The disclosure generally relates to an access control system, and more specifically related to a method and a system for verifying user authenticity in the access control system.
One of the key decisions a user has to make when installing or upgrading a security system for business or personal use is how to handle access control systems. Each access control system may have its own distinct set of features, advantages, and disadvantages. For example, organizations may use one or more of card readers and key cards as their primary form of access control, keypad readers in conjunction with physical key cards (card readers) to increase security, or biometric readers. However, these methods may have multiple shortcomings.
This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the disclosure. This summary is neither intended to identify key or essential inventive concepts of the disclosure nor is it intended for determining the scope of the disclosure.
Disclosed herein is a method at an access reader for verifying authenticity of a user. The method includes detecting, by the access reader, that the user is in proximity to the access reader based on one of a command received from the user or an electronic communication device, associated with the user, present within a predefined threshold distance from the access reader. Furthermore, the method includes transmitting a signal to the electronic communication device in response to detecting that the user is in proximity to the access reader, wherein the signal is indicative of verifying the authenticity of the user. Furthermore, the method includes receiving, from the electronic communication device, biometric information associated with the user for verifying the authenticity of the user after transmitting the signal to the electronic communication device. Furthermore, the method includes verifying, by the access reader, the authenticity of the user based on the verification of the biometric information with user data stored in a database in communication with the access reader.
In one or more embodiments, the method includes triggering a command to provide access to the user based on the verification of the authenticity of the user.
In one or more embodiments, the method includes recording, by the access reader at the database, an access log associated with the verification of the authenticity of the user.
In one or more embodiments, the method includes establishing a secure wireless communication link with the access reader, wherein the wireless communication link is one of a Bluetooth communication link, Ultra-wideband communication link, or another near-field communication link.
In one or more embodiments, receiving the biometric information comprises receiving a voice signature from the user.
Also disclosed herein is a method at the electronic communication device for verifying the authenticity of the user. The method includes generating a prompt message for the user to confirm whether to access the access reader within a vicinity of the electronic communication device. Furthermore, the method includes receiving an input associated with biometric information of the user to access the access reader in response to the generation of the prompt message. Furthermore, the method includes transmitting, to the access reader, the input associated with the biometric information of the user, wherein the biometric information is verified by the access reader to provide access to the access reader.
In one or more embodiments, prior to generating the prompt message, the method includes receiving a signal from the access reader based on the reception of one of a command received from the user or the electronic communication device, associated with the user, present within a predefined threshold distance from the access reader, wherein the signal is indicative of verifying the authenticity of the user.
In one or more embodiments, receiving the input from the user to access the access reader comprises receiving an identity of the access reader, from among the plurality of access readers.
In one or more embodiments, the method includes establishing the secure wireless communication link with the access reader, wherein the wireless communication link is one of the Bluetooth or Ultra-wideband communication link(s).
Also disclosed herein is a system at an access reader for verifying the authenticity of the user. The system includes an access control engine coupled with a processor and a memory. The access control engine is configured to detect that the user is in proximity to the access reader based on one of the command received from the user or the electronic communication device, associated with the user, present within the predefined threshold distance from the access reader. Furthermore, the access control engine is configured to transmit the signal to the electronic communication device in response to detecting that the user is in proximity to the access reader, wherein the signal is indicative of verifying the authenticity of the user. Furthermore, the access control engine is configured to receive, from the electronic communication device, biometric information associated with the user for verifying the authenticity of the user after transmitting the signal to the electronic communication device. Furthermore, the access control engine is configured to verify the authenticity of the user based on the verification of the biometric information with user data stored in a database in communication with the access reader.
In one or more embodiments, the access control engine is configured to trigger a command to provide access to the user based on the verification of the authenticity of the user.
In one or more embodiments, the access control engine is configured to record, by the access reader at the database, an access log associated with the verification of the authenticity of the user.
In one or more embodiments, the access control engine is configured to establish a secure wireless communication link with the access reader, wherein the wireless communication link is one of a Bluetooth communication link, Ultra-wideband communication link, or another near-field communication link.
In one or more embodiments, the access control engine is configured to receive the biometric information, the access control engine is further configured to receive a voice signature from the user.
Also disclosed herein is a system at the electronic communication device for verifying the authenticity of a user. The system includes an access control engine coupled with a processor and a memory. The access control engine is configured to generate the prompt message for the user to confirm whether to access the access reader within the vicinity of the electronic communication device. Furthermore, the access control engine is configured to receive the input associated with biometric information of the user to access the access reader in response to the generation of the prompt message. Furthermore, the access control engine is configured to transmit, to the access reader, the input associated with the biometric information of the user, wherein the biometric information is verified by the access reader to provide access to the access reader.
In one or more embodiments, the access control engine is configured to, prior to generation of the prompt message, receive a signal from the access reader based on the reception of one of a command received from the user or the electronic communication device, associated with the user, present within a predefined threshold distance from the access reader, wherein the signal is indicative of verifying the authenticity of the user.
In one or more embodiments, the access control engine is configured to receive the input from the user to access the access reader, the access control engine is configured to receive an identity of the access reader, from among the plurality of access readers.
In one or more embodiments, the access control engine is configured to establish a secure wireless communication link with the access reader, wherein the wireless communication link is one of a Bluetooth or Ultra-wideband communication link(s).
To further clarify the advantages and features of the methods, systems, and apparatuses, a more particular description of the methods, systems, and apparatuses will be rendered by reference to specific embodiments thereof, which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the disclosure and are therefore not to be considered limiting of its scope. The disclosure will be described and explained with additional specificity and detail in the accompanying drawings.
These and other features, aspects, and advantages of the disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as illustrated therein being contemplated as would normally occur to one skilled in the art to which the disclosure relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are explanatory of the disclosure and are not intended to be restrictive thereof.
Reference throughout this specification to “an aspect”, “another aspect” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. Thus, appearances of the phrase “in an embodiment”, “In one or more embodiments”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms “comprise”, “comprising”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by “comprises . . . a” does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to form new embodiments. The term “or” as used herein, refers to a non-exclusive or unless otherwise indicated. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein can be practiced and to further enable those skilled in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
As is traditional in the field, embodiments may be described and illustrated in terms of blocks that carry out a described function or functions. These blocks, which may be referred to herein as units or modules or the like, are physically implemented by analog or digital circuits such as logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits, passive electronic components, active electronic components, optical components, hardwired circuits, or the like, and may optionally be driven by firmware and software. The circuits may, for example, be embodied in one or more semiconductor chips, or on substrate supports such as printed circuit boards and the like. The circuits constituting a block may be implemented by dedicated hardware, or by a processor (e.g., one or more programmed microprocessors and associated circuitry), or by a combination of dedicated hardware to perform some functions of the block and a processor to perform other functions of the block. Each block of the embodiments may be physically separated into two or more interacting and discrete blocks without departing from the scope of the disclosure. Likewise, the blocks of the embodiments may be physically combined into more complex blocks without departing from the scope of the disclosure.
The accompanying drawings are used to help easily understand various technical features and it should be understood that the embodiments presented herein are not limited by the accompanying drawings. As such, the disclosure should be construed to extend to any alterations, equivalents, and substitutes in addition to those which are particularly set out in the accompanying drawings. Although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are generally only used to distinguish one element from another.
One of the key decisions a user has to make when installing or upgrading a security system for business or personal use is how to handle access control systems. The term “access control system” refers to physical or technological security measures that govern entrances and exits from spaces within and around a building. The access control system includes everything from a physical lock on a door to a key card/electronic device that opens specific storage areas. There are several options for access control readers when installing the access control system (e.g., card readers, keypad readers, two-factor or multifactor authentication readers, biometric readers, etc.). Each access control system has its own distinct set of features, advantages, and disadvantages.
For example, in one scenario, many organizations use card readers as their primary form of access control. To gain access, card readers use key cards rather than physical keys or codes. There are two types of access control key card readers, viz., proximity and magnetic. Both of these key card options enable organizations to view a history of which cards are used at which entry points, making it simple to narrow down users in the event of a security incident. The disadvantage of using key card readers is that users can easily lose or lend their cards, making an organization's security less effective. In another scenario, keypad readers can be used in conjunction with physical key cards (card readers) to increase security. These are referred to as two-factor or multifactor authentication readers. Although two-factor authentication is more secure than a single access control reader, even this type of access control can be hacked with a stolen card and personal identification number (PIN). In another scenario, biometric readers such as fingerprints would be used for access control rather than key cards or PIN numbers. Biometric access control, especially when combined with another type of access control reader, is by far the most effective form of security for organizations seeking the ultimate in access control. Although biometric readers are effective, they are also more expensive than others. Another disadvantage of using fingerprints to prove identity and gain access is the resulting high-touch surface, which may pose a sanitation issue and become an uninvited source of virus and bacteria transmission.
In some scenarios, the user may be unable to tap the card readers/electronic device and/or provide the fingerprint and/or use face recognition mechanism to the access control system to gain access to entrances and exits from the spaces within and around the building for a variety of reasons, including having bags in both hands, lab devices in both hands, speaking to another person, and so on. The present disclosure addresses the above-mentioned disadvantages or other shortcomings or at least provide a useful alternative for verifying user authenticity in the access control system.
Referring now to the drawings, and more particularly to
In an embodiment, the access reader 100 may include a system 101. The system 101 may include a memory 110, a processor 120, a communicator 130, and an access control engine 140.
In an embodiment, the memory 110 may store instructions to be executed by the processor 120 for verifying authenticity of a user, as discussed throughout the disclosure. The memory 110 may include non-volatile storage elements. Examples of such non-volatile storage elements may include magnetic hard discs, optical discs, floppy discs, flash memories, or forms of electrically programmable memories (EPROM) or electrically erasable and programmable (EEPROM) memories. In addition, the memory 110 may, in some examples, be considered a non-transitory storage medium. The term “non-transitory” may indicate that the storage medium is not embodied in a carrier wave or a propagated signal. However, the term “non-transitory” should not be interpreted that the memory 110 is non-movable. In some examples, the memory 110 can be configured to store larger amounts of information than the memory. In certain examples, a non-transitory storage medium may store data that can, over time, change (e.g., in Random Access Memory (RAM) or cache). The memory 110 can be an internal storage unit, or it can be an external storage unit of the access reader 100, a cloud storage, or any other type of external storage.
The processor 120 may communicate with the memory 110, the communicator 130, and the access control engine 140. The processor 120 may be configured to execute instructions stored in the memory 110 and to perform various processes for verifying authenticity of the user, as discussed throughout the disclosure. The processor 120 may include one or a plurality of processors, which may be a general-purpose processor, such as, a central processing unit (CPU), an application processor (AP), or the like, a graphics-only processing unit such as a graphics processing unit (GPU), a visual processing unit (VPU), and/or an Artificial intelligence (AI) dedicated processor such as a neural processing unit (NPU).
The communicator 130 may be configured to communicate internally between internal hardware components and with external devices (e.g., server, electronic communication device, etc.) via one or more networks (e.g., radio technology, bluetooth, bluetooth low energy (BLE), wireless fidelity (Wi-Fi), etc.), as described in conjunction with
The access control engine 140 may be implemented by processing circuitry such as logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits, passive electronic components, active electronic components, optical components, hardwired circuits, or the like, and may optionally be driven by firmware. The circuits may, for example, be embodied in one or more semiconductor chips, or on substrate supports such as printed circuit boards and the like.
In an embodiment, the access control engine 140 may include a sensor(s) 141, an input-output (I/O) controller 142, a verification engine 143, an access log controller 144, and an AI engine 145.
The sensor(s) 141 may be configured to capture sensor data associated with the access reader 100. Examples of the sensor(s) 141 include, but not limited to, a camera, a microphone, a temperature sensor, an audio sensor, an accelerometer, a pressure sensor, a location sensor, a humidity sensor, a global positioning system (GPS) sensor, a magnetic field sensor, an electric field sensor, a light sensor, an infrared light sensor, a proximity sensor, a biometric sensor (e.g., fingerprint, iris, facial pattern, etc.), and so on, as illustrated in
In one example embodiment, the security-related data for a motion sensor may indicate the motion of the door, gate, lid, drawer, or other apparatus to which the access reader 100 is connected. The motion of the door or other apparatus indicates that the door or other apparatus is being opened/closed to allow/restrict access to the area.
In one example embodiment, the security-related data for a proximity sensor may indicate that the user is near a door and may attempt to break/open through the door, that the door is closed or open based on its proximity to a door frame in which the door is installed, and so on. Furthermore, the proximity sensor's security-related data includes a count of users who pass by the access reader 100 and the number of users who enter or exit the protected area. Furthermore, the sensor(s) 141 sends a message indicating the counts to the owner or administrator of the access reader 100/access log controller 144, a third party, etc.
In one example embodiment, the security-related data for a microphone may indicate that a user is knocking on the door. When the microphone may determine that the user is knocking on the door, the microphone then sends a signal to a wirelessly connected light sensor/light bulb, causing the light bulb to illuminate an area near the access reader 100. For example, the light bulb can illuminate the area in front of the door, the area inside the house containing the door, and so on.
In one example embodiment, the security-related data for the proximity sensor may indicate that the user is within a predetermined distance/predefined threshold distance (e.g., 2 meters) of the access reader 100, the access reader 100 may initiate a video stream to the administrator/owner of the access reader 100 via the camera and an audio stream via the microphone to the administrator/owner of the access reader 100. The administrator/owner uses the video stream to see what is going on near the door, and the access reader 100 may use a two-way audio stream to communicate with the user who is nearby.
In one example embodiment, the security-related data may indicate a potential security issue in which the access reader 100 communicates via a signal to be sent to a speaker/audio sensor, causing the speaker to emit an alarm sound. In another case, when security-related data indicates a potential security issue, the access reader 100 may send a signal that causes the camera to start recording or taking images, for example, to capture an image or video of a burglar attempting to break into the area protected by the access reader 100.
The I/O controller 142 may include an input device(s) and an output device(s). The input device(s) allows the user to communicate with the access reader 100, as illustrated in
The verification engine 143 may verify the authenticity of the user based on verification of the biometric information with user data stored at a database (e.g., cloud server) (not shown in
A function associated with the AI engine 145 may be performed through the non-volatile memory, the volatile memory, and the processor 120. One or a plurality of processors controls the processing of the input data in accordance with a predefined operating rule or AI model stored in the non-volatile memory and the volatile memory. The predefined operating rule or AI model is provided through training or learning. Here, being provided through learning means that, by applying a learning algorithm to a plurality of learning data, a predefined operating rule or AI model of the desired characteristic is made. The learning may be performed in a device itself in which AI according to an embodiment is performed, and/or may be implemented through a separate server/system. The learning algorithm is a method for training a predetermined target device (for example, a robot) using a plurality of learning data to cause, allow, or control the target device (e.g., access reader 100) to decide or predict the authenticity of the user. Examples of learning algorithms include, but not limited to, supervised learning, unsupervised learning, semi-supervised learning, or reinforcement learning.
The AI engine 145 may consist of a plurality of neural network layers. Each layer has a plurality of weight values and performs a layer operation through a calculation of a previous layer and an operation of a plurality of weights. Examples of neural networks include, but not limited to, convolutional neural network (CNN), deep neural network (DNN), recurrent neural network (RNN), restricted boltzmann machine (RBM), deep belief network (DBN), bidirectional recurrent deep neural network (BRDNN), generative adversarial networks (GAN), and deep Q-networks.
Although
In an embodiment, the electronic communication device 200 may include a system 201. The system 201 may include a memory 210, a processor 220, a communicator 230, a display 240, a camera 250, and an access control engine 260.
In an embodiment, the memory 210 may store instructions to be executed by the processor 220 for verifying authenticity of the user, as discussed throughout the disclosure. The memory 210 may include non-volatile storage elements. Examples of such non-volatile storage elements may include magnetic hard discs, optical discs, floppy discs, flash memories, or forms of electrically programmable memories (EPROM) or electrically erasable and programmable (EEPROM) memories. In addition, the memory 210 may, in some examples, be considered a non-transitory storage medium. The term “non-transitory” may indicate that the storage medium is not embodied in a carrier wave or a propagated signal. However, the term “non-transitory” should not be interpreted that the memory 210 is non-movable. In some examples, the memory 210 can be configured to store larger amounts of information than the memory. In certain examples, a non-transitory storage medium may store data that can, over time, change (e.g., in Random Access Memory (RAM) or cache). The memory 210 can be an internal storage unit, or it can be an external storage unit of the electronic communication device 200, a cloud storage, or any other type of external storage.
The processor 220 may communicate with the memory 210, the communicator 230, the display 240, the camera 250, and the access control engine 260. The processor 220 may be configured to execute instructions stored in the memory 210 and to perform various processes for verifying authenticity of the user, as discussed throughout the disclosure. The processor 220 may include one or a plurality of processors, may be a general-purpose processor, such as a central processing unit (CPU), an application processor (AP), or the like, a graphics-only processing unit such as a graphics processing unit (GPU), a visual processing unit (VPU), and/or an Artificial intelligence (AI) dedicated processor such as a neural processing unit (NPU).
The communicator 230 may be configured to communicate internally between internal hardware components and with external devices (e.g., access reader 100) via one or more networks (e.g., radio technology), as illustrated in
The display 240 can accept user inputs and is made of a liquid crystal display (LCD), a light emitting diode (LED), an organic light emitting diode (OLED), or another type of display, as illustrated in
The access control engine 260 may be implemented by processing circuitry such as logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits, passive electronic components, active electronic components, optical components, hardwired circuits, or the like, and may optionally be driven by firmware. The circuits may, for example, be embodied in one or more semiconductor chips, or on substrate supports such as printed circuit boards and the like.
In an embodiment, the access control engine 260 may include a prompt message generator 261, an input detector 262, and an AI engine 263. The prompt message generator 261 may generate a prompt message (e.g., voice message, display message, etc.) for the user to confirm whether to access the access reader 100 within a vicinity of the electronic communication device 200, as illustrated in
The input detector 262 may receive an input (e.g., voice signature) associated with the biometric information of the user to access the access reader 100 in response to the generation of the prompt message, as described in conjunction with
A function associated with the AI engine 263 may be performed through the non-volatile memory, the volatile memory, and the processor 220. One or a plurality of processors controls the processing of the input data (e.g., voice signature) in accordance with a predefined operating rule or AI model stored in the non-volatile memory and the volatile memory. The predefined operating rule or AI model is provided through training or learning. Here, being provided through learning means that, by applying a learning algorithm to a plurality of learning data, a predefined operating rule or AI model of the desired characteristic is made. The learning may be performed in a device itself in which AI according to an embodiment is performed, and/or may be implemented through a separate server/system. The learning algorithm is a method for training a predetermined target device (for example, a robot) using a plurality of learning data to cause, allow, or control the target device to decide or predict. Examples of learning algorithms include, but not limited to, supervised learning, unsupervised learning, semi-supervised learning, or reinforcement learning.
The AI engine 263 may consist of a plurality of neural network layers. Each layer has a plurality of weight values and performs a layer operation through a calculation of a previous layer and an operation of a plurality of weights. Examples of neural networks include, but not limited to, convolutional neural network (CNN), deep neural network (DNN), recurrent neural network (RNN), restricted boltzmann machine (RBM), deep belief network (DBN), bidirectional recurrent deep neural network (BRDNN), generative adversarial networks (GAN), and deep Q-networks.
Although
At step 301, the method 300 may include detecting that the user is in proximity to the access reader 100 based on one of the command(s) received from the user or the electronic communication device 200, associated with the user, present within the predefined threshold distance from the access reader 100, as illustrated in
At step 302, the method 300 may include transmitting the signal to the electronic communication device 200 in response to detecting that the user is in proximity to the access reader 100, where the signal is indicative of verifying the authenticity of the user, as illustrated in
At step 303, the method 300 may include receiving from the electronic communication device 200, the biometric information associated with the user for verifying the authenticity of the user after transmitting the signal to the electronic communication device 200, as illustrated in
At step 304, the method 300 may include verifying the authenticity of the user based on verification of the biometric information with user data stored in the database in communication with the access reader 100, as illustrated in
At step 305, the method 300 may include determining whether the received biometric information associated with the user matches the stored biometric information, in the database, associated with the user, as illustrated in
At step 306, the method 300 may include no access in response to determining that the received biometric information associated with the user does not match the stored biometric information.
At step 307, the method 300 may include triggering the command to provide access to the user in response to determining that the received biometric information associated with the user matches the stored biometric information, as illustrated in
At step 308, the method 300 may include recording the access log associated with the verification of the authenticity of the user in the database, as illustrated in
At step 309, the method 300 may include establishing the secure wireless communication link with the electronic communication device 200, as illustrated in
At step 401, the method 400 may include receiving the signal from the access reader 100, where the signal is indicative of verifying the authenticity of the user, as illustrated in
At step 402, the method 400 may include generating the prompt message for the user to confirm whether to access the access reader 100 within the vicinity of the electronic communication device 200, as illustrated in
At step 403, the method 400 may include receiving the input associated with the biometric information of the user to access the access reader 100 in response to the generation of the prompt message, as illustrated in
At step 404, the method 400 may include transmitting the input associated with the biometric information of the user, where the biometric information is verified by the access reader 100 to provide access to the access reader 100, as illustrated in
At step 501, the access reader 100 may detect the user 200A is in proximity to the access reader based on the command/mobile command (e.g., the voice command “open the door”) received from the user 200A and/or the electronic communication device 200 associated with the user 200A, when the user 200A is present within the predefined threshold distance from the access reader 100, which relates to step 301 of
At step 503, the electronic communication device 200 may generate the prompt message (e.g., a message displayed on a screen of the electronic communication device 200 “Please enter your registered information for validation”, a voice message “provide a password to open the door”) for the user 200A to confirm whether or not to access the access reader 100 located near the electronic communication device 200, which relates to step 402 of
At step 505, the cloud database 500B may determine whether the received biometric information associated with the user 200A matches the stored biometric information associated with the user 200A, which relates to step 305 of
At step 506, the electronic communication device 200 may send a message signal to access the access reader 100 to the user 200A. Example of the message signal includes, but not limited to a message displayed on the screen of the electronic communication device 200 “Please enter door identity/door number”, a voice message “provide a door identity”, a voice message “would you like to open door-100A or 100B or 100N?”, etc., which relates to step 403 of
At steps 601-602, the access reader 100 may detect the user 200A is in proximity to the access reader 100 based on the command/mobile command (e.g., the voice command “open the door”) received from the user 200A and/or the electronic communication device 200 associated with the user 200A when the user 200A is present within the predefined threshold distance from the access reader 100, which relates to step 301 of
The various actions, acts, blocks, steps, or the like in the flow/sequence diagrams may be performed in the order presented, in a different order, or simultaneously. Further, in some embodiments, some of the actions, acts, blocks, steps, or the like may be omitted, added, modified, skipped, or the like without departing from the scope of the invention.
Referring to
Referring to
The electronic communication device 200 may generate a prompt message ({circle around (3)}) (e.g., a message displayed 709 on a screen of the electronic communication device 200 “Please enter your registered information for validation”, a voice message “provide a password to open the door”) for the user 200A to confirm whether or not to access the access reader 100 located near the electronic communication device 200, which relates to step 503 of
The electronic communication device 200 may send a message signal ({circle around (6)}) to access the access reader 100 to the user 200A, which relates to step 506 of
Unlike existing methods and systems, the disclosed method/system uses the electronic communication device 200 (e.g., mobile phones, smartphones, tablets, wearable electronic devices, and so on) and allows the electronic communication device 200 to serve as a user's credentials to gain access to, for example, offices or other business facilities or any organization. As more employers/users promote the Bring Your Own Device (BYOD) trend, the disclosed method/system shall provide a mechanism for adding an extra layer of security to any organization. Further, by using the cloud-based encrypted technology, the disclosed method/system provides secure access to, for example, offices or other business facilities with just a few clicks on the electronic communication device 200 and ensures a higher level of security. Furthermore, the disclosed method/system also detects and prevents tailgating. Furthermore, the disclosed method/system provides a low-cost solution for efficiently managing user credentials identification. Because of its simplicity and ease of use, the disclosed method/system is an undeniably promising alternative to physical cards/expensive biometric readers for verifying the user's authenticity.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one ordinary skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
While specific language has been used to describe the subject matter, any limitations arising on account thereto, are not intended. As would be apparent to a person in the art, various working modifications may be made to the method to implement the inventive concept as taught herein. The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment.
The embodiments disclosed herein can be implemented using at least one hardware device and performing network management functions to control the elements.
The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the scope of the embodiments as described herein.
This application claims the benefit of U.S. Provisional Patent Application No. 63/481,559 filed on Jan. 25, 2023, which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
63481559 | Jan 2023 | US |