CPC H04W 12/08 (2013.01) [G06F 12/1458 (2013.01); G06N 3/08 (2013.01); G06Q 10/1095 (2013.01); G07C 9/00174 (2013.01); G07C 9/00182 (2013.01); G07C 9/00309 (2013.01); G07C 9/00904 (2013.01); G07C 9/10 (2020.01); G07C 9/21 (2020.01); G07C 9/22 (2020.01); G07C 9/257 (2020.01); G07C 9/27 (2020.01); G07C 9/28 (2020.01); G07C 9/29 (2020.01); H04W 4/027 (2013.01); H04W 4/80 (2018.02); H04W 12/06 (2013.01); H04W 12/64 (2021.01); G07C 2009/00333 (2013.01); G07C 2009/00357 (2013.01); G07C 2009/00769 (2013.01); G07C 2209/08 (2013.01); G07C 2209/61 (2013.01); G07C 2209/63 (2013.01)] | 20 Claims |
1. A method of regulating access to an asset in an access control system, the method comprising:
establishing a first wireless connection with a key-device using a low power communication protocol;
receiving a credential for a user of the key device over the first wireless connection;
establishing a second wireless connection with the key-device using Ultra-Wideband (UWB);
determining the user intends to access the asset, wherein determining the user intends to access the asset comprises determining the user meets a first intent threshold based on the second wireless connection; and
permitting access to the asset in response to determining the user intends to access the asset and determining the user meets a second intent threshold based on the second wireless connection.
|