Remote access authentication and authorization
First Claim
Patent Images
1. A system for controlling access to a physical location, the system comprising:
- a data store storing specific computer-executable instructions; and
one or more computer processors in communication with the data store, wherein the one or more computer processors are configured to execute the specific computer-executable instructions to cause the system to at least;
receive, via a first network from a first communication device, information identifying an item;
transmit, via the first network to the first communication device, a unique identifier of a sensor at a physical location where the item is to be delivered;
receive, from the first network from the first communication device, a request to access the physical location, wherein said request is generated in response to determining, by the first communication device, that an identifier broadcast by the sensor corresponds to the unique identifier;
determine that the sensor is activated for sensing at the physical location; and
cause the sensor to transmit, via a second network, a release message to a security device to permit access to the physical location.
0 Assignments
0 Petitions
Accused Products
Abstract
Features are disclosed for accurately authenticating a delivery agent for unattended delivery of an item. The systems and methods described confirm the location of the delivery agent and proximity to the delivery location using short range wireless communications between a monitoring device at the delivery location and a communication device associated with the delivery agent. Access may also be conditioned on user specified “do not disturb” rules indicating when remote access is authorized. The authentication may be dynamically assessed such as based on a type of item being delivered.
12 Citations
20 Claims
-
1. A system for controlling access to a physical location, the system comprising:
-
a data store storing specific computer-executable instructions; and one or more computer processors in communication with the data store, wherein the one or more computer processors are configured to execute the specific computer-executable instructions to cause the system to at least; receive, via a first network from a first communication device, information identifying an item; transmit, via the first network to the first communication device, a unique identifier of a sensor at a physical location where the item is to be delivered; receive, from the first network from the first communication device, a request to access the physical location, wherein said request is generated in response to determining, by the first communication device, that an identifier broadcast by the sensor corresponds to the unique identifier; determine that the sensor is activated for sensing at the physical location; and cause the sensor to transmit, via a second network, a release message to a security device to permit access to the physical location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of controlling access to a physical location, the computer-implemented method comprising:
-
under control of one or more computing devices executing specific computer-executable instructions, receiving, from a first communication device, information identifying an item to be deposited at a physical location; transmitting, to the first communication device, a unique identifier of an access sensor at the physical location; receiving, from the first communication device, a request to access the physical location, wherein the request includes the information identifying the item and the unique identifier, and wherein said request is generated in response to determining, by the first communication device, that an identifier broadcast by the sensor corresponds to the unique identifier; determining that the access sensor is activated for sensing at the physical location; and causing the access sensor to transmit a release message to a security device to permit access to the physical location. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification