Patent classifications
G07C2009/00333
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Smart thermostat hub
A smart thermostat hub and a management platform for controlling and securing smart devices in a multi-family residential property are disclosed. Smart thermostat hubs may bi-directionally communicate with the management platform using a LoRaWAN communication link and communicate with smart devices present within an apartment of the multi-family residential property via a non-LoRaWAN communication link. Smart thermostat hub may provide a gateway or bridge between the management platform and an offline door lock, thereby enabling access credentials for an offline door lock to be disabled from the management platform, and may serve to facilitate remote configuration of other smart devices, such as thermostats and smart light fixtures, for example.
Smart thermostat hub
A smart thermostat hub and a management platform for controlling and securing smart devices in a multi-family residential property are disclosed. Smart thermostat hubs may bi-directionally communicate with the management platform using a LoRaWAN communication link and communicate with smart devices present within an apartment of the multi-family residential property via a non-LoRaWAN communication link. Smart thermostat hub may provide a gateway or bridge between the management platform and an offline door lock, thereby enabling access credentials for an offline door lock to be disabled from the management platform, and may serve to facilitate remote configuration of other smart devices, such as thermostats and smart light fixtures, for example.
Smart thermostat hub
A smart thermostat hub and a management platform for controlling and securing smart devices in a multi-family residential property are disclosed. Smart thermostat hubs may bi-directionally communicate with the management platform using a LoRaWAN communication link and communicate with smart devices present within an apartment of the multi-family residential property via a non-LoRaWAN communication link. Smart thermostat hub may provide a gateway or bridge between the management platform and an offline door lock, thereby enabling access credentials for an offline door lock to be disabled from the management platform, and may serve to facilitate remote configuration of other smart devices, such as thermostats and smart light fixtures, for example.
Methods for locking and/or unlocking electric vehicle and associated apparatus
The present disclosure relates to apparatus and methods for locking and/or unlocking a vehicle based on a location of a mobile device associated with the vehicle. In one embodiment a processor in a vehicle analyzes a position of a mobile device relative to the vehicle and allows the vehicle to be unlocked when the mobile device is determined to be approaching the vehicle.
Physical access control systems with localization-based intent detection
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
UNLOCKING LOCK ON DEVICE BASED ON ULTRA-WIDEBAND LOCATION TRACKING
In one aspect, a first device may include at least one processor, an ultra-wideband (UWB) transceiver accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver. The instructions may also be executable to unlock a hardware lock controlled by the first device responsive to a determination, based on the tracking of the location of the second device, that the second device is within a predetermined area of the first device.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.
READER COORDINATION FOR ACCESS CONTROL
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential of a user from a key device associated with the user using a first wireless connection. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to determine the user intends to access the asset based on a data set generated derived from the second wireless connection. The access control system may be further adapted to use a trained machine learning model to determine the intent of the user to access the asset. The access control system may be further adapted to transmit a command to grant access to the asset.