Method and system for controlling networked wireless locks
First Claim
Patent Images
1. A system comprising:
- a mobile device;
a lock device having a lock identification, and configured to communicate wirelessly with the mobile device; and
a server having access to a database wherein (a) a key is associated with said lock identification and (b) said lock identification is associated with at least one authorized user of said lock device, the server is configured to receive from the mobile device said lock identification and a user identification and to transmit the key associated with the lock identification when the user identification corresponds to an authorized user associated with said lock identification.
1 Assignment
0 Petitions
Accused Products
Abstract
A system including a mobile device; a lock device having a lock identification, and configured to communicate wirelessly with the mobile device; and a server having access to a database wherein (a) a key is associated with said lock identification and (b) said lock identification is associated with at least one authorized user of said lock device, the server is configured to receive from the mobile device said lock identification and a user identification and to transmit the key associated with the lock identification when the user identification corresponds to an authorized user associated with said lock identification.
-
Citations
20 Claims
-
1. A system comprising:
-
a mobile device;
a lock device having a lock identification, and configured to communicate wirelessly with the mobile device; and
a server having access to a database wherein (a) a key is associated with said lock identification and (b) said lock identification is associated with at least one authorized user of said lock device, the server is configured to receive from the mobile device said lock identification and a user identification and to transmit the key associated with the lock identification when the user identification corresponds to an authorized user associated with said lock identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented method comprising the steps of:
-
associating a key with a lock identification of a wireless lock device;
associating the lock identification with at least one authorized user of said wireless lock device, receiving data identifying a user and the wireless lock device;
determining from the data whether the user is authorized to control the wireless lock device; and
transmitting the key associated with the lock identification when the user identification corresponds to an authorized user associated with said lock identification. - View Dependent Claims (10, 11, 12, 13, 14, 20)
-
-
15. A computer readable medium containing program instructions for executing on a computer, which when executed by the computer, cause the computer to perform the steps of
associating a key with a lock identification of a wireless lock device; -
associating the lock identification with at least one authorized user of said wireless lock device, receiving data identifying a user and the wireless lock device;
determining from the data whether the user is authorized to control the wireless lock device; and
transmitting the key associated with the lock identification when the user identification corresponds to an authorized user associated with said lock identification. - View Dependent Claims (16, 17, 18, 19)
-
Specification