Associating a user identity to a wireless signal based on information received at a physical access point
First Claim
1. A method comprising the computer-implemented steps of:
- providing a secured physical area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device;
receiving a set of user credentials from an authentication device at the access control point of the secured physical area;
authenticating an identity of a user by verifying the set of user credentials;
receiving a set of wireless signals;
comparing a relative strength of each wireless signal simultaneously with the receiving the set of user credentials;
associating one or more of the set of wireless signals with the user based on the set of user credentials and the strength of the one or more of the set of wireless signals being stronger than others of the set of wireless signals when the set of user credentials are received;
broadcasting the one or more of the set of wireless signals along with information about the user;
enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals;
receiving another wireless signal; and
allowing the user access to the secured physical area when it is determined that the received another wireless signal is a match to a machine access control (MAC) address of the one or more of the set of wireless signals associated with the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
-
Citations
14 Claims
-
1. A method comprising the computer-implemented steps of:
-
providing a secured physical area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device; receiving a set of user credentials from an authentication device at the access control point of the secured physical area; authenticating an identity of a user by verifying the set of user credentials; receiving a set of wireless signals; comparing a relative strength of each wireless signal simultaneously with the receiving the set of user credentials; associating one or more of the set of wireless signals with the user based on the set of user credentials and the strength of the one or more of the set of wireless signals being stronger than others of the set of wireless signals when the set of user credentials are received; broadcasting the one or more of the set of wireless signals along with information about the user; enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receiving another wireless signal; and allowing the user access to the secured physical area when it is determined that the received another wireless signal is a match to a machine access control (MAC) address of the one or more of the set of wireless signals associated with the user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for associating a user identity to a wireless signal based on information received at an access point, the system comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to a wireless signal identifier via the bus that when executing the instructions causes the system to; provide a secured physical area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device; receive a set of user credentials from an authentication device at the access control point of the secured physical area; authenticate an identity of a user by verifying the set of user credentials; receive a set of wireless signals; compare a relative strength of each wireless signal simultaneously with the receiving the set of user credentials; associate one or more of the set of wireless signals with the user based on the set of user credentials and the strength of the one or more of the set of wireless signals being stronger than others of the set of wireless signals when the set of user credentials are received; broadcast the one or more of the set of wireless signals along with information about the user; enable the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receive another wireless signal; and allow the user access to the secured physical area when it is determined that the received another wireless signal is a match to a machine access control (MAC) address of the one or more of the set of wireless signals associated with the user. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-readable hardware storage device storing computer instructions, which when executed, enables a computer system to associate a user identity to a wireless signal based on information received at an access point, the computer instructions comprising:
-
providing a secured physical area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device; receiving a set of user credentials from an authentication device at the access control point of the secured physical area; authenticating an identity of a user by verifying the set of user credentials; receiving a set of wireless signals; comparing a relative strength of each wireless signal simultaneously with the receiving the set of user credentials; associating one or more of the set of wireless signals with the user based on the set of user credentials and the strength of the one or more of the set of wireless signals being stronger than others of the set of wireless signals when the set of user credentials are received; broadcasting the one or more of the set of wireless signals along with information about the user; enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receiving another wireless signal; and allowing the user access to the secured physical area when it is determined that the received another wireless signal is a match to a machine access control (MAC) address of the one or more of the set of wireless signals associated with the user. - View Dependent Claims (12, 13, 14)
-
Specification