Wireless key management for authentication
First Claim
1. A method comprising:
- transmitting, by a mobile device, an encrypted user profile to a locking device, the encrypted user profile including a user key and encrypted by a server using a lock key;
decrypting, by the locking device, the encrypted user profile using the lock key to generate a decrypted user profile and obtain the user key from the decrypted user profile, wherein the lock key is pre-stored on the locking device;
generating, by the mobile device, an encrypted command using the user key;
transmitting, by the mobile device, the encrypted command to the locking device;
decrypting, by the locking device, the encrypted command received from the mobile device using the user key that was obtained from decrypting the encrypted user profile to generate a decrypted command; and
initiating, by the locking device, an action of the locking device as specified by the decrypted command.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are methods, and devices for wireless key management for authentication. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile, wherein a user profile is authenticated and encrypted by a server using a lock key that is stored by the server and the locking device, and wherein the user profile comprises a user key; transmitting the user profile; decrypting the user profile using the lock key; transmitting a security code; generating an encrypted command comprising the security code and encrypted using the user key; transmitting the command; validating the command. Validating the command can include decrypting using the user key; determining whether the security code is valid; and authenticating using the user key; and initiating, in response to validating, an action of the locking device as specified by the command.
130 Citations
22 Claims
-
1. A method comprising:
-
transmitting, by a mobile device, an encrypted user profile to a locking device, the encrypted user profile including a user key and encrypted by a server using a lock key; decrypting, by the locking device, the encrypted user profile using the lock key to generate a decrypted user profile and obtain the user key from the decrypted user profile, wherein the lock key is pre-stored on the locking device; generating, by the mobile device, an encrypted command using the user key; transmitting, by the mobile device, the encrypted command to the locking device; decrypting, by the locking device, the encrypted command received from the mobile device using the user key that was obtained from decrypting the encrypted user profile to generate a decrypted command; and initiating, by the locking device, an action of the locking device as specified by the decrypted command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An electronic locking device, comprising:
-
a wireless transceiver; a memory; an electronically controllable locking mechanism; and a processor configured to; store a lock key in the memory; receive, via the wireless transceiver, an encrypted user profile from a mobile device, wherein the encrypted user profile is encrypted by a server that is remote from the mobile device and the electronic locking device with a copy of the lock key; decrypt the encrypted user profile using the lock key to generate a decrypted user profile and obtain a user key from the decrypted user profile; receive, via the wireless transceiver, an encrypted command from the mobile device encrypted with the user key; decrypt the encrypted command using the user key obtained from decrypting the encrypted user profile to generate a decrypted command; and initiate an action of the electronic locking device as specified by the decrypted command. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A computer-readable storage medium having instructions stored thereon that, upon execution by a processor of a mobile device, cause the processor to:
-
transmit an encrypted user profile to a locking device, the encrypted user profile including a user key and encrypted by a server using a lock key; receive a security code from the locking device in response to the locking device decrypting the encrypted user profile using the lock key to obtain the user key; generate an encrypted command using the security code received from the locking device and the user key, the encrypted command specifying an action to be performed by the locking device; and transmit the encrypted command to the locking device, wherein the locking device is configured to decrypt the encrypted command to generate a decrypted command to facilitate performing the action specified by the decrypted command. - View Dependent Claims (22)
-
Specification