METHODS AND APPARATUS FOR USING VISIBLE LIGHT COMMUNICATIONS FOR CONTROLLING ACCESS TO AN AREA
First Claim
1. A method of operating a mobile wireless communications device comprising:
- receiving, in a visible light communications signal, identification information corresponding to an access device located in a vicinity of a visible light transmitter emitting said visible light communications signal;
generating a value based on said received identification information and a unique identifier corresponding to said mobile wireless communications device; and
transmitting said generated value to an access authorization device in a control message used to trigger unlocking of said access device associated with the received identification information by said access authorization device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for controlling access to secure areas are described. Time varying values are generated from access device identifiers, e.g., door identifiers. The time varying value, e.g., a hashed door identifier value, is transmitted as a VLC signal by a luminaire near the door to which the hashed identifier corresponds. A mobile detects the transmitted hashed door identifier value and sends an access request via a wireless signal, e.g., a radio signal. The access request includes a value generated from the received hashed door identifier and a mobile device identifier. A control device determines, from information in the access request and stored information indicating which mobile devices have authority to access which doors, if access should be granted to the door corresponding to the hashed access device identifier from which the received information was generated. The received information may be hash of the mobile identifier and hashed door identifier.
49 Citations
30 Claims
-
1. A method of operating a mobile wireless communications device comprising:
-
receiving, in a visible light communications signal, identification information corresponding to an access device located in a vicinity of a visible light transmitter emitting said visible light communications signal; generating a value based on said received identification information and a unique identifier corresponding to said mobile wireless communications device; and transmitting said generated value to an access authorization device in a control message used to trigger unlocking of said access device associated with the received identification information by said access authorization device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A mobile wireless communications device, comprising:
-
means for receiving, in a visible light communications signal, identification information corresponding to an access device located in a vicinity of a visible light transmitter emitting said visible light communications signal; means for generating a value based on said received identification information and a unique identifier corresponding to said mobile wireless communications device; and means for transmitting said generated value to an access authorization device in a control message used to trigger unlocking of said access device associated with the received identification information by said access authorization device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A mobile wireless communications device, comprising:
-
at least one processor configured to; receive, in a visible light communications signal, identification information corresponding to an access device located in a vicinity of a visible light transmitter emitting said visible light communications signal; generate a value based on said received identification information and a unique identifier corresponding to said mobile wireless communications device; and transmit said generated value to an access authorization device in a control message used to trigger unlocking of said access device associated with the received identification information by said access authorization device; and a memory coupled to said at least one processor. - View Dependent Claims (12, 13, 14)
-
-
15. A computer program product for use in a mobile wireless communications device, the computer program product comprising:
a non-transitory computer readable medium comprising; code for causing at least one computer to receive, in a visible light communications signal, identification information corresponding to an access device located in a vicinity of a visible light transmitter emitting said visible light communications signal; code for causing said at least one computer to generate a value based on said received identification information and a unique identifier corresponding to said mobile wireless communications device; and code for causing said at least one computer to transmit said generated value to an access authorization device in a control message used to trigger unlocking of said access device associated with the received identification information by said access authorization device.
-
16. A method of operating an access authorization device, the method comprising:
-
storing a plurality of unique identifiers corresponding to mobile wireless communications devices authorized to control an access device used to control access to an area; receiving a hashed value from a mobile wireless communications device, said hashed value having been generated from identification information corresponding to said access device and a unique identifier corresponding to said mobile wireless communications device seeking to trigger unlocking of said access device; determining if the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device; and unlocking said access device after determining that the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. An access authorization device, comprising:
-
means for storing a plurality of unique identifiers corresponding to mobile wireless communications devices authorized to control an access device used to control access to an area; means for receiving a hashed value from a mobile wireless communications device, said hashed value having been generated from identification information corresponding to said access device and a unique identifier corresponding to said mobile wireless communications device seeking to trigger unlocking of said access device; means for determining if the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device; and means for unlocking said access device after determining that the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device. - View Dependent Claims (23, 24, 25, 26)
-
-
27. An access authorization device, comprising:
-
a memory; and at least one processor configured to; store, in said memory, a plurality of unique identifiers corresponding to mobile wireless communications devices authorized to control an access device used to control access to an area; receive a hashed value from a mobile wireless communications device, said hashed value having been generated from identification information corresponding to said access device and a unique identifier corresponding to said mobile wireless communications device seeking to trigger unlocking of said access device; determine if the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device; and unlock said access device after determining that the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device. - View Dependent Claims (28, 29)
-
-
30. A computer program product for use in an access authorization device, the computer program product comprising:
a non-transitory computer readable medium comprising; code for causing at least one computer to store a plurality of unique identifiers corresponding to mobile wireless communications devices authorized to control an access device used to control access to an area; code for causing said at least one computer to receive a hashed value from a mobile wireless communications device, said hashed value having been generated from identification information corresponding to said access device and a unique identifier corresponding to said mobile wireless communications device seeking to trigger unlocking of said access device; code for causing said at least one computer to determine if the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device; and code for causing said at least one computer to unlock said access device after determining that the received hashed value was generated from one of said plurality of stored unique identifiers corresponding to mobile wireless communications devices authorized to control said access device and identification information corresponding to said access device.
Specification