Patent classifications
G07C9/00571
MACHINE LEARNING ASSISTED INTENT DETERMINATION USING ACCESS CONTROL INFORMATION
Systems and methods for machine learning assisted intent determination are disclosed. In some embodiments, a system comprises at least one processor and memory storing instructions executable by the at least one processor, the instructions when executed cause the system to obtain user information, the user information comprising a behavioral information of the user; obtain control access information for the user, the control access information indicating whether the user accessed a controlled area; train, using the obtained user information and control access information, an intent model of a machine learning system, the intent model configured to determine a user intent, the user intent indicting whether the user intends to access the controlled area; and use the trained intent model to determine the user intent based on the obtained user information.
SMART-LOCK SYSTEM AND METHOD OF OPERATING THE SMART-LOCK SYSTEM
A smart-lock system and a method of operating the system is disclosed. The system comprises a smart-lock on a door of a room. The door comprises a first and a second side. The first side of the door lies on the interior side of the room and the second side of the door lies on the exterior side of the room. At least one sensor is disposed on the first side of the door to detect the presence of any user on the interior side of the room and at least one sensor is disposed on the second side of the door to detect the presence of any user at the exterior side of the room. The smart-lock is configured to lock the room when the room is occupied.
ACCESS MANAGEMENT SYSTEM
An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.
Systems, devices, and/or methods for managing drone deliveries
Certain exemplary embodiments can provide an AirBox constructed to receive deliveries from a drone. The AirBox can comprise an automatically openable lid; and a wireless receiver that is constructed to receive data concerning a delivery from the drone. The automatically openable lid can open to receive the delivery from the drone.
Nonspecific vehicle
A vehicle capable of being utilized by users other than a user assigned to the vehicle is described herein. Such a vehicle may operate in various modes, including a first mode in which the vehicle allows additional users to utilize the vehicle and a second mode in which the vehicle prohibits additional users from utilizing the vehicle. A vehicle may transition from the first mode to the second mode based on various environmental factors, such as, but not limited to, vehicle demand, geolocation, and the like. When operating in a mode in which the vehicle can be utilized by users other than a user assigned to the vehicle, a user who may have been assigned a different vehicle may utilize the vehicle when proximate to the vehicle. Trip information and other details may be provided to the vehicle for transport of the user.
VIDEO-BASED DOOR OPERATION USING OBJECT TRACKING OF MOBILITY ASSISTANCE DEVICES
Disclosed are methods, systems, and apparatus for video-based door operation using object tracking of mobility assistance devices. A method includes detecting, in one or more images captured by a camera, a mobility assistance device; in response to detecting the mobility assistance device, determining, using the one or more images captured by the camera, a trajectory of the mobility assistance device; determining that the trajectory of the mobility assistance device satisfies a criterion for operating a door; and in response to determining that the trajectory of the mobility assistance device satisfies the criterion for operating the door, transmitting, to a door operator, a command to operate the door. A method includes determining whether the operation of the door satisfies performance criteria using one or more second images; and in response to determining that the operation of the door does not satisfy performance criteria, updating the criterion for operating the door.
Access control systems, devices, and methods therefor
An access control system includes a verification computing system that stores access rights information and credential proxies received from user devices, receives from a local access control subsystem an input credential and input credential proxy derived therefrom and received from a present user, identifies the access rights information associated with the user according to the input credential proxy and the stored credential proxy, requests and receives a stored credential from the user device of the present user, and compares the stored credential to the input credential to authorize the present user. The access rights information is for each of the users to access spaces with the local access control subsystems. The stored credential proxies are derived from stored credential received by the user devices using an algorithm. The input credential proxies are derived from the input credentials using the algorithm.
System Providing Self-Service Access to Locked Merchandise
A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.
Automatic switching for frictionless access control
Example aspects include a method, an apparatus and a computer-readable medium of operating an access control system, comprising detecting a person at an access control area. The aspects further include determining whether the person is wearing a mask. Additionally, the aspects further include switching, in response to determining that the person is wearing the mask, the access control system into a frictionless mode. Additionally, the aspects further include obtaining, according to the frictionless mode, identification information of the person via touchless interaction between the person and the access control system. Additionally, the aspects further include identifying the person according to the identification information of the person.
SYSTEMS AND METHODS FOR SHORT-RANGE COMMUNICATION BETWEEN DEVICES
The present disclosure relates to systems and methods for communicating between devices using short-range communication links. More specifically, the present disclosure relates to systems and methods for communicating access-right data between devices for verification or transfer.