TECHNOLOGIES AND METHODS FOR SECURITY ACCESS
First Claim
1. At a mobile computer system including one or more processors and system memory, a method for providing an unlock code for a lock, the method comprising:
- receiving a lock identifier for a lock;
receiving a user identifier identifying a user of the mobile computer system;
sending the lock identifier and the user identifier to a remote computer system;
based on sending the lock identifier and the user identifier to the remote computer system, receiving an access code for the lock.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments herein are directed security access. Embodiments include an electronic lock that executes a time-based cryptographic algorithm to compute a time-based access code. The electronic lock compares the time-based access code with a received access code, and grants access to one or more lock features when the time-based access code matches the received access code. Embodiments also include providing an unlock code, including receiving a lock identifier and a user identifier. The lock identifier and the user identifier are sent to a remote computer system, and an access code for the lock is received from the remote computer system. Embodiments also include an electronic lock that receives and verifies an access code that includes a validity start time and a validity end time. When the current time is within the validity start time and the validity end time, the electronic lock grants access to one or more lock features.
158 Citations
20 Claims
-
1. At a mobile computer system including one or more processors and system memory, a method for providing an unlock code for a lock, the method comprising:
-
receiving a lock identifier for a lock; receiving a user identifier identifying a user of the mobile computer system; sending the lock identifier and the user identifier to a remote computer system; based on sending the lock identifier and the user identifier to the remote computer system, receiving an access code for the lock. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An electronic lock, comprising:
-
one or more processors that are configured to; execute a time-based cryptographic algorithm to compute a time-based access code; compare the time-based access code with a received access code; and grant access to one or more lock features when the time-based access code matches the received access code; a machine-readable optical identifier that encodes at least a lock identifier of the electronic lock; and an input device configured to receive an access code and communicate the access code to the one or more processors. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An electronic lock, comprising:
-
one or more processors that are configured to; receive an access code that includes a validity start time and a validity end time; verify authenticity of the received access code; determine if a current time is within the validity start time and the validity end time; and when the current time is within the validity start time and the validity end time, grant access to one or more lock features; and an input device configured to receive the access code and communicate the access code to the one or more processors. - View Dependent Claims (18, 19, 20)
-
Specification