SYSTEMS AND METHODS FOR CONTROLLING IN-ROOM SAFES WITH NFC-ENABLED DEVICES
First Claim
Patent Images
1. An in-room safe, comprising:
- an access control module configured to exchange communications with a mobile communication device via the Near Field Communications (NFC) protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems and devices for employing the Near Field Communications (NFC) protocol are described. Specifically, a safe or similar in-room security device is configured to exchange communications with one or more NFC-enabled devices in accordance with the NFC protocol. Based on the exchange of information with the NFC-enabled devices, the safe is configured to make one or more access control decisions.
18 Citations
20 Claims
-
1. An in-room safe, comprising:
an access control module configured to exchange communications with a mobile communication device via the Near Field Communications (NFC) protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method, comprising:
-
determining that a user has presented a Near Field Communications (NFC)-enabled communication device to an in-room safe; and determining whether the NFC-enabled communication device was presented to a different access control device associated with the room in which the in-room safe is located; and conditioning admission to the in-room safe on the determination of whether the NFC-enabled communication device was presented to the different access control device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A hotel room security system, comprising:
-
a first access control device positioned in proximity to a door separating a hotel room from a public area of the hotel; and a second access control device positioned within the hotel room and configured to restrict access to an asset contained within the hotel room, wherein the second access control device is configured to condition access to the asset based on whether or not an access credential was presented to and validated by the first access control device prior to being presented to the second access control device. - View Dependent Claims (19, 20)
-
Specification