Electronic lock authentication method and system
First Claim
1. A method of authenticating a lock system, comprising:
- transmitting, by an electronic lock while in a low power sleep state, an advertisement indicating a presence of the electronic lock;
scanning, by the cellular phone, for the advertisement of the electronic lock;
initiating, by the cellular phone, wireless communication with the electronic lock in response to scanning for the advertisement and determining that the electronic lock is within a specified range of the cellular phone;
transmitting a lock identification from the electronic lock to the cellular phone in response to initiation of the wireless communication;
transmitting the lock identification and a phone identification from the cellular phone to a network for a determination of whether the cellular phone is permitted access to the electronic lock;
receiving, by the cellular phone, a request for additional credential information from the network;
prompting, by the cellular phone, a user to input the additional credential information into the cellular phone;
transmitting, by the cellular phone, the inputted additional credential information to the network;
receiving, by the cellular phone, a grant/deny message from the network-based upon the determination of whether the cellular phone is permitted access to the electronic lock; and
transmitting the grant/deny message from the cellular phone to the electronic lock.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic lock authentication system and associated method including an electronic lock and a cellular phone in communication with a network and in wireless communication with the electronic lock. The electronic lock has a lock identification and is configured to transmit the lock identification wirelessly to the cellular phone. The cellular phone has a phone identification and is configured to transmit the lock identification and the phone identification to the network. The network is configured to make a decision in real time whether the cellular phone is permitted access to the electronic lock based on the look identification and the phone identification, and is further configured to transmit a grant/deny message to the cellular phone based on the decision, and the cellular phone is configured to transmit the grant/deny message to the electronic lock.
-
Citations
12 Claims
-
1. A method of authenticating a lock system, comprising:
-
transmitting, by an electronic lock while in a low power sleep state, an advertisement indicating a presence of the electronic lock; scanning, by the cellular phone, for the advertisement of the electronic lock; initiating, by the cellular phone, wireless communication with the electronic lock in response to scanning for the advertisement and determining that the electronic lock is within a specified range of the cellular phone; transmitting a lock identification from the electronic lock to the cellular phone in response to initiation of the wireless communication; transmitting the lock identification and a phone identification from the cellular phone to a network for a determination of whether the cellular phone is permitted access to the electronic lock; receiving, by the cellular phone, a request for additional credential information from the network; prompting, by the cellular phone, a user to input the additional credential information into the cellular phone; transmitting, by the cellular phone, the inputted additional credential information to the network; receiving, by the cellular phone, a grant/deny message from the network-based upon the determination of whether the cellular phone is permitted access to the electronic lock; and transmitting the grant/deny message from the cellular phone to the electronic lock. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An electronic lock authentication system, comprising:
-
an electronic lock having a low power sleep state, wherein the electronic lock transmits an advertisement that indicates a presence of the electronic lock while in the low power sleep state; and a cellular phone in communication with a network and in wireless communication with the electronic lock, wherein the cellular phone scans for the advertisement of the electronic lock and initiates wireless communication with the electronic lock in response to a scan for the advertisement and a determination that the electronic lock is within a wireless communication range of the cellular phone; wherein the electronic lock has a lock identification and transmits the lock identification wirelessly to the cellular phone in response to initiation of the wireless communication; wherein the cellular phone has a phone identification and transmits the lock identification and the phone identification to the network for a determination of whether the cellular phone is permitted access to the electronic lock; wherein the cellular phone receives a request for additional credential information from the network, prompts a user to input the additional credential information into the cellular phone, and transmits the inputted additional credential information to the network; wherein the cellular phone receives a grant/deny message from the network based on a the determination of whether the cellular phone is permitted access to the electronic lock; and wherein the cellular phone is configured to transmit the grant/deny message to the electronic lock. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. An electronic lock authentication system, comprising:
-
an electronic lock; and a cellular phone in communication with a network and in wireless communication with the electronic lock; wherein the electronic lock has a lock identification and is configured to encrypt the lock identification and transmit the encrypted lock identification wirelessly to the cellular phone; wherein the cellular phone has a phone identification and is configured to encrypt the phone identification and transmit the encrypted lock identification and the encrypted phone identification to the network; wherein the network is configured to make a decision in real time whether the cellular phone is permitted access to the electronic lock based at least in part on the encrypted lock identification and the encrypted phone identification, wherein the network is configured to transmit a message to the cellular phone indicative of a requirement for additional credential information; wherein a user of the cellular phone is prompted to input the additional credential information into the cellular phone; wherein the network further configured to transmit a grant/deny message to the cellular phone based on the decision; and wherein the cellular phone is configured to transmit the grant/deny message to the electronic lock.
-
Specification