Systems and methods for controlling a locking mechanism using a portable electronic device
First Claim
Patent Images
1. A method of operating a lock, the method comprising:
- at a third party web service;
receiving a first request from a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock;
communicating a second request for the second network enabled device to control the lock from the third party web service to a locking system web service via a standardized set of commands;
receiving, via the standardized set of commands, approval from the locking system web service of a first network enabled device associated with the authorized user for the second network enabled device to control the lock;
receiving a third request from the second network enabled device to change a position of a deadbolt of the lock; and
communicating, via the standardized set of commands, a command from the third-party web service to the locking system web service to change the position of the deadbolt of the lock in response to the third request, the command configured to cause the locking system web service to facilitate an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device.
-
Citations
22 Claims
-
1. A method of operating a lock, the method comprising:
at a third party web service; receiving a first request from a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock; communicating a second request for the second network enabled device to control the lock from the third party web service to a locking system web service via a standardized set of commands; receiving, via the standardized set of commands, approval from the locking system web service of a first network enabled device associated with the authorized user for the second network enabled device to control the lock; receiving a third request from the second network enabled device to change a position of a deadbolt of the lock; and communicating, via the standardized set of commands, a command from the third-party web service to the locking system web service to change the position of the deadbolt of the lock in response to the third request, the command configured to cause the locking system web service to facilitate an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method of operating a lock, the method comprising:
at a locking system web service; receiving, via a standardized set of commands, a first request from a third party web service for a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock; communicating a second request from the locking system web service to a first network enabled device associated with the authorized user for the second network enabled device to control the lock; receiving approval from the first network enabled device for the second network enabled device to control the lock; communicating, via the standardized set of commands, approval to the third party web service for the second network enabled device to control the lock; receiving, via the standardized set of commands, a command from the third-party web service to change a position of a deadbolt of the lock; and facilitating an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
16. A non-transitory computer readable medium storing instructions thereon that, when executed by a processor, cause the processor to perform operations comprising:
at a locking system web service; receiving, via a standardized set of commands, a first request from a third party web service for a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock; communicating a second request from the locking system web service to a first network enabled device associated with the authorized user for the second network enabled device to control the lock; receiving approval from the first network enabled device for the second network enabled device to control the lock; communicating, via the standardized set of commands, approval to the third party web service for the second network enabled device to control the lock; receiving, via the standardized set of commands, a command from the third-party web service to change a position of a deadbolt of the lock; and facilitating an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock. - View Dependent Claims (17, 18, 19, 20, 21, 22)
Specification