Access control reader for secure handsfree access with mobile devices
First Claim
1. A device comprising:
- a wireless radio;
a non-transitory computer-readable medium storing a set of processor-executable instructions; and
one or more processors configured to execute the set of processor-executable instructions, wherein executing the set of processor-executable instructions causes the one or more processors to;
advertise an identifier a first distance corresponding to a coverage area of a wireless network generated by the wireless radio;
perform a first stage of a two-stage access control procedure based on a User Equipment (“
UE”
) entering within the first distance, wherein performing the first stage comprises processor-executable instructions to;
establish a connection with the UE via the wireless network based on a first set of messages exchanged between the UE and the device at a first time;
authorize the UE for access to a secured resource based on a second set of messages exchanged between the UE and the device over the connection at the first time while the UE is within the first distance from the device and outside a second distance from the device, wherein the second distance is less than the first distance;
maintain a plurality of connections with a plurality of UEs that are within the first distance from the device, wherein the plurality of connections comprises the connection established between the device and the UE;
perform a second stage of the two-stage access control procedure at a subsequent second time based on the UE entering within the second distance from the device, wherein performing the second stage comprises processor-executable instructions to;
detect, at the second time, distances between the device and the plurality of UEs;
select the connection that was previously established with the UE from the plurality of connections in response to detecting the distance of the UE to be within the second distance from the device at the second time;
provide an access request message to the UE at the second time using the connection that was previously established between the UE and the device in response to determining that the UE is authorized to access the secured resource as a result of the authorizing at the first time, and wherein the access request message comprises a unique code that grants access to the secured resource for a period of time;
provide access to the secured resource based on a response to the access request message provided by the UE over the connection, the response comprising the unique code.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure handsfree two-stage access control is provided via a first stage that is performed when a mobile device is within a first distance from an access control reader, and a second stage that is performed when the mobile device is within a second distance from the reader, wherein the second distance is less than the first distance. Performing the first stage includes establishing a secure connection between the mobile device and the reader, and authorizing access for the mobile device to a secured resource. Performing the second stage includes providing access to the secured resource when the mobile device has been authorized to access the secured resource during the first stage, and the mobile device enters within the second distance from the reader. The second stage may be triggered in response to the reader detecting a user gesture or action.
25 Citations
14 Claims
-
1. A device comprising:
-
a wireless radio; a non-transitory computer-readable medium storing a set of processor-executable instructions; and one or more processors configured to execute the set of processor-executable instructions, wherein executing the set of processor-executable instructions causes the one or more processors to; advertise an identifier a first distance corresponding to a coverage area of a wireless network generated by the wireless radio; perform a first stage of a two-stage access control procedure based on a User Equipment (“
UE”
) entering within the first distance, wherein performing the first stage comprises processor-executable instructions to;establish a connection with the UE via the wireless network based on a first set of messages exchanged between the UE and the device at a first time; authorize the UE for access to a secured resource based on a second set of messages exchanged between the UE and the device over the connection at the first time while the UE is within the first distance from the device and outside a second distance from the device, wherein the second distance is less than the first distance; maintain a plurality of connections with a plurality of UEs that are within the first distance from the device, wherein the plurality of connections comprises the connection established between the device and the UE; perform a second stage of the two-stage access control procedure at a subsequent second time based on the UE entering within the second distance from the device, wherein performing the second stage comprises processor-executable instructions to; detect, at the second time, distances between the device and the plurality of UEs; select the connection that was previously established with the UE from the plurality of connections in response to detecting the distance of the UE to be within the second distance from the device at the second time; provide an access request message to the UE at the second time using the connection that was previously established between the UE and the device in response to determining that the UE is authorized to access the secured resource as a result of the authorizing at the first time, and wherein the access request message comprises a unique code that grants access to the secured resource for a period of time; provide access to the secured resource based on a response to the access request message provided by the UE over the connection, the response comprising the unique code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
advertising an identifier a first distance from a device, the first distance corresponding to a coverage area of a wireless network; performing a first stage of a two-stage access control procedure based on a User Equipment (“
UE”
) entering within the first distance, wherein performing the first stage comprises;establishing a connection with the UE via the wireless network based on a first set of messages exchanged between the UE and the device at a first time; authorizing the UE for access to a secured resource based on a second set of messages exchanged between the UE and the device over the connection at the first time while the UE is within the first distance from the device and outside a second distance from the device, wherein the second distance is less than the first distance; and maintaining a plurality of connections with a plurality of UEs that are within the first distance from the device, wherein the plurality of connections comprises the connection established between the device and the UE; performing a second stage of the two-stage access control procedure at a subsequent second time based on the UE entering within the second distance from the device, wherein performing the second stage comprises; detecting, at the second time, distances between the device and the plurality of UEs; selecting the connection that was previously established with the UE from the plurality of connections in response to detecting the distance of the UE to be within the second distance from the device at the second time; providing an access request message to the UE at the second time using the connection that was previously established between the UE and the device in response to determining that the UE is authorized to access the secured resource as a result of the authorizing at the first time, and wherein the access request message comprises a unique code that grants access to the secured resource for a period of time; and providing access to the secured resource based on a response to the access request message provided by the UE over the connection, the response comprising the unique code.
-
Specification