Decoupled authorization for restricted resource access
First Claim
1. A method comprising:
- performing, via at least a first wireless message exchanged between a first device of a user and a second device of an access control system, a first authorization of the user to access a restricted resource under control of the access control system in response to detection of a first trigger;
performing, via at least a second wireless message exchanged between the first device and the second device, a different and independent second authorization of said user to access the restricted resource in response to detection of a different second trigger; and
modifying access to the restricted resource from the access control system in response to successfully completing said first authorization and said second authorization based on the first wireless message and the second wireless message being exchanged in response to different triggers.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for performing decoupled authorization, whereby authorizing access permissions of a user to a resource is performed separate and independent from authorizing intent of the user to access the resource. Once both authorizations are successfully completed within a specified timeout interval, the access state of the resource is changed, thereby granting the user access to the resource. The decoupled authorizations are independently performed over different networks, in response to different triggers, or by leveraging different hardware. Access to the resource can therefore be provided prior to the user arriving before the resource, with little to no action by the user, and without comprising security as the resources will remain restricted or locked if the either of the user'"'"'s intent or access permissions cannot be verified.
-
Citations
17 Claims
-
1. A method comprising:
-
performing, via at least a first wireless message exchanged between a first device of a user and a second device of an access control system, a first authorization of the user to access a restricted resource under control of the access control system in response to detection of a first trigger; performing, via at least a second wireless message exchanged between the first device and the second device, a different and independent second authorization of said user to access the restricted resource in response to detection of a different second trigger; and modifying access to the restricted resource from the access control system in response to successfully completing said first authorization and said second authorization based on the first wireless message and the second wireless message being exchanged in response to different triggers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
performing a first authorization of a user to access a restricted resource under control of an access control system based on at least a first message exchanged between a first device of the user and a local second device of the access control system that is disposed next to the restricted resource in response to detecting a first user action or a first network with a first sensor of one of the first device or the local second device; performing a different and independent second authorization of said user to access the restricted resource based on at least a second message exchanged between the first device and a remote third device of the access control system that is located away from the restricted resource in response to detecting a second user action or a second network with a different second sensor of one of the first device or the remote third device; and modifying access to the restricted resource from the access control system in response to successfully completing said first authorization and said second authorization based on the first wireless message and the second wireless message being exchanged in response to the different user actions or networks. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An access control system comprising:
-
a restricted resource; and a system device comprising; a non-transitory computer-readable medium storing a set of processor-executable instructions; and one or more processors configured to execute the set of processor-executable instructions, wherein executing the set of processor-executable instructions causes the one or more processors to; perform, via at least a first wireless message exchanged between the system device and a user device of a user, a first authorization of the user to access the restricted resource in response to detection of a first trigger; perform, via at least a second wireless message exchanged between the system device and the user device, a different and independent second authorization of said user to access the restricted resource in response to detection of a different second trigger; and modify access to the restricted resource in response to successfully completing said first authorization and said second authorization based on the first wireless message and the second wireless message being exchanged in response to different triggers.
-
Specification