US 11,770,708 B2
Physical access control systems with localization-based intent detection
Hans-Juergen Pirch, Feldkirchen (AT); Fredrik Carl Stefan Einberg, Huddinge (SE); Tomas Lars Jonsson, Rönninge (SE); Sylvain Jacques Prevost, Austin, TX (US); Jan Steffl, Senomaty (CZ); and Hans Gunnar Frank, Spånga (SE)
Assigned to ASSA ABLOY AB, Stockholm (SE)
Appl. No. 17/593,342
Filed by ASSA ABLOY AB, Stockholm (SE)
PCT Filed Mar. 24, 2020, PCT No. PCT/EP2020/058218
§ 371(c)(1), (2) Date Sep. 15, 2021,
PCT Pub. No. WO2020/193578, PCT Pub. Date Oct. 1, 2020.
Claims priority of provisional application 62/823,341, filed on Mar. 25, 2019.
Prior Publication US 2022/0189229 A1, Jun. 16, 2022
Int. Cl. H04W 12/08 (2021.01); G06F 12/14 (2006.01); H04W 12/06 (2021.01); H04W 12/64 (2021.01); G07C 9/21 (2020.01); G07C 9/25 (2020.01); G07C 9/10 (2020.01); G07C 9/00 (2020.01); G07C 9/29 (2020.01); G07C 9/22 (2020.01); G07C 9/27 (2020.01); H04W 4/80 (2018.01); G07C 9/28 (2020.01); G06N 3/08 (2023.01); G06Q 10/1093 (2023.01); H04W 4/02 (2018.01)
CPC H04W 12/08 (2013.01) [G06F 12/1458 (2013.01); G06N 3/08 (2013.01); G06Q 10/1095 (2013.01); G07C 9/00174 (2013.01); G07C 9/00182 (2013.01); G07C 9/00309 (2013.01); G07C 9/00904 (2013.01); G07C 9/10 (2020.01); G07C 9/21 (2020.01); G07C 9/22 (2020.01); G07C 9/257 (2020.01); G07C 9/27 (2020.01); G07C 9/28 (2020.01); G07C 9/29 (2020.01); H04W 4/027 (2013.01); H04W 4/80 (2018.02); H04W 12/06 (2013.01); H04W 12/64 (2021.01); G07C 2009/00333 (2013.01); G07C 2009/00357 (2013.01); G07C 2009/00769 (2013.01); G07C 2209/08 (2013.01); G07C 2209/61 (2013.01); G07C 2209/63 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for regulating access to an asset in an access control system, the method comprising:
receiving a credential of a user from a key device associated with the via a first wireless connection using a low power communication protocol;
establishing a second wireless connection with the key device using Ultra-Wideband (UWB);
determining the user intends to access the asset based on a data set generated based on the second wireless connection, wherein determining the user intends to access the asset comprises:
determining a probability the user intends to access the asset using the generated data set and a trained machine learning model, wherein the trained machine learning model is trained with data sets collected from a plurality of users; and
determining the probability exceeds a predetermined threshold;
providing the credential to an access controller of the access control system for validation in response to determining the user intends to access the asset; and
receiving a validation indication from the access controller and transmitting a command to grant access to the asset.