Physical access control system with location-based intent detection

文档序号:277793 发布日期:2021-11-19 浏览:6次 中文

阅读说明:本技术 具有基于定位的意图检测的物理访问控制系统 (Physical access control system with location-based intent detection ) 是由 汉斯·冈纳·弗兰克 扬·施特夫尔 西尔万·雅克·普雷沃 托马斯·拉尔斯·琼森 弗雷德里克·卡 于 2020-03-24 设计创作,主要内容包括:本文描述了用于具有基于定位的意图检测的物理访问控制系统的系统和技术。在示例中,访问控制系统可以管理对资产的访问。访问控制系统适于使用第一无线连接从与用户相关联的密钥设备接收凭证。访问控制系统还可以适于利用对资产的初步认证来验证凭证。访问控制系统还可以适于响应于利用初步认证验证凭证来与密钥设备建立第二无线连接。访问控制系统可以适于确定用户访问资产的意图。访问控制系统可以在初步认证中识别凭证包括模式。访问控制系统还可以适于提供准许对资产的访问的命令。(Systems and techniques for a physical access control system with location-based intent detection are described herein. In an example, an access control system may manage access to assets. The access control system is adapted to receive credentials from a key device associated with the user using the first wireless connection. The access control system may be further adapted to verify the credentials with a preliminary authentication of the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to utilizing the preliminary authentication verification credential. The access control system may be adapted to determine a user's intent to access the asset. The access control system may identify the credential inclusion pattern in the preliminary authentication. The access control system may also be adapted to provide commands that grant access to the asset.)

1. A method for managing access to an asset, comprising:

receiving credentials from a key device associated with a user using a first wireless connection;

verifying the credentials with a preliminary authentication of the asset;

establishing a second wireless connection with the key device in response to verifying the credentials with the preliminary authentication; and

providing a command granting access to the asset.

2. The method of claim 1, wherein the first wireless connection is bluetooth low energy and the second wireless connection is ultra-wideband.

3. The method of claim 1 or 2, further comprising:

sending the credential to an authorization service; and

receiving, from the authorization service, an indication that the user is authorized to access the asset.

4. A method as claimed in claim 1, 2 or 3, wherein the preliminary authentication comprises using pattern matching to identify that the credentials comprise a pattern.

5. The method of claim 4, wherein the pattern is defined using a regular expression.

6. The method of any preceding claim, wherein verifying the credentials using the preliminary authentication comprises comparing the credentials to a whitelist of credentials.

7. The method of claim 6, wherein the whitelist is applied based on a time of day in the preliminary authentication.

8. A method according to any preceding claim, wherein the asset is a physical location.

9. A method according to any preceding claim, wherein the asset is an electronic device.

10. The method of any preceding claim, wherein providing the command to grant access to the asset is based on determining that the user intends to access the asset.

11. A system for managing access to assets, comprising:

at least one processor; and

a memory comprising instructions that, when executed by the at least one processor, cause the at least one processor to:

receiving credentials from a key device associated with a user using a first wireless connection;

verifying the credentials with a preliminary authentication of the asset;

establishing a second wireless connection with the key device in response to verifying the credentials with the preliminary authentication; and

providing a command granting access to the asset.

12. The system of claim 11, wherein the first wireless connection is bluetooth low energy and the second wireless connection is ultra-wideband.

13. The system of claim 11 or 12, further comprising instructions to:

sending the credential to an authorization service; and

receiving, from the authorization service, an indication that the user is authorized to access the asset.

14. The system of claim 11, 12 or 13, wherein the preliminary authentication includes using pattern matching to identify that the credential includes a pattern.

15. The system of claim 14, wherein the pattern is defined using a regular expression.

16. The system of any of claims 11 to 15, wherein verifying the credentials with the preliminary authentication includes instructions to compare the credentials to a whitelist of credentials.

17. The system of claim 16, wherein the whitelist is applied in the preliminary authentication based on a time of day.

18. The system of any of claims 11 to 17, wherein the asset is a physical location.

19. The system of any of claims 11 to 18, wherein the asset is an electronic device.

20. The system of any of claims 11 to 19, wherein the command to provide permission to access the asset is based on determining that the user intends to access the asset.

Technical Field

Embodiments described herein relate generally to physical access control systems and, more particularly, to physical access control systems with credential location detection capabilities.

Background

Physical access to the area may be controlled by an electronic Physical Access Control System (PACS) (e.g., through a doorway). The person may have a key card or mobile device to provide their credentials to the PACS. The environment of a PACS may vary with the number of people who may provide access and the number of points of entry. For example, a company's building may have a single entry point that provides entry access for all employees. Within the building, there may be multiple offices and private meeting rooms that provide access for selected employees. Another example may be a hotel, which has many entry points for each room, but each room is only accessible by selected individuals.

Drawings

In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different instances of similar components. The drawings generally illustrate, by way of example, and not by way of limitation, various embodiments discussed in this document.

FIG. 1 illustrates an example of a user interacting with a PACS, according to some embodiments.

Fig. 2A-2D illustrate examples of a key device interacting with a PACS, according to some embodiments.

Fig. 3 illustrates an example of a person directly approaching three doorways, according to some embodiments.

Fig. 4 illustrates an example of a person approaching three doorways, according to some embodiments.

FIG. 5 illustrates a flow diagram showing a technique for managing access to assets, according to some embodiments.

FIG. 6 illustrates a flow diagram showing a technique for managing access to an asset using a key device, according to some embodiments.

FIG. 7 illustrates a flow diagram showing a technique for managing access to assets, according to some embodiments.

FIG. 8 illustrates a flow diagram showing a technique for managing access to assets, according to some embodiments.

FIG. 9 illustrates a flow diagram showing a technique for managing access to assets, according to some embodiments.

FIG. 10 illustrates a flow diagram showing a technique for managing access to assets, according to some embodiments.

FIG. 11 is a block diagram illustrating an example of a machine on which one or more embodiments may be implemented.

Detailed Description

When attempting to enter a secure area, people may become frustrated by the delayed response between their approach to the entry point and the unlocking of a secure entry mechanism (e.g., an electronically controlled door lock). For example, an employee may make multiple passes through an entry point to a secure area a day. Additionally, in some conventional PACS, users may need to physically present their credentials (e.g., card/badge or mobile device) to a reader located on a wall, which in some cases (e.g., if the user's hands are full) may inconvenience the user or cause further unnecessary delay. Thus, a PACS that is able to more easily and seamlessly identify a user (e.g., authenticate the user's permission to end a secure area) may produce a more user-friendly and preferred experience. Furthermore, an incoming user with a PACS may find benefit in the PACS determining the user's intent, such that the PACS may perform proactive credential verification, such that secure entry mechanisms may be unlocked when the user approaches an entry point.

In some cases, the systems and methods described herein may allow a seamless experience by obtaining or receiving credentials from a user without the user having to actively present a device (e.g., card or mobile device) containing the credentials. That is, in some cases, the systems and methods described herein may include automatically sending credentials to the reader when the user is proximate to the reader (e.g., without active input from the user).

In some cases, the systems and methods described herein may implement various methods of detecting a user's intent such that an entry point will open not only when a user with appropriate credentials is within a defined vicinity of the entry point, but also once it is sufficiently determined that an authenticated user intent is to pass through the entry point. The challenge of performing proactive credential verification may be identifying false positives, which would result in releasing the secure entry mechanism when it should not be unlocked (e.g., false intent detection). This can be problematic because unauthorized persons may gain access to the portal. For example, authorized persons may walk down a hallway and past a security entry point. If the PACS misrecognizes the proximity of a person to the secure entry point, the PACS may unlock the secure entry mechanism. A person may pass through the door and another person may enter through the security access point when the security access mechanism is unlocked.

The wireless PACS may have commonly used wireless communication technologies such as Near Field Communication (NFC), such as Radio Frequency Identification (RFID) technology and Personal Area Network (PAN) technology, such as IEEE 802.15.1 and Bluetooth Low Energy (BLE). These techniques may have drawbacks in terms of seamless user experience and access. For example, NFC has limited range so that credential exchanges typically do not occur until a user attempts to gain access (e.g., stands in front of a door, holding a key card against a reader). Transferring the credential to the reader and responding by the host server may take several seconds, which may create a frustrating user experience. Further, for example, a user may often need to remove a key card or access device from their pocket and place the key card or access device on or very close to the reader to begin the process.

BLE devices have a range of tens of meters (e.g., ten to twenty meters). Thus, the credential exchange may be performed when the user is in proximity to the reader. The PAN standard may feature secure handshakes, encryption, and advantageous energy profiles for discovery and data transmission. However, the PAN standard does not provide accurate physical tracking (e.g., ranging, positioning) of devices. Thus, without any additional proof of intent, it may be difficult for the reader to determine whether the user's interior is actually gaining access to the secure area. Additional proof of intent may include touching the doorknob and gesturing with a key device. However, this may still be a less than ideal user experience than if the user simply walks up to the reader and gains access to a secure area.

An ultra-wideband (UWB) wireless communication protocol may be used for communication by encoding data via time modulation (e.g., pulse position encoding). With UWB, a symbol is specified by a pulse on a subset of time cells in the set of available time cells. Other examples of UWB encoding may include amplitude modulation and polar modulation. Broadband transmission tends to be more robust to multipath fading than carrier-based transmission techniques. In addition, the lower pulse power at any given frequency tends to reduce interference with carrier-based communication techniques.

UWB can be used for radar operation and provide positioning accuracy on the scale of tens of centimeters. Due to the possibility of variable absorption and reflection of different frequencies in the pulses, surface and blocking (e.g., covering) features of the object can be detected. In some cases, positioning may provide an angle of incidence in addition to providing a range or distance.

Physical access control may include a series of systems and methods for managing access to secure areas, for example, by a person. Physical access control may include identification of authorized users or devices (e.g., vehicles, drones) and actuation of gates, doors, or other facilities for protecting an area. A PACS may include a reader (e.g., an online or offline reader) that holds authorization data, and may be able to determine whether the credentials provided are authorized for use with an actuator (e.g., door lock, door opener, close alarm). The online reader or system may include a system connected to a network or the internet for determining authorization. The offline reader or system may be a self-contained system that is not connected to any external resource. For example, a PACS for a home may be offline.

A PACS may include a host server to which readers and actuators are connected (e.g., via a controller) in a centrally managed configuration. In a centrally managed configuration, the reader may obtain credentials from a key device (e.g., a Radio Frequency Identification (RFID) chip in a card, a key fob, or a personal electronic device such as a mobile phone) and pass these credentials to the PACS hosting server. The host server may determine whether the credential authorizes access to the secure area and command the actuator accordingly.

To address the issue of identification intent, location techniques (e.g., using secure UWB ranging) may be combined with PAN discovery and key exchange. The key device and reader may coordinate secure ranging using PAN techniques. This may include the reader providing a secret (e.g., a Scrambling Time Stamp (STS)) for marking the ranging message to prevent spoofing. The key device may provide credentials during the same PAN session that shares the secret. Unless the credential is cached until an intent trigger occurs, the reader may decrypt or otherwise prepare the credential as it normally would.

The reader may use UWB to physically locate the key device. In some examples, UWB is activated after the shared secret to save energy, which may be useful for battery powered readers or key devices.

The physical location of the key device is more accurate with UWB than other technologies, and can be as accurate as tens of centimeters, providing both range and direction to the reader. When the reader is uncoordinated, the accuracy exceeds the accuracy of about 10 meters for a PAN. The accuracy of the UWB accuracy may provide the details needed for user intent determination. For example, multiple regions (e.g., different ranges of distances from the reader) may be defined to provide different contexts for understanding the user's intent. Furthermore, the accuracy of the tracking enables an accurate model of the user's motion from which intent can be discerned. Thus, the reader may classify the user movement as being likely to approach the reader or simply walk through.

An intent threshold or intent trigger may be in place, where once the likelihood of intent exceeds the intent threshold, the intent trigger may activate a series of events, such as causing the reader to act on cached credentials. For an offline reader, the reader may control an actuator (e.g., a lock on a disconnected door lock). In a centrally managed PACS, the reader may forward the credentials to the host server for operation (e.g., send the credentials to the controller to make a determination and further actuate the door lock as appropriate).

The systems and methods described herein may be implemented such that a first transmission or exchange with a key device via a communication protocol (e.g., BLE, Wi-Fi) having longer-range capabilities or, in some cases, lower accuracy may be used to provide the reader with the user's credentials. These credentials may be stored in a cached location within the reader until and unless it is determined that the user does intend to enter a secure area (e.g., open a door in which the reader is installed) upon a second transmission or exchange with the key device via a communication protocol (e.g., UWB) with greater accuracy and precision. Once the user's intent is determined, the reader may then release the credentials (sometimes referred to as PACS bits) for processing, such as sending the credentials to a controller to determine the user's access permission or to unlock the door directly (e.g., in the case of an offline reader). This two-step authentication sequence may reduce the computation time that may cause a delay (also referred to as a latency) in the user's door opening. With this method, authentication and communication between the reader and the key device has been performed efficiently when the system has determined that the user really intends to enter the door and the user arrives at the door.

In some implementations, the cached credentials may be cleared if the intent trigger does not occur within a time period, or an anti-intent trigger occurs, such as a move away from the reader. The above operations may be performed because many credentials may be cached in the reader, but it is possible that a smaller subset of the cached credentials may actually be used for the authentication process (e.g., based on later predicted intent).

In some embodiments, if the reader has identified whether the credential provides access to the secure area (e.g., in the case of an offline reader), the credential is not cached if it is determined that the credential does not provide access to the secure area. In addition, UWB positioning may not be activated.

In some implementations, the reader can include a persistent authentication of the credential. The persistence may be based on a timeout value. The amount of time the credential is stored or its persistence depends on the timeout value. If the timeout is long, the need to re-exchange PAN credentials may be reduced.

For example, the key device is within the PAN of the reader. The reader may cache the PACS ID read from the credential provided by the key device (e.g., 26-bit PACS for legacy systems). A seed for time-based one-time password (TOTP) technology is generated by the reader and shared to the key device via the PAN. The UWB range received from the key device includes a reader-authenticated TOPT. If the UWB measures that the key device is close enough (within a few meters) to the reader or other target (e.g., the center of the door), the reader sends the cached PACS ID to the host server. The host server triggers the door to be opened. The reader may then delete the cached PACS ID. Conversely, if the UWB does not range the key device after some timeout (e.g., 5 minutes), then TOTP expires. The key device must then connect to the reader to obtain a new TOTP. In addition, PAN authentication may expire after some authentication timeout (e.g., hours).

When using secure UWB positioning, any reader involved may need a seed or secret for secure ranging, such as STS, in order to operate efficiently in the system. For example, if multiple readers can be connected (e.g., via BLE, mesh, etc.) to distribute the same secret among all participating readers. This may reduce the need to exchange STS between each reader and the key device. In addition, the shared exchange may exchange the cached PACS ID to all readers, for example, from one initial reader connected to the key device. By doing so, each key device requires a credential and STS exchange.

A coordinated PACS may use a gateway device to coordinate multiple readers within the PACS, whether the readers are centrally managed or offline. The reader may operate as a remote radio head to the gateway, where the gateway performs credential caching, intent determination, and forwarding of credentials to the host server or commands brake operation. Coordinated PACS facilitates UWB localization of a key device and one or more connected readers. In some examples, the gateway may load balance UWB positioning responsibilities. This may be helpful in dense key device scenarios (e.g., at ticket vending speed gates).

In some implementations, the credential sent to the reader can include encoded or encrypted information, such as that of HID Global stored in or on the key deviceOf vouchers, NXPCredentials or Sony's FeliCaTM credentials. The reader may decrypt or obtain various information from credentials received from the key device and provide the information to an access server (e.g., a controller) to determine permissions (e.g., access permissions) of the user. In some cases, the reader may decrypt the credentials and obtain access control identification information (e.g., PACS bits) about the user, and send this information to the controller to determine whether the user has permission to access the controlled area or system they are attempting to gain access.

FIG. 1 illustrates an example 100 of a user interacting with a PACS in accordance with some embodiments. Doorway 105 may be secured with an electronic lock controlled by the PACS. The PACS uses the reader 110 to receive credentials from a user 115 desiring to enter the doorway 105.

As user 115 approaches doorway 105 and reader 110, first wireless communication 120 communicates with the user's 115 key device. The first wireless communication 120 may be a low power communication such as BLE. The first wireless communication 120 may have the ability to communicate with key devices at greater distances, but may not be able to perform location and ranging of the key devices. Using the first wireless communication 120, the reader 110 may receive credentials and other identifying information from the key device. The reader 110 may cache the credentials or may send the credentials to a PACS' authentication system, which may determine whether the user 115 may enter the doorway 105.

As the user 115 continues to approach the doorway 105 and the reader 110, the second wireless communication 125 begins communicating with the key device of the user 115. The second wireless communication 125 may be a high power consumption and advanced communication such as UWB. The second wireless communication 125 may include positioning and ranging to track the movement of the user 115. The second wireless communication 125 may track the user 115 and use factors such as the speed at which the user 115 is moving to determine whether the user's 115 intent is to enter the doorway 105. For example, if the user 115 does not intend to enter the doorway 115, their speed may remain constant. Conversely, if the user's 115 intent is to enter the doorway 105, the user 115 may slow his pace as he approaches the doorway 105 and contacts the door handle.

The PACS may use the data received from the reader 110 using the second wireless communication 125 to determine the likelihood or probability that the user 115 intends to pass through the doorway 105. The determination may be calculated using the received data or the received data may be provided to a fixed or evolving model. If the determined probability of intent exceeds a predetermined threshold, the PACS may unlock the door so that the user 115 may seamlessly enter the doorway 105. The threshold may vary depending on how accurately the probability determination is made and how safely doorway 105 may require. For example, the threshold for the probability of intent of a conference room may be 50% because there is no risk if the conference room is unlocked due to a false positive. However, the threshold for the probability of intention of a door for a laboratory for new product development may be 90%. Further, using user credentials available to the system to correlate additional information, such as, but not limited to, access rights and access history, the threshold may be adjusted for each user.

Fig. 2A-2D illustrate an example 200 for a key device to interact with a PACS, according to some embodiments. The example PACS 200 includes a doorway 205 secured with a reader 210 and a lock 215. The reader includes a cache 220 for storing credentials and other data received from the key device. The reader 210 communicates with an access control 225. Access control 225 may be a server connected to a local internal network. Access control 225 may be a remote system connected through the internet for managing access to multiple locations.

In fig. 2A, key device a 230, key device B235, and key device C240 come within BLE range of reader 210 (as an example of low energy wireless communication). Each of key device a 230, key device B235, and key device C240 provide credentials to the reader 210 when a connection is established with the reader 210.

In fig. 2B, the reader 210 may perform a preliminary authentication of the credential. For example, the reader 210 may include a blacklist or whitelist to make immediate decisions regarding tracking the key device. Ranging and positioning using UWB provides additional information about the movement of the key device, but also requires more energy. Thus, it may be advantageous to make a determination of whether a key device should be tracked. In example 200 of fig. 2B. The reader 210 determines that the key device B235 does not have credentials to enter the doorway 205. Thus, reader 210 does not use UWB to range key device B235 because key device B235 will not be allowed to access doorway 205.

In some implementations, the reader 210 can send the credential to the access control 225 for authorization. If the access control 225 determines that a credential associated with the key device is authorized to enter the doorway 205 associated with the reader 210, the access control 225 may provide the reader 210 with a token for the credential. The reader 210 may store each token with its corresponding credential. Similarly, in this embodiment, if the reader 210 does not receive a token, the credential is removed and a key device, such as key device B235, is not tracked.

In some embodiments, the reader 210 may cache the credential when it is first received through BLE. The reader 210 may keep the credentials in a cache until ranging using UWB. Once the key device is within a certain range, the reader 210 may release the credentials for authentication by the access control 225 or an authentication server.

In FIG. 2C, key device A230 and key device C240 have moved closer to the reader 210 and UWB may be used for communication. Using UWB, positioning or ranging can be performed. The location information of key device a 230 and key device C240 is provided to the reader 210. The location information may be used to determine the intent of the person having each respective key device. The position information may be derived from the UWB, for example by performing range detection.

In fig. 2D, key device a 230 and key device C240 continue to move and location information for their respective movements is provided to reader 210 via UWB communication. The key device C240 moves away from the reader 210 and, therefore, the determined intent of the key device C240 to enter the doorway 205 is low. The reader 210 may continue to track the key device C240 until it is out of range. The reader 210 may be battery-aware and hardware-aware to monitor how power and processing is used. This may include discarding the credential from the cache upon determining that the credential is no longer needed (e.g., if the intent falls below a threshold). Managing credentials stored in a cache based on the confidence or intent of a person accessing an entry point may be necessary to manage a PACS that enters a set of gates (e.g., a set of revolving doors). This type of entry point (e.g., an entrance to a subway or stadium) may receive a large number of credentials at some time.

The key device a 230 continues to approach the doorway 205 and therefore the intent that the key device a 230 will access the doorway 205 is high. Reader 210 may release the token for key device a 230 to access control 225. When the access control 225 receives the token, the access control 225 may send a command to the door lock 215 to unlock so that a person holding the key device A230 may easily and without delay enter the doorway 205. If no token is provided, the reader may send the credentials of key device A230 to access control 225 to unlock door lock 215. For an offline system, the reader 210 may directly control the door lock 215 and directly send a command to the door lock 215 to unlock.

Many factors may be used to determine when the reader 210 should send a release, such as a send token, to the access control 225. If the doorway 205 is for a safe area, the determined intent or probability of accessing the doorway 205 may need to be very high, and thus have a high threshold, so that the doorway 205 does not open unintentionally. Other factors, such as the frequency with which a person visits the doorway 205 or known contextual data, such as a meeting about to begin in the room at the doorway 205, may help determine the threshold of intent.

For security, reader 210 may generate a session key for communication with a key device, such as key device A230. Such as reader 210 and key device a 230, may have a counter on each side. The counter may be hashed as part of the session key. To track the movement of key device a 230, reader 210 continuously communicates with key device a 230 to determine distance. For each communication, the reader 210 or key device a 230 may increment the count of the hash counter, respectively. Then, the session key is changed with each communication to prevent malicious attacks, while the reader 210 and key device a 230 can continue to communicate, since the reader 210 and key device a 230 each know what the count should be and can decrypt the hash.

Identifying the person's intent to enter the doorway may be used to speed up the process of authenticating credentials and unlocking the doorway so that the person is not impeded by the process and appears to be a seamless transitional process. The previous discussion focused on the intent to identify a single doorway. Identifying intent presents challenges when there are multiple doorways and multiple readers, as found in the examples of fig. 3 and 4.

Fig. 3 illustrates an example 300 of a person 335 directly approaching three doorways, according to some embodiments. Person 335 may approach a collection of doorways directly in front of it. For each of doorway 305, doorway 315, and doorway 325, it may be difficult for the respective reader 310, reader 320, and reader 330 to identify which doorway the person 335 intends to enter. For example, if reader 310, reader 320, and reader 330 used ranging alone, person 335 would be within relatively the same range of arrival at the reader. Identifying the location of person 335 and performing a continuous location of person 335 (through its key device) may provide a direction in which person 335 is moving. Using the determined direction, the reader may identify an angle of arrival 340. The angle of arrival 340 may be used to determine which of a plurality of doorways the person 335 intends to enter.

Fig. 4 illustrates an example 400 of a person 435 approaching three doorways, according to some embodiments. The person 435 may approach a set of doorways that may be to one side of the person 435, for example, if the person 435 is walking along a hallway of an office building. For each of doorway 405, doorway 415, and doorway 425, it may be difficult for the respective reader 410, reader 420, and reader 430 to identify which doorway the person 335 intends to enter. Although the person 435 is at different distances from each of the reader 410, the reader 420, and the reader 430, the person 435 may stop at any one of these doorways.

As the person 435 moves along the hallway and past the reader, such as past the reader 430 in example 400, the doorway 425 may be immediately removed from the potential intended doorway. This may free up the cache of reader 430 and change the probability that person 435 intends to enter doorway 405 or doorway 415.

The PACS may attempt to monitor the speed at which person 435 is moving. The speed at which a person moves in this situation may be relatively constant until the person just before reaching their intended doorway, at which time their pace slows. This type of movement information may be used to identify an intended doorway. Neural networks can be trained using movement data of how people move along hallways and how their movements vary with respect to the doorway they enter. The neural network may be used with the PACS and the location data provided by the reader through UWB to identify an intended doorway.

In example 400, the PACS may use the context data to identify the intended doorway. For example, the PACS may access a company's calendar system. The PACS may identify that a conference is about to start in a room corresponding to portal 415. Thus, using a calendar, the PACS may determine that the intent of person 435 is to enter doorway 415, although the intended doorway of person 435 cannot be determined by movement alone. The accuracy of the intent can be further improved if the PACS accesses individuals invited to the conference and then cross-references the authentication of person 435 (from their key device) with the list of invitees.

Another scenario for this example may be where doorway 405 with reader 410, doorway 415 with reader 420, and doorway 425 with reader 430 are hallways of a hotel. The intent to identify the guest may be less easy because the guest will have credentials corresponding to only one doorway. Thus, as the guest walks down the hotel hallway, the hotel's PACS can predict the guest's intent even before the guest enters the reader range of their room, as the PACS can recognize that there is only one doorway/room that the guest has credentials to access.

PACS may access communication systems such as email, instant messaging, and Short Message Service (SMS) that may provide information for determining a doorway into which a person intends to enter. For example, if John sent an instant message to Bob asking Bob to meet with John at lab B, the PACS may identify Bob's intent to enter lab B based on John's request when Bob approaches the door of the lab.

Different types of doorways or entry points can change how intents are utilized and when a reader sends a release to the access control system. For example, the entry point may be a revolving door, and if there is a large number of revolving doors, the intended revolving door may not be identified until a person has stepped into the revolving door. Types of doorways or access points may include manual locks, automatic locks, manual doors, automatic doors, revolving doors, transit speed doors, parking doors, or elevators.

The time to release the credential and unlock the doorway may be determined by data received by ranging and positioning performed by UWB. The intent may be varied by the radius of distance from the reader. Different entry circumstances may change this time. For example, an open area of an office with multiple security doorways may result in waiting until the key device is at a particular doorway before release occurs because of the high enough probability of intent being undetermined due to the multiple security doorways. Conversely, the front door lock of the house can be released well before the person at the front door reaches the door, since there will be no other door for the person to enter.

The key device may be a mobile device, such as a smartphone or tablet. Devices such as smart phones include different types of sensors that can provide information to the PACS. Since the key device communicates with the reader and the PACS through BLE and UWB wireless connections, data collected from sensors on the key device can be sent to the reader and the PACS. The key device may include sensors such as gyroscopes, accelerometers, barometers, Global Positioning Systems (GPS), microphones, and cameras. The key device may gather information from a communication protocol such as Wi-Fi, BLE. The data provided from these sensors and communication protocols can be used to determine the relative position, motion, and velocity of the key device.

The sensor data may provide information for determining the intent of the person having the key device. For example, the PACS may determine that the key device is approaching a doorway quickly. Using data provided from the gyroscope and accelerometer, the PACS can identify that a person is running. Based on the determination that the person is running, different actions may be taken. In one case, if there is only a doorway where a person has a credential to access, the PACS can unlock the door faster because the person will arrive at the door faster than they would when they were walking. In another case, if a person has credentials for multiple meeting rooms, but using a calendar system, the PACS recognizes that a meeting starts in one of the meeting rooms 10 minutes ago, the PACS may determine that the meeting room is the intended destination based on the person running.

Data stored in the mobile device and data of the current function of the mobile device may be communicated to the PACS and used to determine intent. If the PACS is not connected to the calendar system, the mobile device may provide information from reminders or calendars or in the mobile device. For example, a person living in an apartment building may share child care responsibility with another tenant, and each person may have access to the other's apartment. The person may have a reminder to go to another tenant's child to school that identifies the person's intent to enter another tenant's apartment.

The current functionality of the mobile device may be passed to the PACS, such as whether the person is talking on the mobile device or playing a game. For example, if a person is playing a game on their mobile device while walking along the hallway, it may be determined that the intent to enter the conference room is low.

The PACS may be provided with information to identify intent using cameras, noise sensors (microphones), and environmental sensors such as thermometers and barometers. For example, a camera device may be used to help identify which turnstile the user intends to enter. The outdoor temperature may affect the path or habits of the user. For example, if two doorways are close to each other, but one is open to the outside, the PACS may determine that an outside doorway is likely to be the intended doorway in the event that the outside is freezing.

The PACS may be connected to an add-on system that may not require a key device to access but provides an indication of an action that a person may subsequently attempt to enter a doorway controlled by the PACS. This may include internet of things (IoT) devices. Examples of devices and systems with which a person may interact that may provide intent indications and behavioral patterns to a PACS may include garage door openers, thermostats, smart lighting, television, and appliances.

PACS may use neural networks trained using user habits to predict and identify a user's intent to enter the doorway. This may include identifying different actions or connections that the user may be performing, for example, using their mobile device. For example, an office may have a gym for use by people. As part of the Tara normal work day, she may pass through the gymnasium door and reader multiple times a day. However, when Tara does use the gym, she typically listens to the music using her bluetooth ear plugs. The PACS neural network can use this data to identify that Tara is generally intended to enter a gym when using her earplugs, but otherwise is very low-intentioned.

The habits of each user may be utilized to train the PACS neural network to identify common user actions and sequences of actions that may be used to identify intended doorways and entry points. For example, a typical day for a person may include: access point to a building, access point to its floor, and then access a secure room. Some of these access points may have multiple options, for example different doors for different tenant floors. The habit data may include other data to identify changes in habits. For example, the previously described habit may be for when a person arrives at an office in the morning. However, during lunch hours, a person may return with lunch and enter the lunch room through a different doorway on the floor.

The trained neural network may be used to identify the intent of an unknown or new user. For example, a new employee may start working and thus no specific habit data exists for that employee. The PACS neural network recognizes that the employee is engaged in accounting work, using the trained data of other accounting employees to identify the intent of the new employee.

The PACS may receive data about other applications and functions that users perform with their mobile devices. For example, a user may have a Wi-Fi connected light in an office or conference room. Users can turn on lights with their mobile devices before they reach the doorway of such a room. The PACS may use the action data to identify that the user intends to enter the room.

The PACS neural network may combine multiple factors to identify a person's intent to enter a doorway and the time to release credentials for entering the doorway. For example, it is determined that the user's normal routines may be affected by temperature.

When receiving credentials over BLE, the reader may perform preliminary authentication to identify whether the credentials provided by the key device should be authenticated and whether any further communication should occur with the key device, such as ranging using UWB. The power and processing costs of using UWB to range key devices are eliminated if the reader is able to determine with extensive verification that the provisioned credentials will not be authenticated.

The preliminary authentication may be performed using a blacklist or a whitelist. The black-list and the white-list may have conditional factors, such as temporal conditions. For example, a building may have limited access during the night, and therefore use a white list that includes only security and maintenance from 8:00 a night to 6:00 a morning.

Preliminary authentication may be performed by regular expression matching and similar pattern recognition. The reader may receive the credentials through BLE communication with the key device. The reader may identify whether the received credential is the correct sequence of formats using a regular expression that is accepted at the reader for the sequence of formats of the incoming credential. If not, the reader may discard the credential and cease communication with the key device. As an example, the format sequence of the credential accepted by the reader for entry may be the letter "K" followed by six digits. If the format sequence of the provisioned credential is seven digits after the letter "WX", the reader may ignore the credential and not cache or authenticate it, including stopping any communication or ranging to save power and processing.

The PACS may initiate additional precautions for accessing a security doorway based on people in the vicinity of the person attempting to access the security doorway, such as for preventing followers (e.g., people attempting to gain access by following authorized persons). This may increase the threshold for identification intent if the PACS identifies an unauthorized key device in the vicinity of an authorized key device, and unlocks the doorway only when the authorized key device is very close to the doorway. The same applies if the camera is used with a PACS and there is a person without a key device in the vicinity of the person with the authorized key device.

FIG. 5 illustrates a flow diagram showing a technique 500 for managing access to an asset, according to some embodiments. The technique 500 may be used to manage access to assets that are physical locations, such as rooms, buildings, or homes. The technique 500 may be used to manage access to assets that are electronic devices, such as computers, computer networks, smart phones, or specific devices such as automated teller machines.

Technique 500 includes an operation 502 of establishing a first connection with a key device (e.g., a connection between the key device and a reader). The first connection may be NFC, such as RFID technology or PAN technology, such as IEEE 802.15.1, Wi-Fi or BLE. The key device may be a physical card with an integrated circuit that stores information such as credentials and information about the holder of the key device. The key device may be a mobile device such as a smart phone. The mobile device may include an application for interfacing with a reader or include a secure element.

Technique 500 includes an operation 504 of receiving credentials of a user over a first connection. After establishing the first connection between the reader and the key device, the key device may send credentials (e.g., credentials of the user) to the reader. The technique 500 may include an operation to store the credential in a cache memory of the reader. The credentials may be stored in other memory or sent to another computer system for storage in a corresponding memory of the system.

The technique 500 includes an operation 506 of establishing a second connection with the key device. The second connection may be UWB. Technique 500 may include an operation to maintain a location or position of a key device using a second connection. Range detection may be used to determine position or location. The operation of establishing the second connection with the key device may occur based on an interaction of the key device using the first connection.

The technique 500 may include operations to authenticate credentials of a user associated with credentials to access an asset. Authentication may include sending credentials to a certification authority. The technique 500 may include operations to receive a verification indication from an authentication service and thereby allow access to the asset.

The technique 500 includes an operation 508 of providing credentials to an access controller. Providing the credential to the access controller may include an operation to transfer the credential from the cache memory. Credentials may be provided to the access controller based on determining that the user intends to access the asset. The access controller may comprise a physical access control system controller.

In determining that the user intends to access the asset, technique 500 may include an operation of determining a set of location points for the key device using the second connection. The location point may be a position, location, or range of the range reader detected by UWB. The technique 500 may include an operation of calculating a probability that the user will access the asset using the set of location points. The technique 500 may include an operation of determining that the probability exceeds a predetermined threshold. Depending on the type of asset and secure access, the threshold may be adjusted so that a high probability threshold may be set for more secure assets and a low probability threshold may be set for less secure assets.

The technique 500 may include operations to receive an authentication indication from an access controller and to allow access to an asset. For example, credentials that a user may access an asset may be verified. The asset may be a doorway or a security entry point, or the asset may be an electronic device.

Technique 500 may include an operation to remove credentials from cache memory. Credentials may be removed from cache memory based on receiving an indication that a user is not allowed to access the asset. For example, the credential may not be verified, and the reader may receive an indication that the user may not be able to access the asset. The credential may be removed from the cache memory based on losing the second connection with the key device. For example, if the key device moves out of range of the second connection, this may indicate that the key device (and user) is no longer near the reader and therefore has a lower intent to access the asset, thus removing the credential from the cache memory. Credentials may be removed from the cache memory based on the passage of a predetermined time. For example, from the time the second connection is established, the credential may be removed from the cache memory if the asset is not accessed using the key device within a predetermined period of time. This may be performed to save memory and resources. The user may need to perform an action, such as placing the key device on the reader, to again transfer the credential and attempt to access the asset.

FIG. 6 illustrates a flow diagram showing a technique 600 for managing access to an asset using a key device, according to some embodiments. The technique 600 may be used to manage access to assets that are physical locations, such as rooms, buildings, or homes. The technique 600 may be used to manage access to an asset, where the asset is an electronic device, such as a computer, computer network, or smart phone.

The technique 600 includes an operation 502 of establishing a first connection between the key device and the reader when the key device enters a first connection range. The first connection may be a PAN, e.g. by BLE. The technique 600 includes an operation 604 of providing credentials associated with a user from a key device to a reader using a first connection.

The technique 600 includes an operation 606 of establishing a second connection between the key device and the reader. The second connection may be UWB. The second connection is based on a key device entering a second connection range. For example, UWB does not have as large a range as BLE. The key device may first establish a connection with the reader through BLE. When the key device is moved close to the reader and within UWB range, the key device and the reader may establish a second connection through UWB. With UWB, the range or location of the key device can be determined.

The technique 600 includes an operation 608 of providing credentials from the reader to an authorization service. The reader may send credentials to receive authorization of a user of the key device to access the asset. The technique 600 includes an operation 610 of receiving, at a reader, a verification of a credential from an authorization service. If the credential does not have permission to access the asset, the reader may receive a denial from the authorized service.

The technique 600 includes an operation 612 of sending a command from the reader to the access controller granting access to the asset. This may be a command to unlock the doorway or a command to unlock the electronic device for use. Credentials may be provided to the access controller based on determining that the user intends to access the asset. In determining that the user intends to access the asset, technique 600 may include an operation of determining, at the reader, a set of location points for the key device using the second connection. This may be performed by range detection using UWB. Technique 600 may include an operation of calculating a probability that a user will access the asset using the set of location points and determining that the probability exceeds a predetermined threshold.

The user's intent to access the asset may be determined based in part on sensor data collected from sensors of the key device. For example, the GPS of the key device may provide location information, or the accelerometer of the key device may provide movement information (e.g., the user is running).

FIG. 7 illustrates a flow diagram showing a technique 700 for managing access to an asset, according to some embodiments. The technique 700 includes an operation 702 of receiving a first message from a wireless key device associated with a user using a first wireless connection. The PACS may receive the first message at the reader for the security entry point. The first message may include user credentials. The first wireless connection may be NFC, such as RFID technology or PAN technology, such as IEEE 802.15.1 and BLE.

Technique 700 includes an operation 704 of receiving a set of messages from the wireless key device using the second wireless connection. The second wireless connection may be UWB. The set of messages may be a series of communications back and forth between the reader and the key device. The communication may include a seed or hash counter to provide security and prevent spoofing of the key device.

Technique 700 includes an operation 706 of identifying a set of location points for the wireless key device for the set of messages using the second wireless connection. The PACS may identify the location of the key device or the range of the key device to the reader or readers using communication techniques such as UWB.

Technique 700 includes an operation 708 of determining a user intent to physically access the secure entry point based on the set of location points. The security access point may be one of a plurality of security access points within range of the second wireless connection. The technique 700 includes further operations of determining a security entry point of the plurality of security entry points that the user intended to physically access based on computing a trajectory from the set of location points.

The technique 700 includes other operations of calculating a probability that a user will physically access a secure entry point using the set of location points and determining that the probability exceeds a predetermined threshold. For example, the reader may identify multiple radius ranges from the reader. The probability may increase for each progressively closer range in which the key device is determined. The probability may decrease if it is determined that the key device has stopped within one of the ranges or if the key device has returned to a farther range. The predetermined threshold may be used to identify when the probability or intent is high enough that the security entry point should be released. The threshold may depend on factors such as: the security level of the area being accessed (i.e., the conference room or development lab), the number of other access points in the vicinity, and the frequency with which a particular key device accesses a secure access point.

The technique 700 includes an operation 710 of sending a command to unlock a secure entry point. There are many types of security access points such as doorways, turnstiles, pass-through doors, elevators, and parking arms. Unlocking a secure entry point includes any suitable method for this type of secure entry point that would provide restricted access to become unrestricted by the key device holder.

The technique 700 includes other operations to send credentials to an authorization service. The authorization service may be local to the reader, for example in the home. An authorization service may be connected to the reader over a network or the internet to provide credential authorization to multiple locations or entry points. The authorization service may be integrated into the reader. The technique 700 includes other operations of receiving an indication from an authorization service that a user is authorized to access a secure entry point. The authorization service may verify the credential and return an indication to the reader that the credential holder is authorized or unauthorized to enter the secure entry point.

FIG. 8 illustrates a flow diagram showing a technique 800 for managing access to assets, according to some embodiments. Technique 800 includes an operation 802 of receiving credentials from a key device associated with a user using a first wireless connection. The first wireless connection may be NFC, such as RFID technology or PAN technology, such as IEEE 802.15.1 and BLE.

The technique 800 includes an operation 804 of verifying credentials with a preliminary authentication of the asset. The preliminary authentication may occur at the reader or a device local to the reader. The preliminary authentication may include using pattern matching to identify that the credential includes a pattern. Regular expressions can be used to define the pattern. The technique 800 includes operations to verify the credentials with a preliminary authentication by comparing the credentials to a whitelist of credentials. The white list may be applied to preliminary authentication based on time of day. For example, the white list may identify a group of people that are allowed to enter the office building at night and on weekends.

The technique 800 includes an operation 806 of establishing a second wireless connection with the key device in response to verifying the credentials with the preliminary authentication. The second wireless connection may be UWB. The PACS may identify the location of the key device or the range of the key device to the reader or readers using communication techniques such as UWB.

The technique 800 includes operations of sending credentials to an authorization service and receiving an indication from the authorization service that a user is authorized to access an asset. Preliminary authorization is performed to help eliminate any credentials that would be automatically rejected by the authorization service because the credentials may not conform to the correct format or schema. This may eliminate the time and process of sending and authenticating these credentials. The technique 800 includes an operation 808 of providing a command to grant access to the asset.

FIG. 9 illustrates a flow diagram showing a technique 900 for managing access to an asset, according to some embodiments. Technique 900 includes an operation 902 of receiving credentials for an asset from a key device associated with a user using a first wireless connection. The first wireless connection may be NFC, such as RFID technology or PAN technology, such as IEEE 802.15.1 and BLE.

Technique 900 includes an operation 904 of storing the credential in a cache of a memory. The PACS may cache the credentials in a memory (e.g., the memory of the reader) for future authentication when the user intends to enter the asset. The intent threshold of the authentication credential may be below an intent threshold to unlock access to the asset. For example, as the user moves toward the doorway, the PACS may determine that the user intends to enter the doorway is 60% and send the credentials to the authentication service. As the user continues towards the doorway, the probability may change to 90%, and the reader then sends a command to unlock the doorway.

Technique 900 includes an operation 906 of establishing a second wireless connection with the key device. The second wireless connection may be UWB. The PACS may identify the location of the key device or the range of the key device to the reader or readers using communication techniques such as UWB.

Technique 900 includes an operation 908 of requesting verification of credentials from an authorization service in response to establishing a second wireless connection with the key device. The authorization service may be local to the reader, for example in the home. An authorization service may be connected to the reader over a network or the internet to provide credential authorization to multiple locations or entry points. The authorization service may be integrated into the reader.

The technique 900 includes an operation 910 of receiving an authentication token from an authorization service. The authentication token may be used to send to an authorization service or an access control service to indicate that the provisioned credentials have been authenticated. Technique 900 includes an operation 912 of storing the authentication token in a cache.

Technique 900 may also include the operation of determining, using the second wireless connection, that the key device is within a first range radius of a plurality of range radii, wherein the plurality of range radii extend from the wireless key device reader. The PACS may identify a range of distances from the reader. For example, a PACS may specify three ranges, the first within a five foot radius of the reader, the second within a five foot to ten foot radius of the reader, and the third within a ten foot to fifteen foot radius of the reader.

The technique 900 may also include the operation of determining, using the second wireless connection, that the key device is within a second range radius of the plurality of range radii, wherein the second range radius is closer to the wireless key device reader than the first range radius. According to the previous three range example, the PACS may use UWB to determine that the key device is initially within the third range and has moved into the second range.

The technique 900 may also include an operation of calculating a probability that the user intends to physically access the asset based on determining that the wireless key device is within the second range radius. According to the previous example, the key device has moved from a farther distance range to a closer distance range, thereby increasing the probability that the user moves towards the reader.

The technique 900 may also include the operation of determining that the probability exceeds a predetermined threshold. The technique 900 may also include the operation of sending the authentication token to the access control service. Based on the probability of exceeding the threshold, the PACS may send a verification token to the access control service to indicate that the asset should be unlocked. The technique 900 may also include an operation of receiving a command to grant access to the asset. Authorization services and access control services may be integrated into a PACS, may be networked to a PACS, or may be separate services to a PACS.

The technique 900 may also include the operation of determining, using the second wireless connection, that the key device is within a second range radius of the plurality of range radii, wherein the second range radius is farther from the wireless key device reader than the first range radius. According to the previous three range example, the PACS may use UWB to determine that the key device was initially within the second range, and has moved farther into the third range.

The technique 900 may also include operations to remove the authentication token and credentials from the cache. According to the previous example, the key device has moved from a closer distance range to a farther distance range, increasing the probability that the user does not intend to access the asset, and thus removing the stored information (e.g., credentials and authentication tokens) from the cache.

Technique 900 may also include an operation of determining that a response from the key device has not been received within a predetermined period of time. When the PACS sends a message, the PACS may start a timer. The timer may be cancelled when the PACS receives a response from the wireless key device. If the timer times out, based on the determined timeout time, the PACS may determine that the wireless key device is no longer within range and therefore that the probability of the user intending to access the asset is very low. The technique 900 may also include operations to remove the authentication token and credentials from the cache based on their no longer being needed.

FIG. 10 illustrates a flow diagram showing a technique 1000 for managing access to assets, according to some embodiments. Technique 1000 includes an operation 1002 for receiving credentials of a user from a key device associated with the user using a first wireless connection. The first wireless connection may be NFC, such as RFID technology or PAN technology, such as IEEE 802.15.1 and BLE.

The technique 1000 includes an operation 1004 of establishing a second wireless connection with the key device. The second wireless connection may be UWB. The PACS may identify the location of the key device or the range of the key device to the reader or readers using communication techniques such as UWB.

The technique 1000 includes an operation 1006 of determining that the user intends to access the asset based on the generated dataset derived from the second wireless connection. The PACS may determine the location information from the second wireless connection using UWB. The second wireless connection may include information from the key device, such as sensor data from a sensor of the key device. The data set may include both data provided from the key device and derived from the second wireless connection that may be used to determine the user's intent.

In determining that the user intends to access the asset, the technique 1000 may include an operation of determining a probability that the user intends to access the asset using the dataset and the trained machine learning model. The trained machine learning model is trained using data sets collected from a plurality of users. The data set may include movement data for a plurality of users within the asset. The data set may include movement data from a plurality of users. The information received from the wireless key device may include movement data of the user collected from an accelerometer of the wireless key device.

For example, for a particular asset or security entry point, the location data and movement data of how different people approach the security entry point when entering the security entry point and move towards the security entry point and data when people do not enter the security entry point may be used to train the machine learning model. The training may provide a machine learning model to identify the angles of how people are likely to move and how they approach when their intent is to enter a safe entry point. The data set may include a time stamp of the time of day and the data set of the user may be time stamped. The inclusion of time in the training of the machine learning model may indicate different patterns and actions based on the time of day. For example, people may not be likely to access the secure entry point at lunch time.

The determination that the user intends to access the asset may include using data received from a calendar system. The technique 1000 may also include an operation of identifying an event associated with an asset in a calendar system. For example, the calendar system may indicate that a meeting is in progress in a room attached to the security entry point. The technique 1000 may also include an operation of identifying an indication that the user is present at the event. The calendar system may provide a list of attendees for the meeting and the PACS may identify that the user is one of these attendees, which may increase the probability that the user intends to enter a secure entry point. The technique 1000 includes an operation 1008 of sending a command to grant access to the asset.

Fig. 11 illustrates a block diagram of an example machine 1100 on which any one or more of the techniques (e.g., methods) discussed herein may be performed. In alternative embodiments, the machine 1100 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 1100 may operate in the capacity of a server machine, a client machine, or both, in server-client network environments. In an example, the machine 1100 may operate as a peer machine in a peer-to-peer (P2P) (or other distributed) network environment. The machine 1100 may be a Personal Computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a mobile telephone, a web application, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term "machine" can also be considered to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), or other computer cluster configurations.

As described herein, an example may include or be operated by logic or multiple components or mechanisms. A circuit group is a collection of circuits implemented in a tangible entity that includes hardware (e.g., simple circuits, gates, logic, etc.). Circuit group membership can be flexible over time and underlying hardware variability. The circuit group includes members that can perform specified operations individually or in combination at the time of operation. In an example, the hardware of the circuit group may be designed to perform specified operations (e.g., hardwired) unchanged. In an example, the hardware of the circuit group may include variably connected physical components (e.g., execution units, transistors, simple circuits, etc.) to encode instructions specifying an operation, the variably connected physical components including a computer readable medium that is physically modified (e.g., magnetically, electrically, movably placement of invariant mass particles, etc.). When connecting physical components, the underlying electrical properties of the hardware assembly are changed, for example, from an insulator to a conductor or from a conductor to an insulator. The instructions enable embedded hardware (e.g., an execution unit or a loading mechanism) to create members of a circuit group in the hardware via a variable connection to perform portions of specified operations when operating. Thus, when the device is in operation, the computer readable medium is communicatively coupled to other components of the circuit group member. In an example, any of the physical components may be used in more than one member of more than one circuit group. For example, in operation, the execution unit may be used in a first circuit of a first circuit group at one point in time and reused by a second circuit of the first circuit group or by a third circuit of the second circuit group at a different time.

The machine (e.g., computer system) 1100 may include a hardware processor 1102 (e.g., a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a hardware processor core, a Field Programmable Gate Array (FPGA), or any combination thereof), a main memory 1104 and a static memory 1106, some or all of which may communicate with each other via an interconnect (e.g., bus) 1108. The machine 1100 may also include a display unit 1110, an alphanumeric input device 1112 (e.g., a keyboard), and a User Interface (UI) navigation device 1114 (e.g., a mouse). In an example, the display unit 1110, the input device 1112, and the UI navigation device 1114 may be touch screen displays. The machine 1100 may additionally include a storage device (e.g., drive unit) 1116, a signal generation device 1118 (e.g., a speaker), a network interface device 1120, and one or more sensors 1121 such as a Global Positioning System (GPS) sensor, compass, accelerometer, or other sensor. The machine 1100 may include an output controller 1128 such as a serial (e.g., Universal Serial Bus (USB), parallel, or other wired or wireless (e.g., Infrared (IR), Near Field Communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).

The storage device 1116 may be a machine-readable medium 1122 having stored thereon one or more sets of data structures or instructions 1124 (e.g., software) embodying or used by any one or more of the techniques or functions described herein. The instructions 1124 may also reside, completely or at least partially, within the main memory 1104, within static memory 1106, or within the hardware processor 1102 during execution thereof by the machine 1100. In an example, one or any combination of the hardware processor 1102, the main memory 1104, the static memory 1106, or the storage device 1116 may constitute machine-readable media.

While the machine-readable medium 1122 is shown to be a single medium, the term "machine-readable medium" can include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) configured to store the one or more instructions 1124.

The term "machine-readable medium" may include any medium that is capable of storing, encoding or carrying instructions for execution by the machine 1100 and that cause the machine 1100 to perform any one or more of the techniques of this disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions. Non-limiting examples of machine-readable media may include solid-state memory and optical and magnetic media. In an example, a high capacity machine readable medium includes a machine readable medium having a plurality of particles with an invariant (e.g., static) mass. Thus, the mass machine-readable medium is not a transitory propagating signal. Specific examples of the mass machine-readable medium may include: non-volatile memories such as semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.

The instructions 1124 may also be transmitted or received over the communication network 1126 via the network interface device 1120 using a transmission medium using any one of a number of transmission protocols (e.g., frame relay, Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), hypertext transfer protocol (HTTP), etc.). Example communication networks may include a Local Area Network (LAN), a Wide Area Network (WAN), a packet data network (e.g., the internet), a mobile telephone network (e.g., a cellular network), a Plain Old Telephone (POTS) network, and a wireless data network (e.g., referred to as a "wireless data network")Of the Institute of Electrical and Electronics Engineers (IEEE)802.11 family of standards, referred to asIEEE 802.16 family of standards), IEEE 802.15.4 family of standards, peer-to-peer (P2P) networks, and the like. In an example, the network interface device 1120 may include one or more physical jacks (e.g., ethernet, coaxial, or telephone jacks) or one or more antennas for connecting to the communication network 1126. In an example, the network interface device 1120 may include multiple antennas to use Single Input Multiple Output (SIMO) techniquesA multiple-input multiple-output (MIMO) technology, or a multiple-input single-output (MISO) technology. The term "transmission medium" shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 1100, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.

The foregoing detailed description includes references to the accompanying drawings, which form a part hereof. The drawings show, by way of illustration, specific embodiments that can be practiced. These embodiments are also referred to herein as "examples. Such examples may include elements other than those shown or described. However, the inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the inventors also contemplate examples using any combination or permutation of these elements (or one or more aspects of these elements) shown or described with respect to a particular example (or one or more aspects of a particular example) or with respect to other examples (or one or more aspects of other examples) shown or described herein.

All publications, patents, and patent documents mentioned in this document are incorporated by reference herein in their entirety, as if individually incorporated by reference. Usage in the incorporated reference document(s) should be considered supplementary to usage in this document if there is inconsistent usage between this document and those incorporated by reference; for inconsistent inconsistencies, please refer to the usage in this document.

In this document, the terms "a" or "an" are used to include one or more than one, regardless of any other instances or uses of "at least one" or "one or more," as is common in patent documents. In this document, unless otherwise specified, the term "or" is used to denote a non-exclusive or, such that "a or B" includes "a instead of B", "B instead of a", and "a and B". In the appended claims, the terms "including" and "in which" are used as the plain-English equivalents of the respective terms "comprising" and "in which". Furthermore, in the following claims, the terms "comprising" and "including" are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed in a claim after such term is still considered to be within the scope of that claim. Furthermore, in the following claims, the terms "first," "second," and "third," etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.

The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects of the above-described examples) may be used in combination with each other. Other embodiments may be used, for example, by one of ordinary skill in the art upon reviewing the above description. The Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. Furthermore, in the foregoing detailed description, various features may be grouped together to simplify the present disclosure. This should not be construed as an intention that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus the following claims are hereby incorporated into the detailed description, with each claim standing on its own as a separate embodiment. The scope of the present embodiments should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

33页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:新无线电(NR)定位中的NR下行链路(DL)定位参考信号(PRS)设计资源分配和映射

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类