-
公开(公告)号:US20240015149A1
公开(公告)日:2024-01-11
申请号:US18250023
申请日:2021-11-12
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost , Matvey Mukha
CPC classification number: H04L63/0853 , H04L63/0823 , G07C9/27
Abstract: Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
-
公开(公告)号:US10305728B2
公开(公告)日:2019-05-28
申请号:US15017022
申请日:2016-02-05
Applicant: Assa Abloy AB
Inventor: Sylvain Jacques Prevost , Kapil Sachdeva
Abstract: A method and device for discovering, identifying, and configuring a particular one of a plurality of devices to be administered is described. The method and device facilitate these steps by eliminating the need for an administrator to know a specific MAC address or unique identifier for the device to be administered, and by eliminating the need to identify that specific MAC address or unique identifier in a list of MAC addresses or unique identifiers.
-
公开(公告)号:US20240096155A1
公开(公告)日:2024-03-21
申请号:US18257182
申请日:2021-12-07
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost , Jianbo Chen
CPC classification number: G07C9/28 , G06N20/00 , G07C9/00309 , G07C9/22 , G07C2009/00793 , G07C2209/63
Abstract: Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
-
公开(公告)号:US20240094006A1
公开(公告)日:2024-03-21
申请号:US18257172
申请日:2021-12-07
Applicant: ASSA ABLOY AB
Inventor: Jianbo Chen , Kapil Sachdeva , Sylvain Jacques Prevost
CPC classification number: G01C21/206 , G01C21/12 , G07C9/00571 , G07C9/28 , H04W4/33
Abstract: Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).
-
公开(公告)号:US20230368575A1
公开(公告)日:2023-11-16
申请号:US18247184
申请日:2020-10-12
Applicant: ASSA ABLOY AB
Inventor: Jianbo Chen , Kapil Sachdeva , Sylvain Jacques Prevost
CPC classification number: G06V40/172 , G06V10/809 , G07C9/00563 , G07C9/37
Abstract: The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
-
公开(公告)号:US20220414224A1
公开(公告)日:2022-12-29
申请号:US17756835
申请日:2020-11-13
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost , Philip Hill
Abstract: This disclosure describes techniques for updating firmware of a secure element. The techniques include operations comprising: receiving, by a gateway device, from a remote source, a firmware file; receiving, by a processing element implemented on the gateway device, ephemeral session specific key material for a first secure element implemented on the gateway device; dividing the firmware file into a plurality of data chunks; applying, by the processing element, the ephemeral session specific key material to a first data chunk of the plurality of data chunks to generate a first data packet; and sending, by the processing element, the first data packet to the first secure element.
-
公开(公告)号:US20150047023A1
公开(公告)日:2015-02-12
申请号:US14386900
申请日:2013-03-26
Applicant: Assa Abloy AB
Inventor: Kapil Sachdeva , Philip Hoyer , Eric F. Le Saint , Sylvain Prevost
IPC: G06F21/31
CPC classification number: G06F21/31 , G06F21/77 , G07C9/00857
Abstract: Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access module determining if the personal security device includes a factory security mechanism, and, if the personal security device includes a factory security mechanism, using the reader/writer and the access module to replace the factory security mechanism with another security mechanism. The access module may authenticate the personal security device in connection with replacing the factory security mechanism. Authenticating the personal security device may grant access to a user through a door controlled by the access module. Replacing the factory security mechanism may include replacing an application on the personal security device. An ISO/IEC 7816-13 application management request command may be used to replace the application.
Abstract translation: 原子上修改个人安全设备包括将个人安全设备呈现给耦合到访问模块的读取器/写入器,访问模块确定个人安全设备是否包括工厂安全机制,并且如果个人安全设备包括工厂安全机制 ,使用读写器和访问模块来替换出厂安全机制与另一安全机制。 访问模块可以与更换工厂安全机制相关联地认证个人安全设备。 验证个人安全设备可以通过由访问模块控制的门授予对用户的访问。 更换出厂安全机制可能包括更换个人安全设备上的应用程序。 可以使用ISO / IEC 7816-13应用程序管理请求命令来替换应用程序。
-
公开(公告)号:US20240022389A1
公开(公告)日:2024-01-18
申请号:US18355858
申请日:2023-07-20
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost , Matvey Mukha
CPC classification number: H04L5/14 , H04L1/0061 , H04L1/18
Abstract: Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
-
公开(公告)号:US11763551B2
公开(公告)日:2023-09-19
申请号:US16807825
申请日:2020-03-03
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost
IPC: G06N3/08 , G06N3/047 , G06V10/778 , G07C9/37 , G06N3/04 , G06V40/16 , G06F18/21 , G06F18/214 , G06V10/98
CPC classification number: G06V10/7784 , G06F18/2148 , G06F18/2155 , G06F18/2193 , G06N3/04 , G06N3/047 , G06N3/08 , G06V10/993 , G06V40/172 , G07C9/37
Abstract: An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.
-
公开(公告)号:US20210279528A1
公开(公告)日:2021-09-09
申请号:US16807825
申请日:2020-03-03
Applicant: ASSA ABLOY AB
Inventor: Kapil Sachdeva , Sylvain Jacques Prevost
Abstract: An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.
-
-
-
-
-
-
-
-
-