The present disclosure of various embodiments generally relates to an elevator system and its operation. More specifically, the various embodiments described herein relate to an elevator system providing improved passenger comfort and confidence when using an elevator, and a method of controlling the operation of such an elevator system.
Multi-story residential and commercial buildings often have elevator systems to transport users (e.g., tenants and visitors) from a boarding floor to a destination floor. Elevator systems and elevator control technologies implemented therein are generally known. Some of these buildings may further have a physical building control system to allow only authorized users access the building and/or areas within the building. Upon a user presenting some form of credential (e.g., key, optical code (e.g., barcode, QR code), RFID badge or biometric feature), a physical building control system releases or unlocks a physical barrier (e.g., a gate, door, or turnstile) to grant access to the authorized user. U.S. Pat. No. 9,077,716 describes a building control system, in which a mobile electronic device communicates with an electronic door lock by means of a Bluetooth or WLAN radio link, and with a web server by means of a WAN (Wide Area Network) radio link to open the electronic lock. For example, one of these building control systems may be configured to automatically enter an elevator call for the authorized user based on a default destination stored in a user profile.
In addition to providing transportation and physical access control, building owners and/or building operators (hereinafter referred to as “building management”) provide for a safe and clean environment within buildings. Of particular concern are elevator lobbies and elevator cars where users wait or stand in relatively close proximity to each other. In these areas, users may worry that by-standing users suffer from a contagious medical condition (with or without visible or noticeable symptoms) and spread bacteria and/or viruses to healthy users. To address such concerns, building management may enhance its cleaning and disinfection efforts, and/or set up procedures where building personnel is tasked to measure users' body temperatures. For that purpose, handheld non-contact infrared thermometers may be used. A user that has an increased body temperature may be singled out.
Such efforts and procedure may increase a user's confidence when seeking access to an access-restricted building area or using an elevator. However, the procedures involving such temperature measurements require building personnel and are relatively slow. In addition, singling out users may be viewed as invading a user's right to privacy. There is, therefore, a need for a technology that overcomes at least one of these issues.
One aspect of such technology relates to a building system, in particular an elevator system, a physical access control system or a combined elevator and physical access control system. The building system includes a controller system configured to control the building system to perform a building action, and a credential acquisition unit communicatively coupled to the controller system and configured to acquire a credential presented by a user. The credential determines whether or not the user is an authorized user within a building. A camera system of the building system has a thermographic camera configured to operate in an infrared optical spectrum and to generate an infrared image of at least a part of a face of the user. An image processing system is communicatively coupled to the camera system and the controller system. The image processing system is configured to process the infrared image to determine if it includes an area of the user's face having a temperature value that is higher than a set threshold temperature value and to generate a first result signal indicative of whether or not the temperature value is higher than the threshold temperature value. The controller system is configured to enable or disable the building action as a function of the acquired user credential and the result signal.
Another aspect relates to method of operating a building system, in particular an elevator system, a physical access control system or a combined elevator and physical access control system installed in a building. The building system includes a controller system configured to control the building system to perform a building action, a credential acquisition unit communicatively coupled to the controller system, a camera system having a thermographic camera configured to operate in an infrared optical spectrum, and an image processing system communicatively coupled to the camera system and the controller system. According to the method, a credential presented by a user is acquired using the credential acquisition unit. The credential determines whether or not the user is an authorized user within the building. The method includes operating the thermographic camera to generate an infrared image of at least a part of a face of the user, and processing, using the image processing system, the infrared image to determine if it includes an area of the user's face having a temperature value that is higher than a set threshold temperature value and to generate a first result signal indicative of whether or not the temperature value is higher than the threshold temperature value. The method includes further controlling the building system, by the controller system, to enable or disable the building action as a function of the acquired user credential and the first result signal.
The technology described herein provides that a building system operates in consideration of a user's body temperature measured at the time the user requests a building action. In certain embodiments, this allows recognizing a feverish user at a relative early moment in time, e.g., at a building entry or shortly thereafter, in particular before the user mingles with other users in the building when being provided with the building action. The risk of the feverish user potentially infecting other users is, therefore, reduced.
Measuring a user's body temperature as early as possible allows undertaking mitigating measures. In one embodiment, the building system measures a user's body temperature automatically and reacts as a function of the acquired user credential and the result signal. For example, controlling the building system involves registering an elevator call only if the user is an authorized user and the temperature value is lower than the threshold temperature value. If, however, the measured body temperature is elevated, i.e., above the set threshold temperature value, due to the user being feverish, the building system may have one or more predetermined (mitigating) procedures for responding to such a feverish user.
In one embodiment, a mitigating procedure is executed in response to the first result signal indicating that the user's face temperature value is higher than the threshold temperature value. The mitigating procedure includes one of:
Depending on how a building's management decides to handle feverish users, one or more of these procedures may be implemented in the building.
In one embodiment, the credential acquisition unit and the camera system are arranged in a user terminal accessible by the user. This facilitates measuring a user's body temperature at the time the user requests a building action. In another embodiment, the camera system may be arranged at a location that is spaced apart from where the user terminal is arranged.
As to the kind of credentials used in the building, the technology described herein provides flexibility. The credential acquisition unit may include at least one of a radio-frequency based reader configured to read coded information from a radio-frequency based data carrier, a scanner configured to process an optical code read from a data carrier and an image capture device configured to acquire a biometric credential. At least some of these exemplary credential acquisition units can be used without the user having to physically touch the user terminal that is accessible for all users. Such touchless acquisition of a credentials reduces the risk that bacteria or viruses spread from one user to another user.
In one embodiment, a user's face serves as a biometric credential it can be obtained without the user having to touch the user terminal or the like. For that purpose, the credential acquisition system includes the image capture device configured to operate in a visible optical spectrum and to generate a digital image of at least a part of the user's face. The image processing system is configured to generate from the digital image a real-time facial template of facial features of the user, to compare the real-time facial template with a plurality of stored reference facial templates of facial features of authorized users and to generate a second result signal indicative of whether or not the real-time facial template matches one of the reference facial templates. The controller system is configured to enable or disable the building action as a function of the first and second result signals.
In one embodiment, the building system includes a memory device having a database storing a plurality of user profiles. Each user profile is assigned to a user authorized to enjoy at least one specified building action. The memory device may be located at a central location within the building or remote from the building and accessible by means of a communications network. In another embodiment, the user profile may be created and stored in a database of a building management system, wherein the building system may access this database by means of a communications network. As to where the user profiles are maintained, there is flexibility.
The user profiles may serve different purposes. In certain embodiments, at least one of the user profiles includes a reference facial template of an authorized user, and at least one user profile further includes at least one access right and/or at least one default destination floor.
In one embodiment, the user terminal includes a first credential reader comprising a radio-frequency module configured to communicate with a radio-frequency module of a first data carrier presented by the user. In one embodiment, the user terminal further includes a second credential reader comprising a camera configured to obtain an optical code from a second data carrier presented by the user. In certain embodiments, these additional credential readers provide that the user, after secondary processing, can enjoy the building action despite initially being determined (potentially erroneously) as unauthorized or as having an elevated body temperature.
In one embodiment, the building system includes an information device configured to generate an alarm signal if the user is, based on the credential presented to the credential acquisition unit, not an authorized user and/or if the temperature value is higher than the threshold temperature value. The alarm signal may be used to inform the user and/or, for example, building personnel. In certain embodiment, building personnel may then subject the user to secondary processing.
Various aspects of the improved technology are described in greater detail below with reference to exemplary embodiments in conjunction with the drawings. In the figures, identical elements have identical reference numerals. In the figures:
In the exemplary embodiment shown in
Referring initially to the physical access control, the access-control function of the building system 1 controls access to the access-restricted zone 8 so that only authorized users 2 can enter that zone 8. A user 2 is authorized if a credential (e.g., key, (alpha-) numerical code, optical code (e.g., barcode, QR code), RFID badge or biometric feature) presented by the user 2 is determined to be valid. For example, the access 12 may be provided with a barrier (e.g., a door, a gate, a turnstile, or other physical or non-physical (e.g., a light/sensor barrier) barrier) controlled by the building system 1. For purposes of illustration, a user terminal 4 of the building system 1 is shown in
In another exemplary embodiment, the user terminal 4 of the building system 1 may be situated at an access to at least one room 14, possibly at each access. Depending on the nature of the room 14, the access comprises, for example, an office door, a story door, an apartment door or an elevator door 19, each of which then represents a physical barrier. In this exemplary embodiment, each room 14 corresponds to an access-restricted zone 8, and the area in front of the access corresponds to the public zone 10. Hereinafter, the room 14 is also referred to as “elevator car 14”. In response to determining that the presented credential is valid, the access-control function of the building system 1 unlocks, for example, an electronic lock of an office door or apartment door. In an elevator-related application, the building system 1 may, for example, prevent the departure of an elevator car 14 when an unauthorized user 2 (i.e., user 2 presents no or an invalid credential) enters or wishes to enter the elevator car 14.
Referring to the elevator-control function of the building system 1, an elevator call may be registered for the user 2 at about the time the user 2 presents a valid credential. Upon determining that the credential is valid, an elevator operating panel (e.g., provided by the terminal 4) may be switched to an enabled (unlocked) state to allow entry of an elevator call by the user 2. Depending on the control technology implemented in the elevator system (conventional up/down control or destination call technology), the user 2 may enter at the enabled elevator operating panel a desired travel direction (upwards or downward) or a destination floor. Alternatively, if the credential is valid, an elevator call may be automatically entered for the user 2; the elevator call may be based on a default destination floor stored in a user profile set up for the user 2. In one embodiment, the user 2 may change the default destination floor at the elevator operating panel. In response to an elevator call being entered in one of these possibilities, the elevator controller registers the elevator call and initiates its execution.
As indicated in the embodiment of
The facial recognition system is one example of a credential acquisition unit 24a shown in
A facial recognition system is a technology capable of identifying or verifying a user 2 from a digital image or a video frame generated by a video source operating in the visible optical spectrum. Generally, a facial recognition system compares selected facial features from a given image with facial features (“faces”) stored in a database. A thermal imaging system is a technology (“thermography”) that uses a thermographic camera (also called an infrared camera or thermal imaging camera or thermal imager) to create an image of an object (here the user's face) based on infrared radiation (wavelengths from about 1 μm to about 14 μm) emitted by the object.
The camera system 24 operates according to these technologies when the user 2 approaches the user terminal 4 at the access 12 and the user's face is within a detection range of the camera system 24. The images produced by the camera system 24 are then subject to further processing. In the illustrated embodiment, the camera system 24 (including other components of the image processing device) is arranged in the user terminal 4; preferably, the arrangement is such that an unobstructed view of the user 2 is obtained. Alternatively, the camera system 24 (including other components of the image processing device) may be situated separate from the user terminal 4 as a separate unit, for example, spatially separate from the user terminal 4 in an area around the access 12. In one embodiment, the camera system 24 is situated so that essentially only the one user 2 is detected, who actually desires a service or building action (transport or access) provided by the building system 1.
In the situation shown in
As shown in
The digital camera 24a may have selectable and/or adjustable properties; camera images are thus present in this exemplary embodiment as digital datasets. The properties of the digital camera, for example, resolution (for example, indicated in megapixels), exposure and focal length, are selected or set so that a camera image (digital image) may be evaluated and the user's face may be recognized in evaluable quality on the digital image. A digital image is, for example, in the JPEG format, but it may also be in a different format, for example, in the BMP format, in the JPEG2000 format or a base 64 image string.
The thermographic camera 24b may have an image sensor unit that generates a monochrome image or a color image unit that generates a color image. The images generated by such sensor units detect changes in emitted infrared radiation across a user's face. The changes in intensity relate to changes in temperature across the user's face, the highest intensity usually being indicative of the highest temperature. To ensure that the thermographic camera 24b can accurately measure the radiation it detects, the thermographic camera 24b is calibrated. Calibration is the process of correlating what the image sensor “sees” (infrared radiation) with known temperatures, e.g., selected for measurements at a certain temperature range. For human body applications, for example, the temperature range may be between 20° C. and 50° C.
The camera system 24 may be equipped with a sensor module or may be connected to a separate sensor module, which activates the camera system 24 when it detects the presence of a user 2 in the detection area of the camera system 24. The sensor module may comprise, for example, a proximity sensor, which may be designed as an ultrasonic sensor, an infrared sensor or an optical sensor (for example, light barrier, brightness sensor). Alternatively, the presence of a user 2 in the detection area of the camera system 24 may be recognized using the camera system 24. If, for example, the user 2 enters the detection area and the camera system 24 is always in an active state, the camera system 24 records changes in front of an essentially static background; these changes indicate a user's presence.
For each registered user 2, a user profile is created in the building system 1, i.e., it is stored as a dataset in the database 38. In the illustrated embodiment, the database 38 is set up in the memory device 36, which may be any device configured to store digital data, for example, a hard disk drive (HDD) or CD/DVD drive, a semiconductor drive/solid state disk (SSD), or combinations thereof, or other digital data memory devices for digital data. The user profile includes personal data of the user 2 (for example, name, reason for authorization (resident, employee, external service provider) and facial features in the form of a facial template), access authorizations (for example, specific rooms 14 and floors) and possibly temporal access restrictions (for example, access from Monday to Friday, from 7:00 am to 8:00 pm). As an alternative to creating the user profile in the building system 1, the user profile may be created in a database of a building management system, wherein the building system 1 may access this database by means of a communications network. In
The image processing module 32 is configured to process the digital image generated by the digital camera 24a by executing a computer-aided method for image processing. Image processing methods are known, for example, from U.S. Pat. No. 8,494,231 B2. An introduction to the field of image processing for the purpose of facial recognition is described in the publication “Gesichtserkennung” [“Facial Recognition”] of the German Federal Office for Information Security (available under the topic of biometrics at the Internet address www.bsi.bund.de). This publication distinguishes between the three main steps “Create template”, “Create reference dataset” and “Compare facial images”. In order to make the comparison of two facial images as simple and quick as possible, the features of a face are ascertained and stored in the form of a feature dataset referred to as a “template”. When the face on an image of a user has been found and standardized, features in addition to the eyes, nose, and mouth/chin are sought, measured, and related to each other. These extracted features are encoded, compressed, and stored as a feature dataset (template). The similarity of the templates of two facial images are defined by combining them using a mathematical algorithm. This results in a degree of similarity of the templates. If the result is within certain tolerance limits, the two templates, and thus their underlying facial images, are classified as identical.
As illustrated in
Referring to the infrared image generated by the thermographic camera 24b, the image processing module 32 is configured to process the infrared image. The processing includes comparing the temperatures corresponding to the intensities across the user's face with a threshold temperature value. The threshold temperature value is set, for example, to 37.5° C. If the image processing module 32 determines that an area of the user's face has a temperature that deviates from the normal body temperature of about 37° C., e.g., is at or above that threshold temperature value, the user 2 is deemed to have a medical condition accompanied with an elevated temperature (fever). The image processing module 32 generates a result signal indicative of whether or not the user 2 has an elevated temperature.
The image processing system, hence, is configured to generate two result signals; one indicates whether or not the user 2 is authorized based on comparing the real-time facial template of the user 2 with the reference facial templates. In this process of verifying the authorization, the user's face serves as a biometric credential implemented in the building system 1. The other result signal indicates whether or not the user 2 has a medical condition involving an elevated body temperature based on comparing temperatures corresponding to the intensities of infrared radiation across the user's face with a threshold temperature value. The image processing module 32 transmits the result signals to the processor 40 for further analysis.
The processor 40 is configured to analyze the received result signals according to a specified algorithm. For example, the algorithm determines that a building action can be performed if the result signals indicate that the user 2 is authorized and does not have an elevated body temperature. If, however, the result signals indicate that the user 2 is not recognized as being authorized or that the user 2 has an elevated, the algorithm determines that the building action cannot be performed for the user 2. In one embodiment, the algorithm may allow an unauthorized user 2 having an elevated body temperature to enter a call to reach, for example, a public floor, but require that user 2 to travel alone, e.g, by assigning an empty elevator car 14 to the unauthorized user. The processor 40 is configured to transmit the result of the analysis via the communications unit 30 to the controller system 18 configured to enable or disable the building action as a function of the first and second result signals. For example, the controller system 18 controls the building system 1 so that the user 2 is granted or denied access. If, for example, a physical barrier (for example, turnstile 36 in
In the illustrated embodiment, the processor 40 is configured to indicate the result of the analysis via the information device 20. The information device 20 may be arranged and configured depending on the building system 1. The information device 20 may be noticeable (by means of audio and/or vision) by the user 2 and/or, for example, building personnel; it may display text, symbols or pictograms, or generate light of different colors (e.g., a green lamp indicates that the user 2 can proceed). For example, if the mentioned zone separation occurs without a physical barrier, in the case of an unauthorized or feverish user 2, the control signal activates, for example, the information device 20 to generate an alarm, or to alert building personnel. Exemplary use cases are described elsewhere in this text.
In the illustrated embodiment of
With the understanding of the basic system components and their functionalities described above, a description of an exemplary method of operating the building system 1 is provided hereinafter in connection with
At a step S2, a user 2 is detected. As mentioned above, the user 2 may be detected by the camera system 24 or a sensor system when the user 2 is in a detection area. For example, if the user 2 desires access to the access-restricted zone 8, the user 2 will be moving in the public zone 10, for example, coming from a building main entrance, in the direction of the access 12. The user terminal 4 and/or the camera system 24 may be in an inactive or stand-by state and become activated by the approaching user; alternatively, the user terminal 4 and/or the camera system 24 camera system 24 may be always in an active state.
Proceeding to a step S3, the user's face is scanned. By scanning the user's face, the user's credential (face) and temperature distribution across the user's face can be obtained. At the time the user 2 arrives in the detection area of the camera system 24 situated there, the digital camera 24a produces one or multiple digital images or a video recording, each of which is available as a digital dataset and is stored temporarily for further processing. At essentially the same time, the thermographic camera 24b produces the infrared image. The infrared image may be stored temporarily for further processing. The image processing module 32 ascertains the real-time template from the dataset, as discussed elsewhere in this description.
Proceeding to a step S4, it is determined whether the user's body temperature is with the preset temperature range. The temperature range may be set between about 36° C. and 37.5° C. If the user's body temperature is within the temperature range, e.g., the user 2 does not have a medical condition involving a body temperature that deviates from the normal body temperature of about 37° C., in particular an elevated body temperature, the method proceeds along the YES branch to a step S5; otherwise the method proceeds along the NO branch to a step S8.
Proceeding to the step S5, it is determined whether the user 2 is authorized. If the real-time template of the user 2 has been ascertained (step S3), the image processing module 32 starts a search algorithm in order to check whether the ascertained real-time template is assigned to a registered user. For example, the user profiles in the database 38 are searched by means of the real-time template ascertained. When searching, it is checked whether the real-time template matches a reference template to a specified degree. In one exemplary embodiment, the real-time template and the reference templates each comprise a specified number of specified facial parameters and their values (for example, eye distance, mouth width, distance between lip top edge and lip bottom edge, distance between nose and lip bottom edge, etc.). During the search, the parameter values of the real-time template are compared with the parameter values of the reference templates. There is a match when the degree of similarity of the templates is at least equal to the specified degree. The specified degree indicates a percentage match of the facial parameters of the real-time template with the facial parameters of a reference template. Depending on the accuracy requirement, the specified degree may be selected, for example, to be between approximately 60% and approximately 90%. The image processing module 32 generates a result signal indicative of whether or not the user 2 is authorized, wherein the result signal is transmitted to the processor 40. If the user 2 is recognized as an authorized user, the method proceeds along the YES branch to a step S6; otherwise the method proceeds along the NO branch to the step S8.
At the step S6, the building action is registered for the user 2. The processor 40 analyzes the result signals and transmits the result to the controller system 18. Depending on the building and the implemented building system 1, the building action may be an elevator call, permission to access and/or a combination of elevator call and access permission.
Proceeding to a step S7, the building action is executed. For example, the control system 18 releases an access barrier, allocates an elevator to service the elevator call and causes the elevator car 14 to move according to the allocation. The method ends at step S12.
As mentioned above, the method proceeds to step S8 if the user's body temperature is not within the preset temperature range, e.g., because the user 2 is feverish or because of an erroneous measurement. The processor 40 is configured to generate an alarm signal, which may be transmitted to the information device 20. In response, the information device 20 may generate an alarm that the user 2 and/or, for example, building personnel may see and/or hear. In one embodiment, the building action may be denied to the user 2 without further action; the method may then end at the step S12.
In another embodiment following the generation of the alarm at step S8, the method may initiate secondary processing. For example, building personnel may approach the user 2 and subject the user 2 to an additional measurement of the body temperature. This may be performed by means of a handheld non-contact infrared thermometer. If this additional measurement does not indicate an elevated body temperature (e.g., the infrared measurement was erroneous), building personnel may verify if the user 2 is authorized (e.g., by checking an ID card) and, if the user 2 is authorized, issue a substitute credential that may be linked to the user's profile. The substitute credential may be an access code, which may be printed on an access card, e.g., in form of an optical code, stored on an RFID-enabled access card or transmitted to the user's mobile phone for being displayed on the mobile phone. The user 2 may then present the substitute credential to the respective secondary readers 42, 46, and the method proceeds to the step S6. The substitute credential may expire (e.g., become invalid) after it has been presented once or after a set period of time (e.g., a few minutes).
The additional measurement, however, may confirm that the user 2 has an elevated body temperature. In this case, building personnel also verifies the user is authorized and issues a substitute credential, as mentioned above. In one embodiment, the substitute credential, however, is linked to a transport restriction if the user 2 wishes to use the elevator. For example, the transport restriction may require that the (feverish) user 2 travels alone in the elevator car 12 to reduce the risk that the user infects other users, or that the user 2 travels in an elevator car 14 together with other users 2 that have an elevated body temperature. The transport restriction may be coded in the substitute credential (access code) or stored in the user's profile. When the user 2 then presents the substitute credential to the respective secondary readers 42, 46, the method proceeds to the step S6 in which the building action is registered in accordance with the transport restriction. That is, for example, the controller system 18 allocates an empty elevator car 14 to the user 2 and causes the elevator car 14 to move to the destination floor desired by the user 2 without any intermediate stop.
The verification of the user's authorization based on facial recognition technology may be prone to errors. This may be, for example, because the user's appearance changed (e.g., due to a hat, a beard or sunglasses), shadowing, incomplete view of the face, or bad lighting. If such an error occurs, the user 2 is not recognized as an authorized user and the method proceeds along the NO branch to the step S8. Similar to the handling of a measured elevated body temperature, the processor 40 is configured to generate an alarm signal, which may be transmitted to the information device 20, if the user 2 cannot be authorized at the step S5, as described above. In response, building personnel may approach the user 2 and subject the user 2 to an individual verification (e.g., by checking an ID card). If the user 2 is authorized, a substitute credential may be issued that may be linked to the user's profile, as described above. The user 2 may present the substitute credential to the respective secondary readers 42, 46, and the method proceeds to the step S6. If it is determined that the user 2 is not authorized, any building action is denied to the user 2, and the method ends in step S12.
In one embodiment, the method may be modified in that an additional temperature measurement is provided. This is indicated in
Referring to the step S9, it is determined whether the body temperature of any user 2 that has boarded or is about to board the elevator car 14 is with the preset temperature range. If this is the case, the method proceeds along the YES branch to the step S7, otherwise the method proceeds along the NO branch to the step S10.
At the step S10, any building action that has been or is about to be initiated is interrupted. For example, if an elevator call has been registered at the step S6 and an allocated elevator car 14 is about to depart from the boarding floor, departure of the elevator car 14 is blocked. In one embodiment, building personnel may be notified which may then perform a secondary processing, as indicated at the step S11. Building personnel may, for example, check the body temperatures of any present user and release the elevator car 14 from the blocked state only if the situation has been clarified. If this is not possible, the building action may be abandoned, otherwise the method proceeds then to the step S7.
The additional temperature measurement described with reference to the steps S9-S11 provides additional level of confidence. For example, it reduces the risks involved when other users follow the user 2 without having the body temperatures checked.
According to the foregoing description of various embodiments of the improved technology, the building system 1 may respond to a feverish user 2 by executing one or more predetermined (mitigating) procedures. Such mitigating procedures may include
Depending on how a building's management decides to handle feverish users, one or more of these procedures may be implemented in the building.
In the foregoing description, the secondary processing according to certain embodiments involves acts performed by building personnel. It is contemplated, that in other embodiments, the secondary processing may not involve building personnel, or may only involve building personnel at a reduced or minimum extent. In one embodiment, a self-service terminal (also referred to as a self-checking kiosk) may be provided in the building. In the course of the secondary processing, a user 2 may be required to go to such a self-service terminal and have the body temperature (re-)checked. In another embodiment, a robot may be provided to assist in or to perform the secondary processing. The robot may approach the user 2 having an increased body temperature, or the user 2 may be required to go to the robot, where the user's body temperature is measured. It is further contemplated that the self-service terminal or the robot may be used in case the initial authentication of the user 2 failed. For these purposes, the self-service terminal or the robot are equipped with suitable means to measure the body temperature. Further, the self-service terminal or the robot may be equipped to release a secondary credential (e.g., print QR, update profile, etc.).
Number | Date | Country | Kind |
---|---|---|---|
20176560.9 | May 2020 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/062001 | 5/6/2021 | WO |