NEAR FIELD COMMUNICATION BASED KEY SHARING TECHNIQUES
First Claim
1. A computer-implemented method comprising:
- remotely logging into one of a computer and a server via a control module of a first mobile device, wherein the logging into the one of the computer and the server comprises entering a unique identifier and a password;
subsequent to the computer or the server approving the password based on the unique identifier, downloading a keychain from one of the computer and the server to a memory of the first mobile device, wherein the keychain comprises N keys, where N is an integer greater than 1, and wherein each of the N keys is unlocks one or more of M physical locks, wherein M is an integer greater than or equal to 1; and
transferring one of the N keys from the first mobile device to a locking device using near field communication to unlock one of the M physical locks.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented technique includes storing keychains in a memory of a computer. A login identifier and a password are received from a mobile device. The login identifier and the password are verified. Subsequent to the verification, one of the keychains is downloaded from the computer to the mobile device. The keychain includes N keys that are each associated with one of M physical locks of M locking devices, where N and M are integers greater than or equal to 1. The M locking devices or another locking device are monitored. Information in a key log is recorded when each of the N keys is used on one of the M locking devices or the other locking device. The information includes a locking device identifier and a key identifier. The mobile device is alerted when each of the N keys is used based on the key log.
-
Citations
21 Claims
-
1. A computer-implemented method comprising:
-
remotely logging into one of a computer and a server via a control module of a first mobile device, wherein the logging into the one of the computer and the server comprises entering a unique identifier and a password; subsequent to the computer or the server approving the password based on the unique identifier, downloading a keychain from one of the computer and the server to a memory of the first mobile device, wherein the keychain comprises N keys, where N is an integer greater than 1, and wherein each of the N keys is unlocks one or more of M physical locks, wherein M is an integer greater than or equal to 1; and transferring one of the N keys from the first mobile device to a locking device using near field communication to unlock one of the M physical locks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method comprising:
-
receiving a unique identifier and a first key from a first mobile device via a lock control module of the locking device near field communication, wherein the first key is one of a plurality of keys in a keychain stored in the first mobile device; determining whether the first key is a trusted key or a restricted key via a lock control module; unlocking a physical lock when the first key is a trusted key via the lock control module; requesting verification information from the first mobile device when the first key is a restricted key via a key verification module; verifying the first key and the verification information via the key verification module; and unlocking the physical lock when the first key and the verification information are valid via the lock control module. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification