164 patents
Utility
Protecting data from brute force attack
16 Jan 24
Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities.
François-Eric Michel Guyomarc'h, Francois Menard
Filed: 7 Oct 20
Utility
Connection and service discovery for fine ranging applications
16 Jan 24
Various systems and methods for providing discovering smart card slots in a device are described herein.
Jan Steffl, Sylvain Jacques Prevost, Fredrik Carl Stefan Einberg, Hans-Juergen Pirch
Filed: 1 Oct 20
Utility
Co-signing delegations
9 Jan 24
It is provided a method for controlling access to a physical space using a co-sign delegation.
Frans Lundberg
Filed: 26 Jan 23
Utility
Managing central secret keys of a plurality of user devices associated with a single public key
9 Jan 24
It is provided a method for managing central secret keys of a plurality of user devices associated with a single public key.
Håkan Olsson, Frans Lundberg
Filed: 27 Jun 19
Utility
Mechanisms, assemblies and electronic locking system
2 Jan 24
Release mechanism for an electronic locking system, wherein the release mechanism is configured such that an input member and an output member are locked against relative rotation and can rotate together within a locking ring opening when a locking member is located in an input member recess and in an output member recess, and such that the output member is released to rotate relative to the input member when the locking member is located in the output member recess and in a locking ring recess.
Anders Cöster, Daniel Skarp, Robin Mcgougan, Henrik Svensson, Bernt Arbegard
Filed: 1 Nov 22
Utility
Secure cloud processing
19 Dec 23
Methods and systems are provided for performing operations comprising: generating, on a publicly accessible server, a secure enclave, the secure enclave having isolated memory and processing resources of the server; installing, on the secure enclave, a virtual machine comprising a guest operating system of a first entity; installing, by the virtual machine, one or more cryptographic processes associated with the first entity; and encrypting and decrypting cryptographic keys associated with the first entity using the one or more cryptographic processes.
Krzysztof Grzegorz Fabjański
Filed: 19 Jan 21
Utility
Matching an user taken image with access control apparatus references for physical access control
5 Dec 23
It is provided a method for enabling access control for access to a physical space secured by a lock device.
Fredrik Einberg, Fredrik Lindersson
Filed: 10 Oct 22
Utility
Providing access to a lock for a service provider using a grant token and credential
21 Nov 23
According to a first aspect, it is provided a method for providing access to a lock for provision of a service.
Stefan Strömberg
Filed: 29 Sep 20
Utility
Physical access control systems with localization-based intent detection
21 Nov 23
Systems and techniques for a physical access control systems with localization-based intent detection are described herein.
Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
Filed: 24 Mar 20
Utility
Determining a position of a mobile key device based on phase difference of samples
14 Nov 23
It is provided a method comprising the steps of: obtaining a first sample point and a second sample point; transforming the first sample point and the second sample point by setting the I value of a first transformed sample point to the Q value of the obtained first sample point, setting the Q value of the first transformed sample point to the inverse of the I value of the obtained first sample point, setting the I value of a second transformed sample point to the inverse of the Q value of the obtained second sample point, setting the Q value of the second transformed sample point to the I value of the obtained second sample point; determining the phase difference between the first sample point and the second sample point; and determining the position of the mobile key device based on the phase differences.
Martin Englund
Filed: 26 May 20
Utility
Emergency delegation
17 Oct 23
It is provided a method for controlling access to a physical space using an emergency delegation.
Tomas Jonsson, Fredrik Einberg, Sona Singh, Johan Von Matern, Frans Lundberg
Filed: 17 Dec 19
Utility
Multi factor authentication using different devices
3 Oct 23
Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device.
Francois-Eric Michel Guyomarc'h, James William Holland, Milan Khan, Caleb Wattles
Filed: 4 Oct 17
Utility
Physical access control systems with localization-based intent detection
26 Sep 23
Systems and techniques for a physical access control systems with localization-based intent detection are described herein.
Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
Filed: 24 Mar 20
Utility
Controlling access to an access object
19 Sep 23
It is presented a method for controlling access to an access object.
Frans Lundberg, Peter Stenlund
Filed: 19 Apr 21
Utility
Systems and methods for fine tuning image classification neural networks
19 Sep 23
An authentication engine, residing at one or more computing machines, receives, from a vision device comprising one or more cameras, a probe image.
Kapil Sachdeva, Sylvain Jacques Prevost
Filed: 3 Mar 20
Utility
Physical access control systems with localization-based intent detection
19 Sep 23
Systems and techniques for a physical access control systems with localization-based intent detection are described herein.
Hans-Juergen Pirch, Fredrik Carl Stefan Einberg, Tomas Lars Jonsson, Sylvain Jacques Prevost, Jan Steffl, Hans Gunnar Frank
Filed: 13 Jul 22
Utility
Inkjet printer image improvement techniques
12 Sep 23
Techniques for reducing or eliminating image banding in an ink-jet image are provided.
Tanya Jegeris Snyder, Dale James Ziebarth, Bradley O'Hara
Filed: 1 Oct 20
Utility
Enhanced authorization
22 Aug 23
Confirming user consent includes prompting the user to tap a card a card reader or a computing device and confirming consent in response to the user taping the card.
Ian Lowe, Francois-Eric Michel Guyomarc'h, James William Holland
Filed: 11 Mar 16
Utility
Storing events of a sensor device
22 Aug 23
It is provided a sensor device comprising: a proximity sensor; a processor; a wireless communication module; and a memory.
Tomas Jonsson
Filed: 18 Dec 18
Utility
Securely sharing private information
8 Aug 23
Various systems and methods for securely sharing private in formation are described herein.
Uwe Schnabel, Philip Hoyer
Filed: 19 Jun 20