Patent classifications
G07C2009/00873
Physical access control systems with localization-based intent detection
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Method and system for changing the premises
Systems and methods for changing the premises in a building such as a hotel or the like. An accessing device is encoded and provided to a guest to access first premises. The guest may request for second premises. Accordingly, the guest may receive information related to second premises along with a unique code to access the second premises. On entering the unique code the guest is prompting to receive second encoding associated with the second premises.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.
READER COORDINATION FOR ACCESS CONTROL
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential of a user from a key device associated with the user using a first wireless connection. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to determine the user intends to access the asset based on a data set generated derived from the second wireless connection. The access control system may be further adapted to use a trained machine learning model to determine the intent of the user to access the asset. The access control system may be further adapted to transmit a command to grant access to the asset.
System and method for pairing a key with a vehicle via a vehicle communications port by a dongle
The present invention provides a system, method, and apparatus for pairing a vehicle key or remote keyless entry device with a vehicle by a dongle connected to an OBD port of the vehicle. The OBD programming dongle operates without a connection to an external device and pairs one or more keys with a vehicle without user intervention after the pairing process has started. The OBD programming dongle may be linked to a specific vehicle by the VIN code of the specific vehicle.
CONTROLLING ACCESS TO AN ACCESS OBJECT
It is presented a method for controlling access to an access object. The method is performed in an access control device and comprises the steps of: receiving a user input to reset the access control device; generating a new identifier for the access control device, and discarding any previously used identifier for the access control device; communicating with an electronic key to obtain an identity of the electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a receiver; and granting access to the access object only when the plurality of delegations comprise a sequence of delegations covering a delegation path from the access control device, identified using the new identifier, to the electronic key such that, in the sequence of delegations, the delegator of the first delegation is the access control device, and the receiver of the last delegation is the electronic key.
METHOD AND SYSTEM FOR CHANGING THE PREMISES
Aspects of the invention are directed towards systems and methods for changing the premises in a building such as hotel or the like. An accessing device is encoded and provided to a guest to access first premises. The guest may request for second premises. Accordingly, the guest may receive information related to second premises along with a unique code to access the second premises. On entering the unique code the guest is prompting to receive second encoding associated with the second premises.
SYSTEM AND METHOD FOR PAIRING A KEY WITH A VEHICLE VIA A VEHICLE COMMUNICATIONS PORT BY A DONGLE
The present invention provides a system, method, and apparatus for pairing a vehicle key or remote keyless entry device with a vehicle by a dongle connected to an OBD port of the vehicle. The OBD programming dongle operates without a connection to an external device and pairs one or more keys with a vehicle without user intervention after the pairing process has started. The OBD programming dongle may be linked to a specific vehicle by the VIN code of the specific vehicle.
SMART MANAGEMENT DEVICE, LOCK, AND IDENTIFICATION METHOD
A smart management device identification method includes: sending, by a smart management device, an activation request to a smart lock device, wherein the activation request is used to verify validity of the smart management device; in response to information indicating that the smart management device is valid, receiving, by the smart management device, an access control key from the smart lock device, wherein the access control key is generated according to a master key of the smart lock device and an identifier of the smart management device; and requesting, by the smart management device, the smart lock device to perform a state switching operation using the access control key.