G07C9/26

Enhanced temperature measurement techniques

Example implementations include a method, apparatus and computer-readable medium for determining a set of temperature readings of a person attempting to proceed beyond an area. The implementations further include detecting the person entering the area and detecting a facial area of the person. The implementations further include sending location information of the facial area to a sensing device. The implementations further include generating a thermal image of the person and determining a first set of temperature readings. The implementations further include determining a first set of temperature differences comprising one or more temperature differences between the temperature readings in the first set. The implementations further include determining whether one or more of the temperature differences in the first set does not satisfy a threshold and generating a notification in response to the determination. Additionally, the implementations include transmitting the notification to one or more output devices.

Enhanced temperature measurement techniques

Example implementations include a method, apparatus and computer-readable medium for determining a set of temperature readings of a person attempting to proceed beyond an area. The implementations further include detecting the person entering the area and detecting a facial area of the person. The implementations further include sending location information of the facial area to a sensing device. The implementations further include generating a thermal image of the person and determining a first set of temperature readings. The implementations further include determining a first set of temperature differences comprising one or more temperature differences between the temperature readings in the first set. The implementations further include determining whether one or more of the temperature differences in the first set does not satisfy a threshold and generating a notification in response to the determination. Additionally, the implementations include transmitting the notification to one or more output devices.

ACCESS AUTHORIZATION BY MEANS OF PERSONAL ACCESS MODULE
20210382975 · 2021-12-09 ·

Provided is a method for authenticating users on a packaging industrial system having at least two operator interfaces, including the following steps: login of a user to a personal portable item, wherein the personal item including a memory with login credentials of the user for the at least two operator interfaces, wherein login credentials for the operator interfaces being different from each other, activation of the memory for a period of time, detecting the user when he is in a predefined spatial area around the operator interfaces, connecting the personal item to an operator interface when the user is detected in the associated spatial area, authentication of the user at this operator interface with the login credentials stored in the memory via the connection of the personal item to the operator interface.

ACCESS AUTHORIZATION BY MEANS OF PERSONAL ACCESS MODULE
20210382975 · 2021-12-09 ·

Provided is a method for authenticating users on a packaging industrial system having at least two operator interfaces, including the following steps: login of a user to a personal portable item, wherein the personal item including a memory with login credentials of the user for the at least two operator interfaces, wherein login credentials for the operator interfaces being different from each other, activation of the memory for a period of time, detecting the user when he is in a predefined spatial area around the operator interfaces, connecting the personal item to an operator interface when the user is detected in the associated spatial area, authentication of the user at this operator interface with the login credentials stored in the memory via the connection of the personal item to the operator interface.

SYSTEMS, METHODS, AND DEVICES FOR ACCESS CONTROL
20210383624 · 2021-12-09 ·

An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.

System for monitoring a person
11195361 · 2021-12-07 · ·

A system for monitoring a person, for example a traveler, who is moving through a facility or a building and carries a biometric travel document and various electronic devices, for example mobile telephones, laptops, tablet computers, e-readers, notebooks, wireless headphones, smartwatches, or fitness trackers. An electronic controller communicates with an input device for inputting contents of the biometric travel document and for forwarding the contents for further processing. An electronically operated database generates a feature space in which the device characteristics are entered by the transceivers as a digital imprint of the traveler and which identifies the traveler with a particular probability resulting from the ratio of a weighted sum of the individual entries in the feature space to the maximum possible sum.

FACIAL RECOGNITION TEMPLATE STORED ON MOBILE CREDENTIAL
20220207942 · 2022-06-30 ·

A non-transitory computer readable medium comprising executable code that causes one or more processors to: receive, at a reader device from a credential device of a user, at least one of a first image of the user or a first representation of a face of the user; if a first image of the user was received, then generate, at the reader device, a generated representation of the face of the user using the first image; capture, at the reader device, a second image of the user and generate a second representation of the face of the user using the second image; determine a likelihood of a match between the second representation and at least one of the first representation and the generated representation; and permit access by the user to a secure asset in instances where the likelihood of a match meets a threshold.

Body-worn device for capturing user intent when interacting with multiple access controls
11354961 · 2022-06-07 · ·

A method to determine user intent for an access control including sensing biometrics data from a body-worn device; sensing biometrics data at an access control; comparing the biometrics data from the body-worn device and the access control; and determining a user intent to access the access control in response to the comparing.

Smart locks unlocking methods, mobile terminals, servers, and computer-readable storage media

In an embodiment, a server receives—a digital key request for a digital key to unlock a smart lock. A biometric feature request for collecting a biometric feature from the mobile device is generated and sent to the mobile device. A biometric feature corresponding to the biometric feature request is received. Identity information and a device identifier of the smart lock is received from another server. Based on the identity information, a matching biometric feature stored in a biometric feature database is determined. An identity of a user corresponding to the received biometric feature is verified based on the matching biometric feature. After the identity of the user is verified, smart lock information is identified. A digital key for unlocking the smart lock is generated based on the digital key request and the smart lock information and sent to the mobile device.

Smart locks unlocking methods, mobile terminals, servers, and computer-readable storage media

In an embodiment, a server receives—a digital key request for a digital key to unlock a smart lock. A biometric feature request for collecting a biometric feature from the mobile device is generated and sent to the mobile device. A biometric feature corresponding to the biometric feature request is received. Identity information and a device identifier of the smart lock is received from another server. Based on the identity information, a matching biometric feature stored in a biometric feature database is determined. An identity of a user corresponding to the received biometric feature is verified based on the matching biometric feature. After the identity of the user is verified, smart lock information is identified. A digital key for unlocking the smart lock is generated based on the digital key request and the smart lock information and sent to the mobile device.