Near field communication based key sharing techniques
First Claim
1. A computer-implemented method comprising:
- storing a plurality of keychains in a memory of one of a computer and a server, wherein each of the keychains is associated with one of a first plurality of mobile devices and comprises a plurality of keys, wherein each of the keys unlocks one or more physical locks;
receiving a login identifier and a password from a first mobile device via a control module of the one of the computer and the server;
verifying the login identifier and the password via the control module;
subsequent to the control module approving the login identifier and the password, downloading one of the plurality of keychains from the one of the computer and the server to the first mobile device, wherein the one of the plurality of keychains comprises N keys, where N is an integer greater than or equal to 1, and wherein each of the N keys is associated with one or more of M physical locks of M locking devices, where M is an integer greater than or equal to 1;
receiving a key sharing request from the first mobile device;
sharing keys of the one of the plurality of keychains with a second plurality of mobile devices based on a rank of the first mobile device and the key sharing request;
monitoring the M locking devices or another locking device not included in the M locking devices via a log update module;
recording information in a key log via a log update module when each of the N keys is used on one of the M locking devices or another locking device by one of the first plurality of mobile devices and the second plurality of mobile devices, wherein the information includes a mobile device identifier, a locking device identifier and a key identifier; and
alerting the first mobile device when each of the N keys is used via an alert module based on the key log including reporting to the first mobile device the mobile device identifier, the locking device identifier and the key identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented technique includes storing keychains in a memory of a computer. A login identifier and a password are received from a mobile device. The login identifier and the password are verified. Subsequent to the verification, one of the keychains is downloaded from the computer to the mobile device. The keychain includes N keys that are each associated with one of M physical locks of M locking devices, where N and M are integers greater than or equal to 1. The M locking devices or another locking device are monitored. Information in a key log is recorded when each of the N keys is used on one of the M locking devices or another locking device. The information includes a locking device identifier and a key identifier. The mobile device is alerted when each of the N keys is used based on the key log.
-
Citations
22 Claims
-
1. A computer-implemented method comprising:
-
storing a plurality of keychains in a memory of one of a computer and a server, wherein each of the keychains is associated with one of a first plurality of mobile devices and comprises a plurality of keys, wherein each of the keys unlocks one or more physical locks; receiving a login identifier and a password from a first mobile device via a control module of the one of the computer and the server; verifying the login identifier and the password via the control module; subsequent to the control module approving the login identifier and the password, downloading one of the plurality of keychains from the one of the computer and the server to the first mobile device, wherein the one of the plurality of keychains comprises N keys, where N is an integer greater than or equal to 1, and wherein each of the N keys is associated with one or more of M physical locks of M locking devices, where M is an integer greater than or equal to 1; receiving a key sharing request from the first mobile device; sharing keys of the one of the plurality of keychains with a second plurality of mobile devices based on a rank of the first mobile device and the key sharing request; monitoring the M locking devices or another locking device not included in the M locking devices via a log update module; recording information in a key log via a log update module when each of the N keys is used on one of the M locking devices or another locking device by one of the first plurality of mobile devices and the second plurality of mobile devices, wherein the information includes a mobile device identifier, a locking device identifier and a key identifier; and alerting the first mobile device when each of the N keys is used via an alert module based on the key log including reporting to the first mobile device the mobile device identifier, the locking device identifier and the key identifier.
-
-
2. A computer-implemented method comprising:
-
storing a plurality of keychains in a memory of one of a computer and a server, wherein each of the keychains comprises a plurality of keys, wherein each of the keys is unlocks one or more physical locks; receiving a login identifier and a password from a first mobile device via a control module of the one of the computer and the server; verifying the login identifier and the password via the control module; subsequent to the control module approving the login identifier and the password, downloading one of the plurality of keychains from the one of the computer and the server to the first mobile device, wherein the one of the plurality of keychains comprises N keys, where N is an integer greater than or equal to 1, and wherein each of the N keys is associated with one or more of M physical locks of M locking devices, where M is an integer greater than or equal to 1; monitoring the M locking devices or another locking device not included in the M locking devices via a log update module; recording information in a key log via a log update module when each of the N keys is used on one of the M locking devices or another locking device, wherein the information includes a locking device identifier and a key identifier; and alerting the first mobile device when each of the N keys is used via an alert module based on the key log including reporting to the first mobile device the locking device identifier and the key identifier. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification