An energy harvesting system is provided, including an energy storage element, a generator assembly configured to convert an actuation force (F) provided by a user into an electrical power, and a power converter assembly configured to transfer the electrical power from the generator assembly to the energy storage element. The power converter assembly is further configured to adapt its input impedance (Z1(F)) to a magnitude of the actuation force by decreasing its input impedance when the magnitude of the actuation force increases, and by increasing its input impedance when the magnitude of the actuation force decreases. A corresponding power converter assembly and an electronic lock including the energy harvesting system are also provided.
H02N 11/00 - Générateurs ou moteurs non prévus ailleursMouvements dits perpétuels obtenus par des moyens électriques ou magnétiques
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
H02M 3/158 - Transformation d'une puissance d'entrée en courant continu en une puissance de sortie en courant continu sans transformation intermédiaire en courant alternatif par convertisseurs statiques utilisant des tubes à décharge avec électrode de commande ou des dispositifs à semi-conducteurs avec électrode de commande utilisant des dispositifs du type triode ou transistor exigeant l'application continue d'un signal de commande utilisant uniquement des dispositifs à semi-conducteurs avec commande automatique de la tension ou du courant de sortie, p. ex. régulateurs à commutation comprenant plusieurs dispositifs à semi-conducteurs comme dispositifs de commande finale pour une charge unique
2.
MULTI-ENTITY AUTHENTICATION WITH ANONYMOUS KEYSET LOOKUP
Various methods and implementations of a multi-entity authentication protocol, enabling an anonymous lookup of a symmetric keyset, are described. An example method performed by an initiator entity includes: transmitting an authentication request to a responder entity; receiving an authentication response from the responder entity, the authentication response including an identifier associated with an authentication keyset (e.g., a symmetric keyset shared by the initiator entity and the responder entity), where the identifier is provided for one-time use in an authentication between the initiator entity and the responder entity; retrieving the authentication keyset at the initiator entity, based on the identifier, where the identifier is associated with the authentication keyset at the initiator entity prior to the one-time use in the authentication (e.g., based on a previous authentication procedure); and validating the authentication between the responder entity and the initiator entity based on the authentication keyset.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
It is provided a method for mitigating a resource use attack by a transmitter device (1) against a receiver device (2) over a wireless interface (4). The method is performed by a receiver device (2). The method comprises: receiving (40) a header transmission from a transmitter device (1), the header (21) forming part of a radio frame (20), the header (21) comprising an indicator of size of a subsequent transmission of a payload (22) in the radio frame (20), wherein the receiving includes performing a header measurement, being a measurement of received signal strength of the header transmission; performing (42) a payload measurement, being a measurement of received signal strength measurement when the payload (22) of the radio frame (20) is expected to be received; determining (44) that the payload measurement is lower than a threshold; and releasing (46) resources used for receiving the payload.
It is provided a method for enabling temporary access to a physical space (16) secured by an electronic lock (12). The method being performed by an access right generator (1). The method comprises: obtaining (40) a user identifier of a user (5), and a time data item defining a validity time; obtaining (42) a cryptographic key; generating (44) an access object (21) based on the user identifier, the time data item and the cryptographic key, to enable an electronic lock to cryptographically verify the user identifier based on the access object (21); and providing (46) the access object (21) to the user.
09 - Appareils et instruments scientifiques et électriques
10 - Appareils et instruments médicaux
11 - Appareils de contrôle de l'environnement
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Electric, electronic and electromechanical locks and lock goods, including electronic lock cylinders, door magnets, electronic keys for locks, electronic key cards; Electronic and magnetic access control cards, smart cards and key card readers; Handheld programming units for programming locks, lock cylinders, keys, key cards and key card readers; Safety, security, protection and signaling devices and systems, namely alarms, fire alarms, motion, movement and alarm sensors, motion and remote movement detectors, and wearable monitors and tracking devices; Computer software, recorded, and apparatus for the management, monitoring, surveillance and security of premises and individuals; computer software, recorded, for controlling access and exiting premises; apparatus and instruments for recording, monitoring, signaling and checking entrance to and exit from buildings and premises. Patient monitoring system, namely computer software used to record and transmit data and computer assisted hardware sensors for tracking the physical motion, movements, and habits of patients. Apparatus for homes, enterprises, lightning, reflectors heating and ventilation; Parts and components for the aforementioned goods. Design and development of computers, computer systems, computer software, technology solutions, internet of things (IoT) solutions, mobile and web applications in the field of access control and security, including secure identity solutions and asset tracking systems; design and development of apparatus and instruments in the field of access control, security and facilities management; design and development of apparatus and instruments in the field of senior care and monitoring and surveillance of individuals and patients; consultancy and information regarding the aforesaid services.
6.
METHOD AND GUIDANCE DEVICE FOR PROVIDING NON-VISUAL GUIDANCE
A method for providing non-visual guidance for passing through a door. The method being performed by a guidance device. The method comprises: determining that a person is near the door and that non-visual guidance is to be provided to the person; determining an indication of location of the person in relation to the guidance device or the door; and providing non-visual guidance to the person for passing through the door, wherein the non-visual guidance is based on the indication of location.
A method for alerting difference in user sentiment of a user using a door. The method is performed in a user analysis device. The method comprises: receiving sensor data from at least two sensors of different sensor types, the sensor data comprising data relating to a user in the vicinity of a door; determining, based on the sensor data, a first user sentiment prior to using the door; determining, based on the sensor data, a second user sentiment after using the door; deriving a difference in user sentiment between the first user sentiment and the second user sentiment; detecting that the difference in user sentiment is greater than a threshold; and generating an alert signal, indicating that the difference in user sentiment is greater than the threshold.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G10L 15/16 - Classement ou recherche de la parole utilisant des réseaux neuronaux artificiels
G10L 15/18 - Classement ou recherche de la parole utilisant une modélisation du langage naturel
8.
PRIVACY PROTECTION USING ONE-TIME AUTHORIZATION CODES
Methods and systems for communicating with an access control system are provided. The methods and systems, prior to establishing a secure channel between a first device and a second device, establish, between the first device and the second device, a first static privacy key. The methods and systems access, by the first device, a first random nonce that has been generated by the second device and compute, by the first and second devices, a first session key based on the first static privacy key and the first random nonce. The methods and systems generate, by the first device, a first one-time authorization code based on the first session key and a current counter value, the current counter value representing a quantity of requests sent by the first device and transmit, by the first device to the second device, a first request that is combined with the first one-time authorization code.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods and systems for selectively retrieving additional data associated with a credential are provided. The methods and systems establish, between a first device and a second device, a communication session and transmit, from the first device to the second device, a credential that is associated with a subset of additional data. The methods and systems receive, by the first device from the second device, a request for a first portion of the additional data and provide, to the second device, binding information for the first portion of the additional data, the binding information securely linking the first portion of the additional data to the credential. The methods and systems enable the second device to authenticate the first portion of the additional data using the binding information.
It is provided a method comprising: obtaining (40) a calibration door angle; obtaining (42) a calibration image comprising a representation of a door (15) for the calibration door angle; repeating (44) the obtaining (40) a calibration the door angle and obtaining (42) the calibration image for a plurality of values of the calibration door angles; generating (46) a data structure comprising a plurality of angle values, respectively associated with door masks; obtaining (48) a detection door angle from the door angle sensor (18), indicating an angle of opening of the door (15); obtaining (50) a detection image from the image sensor (11); obtaining (52), from the data structure, based on the detection door angle, a detection door mask; applying (54) the detection door mask to the detection image, to obtain a masked image; and performing (56) people detection based on the masked image.
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 10/22 - Prétraitement de l’image par la sélection d’une région spécifique contenant ou référençant une formeLocalisation ou traitement de régions spécifiques visant à guider la détection ou la reconnaissance
G06V 10/80 - Fusion, c.-à-d. combinaison des données de diverses sources au niveau du capteur, du prétraitement, de l’extraction des caractéristiques ou de la classification
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
11.
SYSTEMS AND METHODS FOR DYNAMIC, POWER-EFFICIENCY-BASED CRYPTOGRAPHIC PROTOCOL NEGOTIATION WITH INTERNET OF THINGS (IOT) DEVICES
Disclosed herein are systems and methods for dynamic, power-efficiency-based cryptographic-protocol negotiation with Internet of Things (IoT) devices. In an embodiment, a computer system (e.g., an identity-management system) receives, from an IoT device, a device-side authentication-initiation message containing a unique device identifier of the IoT device. The computer system uses the unique device identifier of the IoT device to identity, from a stored power-efficiency reference table, a suitable cryptographic security protocol for the IoT device. The computer system transmits, to the IoT device, a server-side authentication-initiation message containing an indication of the identified protocol, and the computer system authenticates the IoT device according to the identified protocol.
Various methods and implementations of encoding a timestamp, and decoding time and date information from the encoded time stamp, are described. An example method for encoding a timestamp includes: identifying date and time information to be encoded, based on: a calculated year value that represents a calendar year value as an offset from a reference calendar year; a month value; a day value; and a time value (that includes, for example, an hour value, a minutes value, and a seconds value); generating 4 bytes of encoded data from the date and time information, with a sequence of bits that represents: the calculated year value; the month value; the day value; and the time value; and outputting the 4-byte encoded timestamp data. A corresponding method of obtaining date and time information from the encoded timestamp data, by parsing the 4-byte encoded timestamp data, is also described.
H03M 7/30 - CompressionExpansionÉlimination de données inutiles, p. ex. réduction de redondance
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
13.
CONTROL ARRANGEMENT FOR ACCESS MEMBER, AND ACCESS MEMBER SYSTEM
A control arrangement (20) for controlling movements of an access member (14), the control arrangement comprising a base structure (22); a drive member (32) rotatable about a rotation axis (28); an input member (38) arranged to be driven along an actuation axis (40) by rotation of the drive member, and arranged to move in a lateral direction (74, 76); an output member (50) arranged to be driven by the input member along the actuation axis; an electromagnetic generator (58) arranged to be driven by movement of the output member along the actuation axis to generate electric energy; and a force transmitting arrangement (42, 52; 116) arranged to transmit a relative movement between the input member and the output member along the actuation axis to a movement of the input member in the lateral direction towards the base structure for frictional braking between the input member and the base structure.
E05F 15/619 - Mécanismes pour battants mus par une force motrice utilisant des actionneurs électriques utilisant des électromoteurs rotatifs pour battants pivotants manœuvrés par mécanismes "pousser-tirer" utilisant des dispositifs à crémaillère souples ou rigides
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p. ex. ralentisseursStructure des dispositifs de freinage pneumatique ou à liquide à freins à friction
Systems and techniques may be used for creating an object (e.g., a data structure) on a device. A technique may include using a single structured access command constructed with an object tag number to perform one or more write operations. For example, a write operation may include writing an object type to a properties memory portion of memory of the device, writing at least one access right value to an access rights memory portion of the memory, or writing at least one configuration to a configuration memory portion of the memory including a current status flag of the object. An example technique may include reading a data memory portion of the memory using the object tag number based on a request that complies with the at least one access right value and the current status flag.
An RFID reader (10) is mounted to a device including at least one metal part, such as a fuel dispensing nozzle (12) of a fuel management system (100). Due to the mounting to the device, an inductance of an RFID antenna (20) of the RFID reader (10) decreases, resulting in an increase in the capacitance of a variable capacitance element (22) that is adjusted by a controller (24) of the RFID reader (10) to tune the circuit of the RFID reader (10). When the RFID reader (10) is removed from the device, this results in a decrease of the capacitance of the variable capacitance element (22). This decrease can be determined, and a message indicating that the RFID reader (10) has been tampered with can be generated.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
B67D 7/34 - Moyens pour empêcher un débit de liquide non autorisé
16.
PROXIMITY COMMUNICATION TRIGGERED WIRELESS POWERED LOCK
Systems and methods may be used for providing wireless power from a mobile device to a digital lock. The mobile device may include a proximity communication antenna to receive an authentication request from the digital lock. The proximity communication antenna may facilitate the mobile device providing wireless power to the digital lock via a wireless power protocol. The proximity communication antenna may send an authorization to the digital lock to cause the digital lock to open.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H04B 5/77 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive spécialement adaptés à des fins spécifiques pour l'interrogation
17.
CONNECTION AND SERVICE DISCOVERY FOR FINE RANGING APPLICATIONS
Various systems and methods for providing discovering smart card slots in a device are described herein. A server device for discovering smart card slots in a client device may be implemented with a processor subsystem; and memory including instructions, which when executed by the processor subsystem, cause the processor subsystem to perform operations comprising: receiving, at the server device from the client device, over an established Bluetooth connection, smart card connector parameters, the client device having a plurality of smart card slots; iterating through the plurality of smart card slots; at each slot of the plurality of smart card slots, using a smart card protocol to attempt to access an application at each slot, the application pre-associated with the server device; and in response to identifying the application exists in a slot of the plurality of smart card slots, connecting with the application.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 8/00 - Gestion de données relatives au réseau
H04W 76/14 - Établissement de la connexion en mode direct
H04W 88/06 - Dispositifs terminaux adapté au fonctionnement dans des réseaux multiples, p. ex. terminaux multi-mode
An initiator device of an access control system includes physical layer circuitry and processing circuitry operatively coupled to the physical layer circuitry. The processing circuitry is configured to initiate transmission of a command to a responder device, determine a first time measurement of a time duration from an end of sending the command to the responder device to a start of receiving a response to the command from the responder device, receive a response from the responder device that includes a second time measurement of a responder execution time of the command by the responder device, and generate an indication when the first time measurement and second time measurement indicate a relay attack.
A method of regulating access to an asset in an access control system. The method may include receiving one or more UWB signals from a credential device of a user over a first wireless connection, receiving a credential for the user of the credential device over a second wireless connection using a wireless communication protocol different than UWB, determining that the credential is valid for authorizing the user access to the asset substantially simultaneously with determining that the user intends to access the asset based on the one or more UWB signals, and based on determining that the credential is valid and that the user intends to access the asset, permitting access by the user to the asset.
H01Q 5/25 - Systèmes à ultralarge bande, p. ex. systèmes à résonnance multipleSystèmes à impulsions
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
20.
PREVENTING DAMAGE TO LASER ENGRAVER SUBSTRATE TRANSPORT MECHANISM
A laser engraving system may include a transport mechanism (100) to position an engraving target relative to a laser source (118). The transport mechanism may include a belt (104) to move the engraving target, a drive roller (106) to drive the belt, and a safe zone configured to protect at least a portion of the belt from the beam of laser energy. The safe zone may include a protection member configured to be positioned below the laser source such that at least a portion of the protection member is located between the laser source and the belt. Additionally, or alternatively, a portion of the engraving target (e.g., a transparent area of the engraving target) may be cantilevered over an edge of the transport mechanism and energy from the laser source may be directed to the portion of the engraving target over the edge of the transport mechanism.
B23K 26/402 - Enlèvement de matière en tenant compte des propriétés du matériau à enlever en faisant intervenir des matériaux non métalliques, p. ex. des isolants
An arrangement for closing an access member rotatable relative to a frame about a hinge axis, the arrangement comprising a primary element for fixation to either the frame or the access member; a secondary element for fixation to the other of the frame and the access member; a connection device arranged between the primary element and the secondary element and engaging the secondary element; and a force device comprising a drive element rotatable about a pivot axis and engaging the connection device, the force device being arranged to force rotation of the connection device relative to the primary element about the pivot axis, wherein a position of the force device relative to the primary element is adjustable after fixation of the primary element and the secondary element to adjust a distance between the pivot axis and the hinge axis. An access member system and a method are also provided.
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
A lock device comprising an input member rotatable about an input axis; an output member rotatable about an output axis; an electromechanical coupling device configured to adopt an uncoupled state, where rotation of the input member about the input axis is not transmitted to a rotation of the output member about the output axis, and a coupled state, where rotation of the input member about the input axis can be transmitted to a rotation of the output member about the output axis; an electric control system configured to control the coupling device to switch between the uncoupled state and the coupled state; and a sensor in signal communication with the control system, the sensor being configured to generate a position signal indicative of a position of the output member about the output axis. A lock system comprising a lock device is also provided.
An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
24.
ACCESS CONTROL SYSTEM WITH TEMPORARY IP CONNECTION
Methods and systems for temporarily enabling Internet Protocol (IP) connections for an access control system are provided. The methods and systems perform operations including receiving, by a server, a request to update configuration of an access control reader; transmitting, by the server to the access control reader over a wired link, a first instruction to temporarily switch from communicating with the server using a first communication mode to an IP communication mode; sending, from the server to the access control reader, IP packets comprising configuration information to update the configuration of the access control reader; and after the configuration of the access control reader has been updated, transmitting, by the server to the access control reader, a second instruction to switch from communicating using the IP communication mode back to communicating using the first communication mode.
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 69/18 - Gestionnaires multi-protocoles, p. ex. dispositifs uniques capables de gérer plusieurs protocoles
H04L 41/082 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant des mises à jour ou des mises à niveau des fonctionnalités réseau
It is provided a method for routing data in a communication network (8). The method being performed by a routing node (3). The method comprises: receiving (40) an uplink message from an end node (2) over a multicast wireless transmission; forwarding (42) the uplink message towards a destination node over a unicast transmission; receiving (44) a downlink message over a unicast transmission; determining (46) that a recipient of the downlink message is the end node (2); and transmitting (48) the downlink message over multicast to the end node (2). Corresponding routing node, gateway, computer programs and computer program products are also provided.
It is provided a receptacle holder (1, 1a-b) for selectively allowing a receptacle (4, 4a-b) to be removed. The receptacle holder (1, 1a-b) comprises: an attachment member (10) being configured to engage with a receptacle (4, 4a-b) to selectively keep the receptacle (4, 4a-b) in a locked engagement with the receptacle holder (1, 1a-b); a processor (60); and a memory (64) storing instructions (67) that, when executed by the processor, cause the receptacle holder (1, 1a-b) to: determine to unlock the attachment member (10); and unlock the receptable (4, 4a-b) from the attachment member (10). A corresponding receptacle holder, computer program and computer program product are also provided.
A47G 29/14 - Récipients pour déposer des aliments, p. ex. petit déjeuner, laitRécipients similaires pour colis avec accessoires pour éviter que les articles déposés ne soient indûment retirés
A47G 29/20 - Récipients pour déposer des aliments, p. ex. petit déjeuner, laitRécipients similaires pour colis avec accessoires pour éviter que les articles déposés ne soient indûment retirés avec accessoires pour empêcher que les articles déposés ne soient indûment retirés
27.
MECHANISMS, ASSEMBLIES AND ELECTRONIC LOCKING SYSTEM
Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess. A freewheel mechanism and assemblies for an electronic locking system are also provided.
A reader device of a physical access control system comprises an ultra-wide band (UWB) physical layer and processing circuitry. The processing circuitry is operatively coupled to the UWB physical layer and is configured to: receive access credential information from a separate second device; receive ranging information from the second device; grant access through a physical portal according to the access credential information and ranging information; determine a number of people intending to pass through the physical portal; and generate an indication according to the determined number.
G07C 9/15 - Barrières mobiles avec moyens d’enregistrement munies de dispositions empêchant le passage de plus d’une personne à la fois
G01S 7/41 - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe utilisant l'analyse du signal d'écho pour la caractérisation de la cibleSignature de cibleSurface équivalente de cible
G01S 13/02 - Systèmes utilisant la réflexion d'ondes radio, p. ex. systèmes du type radar primaireSystèmes analogues
G01S 13/76 - Systèmes utilisant la reradiation d'ondes radio, p. ex. du type radar secondaireSystèmes analogues dans lesquels des signaux de type pulsé sont transmis
29.
RFID SENSOR DEVICE AND METHOD OF MANUFACTURING THE SAME
An RFID sensor device (10) includes an RFID chip having a sensing circuitry for sensing a physical quantity such as temperature and strain. A spacer (18) is provided on a surface (S1) of a substrate (12) on which the RFID chip is mounted, and includes an opening (20) inside of which the RFID chip 14 is arranged. The thickness of the spacer (18) is selected such that, when the RFID sensor device (10) is attached to a surface to be monitored, the RFID chip is in close proximity to the surface to be able to reliably sense the desired physical quantity.
G06K 19/04 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par la forme
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
It is provided a method for performing an action by an electronic device (2), based on a first partial secret key (10a) and a corresponding second partial secret key (10b), wherein the first partial secret key (10a) and the second partial secret key (10b) form part of a threshold cryptography scheme (11) associated with a public key (12). The method comprises: transmitting (40), upon the device initialising, a request for a first partial secret key (10a) to a key server (3); receiving (42) the first partial secret key (10a) from the key server (3); storing (44) the first partial secret key (10a) only in volatile memory (70); retrieving (46) a second partial secret key (10b) from non-volatile memory (71); and performing (48) an action based on applying both the first partial secret key (10a) and the second partial secret key (10b).
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
31.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
A method including authenticating, by an access control system, a credential of a mobile device over a Bluetooth communication connection established between the mobile device and the access control system; receiving, via a reader of the access control system during a UWB ranging session between the mobile device and the reader, UWB data indicative of a location of the mobile device relative to the reader; determining, by the access control system, whether a user of the mobile device intends to access an asset secured by the access control system based on the UWB data and satisfying one or more intent criteria; and performing, by the access control system, a predefined function in response to determining that the user of the mobile device intends to access the asset.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/10 - Barrières mobiles avec moyens d’enregistrement
G07C 9/21 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer muni d’un code d’accès variable
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p. ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/64 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
32.
ULTRA-WIDE BAND DEVICE FOR ACCESS CONTROL READER SYSTEM
A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H01Q 5/25 - Systèmes à ultralarge bande, p. ex. systèmes à résonnance multipleSystèmes à impulsions
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
It is provided a method for determining a state of a door (15). The method is performed in a status determiner (1) based on accelerometer data of an accelerometer (18) that is fixed to the door (15). The method comprises: determining (40) that the door has transitioned from an open state (20) to a closing (21) state, based on a magnitude of a velocity of the door (15) in a first direction being greater than a closing velocity threshold (30); and determining (42) that the door has transitioned from a closing state (21) to an opening (23) state, based on a magnitude of a velocity of the door (15) in a second direction being greater than an opening velocity threshold (32), wherein the second direction is opposite from the first direction, wherein the opening velocity threshold (32) is based on an indication of position (29) of the door (15).
Methods and program code for determining the position and/or intent of a user (or device) holding, carrying, wearing, or mounted with a UWB-enabled device. Example computer readable medium for determining the position and/or intent of a user comprises program code that when executed by one or more processors, causes the one or more processors to determine a current temporal signature for a first device moving within an environment; compare the current temporal signature with at least a portion of a stored reference temporal signature corresponding to a secure asset within the environment; and base an access control decision corresponding to the secure asset on whether it is determined that the current temporal signature corresponds to the at least a portion of the stored reference temporal signature.
Systems and techniques may be used for selective engagement with a secure reader, for example in a multi-reader environment. An example technique may include detecting one or more secure access readers of a secure access system that are proximate to a mobile device, and identifying a list of predetermined secure access readers. The detected one or more secure access readers proximate to the mobile device may be compared to the list of predetermined secure access readers to identify a listed proximate secure access reader. The example technique may include, in response to identifying the listed proximate secure access reader, engaging, via the mobile device, with the listed proximate secure access reader.
It is provided an energy converter (10) for converting mechanical energy to electrically stored energy. The energy converter (10) comprises: a generator (9) comprising at least one winding (3); an energy storage device (7); a rectifier (27) provided between the generator and the energy storage device (7); a voltage boost circuit (4, 6) that is selectively activated; a control circuit (8) that is configured to: detect that a voltage that is energised by the generator (9) is below a threshold voltage; and activate the voltage boost circuit (4, 6) of the door closer to increase the voltage supplied to the energy storage device (7). A corresponding door closer is also provided.
H02M 1/00 - Détails d'appareils pour transformation
H02M 7/00 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continuTransformation d'une puissance d'entrée en courant continu en une puissance de sortie en courant alternatif
H02M 7/02 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continu sans possibilité de réversibilité
H02M 7/12 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continu sans possibilité de réversibilité par convertisseurs statiques utilisant des tubes à décharge avec électrode de commande ou des dispositifs à semi-conducteurs avec électrode de commande
H02M 7/66 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continuTransformation d'une puissance d'entrée en courant continu en une puissance de sortie en courant alternatif avec possibilité de réversibilité
H02M 7/72 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continuTransformation d'une puissance d'entrée en courant continu en une puissance de sortie en courant alternatif avec possibilité de réversibilité par convertisseurs statiques utilisant des tubes à décharge avec électrode de commande ou des dispositifs à semi-conducteurs avec électrode de commande
37.
TRANSMITTING DATA FOR DETECTING SUSPICIOUS ACTIVITY BY AN ELECTRONIC LOCK
It is provided a method for enabling detecting suspicious activity by an electronic lock (2). The method comprises: obtaining (40) communication data being metadata of communication to and/or from the electronic lock (2); obtaining (42) internal state data being metadata of an internal state of the electronic lock; obtaining (44) event data indicating at least one event and a time of for the event, wherein the event has occurred for the electronic lock; and transmitting (46) the communication data, the internal state data and the event data to a monitoring server (3). Corresponding electronic lock (2), monitoring server (3), computer programs (67, 167, 91) and computer program products (64, 164, 90) are also provided.
Systems and methods may be used for controlling physical access using a cloud transaction. A method may include receiving an authentication attempt for a user from a mobile device, and authenticating the user for access to a physical space based on the authentication attempt. The method may include receiving identification information corresponding to the user from an access control device, and sending authorization to the access control device to permit the user to access the physical space based on the authenticating the user.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G08B 21/22 - Alarmes de situation réagissant à la présence ou à l'absence de personnes
39.
ASSIGNING AN INSTALLATION LOCATION FOR EACH ONE OF A PLURALITY OF ELECTRONIC LOCKS
It is provided method for assigning an installation location for each one of a plurality of electronic locks (12a-g), the method being performed in a position determiner (1), the method comprising: obtaining (42) a distance and a direction between a pair of electronic locks, based on the radio transceivers of the pair of electronic locks; storing (45) an identifier of each electronic lock (12a-g) of the pair, the distance and the direction; determining (48) a derived map (4) of the electronic locks (12a-g) of the pairs; obtaining (50) a reference map (5) comprising installation locations (13a-g), the reference map (5) covering an area in which the electronic locks (12a-g) are installed; and assigning (52), based on the derived map (4) and the reference map (5), the identifier of each one of the electronic locks (12a-g) to one of the installation locations (13a-g) in the reference map (5).
A padlock (10) comprising a body (12); a shackle (14); a blocking mechanism (22) arranged to adopt a blocked state (24) and a unblocked state (26) for blocking and unblocking, respectively, the shackle in a locked shackle position; a locking element (28) rotatable for controlling the blocking mechanism; an actuator (38) configured to adopt a locked state (40) for locking the locking element, and an unlocked state (42); an actuating element (48) operatively connected to the locking element and arranged to be manually manipulated to move the locking element when the actuator adopts the unlocked state; an electronic control system (56) arranged to control the actuator; and at least one energy harvesting device (58), each energy harvesting device being arranged to be actuated by a movement of the shackle, the locking element or the actuating element to generate electric energy to the control system (56).
It is provided a method for providing hardware integrity control of an electronic device (2). The method comprising: triggering (40) each one of a plurality of components (4a-d) of the electronic device to generate of respective partial secret keys (10a-d) forming part of a threshold cryptography scheme (11) associated with a public key (12), wherein a threshold number of the plurality of partial secret keys (10a-d) are required to be applied in the threshold cryptography scheme (11) for verification against the public key (12); and providing (42) the public key (12) to a hardware verification device (3). A corresponding hardware integrity device (1), computer program (67, 91) and computer program product (64, 90) are also provided.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
42.
ARRANGEMENTS FOR CLOSING ACCESS MEMBER, AND ACCESS MEMBER SYSTEMS
An arrangement for closing an access member rotatable relative to a frame, the arrangement comprising a frame part for fixation to the frame; an access member part for fixation to the access member, the access member part being rotatable relative to the frame part about a hinge axis between a closed position and an open position; a mechanical force device configured to store mechanical energy from an opening movement of the access member part from the closed position to the open position, and configured to release the stored mechanical energy to a closing movement of the access member part from the open position to the closed position; an electromagnetic generator arranged to be driven by the closing movement to generate electric energy; and a freewheel arranged to disengage during the opening movement and to engage during the closing movement to drive the generator.
E05F 3/16 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p. ex. ralentisseursStructure des dispositifs de freinage pneumatique ou à liquide à freins à friction
E05F 1/06 - Mécanismes ayant la forme de charnières, gonds ou pivots, manœuvrés par le poids du battant
E05F 3/20 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p. ex. ralentisseursStructure des dispositifs de freinage pneumatique ou à liquide dans les charnières ou gonds
09 - Appareils et instruments scientifiques et électriques
Produits et services
Radio frequency identification devices, namely transponders; identification devices consisting of an assembly of an electronic circuit and an antenna contained in a housing, namely transponders.
44.
DETERMINING WHEN TO ESTABLISH A COMMUNICATION CHANNEL FOR ACCESS CONTROL
It is provided a method for determining when to establish a communication channel using an electronic lock (12) controlling access to a restricted physical space (16). The method is performed by a portable key device (2). The method comprises: obtaining (40) a first time-indicator indicating when the portable key device (2) detects a stop in motion of the portable key device (2); receiving (42) a broadcast message from the electronic lock (12); deriving (44) a second time-indicator based on the received broadcast message, the second time-indicator indicating when the electronic lock (12) determines a stop in motion; determining (46) that a difference between the first time-indicator and the second time-indicator is less than a threshold; and establishing (48) a communication channel between the portable key device and the electronic lock when it is determined that the difference between the first time-indicator and the second time-indicator is less than the threshold.
It is provided an electronic lock for controlling access to a restricted physical space. The electronic lock comprises: a first credential interface for accepting a credential from a user for evaluating whether access for the user should be granted; and a second credential interface for accepting a credential from a user for evaluating whether access for the user should be granted. The first credential interface is configured to be activated when the user causes an interaction with the first credential interface, without activating any other credential interfaces. The second credential interface is configured to be activated when a user causes an interaction with the second credential interface, without activating any other credential interfaces.
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
09 - Appareils et instruments scientifiques et électriques
37 - Services de construction; extraction minière; installation et réparation
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Locks of metal; mechanical locks [electric, metal]; keys;
safes; electronic safes and safe deposit boxes; parts and
equipment for all the aforementioned goods. Electric, electronic and electromechanical locks and lock
goods, also including electronic lock cylinders, electric
striking plates, door magnets, electronic keys, key cards,
also including electronic or magnetic access control cards
and smart cards, and key card readers, also including
electronic or magnetic access control card readers and smart
card readers; units for programming locks, lock cylinders,
keys, key cards, key card readers and safes; electric and
electronic panels for doors, gates, barriers and windows;
electronic and magnetic sensors; CCTV systems and devices;
electric, electronic and electromechanical access control
apparatus and systems; security or alarm apparatus and
systems; apparatus and systems for providing identification
and authentication data for near field communication (NFC)
tags, digital keys and identity data; apparatus and systems
for implementing access control functionality for identity
verification and access or denial of access to digital data,
physical premises or computer networks; computer software,
apparatus and systems for managing and operating mini bars
and energy consumption devices; apparatus and instruments
for recording, monitoring, asset tracking, signalling and
checking; magnetic and electronic identity cards; magnetic
data carriers and computer software. Installation, maintenance and repair of locks, locking
mechanisms, access control apparatus and instruments, and
its parts and fittings; installation, maintenance and repair
of security and access control systems and devices;
installation, maintenance and repair of apparatus and
instruments used for facilities management and asset
tracking systems. Design and development of computers, computer systems,
computer software, technology solutions, internet of things
(IoT) solutions, mobile and web applications in the field of
access control and security, including secure identity
solutions and asset tracking systems; design and development
of apparatus and instruments in the field of access control,
security, facilities management; consultancy services
regarding energy efficiency in buildings; consultancy and
information regarding the aforesaid services. Security services for the protection of property and
individuals; data lifecycle management services for others,
namely, issuance, authentication and revocation of digital
signature and digital rights for physical and logical access
control systems and secure identity solutions [safety and
security services]; security consultants.
47.
KEYPAD COMPRISING KEYS CAUSING BOTH MCU WAKE-UP AND KEY DETECTION
It is provided it is provided a keypad comprising: a voltage bus configured to distribute power in the keypad; and a plurality of keys: a plurality of row key connections; and a plurality of column key connections: A wake-up signal causes a microcontroller to transition from a low-power state to an active state such that the microcontroller can detect which one of the plurality of keys was actuated. Each key is connected to a single row key connection and a single column key connection. Each row key connection and/or each column key connection is provided with a respective port circuit that is configured to connect the key connection with keys of the keypad when the wake-up signal is activated. Each port circuit comprises a respective port switch that is turned off in the low-power state to disconnect the column key connections/row key connections from the keys of the keypad.
It is provided a method for handling access rights for access to a physical space (16a-g), comprising: communicating (40) with a credential (2) of a user (5), based on short-range wireless communication; determining (42) that the credential (2) does not currently have access rights to access the physical space (16a-g); finding (44) a communication address to a superior (6) to the user (5); generating (46) an increased-access request message, comprising a link that, when activated, adds a first access role to the user (5); sending (48) the increased-access request message to the address of the superior (6); receiving (50) an indication that the superior has activated the link, adding the first access role to the user (5); and granting (52) access for the user (5) to the physical space (16a-g).
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
49.
Perimeter offline secure exchange of access control token
A method, access control system, and readers for use in an access control system are described. One example of the disclosed method providers the ability to securely augment an existing physical access control system that relies on access control tokens (e.g., credentials) with a secure mobile-based solution allowing the secure local offline exchange of a new access control token for another that can be used with the existing installed access control system.
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 12/0431 - Distribution ou pré-distribution de clésMise en accord de clés
An RFID device (10) is provided. The RFID device (10) includes a first loop antenna (14) embedded in a device body (12), and a second loop antenna (16) embedded in the device body (12). The first loop antenna (14) and the second loop antenna (16) partially overlap each other by a set distance (d). This results in a suppression of a cross-coupling between the first loop antenna (14) and the second loop antenna (16), and allows for an optimum use of the space that is available for the antennas on the device body (12). In this manner, a reliable operation of the two antennas within desired communication ranges can be obtained.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/10 - Barrières mobiles avec moyens d’enregistrement
G07C 9/21 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer muni d’un code d’accès variable
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p. ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/64 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
It is provided a method for providing a privacy-enhanced delegated access right to unlock a physical lock. The method comprises: obtaining a derivation scalar; receiving a cryptographically signed delegation from the delegator device, the delegation being a data object comprising a public key of the delegator device, a public key of the physical lock, and a derived public key for the delegatee device, and wherein the delegation is cryptographically signed using a secret key that is paired with the public key of the delegator device; obtaining a source secret key for the delegatee device, the source secret key being paired with the source public key; calculating a derived secret key for the delegatee device using the source secret key for the delegatee device and the derivation scalar; providing the delegation to the physical lock; and authenticating the delegatee device with the physical lock using the derived secret key.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
53.
PROVIDING A CREDENTIAL FOR USE WITH AN ELECTRONIC LOCK
It is provided a method for providing a credential for use with an electronic lock (7) to access to restricted physical space (16). The method comprises: receiving (40) a credential that unlocks the electronic lock (7); generating (42) a credential identifier associated with the credential; sending (44) the credential identifier to an EAC (5); receiving (46), from an electronic wallet provider (6), a request for the credential, wherein the request comprises the credential identifier; packaging (48) the credential, resulting in packaged credential, wherein the packaging complies with a format, selected from a plurality of formats for different electronic wallet providers, corresponding to the electronic wallet provider from which the request is received, enabling the credential to be provided to an electronic wallet in a user device (2) for unlocking the electronic lock (7); and sending (50) the packaged credential to the electronic wallet provider (6).
The present disclosure refers to a battery module (10), a main module (20) and a modular RFID reader (30). The battery module (10) is configured to be releasably connected to the main module (20) such that when connected the battery module (10) and the main module (20) together form an RFID reader (30) attachable to a fuel dispensing nozzle (50). The battery module (10) comprises a first antenna (12), a battery control circuitry (13), a battery cell (11), a first electrical connector (70) and a battery case (15). The main module comprises a second antenna (22), a main control circuitry (23), a second electrical connector (71) and a main case (25). The modular RFID reader (30) comprises multiple battery modules (10), a main module (20) and a connecting means such as bolts (6) configured to connect one of the multiple battery modules (10) with the main module (20). Each of the multiple battery modules (10) is individually connectable to the main module (20) to form an RFID reader (30).
G07F 13/02 - Appareils déclenchés par pièces de monnaie pour commander la distribution de fluides, de produits semi-liquides ou de produits granuleux contenus dans des réservoirs au volume
G06F 3/08 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement à partir de, ou vers des supports d'enregistrement distincts, p. ex. carte perforée
B67D 7/14 - Aménagements des dispositifs pour commander, indiquer, mesurer ou enregistrer la quantité ou le prix du liquide transféré répondant à l'insertion d'information de programmes enregistrés, p. ex. sur cartes perforées
B67D 7/34 - Moyens pour empêcher un débit de liquide non autorisé
55.
CONTROLLING A SLIDING DOOR COMPRISING A FIRST DOOR LEAF AND A SECOND DOOR LEAF
It is provided a method for controlling a sliding door comprising a first door leaf and a second door leaf. The method is performed by a door controller. The method comprises: determining a position of a person approaching sliding door, in relation to the sliding door; predicting an entry position, where the person is expected to enter through the sliding door, based on the position; determining a near door leaf, being the door leaf, of the first door leaf and the second door leaf, whose centre point, in a horizontal plane, is closer to the predicted entry position, and a far door leaf being the other door leaf, of the first door leaf and the second door leaf; and opening the sliding door asymmetrically, such that a near door leaf opens more than the far door leaf.
E05F 15/73 - Mécanismes pour battants mus par une force motrice avec déclenchement automatique sensible au déplacement ou à la présence de personnes ou d’objets
56.
Upper layer device architecture for ultra-wide band enabled device
A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
It is provided a method for enabling access, using a temporary passcode (25. 25a-f), to a physical space (16) secured by an electronic lock (12). The method is performed in a passcode provider (1). The method comprises: synchronising (40) with the electronic lock (12) to align times for temporary passcode generation: receiving (42) a signal to provide a temporary passcode for unlocking the electronic lock: determining (44) a temporary passcode, the temporary passcode being valid only until an end time at the electronic lock (12); and providing (46) the temporary passcode for forwarding to a temporary passcode recipient.
G07C 9/33 - Enregistrement de l’entrée ou de la sortie d'une entité isolée ne comportant pas l’utilisation d’un laissez-passer combiné à une vérification d’identité au moyen d’un mot de passe
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
58.
RF CHARACTERISTIC USED TO VALIDATE GENUINENESS AND COUNTER A RELAY ATTACK
A verifier device for an access control system includes physical layer circuitry configured to transmit and receive radio frequency (RF) electrical signals; processing circuitry operatively coupled to the physical layer circuitry and including at least one hardware processor; and a memory. The memory stores instructions that cause the at least one hardware processor to perform operations including: decoding credential information included in a received RF signal; determining an RF fingerprint of the received RF signal, wherein the RF fingerprint includes one or more RF signal parameters determined for the received RF signal; authenticating the credential information and the RF fingerprint; and initiating access to a physical access portal in response to authentication of the credential information and the RF fingerprint.
An electronic lock for controlling access to a restricted physical space. The electronic lock comprises: electronically-controllable lock hardware; and a system-on-chip, SoC, comprising a processor and memory. The SoC comprises: a trusted environment comprising a secure data storage and a lock-core software module comprising instructions that, when executed by the processor, cause the electronic lock to: evaluate access for a user based on data stored in the secure data storage and control the lock hardware based on the evaluation; and an untrusted environment comprising untrusted software that is prevented from bypassing the lock-core software module to control the electronically-controllable lock hardware.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
60.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/10 - Barrières mobiles avec moyens d’enregistrement
G07C 9/21 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer muni d’un code d’accès variable
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p. ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/64 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
61.
METHODS FOR RECOVERING A DEVICE, APP AND SYSTEM INCLUDING THE DEVICE
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
Still further a System is provided comprising a device (D) and an App stored on the device (D) which is adapted to carry out the method.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Lock cylinders of metal; metal lock cylinders and specially
adapted parts therefor; door and window locksets of metal;
metal push button locks; metal door locks; metal mortise
cylinders; metal mortise locksets; metal multi-point locks;
metal nightlatch locks; metal rim locks; metal rim
cylinders; metal deadbolts; deadlocks of metal for doors,
and specially adapted parts therefor; metal padlocks;
padlocks and specially adapted parts therefor; latchbolts of
metal; metal keys; metal key blanks; tumbler key cylinders
of metal; metal tubular locksets; metal master key systems
consisting of interchangeable core lock cylinders and master
keys of metal; non-electric metal door closers; non-electric
metal door openers; emergency and panic devices for doors
and windows of metal being door and window latching axels,
bars and mounting bridges incorporating a release latch in
the event of an emergency; emergency and panic devices,
namely, metal mechanical exit devices; emergency and panic
devices, namely, mechanical exit pushbars of metal; metal
mechanical door closers; exit push bars and exit door trim;
metal mortise dead locks; metal exit device trim; metal
cylindrical locksets; metal indicator locks and locksets,
namely, privacy locks with vacant/occupied indicators; kits
for metal indicator locks and locksets comprised of metal
escutcheons, visual occupancy indicators, and back plates;
metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and
operators; hydraulic door controls. Software for controlling and communicating with electronic
lock systems, wired and wireless locking and access control
apparatus, systems and devices; cloud-based lock management
software; software for computers, computer operative
systems, electronic devices, mobile phones in the access
control field for controlling and managing building
environment access and security systems; electric and
electronic locks, electronic keycards, blank smart cards and
RFID (radio-frequency identification) credentials, namely,
cards for radio frequency identification credentials; all of
the aforesaid goods in the field of lock and access control
management solutions for buildings, dwellings, premises and
their facilities; digital door viewer peepholes; electric
and electronic apparatus, namely, electrified and electronic
control systems, namely, electronic control systems for room
locking systems and door locking systems; electrified and
electronic control apparatus being electrified fences and
electrified door handles; electrified and electronic locking
systems being digital locks and electromagnetic locks;
fingerprint door locks, electric and electromechanical door
and window hardware, namely, electronic lock assemblies;
electric, electronic and electromechanical locks and lock
goods, namely, electronic locking mechanisms for doors and
safes; electronic or magnetic access control cards and smart
cards, namely, electronic identification cards,
identification smart cards, encoded magnetic cards, encoded
identity cards, encoded integrated circuit cards; electronic
or magnetic access control card readers, namely, reading
devices for cards incorporating electronic chips, electronic
card readers, card readers for magnetically encoded cards,
magnetic encoded card readers, chip card readers, and smart
card readers; keycards namely, encoded key cards, hotel room
key smart cards; keycard readers, namely, encoded key card
readers; digital and electromagnetic door locks actuated by
a keyboard; electronically controlled window locks and door
locks; electronic keys for doors and windows; electrical and
electronic locking devices being electronic lock assemblies;
door ajar alarm locks; electronic computer keypads; electric
door strikes; magnetic and electronic identity cards; door
access control systems and operators in the nature of
electronic access control systems for doors; door access
control systems and operators, namely, electromechanical
exit devices being digital door locks consisting of
electromechanical door latches and digital door locks that
secure doors and allow for ingress and egress to facilities;
keypad locks; pushbutton keypad locks; capacitive
touchscreen keypad locks; downloadable mobile software
application for computerized management and control of
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices, dry contact-controlled
appliances, environmental control devices; downloadable
mobile software application for computerized management and
control of Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for enabling premises access and
security authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric identification apparatuses;
downloadable software for integration of computer systems,
applications, data, and databases as it relates to physical
premises security, electronic door hardware, electronic
locks, readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software for integration of computer systems, applications,
data, and databases as it relates to dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems;
downloadable mobile software application for physical
premises security access authentication; downloadable
software in the nature of a mobile application for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software in the nature of a mobile application for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; downloadable application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
downloadable application programming interface (API)
software for integration control of IP enabled devices
including dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for displaying, sorting, and sharing
data in the field of access control, facilities management,
and physical premises security. Providing temporary use of non-downloadable on-line software
and applications for managing, locating, activating and
revoking electronic, electromechanical, electric locks,
digital keys, and access rights; design and development of
computers, computer systems, computer software, technology
solutions, and mobile and web applications in the field of
facilities access control; product design and development of
apparatus and instruments in the field of facilities access
control; providing technical information regarding the
aforesaid services; all of the above services in the field
of lock and access control management solutions for
buildings, dwellings, premises and their facilities;
providing temporary use of online, non-downloadable software
for computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices, dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses; providing temporary use
of online, non-downloadable software for computerized
management and control of cameras, fire systems, and
security and surveillance systems and devices; Software as a
Service (SaaS) featuring software and Platform as a Service
(PaaS) featuring computer software platforms, all for
computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices; Software as a Service (SaaS) featuring software and
Platform as a Service (PaaS) featuring computer software
platforms, all for computerized management and control of
dry contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
integration of computer systems, applications, data, and
databases as it relates to physical premises security,
cameras, fire systems; Software as a Service (SaaS)
featuring software and Platform as a Service (PaaS)
featuring computer software platforms, all for integration
of computer systems, applications, data, and databases as it
relates to physical premises security, cameras, fire
systems; providing temporary use of online, non-downloadable
software for enabling premises access and security
authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric and gesture identification apparatuses;
Software as a Service (SaaS) featuring software and Platform
as a Service (PaaS) featuring computer software platforms,
all for enabling premises access and security authentication
by means of encoded security cards, electronic key fobs
being remote control apparatuses, mobile credentials,
electronic personal identification (PIN) pad codes, and
biometric and gesture identification apparatuses; providing
temporary use of online, non-downloadable cloud-based
software for connecting, operating, and managing networked
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable cloud-based software for
connecting, operating, and managing networked dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
physical premises security access authentication; providing
temporary use of online, non-downloadable software for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; providing
temporary use of online, non-downloadable software for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; providing temporary use of
online, non-downloadable software for use in managing
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable software for use in managing dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems, and
security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security; Software as a
Service (SaaS) featuring software and Platform as a Service
(PaaS) featuring computer software platforms, all for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security.
63.
SMART ADAPTIVE POWER SAVING FOR MULTIPLE TECHNOLOGY CREDENTIAL READER
A method and system for adaptive power saving for a multiple technology credential reader may provide improved credential reader power management. The multiple technology credential reader may poll for a first credential type using a first credential radio within the plurality of credential radios. The multiple technology credential reader may discover a first device associated with the first credential type within a radio frequency range of the first credential radio and may cause, responsive to discovering the first device, a second credential radio associated with a second credential type to enter a low power mode. The multiple technology credential reader may determine the first device is positioned within a close proximity threshold range of the multiple technology credential reader, and may authorize a credential access (e.g., physical access, logical access) for the first device responsive to determining the first device is positioned within the close proximity threshold range.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Lock cylinders of metal; metal lock cylinders and specially
adapted parts therefor; door and window locksets of metal;
metal push button locks; metal door locks; metal mortise
cylinders; metal mortise locksets; metal multi-point locks;
metal nightlatch locks; metal rim locks; metal rim
cylinders; metal deadbolts; deadlocks of metal for doors,
and specially adapted parts therefor; metal padlocks; metal
padlocks, other than electronic, and specially adapted parts
therefor; latchbolts of metal; metal keys; metal key blanks;
tumbler key cylinders of metal; metal tubular locksets;
metal master key systems consisting of interchangeable core
lock cylinders and master keys of metal; non-electric metal
door closers; non-electric metal door openers; emergency and
panic devices for doors and windows of metal being door and
window latching axels, bars and mounting bridges
incorporating a release latch in the event of an emergency;
emergency and panic devices, namely, metal mechanical exit
devices; emergency and panic devices, namely, mechanical
exit pushbars of metal; metal mechanical door closers; exit
push bars and exit door trim; metal mortise dead locks;
metal exit device trim; metal cylindrical locksets; metal
indicator locks and locksets, namely, privacy locks with
vacant/occupied indicators; kits for metal indicator locks
and locksets comprised of metal escutcheons, visual
occupancy indicators, and back plates; metal thumbturn
levers. Hydraulic, pneumatic, and electric door closers and
operators; hydraulic door controls. Software for controlling and communicating with electronic
lock systems, wired and wireless locking and access control
apparatus, systems and devices; cloud-based lock management
software; software for computers, computer operative
systems, electronic devices, mobile phones in the access
control field for controlling and managing building
environment access and security systems; electric and
electronic locks, electronic keycards, blank smart cards and
RFID (radio-frequency identification) credentials, namely,
cards for radio frequency identification credentials; all of
the aforesaid goods in the field of lock and access control
management solutions for buildings, dwellings, premises and
their facilities; digital door viewer peepholes; electric
and electronic apparatus, namely, electrified and electronic
control systems, namely, electronic control systems for room
locking systems and door locking systems; electrified and
electronic control apparatus being electrified fences and
electrified door handles; electrified and electronic locking
systems being digital locks and electromagnetic locks;
fingerprint door locks, electric and electromechanical door
and window hardware, namely, electronic lock assemblies;
electric, electronic and electromechanical locks and lock
goods, namely, electronic locking mechanisms for doors and
safes; electronic or magnetic access control cards and smart
cards, namely, electronic identification cards,
identification smart cards, encoded magnetic cards, encoded
identity cards, encoded integrated circuit cards; electronic
or magnetic access control card readers, namely, reading
devices for cards incorporating electronic chips, electronic
card readers, card readers for magnetically encoded cards,
magnetic encoded card readers, chip card readers, and smart
card readers; keycards namely, encoded key cards, hotel room
key smart cards; keycard readers, namely, encoded key card
readers; digital and electromagnetic door locks actuated by
a keyboard; electronically controlled window locks and door
locks; electronic keys for doors and windows; electrical and
electronic locking devices being electronic lock assemblies;
door ajar alarm locks; electronic computer keypads; electric
door strikes; magnetic and electronic identity cards; door
access control systems and operators in the nature of
electronic access control systems for doors; door access
control systems and operators, namely, electromechanical
exit devices being digital door locks consisting of
electromechanical door latches and digital door locks that
secure doors and allow for ingress and egress to facilities;
keypad locks; pushbutton keypad locks; capacitive
touchscreen keypad locks; downloadable mobile software
application for computerized management and control of
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices, dry contact-controlled
appliances, environmental control devices; downloadable
mobile software application for computerized management and
control of Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for enabling premises access and
security authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric identification apparatuses;
downloadable software for integration of computer systems,
applications, data, and databases as it relates to physical
premises security, electronic door hardware, electronic
locks, readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software for integration of computer systems, applications,
data, and databases as it relates to dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems;
downloadable mobile software application for physical
premises security access authentication; downloadable
software in the nature of a mobile application for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; downloadable
software in the nature of a mobile application for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; downloadable application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
downloadable application programming interface (API)
software for integration control of IP enabled devices
including dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
downloadable software for displaying, sorting, and sharing
data in the field of access control, facilities management,
and physical premises security. Providing temporary use of non-downloadable on-line software
and applications for managing, locating, activating and
revoking electronic, electromechanical, electric locks,
digital keys, and access rights; design and development of
computers, computer systems, computer software, technology
solutions, and mobile and web applications in the field of
facilities access control; product design and development of
apparatus and instruments in the field of facilities access
control; providing technical information regarding the
aforesaid services; all of the above services in the field
of lock and access control management solutions for
buildings, dwellings, premises and their facilities;
providing temporary use of online, non-downloadable software
for computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices, dry contact-controlled appliances, environmental
control devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses; providing temporary use
of online, non-downloadable software for computerized
management and control of cameras, fire systems, and
security and surveillance systems and devices; software as a
service (SaaS) featuring software and platform as a service
(PaaS) featuring computer software platforms, all for
computerized management and control of electronic door
hardware, electronic locks, readers, and lock cylinders,
power door operators, electronic access control systems and
devices; software as a service (SaaS) featuring software and
platform as a aervice (PaaS) featuring computer software
platforms, all for computerized management and control of
dry contact-controlled appliances, environmental control
devices, Internet of things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
integration of computer systems, applications, data, and
databases as it relates to physical premises security,
cameras, fire systems; software as a service (SaaS)
featuring software and platform as a service (PaaS)
featuring computer software platforms, all for integration
of computer systems, applications, data, and databases as it
relates to physical premises security, cameras, fire
systems; providing temporary use of online, non-downloadable
software for enabling premises access and security
authentication by means of encoded security cards,
electronic key fobs being remote control apparatuses, mobile
credentials, electronic personal identification (PIN) pad
codes, and biometric and gesture identification apparatuses;
software as a service (SaaS) featuring software and platform
as a service (PaaS) featuring computer software platforms,
all for enabling premises access and security authentication
by means of encoded security cards, electronic key fobs
being remote control apparatuses, mobile credentials,
electronic personal identification (PIN) pad codes, and
biometric and gesture identification apparatuses; providing
temporary use of online, non-downloadable cloud-based
software for connecting, operating, and managing networked
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable cloud-based software for
connecting, operating, and managing networked dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
physical premises security access authentication; providing
temporary use of online, non-downloadable software for
interfacing with electronic door hardware, electronic locks,
readers, and lock cylinders, power door operators,
electronic access control systems and devices; providing
temporary use of online, non-downloadable software for
interfacing with dry contact-controlled appliances,
environmental control devices, Internet of Things (IoT)
enabled devices, RF-controlled sensors and devices,
RF-controlled appliances, electronic personal identification
(PIN) pads, biometric and gesture identification
apparatuses, cameras, fire systems, and security and
surveillance systems and devices; providing temporary use of
online, non-downloadable software for use in managing
electronic door hardware, electronic locks, readers, and
lock cylinders, power door operators, electronic access
control systems and devices; providing temporary use of
online, non-downloadable software for use in managing dry
contact-controlled appliances, environmental control
devices, Internet of Things (IoT) enabled devices,
RF-controlled sensors and devices, RF-controlled appliances,
electronic personal identification (PIN) pads, biometric and
gesture identification apparatuses, cameras, fire systems,
and security and surveillance systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including electronic door hardware,
electronic locks, readers, and lock cylinders, power door
operators, electronic access control systems and devices;
application service provider featuring application
programming interface (API) software for integration control
of IP enabled devices including dry contact-controlled
appliances, environmental control devices, Internet of
Things (IoT) enabled devices, RF-controlled sensors and
devices, RF-controlled appliances, electronic personal
identification (PIN) pads, biometric and gesture
identification apparatuses, cameras, fire systems, and
security and surveillance systems and devices; providing
temporary use of online, non-downloadable software for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security; software as a
service (SaaS) featuring software and platform as a service
(PaaS) featuring computer software platforms, all for
displaying, sorting, and sharing various application data in
the field of facilities access control, facilities
management and physical premises security.
An actuating device (12a, 12b, 12c) for a lock device (10) comprising a stationary structure (90) having a credential receiver (40) for receiving a credential input (42) from a user; an actuating element (16) rotatable about an actuation axis (18) relative to the stationary structure by direct manipulation by the user, where the stationary structure is arranged at least partly inside the actuating element; a locking member (24) movable between a locked position (106) and an unlocked position (no); and an electromechanical transfer device (y2a-y2c) arranged, based on the credential input, to adopt a disabled state (104), in which the locking member cannot be moved from the locked position to the unlocked position by rotation of the actuating element, and an enabled state (108) in which the locking member can be moved from the locked position to the unlocked position by rotation of the actuating element; wherein the credential receiver is at least partly arranged radially inside the actuating element with respect to the actuation axis.
Lock device for an electronic locking system, the lock device comprising an input member arranged to rotate about an input rotational axis; an output member arranged to rotate about an output rotational axis; an energy harvesting arrangement configured to generate electric energy from rotation of the input member in a first direction about the input rotational axis; and a selective transfer device movable between a locking state, in which the output member cannot be rotated about the output rotational axis by means of rotation of the input member about the input rotational axis, and an unlocking state, in which the output member can be rotated about the output rotational axis by means of rotation of the input member in the first direction about the input rotational axis; wherein the transfer device is powered by the energy harvesting arrangement. An electronic locking system and a method are also provided.
H01Q 5/25 - Systèmes à ultralarge bande, p. ex. systèmes à résonnance multipleSystèmes à impulsions
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
An arrangement (12) for controlling movements of an access member (16) relative to a frame (14), the arrangement (12) comprising an input element (26) arranged to perform a closing input movement (44) for causing a closing movement (38) of the access member (16); an electromagnetic generator (48) drivingly connected to the input element (26) for generating electric energy by the closing input movement (44); and a brake device (64) arranged to mechanically brake the generator (48) to hold the generator (48) stationary. An access member system (10) comprising the arrangement (12), the access member (16) and the frame (14), is also provided.
E05F 1/10 - Appareils de fermeture ou d'ouverture pour battants, non prévus ailleurs dans la présente sous-classe actionnés par ressort pour battants pivotants
E05F 3/22 - Dispositions complémentaires pour appareils de fermeture, p. ex. pour maintenir en position ouverte ou autre position le battant
E05F 15/63 - Mécanismes pour battants mus par une force motrice utilisant des actionneurs électriques utilisant des électromoteurs rotatifs pour battants pivotants manœuvrés par bras pivotants
An arrangement (12; 12b-12e) for controlling movements of an access member (16) relative to a frame (14), the arrangement comprising an input element (26) arranged to perform a closing input movement (44) for causing a closing movement (38) of the access member; an output element (76a-76c) drivingly connected to the input element; a brake device (64a; 64b) arranged to adopt an active state (33) where the brake device mechanically brakes the output element and holds the brake device stationary, and an inactive state (27) where the brake device does not brake the output element; and a state transmission (11; 11a-11c) arranged to transmit a load (45) acting on the input element to a switching of the brake device from the active state to the inactive state. An access member system (10) comprising the arrangement is also provided.
An arrangement (12) for controlling movements of an access member (16) relative to a frame (14), the arrangement (12) comprising an input element (26); a mechanical closing force device (52) arranged to force the input element (26) to perform an closing input movement (44) to a closed input position (28) for causing a closing movement (38) of the access member (16) to a closed position (20); a mechanical opening force device (64) arranged to assist the input element (26) to perform an opening input movement (40), opposite to the closing input movement (44); and an opening motor (66) arranged to preload the opening force device (64) while the input element (26) is in the closed input position (28). An access member system (10) comprising an arrangement (12), an access member (16) and a frame (14) is also provided.
E05F 3/22 - Dispositions complémentaires pour appareils de fermeture, p. ex. pour maintenir en position ouverte ou autre position le battant
E05F 15/63 - Mécanismes pour battants mus par une force motrice utilisant des actionneurs électriques utilisant des électromoteurs rotatifs pour battants pivotants manœuvrés par bras pivotants
It is provided a method for managing a door closer (1) for closing a door (15). The door closer (1) comprises a generator (6) and an energy storage device (7). The method is performed by the door closer (1). The method comprises: obtaining (40) a target parameter for the door closer; obtaining (44) at least one measurement when a door closing operation of the door closer is in progress; and adjusting (46), based on the at least one parameter, braking of the door closer to approach the target parameter. Corresponding door closer, computer program and computer program product are also provided.
In an embodiment, an initiating device and a responding device exchange ephemeral public keys. The initiating device generates a signature that includes a first value and both ephemeral public keys, and that is signed with an initiating-device static secret key. The initiating device calculates a shared secret from the responding-device ephemeral public key and the initiating-device ephemeral secret key, and then generates a symmetric key based on (i) the shared secret and (ii) context-binding identifiers of both ephemeral public keys. The initiating device generates an encryption package that includes the signature and a public-key certificate that includes an initiating-device static public key and a cryptographic signature of a trusted authority, and that is encrypted with the generated symmetric key. The initiating device transmits the encryption package to the responding device. The responding device performs similar complementary operations, and a secure mutual authentication flow is achieved.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems and techniques for preserving and improving ink jet nozzle health and printing reliability are disclosed herein. The method may include monitoring whether a triggering event has occurred. In response to detecting the triggering event has occurred, pumping at least a portion of ink contained in a header tank in a direction toward an ink cartridge through a tube connecting the header tank to the ink cartridge. The header tank connected to a print head included as a part of a scan head. The method may further include circulating the ink through the tube back into the header tank, and agitating the scan head by moving the scan head along an x-y gantry. Additional methods may include reverse purging, ejecting a portion of ink through nozzles on the print head while simultaneously wiping a nozzle plate included on the print head, and randomizing print head location when printing.
B41J 2/045 - Machines à écrire ou mécanismes d'impression sélective caractérisés par le procédé d'impression ou de marquage pour lequel ils sont conçus caractérisés par la mise en contact sélective d'un liquide ou de particules avec un matériau d'impression à jet d'encre caractérisés par le procédé de formation du jet en produisant à la demande des gouttelettes ou des particules séparées les unes des autres par pression, p. ex. à l'aide de transducteurs électromécaniques
B41J 2/165 - Prévention du colmatage des ajutages, p. ex. nettoyage, obturation par un capuchon ou humidification des ajutages
Systems and techniques for preserving and improving ink jet nozzle health and printing reliability are disclosed herein. The method may include monitoring whether a triggering event has occurred. In response to detecting the triggering event has occurred, pumping at least a portion of ink contained in a header tank in a direction toward an ink cartridge through a tube connecting the header tank to the ink cartridge. The header tank connected to a print head included as a part of a scan head. The method may further include circulating the ink through the tube back into the header tank, and agitating the scan head by moving the scan head along an x-y gantry. Additional methods may include reverse purging, ejecting a portion of ink through nozzles on the print head while simultaneously wiping a nozzle plate included on the print head, and randomizing print head location when printing.
B41J 2/045 - Machines à écrire ou mécanismes d'impression sélective caractérisés par le procédé d'impression ou de marquage pour lequel ils sont conçus caractérisés par la mise en contact sélective d'un liquide ou de particules avec un matériau d'impression à jet d'encre caractérisés par le procédé de formation du jet en produisant à la demande des gouttelettes ou des particules séparées les unes des autres par pression, p. ex. à l'aide de transducteurs électromécaniques
B41J 2/165 - Prévention du colmatage des ajutages, p. ex. nettoyage, obturation par un capuchon ou humidification des ajutages
09 - Appareils et instruments scientifiques et électriques
Produits et services
Radio frequency identification devices, namely transponders; identification devices consisting of an assembly of an electronic circuit and an antenna contained in a housing, namely transponders.
76.
PACS MODIFICATION TO INCORPORATE LACS AUTHENTICATION
A method of integrating a logical access control system with a physical access control system is disclosed. A soft token is received at a hard-ware accessory from a client device of a user. The soft token includes a payload. The payload includes information about the user that is stored in a user profile of the logical access control system. Based on a verifying of the soft token using a certificate extracted from a trust store of the hardware accessory, the information about the user that is included in the payload is parsed. Based on the information about the user satisfying one or more access criteria of a reader associated with a physical access control system, the reader is triggered. The triggering includes emulating a transaction associated with the physical access control system.
An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
09 - Appareils et instruments scientifiques et électriques
37 - Services de construction; extraction minière; installation et réparation
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Locks of metal; mechanical locks [electric, metal]; keys; safes; electronic safes and safe deposit boxes; parts and equipment for all the aforementioned goods. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic or magnetic access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; CCTV systems and devices; electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; computer software, apparatus and systems for managing and operating mini bars and energy consumption devices; apparatus and instruments for recording, monitoring, asset tracking, signalling and checking; magnetic and electronic identity cards; magnetic data carriers and computer software. Installation, maintenance and repair of locks, locking mechanisms, access control apparatus and instruments, and its parts and fittings; installation, maintenance and repair of security and access control systems and devices; installation, maintenance and repair of apparatus and instruments used for facilities management and asset tracking systems. Design and development of computers, computer systems, computer software, technology solutions, internet of things (IoT) solutions, mobile and web applications in the field of access control and security, including secure identity solutions and asset tracking systems; design and development of apparatus and instruments in the field of access control, security, facilities management; consultancy services regarding energy efficiency in buildings; consultancy and information regarding the aforesaid services. Security services for the protection of property and individuals; data lifecycle management services for others, namely, issuance, authentication and revocation of digital signature and digital rights for physical and logical access control systems and secure identity solutions [safety and security services]; security consultants.
79.
METHOD AND MOBILE DEVICE FOR PROVIDING A TIME READING
It is provided a method for providing a time reading. The method is performed by a mobile device (2) comprising a secure element (1) comprising a real-time clock (7). The method comprises: synchronising (40), by the secure element, the real-time clock (7) with a time server (3); letting (42) the real-time clock (7) run in the secure element (1); receiving (44), by the secure element (1), a current time request (30) from a time reader (6), via a mobile device (2); generating (46), by the secure element (1), a response, the response comprising a current time reading from the real-time clock (7), and cryptographic verification data; and sending (48), by the secure element (1), the response (32), via the mobile device (2), to the time reader (6).
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Disclosed herein are systems and methods for deterministic and handsfree engagement for data transfer of mobile identification and other data. In an embodiment, a computer system presents disambiguation data via a user interface, and also broadcasts one or more advertising packets containing the disambiguation data. The computer system establishes a wireless connection with a mobile device. This includes receiving, from the mobile device, at least one message that contains shared-secret data that is based on the disambiguation data. The computer system receives, from the mobile device via the established wireless connection, a mobile driver' s license (mDL) of a user of the mobile device.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
81.
SYSTEMS AND METHODS FOR EXTENDING CRYPTOGRAPHIC CERTIFICATES WITH TARGET-BINDING INFORMATION
A first computing device maintains multiple resource-specific asymmetric keypairs that are each uniquely associated with a different protected resource on the first device, including a first resource-specific asymmetric keypair that is uniquely associated with a first protected resource. The first device engages with a second device in an authentication flow based on the first resource-specific asymmetric keypair. The first device receives, from the second device, a public-key certificate that contains target-binding data that indicates a specified asymmetric keypair. The first device checks whether the specified asymmetric keypair matches the first resource-specific asymmetric keypair. If so, and assuming any other authentication conditions are also met, the first device authenticates the second device to the first resource-specific asymmetric keypair, and grants the second device access to the first protected resource.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
82.
PEOPLE DETECTOR FOR DETECTING WHEN PEOPLE PASS THROUGH A DOORWAY
It is provided a people detector (1) for detecting when people pass through a doorway. The people detector (1) comprises: a first image source (11); a second image source (12); a processor (60); and a memory (64) storing instructions (67) that, when executed by the processor, cause the people detector (1) to: receive a first stream of images from the first image source (11); determine, based on the first stream of images, a confidence indicator that a single person passes through the doorway; when the confidence indicator indicates confidence, determine that a single person has passed through the doorway; and when the confidence indicator indicates non-confidence, receive a second stream of images from the second image source (12), and determine, based on the second stream of images, how many people has passed through the doorway.
G06V 10/75 - Organisation de procédés de l’appariement, p. ex. comparaisons simultanées ou séquentielles des caractéristiques d’images ou de vidéosApproches-approximative-fine, p. ex. approches multi-échellesAppariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexteSélection des dictionnaires
G06V 10/80 - Fusion, c.-à-d. combinaison des données de diverses sources au niveau du capteur, du prétraitement, de l’extraction des caractéristiques ou de la classification
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
It is provided a people detector for detecting when people pass through a doorway of a door by which the people detector is installed. The people detector comprises: a people sensor; a processor; and a memory storing instructions that, when executed by the processor, cause the people detector to: receive a door status signal indicating opening status of the door; determine when a person passes through the doorway based on the people sensor and the door status signal.
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
E05F 15/73 - Mécanismes pour battants mus par une force motrice avec déclenchement automatique sensible au déplacement ou à la présence de personnes ou d’objets
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Locks and lock goods, also including lock cases, lock cylinders, striking plates, keys and key blanks; Door springs, non-electric; safes and safety boxes; doors, gates, barriers and windows; frames, hinges and handles; door, gate and barrier closers (not electric); emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; fittings and mountings for doors, gates, barriers and windows; wind breaks; loading dock levelers, bridges, ramps and plates; wheel chocks; panels and wires; turnstiles; all the aforesaid goods being of metal or predominantly of metal; small items of metal hardware. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic devices and access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; computer software for managing and operating minibars; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; Closed circuit television systems and devices (CCTV); electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; apparatus and systems for managing mini bars and energy consumption in hotels, homes, companies, public establishments; apparatus and instruments for recording, monitoring, signalling and checking, also including checking and/or controlling people's movement within, entrance to and exit from buildings and through doors, gates, barriers and/or for use with locks; system for connecting and remotely controlling entrance installations including docking equipment; magnetic and electronic identity cards; cloud-based lock management software; wired and wireless locks, locking and access control apparatus, devices and software for buildings, dwellings, premises and their facilities; magnetic data carriers and computer software. Design and development of computers, computer systems, computer software, technology solutions, mobile and web applications in the field of access control and security, including secure identity solutions; design and development of apparatus and instruments in the field of access control and security; consultancy and information regarding the aforesaid services; architectural and engineering services relating to doors, barriers, gates, loading dock superstructures and related parts and components; consultancy services relating to the design of doors, barriers, gates, loading superstructures and associated parts and components; data lifecycle management (for others), namely the issuance, authentication and revocation of digital signatures and digital rights for physical and logical access control systems and secure identity solutions; providing use of on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, access rights for buildings, dwellings, premises and their facilities; consultancy services regarding energy efficiency in buildings.
86.
REMOTE ACCESS VIA SYSTEM-LEVEL TRUSTED AUTHORITIES
Methods and systems for establishing a system specific trust system are provided. The methods and systems establish a secure channel between a first device and a second device using a system specific trusted authority. The methods and systems determine, by the first device, using a first certificate associated with the second device, a first set of access rights of the second device and determine, by the second device, using a credential associated with the first device, a second set of access rights of the first device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
A computing device implemented method of provisioning credential information includes activating a credentialing application stored in an authenticator device; receiving, by the credentialing application, user information entered into the authenticator device; establishing a secure channel between the authenticator device and an authentication server; sending the user information to the authentication server via the secure channel; generating a challenge by the authentication server in response to the user information and presenting the challenge to the user; sending a response to the challenge from the authenticator device to the authentication server via the secure channel; receiving a command from the authentication server to generate the credential information including a key pair; and registering a key of the key pair with the authentication server.
A handle assembly (12a, 12b) comprising a base structure (26a, 26b) for fixation to an access member (18a, 18b); a handing element (38a, 38b); a spring (40a, 40b); and a handle (28a, 28b); wherein the handing element is rotatable relative to the base structure about a rotation axis (30) together with the spring and the handle between a first handing position (54a) and a second handing position (54b); wherein the handle is rotatable relative to the handing element about the rotation axis against a deformation of the spring when the handing element is in the first handing position and in the second handing position; and wherein the base structure comprises a first stop (48a) arranged to be engaged by the handing element to define the first handing position and a second stop (48b) arranged to be engaged by the handing element to define the second handing position.
A verifier device of an authentication system comprises physical layer circuitry and processing circuitry coupled to the physical layer circuitry. The processing circuitry is configured to encode an authentication command for sending to a credential device; decode a response communication received from the credential device, wherein the response communication includes a first random number; encrypt the first random number, a second random number, and verifier keying material for sending to the credential device; decrypt encrypted information received from the credential device, wherein the encrypted information includes the first random number, the second random number, and receiver keying material; and calculate a session encryption key using the verifier keying material and the receiver keying material.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Techniques for detecting tapering of a physical access control device or a barrier secured by the physical access control device are provided. In an example, an apparatus to control physical access to a secure area via an opening can include multiple tamper sensors. The controller can generate a tamper signal based on a discrepancy between signals received form the multiple tamper sensors and one or more profile signals.
A lock device (12) comprising a bolt (28) movable between an extended bolt position (44) and a retracted bolt position (82), the bolt having a bolt structure (60); an auxiliary member (30) movable between an extended auxiliary position (46) and a retracted auxiliary position (84), the auxiliary member having an auxiliary structure (66); a sensor (48); and a trigger member (50) movable between a deactivated position (52) where the trigger member does not cause activation of the sensor, and an activated position (86) where the trigger member causes activation of the sensor, the trigger member being forced towards the activated position; wherein the bolt structure and the auxiliary structure are arranged to allow the trigger member to move from the deactivated position to the activated position when the bolt adopts the extended bolt position and the auxiliary member adopts the retracted auxiliary position.
E05B 17/20 - Moyens indépendants du mécanisme de verrouillage pour empêcher une ouverture non autorisée, p. ex. pour bloquer le pêne en position de fermeture
E05B 55/00 - Serrures dans lesquelles une clenche coulissante est utilisée également comme pêne de verrouillage
E05B 55/12 - Serrures dans lesquelles une clenche coulissante est utilisée également comme pêne de verrouillage avec pêne maintenu bloqué par le fonctionnement d'un élément parallèle caché
E05B 63/10 - Serrures pour mortaises ne nécessitant que deux trous cylindriques dans le battant
E05B 17/22 - Moyens de fonctionnement ou de commande d'accessoires de serrures ou dispositifs d'immobilisation, c.-à-d. autres que les moyens d'immobilisation, p. ex. interrupteurs, indicateurs
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers.
(2) Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls.
(3) Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. (1) Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise lock cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim lock cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; metal padlocks and specially adapted parts therefor; latches of metal; metal keys for locks; metal key blanks; tumbler key cylinders of metal for locks and keys therefor; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers, namely, spring-loaded door closers of metal and hinge pin door closers of metal; nonelectric metal door openers, namely, spring-loaded door openers of metal, hinge pin door openers of metal, foot-operated door openers of metal; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices in the nature of push bars and panic bars; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers, namely, spring-loaded door closers of metal and hinge pin door closers of metal; metal exit push bars and exit door trim; metal auxillary locks; metal exit device trim, namely, metal door levers, handles and pulls; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers for metal locksets Hydraulic, pneumatic, and electric door closers and door operators, namely, door holders, door releases being door release mechanisms, door openers and releases being door openers with a release mechanism, door holders and releases being door holders with a release mechanism; hydraulic door controls, namely, hydraulic patch fittings for doors and hydraulic door hinges Downloadable and recorded software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; downloadable cloud-based lock management software; downloadable and recorded software for computers, computer operative systems, electronic devices and mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes, namely, digital cameras for use as door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; biometric fingerprint door locks; electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; electronic door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks, namely, electronic locks consisting of electronic cylindrical locksets and keypads; pushbutton keypad locks, namely, electronic locks consisting of electronic cylindrical locksets and pushbutton keypads; capacitive touchscreen keypad locks, namely, electronic locks consisting of electronic cylindrical locksets and capacitive touchscreen keypads; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RFcontrolled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) services featuring software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Platform as a Service (PaaS) featuring computer software platforms for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) services featuring software for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; Platform as a Service (PaaS) featuring computer software platforms for computerized management and control of dry contact controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) services featuring software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Platform as a Service (PaaS) featuring computer software platforms for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) services featuring software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Platform as a Service (PaaS) featuring computer software platforms for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, nondownloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, nondownloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) services featuring software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Platform as a Service (PaaS) featuring computer software platforms for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security
94.
NON-REPUDIATION-FREE PUBLIC KEY AUTHENTICATION PROTOCOLS
Methods and systems for securely communicating with an access control system are provided. The methods and systems establish, between first and second devices, a communication session based on a plurality of ephemeral keys. The methods and systems compute, by the first device, a shared session key as a function of a second public key of the second device and a sum of a first private key of the first device and a first ephemeral key of the plurality of ephemeral keys; and compute, by the second device, the shared session key as a function of a second private key of the second device and a sum of a first public key of the first device and a second ephemeral key of the plurality of ephemeral keys. The methods and systems exchange one or more messages securely between the first device and the second device using the shared session key.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
An arrangement (12a; 12b) comprising a drive element (26a; 26b) movable between a closed drive position (28) and an open drive position (44); a mechanical force device (56a; 56b) arranged to force the drive element in a closing drive movement (46); a force device transmission (62a; 62b) arranged to transmit movements of the drive element to movements of the mechanical force device; and an electric machine (58) drivingly connected to the drive element; wherein the mechanical force device and the force device transmission are configured to act more forcefully on the drive element during a latching drive movement (50) than during a closing initial drive movement (48); and wherein the arrangement further comprises an electronic control system (70a; 70b) configured to control the electric machine to operate as an electric generator during the closing initial drive movement, and to control the electric machine to operate as an electric motor during the latching drive movement.
E05F 3/10 - Appareils de fermeture ou d'ouverture à dispositif de freinage, p. ex. ralentisseursStructure des dispositifs de freinage pneumatique ou à liquide avec freins à piston à liquide avec ressort, autre qu'un ressort de torsion, et un piston, dont les axes sont les mêmes ou sont dans la même direction
E05F 3/22 - Dispositions complémentaires pour appareils de fermeture, p. ex. pour maintenir en position ouverte ou autre position le battant
E05F 15/63 - Mécanismes pour battants mus par une force motrice utilisant des actionneurs électriques utilisant des électromoteurs rotatifs pour battants pivotants manœuvrés par bras pivotants
Methods and systems for protecting user credentials from swapping attacks are provided. The methods and systems establish, between a first device and a second device, a communication session and receive, by the second device from the first device, a certificate associated with the first device. The methods and systems obtain credential selection information from the certificate associated with the first device and transmit a credential corresponding to the credential selection information from the second device to the first device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Disclosed herein are systems and methods for using a web/Bluetooth API for mobile access control. In an embodiment, a computing system receives an endpoint identifier associated with a visitor. The system generates a URL associated with the endpoint identifier, and transmits the URL to an endpoint associated with the endpoint identifier. The system receives, from a mobile device associated with the visitor, a request for a web/Bluetooth Low Energy (BLE) webpage corresponding to the URL. The system generates the requested webpage, and transmits the webpage to the mobile device. The webpage contains a valid credential for access to a secured resource, and also contains executable code for calling at least one function of a web/BLE API. The system transmits the webpage to the mobile device, and thereafter receives the credential from the mobile device via a BLE communication, verifies the credential, and accordingly grants access to the secured resource.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
An RFID assembly (10) includes an RFID chip (14) having a coupling loop (15) formed as part of the RFID chip (14). In this manner, the RFID chip (14) can be inductively coupled to a far-field antenna (16) for RFID communications, without any physical connections between the RFID chip (14) and the coupling loop (15) and/or the far-field antenna (16). This results in a high temperature resistance of the RFID assembly (10), which can be advantageously used, in particular, during tracking of parts in assembly processes requiring higher temperatures.
Methods and systems for communicating with an access control system preserving privacy are provided. The methods and systems establish, between a first device and a second device, a privacy key pair using a group generator, the privacy key pair comprising a privacy public key and a privacy private key, and compute, by the first and second devices, ephemeral key pairs based on the privacy key pair. The methods and systems establish a shared session key based on the ephemeral key pairs and transmit, by the first device to the second device, a message comprising a certificate of the first device using the shared session key that has been established based on the ephemeral key pairs.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer