Patent classifications
G07C9/23
Applying image analytics and machine learning to lock systems in hotels
A method of using image analytics and machine learning in a lock system includes receiving data describing access actions that are performed at an access control device based at least in part on a credential. The data includes, for each access action, a description of the access action, a timestamp, and an image of a person presenting the credential. The data is analysed to identify patterns of access. Facial characteristics of the person presenting the credential are identified. The credential is associated with the facial characteristics. It is detected, based at least in part on facial recognition and the facial characteristics, that the person is proximate to the access control device. An access action is performed at the access control device based on the detecting and the patterns of access, where the facial recognition is used in place of the credential to provide authorization to perform the access action.
Applying image analytics and machine learning to lock systems in hotels
A method of using image analytics and machine learning in a lock system includes receiving data describing access actions that are performed at an access control device based at least in part on a credential. The data includes, for each access action, a description of the access action, a timestamp, and an image of a person presenting the credential. The data is analysed to identify patterns of access. Facial characteristics of the person presenting the credential are identified. The credential is associated with the facial characteristics. It is detected, based at least in part on facial recognition and the facial characteristics, that the person is proximate to the access control device. An access action is performed at the access control device based on the detecting and the patterns of access, where the facial recognition is used in place of the credential to provide authorization to perform the access action.
ACCESS AUTHORIZATION BY MEANS OF PERSONAL ACCESS MODULE
Provided is a method for authenticating users on a packaging industrial system having at least two operator interfaces, including the following steps: login of a user to a personal portable item, wherein the personal item including a memory with login credentials of the user for the at least two operator interfaces, wherein login credentials for the operator interfaces being different from each other, activation of the memory for a period of time, detecting the user when he is in a predefined spatial area around the operator interfaces, connecting the personal item to an operator interface when the user is detected in the associated spatial area, authentication of the user at this operator interface with the login credentials stored in the memory via the connection of the personal item to the operator interface.
GESTURE CONTROL FOR OVERHEAD BINS
A system comprises an overhead bin including a door configured to open and close an opening of the overhead bin for access to and securing of an interior space of the overhead bin. A latch mechanism operatively connects the opening of the overhead bin to the door of the overhead bin to secure the door to the opening in a closed position, and to release the door from the opening for access to the interior space. A touchless input sensor can be operatively connected to the latch mechanism and a controller can be operatively connected to the latch mechanism and the touchless input sensor.
Method for Authenticating Identity of Digital Key, Terminal Device, and Medium
A method for authenticating an identity of a digital key, a terminal, and a medium, where before a second terminal enters a preset operating state from a non-preset operating state, identity authentication is first performed on a user using an identity authentication system of the second terminal, and obtained identity authentication information is stored in a secure element of the second terminal. Then, when a digital key in the second terminal is to be used, the identity authentication information stored in the secure element of the second terminal is sent to a first terminal, and the first terminal may perform verification based on the identity authentication information to determine whether the user using the digital key in the second terminal is an authorized holder of the second terminal.
Portable securement apparatus with GPS locationing
A multi-featured lock back that includes a global position system receiver for location monitoring as well as other features. Using an app that is running on a mobile device, a user may locate and utilize the lock box. A controller within the lock box can use geo-fencing to identify the lock box is being stolen.
Portable securement apparatus with GPS locationing
A multi-featured lock back that includes a global position system receiver for location monitoring as well as other features. Using an app that is running on a mobile device, a user may locate and utilize the lock box. A controller within the lock box can use geo-fencing to identify the lock box is being stolen.
Method for access control
A method for controlling access to a facility includes: an identification process, an authorization process, and an application process. Access to the facility is blocked by a lock that is openable by a person with an authorized key. A system for controlling access to the facility includes a first security ring formed by data-conductive connections between an electronic reader, an identity server, and an access server; a second security ring is formed by data-conductive connections between the electronic reader, the access server, and a terminal; and a third security ring formed by data-conductive connections between the access server, the terminal, and the lock.
MONITORING REMOVAL AND REPLACEMENT OF TOOLS WITHIN AN INVENTORY CONTROL SYSTEM
An inventory control system is described that includes a tool storage device including a drawer or a tray providing a pallet, wherein the pallet includes storage locations for objects; a sensing device configured to form an image of the storage locations; and a data processor configured to determine presence or absence of the pallet and presence or absence of objects within the storage locations of the pallet using the information from the image.
MONITORING REMOVAL AND REPLACEMENT OF TOOLS WITHIN AN INVENTORY CONTROL SYSTEM
An inventory control system is described that includes a tool storage device including a drawer or a tray providing a pallet, wherein the pallet includes storage locations for objects; a sensing device configured to form an image of the storage locations; and a data processor configured to determine presence or absence of the pallet and presence or absence of objects within the storage locations of the pallet using the information from the image.