WO2021014051A1 - An access system and a method and an apparatus for access control - Google Patents

An access system and a method and an apparatus for access control Download PDF

Info

Publication number
WO2021014051A1
WO2021014051A1 PCT/FI2020/050049 FI2020050049W WO2021014051A1 WO 2021014051 A1 WO2021014051 A1 WO 2021014051A1 FI 2020050049 W FI2020050049 W FI 2020050049W WO 2021014051 A1 WO2021014051 A1 WO 2021014051A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
entry point
access
access via
user entry
Prior art date
Application number
PCT/FI2020/050049
Other languages
French (fr)
Inventor
Visa Rauta
Santeri Suoranta
Harri LÄNSIÖ
Sampo MÄKILAURILA
Matti UNELIUS
Original Assignee
Kone Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kone Corporation filed Critical Kone Corporation
Publication of WO2021014051A1 publication Critical patent/WO2021014051A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Definitions

  • a turnstile, a security barrier or an access gate may use a curtain of light type of sensors that detect a person.
  • User identification for access requires interaction at the entry point. A user is granted an access at the entry point only when the user has been identified. All this takes time and these actions have to be performed separately for each user at the entry point. Further, user behaviors at the entry point differ from each other, and some users act quicker than others. A significant number of users fail to operate in a timely manner at the entry point and this slows down the throughput of the entry point.
  • An example embodiment of an access system comprises a controller, a user entry point being by default at a state allowing an unrestricted access via the user entry point, user access restriction means at the user entry point, and at least one user identification means enabling user identification at a distance away from the user entry point, associated with the user entry point and connected to the controller.
  • the controller is configured to receive identification data from the at least one user identification means; determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point, an identified user without an access via the user entry point, or an unidentified user; maintain the user entry point for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and control the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • the controller is configured to control the user access restriction means to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point, when the identification data relates to the identified user without the access via the user entry point.
  • the controller is configured to control the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • the controller is configured to control the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • the at least one user identification means comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means.
  • the user access restriction means comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means .
  • An example embodiment of a people transport system comprises the access system discussed above.
  • the people transport system comprises an elevator system
  • the user entry point comprises an elevator door
  • An example embodiment of a method for access control comprises receiving identification data from at least one user identification means; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point, an identified user without an access via the user entry point, or an unidentified user; maintaining a user entry point, the user entry point being by default at a state allowing an unrestricted access via the user entry point, for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and controlling the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • controlling comprising controlling the user access restriction means to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point, when the identification data relates to the identified user without the access via the user entry point.
  • controlling comprising controlling the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • the at least one user identification means comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means.
  • the user access restriction means comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means .
  • An example embodiment of an apparatus for access control comprises at least one processor and at least one memory including computer program code.
  • the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least perform: receiving identification data from at least one user identification means; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point, an identified user without an access via the user entry point, or an unidentified user; maintaining a user entry point, the user entry point being by default at a state allowing an unrestricted access via the user entry point, for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and controlling the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
  • An example embodiment of a computer program comprising instructions which, when the program is executed by a computer, cause the computer to carry out the above method .
  • An example embodiment of a computer-readable medium comprising instructions which, when the program is executed by a computer, cause the computer to carry out the above method.
  • FIG. 1 illustrates a flow chart of a method for access control according to an example embodiment.
  • FIG. 2 illustrates an access system according to an example embodiment.
  • FIG. 3 illustrates an apparatus according to an example embodiment .
  • FIG. 1 illustrates a flow chart of a method for access control according to an example embodiment.
  • the illustrated method may be applied, for example, in any environment where a major part of users can be identified, for example, in an office building environment .
  • identification data is received from at least one user identification means.
  • the identification data may refer to any data provided by the user identification means, for example, to identification data obtained from a user by the user identification means, to identification data obtained about the user by the user identification means etc.
  • the user identification means may refer, for example, to at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means or to any other type of user identification.
  • it is determined, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user.
  • the prestored data may be stored, for example, in a local database, and the identification data may be compared to the prestored data in order to find a possible match from the prestored data.
  • the prestored data may be stored by a cloud service accessible via a network connection.
  • the prestored data may further comprise access data relating to the identified users having the access via the user entry point 202 in order to determine the identified users with the access via the user entry point 202 and the identified users without the access via the user entry point 202.
  • a user entry point for the identified user with the access via the user entry point 202 is maintained at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202.
  • the user access restriction means are controlled to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • the user access restriction means may provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, and/or a physical access restriction at the user entry point, when the identification data relates to the unidentified user.
  • the user access restriction means may provide at least one of a visual and audible alert for the identified user without the access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202, and/or a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202.
  • FIG. 2 illustrates an access system 212 according to an example embodiment.
  • the access system 212 comprises a controller 200, a user entry point 202, user access restriction means 204 at the user entry point and at least one user identification means 206.
  • the user entry point 202 may refer to any point of access through which a user has to travel and in which user access may be restricted depending on whether the user is identified or not and whether the identified user has access via the user entry point 202 or not.
  • the user access restriction means 204 may refer to any means for providing a visual and/or audible alert for an identified user without an access via the user entry point 202 or an unidentified user. Additionally or alternatively, the user access restriction means 204 may provide a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • the turnstile may be closed when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • the user access restriction means 204 may comprise at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means.
  • the at least one user identification means 206 may comprise at least one of biometric identification means, optical identification means (for example, at least one camera) , radio frequency based identification means, and magnetic identification means or any other type of user identification means.
  • the user entry point 202 is by default at a state allowing an unrestricted access via the user entry point 202.
  • the user entry point 202 is maintained at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202.
  • the user identification means 206 enable user identification at a first distance 210 away from the user entry point 202.
  • the user identification means 206 may be arranged at the user entry point 202 or close to the user entry point 202
  • the user identification means 206 may be arranged at a second distance away from the user entry point 202, for example, 1 - 5 meters or 1 - 10 meters before the user entry point 202.
  • the first distance may be, for example, 0- -10 meters from the user entry point 202, and preferably 1 - 2 meters, 1 - 3 meters or 1 - 5 meters.
  • the user identification means 206 may refer to a single identification means or to a combination of several separate identification means.
  • a user may be identified using a radio frequency based identification, for example, Bluetooth, radio frequency identification (RFID) or near field communication (NFC) .
  • the user may be identified using both the radio frequency based identification and facial recognition provided by optical identification means, for example, a digital camera. It is evident that these identification types are only examples, and other identification solutions and technologies may be used alternatively or additionally .
  • the user identification means 206 obtain user identification data about the user. The user identification data may be obtained from the user 208, for example, via a radio frequency based identification solution. Alternatively or additionally, the user identification data may be obtained about the user 208, for example, via a biometric or optical identification solution .
  • the user identification means 206 are connected to the controller 200, and the controller 200 is configured to receive the user identification data from the user identification means 206. After receiving the user identification data, the controller 200 is configured to determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user.
  • the prestored data may be stored in a memory or database connected to the controller 200, or in a cloud service accessible via a network connection. As an example, if the user entry point 202 is arranged in an office building, identification data relating to people regularly working in the building may have been prestored in the memory or database.
  • the prestored data may further comprise access data relating to the identified users having the access via the user entry point 202 in order to determine the identified users with the access via the user entry point 202 and the identified users without the access via the user entry point 202.
  • the controller 200 is configured to maintain the user entry point 202 for the identified user with the access via the user entry point 202 at the state allowing the unrestricted access via the user entry point 202.
  • the controller 200 is configured to control the user access restriction means 204 to restrict access via the user entry point 202.
  • the controller 200 may be configured to control the user access restriction means 204 to provide at least one of a visual and audible alert for the unidentified user.
  • the controller 200 may be configured to control the user access restriction means 204 to provide at least one of a visual and audible alert for the identified user without the access via the user entry point 202.
  • the user access restriction means 204 may refer, for example, to a blinking red light (s), a light projection on a floor etc.
  • the user access restriction means 204 may provide a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • the physical access restriction may refer, for example, to a closing gate, a closing door, a security barrier rising from a floor etc.
  • the user access restriction means 204 may be integrated with the user entry point 202.
  • the gate may be kept open by default, and only when the controller 200 acknowledges an identified user without an access via the user entry point 202 or an unidentified user, the gate may be closed for the identified user without the access via the user entry point 202 or the unidentified user, respectively.
  • the solution illustrated in FIG. 2 enables a solution in which the user access restrictions means 204 may restrict user access fast and well ahead if an unknown person is detected. For example, this may mean that only 5% of all users, typically visitors, courier service, etc. encounter a restricted access.
  • the user entry point may ask for a visitor card or other identification to enable access or simply command a visitor to register in first.
  • the access system 212 illustrated in FIG. 2 may be integrated with a people transport system, for example, an escalator, an elevator etc.
  • a people transport system for example, an escalator, an elevator etc.
  • the user entry point 202 would be located in immediate vicinity of a starting point of the escalator.
  • FIG. 2 illustrates that the user identification means 206 may be arranged at a predetermined distance 210 away from the user entry point 202.
  • the access system 212 may comprise a secondary user identification means at a secondary point to identify a specific unidentified user that has arrived at the user entry point 202 or is close to the user entry point 202.
  • the secondary user identification means may be arranged at the user entry point 202 or close to the user entry point. This enables a solution in which the access system is aware of the location of a specific unidentified user and can restrict access for this user.
  • the user identification at the secondary point may be performed, for example, using facial recognition, biometric identification means or any other appropriate technique.
  • the access system 212 may be used in connection with an elevator system.
  • the user access point 202 may comprise a door or doors of an elevator.
  • the access system 212 identifies that a user is an identified user with the access via the user entry point 202, the user is allowed to enter an elevator car via the elevator door when the user has made an elevator call.
  • FIG. 3 illustrates a block diagram of an apparatus 200 according to an example embodiment.
  • the apparatus 200 comprises one or more processors 300, and one or more memories 302 that comprise computer program code.
  • the apparatus 200 may also include an input/output module (not shown in FIG. 3), and/or a communication interface (not shown in FIG. 3) .
  • the apparatus 200 is depicted to include only one processor 300, the apparatus 200 may include more than one processor.
  • the memory 302 is capable of storing instructions, such as an operating system and/or various applications.
  • the processor 300 is capable of executing the stored instructions.
  • the processor 300 may be embodied as a multi-core processor, a single core processor, or a combination of one or more multi-core processors and one or more single core processors.
  • the processor 300 may be embodied as one or more of various processing devices, such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP) , a processing circuitry with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , a microcontroller unit (MCU) , a hardware accelerator, a special-purpose computer chip, or the like.
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • MCU microcontroller unit
  • the processor 300 may be configured to execute hard-coded functionality.
  • the processor 300 is embodied as an executor of software instructions, wherein the instructions may specifically configure the processor 300 to perform the algorithms and/or operations described herein when the instructions are executed.
  • the memory 302 may be embodied as one or more volatile memory devices, one or more non-volatile memory devices, and/or a combination of one or more volatile memory devices and non-volatile memory devices.
  • the memory 508 may be embodied as semiconductor memories (such as mask ROM, PROM (programmable ROM) , EPROM (erasable PROM) , flash ROM, RAM (random access memory) , etc . ) .
  • the apparatus 200 may be a control entity configured to implement only the earlier discussed features in the example embodiments, or it may be part of a larger control entity.
  • the at least one memory 302 may store program instructions that, when executed by the at least one processor 300, cause the apparatus 200 to perform at least: receiving identification data from at least one user identification means 206; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user; maintaining a user entry point 202 for the identified user with the access via the user entry point 202, the user entry point 202 being by default at a state allowing an unrestricted access via the user entry point 202, at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202; and controlling the user access restriction means 204 to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • At least one of the processor 300 and the memory 302 may constitute means for receiving identification data from at least one user identification means 206; means for determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user; means for maintaining a user entry point 202 for the identified user with the access via the user entry point 202, the user entry point 202 being by default at a state allowing an unrestricted access via the user entry point 202, at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202; and means for controlling the user access restriction means 204 to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
  • One or more of the above illustrated examples and example embodiments illustrated, for example, in relation to FIGS. 1 - 3 may provide one or more of the following advantages and/or effects.
  • the illustrated solution may save time that is used to open and close door blades at the user entry point.
  • a curtain of light based gate and passage solutions allows only one person to enter at time. In the illustrated solution, there is no need to wait for a turn to enter.
  • the illustrated solution may also enable a dramatically longer lifetime and service interval for the user access restriction means, for example, door blades. Further, doors can be kept always open for all known people that have an access via the user entry point, for example, in an office building. This saves time, and may encourage people to move faster. Further, the walking speed of users does not slow down at the user entry point. Further, the illustrated solution may allow well working and intuitive use of an electronic gate that has no blades. The gate may blink red, make a light projection on floor, provide sound or another alert well before user is entering the gate.
  • Example embodiments may be implemented in software, hardware, application logic or a combination of software, hardware and application logic.
  • the example embodiments can store information relating to various methods described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like.
  • One or more databases can store the information used to implement the example embodiments.
  • the databases can be organized using data structures (e.g., records, tables, arrays, fields, graphs, trees, lists, and the like) included in one or more memories or storage devices listed herein.
  • the methods described with respect to the example embodiments can include appropriate data structures for storing data collected and/or generated by the methods of the devices and subsystems of the example embodiments in one or more databases.
  • the components of the example embodiments may include computer readable medium or memories for holding instructions programmed according to the teachings and for holding data structures, tables, records, and/or other data described herein.
  • the application logic, software or an instruction set is maintained on any one of various conventional computer-readable media.
  • a "computer-readable medium" may be any media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer.
  • a computer- readable medium may include a computer-readable storage medium that may be any media or means that can contain or store the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer.
  • a computer readable medium can include any suitable medium that participates in providing instructions to a processor for execution. Such a medium can take many forms, including but not limited to, non-volatile media, volatile media, transmission media, and the like.

Abstract

According to an example embodiment, there is provided an access system comprising a controller (200); a user entry point (202) being by default at a state allowing an unrestricted access via the user entry point; (202) user access restriction means (204) at the user entry point; and at least one user identification means (206) enabling user identification at a distance away from the user entry point. The controller (202) is configured to receive identification data from the at least one user identification means (206); determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point (202), an identified user without an access via the user entry point (202), or an unidentified user; maintain the user entry point for the identified user with the access via the user entry point (202) at the state allowing the unrestricted access via the user entry point (202), when the identification data relates to the identified user with the access via the user entry point (202); and control the user access restriction means (204) to restrict access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.

Description

AN ACCESS SYSTEM AND A METHOD AND AN APPARATUS FOR ACCESS CONTROL
BACKGROUND
In various user access or entry points, a turnstile, a security barrier or an access gate may use a curtain of light type of sensors that detect a person. User identification for access requires interaction at the entry point. A user is granted an access at the entry point only when the user has been identified. All this takes time and these actions have to be performed separately for each user at the entry point. Further, user behaviors at the entry point differ from each other, and some users act quicker than others. A significant number of users fail to operate in a timely manner at the entry point and this slows down the throughput of the entry point.
Thus, it would be beneficial to have a solution that would alleviate at least one of these drawbacks.
SUMMARY
An example embodiment of an access system comprises a controller, a user entry point being by default at a state allowing an unrestricted access via the user entry point, user access restriction means at the user entry point, and at least one user identification means enabling user identification at a distance away from the user entry point, associated with the user entry point and connected to the controller. The controller is configured to receive identification data from the at least one user identification means; determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point, an identified user without an access via the user entry point, or an unidentified user; maintain the user entry point for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and control the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
In an example embodiment, the controller is configured to control the user access restriction means to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point, when the identification data relates to the identified user without the access via the user entry point.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the controller is configured to control the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the controller is configured to control the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user. In an example embodiment, alternatively or in addition to the above-described example embodiments, the at least one user identification means comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the user access restriction means comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means .
An example embodiment of a people transport system comprises the access system discussed above.
In an example embodiment, the people transport system comprises an elevator system, and wherein the user entry point comprises an elevator door.
An example embodiment of a method for access control comprises receiving identification data from at least one user identification means; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point, an identified user without an access via the user entry point, or an unidentified user; maintaining a user entry point, the user entry point being by default at a state allowing an unrestricted access via the user entry point, for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and controlling the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
In an example embodiment, the controlling comprising controlling the user access restriction means to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point, when the identification data relates to the identified user without the access via the user entry point.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the controlling comprising controlling the user access restriction means to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the at least one user identification means comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means.
In an example embodiment, alternatively or in addition to the above-described example embodiments, the user access restriction means comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means . An example embodiment of an apparatus for access control comprises at least one processor and at least one memory including computer program code. The at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least perform: receiving identification data from at least one user identification means; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point, an identified user without an access via the user entry point, or an unidentified user; maintaining a user entry point, the user entry point being by default at a state allowing an unrestricted access via the user entry point, for the identified user with the access via the user entry point at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point; and controlling the user access restriction means to restrict access via the user entry point, when the identification data relates to the identified user without the access via the user entry point or the unidentified user.
An example embodiment of a computer program comprising instructions which, when the program is executed by a computer, cause the computer to carry out the above method .
An example embodiment of a computer-readable medium comprising instructions which, when the program is executed by a computer, cause the computer to carry out the above method.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are included to provide a further understanding of the invention and constitute a part of this specification, illustrate embodiments of the invention and together with the description help to explain the principles of the invention. In the drawings :
FIG. 1 illustrates a flow chart of a method for access control according to an example embodiment.
FIG. 2 illustrates an access system according to an example embodiment.
FIG. 3 illustrates an apparatus according to an example embodiment .
DETAILED DESCRIPTION
FIG. 1 illustrates a flow chart of a method for access control according to an example embodiment. The illustrated method may be applied, for example, in any environment where a major part of users can be identified, for example, in an office building environment .
At 100, identification data is received from at least one user identification means. The identification data may refer to any data provided by the user identification means, for example, to identification data obtained from a user by the user identification means, to identification data obtained about the user by the user identification means etc. The user identification means may refer, for example, to at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means or to any other type of user identification. At 102, it is determined, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user. The prestored data may be stored, for example, in a local database, and the identification data may be compared to the prestored data in order to find a possible match from the prestored data. In another example embodiment, the prestored data may be stored by a cloud service accessible via a network connection. The prestored data may further comprise access data relating to the identified users having the access via the user entry point 202 in order to determine the identified users with the access via the user entry point 202 and the identified users without the access via the user entry point 202.
At 104, a user entry point for the identified user with the access via the user entry point 202, the user entry point being by default at a state allowing an unrestricted access via the user entry point 202, is maintained at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202.
At 106, the user access restriction means are controlled to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user. The user access restriction means may provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, and/or a physical access restriction at the user entry point, when the identification data relates to the unidentified user. Alternatively, the user access restriction means may provide at least one of a visual and audible alert for the identified user without the access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202, and/or a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202.
FIG. 2 illustrates an access system 212 according to an example embodiment. The access system 212 comprises a controller 200, a user entry point 202, user access restriction means 204 at the user entry point and at least one user identification means 206.
The user entry point 202 may refer to any point of access through which a user has to travel and in which user access may be restricted depending on whether the user is identified or not and whether the identified user has access via the user entry point 202 or not. The user access restriction means 204 may refer to any means for providing a visual and/or audible alert for an identified user without an access via the user entry point 202 or an unidentified user. Additionally or alternatively, the user access restriction means 204 may provide a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user. For example, if the user entry point 202 involves a turnstile, the turnstile may be closed when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user. In an example embodiment, the user access restriction means 204 may comprise at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means. Further, in an example embodiment, the at least one user identification means 206 may comprise at least one of biometric identification means, optical identification means (for example, at least one camera) , radio frequency based identification means, and magnetic identification means or any other type of user identification means.
In existing solutions, when an entry via a user entry point presumes successful user identification, the user entry point is in a closed state (for example, user access is physically prevented using e.g. a gate) . Only after a successful user identification, the gate is opened and the user is able to go through the user entry point. This means that the user identification procedure is performed only at the gate.
In the example embodiment illustrated in FIG. 2, the user entry point 202 is by default at a state allowing an unrestricted access via the user entry point 202. In other words, the user entry point 202 is maintained at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202.
The user identification means 206 enable user identification at a first distance 210 away from the user entry point 202. In one embodiment, the user identification means 206 may be arranged at the user entry point 202 or close to the user entry point 202 In another embodiment, the user identification means 206 may be arranged at a second distance away from the user entry point 202, for example, 1 - 5 meters or 1 - 10 meters before the user entry point 202. The first distance may be, for example, 0- -10 meters from the user entry point 202, and preferably 1 - 2 meters, 1 - 3 meters or 1 - 5 meters. The user identification means 206 may refer to a single identification means or to a combination of several separate identification means. In one example embodiment, a user may be identified using a radio frequency based identification, for example, Bluetooth, radio frequency identification (RFID) or near field communication (NFC) . In another example embodiment, the user may be identified using both the radio frequency based identification and facial recognition provided by optical identification means, for example, a digital camera. It is evident that these identification types are only examples, and other identification solutions and technologies may be used alternatively or additionally . When the user 208 reaches the user identification means 206, the user identification means 206 obtain user identification data about the user. The user identification data may be obtained from the user 208, for example, via a radio frequency based identification solution. Alternatively or additionally, the user identification data may be obtained about the user 208, for example, via a biometric or optical identification solution . The user identification means 206 are connected to the controller 200, and the controller 200 is configured to receive the user identification data from the user identification means 206. After receiving the user identification data, the controller 200 is configured to determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user. The prestored data may be stored in a memory or database connected to the controller 200, or in a cloud service accessible via a network connection. As an example, if the user entry point 202 is arranged in an office building, identification data relating to people regularly working in the building may have been prestored in the memory or database. The prestored data may further comprise access data relating to the identified users having the access via the user entry point 202 in order to determine the identified users with the access via the user entry point 202 and the identified users without the access via the user entry point 202. When the identification data relates to the identified user with the access via the user entry point 202, the controller 200 is configured to maintain the user entry point 202 for the identified user with the access via the user entry point 202 at the state allowing the unrestricted access via the user entry point 202. Further, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user, the controller 200 is configured to control the user access restriction means 204 to restrict access via the user entry point 202.
If the controller 200 determines that the user identification data relates to an unidentified user, the controller 200 may be configured to control the user access restriction means 204 to provide at least one of a visual and audible alert for the unidentified user. Alternatively, if the controller 200 determines that the user identification data relates to an identified user without an access via the user entry point 202, the controller 200 may be configured to control the user access restriction means 204 to provide at least one of a visual and audible alert for the identified user without the access via the user entry point 202. As an example, if the user entry point 202 comprises a gate, the user access restriction means 204 may refer, for example, to a blinking red light (s), a light projection on a floor etc. In another example embodiment, additionally or alternatively, the user access restriction means 204 may provide a physical access restriction at the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user. The physical access restriction may refer, for example, to a closing gate, a closing door, a security barrier rising from a floor etc.
In an example embodiment, the user access restriction means 204 may be integrated with the user entry point 202. For example, if the user access point 202 comprises a gate, the gate may be kept open by default, and only when the controller 200 acknowledges an identified user without an access via the user entry point 202 or an unidentified user, the gate may be closed for the identified user without the access via the user entry point 202 or the unidentified user, respectively.
The solution illustrated in FIG. 2 enables a solution in which the user access restrictions means 204 may restrict user access fast and well ahead if an unknown person is detected. For example, this may mean that only 5% of all users, typically visitors, courier service, etc. encounter a restricted access. The user entry point may ask for a visitor card or other identification to enable access or simply command a visitor to register in first.
The access system 212 illustrated in FIG. 2 may be integrated with a people transport system, for example, an escalator, an elevator etc. In other words, the user entry point 202 would be located in immediate vicinity of a starting point of the escalator.
FIG. 2 illustrates that the user identification means 206 may be arranged at a predetermined distance 210 away from the user entry point 202. This in practice may mean that a user may have already been identified (or classified as an unidentified user) before the user reaches the user entry point 202. In an example embodiment, the access system 212 may comprise a secondary user identification means at a secondary point to identify a specific unidentified user that has arrived at the user entry point 202 or is close to the user entry point 202. The secondary user identification means may be arranged at the user entry point 202 or close to the user entry point. This enables a solution in which the access system is aware of the location of a specific unidentified user and can restrict access for this user. The user identification at the secondary point may be performed, for example, using facial recognition, biometric identification means or any other appropriate technique.
In an example embodiment, the access system 212 may be used in connection with an elevator system. In this example, the user access point 202 may comprise a door or doors of an elevator. When the access system 212 identifies that a user is an identified user with the access via the user entry point 202, the user is allowed to enter an elevator car via the elevator door when the user has made an elevator call.
FIG. 3 illustrates a block diagram of an apparatus 200 according to an example embodiment. The apparatus 200 comprises one or more processors 300, and one or more memories 302 that comprise computer program code. The apparatus 200 may also include an input/output module (not shown in FIG. 3), and/or a communication interface (not shown in FIG. 3) . Although the apparatus 200 is depicted to include only one processor 300, the apparatus 200 may include more than one processor. In an example embodiment, the memory 302 is capable of storing instructions, such as an operating system and/or various applications.
Furthermore, the processor 300 is capable of executing the stored instructions. In an example embodiment, the processor 300 may be embodied as a multi-core processor, a single core processor, or a combination of one or more multi-core processors and one or more single core processors. For example, the processor 300 may be embodied as one or more of various processing devices, such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP) , a processing circuitry with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , a microcontroller unit (MCU) , a hardware accelerator, a special-purpose computer chip, or the like. In an example embodiment, the processor 300 may be configured to execute hard-coded functionality. In an example embodiment, the processor 300 is embodied as an executor of software instructions, wherein the instructions may specifically configure the processor 300 to perform the algorithms and/or operations described herein when the instructions are executed.
The memory 302 may be embodied as one or more volatile memory devices, one or more non-volatile memory devices, and/or a combination of one or more volatile memory devices and non-volatile memory devices. For example, the memory 508 may be embodied as semiconductor memories (such as mask ROM, PROM (programmable ROM) , EPROM (erasable PROM) , flash ROM, RAM (random access memory) , etc . ) .
The apparatus 200 may be a control entity configured to implement only the earlier discussed features in the example embodiments, or it may be part of a larger control entity.
In an embodiment, the at least one memory 302 may store program instructions that, when executed by the at least one processor 300, cause the apparatus 200 to perform at least: receiving identification data from at least one user identification means 206; determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user; maintaining a user entry point 202 for the identified user with the access via the user entry point 202, the user entry point 202 being by default at a state allowing an unrestricted access via the user entry point 202, at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202; and controlling the user access restriction means 204 to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
Further, in an embodiment, at least one of the processor 300 and the memory 302 may constitute means for receiving identification data from at least one user identification means 206; means for determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point 202, an identified user without an access via the user entry point 202, or an unidentified user; means for maintaining a user entry point 202 for the identified user with the access via the user entry point 202, the user entry point 202 being by default at a state allowing an unrestricted access via the user entry point 202, at the state allowing the unrestricted access via the user entry point 202, when the identification data relates to the identified user with the access via the user entry point 202; and means for controlling the user access restriction means 204 to restrict access via the user entry point 202, when the identification data relates to the identified user without the access via the user entry point 202 or the unidentified user.
One or more of the above illustrated examples and example embodiments illustrated, for example, in relation to FIGS. 1 - 3 may provide one or more of the following advantages and/or effects.
The illustrated solution may save time that is used to open and close door blades at the user entry point. A curtain of light based gate and passage solutions allows only one person to enter at time. In the illustrated solution, there is no need to wait for a turn to enter. The illustrated solution may also enable a dramatically longer lifetime and service interval for the user access restriction means, for example, door blades. Further, doors can be kept always open for all known people that have an access via the user entry point, for example, in an office building. This saves time, and may encourage people to move faster. Further, the walking speed of users does not slow down at the user entry point. Further, the illustrated solution may allow well working and intuitive use of an electronic gate that has no blades. The gate may blink red, make a light projection on floor, provide sound or another alert well before user is entering the gate.
Example embodiments may be implemented in software, hardware, application logic or a combination of software, hardware and application logic. The example embodiments can store information relating to various methods described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like. One or more databases can store the information used to implement the example embodiments. The databases can be organized using data structures (e.g., records, tables, arrays, fields, graphs, trees, lists, and the like) included in one or more memories or storage devices listed herein. The methods described with respect to the example embodiments can include appropriate data structures for storing data collected and/or generated by the methods of the devices and subsystems of the example embodiments in one or more databases.
The components of the example embodiments may include computer readable medium or memories for holding instructions programmed according to the teachings and for holding data structures, tables, records, and/or other data described herein. In an example embodiment, the application logic, software or an instruction set is maintained on any one of various conventional computer-readable media. In the context of this document, a "computer-readable medium" may be any media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer. A computer- readable medium may include a computer-readable storage medium that may be any media or means that can contain or store the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer. A computer readable medium can include any suitable medium that participates in providing instructions to a processor for execution. Such a medium can take many forms, including but not limited to, non-volatile media, volatile media, transmission media, and the like.
While there have been shown and described and pointed out fundamental novel features as applied to preferred embodiments thereof, it will be understood that various omissions and substitutions and changes in the form and details of the devices and methods described may be made by those skilled in the art without departing from the spirit of the disclosure. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the disclosure. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiments may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. Furthermore, in the claims means-plus- function clauses are intended to cover the structures described herein as performing the recited function and not only structural equivalents, but also equivalent structures .
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole, in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that the disclosed aspects/embodiments may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the disclosure.

Claims

1. An access system comprising:
a controller (200);
a user entry point (202) being by default at a state allowing an unrestricted access via the user entry point ; (202)
user access restriction means (204) at the user entry point;
at least one user identification means (206) enabling user identification at a distance away from the user entry point, associated with the user entry point (204) and connected to the controller (202); and
wherein the controller (202) is configured to: receive identification data from the at least one user identification means (206);
determine, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via the user entry point (202), an identified user without an access via the user entry point (202), or an unidentified user;
maintain the user entry point for the identified user with the access via the user entry point (202) at the state allowing the unrestricted access via the user entry point (202), when the identification data relates to the identified user with the access via the user entry point (202); and
control the user access restriction means (204) to restrict access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.
2. The access system according to claim 1, wherein the controller (200) is configured to control the user access restriction means (204) to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) .
3. The access system according to claim 1 or 2, wherein the controller (200) is configured to control the user access restriction means (204) to provide a physical access restriction at the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.
4. The access system according to any of claims 1 - 3, wherein the at least one user identification means (206) comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means.
5. The access system according to any of claims 1 - 4, wherein the user access restriction means (204) comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means.
6. A people transport system comprising the access system according to any of claims 1 - 5.
7. A people transport system of claim 5, wherein the people transport system comprises an elevator system, and wherein the user entry point (202) comprises an elevator door.
8. A method for access control, the method comprising :
receiving identification data from at least one user identification means (206);
determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point (202), an identified user without an access via the user entry point (202), or an unidentified user;
maintaining a user entry point (202) for the identified user with the access via the user entry point (202), the user entry point (202) being by default at a state allowing an unrestricted access via the user entry point (202), at the state allowing the unrestricted access via the user entry point (202), when the identification data relates to the identified user with the access via the user entry point (202); and
controlling the user access restriction means (204) to restrict access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.
9. The method according to claim 8, the controlling comprising controlling the user access restriction means (204) to provide at least one of a visual and audible alert for the unidentified user, when the identification data relates to the unidentified user, or for the identified user without the access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) .
10. The method according to claim 8 or 9, the controlling comprising controlling the user access restriction means (204) to provide a physical access restriction at the user entry point, when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.
11. The method according to any of claims 8 - 10, wherein the at least one user identification means (206) comprises at least one of biometric identification means, optical identification means, radio frequency based identification means, and magnetic identification means .
12. The method according to any of claims 8 - 11, wherein the user access restriction means (204) comprises at least one of a door, a turnstile, an automatic building door, a door frame, an escalator entrance, a security barrier, an access gate, an electronic access gate, and alerting means.
13. An apparatus (200) for access control, the apparatus comprising:
at least one processor (300); and
at least one memory (302) including computer program code;
the at least one memory (302) and the computer program code configured to, with the at least one processor (302), cause the apparatus (200) to at least perform:
receiving identification data from at least one user identification means (206);
determining, based on the identification data and prestored data on users, whether the identification data relates to an identified user with an access via a user entry point (202), an identified user without an access via the user entry point (202), or an unidentified user;
maintaining a user entry point (202) for the identified user with the access via the user entry point (202), the user entry point (202) being by default at a state allowing an unrestricted access via the user entry point (202), at the state allowing the unrestricted access via the user entry point, when the identification data relates to the identified user with the access via the user entry point (202); and
controlling the user access restriction means (204) to restrict access via the user entry point (202), when the identification data relates to the identified user without the access via the user entry point (202) or the unidentified user.
14. A computer program comprising instructions which, when the program is executed by a computer, cause the computer to carry out the method of any of claims 8 - 12.
15. A computer-readable medium comprising instructions which, when the program is executed by a computer, cause the computer to carry out the method of any of claims 8 - 12.
PCT/FI2020/050049 2019-07-19 2020-01-29 An access system and a method and an apparatus for access control WO2021014051A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FIPCT/FI2019/050555 2019-07-19
PCT/FI2019/050555 WO2021014049A1 (en) 2019-07-19 2019-07-19 An access system and a method and an apparatus for access control

Publications (1)

Publication Number Publication Date
WO2021014051A1 true WO2021014051A1 (en) 2021-01-28

Family

ID=67470414

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/FI2019/050555 WO2021014049A1 (en) 2019-07-19 2019-07-19 An access system and a method and an apparatus for access control
PCT/FI2020/050049 WO2021014051A1 (en) 2019-07-19 2020-01-29 An access system and a method and an apparatus for access control

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/FI2019/050555 WO2021014049A1 (en) 2019-07-19 2019-07-19 An access system and a method and an apparatus for access control

Country Status (1)

Country Link
WO (2) WO2021014049A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150227923A1 (en) * 2014-02-12 2015-08-13 Mastercard International Incorporated Biometric solution enabling high throughput fare payments and system access
US20160284142A1 (en) * 2014-08-08 2016-09-29 Digicon S.A. Controle Eletrônico Para Mecânica System and Method of Control and Monitoring Access to a Restricted Area
WO2018188957A1 (en) * 2017-04-10 2018-10-18 Inventio Ag Visitor access control system with radio identification and facial recognition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150227923A1 (en) * 2014-02-12 2015-08-13 Mastercard International Incorporated Biometric solution enabling high throughput fare payments and system access
US20160284142A1 (en) * 2014-08-08 2016-09-29 Digicon S.A. Controle Eletrônico Para Mecânica System and Method of Control and Monitoring Access to a Restricted Area
WO2018188957A1 (en) * 2017-04-10 2018-10-18 Inventio Ag Visitor access control system with radio identification and facial recognition

Also Published As

Publication number Publication date
WO2021014049A1 (en) 2021-01-28

Similar Documents

Publication Publication Date Title
US10189677B2 (en) Elevator control system with facial recognition and authorized floor destination verification
CN101329781B (en) Access control system with rules engine architecture
JP5446227B2 (en) Admission management system
US10438426B2 (en) Using a light up feature of a mobile device to trigger door access
US11064167B2 (en) Input functionality for audio/video recording and communication doorbells
WO2021166915A1 (en) Verification device, verification system, and verification method
CN110002290B (en) Elevator access control method and device, storage medium and electronic equipment
EP3893192A1 (en) Information processing system, information processing device, information processing method, and program
CN111382885A (en) Hotel card making method, hotel card making system and hotel management system
WO2020135079A1 (en) Method and device for opening electronic gate, and server
US20230010991A1 (en) Access control system and a method for controlling operation of an access control system
US10957137B2 (en) Systems and methods for discouraging tailgating
CN112418107A (en) Campus face feature library management method, device, system and medium
WO2021014051A1 (en) An access system and a method and an apparatus for access control
KR101926709B1 (en) Control apparatus for biometric and method thereof
US20190088050A1 (en) Barrier control system
CN106115391B (en) Elevator-calling method and device
KR101557156B1 (en) Management of gates using FRID system
KR101420539B1 (en) System For Opening Enterence Door
CN117062767A (en) Computer-implemented method and apparatus associated with a people transportation system-related user application
AU2021212906B2 (en) Information processing system, information processing method, and storage medium for anonymized person detection
KR20240011290A (en) Smart access management system, smart access management method and program stored in a recording medium
JP2023048445A (en) Information processing apparatus, vehicle, and information processing method
JP2022007214A (en) Device, method, and program
KR20230031496A (en) Access control method and system through face authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20702863

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20702863

Country of ref document: EP

Kind code of ref document: A1