Systems and methods for controlling a locking mechanism using a portable electronic device
First Claim
Patent Images
1. A non-transitory computer readable medium storing instructions thereon that, when executed by a processor, cause the processor to perform operations comprising:
- at a third party web service;
receiving a first request from a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock;
communicating a second request for the second network enabled device to control the lock from the third party web service to a locking system web service via a standardized set of commands;
receiving, via the standardized set of commands, approval from the locking system web service of a first network enabled device associated with the authorized user for the second network enabled device to control the lock;
receiving a third request from the second network enabled device to change a position of a deadbolt of the lock; and
communicating, via the standardized set of commands, a command from the third-party web service to the locking system web service to change the position of the deadbolt of the lock in response to the third request, the command configured to cause the locking system web service to facilitate an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device.
-
Citations
7 Claims
-
1. A non-transitory computer readable medium storing instructions thereon that, when executed by a processor, cause the processor to perform operations comprising:
at a third party web service; receiving a first request from a second network enabled device to control a lock, the first request including information regarding the lock, information regarding an authorized user of the lock, or information regarding both the lock and the authorized user of the lock; communicating a second request for the second network enabled device to control the lock from the third party web service to a locking system web service via a standardized set of commands; receiving, via the standardized set of commands, approval from the locking system web service of a first network enabled device associated with the authorized user for the second network enabled device to control the lock; receiving a third request from the second network enabled device to change a position of a deadbolt of the lock; and communicating, via the standardized set of commands, a command from the third-party web service to the locking system web service to change the position of the deadbolt of the lock in response to the third request, the command configured to cause the locking system web service to facilitate an encrypted radio transmission to the lock that triggers the change of position of the deadbolt of the lock. - View Dependent Claims (2, 3, 4, 5, 6, 7)
Specification