Patent classifications
G07C2209/14
MACHINE LEARNING ASSISTED INTENT DETERMINATION USING ACCESS CONTROL INFORMATION
Systems and methods for machine learning assisted intent determination are disclosed. In some embodiments, a system comprises at least one processor and memory storing instructions executable by the at least one processor, the instructions when executed cause the system to obtain user information, the user information comprising a behavioral information of the user; obtain control access information for the user, the control access information indicating whether the user accessed a controlled area; train, using the obtained user information and control access information, an intent model of a machine learning system, the intent model configured to determine a user intent, the user intent indicting whether the user intends to access the controlled area; and use the trained intent model to determine the user intent based on the obtained user information.
ACCESS MANAGER
An access manager determines whether access will be granted to a guarded species or space utilizing a controller including a digital processor with a memory for storing an ID library and a transducer block coupled with the processor for accessing a plurality of different ID types and an actuator block coupled with the processor for unblocking a normally locked portal to the guarded space.
METHOD AND VEHICLE DOOR LOCK SYSTEM FOR MANAGING ACCESS TO THE VEHICLE
A vehicle door lock system includes: a door lock; a vehicle event sensor; and a processing circuitry, the processing circuitry is configured to cause the vehicle door lock system to generate first triggering event data, indicative of a first triggering event detected by the vehicle event sensor, caused by a movement of an object onto, or in the vicinity of, the vehicle, at a first time, obtain, from a portable electronic device, second triggering event data, indicative of a second triggering event caused by a movement of the portable electronic device, at a second time, determine if the first triggering event and the second triggering event both occurs within a predetermined time period by comparing the first triggering event data and the second triggering event data.
Medication compliance methods, devices, and systems
Cannabis, much like medications, requires secure containment. It is particularly important to prevent access to Cannabis to children, elderly, or others for whom the Cannabis is not prescribed, designated, or legally permitted. Provided herein are medication tracking and securement devices, systems, platforms, and methods configured to be used with or in place of commercial standard medicine bottles. The wireless tracking and communications elements of the present disclosure are configured to prevent medication theft, overdosing, medication loss, and prescription noncompliance.
ACCESS CONTROL DEVICE, KEY DEVICE AND KEY HOLDER
According to an embodiment, an access control device includes a first communication interface, a second communication interface and a processor. The processor acquires, from the key device, an identifier functioning as the key identification information and a biometrics authentication result; transmits a confirmation request signal to the confirmation device, when the key identification information of the key device agrees with key identification information of a valid key and when the biometrics authentication result is an authentication failure; and permits access to the security device, upon receiving a confirmation response signal indicative of the access permission from the confirmation device in response to the confirmation request signal.
Systems and methods for providing temporary access credentials to access physical locations
A physical location access control system is configured to receive. via a network interface, a request to provide a temporary access right for a first physical location to a first user, the request providing an indication as to a first time period associated with the temporary access right. In response to determining that the requester has an access right to the first physical location for a second time period that comprises the first time period, a temporary access token corresponding to the first time period is created and the requester's access right to access the first physical location for the first time period is disabled. The temporary access token is transmitted to a device associated with the first user, enabling the first user to access the first physical location during the first time period.
SECURE ENCLOSURE EMERGENCY ACCESS MECHANISM
A access control system includes a catch configured to be affixed to an inner portion of an enclosure, a latch configured to engage the catch when the catch is attached to the enclosure and an access door of the enclosure is in a closed position. The access control system is configured to detect, using one or more sensors, when the latch is within a predetermined proximity of the catch, and responsive to detecting that the latch is not within the predetermined proximity of the catch, determine whether an authorized credential was received via a communication interface to open the latch, and when the authorized credential was received, register an authorized opening of the latch in a memory device, and when the authorized credential was not received, register an the unauthorized opening of the latch in the memory device and enter an alert state.
ACCESS CONTROL SYSTEM AND A METHOD THEREIN FOR HANDLING ACCESS TO AN ACCESS-RESTRICTED PHYSICAL RESOURCE
An access control system and a method performed therein, for handling access to an access-restricted physical resource. The method comprises, by means of a first credential reader, receiving an initiating access request credential initiating a request to give one or more visitors access to a first access-restricted physical resource. The method further comprises, by means of the first credential reader, receiving a visitor credential for each visitor for which access is requested, and, by means of a second credential reader, receiving a finalising access request credential finalising the request to give the one or more visitors access. Furthermore, the method comprises, by means of a first resource controller, allowing a visitor to access the first access-restricted physical resource upon presenting the visitor's visitor credential to the first credential reader.
Medication compliance methods, devices, and systems
Provided herein are medication tracking and securement devices, systems, platforms, and methods configured to be used with or in place of commercial standard medicine bottles. The wireless tracking and communications elements of the present disclosure are configured to prevent medication theft, overdosing, medication loss, and prescription noncompliance.
Vehicle and controlling method thereof
A vehicle may include a camera configured to acquire a face image of a user approaching from outside the vehicle and a gesture image of the user; a communication module configured for communicating with a mobile device; a door locking device configured to lock a door of the vehicle or unlock the door of the vehicle; and a processor configured to perform user authentication based on the user's surface image, and unlock the door when the user authentication is successful, and the processor may be configured to control the communication module to transmit the user's face image to a pre-registered mobile device when the user authentication fails a preset number of times, control the communication module to receive an emergency access signal from the pre-registered mobile device, and control the door locking device to unlock the door when a user's gesture image satisfies an unlock condition.