-
公开(公告)号:US20230298079A1
公开(公告)日:2023-09-21
申请号:US17694839
申请日:2022-03-15
Applicant: Servall Data Systems Inc.
Inventor: Alberio Bathory-Frota , James Edward Marusiak
CPC classification number: G06Q30/0609 , G07C9/00182 , G07C9/00571 , G06Q30/0607
Abstract: An access control system includes identification document scanners installed at multiple vendor locations. A first local controller at a first vendor location by default controls one or more lock actuators to be in a locked configuration. An identification document scanner scans an identification document provided by a user at the first vendor location. The first local controller validates whether the identification document is authentic and passes user information obtained from the identification document to a central controller. The first local controller then controls one or more of the lock actuators to temporarily enter an unlocked configuration and thereby grant the user access to one or more products in response to determining that the identification document is authentic and receiving a ban status from a central controller indicating that the user is not banned for access. An access history log allows vendor staff to view access attempts and ban users.
-
公开(公告)号:US20240005684A1
公开(公告)日:2024-01-04
申请号:US18342000
申请日:2023-06-27
Applicant: Servall Data Systems Inc.
Inventor: Alberio Bathory-Frota , James Edward Marusiak , Tristan Neal Hasselback , John David Brandt
IPC: G06V20/00 , G06V30/41 , G06V10/94 , G06F16/953
CPC classification number: G06V20/95 , G06V30/41 , G06V10/945 , G06F16/953 , G06V2201/10
Abstract: A system for collecting fake identification documents includes a central controller coupled to scanners and external systems. The scanners scan identification documents and report images of fake or suspected fake identification documents to the central controller. Documents may be automatically detected as fake by matching against known fake ID templates or by detecting that information extracted from the document appears manufactured or incorrect. Documents may also be manually flagged as suspicious by scanner operators either on-the-fly during routine scanning or in batch operations. Scanned documents may further be sent from scanner to central controller during audit events. The central controller enables human review if desired, and, when reported documents are confirmed to be fake, images of the fake IDs along with metadata thereof are added to a fake ID database. The external systems are then notified and may retrieve fake ID templates from the database for a variety of applications.
-