WO2023242871A1 - Device, system and method for 3d face recognition and access management door lock - Google Patents

Device, system and method for 3d face recognition and access management door lock Download PDF

Info

Publication number
WO2023242871A1
WO2023242871A1 PCT/IN2023/050565 IN2023050565W WO2023242871A1 WO 2023242871 A1 WO2023242871 A1 WO 2023242871A1 IN 2023050565 W IN2023050565 W IN 2023050565W WO 2023242871 A1 WO2023242871 A1 WO 2023242871A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
depth
door lock
access management
face recognition
Prior art date
Application number
PCT/IN2023/050565
Other languages
French (fr)
Inventor
Suresh Kumar MATHA
Ashish Arora
Vindhya Devalla
Curie GUPTA
Original Assignee
Matdun Labs India Private Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matdun Labs India Private Limited filed Critical Matdun Labs India Private Limited
Publication of WO2023242871A1 publication Critical patent/WO2023242871A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/64Three-dimensional objects
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Definitions

  • the present invention relates generally to a door lock, and particularly to a 3D image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
  • the present invention relates generally to a door lock, and particularly to a 3D sensor image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
  • the present invention provides a 3D door lock configuration to identify an object in field of view and activate the SoC (System on a chip)/Cloud to process the 3D image.
  • the door lock is capable to recognize one or more faces and work with a custom sensor chip on authentication.
  • the door lock is further configured to processes different 52 authentication layers to identify the object by use of custom neural engine.
  • the door lock is configured to capture depth information by use of dot projectors.
  • the system may be configured to provide access management.
  • the present invention provides easy repair mechanism.
  • the mechanism provided is easy to work on thereby making the repair work very user friendly and easy. Since it is a modular type assembly whenever a part is damaged, it can be easily replaced and the whole damaged part can be replaced. This can be done in a short time and the can be done in a low cost.
  • the present invention provides easy assembly.
  • Fig. 1 illustrates a schematic diagram of access management to location/services, based on the unique depth-ID generated and authenticated through the access management module.
  • FIG. 2 illustrates a flow diagram for the steps in the process of a user authentication using the unique depth-ID stored in the active directory/cloud database.
  • Embodiments of the present invention may include various steps, which will be described below. Steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or specialpurpose with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and/or by human operators.
  • a system for 3D face recognition and access management door lock may include one or more processors and memories configured to detect and validate motion of an object, wherein the motion is detected by a motion detector sensor (101) and the motion is validated by a distance validator sensor (102).
  • the system may capture one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map, wherein the one or more images are captured by an image sensor module (106).
  • the system may cross verify and/or match with a stored record of a user profile and/or depth-ID in local and/or cloud databases (111) grant access to the legitimate/authorized user to locations and services (113).
  • the system may be configured with a laser-based depth mapping system to register and authenticate a user's face, based on a depth input.
  • the system may include motion detector sensor (101) monitors the motion state of a user and verify whether the user is within a defined range/FOV or not, while the device is idle.
  • the system may include image sensor module (106) to extract depth and other relevant information and applying proprietary deep learning techniques to confirm the user's identity to grant access to authorized locations/services.
  • the system may include IR sensor (104a) and PR (Pattern Projector) sensor (104b) to capture the depth information in day and/or night weather conditions when user movement/face is detected.
  • the system may detect user movement approaching the device by a motion detector sensor (101) to detect user movement.
  • the system may analyze the variation of depth information on the facial areas to identify authorized and authentic face(s) by eliminating the imposters and unauthorized face(s) using deep learning approach.
  • the system may grant access to locations/services (113) based on the unique depth-ID generated at the time of registration which is stored in a cloud database or active directory (111).
  • the system may save depth-ID’ s, user data, rules and programs, and logs are in the cloud/local/offsite server/device (111) which serves as an active directory or database.
  • the present invention relates generally to a door lock, and particularly to a 3D sensor image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
  • the present invention provides a 3D door lock configuration to identify an object in field of view and activate the SoC (System on a chip)/Cloud to process the 3D image.
  • the door lock is capable to recognize one or more faces and work with a custom sensor chip on authentication.
  • the door lock is further configured to processes different authentication layers to identify the object by use of custom neural engine.
  • the door lock is configured to captures depth information by use of dot projectors.
  • the system may be configured to provide access management.
  • neural engine uses 52 different layers to process the depth information and accurately identify the user.
  • the lock maintains a list of individual profiles that should not have access to the property.
  • the lock may schedule entry for house maintenance teams/individuals with specific business hours.
  • the lock may provide guest access for a limited timeframe.
  • the lock may connect to Internet to send out Notifications/Alerts/Updates.
  • the neural engine processes different authentication layers to identify the user and processing entirely happens on the device.
  • Fig. 1 illustrates a schematic diagram of access management to location/services, based on the unique depth-ID generated and authenticated through the access management module.
  • motion may be detected by a motion detector sensor (101) and the motion may be validated by a distance validator sensor (102).
  • a Microcontroller 103) may check whether an image sensor module (104) may be active or not.
  • the image sensor module (104) may capture one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map.
  • the image sensor module (104) may include an IR (Infra-red) sensor (104a) and a PR (Projector) sensor (104b).
  • the image sensor module (104) captures an IR image capture module (105) and PR image (106) to DoT image capture module (106).
  • the IR image sensor module (104) may further communicate the images captured to a face recognition module (107) and head pose module (108) for user verification.
  • the Image Sensor Module (104) may communicate the images captured to antispoofing module (109).
  • the anti-spoofing module (109) may further verify the DoT images and communicate with the face recognition module (107) for verification and match.
  • an authentication module (110) may authenticate the images and create a depth-ID.
  • the depth-ID may be stored in the cloud, local, server, or any other storage device (111).
  • the depth-ID may be used for various purposes, such as access management module (113), resource and payroll management (114), identity management module (115) and ID resource management module (116).
  • Fig. 2 illustrates a flow diagram for the steps in the process of a user authentication using the unique depth-ID stored in the active directory/cloud database.
  • process check whether device is ready or not in step 201 and the process moves to next step.
  • motion detector (101) checks whether motion is detected for the object or not; in case motion is detected the process moves to next step.
  • distance validator sensor (102) measures the distance of the object and moves to next step.
  • step 204 the distance validator sensor (102) validates the distance and moves to next step.
  • step 205 the process verifies whether the face is aligned or not and moves to next step.
  • step 206 the image sensor module (106) captures the images and moves to next step.
  • step 207 the one or more processors extract the images and analyze a depth information.
  • step 208 the one or more processors validates the depth information and move to next step.
  • step 209 the process generates user depth ID and store the depth ID information in cloud (111).
  • step 211 the process request for online/offline service subscription and moves to next step.
  • step 212 the process compares the user profile stored in the cloud (111) and with the captured images.
  • step 213 based on the profile match the process grant service/location access rights to the authenticated user.
  • step 214 the process assign read and write permission to the user based on user profile match. The process ends.
  • the present invention provides easy usage mechanism.
  • the mechanism provided is easy to work on thereby making the device very user friendly and easy.
  • the access management can be used to control access of legitimate users comprising but not limited to commercial buildings; residential buildings; IT resources; cloud, appliances.
  • the access management can be used to allow one or more entity to authenticate, authorize and audit access to on-premises and cloud-based applications and IT systems.
  • the access management can be used to allow one or more entity to limit the information users can view or change to minimize the chances of improper activity.
  • the access management can be used to allow one or more entity to grant authorized users the right to use a service/location, while preventing access to non- authorized users.
  • the access management can be used to allow one or more entity to control and monitor network access to services/location.
  • the access management can be used to manage access to services/locations based on policies and actions defined in information security management.
  • the access management can be used to efficiently respond to requests for granting access to services/locations, changing access rights or restricting access, ensuring that the rights being provided or changed are properly granted.
  • the access management can be used to Grant access to services/locations, service/locations groups, data or functions, only if they are entitled to that access.
  • the access management can be used to oversee access to services/locations and ensure rights being provided are not improperly used, remove access when people leave, change roles or jobs.
  • the present invention provides an object identifier in field of view and activate the SoC (System on a chip)/cloud to process the 3D image and access management.
  • SoC System on a chip
  • the present invention provides a face recognizer in 3D space and work with a custom sensor chip on authentication.
  • the present invention provides different authentication layers to identify the object by use of custom neural engine.
  • the present invention captures depth information by use of dot projectors.
  • the present invention calibrates match to the field of view and height of the device.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates generally to a door lock, and particularly to a 3D image sensing module that comprises of a camera, depth sensor among other sensors for access management and face recognition to authenticate for door locks. A smart door lock with authentication system includes one or more memories, sensors, or processor configured to identify an object in field of view and activate SoC (System on a chip)/Cloud to process one or more images of the object in 3D space. The smart lock recognizes face of the object and work with a custom sensor chip on authentication. The smart lock further calibrates match to the field of view and height of the device. A custom neural engine processes one or more authentication layer to identify the object images.

Description

DEVICE, SYSTEM AND METHOD FOR 3D FACE RECOGNITION AND ACCESS MANAGEMENT DOOR LOCK
FIELD OF INVENTION:
[0001] The present invention relates generally to a door lock, and particularly to a 3D image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
BACKGROUND OF THE INVENTION
[0002] With the development and widespread adoption of smart locks, the limitations of general fingerprint, password and radio frequency card smart locks have been increasing in market. Fingerprints of the old/aged with serious fingerprint abrasion, fingerprints of injured adults, fingerprints with water stains, etc. are difficult to solve by the existing fingerprint technology; the passwords are easy to peep by the hidden camera; the radio frequency cards are inconvenient to carry, and easy to copy, and all of the above systems cannot actively actively wake up the function of system identification, and are poor in convenience.
[0003] From the aforementionedstandpoint there has been a need for 3D face recognition authentication and access management intelligent door lock to solve the prevailing issue. Therefore, there is a genuine need of 3D face recognition authentication and access management intelligent door lock to overcome all the above problems by developing an improved system and method, which is accurate, efficient, dynamic, and simple.
OBJECTS OF THE INVENTION [0004] It is an objective of the present invention to recognize one or more face and a custom camera imaging module consisting of a camera and other sensors to authenticate for door locks.
[0005] It is an objective of the present invention to identify an object in field of view and activate the SoC (System on a chip)/cloud to process the 3D image.
[0006] It is an objective of the present invention to recognize the multiple faces and work with a custom sensor chip on authentication.
[0007] It is an objective of the present invention to processes different authentication layers to identify the object by use of custom neural engine.
[0008] It is an objective of the present invention to captures depth information by use of dot projectors.
[0009] It is an objective of the present invention to provide a calibrated match to the field of view and height of the device
[00010] It is an objective of the present invention to provide a device, system and method to for an improved communication system.
[00011] It is an objective of the present invention to provide a device, system, and method to for an improved artificial intelligence system
[00012] It is an objective of the present invention to provide a device, system, and method for an improved information system.
[00013] It is an objective of the present invention to provide a device, system, and method for an improved survey system.
[00014] It is an objective of the present invention to provide a device, system, and method for an improved sensor device system.
[00015] It is an objective of the present invention to provide a device, system, and method for an improved verification system. [00016] It is an objective of the present invention to provide a device, system and method for an improved tracking and monitoring system.
SUMMARY OF THE INVENTION
[00017] The present invention relates generally to a door lock, and particularly to a 3D sensor image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
[00018] Although the present disclosure is explained with respect to a 3D image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks for access management and face recognition to authenticate system and method, it would be appreciated that this application is used for illustration purposes, but it is not a limitation.
[00019] The present invention provides a 3D door lock configuration to identify an object in field of view and activate the SoC (System on a chip)/Cloud to process the 3D image. The door lock is capable to recognize one or more faces and work with a custom sensor chip on authentication. The door lock is further configured to processes different 52 authentication layers to identify the object by use of custom neural engine. In an embodiment the door lock is configured to capture depth information by use of dot projectors. Yet in another embodiment the system may be configured to provide access management.
[00020] The present invention provides easy repair mechanism. The mechanism provided is easy to work on thereby making the repair work very user friendly and easy. Since it is a modular type assembly whenever a part is damaged, it can be easily replaced and the whole damaged part can be replaced. This can be done in a short time and the can be done in a low cost.The present invention provides easy assembly. [00021] Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
[00022] The other objects, features and advantages will occur to those skilled in the art from the following description of the preferred embodiment and the accompanying drawings in which.
[00023] Fig. 1 illustrates a schematic diagram of access management to location/services, based on the unique depth-ID generated and authenticated through the access management module.
[00024] Fig. 2 illustrates a flow diagram for the steps in the process of a user authentication using the unique depth-ID stored in the active directory/cloud database.
[00025] Although specific features of the present invention are shown in some drawings and not in others, this is done for convenience only as each feature may be combined with any or all of the other features in accordance with the present invention.
DETAILED DESCRIPTION
[00026] Embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying figures and detailed in the following description. Descriptions of well- known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[00027] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[00028] Embodiments of the present invention may include various steps, which will be described below. Steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or specialpurpose with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and/or by human operators.
[00029] If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that component or feature is not required to be included or have the characteristic.
[00030] The foregoing illustrated and described embodiments of the invention are susceptible to various modifications and alternative forms, and it should be understood that the invention generally, as well as the specific embodiments described herein, are not limited to the particular forms or embodiments disclosed, but cover all modifications, equivalents and alternatives falling within the scope of the appended claims. By way of non- limiting example, it will be appreciated by those skilled in the art that particular features or characteristics in one embodiment may be combined as suitable with features or characteristics described in another embodiment. Moreover, the device and method for of the present invention can be a system used along with an automated or even with a manual system.
[00031] A system for 3D face recognition and access management door lock (100) may include one or more processors and memories configured to detect and validate motion of an object, wherein the motion is detected by a motion detector sensor (101) and the motion is validated by a distance validator sensor (102).
[00032] The system may capture one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map, wherein the one or more images are captured by an image sensor module (106).
[00033] The system may cross verify and/or match with a stored record of a user profile and/or depth-ID in local and/or cloud databases (111) grant access to the legitimate/authorized user to locations and services (113).
[00034] The system may be configured with a laser-based depth mapping system to register and authenticate a user's face, based on a depth input.
[00035] The system may include motion detector sensor (101) monitors the motion state of a user and verify whether the user is within a defined range/FOV or not, while the device is idle.
[00036] The system may include image sensor module (106) to extract depth and other relevant information and applying proprietary deep learning techniques to confirm the user's identity to grant access to authorized locations/services.
[00037] The system may include IR sensor (104a) and PR (Pattern Projector) sensor (104b) to capture the depth information in day and/or night weather conditions when user movement/face is detected. [00038] The system may detect user movement approaching the device by a motion detector sensor (101) to detect user movement.The system may analyze the variation of depth information on the facial areas to identify authorized and authentic face(s) by eliminating the imposters and unauthorized face(s) using deep learning approach.
[00039] The system may grant access to locations/services (113) based on the unique depth-ID generated at the time of registration which is stored in a cloud database or active directory (111).
[00040] The system may save depth-ID’ s, user data, rules and programs, and logs are in the cloud/local/offsite server/device (111) which serves as an active directory or database.
[00041] The present invention relates generally to a door lock, and particularly to a 3D sensor image sensing module that comprises of a camera, depth sensor among other sensors module for access management and face recognition to authenticate for door locks.
[00042] Although the present disclosure is explained with respect to a 3D sensor for access management and face recognition to authenticate system and method, it would be appreciated that this application is used for illustration purposes, but it is not a limitation.
[00043] The present invention provides a 3D door lock configuration to identify an object in field of view and activate the SoC (System on a chip)/Cloud to process the 3D image. The door lock is capable to recognize one or more faces and work with a custom sensor chip on authentication. The door lock is further configured to processes different authentication layers to identify the object by use of custom neural engine. In an embodiment the door lock is configured to captures depth information by use of dot projectors. Yet in another embodiment the system may be configured to provide access management.
[00044] In an embodiment, neural engine uses 52 different layers to process the depth information and accurately identify the user. In an embodiment the lock maintains a list of individual profiles that should not have access to the property. In an embodiment the lock may schedule entry for house maintenance teams/individuals with specific business hours.
Yet in another embodiment the lock may provide guest access for a limited timeframe.
[00045] In an embodiment the lock may connect to Internet to send out Notifications/Alerts/Updates. The neural engine processes different authentication layers to identify the user and processing entirely happens on the device.
[00046] Fig. 1 illustrates a schematic diagram of access management to location/services, based on the unique depth-ID generated and authenticated through the access management module. In an embodiment motion may be detected by a motion detector sensor (101) and the motion may be validated by a distance validator sensor (102). A Microcontroller 103) may check whether an image sensor module (104) may be active or not. The image sensor module (104) may capture one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map. The image sensor module (104) may include an IR (Infra-red) sensor (104a) and a PR (Projector) sensor (104b). The image sensor module (104) captures an IR image capture module (105) and PR image (106) to DoT image capture module (106).
[00047] In an embodiment the IR image sensor module (104) may further communicate the images captured to a face recognition module (107) and head pose module (108) for user verification. The Image Sensor Module (104) may communicate the images captured to antispoofing module (109). The anti-spoofing module (109) may further verify the DoT images and communicate with the face recognition module (107) for verification and match.
[00048] In an embodiment an authentication module (110) may authenticate the images and create a depth-ID. The depth-ID may be stored in the cloud, local, server, or any other storage device (111). In an embodiment by use of a device (112) the depth-ID may be used for various purposes, such as access management module (113), resource and payroll management (114), identity management module (115) and ID resource management module (116).
[00049] Fig. 2 illustrates a flow diagram for the steps in the process of a user authentication using the unique depth-ID stored in the active directory/cloud database. In operation process check whether device is ready or not in step 201 and the process moves to next step. In step 202 motion detector (101) checks whether motion is detected for the object or not; in case motion is detected the process moves to next step. In step 203 distance validator sensor (102) measures the distance of the object and moves to next step.
[00050] In an embodiment in step 204 the distance validator sensor (102) validates the distance and moves to next step. In step 205 the process verifies whether the face is aligned or not and moves to next step. In step 206 the image sensor module (106) captures the images and moves to next step. In step 207 the one or more processors extract the images and analyze a depth information. In step 208 the one or more processors validates the depth information and move to next step.
[00051] In step 209 the process generates user depth ID and store the depth ID information in cloud (111). In step 211 the process request for online/offline service subscription and moves to next step. In step 212 the process compares the user profile stored in the cloud (111) and with the captured images. In step 213 based on the profile match the process grant service/location access rights to the authenticated user. In step 214 the process assign read and write permission to the user based on user profile match. The process ends.
[00052] The present invention provides easy usage mechanism. The mechanism provided is easy to work on thereby making the device very user friendly and easy.
[00053] In an embodiment, the access management can be used to control access of legitimate users comprising but not limited to commercial buildings; residential buildings; IT resources; cloud, appliances. [00054] In another embodiment, the access management can be used to allow one or more entity to authenticate, authorize and audit access to on-premises and cloud-based applications and IT systems.
[00055] In another embodiment, the access management can be used to allow one or more entity to limit the information users can view or change to minimize the chances of improper activity.
[00056] In yet another embodiment, the access management can be used to allow one or more entity to grant authorized users the right to use a service/location, while preventing access to non- authorized users.
[00057] In yet another embodiment, the access management can be used to allow one or more entity to control and monitor network access to services/location.
[00058] In yet another embodiment, the access management can be used to manage access to services/locations based on policies and actions defined in information security management.
[00059] In yet another embodiment, the access management can be used to efficiently respond to requests for granting access to services/locations, changing access rights or restricting access, ensuring that the rights being provided or changed are properly granted.
[00060] In yet another embodiment, the access management can be used to Grant access to services/locations, service/locations groups, data or functions, only if they are entitled to that access.
[00061] In yet another embodiment, the access management can be used to oversee access to services/locations and ensure rights being provided are not improperly used, remove access when people leave, change roles or jobs.
[00062] While embodiments of the present invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the invention, while for the purpose of illustrating/explaining, 3D capabilities are explained, the system also contains 2D capabilities.
ADVANTAGES OF THE INVENTION:
[00063] The present invention provides an object identifier in field of view and activate the SoC (System on a chip)/cloud to process the 3D image and access management.
[00064] The present invention provides a face recognizer in 3D space and work with a custom sensor chip on authentication.
[00065] The present invention provides different authentication layers to identify the object by use of custom neural engine.
[00066] The present invention captures depth information by use of dot projectors.
[00067] The present invention calibrates match to the field of view and height of the device.

Claims

CLAIMS We Claim:
1. A device for 3D face recognition and access management door lock(lOO) comprising: one or more processors and memories configured to: detect and validate motion of an object, wherein the motion is detected by a motion detector sensor (101) and the motion is validated by a distance validator sensor (102); captures one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map, wherein the one or more images are captured by an image sensor module (104); and cross verify and/or match with a stored record of a user profile and/or depth-ID in local and/or cloud databases (111) grant access to the legitimate/authorized user to locations and services (113); wherein a laser-based depth mapping system to register and authenticate a user's face, based on a depth input.
2. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein the motion detector sensor (101) monitors the motion state of a user and verify whether the user is within a defined range/FOV or not, while the device is idle.
3. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein the image sensor module (104) extract depth and other relevant information and applying proprietary deep learning techniques to confirm the user's identity to grant access to authorized locations/services.
4. The device for 3D face recognition and access management door lock (100) as claimed in claim 3, wherein IR sensor (104a) and PR sensor (104b) captures the depth information in day and/or night weather conditions when user movement/face is detected.
5. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, whereinmovement of the user approaching the device is detected by a motion detector sensor (101) to detect user movement.
6. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein the one or more processors is used to analyze the variation of depth information on the facial areas to identify authorized and authentic face(s) by eliminating the imposters and unauthorized face(s) using deep learning approach.
7. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein users are granted access to locations/services (113) based on the unique depth-ID generated at the time of registration which is stored in a cloud database or active directory (111).
8. The device for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein depth-ID’ s, user data, rules and programs, and logs are in the cloud/local/offsite server/device (111) which serves as an active directory or database.
9. A method for 3D face recognition and access management door lock (100) comprising: one or more processors and memories configured to: detecting and validating, by one or more processors, motion of an object, wherein the motion is detected by a motion detector sensor (101) and the motion is validated by a distance validator sensor (102); capturing, by one or more processors, one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map, wherein the one or more images are captured by an image sensor module (104); and cross verifying and/or matching, by one or more processors, with a stored record of a user profile and/or depth-ID in local and/or cloud databases (111) grant access to the legitimate/authorized user to locations and services (113); wherein a laser-based depth mapping system to register and authenticate a user's face, based on a depth input.
10. The method for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein the motion detector sensor (101) monitors the motion state of a user and verify whether the user is within a defined range/FOV or not, while the device is idle.
11. The method for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein the image sensor module (104) extract depth and other relevant information and applying proprietary deep learning techniques to confirm the user's identity to grant access to authorized locations/services.
12. The method for 3D face recognition and access management door lock (100) as claimed in claim 3, wherein IR sensor (104a) and PR sensor (104b) captures the depth information in day and/or night weather conditions when user movement/face is detected.
13. The method for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein movement of the user approaching the device is detected by a motion detector sensor (101) to detect user movement.
14. The method for 3D face recognition and access management door lock (100) as claimed in claim 1, wherein users are granted access to locations/services (113) based on the unique depth-ID generated at the time of registration which is stored in a cloud database or active directory (111).
15. A system for 3D face recognition and access management door lock (100) comprising: one or more processors and memories configured to: detect and validate motion of an object, wherein the motion is detected by a motion detector sensor (101) and the motion is validated by a distance validator sensor (102); captures one or more images and analyzes them to identify a user's face in the captured/input images to generate a depth map, wherein the one or more images are captured by an image sensor module (104); and cross verify and/or match with a stored record of a user profile and/or depth-ID in local and/or cloud databases (111) grant access to the legitimate/authorized user to locations and services (113); wherein a laser-based depth mapping system to register and authenticate a user's face, based on a depth input.
PCT/IN2023/050565 2022-06-17 2023-06-15 Device, system and method for 3d face recognition and access management door lock WO2023242871A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202241014800 2022-06-17
IN202241014800 2022-06-17

Publications (1)

Publication Number Publication Date
WO2023242871A1 true WO2023242871A1 (en) 2023-12-21

Family

ID=89192531

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2023/050565 WO2023242871A1 (en) 2022-06-17 2023-06-15 Device, system and method for 3d face recognition and access management door lock

Country Status (1)

Country Link
WO (1) WO2023242871A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101594433B1 (en) * 2015-04-30 2016-02-16 주식회사 아이티아이씨앤씨 A system for controlling the exit and entry using Iris Recognition portable terminal and Method for controlling the exit and entry using Iris Recognition portable
CN107845177A (en) * 2017-12-18 2018-03-27 信利光电股份有限公司 A kind of auth method, device, equipment and computer-readable recording medium
WO2022045562A1 (en) * 2020-08-28 2022-03-03 Lg Electronics Inc. Electronic device for controlling opening and closing of a door, a door opening/closing device disposed to the door, and a method therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101594433B1 (en) * 2015-04-30 2016-02-16 주식회사 아이티아이씨앤씨 A system for controlling the exit and entry using Iris Recognition portable terminal and Method for controlling the exit and entry using Iris Recognition portable
CN107845177A (en) * 2017-12-18 2018-03-27 信利光电股份有限公司 A kind of auth method, device, equipment and computer-readable recording medium
WO2022045562A1 (en) * 2020-08-28 2022-03-03 Lg Electronics Inc. Electronic device for controlling opening and closing of a door, a door opening/closing device disposed to the door, and a method therefor

Similar Documents

Publication Publication Date Title
US10796514B2 (en) System and method for optimizing a facial recognition-based system for controlling access to a building
EP3704642B1 (en) Methods and system for controlling access to enterprise resources based on tracking
US11217051B2 (en) System and method for providing credential activation layered security
US20180082304A1 (en) System for user identification and authentication
US8364971B2 (en) User authentication system and method
US8694792B2 (en) Biometric based repeat visitor recognition system and method
US20180351956A1 (en) Integrated biometrics for application security
US20190080538A1 (en) Novel high assurance identity authentication and granular access oversight and management system based on indoor tracking, gps and biometric identification
US11997087B2 (en) Mobile enrollment using a known biometric
CN107395369B (en) Authentication method, access method and system for self-contained equipment of mobile Internet
EP3623974A1 (en) Methods and systems for improved biometric identification using user devices proximity
CN115379198A (en) Camera tampering detection
WO2023242871A1 (en) Device, system and method for 3d face recognition and access management door lock
US12013956B2 (en) Systems and methods for verifying user activity using behavioral models
JP5601074B2 (en) Authentication system, authentication method, and program
WO2023242875A1 (en) Device, system and method for 3d face recognition and authentication door lock
Almuhaideb et al. Design Recommendations for Gate Security Systems and Health Status: A Systematic Review
RU2784327C1 (en) Authentication method and system for passing through a checkpoint
US12019725B2 (en) Methods and systems for employing an edge device to provide multifactor authentication
Andries et al. The Impact of 3D Imaging on Fingerprint Spoofing Prevention
EP4323979A1 (en) Method for access management to a secured area
Sandeep Dhameja et al. Multi-Characteristic Biometric Systems: Who Are You?
Braz et al. GlanceID: A Usable, Single, and Yet Strong Optical Authentication Method
Essien Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System
Dhameja Multi-Characteristic Biometric Systems: Who Are You?

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23823422

Country of ref document: EP

Kind code of ref document: A1