE LOCKING OF KEYLESS LOCK CONTROLLERS
20220375291 · 2022-11-24 ·

A lock control interface is operably connectable to an electrical actuator of a lock that restricts access to a physical resource. A primary wireless interface communicates with a wireless mobile device within a local vicinity of the primary wireless interface. A primary processor is connected to the primary wireless interface and the lock control interface. A secondary wireless interface communicates with a server via a long-range low-power wireless network. A secondary processor is connected to the secondary wireless interface. The secondary processor communicates with the server using the secondary wireless interface. The secondary processor is not operably connected to lock control interface. The primary processor controls the electrical actuator through the lock control interface to unlock the lock based on communication of cryptographic access data.

SECURE LOCKING OF KEYLESS LOCK CONTROLLERS
20220375291 · 2022-11-24 ·

A lock control interface is operably connectable to an electrical actuator of a lock that restricts access to a physical resource. A primary wireless interface communicates with a wireless mobile device within a local vicinity of the primary wireless interface. A primary processor is connected to the primary wireless interface and the lock control interface. A secondary wireless interface communicates with a server via a long-range low-power wireless network. A secondary processor is connected to the secondary wireless interface. The secondary processor communicates with the server using the secondary wireless interface. The secondary processor is not operably connected to lock control interface. The primary processor controls the electrical actuator through the lock control interface to unlock the lock based on communication of cryptographic access data.