Text-based structure access
First Claim
1. A system comprising:
- memory;
one or more processors; and
one or more computer-executable instructions that are stored in the memory and that are executable by the one or more processors to perform operations comprising;
identifying a residence associated with a first user, the residence including a door that is used to access the residence and that includes a smart lock;
receiving, from a first user device of the first user, user information associated with a second user that has been authorized by the first user to access the residence via the door, the user information including a telephone number of a second user device of the second user and access information indicating an extent to which the second user is authorized to access the residence;
generating a user profile for the second user that is to be maintained in the memory, the user profile identifying the telephone number of the second user device, an access schedule that specifies at least one of times or days in which the second user is authorized to access the residence, and a unique short code associated with the second user;
sending, from a dedicated short code associated with a service provider and to the telephone number of the second user device, a first text message that includes the unique short code;
receiving, at a time, a second text message that indicates a request to at least one of access or secure the residence via the door;
verifying that the second user is authorized to at least one of access or secure the residence via the door by;
determining that the second text message was received from the telephone number of the second user device;
determining that the second text message includes the unique short code associated with the second user; and
determining that the time corresponds to the at least one of the times or the days in which the second user is authorized to access the residence;
sending, to the telephone number of the second user device and based on a determination that the second user is authorized to at least one of access or secure the residence at the time, a third text message that instructs the second user to send a first reply to access the residence or a second reply to secure the residence;
receiving, from the telephone number of the second user device, a fourth text message that includes the first reply or the second reply; and
sending, to at least one of one or more components of the smart lock or one or more devices that are communicatively coupled to the smart lock, and based on the first reply or the second reply, an access instruction to cause the smart lock to unlock or lock the door.
1 Assignment
0 Petitions
Accused Products
Abstract
A first user associated with a structure (e.g., a home, a building, etc.) may authorize a second user to access the structure when the first user is not present. The second user may request to access the structure via a text message that includes an access code that was previously provided. The second user may be verified/authenticated based on the telephone number in which the text message was received, the access code, and/or an access schedule that indicates when the second user is authorized to access the structure. The second user may send a second text message indicating a desire to lock/unlock a structure entrance (e.g., a door) to the structure that contains a smart lock. Upon receiving the second text message, a service provider sends an instruction to the smart lock, causing the structure entrance to become locked/unlocked, and allowing the second user to access or secure the structure.
-
Citations
20 Claims
-
1. A system comprising:
-
memory; one or more processors; and one or more computer-executable instructions that are stored in the memory and that are executable by the one or more processors to perform operations comprising; identifying a residence associated with a first user, the residence including a door that is used to access the residence and that includes a smart lock; receiving, from a first user device of the first user, user information associated with a second user that has been authorized by the first user to access the residence via the door, the user information including a telephone number of a second user device of the second user and access information indicating an extent to which the second user is authorized to access the residence; generating a user profile for the second user that is to be maintained in the memory, the user profile identifying the telephone number of the second user device, an access schedule that specifies at least one of times or days in which the second user is authorized to access the residence, and a unique short code associated with the second user; sending, from a dedicated short code associated with a service provider and to the telephone number of the second user device, a first text message that includes the unique short code; receiving, at a time, a second text message that indicates a request to at least one of access or secure the residence via the door; verifying that the second user is authorized to at least one of access or secure the residence via the door by; determining that the second text message was received from the telephone number of the second user device; determining that the second text message includes the unique short code associated with the second user; and determining that the time corresponds to the at least one of the times or the days in which the second user is authorized to access the residence; sending, to the telephone number of the second user device and based on a determination that the second user is authorized to at least one of access or secure the residence at the time, a third text message that instructs the second user to send a first reply to access the residence or a second reply to secure the residence; receiving, from the telephone number of the second user device, a fourth text message that includes the first reply or the second reply; and sending, to at least one of one or more components of the smart lock or one or more devices that are communicatively coupled to the smart lock, and based on the first reply or the second reply, an access instruction to cause the smart lock to unlock or lock the door. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
determining that a first user has authorized a second user to access a structure via a structure entrance having a lock; receiving, at a first time, a telephone number from the first user; receiving, at a second time that is later than the first time, a text message that includes an access code, the text message representing a request to access or secure the structure via the structure entrance; determining that the text message was received from the telephone number of the second user; determining that the access code included in the text message is associated with the second user and was previously sent to the second user prior to the second time; accessing an access schedule that indicates at least one of times or days in which the second user is authorized by the first user to access the structure; determining, based at least partly on the telephone number, the access code, and the access schedule, that the second user is authorized to at least one of access or secure the structure at the second time; and sending an access instruction to cause the structure entrance to be locked or unlocked. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving, at a first time, a telephone number from a first user; receiving, at a second time that is later than the first time, a first text message that includes an access code, the first text message being a request to access or secure a structure associated with a first user via a structure entrance having a lock; verifying that a second user is authorized to access or secure the structure at the second time based at least partly on the telephone number in which the first text message was received and the access code; sending, to the telephone number, a second text message that instructs the second user to send a first reply to access the structure or a second reply to secure the structure; receiving, from the telephone number, a third text message that includes the first reply or the second reply; and sending, based at least partly on the first reply or the second reply, an access instruction to cause the lock to unlock or lock the structure entrance. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification