Abstract:
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Abstract:
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Abstract:
An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.
Abstract:
Readers are associated with a number of access credentials and, once authenticated by the reader, may grant the holder of the access credential access to a secured asset. Readers may become the target of attack, such as when an unauthorized party attempts to gain access to the interior of the reader or removes the reader from an installed location. Once removed the reader may be reinstalled in another location or a counterfeit reader used in its place. By providing a paired tamper credential, the reader may deny otherwise authorized access to the secured asset if the tamper credential fails to respond appropriately. The tamper credential may fail to respond due to distance, such as when the reader alone is relocated, or the tamper credential is damaged, such as during an attempt to gain access the interior of the reader and/or remove the reader from its installed location.
Abstract:
A method and device for discovering, identifying, and configuring a particular one of a plurality of devices to be administered is described. The method and device facilitate these steps by eliminating the need for an administrator to know a specific MAC address or unique identifier for the device to be administered, and by eliminating the need to identify that specific MAC address or unique identifier in a list of MAC addresses or unique identifiers.
Abstract:
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Abstract:
A method including authenticating, by an access control system, a credential of a mobile device over a Bluetooth communication connection established between the mobile device and the access control system; receiving, via a reader of the access control system during a UWB ranging session between the mobile device and the reader, UWB data indicative of a location of the mobile device relative to the reader; determining, by the access control system, whether a user of the mobile device intends to access an asset secured by the access control system based on the UWB data and satisfying one or more intent criteria; and performing, by the access control system, a predefined function in response to determining that the user of the mobile device intends to access the asset.
Abstract:
A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
Abstract:
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Abstract:
Systems and techniques for a are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.