Please download the dossier by clicking on the dossier button x
×

Near field communication based key sharing techniques

  • US 8,410,898 B1
  • Filed: 08/16/2012
  • Issued: 04/02/2013
  • Est. Priority Date: 08/16/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • storing a plurality of keychains in a memory of one of a computer and a server, wherein each of the keychains is associated with one of a first plurality of mobile devices and comprises a plurality of keys, wherein each of the keys unlocks one or more physical locks;

    receiving a login identifier and a password from a first mobile device via a control module of the one of the computer and the server;

    verifying the login identifier and the password via the control module;

    subsequent to the control module approving the login identifier and the password, downloading one of the plurality of keychains from the one of the computer and the server to the first mobile device, wherein the one of the plurality of keychains comprises N keys, where N is an integer greater than or equal to 1, and wherein each of the N keys is associated with one or more of M physical locks of M locking devices, where M is an integer greater than or equal to 1;

    receiving a key sharing request from the first mobile device;

    sharing keys of the one of the plurality of keychains with a second plurality of mobile devices based on a rank of the first mobile device and the key sharing request;

    monitoring the M locking devices or another locking device not included in the M locking devices via a log update module;

    recording information in a key log via a log update module when each of the N keys is used on one of the M locking devices or another locking device by one of the first plurality of mobile devices and the second plurality of mobile devices, wherein the information includes a mobile device identifier, a locking device identifier and a key identifier; and

    alerting the first mobile device when each of the N keys is used via an alert module based on the key log including reporting to the first mobile device the mobile device identifier, the locking device identifier and the key identifier.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×