Secondary Short-Range Wireless Assist for Wireless-Based Access Control
First Claim
1. A method comprising:
- receiving, at an access control system comprising a processor, a first identifier via a near field communication reader associated with an entryway to an area, wherein the near field communication reader receives the first identifier from a near field communication component of a mobile device;
receiving, at the access control system, a second identifier via a wireless transceiver associated with the area, wherein the wireless transceiver associated with the area receives the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway; and
determining, by the access control system, that the first identifier and the second identifier constitute an authentication pair, the authentication pair identifying the mobile device as being authenticated to access the area.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies disclosed herein are directed to secondary short-range wireless assist for wireless-based access control. According to one aspect, a method can include receiving, at an access control system, a first identifier via a near-field communications (“NFC”) reader associated with an entryway to an area. The NFC reader can receive the first identifier from an NFC component of a mobile device. The method can include receiving, at the access control system, a second identifier via a wireless transceiver associated with the area. The wireless transceiver associated with the area can receive the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway. The method can also include determining, by the access control system, that the first identifier and the second identifier constitute an authentication pair that identifies the mobile device as being authenticated to access the area.
28 Citations
20 Claims
-
1. A method comprising:
-
receiving, at an access control system comprising a processor, a first identifier via a near field communication reader associated with an entryway to an area, wherein the near field communication reader receives the first identifier from a near field communication component of a mobile device; receiving, at the access control system, a second identifier via a wireless transceiver associated with the area, wherein the wireless transceiver associated with the area receives the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway; and determining, by the access control system, that the first identifier and the second identifier constitute an authentication pair, the authentication pair identifying the mobile device as being authenticated to access the area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An access control system comprising:
-
a processor; and a memory that stores computer-readable instructions that, when executed by the processor, cause the processor to perform operations comprising receiving a first identifier via a near field communication reader associated with an entryway to an area, wherein the near field communication reader receives the first identifier from a near field communication component of a mobile device, receiving a second identifier via a wireless transceiver associated with the area, wherein the wireless transceiver associated with the area receives the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway, and determining that the first identifier and the second identifier constitute an authentication pair, the authentication pair identifying the mobile device as being authenticated to access the area. - View Dependent Claims (11, 12, 13, 15, 16)
-
-
14. The access control system of claim 14, wherein the operations further comprise storing a flag in association with the further mobile device and the further user in a user database.
-
17. A computer-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a first identifier via a near field communication reader associated with an entryway to an area, wherein the near field communication reader receives the first identifier from a near field communication component of a mobile device; receiving a second identifier via a wireless transceiver associated with the area, wherein the wireless transceiver associated with the area receives the second identifier from a wireless communication component of the mobile device after the mobile device has entered the area through the entryway; and determining that the first identifier and the second identifier constitute an authentication pair, the authentication pair identifying the mobile device as being authenticated to access the area. - View Dependent Claims (18, 19, 20)
-
Specification