WIRELESS COMMUNICATION PROTOCOL BASED LOCK MANAGEMENT
First Claim
Patent Images
1. A method for enhancing physical security, the method comprising:
- monitoring, by one or more processors, a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person;
receiving, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock;
comparing, by one or more processors, the first set of information to a predefined rule, wherein the predefined rule specifies whether the disengaged lock can be engaged;
determining, by one or more processors, that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for enhancing physical security, a processor receives, via a wireless communication protocol, a first set of information from a first device associated with a first person. A processor compares the first set of information to a predefined rule, wherein the predefined rule specifies whether a lock can be engaged. A processor determines that the lock cannot be engaged, based on the first information and the predefined rule.
-
Citations
20 Claims
-
1. A method for enhancing physical security, the method comprising:
-
monitoring, by one or more processors, a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person; receiving, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock; comparing, by one or more processors, the first set of information to a predefined rule, wherein the predefined rule specifies whether the disengaged lock can be engaged; determining, by one or more processors, that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for enhancing physical security, the computer program product comprising:
-
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive, via a wireless communication protocol, a first set of information from a first device associated with a first person; program instructions to compare the first set of information to a predefined rule, wherein the predefined rule specifies whether a lock can be engaged; program instructions to determine that the lock cannot be engaged, based on the first information and the predefined rule. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for enhancing physical security, the computer system comprising:
-
one or more computer processors, one or more computer readable storage media, and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to receive, via a wireless communication protocol, a first set of information from a first device associated with a first person; program instructions to compare the first set of information to a predefined rule, wherein the predefined rule specifies whether a lock can be engaged; program instructions to determine that the lock cannot be engaged, based on the first information and the predefined rule. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification