Patents by Inventor Jacques Prevost
Jacques Prevost has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230368575Abstract: The use of multimodal face attributes in facial recognition systems is described. In addition, use of one or more auxiliary attributes, such as a temporal attribute, can be used in combination with visual information to improve the face identification performance of a facial recognition system. In some examples, the use of multimodal face attributes in facial recognition systems can be combined with the use of one or more auxiliary attributes, such as a temporal attribute. Each of these techniques can improve the verification performance of the facial recognition system.Type: ApplicationFiled: October 12, 2020Publication date: November 16, 2023Inventors: Jianbo Chen, Kapil Sachdeva, Sylvain Jacques Prevost
-
Patent number: 11770708Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential of a user from a key device associated with the user using a first wireless connection. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to determine the user intends to access the asset based on a data set generated derived from the second wireless connection. The access control system may be further adapted to use a trained machine learning model to determine the intent of the user to access the asset. The access control system may be further adapted to transmit a command to grant access to the asset.Type: GrantFiled: March 24, 2020Date of Patent: September 26, 2023Assignee: ASSA ABLOY ABInventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Patent number: 11763551Abstract: An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.Type: GrantFiled: March 3, 2020Date of Patent: September 19, 2023Assignee: ASSA ABLOY ABInventors: Kapil Sachdeva, Sylvain Jacques Prevost
-
Patent number: 11765588Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.Type: GrantFiled: July 13, 2022Date of Patent: September 19, 2023Assignee: ASSA ABLOY ABInventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20230252837Abstract: A physical access control (PAC) system comprises an authentication device that includes physical layer circuitry and processing circuitry. The physical layer circuitry transmits and receives radio frequency electrical signals over a radio access network. The processing circuitry is operatively coupled to the physical layer circuitry and includes an authentication engine. The authentication engine is configured to receive access credential information via the radio access network using a cloud-based messaging service; authenticate the access credential information using the authentication device; and initiate access to a physical access portal according to the access credential information.Type: ApplicationFiled: April 17, 2023Publication date: August 10, 2023Inventors: Sylvain Jacques Prevost, Kapil Sachdeva, Stephen Carney, Wayne Pak, Jianbo Chen
-
Publication number: 20230186704Abstract: A reader device of a physical access control system comprises an ultra-wide band (UWB) physical layer and processing circuitry. The processing circuitry is operatively coupled to the UWB physical layer and is configured to: receive access credential information from a separate second device; receive ranging information from the second device; grant access through a physical portal according to the access credential information and ranging information; determine a number of people intending to pass through the physical portal; and generate an indication according to the determined number.Type: ApplicationFiled: March 3, 2021Publication date: June 15, 2023Inventors: Hans-Juergen Pirch, Sylvain Jacques Prevost
-
Publication number: 20220414224Abstract: This disclosure describes techniques for updating firmware of a secure element. The techniques include operations comprising: receiving, by a gateway device, from a remote source, a firmware file; receiving, by a processing element implemented on the gateway device, ephemeral session specific key material for a first secure element implemented on the gateway device; dividing the firmware file into a plurality of data chunks; applying, by the processing element, the ephemeral session specific key material to a first data chunk of the plurality of data chunks to generate a first data packet; and sending, by the processing element, the first data packet to the first secure element.Type: ApplicationFiled: November 13, 2020Publication date: December 29, 2022Inventors: Kapil Sachdeva, Sylvain Jacques Prevost, Philip Hill
-
Publication number: 20220375286Abstract: A method of operating a seamless physical access control system comprises transferring communication session information using an out-of-band (OOB) communication channel of a smart ultra-wide band (UWB) capable device; establishing a secure OOB communication channel between the smart UWB capable device and a reader device using the communication session information; determining that a UWB enabled application of the smart UWB capable device needs secure ranging; establishing a secure UWB communication channel between the smart UWB capable device and the reader device; and transferring ranging information from a secure component of the smart UWB capable device to the reader device via the secure UWB communication channel.Type: ApplicationFiled: March 27, 2020Publication date: November 24, 2022Inventors: Hans-Juergen Pirch, Jan Steffl, Sylvain Jacques Prevost, Fredrik Carl Stefan Einberg
-
Publication number: 20220377555Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.Type: ApplicationFiled: July 13, 2022Publication date: November 24, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220309308Abstract: Various systems and methods for providing discovering smart card slots in a device are described herein. A server device for discovering smart card slots in a client device may be implemented with a processor subsystem; and memory including instructions, which when executed by the processor subsystem, cause the processor subsystem to perform operations comprising: receiving, at the server device from the client device, over an established Bluetooth connection, smart card connector parameters, the client device having a plurality of smart card slots; iterating through the plurality of smart card slots; at each slot of the plurality of smart card slots, using a smart card protocol to attempt to access an application at each slot, the application pre-associated with the server device; and in response to identifying the application exists in a slot of the plurality of smart card slots, connecting with the application.Type: ApplicationFiled: October 1, 2020Publication date: September 29, 2022Inventors: Jan Steffl, Sylvain Jacques Prevost, Fredrik Carl Stefan Einberg, Hans-Juergen Pirch
-
Patent number: 11405784Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.Type: GrantFiled: March 24, 2020Date of Patent: August 2, 2022Assignee: ASSA ABLOY ABInventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220230498Abstract: A physical access control (PAC) system comprises an authentication device that includes physical layer circuitry and processing circuitry. The physical layer circuitry transmits and receives radio frequency electrical signals over a radio access network. The processing circuitry is operatively coupled to the physical layer circuitry and includes an authentication engine. The authentication engine is configured to receive access credential information via the radio access network using a cloud-based messaging service; authenticate the access credential information using the authentication device; and initiate access to a physical access portal according to the access credential information.Type: ApplicationFiled: May 20, 2020Publication date: July 21, 2022Inventors: Sylvain Jacques Prevost, Kapil Sachdeva, Stephen Carney, Wayne Pak, Jianbo Chen
-
Publication number: 20220189224Abstract: A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.Type: ApplicationFiled: March 24, 2020Publication date: June 16, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220189228Abstract: Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.Type: ApplicationFiled: March 24, 2020Publication date: June 16, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220189229Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential of a user from a key device associated with the user using a first wireless connection. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to determine the user intends to access the asset based on a data set generated derived from the second wireless connection. The access control system may be further adapted to use a trained machine learning model to determine the intent of the user to access the asset. The access control system may be further adapted to transmit a command to grant access to the asset.Type: ApplicationFiled: March 24, 2020Publication date: June 16, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220172536Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential from a key device associated with a user using a first wireless connection. The access control system may be further adapted to verify the credential with a preliminary authentication for the asset. The access control system may be further adapted to establish a second wireless connection with the key device in response to verifying the credential with the preliminary authentication. The access control system may be adapted to determine an intent of the user to access the asset. The access control system may identify the credential includes a pattern in the preliminary authentication. The access control system may be further adapted to provide a command to grant access to the asset.Type: ApplicationFiled: March 24, 2020Publication date: June 2, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220172529Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.Type: ApplicationFiled: March 24, 2020Publication date: June 2, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20220157106Abstract: A reader system for an access control system includes first and second antennas and first and second controllers. The first controller is configured to communicate with a credential device using a first communication protocol via the first antenna to exchange a credential with the credential device. The second controller is configured to communicate with the credential device using a second communication protocol via the second antenna to perform ranging for the credential device and is configured to communicate with the first controller via a communication link.Type: ApplicationFiled: March 24, 2020Publication date: May 19, 2022Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
-
Publication number: 20210279528Abstract: An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image. The authentication engine generates, using a trained facial classification neural engine, one or more first labels for a person depicted in the probe image and a probability for at least one of the one or more first labels. The authentication engine determines that the probability is within a predefined low accuracy range. The authentication engine generates, using a supporting engine, a second label for the person depicted in the probe image. The supporting engine operates independently of the trained facial classification neural engine. The authentication engine further trains the facial classification neural engine based on the second label.Type: ApplicationFiled: March 3, 2020Publication date: September 9, 2021Inventors: Kapil Sachdeva, Sylvain Jacques Prevost
-
Publication number: 20200314651Abstract: Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.Type: ApplicationFiled: March 24, 2020Publication date: October 1, 2020Inventors: Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank