Barriers may utilize cores that may be pre-assembled and dropped into a barrier or may be formed within the barriers. The cores may include traditional core materials, biomass materials, graphite polystyrene (GPS) material, or other types of materials. The core may be formed from one or more layers, such as one or more stiffener layers (e.g., stiffener panel, stiffener rods, or the like), one or more matrix layers (e.g., with apertures extending therein), one or more solid layers (e.g., wood, plastic, composite, foam, fiber, or the like), one or more fluid sealed layers (e.g., air, argon, nitrogen, or other like), and/or other types of layers. The barrier edge members, the faces, and/or the core layers described herein may be assembled to each other in traditional ways, such as welding, and/or may be assembled to each other in a way that reduces the amount of welding and/or use of steel.
Barriers may utilize cores that may be pre-assembled and dropped into a barrier or may be formed within the barriers. The cores may include traditional core materials, biomass materials, graphite polystyrene (GPS) material, or other types of materials. The core may be formed from one or more layers, such as one or more stiffener layers (e.g., stiffener panel, stiffener rods, or the like), one or more matrix layers (e.g., with apertures extending therein), one or more solid layers (e.g., wood, plastic, composite, foam, fiber, or the like), one or more fluid sealed layers (e.g., air, argon, nitrogen, or other like), and/or other types of layers. The barrier edge members, the faces, and/or the core layers described herein may be assembled to each other in traditional ways, such as welding, and/or may be assembled to each other in a way that reduces the amount of welding and/or use of steel.
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
The present invention provides a method for recovering a device (D). The method comprises the steps of acquiring a recovery code with the device (D) to be recovered, matching an inherence factor of a user recovering the device (D) with an inherence factor of a user which is assigned to the device, and allowing a recovery of the device (D) if the inherence factor of the user recovering the device and the inherence factor of the user which is assigned to the device sufficiently matches. A further method is provided which comprises the steps of connecting the device (D) to be recovered to a cloud storage in which a backup of the device is stored, requesting a knowledge factor from the user recovering the device (D), allowing a recovery of the device (D) if the possession factor is correctly inputted into the device (D) to be recovered. Further an App is provided which can be stored on a device, which App contains instructions for carrying out the method.
Still further a System is provided comprising a device (D) and an App stored on the device (D) which is adapted to carry out the method.
Methods and systems for establishing a system specific trust system are provided. The methods and systems establish a secure channel between a first device and a second device using a system specific trusted authority. The methods and systems determine, by the first device, using a first certificate associated with the second device, a first set of access rights of the second device and determine, by the second device, using a credential associated with the first device, a second set of access rights of the first device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
A computing device implemented method of provisioning credential information includes activating a credentialing application stored in an authenticator device; receiving, by the credentialing application, user information entered into the authenticator device; establishing a secure channel between the authenticator device and an authentication server; sending the user information to the authentication server via the secure channel; generating a challenge by the authentication server in response to the user information and presenting the challenge to the user; sending a response to the challenge from the authenticator device to the authentication server via the secure channel; receiving a command from the authentication server to generate the credential information including a key pair; and registering a key of the key pair with the authentication server.
A handle assembly (12a, 12b) comprising a base structure (26a, 26b) for fixation to an access member (18a, 18b); a handing element (38a, 38b); a spring (40a, 40b); and a handle (28a, 28b); wherein the handing element is rotatable relative to the base structure about a rotation axis (30) together with the spring and the handle between a first handing position (54a) and a second handing position (54b); wherein the handle is rotatable relative to the handing element about the rotation axis against a deformation of the spring when the handing element is in the first handing position and in the second handing position; and wherein the base structure comprises a first stop (48a) arranged to be engaged by the handing element to define the first handing position and a second stop (48b) arranged to be engaged by the handing element to define the second handing position.
Methods and systems are provided for generating a first signal responsive to a first portion of a hand placed on a first portion of a sensor platen; guiding, by a waveguide, the first signal from the first portion of the sensor platen to a first sensor; responsive to receiving the first signal by the first sensor, computing a measurement using the first signal; and generating, based on the computed measurement, an image indicative of ridge topology of the first portion of the hand that is placed on the first portion of the sensor platen.
A verifier device of an authentication system comprises physical layer circuitry and processing circuitry coupled to the physical layer circuitry. The processing circuitry is configured to encode an authentication command for sending to a credential device; decode a response communication received from the credential device, wherein the response communication includes a first random number; encrypt the first random number, a second random number, and verifier keying material for sending to the credential device; decrypt encrypted information received from the credential device, wherein the encrypted information includes the first random number, the second random number, and receiver keying material; and calculate a session encryption key using the verifier keying material and the receiver keying material.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Techniques for detecting tapering of a physical access control device or a barrier secured by the physical access control device are provided. In an example, an apparatus to control physical access to a secure area via an opening can include multiple tamper sensors. The controller can generate a tamper signal based on a discrepancy between signals received form the multiple tamper sensors and one or more profile signals.
A lock device (12) comprising a bolt (28) movable between an extended bolt position (44) and a retracted bolt position (82), the bolt having a bolt structure (60); an auxiliary member (30) movable between an extended auxiliary position (46) and a retracted auxiliary position (84), the auxiliary member having an auxiliary structure (66); a sensor (48); and a trigger member (50) movable between a deactivated position (52) where the trigger member does not cause activation of the sensor, and an activated position (86) where the trigger member causes activation of the sensor, the trigger member being forced towards the activated position; wherein the bolt structure and the auxiliary structure are arranged to allow the trigger member to move from the deactivated position to the activated position when the bolt adopts the extended bolt position and the auxiliary member adopts the retracted auxiliary position.
Methods and systems for securely communicating with an access control system are provided. The methods and systems establish, between first and second devices, a communication session based on a plurality of ephemeral keys. The methods and systems compute, by the first device, a shared session key as a function of a second public key of the second device and a sum of a first private key of the first device and a first ephemeral key of the plurality of ephemeral keys; and compute, by the second device, the shared session key as a function of a second private key of the second device and a sum of a first public key of the first device and a second ephemeral key of the plurality of ephemeral keys. The methods and systems exchange one or more messages securely between the first device and the second device using the shared session key.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
13.
AUTOMATIC DOOR WITH BIASED OPEN AND MANUALLY CLOSED EXTERNAL PARTIAL DOOR
A door assembly may include a first sidelite configured to be operably coupled to a first door jamb, a second sidelite configured to be operably coupled to a second door jamb where the first and second sidelites are disposed in a common plane and defining a door opening between the first and second sidelites, a first sliding panel, a second sliding panel where the first and second sliding panels are movable from a closed position disposing the first and second sliding panels to block access through the door opening and an open position in which the first sliding panel is proximate the first sidelite and the second sliding panel is proximate the second sidelite, and are disposed in a second plane parallel to the common plane in both the open and closed position, a first partial door panel disposed in a third plane opposite the second plate relative to the common plane, and a second partial door panel disposed in the third plane, the first and second partial door panel being movable from being a closed state in which the first and second partial door panels at least partially block access through the door opening and an open state in which the first partial door panel is proximate the first sidelite and the second partial door panel is proximate the second sidelite. The first and second partial door panels are each operably coupled to a biasing assembly that biases the first and second partial door panels toward the open state, and the first and second partial door panels are configured to be transitioned to the closed state by manual operation against a force of the biasing assembly.
An arrangement (12a; 12b) comprising a drive element (26a; 26b) movable between a closed drive position (28) and an open drive position (44); a mechanical force device (56a; 56b) arranged to force the drive element in a closing drive movement (46); a force device transmission (62a; 62b) arranged to transmit movements of the drive element to movements of the mechanical force device; and an electric machine (58) drivingly connected to the drive element; wherein the mechanical force device and the force device transmission are configured to act more forcefully on the drive element during a latching drive movement (50) than during a closing initial drive movement (48); and wherein the arrangement further comprises an electronic control system (70a; 70b) configured to control the electric machine to operate as an electric generator during the closing initial drive movement, and to control the electric machine to operate as an electric motor during the latching drive movement.
E05F 3/10 - Closers or openers with braking devices, e.g. checks; Construction of pneumatic or liquid braking devices with liquid piston brakes with a spring, other than a torsion spring, and a piston, the axes of which are the same or lie in the same direction
E05F 3/22 - Additional arrangements for closers, e.g. for holding the wing in opened or other position
E05F 15/63 - Power-operated mechanisms for wings using electrical actuators using rotary electromotors for swinging wings operated by swinging arms
15.
AUTOMATIC DOOR WITH BIASED OPEN AND MANUALLY CLOSED EXTERNAL PARTIAL DOOR
A door assembly may include a first sidelite configured to be operably coupled to a first door jamb, a second sidelite configured to be operably coupled to a second door jamb where the first and second sidelites are disposed in a common plane and defining a door opening between the first and second sidelites, a first sliding panel, a second sliding panel where the first and second sliding panels are movable from a closed position disposing the first and second sliding panels to block access through the door opening and an open position in which the first sliding panel is proximate the first sidelite and the second sliding panel is proximate the second sidelite, and are disposed in a second plane parallel to the common plane in both the open and closed position, a first partial door panel disposed in a third plane opposite the second plane relative to the common plane, and a second partial door panel disposed in the third plane, the first and second partial door panel being movable from being a closed state in which the first and second partial door panels at least partially block access through the door opening and an open state in which the first partial door panel is proximate the first sidelite and the second partial door panel is proximate the second sidelite. The first and second partial door panels are each operably coupled to a biasing assembly that biases the first and second partial door panels toward the open state, and the first and second partial door panels are configured to be transitioned to the closed state by manual operation against a force of the biasing assembly.
E05D 15/08 - Suspension arrangements for wings for wings sliding horizontally more or less in their own plane consisting of two or more independent parts movable each in its own guides
E05F 15/73 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects
E05D 15/06 - Suspension arrangements for wings for wings sliding horizontally more or less in their own plane
E06B 3/92 - Doors or windows extensible when set in position
ASSA ABLOY Entrance Systems AB has developed torsion spring tensioning tool (100) for tensioning a torsion spring of a counterbalancing mechanism of an overhead door, wherein the torsion spring tensioning tool (100) comprises a housing (80), a gear wheel arrangement (20) adapted to be mounted on a shaft of the 5 counterbalancing mechanism, said gear wheel arrangement (20) comprising a gear wheel (21) rotatably arranged in the housing (80), the torsion spring tensioning tool (100) further comprising a gear mechanism (54) coupled to the gear wheel (21) for rotating said gear wheel (21). The gear wheel arrangement (20) comprises a first and second engaging arrangement (32, 60) arranged to be fixed relative to the gear wheel (21).
B25B 27/30 - Hand tools or bench devices, specially adapted for fitting together or separating parts or objects whether or not involving some deformation, not otherwise provided for for assembling objects other than by press fit or detaching same positioning or withdrawing springs, e.g. coil or leaf springs
Methods and systems for protecting user credentials from swapping attacks are provided. The methods and systems establish, between a first device and a second device, a communication session and receive, by the second device from the first device, a certificate associated with the first device. The methods and systems obtain credential selection information from the certificate associated with the first device and transmit a credential corresponding to the credential selection information from the second device to the first device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed herein are systems and methods for using a web/Bluetooth API for mobile access control. In an embodiment, a computing system receives an endpoint identifier associated with a visitor. The system generates a URL associated with the endpoint identifier, and transmits the URL to an endpoint associated with the endpoint identifier. The system receives, from a mobile device associated with the visitor, a request for a web/Bluetooth Low Energy (BLE) webpage corresponding to the URL. The system generates the requested webpage, and transmits the webpage to the mobile device. The webpage contains a valid credential for access to a secured resource, and also contains executable code for calling at least one function of a web/BLE API. The system transmits the webpage to the mobile device, and thereafter receives the credential from the mobile device via a BLE communication, verifies the credential, and accordingly grants access to the secured resource.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
An RFID assembly (10) includes an RFID chip (14) having a coupling loop (15) formed as part of the RFID chip (14). In this manner, the RFID chip (14) can be inductively coupled to a far-field antenna (16) for RFID communications, without any physical connections between the RFID chip (14) and the coupling loop (15) and/or the far-field antenna (16). This results in a high temperature resistance of the RFID assembly (10), which can be advantageously used, in particular, during tracking of parts in assembly processes requiring higher temperatures.
Methods and systems for communicating with an access control system preserving privacy are provided. The methods and systems establish, between a first device and a second device, a privacy key pair using a group generator, the privacy key pair comprising a privacy public key and a privacy private key, and compute, by the first and second devices, ephemeral key pairs based on the privacy key pair. The methods and systems establish a shared session key based on the ephemeral key pairs and transmit, by the first device to the second device, a message comprising a certificate of the first device using the shared session key that has been established based on the ephemeral key pairs.
In a biometric identification system, an illumination source can illuminate a platen surface of a transparent body with an illumination beam. The illumination beam can propagate away from the platen surface in a beam pattern that is shaped to correspond to an anatomical pattern, such as a fingerprint. An imaging lens having an optical axis can form an image of the beam pattern in an image plane. A sensor can sense the image of the beam pattern. An actuator can controllably vary a position of the image plane along the optical axis of the imaging lens. A processor can cause the actuator to move the image plane from a first location along the optical axis to a second location along the optical axis and cause the sensor to capture an image of the beam pattern when the image plane is located at the second location.
Methods and systems for trajectory and intent prediction are provided. The methods and systems include operations comprising: receiving an observed trajectory of a user and user behavior information; processing the observed trajectory by a machine learning technique to generate a plurality of predicted trajectories, the machine learning technique being trained to establish a relationship between a plurality of training observed trajectories and training predicted trajectories; adjusting the plurality of predicted trajectories based on the user behavior information to determine user intent to operate a target access control device; determining that the target access control device within a threshold range of a given one of the plurality of predicted trajectories; and in response to determining that the target access control device is within the threshold range of the given one of the plurality of predicted trajectories, performing an operation associated with the target access control device.
A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G07C 9/00 - Individual registration on entry or exit
H01Q 5/25 - Ultra-wideband [UWB] systems, e.g. multiple resonance systems; Pulse systems
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Methods and systems (100) for trajectory prediction are provided. The methods and systems (100) include operations comprising: receiving (501) a plurality of observed speed points; processing (502) the plurality of observed speed points corresponding to the observed trajectory by a machine learning technique to generate a plurality of predicted speed points, the machine learning technique being trained to establish a relationship between a plurality of training observed speed points and training predicted speed points; determining (503) a future trajectory based on the plurality of predicted speed points, each of the plurality of predicted speed points corresponding to a different slice of a plurality of slices of the future trajectory; determining (504) that a target access control device is within a threshold range of the future trajectory; and performing (505) an operation associated with the target access control device (110).
G01C 21/20 - Instruments for performing navigational calculations
G01C 21/12 - Navigation; Navigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigated; Dead reckoning
G07C 9/00 - Individual registration on entry or exit
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
26.
AUTOMATIC FLOOR ALIGNMENT CALIBRATION FOR AN ENTRANCE SYSTEM (I)
E05F 15/668 - Power-operated mechanisms for wings using electrical actuators using rotary electromotors for vertically-sliding wings for overhead wings
A brake device (12a, 12b) comprising a hard magnet (20); a soft magnet (22) configured to switch polarity between a first polarity and a second polarity when being subjected to a magnetic field and configured to maintain the polarity when the magnetic field is removed; an electric coil (24) located around the soft magnet; an electric control system (16) configured to apply a current pulse to the electric coil to generate the magnetic field for changing the polarization of the soft magnet; and a brake element (18) comprising a magnetic target section (28), the brake element being arranged to move to a released position (40) when the soft magnet adopts the first polarity, and arranged to move to a braking position (64) due to a magnetic field generated by the hard magnet and the soft magnet in combination and acting on the magnetic target section when the soft magnet adopts the second polarity.
Various systems and methods for providing discovering smart card slots in a device are described herein. A server device for discovering smart card slots in a client device may be implemented with a processor subsystem; and memory including instructions, which when executed by the processor subsystem, cause the processor subsystem to perform operations comprising: receiving, at the server device from the client device, over an established Bluetooth connection, smart card connector parameters, the client device having a plurality of smart card slots; iterating through the plurality of smart card slots; at each slot of the plurality of smart card slots, using a smart card protocol to attempt to access an application at each slot, the application pre-associated with the server device; and in response to identifying the application exists in a slot of the plurality of smart card slots, connecting with the application.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
A person guiding system (10) has at least two barriers (12) and at least one passage (13) having an automatic door (14), a controlled passageway (18) in front of the automatic door (14), and at least one projection unit (20). The at least one projection unit (20) is located at one of the barriers (12) and/or the automatic door (14) and configured to project an information field (32) including information for a person passing through the person guiding system (10). Further, a method for operating a person guiding system (10) is provided.
A method of provisioning an authentication device of an authentication system comprises sending an authentication application from an authentication system backend server to a backend network of a cellular network operator; verifying, by the backend network of the cellular operator, the authentication application and including the authentication application in an operator profile; sending the authentication application with the operator profile from the backend network of the cellular network operator to a local profile assistant (LPA) of the authentication device; and installing the authentication application in a secure zone of the authentication device using the LPA.
A method of encoding a credential device of an authentication system comprises sending credential device information to a backend server of the authentication system using a mobile device, verifying ownership of the credential device and the mobile device using the backend server, generating, using the backend server, a quick response (QR) code that includes encoding information for the credential device, generating using the backend server a quick response (QR) code that includes encoding information for the credential device, decoding the QR code to retrieve the encoding information, and encoding the credential device with the encoding information.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
A light grid for mounting on an elevator car door for object detection and for determining periodic door movements, including transmitter elements that emits radiation with a specific intensity, receiver elements for receiving the radiation from an assigned transmitter element, and a control device for evaluating the receiver elements in regard to interruption of the radiation coming from an assigned transmitter element and for outputting a signal for object recognition upon interruption. At least one receiver element is configured to output an intensity value for the received radiation. The control device evaluates the intensity value and distinguishes separate high, medium and low intensity value ranges with high, medium and low intensity values, and performs an alternation phase with at least one alternating from the low via the medium to the low intensity value range and to output a signal in the event of an alternation phase having been recognized.
Methods and systems are provided for performing operations comprising: storing a plurality of credentials on a client device; establishing, locally on the client device, a dependency relationship between a first credential of the plurality7 of credentials and a second credential of the plurality of credentials; determining, by the client device, that the first credential has been used to access a secure resource; and in response to determining that the first credential has been used to access the secure resource, triggering an access condition associated with the second credential based on the dependency relationship established between the first and second credentials
It is provided a method for enabling training of a machine learning, ML, model, for monitoring a person based on a data feed capable of depicting a person. The method is performed by a training data provider (i). The method comprises: obtaining (40) a data feed capable of depicting the person; selecting (42) a level of anonymisation, from a plurality of levels of anonymisation; anonymising (44) the data feed according to the selected level of anonymisation, resulting in a processed data feed; and feed transmitting (47) the processed data feed as training data for training a central ML model in a central node.
People counting device for an elevator car for determining a person entering or leaving the car, having a presence sensor at the entrance of the car for detecting the presence of a person in the region of the entrance or the passage of a person through the entrance and for outputting a detection signal in the event of presence or passage, having an accelerometer on the car, for detecting the vertical acceleration of the car and for outputting positive and negative acceleration values in relation to the upwards direction of movement of the car, and having an evaluation device that is designed, upon receipt of the detection signal, to receive a series of current acceleration values for a certain duration and to analyze whether one of the acceleration values or the motion profile resulting therefrom exceeds an upper threshold value or falls below a lower threshold value.
Systems and methods may be used for operation of a hardware fingerprint processing device. A method may include receiving an update including a fingerprint authentication algorithm, verifying a digital signature of the fingerprint authentication algorithm, and in response to verifying the digital signature, loading the fingerprint authentication algorithm into the memory. The loaded fingerprint authentication algorithm may be sued to authenticate a user. For example, a verification method may include receiving information corresponding to an image of a fingerprint, determining whether the fingerprint is authenticated using the fingerprint authentication algorithm, and optionally outputting an indication of whether the fingerprint is authenticated.
It is provided a method for finding faults in firmware for a lock device. The method is performed by a test device. The method comprises the steps of: receiving data indicating an event that results in operation of the firmware in a test lock device, the test lock device being capable of performing at least some of the functions of the lock device; sampling a plurality of measurements that are indicative of power use by the test lock device over time, wherein the measurements are captured to cover at least part of the operation of the firmware by the test lock device based on the event; and determining that a potential fault occurs in the firmware for the event when the sampled measurements fail to correspond to the event, based on previously recorded data for the same type of event.
The controller according to the invention is a controller for optimising the positioning process (levelling) of an elevator car at a stopping point for an elevator, which elevator has an elevator controller which controls the car stop at a stopping point depending on a predetermined spacing X from the stopping point, wherein the controller is designed, during at least two, in particular at least three journeys, to in each case receive a set consisting of the same measurement value, to determine a change dX or a changed spacing X' depending on the set of the current journey and at least one past journey, and to output the changed value X' or the difference dX from the predetermined spacing X.
It is provided a method for adapting an intent model (20), being a machine learning, ML, model for determining intent of a person to pass through a door (15). The method is performed by an intent determiner (1). The method comprises: determining (40) that a physical environment outside a door has changed; increasing (42) a rate of training of the intent model (20), wherein the training is based on input features based on image data from an image capturing device (11) covering an area near the door (15); and applying (44) the intent model (20) for inferring when a person exhibits intent to pass through the door, based on image data from the image capturing device (11).
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
A method of operating an access control system comprises detecting one or more physical access portals using an application of a mobile device; displaying notifications for the one or more physical access portals on a display screen of the mobile device; receiving a selection of a physical access portal using a user interface of the mobile device; establishing a secure communication channel with a secure relay device associated with the selected physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the selected physical access portal according to the encrypted access token.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
43.
ROLL DOOR UNIT, ROLL-UP DOOR AND USE OF A ROLL DOOR UNIT FOR COVERING A DOOR OPENING
The invention relates to a roll door unit (1 1) for covering a door opening, a roll-up door (IO) comprising this roll door unit and a specific use of the roll door unit (IO). The roll door unit (11) comprises a flexible door panel (16), a rotatable roll shaft (15) for rolling-up the flexible door panel (16), side frames (12), mounting flanges (14) for mounting the roll shaft (15) to the side frames (12), a connecting element (17) for connecting a motor unit (18) to the roll shaft (15), and supporting beams (13) for supporting the side frames (12) in mounted state and being connected or connectable to a wall or ground, whereby a longitudinal axis of the roll shaft (15) is positioned in alignment with a plane being spanned by the supporting beams (13). The technical solution described is characterized in that, the support beams (13) and the mounting flanges (14) are arranged at a distance from one another in such a way, that in mounted state forces exerted by the roll shaft (15) are introduced into the supporting beams (13) indirectly through the side frames (12).
A wi-fi sensing systems and techniques using receiving devices with two radio chains are described herein. The receiving devices may utilize the first radio chain to receive messages from a transmitter in a first wireless communication network and may generate environment characterization information based on those received messages. The receiving devices may utilize the second radio chain to transmit the environment characterization information to a host device using a second wireless communication network.
H04B 1/00 - TRANSMISSION - Details of transmission systems not characterised by the medium used for transmission
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
H04B 17/309 - Measuring or estimating channel quality parameters
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
G01S 13/74 - Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
A method of operating an access control system comprises receiving, by a mobile device, an identification of a physical access portal; verifying access credential information stored in the mobile device using a verification application of the mobile device; establishing a secure communication channel with a secure relay device associated with the physical access portal; sending an encrypted access token stored in the mobile device to the secure relay device; and granting access by the secure relay device to the physical access portal according to the encrypted access token.
A detection system (10) has an automatic door (14), a control unit (16) for operating the automatic door (14), a controlled passageway (18) in front of the automatic door (14), at least two barriers (12), and at least one time-of-flight camera (20). The barriers (12) are located on opposite lateral sides of the controlled passageway (18) confining the controlled passageway (18) in between. The time-of-flight camera (20) is located at one of the lateral sides of the controlled passageway (18), the field of view (36, 38, 40, 42) of the time-of-flight camera (20) spanning between a transverse border and a longitudinal border, wherein the transverse border extends substantially in the transverse direction (T) across the controlled passageway (18) and the longitudinal border extends substantially in the longitudinal direction (L) along the lateral side of the controlled passageway (18). Further, a method for operating an detection system (10) is provided.
A door assembly provides EMC shielding to provide EMI/RFI protection. The door assembly has an EMC door frame, an EMC door, and EMC seals for maintaining a circuit between the door frame, the floor (e.g., threshold, flooring, etc.), and/or the door. The door assembly may also utilize one or more EMC elements (e.g., EMC tape, paint, adhesive, coatings, caulk, etc.) that may be used to create the circuits between the components of the door assembly and/or with other components of the building (e.g., between the door frame and the wall). The EMC shielding is used to reduce (e.g., limit, block, etc.) the levels of electrogenic interference (EMI)/radio frequency interference (RFI) radiation that is able to pass by the shielding. Moreover, the door assembly also provides improve additional door assembly performance (e.g., sound, weather, air flow, heat, cold, or the like abatement, energy harvesting, or other performance benefits).
E06B 5/10 - Doors, windows, or like closures for special purposes; Border constructions therefor for other protective purposes
E06B 7/22 - Sealing arrangements on wings or parts co-operating with the wings by means of resilient edgings, e.g. felt or plush strips, resilient metal strips
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
19 - Non-metallic building materials
37 - Construction and mining; installation and repair services
Goods & Services
Metal hardware, Bolts (Lock- ), Locks, including the following products: hitch locks, mortise locks, Surface-mounted locks, Bicycle locks of metal and Doors openers and Panic/anti-panic locks, the latter in particular being self-locking; Lock cylinders, doors of metal, in particular security doors, fire doors and smoke doors, door cases of metal, door locks, door bolts, bolt activation elements, door fittings, in particular protective fittings, ancillary security devices for buildings, in particular security devices for windows and doors, security devices for blinds, security devices for grilles, security devices for hinges; Door stop systems and door stop devices; Parts, fittings and consumables for the aforesaid goods; Including all the aforesaid goods being parts for lock systems for locking doors, including with mortise locks and optional components on the door which interact therewith; Fire protection fittings, for use in relation to the following goods: Doors; Doors openers, for use in relation to the following goods: Fire doors. Opening and closing mechanisms, for use in relation to the following goods: Doors or Windows; Electric door openers and door closers including components therefor and installations consisting thereof; Including all the aforesaid goods being parts for lock systems for locking doors, including with mortise locks and optional components on the door which interact therewith; Drive units, for use in relation to the following goods: Doors; Door pushing mechanisms, In particular revolving door drives. Mechanical safety equipment, for use in relation to the following goods: doors or Windows, namely Motorised locks and Locks with sensors; Electric and electronic safety devices, for use in relation to the following goods: doors or Windows; door controllers, Escape route devices, Especially Emergency door openers, emergency door control terminals, electric locking systems for doors in emergency and escape exits, Devices with a screen, Apparatus for controlling, Monitoring apparatus, Emergency buttons, Signal appliances, Escape route signs, Strobe lights, Door terminal housings, sabotage contact switches, activation and release devices, Alarms, Key switches, Smoke alarms, Magnets and Panic bars, the aforesaid goods for emergency and escape route doors; Locks, electric, Panic/anti-panic locks, namely Self-locking locks with mechanical process control; Magnets, Especially Magnetic door clamps; Hazard alarms, Flame detectors, Smoke alarms, Smoke control switches, Code locks, Access control devices and access control installations, Door lock controllers and modules; Electric door openers with locking function; Electric door locks; Access control and fire alarm systems, Person identification installations; Escape door locks, in particular panic/anti-panic door locks and emergency exit locks, the aforesaid locks being electrically operated and/or mechanically actuated; Electronic monitoring and control devices for emergency door systems, panic/anti-panic door systems and emergency exit systems; Apparatus, instruments and installations for time recording, in particular for personnel time recording, productivity registration, project planning, utilisation planning, project management, personnel planning, service and shift planning; Parts, fittings and consumables for the aforesaid goods; Including all the aforesaid goods being parts for lock systems for locking doors, including with mortise locks and optional components on the door which interact therewith; Software for security devices for doors, windows and the like; Software for security devices for door drives; Fire alarm devices, Access control installations. Doors, In particular security doors and smoke doors; Fire doors; Fire protection barriers; Door cases; All the aforesaid goods not of metal; Parts, fittings and consumables for the aforesaid goods; Including all the aforesaid goods being parts for lock systems for locking doors, including with mortise locks and optional components on the door which interact therewith. Installation, maintenance and repair of the following goods: Security devices for doors, door locking systems, door controllers, escape route devices, door locks, Door bolts, Door stays, Locks, Panic/anti-panic locks, lock cylinders, Door openers, door closers; Installation, maintenance and repair of the following goods: Security devices for magnetic door clamps, seals for fire doors, Alarm systems, Fire-alarm systems, Smoke protection systems, building security systems, emergency door systems, panic/anti-panic door systems, emergency exit systems; Installation, maintenance and repair of the following goods: Security devices for code locks, access control devices, door locks, access control and fire alarm systems, systems for identifying individuals, electric door openers and door closers, Door drives, Emergency door controllers and emergency door monitors, Especially Panic/anti-panic doors and emergency exit doors; Installation, maintenance and repair of apparatus, instruments and installations for time recording, in particular personnel time recording, productivity registration, project planning, utilisation planning, project management, personnel planning, service and shift planning.
A door assembly provides EMC shielding to provide EMI/RFI protection. The door assembly has an EMC door frame, an EMC door, and EMC seals for maintaining a circuit between the door frame, the floor (e.g., threshold, flooring, etc.), and/or the door. The door assembly may also utilize one or more EMC elements (e.g., EMC tape, paint, adhesive, coatings, caulk, etc.) that may be used to create the circuits between the components of the door assembly and/or with other components of the building (e.g., between the door frame and the wall). The EMC shielding is used to reduce (e.g., limit, block, etc.) the levels of electrogenic interference (EMI) / radio frequency interference (RFI) radiation that is able to pass by the shielding. Moreover, the door assembly also provides improve additional door assembly performance (e.g., sound, weather, air flow, heat, cold, or the like abatement, energy harvesting, or other performance benefits).
power operated locking clamps for securing trailers or vehicles to loading docks for the prevention of movement while loading and unloading trailers or vehicles
54.
PROVIDING TRAINING DATA FOR A MACHINE LEARNING MODEL FOR MONITORING A PERSON BASED ON VIDEO DATA
It is provided a method for providing training data for a machine learning model for monitoring a person based on video data. The method is performed by a training data provider (1). The method comprises: obtaining (40) a data feed of the person, wherein the data feed comprises a series of images that preserves a privacy of the person; generating (42) fake video data of a fictive person, such that a face of the fake video data is a computer-generated face; combining (44) the data feed with the fake video data, resulting in training data; and providing (46) the training data for training the machine learning model.
(1) Power operated mechanical locking clamps for use in securing and preventing the movement of trailers and land vehicles against loading docks during the process of loading and unloading;
56.
COUPLING ARRANGEMENT FOR LOCK DEVICE, AND LOCK DEVICE
Coupling arrangement for a lock device, the coupling arrangement comprising an input and an output element rotatable about a rotation axis; an engaging member movable between a first and second position; an electric motor arranged to affect movement of the engaging member between the first and second positions; a coupling member rotationally locked to the input element and axially movable relative to the input element between a decoupled position, where a rotation of the input element is not transmitted by the coupling member to a rotation of the output element, and a coupled position where a rotation of the input element is transmitted by the coupling member to a rotation of the output element; and a transmission mechanism arranged to transmit a rotation of the coupling member to a movement of the coupling member from the decoupled position to the coupled position when the engaging member adopts the second position.
Methods and systems are provided for performing operations comprising: establishing a secure channel between an authenticator device and a client device; generating, by the authenticator device, a one-time passcode (OTP) based on a token received from the client device; storing the OTP in a memory of the authenticator device; transmitting the OTP to the client device over the secure channel; receiving the OTP from the client device over an unsecure channel; and enabling access to a secure resource in response to determining that the OTP received from the client device matches the OTP stored in the memory of the authenticator device.
A door leaf (14) for a door system (10) has a main component (24), a carrier profile (26) and a strap (28). The main component (24) has an upper end face, a front end face, a lower end face and a rear end face, wherein the carrier profile (26) is attached to the upper end face. The strap (28) has a first end (38) and a second end (40), wherein the strap (28) is attached to the carrier profile (26) with the first end (38), subsequently extends along the front end face, the lower end face and the rear end face of the main component (24) and is subsequently attached to the carrier profile (26) with the second end (40). Further, a door system (10) is shown.
The invention relates to a light grid for determining the distance between a transmitter and a receiver strip, comprising a transmitter strip with one or more transmitter elements which emit radiation of a specific intensity, a receiver strip with one or more receiver elements which receive the radiation of a paired transmitter element, and a controller for actuating the transmitter elements and/or the receiver elements and for analyzing the receiver elements. Each transmitter element and each receiver element or at least one of the transmitter elements and/or at least one of the receiver elements is designed as a qualified transmitter and receiver element, wherein the qualified transmitter element or the qualified transmitter elements are designed to emit different intensities and/or the qualified receiver element or the qualified receiver elements are designed to apply different amplification factors and to output an intensity value for the received and amplified radiation, and the controller is designed to actuate different combinations of intensities and amplification factors of the qualified transmitter and/or receiver elements and ascertain a distance value on the basis of the sum of the resulting intensity values of the actuated combinations.
The invention relates to a light grid for determining the distance between a transmitter and a receiver strip, comprising a transmitter strip with one or more transmitter elements which emit radiation of a specific intensity, a receiver strip with one or more receiver elements which receive the radiation of a paired transmitter element, and a controller for actuating the transmitter elements and/or the receiver elements and for analyzing the receiver elements. Each transmitter element and each receiver element or at least one of the transmitter elements and/or at least one of the receiver elements is designed as a qualified transmitter and receiver element, wherein the qualified transmitter element or the qualified transmitter elements are designed to emit different intensities and/or the qualified receiver element or the qualified receiver elements are designed to apply different degrees of amplification and to output an intensity value for the received and amplified radiation, and the controller is designed to actuate different combinations of intensities and degrees of amplifications of the qualified transmitter and/or receiver elements and ascertain a distance value on the basis of the sum of the resulting intensity values of the actuated combinations.
Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.
G07C 9/20 - Individual registration on entry or exit involving the use of a pass
G07C 9/00 - Individual registration on entry or exit
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A secure RFID device (10) is provided. The RFID device (10) includes one or more switch modules (26) that can be actuated by a user to selectively couple an integrated circuit (42) provided in a switch module (26) to a main RFID antenna (14) of the RFID device (10). It is therefore not necessary to provide a separate integrated circuit (42) coupled to the main RFID antenna (14). The integrated circuit (42) provided in each switch module (26) can be electrically or inductively coupled to the main RFID antenna (14) when a user actuates an actuation portion (36) of the corresponding switch module (26).
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
64.
NEAR-FIELD WITH FAR-FIELD TO VERIFY THAT DEVICE IS CONNECTED OR SECURED
The present disclosure relates to a method to check if a connector system with a Connector Position Assurance (“CPA”) member is in closed position. The method includes providing an RFID-tag reader that is positioned at a distance D to the integrated circuit enabling far-field RFID communication and not permitting near-field RFID communication. Further, the method includes checking the readability of the integrated circuit with the RFID-tag reader and issuing an alert signal if the integrated circuit is not readable by the RFID-tag reader indicating that the CPA member is not in the closed position.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
65.
SECURE ELEMENT ARRAYS IN INTERNET-OF-THINGS SYSTEMS
Systems and methods for providing secure execution of functions for edge devices include a plurality of edge devices, a controller, and an array of secure elements. The edge devices are each configured to obtain data for an application of the system. The controller is connected to communicate with the edge devices to receive the data from each of the edge devices. The array of secure elements is connected to the controller, and each secure element executes functions using the data received from the edge devices. The controller associates an identified secure element of the array of secure elements with a respective edge device to execute the functions for data received from the respective edge device, and the controller is connected to communicate a result of the executed functions to the respective edge device.
An arrangement (12) for a lock system (10) comprising a latch spindle (42) for engaging a follower (52) and comprising a handing structure (48); an outer spindle (44) comprising an outer engaging structure (74) configured to engage the handing structure; and an inner spindle (46) comprising an inner engaging structure (68) configured to engage the handing structure independently of the outer engaging structure; wherein the handing structure, the inner engaging structure and the outer engaging structure are configured to cooperate such that a first handing (20a) can be set by a first latch position (82) of the latch spindle, and a second handing (20b) can be set by a second latch position (92) of the latch spindle; and wherein the handing structure comprises an angular clearance (60) such that the inner spindle can drive the latch spindle relative to the outer spindle by engagement between the inner engaging structure and the handing structure.
It is provided a method for controlling access to a physical space secured by an electronic lock. The method is performed in an access evaluator and comprises: obtaining one or more input parameters relating to a user requesting access to the restricted physical space; evaluating a first access condition based on a credential presented by the user; evaluating a second access condition using a machine-learning model, based on the one or more input parameters; and unlocking the electronic lock when both the first access condition and the second access condition are evaluated to be true.
A method of device authentication comprises transmitting a data stream from a first endpoint device to a second endpoint device. The data stream includes a first data stream portion including unencrypted data that includes an ephemeral public key of an ephemeral key pair, and an encryption algorithm identifier; a second data stream portion including encrypted data that includes a first counter value and an identity of the first endpoint device; and a third data stream portion including encrypted data that includes a second counter value and an identity of the second endpoint device. The method of device authentication further comprises the second endpoint device authenticating the first endpoint device using the first, second, and third data stream portions.
It is provided a method for enabling training a machine-learning, ML, model for trigger-word detection, the method being performed in a training data provider (1). The method comprises: receiving (40) sound-based data, the sound-based data being based on sounds captured in a space to be monitored; determining (42) that the sound-based data corresponds to a trigger word, and labelling this sound-based data to correspond to the trigger word; and providing (44) the labelled sound-based data to train the ML model.
It is provided a method for configuring access rights for an electronic key (2) forming part of an access control system (10) comprising a plurality of electronic locks (12a-c, 13a-c, 14a-c) for securing access to respective physical spaces. The method is performed in a configuration device (1) and comprising: setting (40) a baseline configuration of access rights for the electronic key (2); receiving (42) access data, indicating at least one instance of the electronic key (2) being granted access by one of the plurality of electronic locks (12a-c, 13a-c, 14a-c); and adjusting (44) the configuration of access rights for the electronic key to restrict access compared to the baseline configuration, based on the access data.
Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess. A freewheel mechanism and assemblies for an electronic locking system are also provided.
A method of operating a seamless physical access control (PAC) system includes receiving, by a verification device of the PAC system, credential information from a credential device; receiving inertial measurement unit (IMU) information from the credential device; receiving video data from another device different from the credential device, the video data including images of one or more persons; and correlating movement of the one or more persons detected in the video data with the received IMU information to identify a person in the video data as a holder in possession of the credential device.
A method of operating a real-time location services (RTLS) system includes obtaining, by a processing device of the RTLS system, location information identifying an object or person and a building-area location of the object or person; obtaining, by the processing device, access-event information of a access of a physical access portal associated with the building-area location; and matching the location information of the identified object or person and the access-event information and generating an indication of the building-area location of the object or person using the processing device in response to the matching.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
A door leaf (12) for a door system (10) has a main component (28), a guide (32) and a sword (34). The guide (32) is attached to the main component (28) at the bottom side of the main component (28), and the sword (34) is mounted movably in the guide (32) and extends at least partly from the guide (32) downward. At least parts of the sword (34) are mounted movable in the height direction (H) of the door leaf (12) with respect to the guide (32). Further, a door system (10) is shown.
A method of operating an access control system includes sending, by an access reader of the access control system, a message to a user device to activate an access application or access applet of the user device, wherein the access reader is an Initiator device and the user device is a Responder device for a communication transaction; authenticating the user device; sending, by the access reader, a command to change the user device to the Initiator device for the communication transaction and the access reader to the Responder device; initiating, by the user device, an action of the access control system including sending a message to the access reader; and performing, by the access reader, at least a portion of the action in response to the message sent by the user device.
Torsion spring tensioning tool for tensioning a torsion spring of a counterbalancing mechanism of an overhead door, wherein the torsion spring tensioning tool comprises a housing, a gear wheel arrangement adapted to be mounted on a shaft of a the counterbalancing mechanism, said gear wheel arrangement comprising a gear wheel rotatably arranged in the housing, the torsion spring tensioning tool further comprising a gear mechanism coupled to the gear wheel for rotating said gear wheel. The gear wheel arrangement comprises a fixating arrangement fix to the gear wheel and adapted engage the shaft of the counterbalancing mechanism and transmit a rotational movement from the gear wheel to the torsion spring.
B25B 27/30 - Hand tools or bench devices, specially adapted for fitting together or separating parts or objects whether or not involving some deformation, not otherwise provided for for assembling objects other than by press fit or detaching same positioning or withdrawing springs, e.g. coil or leaf springs
77.
SYSTEMS AND METHODS FOR HOMOMORPHIC-ENCRYPTION-SUPPORTED PROVISIONING OF SECURE DEVICES
Disclosed herein are systems and methods for homomorphic-encryption-supported provisioning of secure devices. In an embodiment, a provisioning server (e.g., a cloud-based provisioning server) receives a request, associated with (e.g., from) a secure device (e.g., a keycard), for a homomorphically encrypted diversified key that is based on (e.g., derived from) a master key of an encryption system. The secure device stores a copy of a homomorphic-encryption key. The provisioning server derives a homomorphically encrypted diversified key from a homomorphically encrypted master key, which is the master key previously encrypted with the homomorphic-encryption key. The provisioning server transmits the homomorphically encrypted diversified key to the secure device. The secure device may then be operable to access at least one resource using a diversified master key, which is the homomorphically encrypted diversified key after having been decrypted on the secure device using its stored copy of the homomorphic-encryption key.
A deadbolt (22) comprising a base body (28), a first ridge (40) and a second ridge (42) for frictionally sliding against a first, respectively a second, lock device opening side, the ridges (40, 42) being parallel with an actuating direction (26) of the deadbolt; furthermore, at least a first and a second inclined section (44a, 44b, 46a, 46b) for frictionally sliding against a first (58), respectively a second (60), strike opening side are provided, the inclined sections protrude from a first, respectively a second, base side of the deadbolt, are formed separately from the ridges, and are inclined towards an end (34) of the deadbolt; Furthermore, a lock device with such a deadbolt and a system with such a lock device are claimed. Invention aims at providing low friction locking components with a simple structure.
E05B 63/20 - Locks with special structural characteristics with arrangements independent of the locking mechanism for retaining the bolt in the retracted position released automatically when the wing is closed
E05B 47/00 - Operating or controlling locks or other fastening devices by electric or magnetic means
E05B 15/00 - Other details of locks; Parts for engagement by bolts of fastening devices
A blocker (10) for a lock device (52), the blocker (10) comprising a blocking member (12) rotatable about a blocker axis (18) between a blocking position (44) and an unblocking position (48); a resilient device (14) movable between a blocking forcing state (46) where the resilient device (14) forces the blocking member (12) towards the blocking position (44), and an unblocking forcing state (50) in which the resilient device (14) forces the blocking member (12) towards the unblocking position (48); and an actuator (16) arranged to move the resilient device (14) between the blocking forcing state (46) and the unblocking forcing state (50). An arrangement (54) and a lock device (52) are also provided.
It is provided an electronic lock (12) comprising: a first power bus (20); a battery holder (23) configured to hold at least one battery (19) to thereby supply power of a first voltage to the first power bus (20); a boost converter (24) configured to selectively increase a voltage of the first power bus (20) from the first voltage to a second voltage; a first processor (60) connected to the boost converter (24); a first memory (64) storing instructions (67) that, when executed by the first processor (60), cause the electronic lock (12) to: determine a need for increased voltage; and trigger the boost converter (24) to activate to thereby increase a voltage on the first power bus (20). It is also provided a corresponding method, computer program (67) and computer program product (67).
Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device. The authorization data may be provided by postal message, email message, an SMS text message, and/or a visual code provided on a screen of a computer used to access the customization server. The user may use a computer to provide credential information to access the customization server. Customizing the application may allow the mobile device to access a user service on behalf of the user.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A switch (28) comprising a printed circuit board assembly, PCBA, (74) including a printed circuit board, PCB, (75) and a stationary contact (72); a cap (30) in contact with the PCB (75) such that the cap (30) and the PCB (75) define a switch chamber (68) for the stationary contact (72), the cap (30) carrying a movable contact (70), the cap (30) being arranged to be deformed from a disconnected state (36) where the movable contact (70) is separated from the stationary contact (72) to a connected state (92) where the movable contact (70) contacts the stationary contact (72), and the cap (30) being forced towards the disconnected state (36); an actuator (32) movable relative to the stationary contact (72) between an activated position (90) where the actuator (32) pushes the cap (30) to the connected state (92), and a deactivated position (34) allowing the cap (30) to be forced to the disconnected state (36); and a potting compound (76) enclosing the PCB (75) and the cap (30). A lock device (10) comprising a switch (28) is also provided.
H01H 13/18 - Operating parts, e.g. push-button adapted for actuation at a limit or other predetermined position in the path of a body, the relative movement of switch and body being primarily for a purpose other than the actuation of the switch, e.g. door switch, limit switch, floor-levelling swi
H01H 13/16 - Operating parts, e.g. push-button adapted for operation by a part of the human body other than the hand, e.g. by foot
H01H 13/52 - Switches having rectilinearly-movable operating part or parts adapted for pushing or pulling in one direction only, e.g. push-button switch having a single operating member the contact returning to its original state immediately upon removal of operating force, e.g. bell push switch
A lock device (22) for installation in an access member (12), the lock device comprising a lock case (28); a forend (30); an adjustment screw (40, 42) passing through the forend and threadingly engaging the lock case, the adjustment screw being manipulatable between an adjustment position (66) where the forend is allowed to move relative to the lock case and where the adjustment screw prevents removal of the forend from the lock case, and a secured position (48) where the forend is secured to the lock case by the adjustment screw; and at least one locking element (44a, 44b, 46a, 46b) allowing the adjustment screw to be adjusted between the adjustment position and the secured position, and preventing the adjustment screw from being removed from the lock case. A system (10) comprising a lock device (22) and an access member (12) is also provided.
Method for determining when to provide assistance to open a door (15), the method being performed by an assistance determiner (1). The method comprises: converting (40) mechanical energy from when the door is opened without assistance to electrical energy and storing the electrical energy in an energy storage device (25); determining (42) to provide assistance in opening the door (15) for a person; and providing (44) assistance to open the door (15), when it is determined to provide assistance, by causing a motor to convert electrical energy from the energy storage device (25) to mechanical energy for providing assistance to open the door (15).
E05F 15/74 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects using photoelectric cells
E05F 15/76 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects responsive to devices carried by persons or objects, e.g. magnets or reflectors
85.
ENERGY HARVESTING ARRANGEMENT FOR HARVESTING ENERGY FROM DOOR MOVEMENT
The energy harvesting arrangement according to the invention harvests energy from door movement. It comprises a counter plate (2) to be installed in a door frame and a harvesting unit (1) to be installed in a door. The counter plate (2) has a bevel surface (4) by the opening. The harvesting unit (1) comprises a frame (10), which comprises a spring-loaded roller bolt (3) and a harvesting mechanism (8), which has a spring (9). Energy is harvested in the spring from opening the door.
F03G 7/08 - Mechanical-power-producing mechanisms, not otherwise provided for or using energy sources not otherwise provided for recovering energy derived from swinging, rolling, pitching, or like movements, e.g. from the vibrations of a machine
E05B 63/20 - Locks with special structural characteristics with arrangements independent of the locking mechanism for retaining the bolt in the retracted position released automatically when the wing is closed
E05B 47/00 - Operating or controlling locks or other fastening devices by electric or magnetic means
Methods and systems for enrollment of a biometric presentation for a biometric security system and methods and systems for identification and/or verification of a probe biometric presentation based on an enrolled biometric presentation. An example method comprises: capturing and processing a plurality of images of the biometric presentation to produce a plurality of candidate images; forming a Gallery Set of gallery images from at least some of the plurality of candidate images based on a matching of the plurality of candidate images; and generating a Gallery Web from the Gallery Set, the Gallery Web comprising correlation data defining correlations between the gallery images of the Gallery Set.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
Goods & Services
(1) Metal locks and lock boxes; lock cylinders of metal; keys; key blanks; lock bodies; striker plates; handles and fittings (made of metal) for doors and windows; door closers and door openers (non-electric); emergency and panic latches for doors and windows (made of metal); door frames, hinges and handles (made of metal); components and accessories for mentioned goods, all made of metal.
(2) Machines and machine tools for treatment of materials and for manufacturing; electric door openers and closers; door openers and door closers (hydraulic, pneumatic or electronic) including components therefore and installations consisting thereof; door drives (hydraulic, pneumatic or electronic), in particular revolving door drives or sliding door drives; electrically operated door openers and door closers and their control systems.
(3) Computer software and applications for locking devices and apparatus, safety, security, protection and signaling devices and apparatus and door opening and closing devices and apparatus; electric and electronic safety, security, protection and signaling devices and apparatus; electric, electronic, electromechanical and magnetic locks and control and decoding apparatus for locks; electric, electronic and electromechanical locking devices and apparatus; electric, electronic and electromechanical lock cylinder devices and apparatus; electric, electronic or optical identification apparatus, card readers and identification equipment and their cards; electronic or magnetic keys; access control cards, key cards, smart cards and their readers; control and monitoring systems, namely access control systems, burglar alarms and video surveillance systems; electric and electronic locking systems and apparatus, gate and door automation systems, access control and time tracking systems, electric and electronic security systems and apparatus. (1) Wholesale and retail services for locks and lock cases, lock cylinders, keys, key blanks, lock bodies, striker plates, handles and fittings for doors and windows, door closers and door openers, emergency and panic latches for doors and windows, frames, hinges, handles and components and accessories of mentioned goods; wholesale and retail services for key machines and key machine tools, electric door opening apparatus and door closers and their control systems and door actuating apparatus (hydraulic, pneumatic or electronic); wholesale and retail services for computer software and applications for locking devices and apparatus, safety, security, protection and signaling devices and apparatus or door opening and closing devices and apparatus; wholesale and retail services for electric and electronic safety, security, protection and signaling devices and apparatus; wholesale and retail services for electric, electronic, electromechanical and magnetic locks and control and decoding apparatus for locks; wholesale and retail services for electric, electronic and electromechanical locking devices and apparatus and electric, electronic and electromechanical lock cylinder devices and apparatus; wholesale and retail services for electric, electronic or optical identification apparatus, card readers and identification equipment and their cards; wholesale and retail services for access control cards, key cards, smart cards and their readers; wholesale and retail services for access control systems, burglar alarms and video surveillance systems.
88.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
H04W 12/64 - Location-dependent; Proximity-dependent using geofenced areas
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/10 - Movable barriers with registering means
G07C 9/00 - Individual registration on entry or exit
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
An apparatus for capturing an image of an object on a platen and including a platen having a surface for receiving the object, wherein the platen is transmissive to an optical wavelength of light, an illumination module configured to illuminate at least a portion of the object with light from an illumination source, and an optical sensing module configured to receive the light from the illumination source after the light interacts with the at least a portion of the object. The light from the illumination source is spatially patterned prior to reaching the object. The illumination module can be configured to create the spatially patterned illumination and/or the platen may include a patterned optical coating creating the spatially patterned illumination. The spatially patterned illumination can include a plurality of discrete areas (e.g., a stepped pattern) of different illumination intensity and/or a gradient of different illumination intensity.
The swing handle arrangement according to the invention comprises a locking function. The arrangement comprises a swing handle (1), a frame (2), and a spindle arrangement (3). The swing handle is pivoted to the spindle arrangement, and the spindle arrangement is pivoted to the frame. The swing handle arrangement also comprises an electric actuator (4), a shaft arrangement (5) for the electric actuator, and a latch (6) arranged in the frame (2). The swing handle further comprises a latching surface (7). The latch (6) is arranged to be against the latching surface (7) of the swing handle in the locking position of the swing handle. The latch (6) and the latching surface (7) are thus arranged to lock the swing handle arrangement, which can be unlocked by means of the electric actuator (4) via the shaft arrangement (5) for the electric actuator.
Systems and methods may he used for authenticating and validating a credential for performing an action. A method may include using an access control device to exchange public keys with a user device. The method may include sending, to the user device, a first authentication cryptogram including a first signature, a public key certificate, and a Credential Trust Information (CTI), and receiving, from the user device, a second authentication cryptogram including a second signature, a public key of the user device, and a credential. The access control device may authenticate the user device based on the credential and the second signature The access control device may determine whether the credential received in the second authentication cryptogram is signed by a trusted credential issuer to validate the user device. The method may include causing the action to be performed.
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Locks of metal; mechanical locks; keys; safes; electronic safes and safe deposit boxes; parts and equipment for all the aforementioned goods. Electric, electronic and electromechanical locks and lock goods, also including electronic lock cylinders, electric striking plates, door magnets, electronic keys, key cards, also including electronic or magnetic access control cards and smart cards, and key card readers, also including electronic or magnetic access control card readers and smart card readers; units for programming locks, lock cylinders, keys, key cards, key card readers and safes; electric and electronic panels for doors, gates, barriers and windows; electronic and magnetic sensors; CCTV systems and devices; electric, electronic and electromechanical access control apparatus and systems; security or alarm apparatus and systems; apparatus and systems for providing identification and authentication data for near field communication (NFC) tags, digital keys and identity data; apparatus and systems for implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; computer software, apparatus and systems for managing and operating mini bars and energy consumption devices; apparatus and instruments for recording, monitoring, asset tracking, signalling and checking; magnetic and electronic identity cards; magnetic data carriers and computer software. Installation, maintenance and repair of locks, locking mechanisms, access control apparatus and instruments, and its parts and fittings; installation, maintenance and repair of security and access control systems and devices; installation, maintenance and repair of apparatus and instruments used for facilities management and asset tracking systems. Design and development of computers, computer systems, computer software, technology solutions, internet of things (IoT) solutions, mobile and web applications in the field of access control and security, including secure identity solutions and asset tracking systems; design and development of apparatus and instruments in the field of access control, security, facilities management; consultancy services regarding energy efficiency in buildings; consultancy and information regarding the aforesaid services. Security services for the protection of property and individuals; data lifecycle management services for others, namely, issuance, authentication and revocation of digital signature and digital rights for physical and logical access control systems and secure identity solutions; security consultants.
93.
EMERGENCY OPENING STRUCTURE FOR REVOLVING DOOR AND REVOLVING DOOR ASSEMBLY
ASSA ABLOY Entrance Systems AB has developed an emergency opening structure for a revolving door and a revolving door assembly, the emergency opening structure is connected with a first connecting pin and a second connecting pin on a driving shaft of the revolving door, and includes: a slider assembly having a first side surface and a second side surface opposite to each other; and a base having a sidewall, wherein the slider assembly is disposed on the inner side of the sidewall and is configured to move relative to the base, a first sliding channel is formed between a first portion of the sidewall and the first side surface for accommodating the first connecting pin, and a second sliding channel is formed between a second portion of the sidewall and the second side surface for accommodating the second connecting pin, wherein the emergency opening structure has a normal driving position and an unlocking position, in the normal driving position, the first connecting pin and the second connecting pin are clamped in the first sliding channel and the second sliding channel, respectively, and in the unlocking position, the base rotates around the second connecting pin to a position where the first connecting pin slides out of the first sliding channel, while the second side surface and the second portion of the sidewall remains pressing against the second connecting pin, so as to prevent the second connecting pin from disengaging from the second sliding channel.
E05D 3/08 - Hinges with pins with two or more pins for swing-doors, i.e. openable by pushing from either side
E05D 7/081 - Hinges or pivots of special construction for use in suspensions comprising two spigots placed at opposite edges of the wing, especially at the top and the bottom, e.g. trunnions the pivot axis of the wing being situated near one edge of the wing
E05D 7/10 - Hinges or pivots of special construction to allow easy separation of the parts at the hinge axis
E05D 15/02 - Suspension arrangements for wings for revolving wings
E05D 15/48 - Suspension arrangements for wings allowing alternative movements
E05D 15/54 - Suspension arrangements for wings allowing alternative movements for opening both inwards and outwards
94.
Automatic Door with a Hinged Swinging Partial Door
A door assembly may include a first sidelite configured to be operably coupled to a first doorjamb, a second sidelite configured to be operably coupled to a second door jamb where the first and second sidelites are disposed in a common plane and define a door opening between the first and second sidelites, a first sliding panel, a second sliding panel where the first and second sliding panels are movable from a closed position disposing the first and second sliding panels to block access through the door opening and an open position in which the first sliding panel is proximate the first sidelite and the second sliding panel is proximate the second sidelite, a first partial door panel, and a second partial door panel. The first and second sliding panels are disposed in a second plane parallel to the common plane in both the open and closed position. The first and second partial door panels are operably coupled to the first and second sidelites, respectively, via hinge assemblies. The first and second partial door panels have a closed state in which the first and second partial door panels are each disposed in the common plane blocking access through the door opening, and an open state in which the first and second partial door panels are each disposed out of the common plane.
E06B 3/36 - Arrangements of wings characterised by the manner of movement; Arrangements of movable wings in openings; Features of wings or frames relating solely to the manner of movement of the wing with only one kind of movement with a single vertical axis of rotation at one side of the opening, or swinging through the opening
E05F 15/73 - Power-operated mechanisms for wings with automatic actuation responsive to movement or presence of persons or objects
E05C 17/56 - Devices for holding wings open; Devices for limiting opening of wings or for holding wings open by a movable member extending between frame and wing; Braking devices, stops or buffers, combined therewith by magnetic or electromagnetic attraction
An RFID tag (1) for tamper proof attachment to an object (100) such as a license plate, comprising a lower housing (10), an upper housing (20) and an antenna unit (30). The lower housing (10) is configured to be attached to the object (100). The upper housing (20) is placed on the lower housing (10) and comprises a peripheral portion (22). The peripheral portion (22) laterally surrounds the lower housing (10) and is configured to be attached to the object (100). The antenna unit (30) is positioned between the lower housing (10) and the upper housing (20). At least one first portion of the antenna unit (35) is attached to the lower housing (20) and at least one second portion of the antenna unit (36) is attached to the upper housing (10). When the distance (D) between the upper housing (20) and the lower housing (10) changes in case someone attempts to remove the RFID tag from the object, the at least one first portion of the antenna unit (35) remains attached to the lower housing (10) and the at least one second portion of the antenna unit (36) remains attached to the upper housing (20). Due to this specific arrangement the antenna unit (30) is being damaged in case of detachment of the RFID tag as disclosed herein.
It is provided a method for providing data for training a machine learning model. The method is performed in a training data provider (1) and comprises the steps of: obtaining (40) a data structure comprising a chain of delegations, the chain of delegations covering a delegation path from a media capturing device (3) to the training data provider (1) such that, in the chain of delegations, each delegation is a delegation from a delegator to a receiver; sending (42) a key request to a delegation verifier (2), the key request comprising the data structure; receiving (44) a decryption key from the delegation verifier (2); obtaining (46) encrypted media data captured by the media capturing device (3); decrypting (48) the encrypted media data, resulting in decrypted media data; and providing (50) the decrypted media data for training the machine learning model.
The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G07C 9/00 - Individual registration on entry or exit
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
06 - Common metals and ores; objects made of metal
07 - Machines and machine tools
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Lock cylinders of metal; metal lock cylinders and specially adapted parts therefor; door and window locksets of metal; metal push button locks; metal door locks; metal mortise cylinders; metal mortise locksets; metal multi-point locks; metal nightlatch locks; metal rim locks; metal rim cylinders; metal deadbolts; deadlocks of metal for doors, and specially adapted parts therefor; metal padlocks; padlocks and specially adapted parts therefor; latchbolts of metal; metal keys; metal key blanks; tumbler key cylinders of metal; metal tubular locksets; metal master key systems consisting of interchangeable core lock cylinders and master keys of metal; non-electric metal door closers; non-electric metal door openers; emergency and panic devices for doors and windows of metal being door and window latching axels, bars and mounting bridges incorporating a release latch in the event of an emergency; emergency and panic devices, namely, metal mechanical exit devices; emergency and panic devices, namely, mechanical exit pushbars of metal; metal mechanical door closers; exit push bars and exit door trim; metal mortise dead locks; metal exit device trim; metal cylindrical locksets; metal indicator locks and locksets, namely, privacy locks with vacant/occupied indicators; kits for metal indicator locks and locksets comprised of metal escutcheons, visual occupancy indicators, and back plates; metal thumbturn levers. Hydraulic, pneumatic, and electric door closers and operators; hydraulic door controls. Software for controlling and communicating with electronic lock systems, wired and wireless locking and access control apparatus, systems and devices; cloud-based lock management software; software for computers, computer operative systems, electronic devices, mobile phones in the access control field for controlling and managing building environment access and security systems; electric and electronic locks, electronic keycards, blank smart cards and RFID (radio-frequency identification) credentials, namely, cards for radio frequency identification credentials; all of the aforesaid goods in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; digital door viewer peepholes; electric and electronic apparatus, namely, electrified and electronic control systems, namely, electronic control systems for room locking systems and door locking systems; electrified and electronic control apparatus being electrified fences and electrified door handles; electrified and electronic locking systems being digital locks and electromagnetic locks; fingerprint door locks, electric and electromechanical door and window hardware, namely, electronic lock assemblies; electric, electronic and electromechanical locks and lock goods, namely, electronic locking mechanisms for doors and safes; electronic or magnetic access control cards and smart cards, namely, electronic identification cards, identification smart cards, encoded magnetic cards, encoded identity cards, encoded integrated circuit cards; electronic or magnetic access control card readers, namely, reading devices for cards incorporating electronic chips, electronic card readers, card readers for magnetically encoded cards, magnetic encoded card readers, chip card readers, and smart card readers; keycards namely, encoded key cards, hotel room key smart cards; keycard readers, namely, encoded key card readers; digital and electromagnetic door locks actuated by a keyboard; electronically controlled window locks and door locks; electronic keys for doors and windows; electrical and electronic locking devices being electronic lock assemblies; door ajar alarm locks; electronic computer keypads; electric door strikes; magnetic and electronic identity cards; door access control systems and operators in the nature of electronic access control systems for doors; door access control systems and operators, namely, electromechanical exit devices being digital door locks consisting of electromechanical door latches and digital door locks that secure doors and allow for ingress and egress to facilities; keypad locks; pushbutton keypad locks; capacitive touchscreen keypad locks; downloadable mobile software application for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices; downloadable mobile software application for computerized management and control of Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric identification apparatuses; downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software for integration of computer systems, applications, data, and databases as it relates to dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems; downloadable mobile software application for physical premises security access authentication; downloadable software in the nature of a mobile application for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable software in the nature of a mobile application for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; downloadable application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; downloadable software for displaying, sorting, and sharing data in the field of access control, facilities management, and physical premises security. Providing temporary use of non-downloadable on-line software and applications for managing, locating, activating and revoking electronic, electromechanical, electric locks, digital keys, and access rights; design and development of computers, computer systems, computer software, technology solutions, and mobile and web applications in the field of facilities access control; product design and development of apparatus and instruments in the field of facilities access control; providing technical information regarding the aforesaid services; all of the above services in the field of lock and access control management solutions for buildings, dwellings, premises and their facilities; providing temporary use of online, non-downloadable software for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices, dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable software for computerized management and control of cameras, fire systems, and security and surveillance systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for computerized management and control of dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for integration of computer systems, applications, data, and databases as it relates to physical premises security, cameras, fire systems; providing temporary use of online, non-downloadable software for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for enabling premises access and security authentication by means of encoded security cards, electronic key fobs being remote control apparatuses, mobile credentials, electronic personal identification (PIN) pad codes, and biometric and gesture identification apparatuses; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable cloud-based software for connecting, operating, and managing networked dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for physical premises security access authentication; providing temporary use of online, non-downloadable software for interfacing with electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for interfacing with dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for use in managing electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; providing temporary use of online, non-downloadable software for use in managing dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including electronic door hardware, electronic locks, readers, and lock cylinders, power door operators, electronic access control systems and devices; application service provider featuring application programming interface (API) software for integration control of IP enabled devices including dry contact-controlled appliances, environmental control devices, Internet of Things (IoT) enabled devices, RF-controlled sensors and devices, RF-controlled appliances, electronic personal identification (PIN) pads, biometric and gesture identification apparatuses, cameras, fire systems, and security and surveillance systems and devices; providing temporary use of online, non-downloadable software for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security; Software as a Service (SaaS) featuring software and Platform as a Service (PaaS) featuring computer software platforms, all for displaying, sorting, and sharing various application data in the field of facilities access control, facilities management and physical premises security.
It is provided a method for determining whether a portable key device is located inside or outside a metal door. The method is performed by a credential communication device and comprises the steps of: obtaining a first time-of-flight, ToF, measurement between a first antenna and the portable key device, wherein the first antenna is located on the outside of the metal door; obtaining a second ToF measurement between a second antenna and the portable key device, wherein the second antenna is located on the inside of the metal door; and determining the portable key device to be located on the outside of the metal door when the first ToF measurement is less than the second ToF measurement by an amount which is greater than a threshold value.