×

Near field communication based key sharing techniques

  • US 9,384,613 B2
  • Filed: 08/16/2012
  • Issued: 07/05/2016
  • Est. Priority Date: 08/16/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • remotely logging into one of a computer and a server via a control module of a mobile computing device;

    subsequent to the logging into the one of the computer and the server, downloading, to a memory of the mobile computing device, a keychain from one of the computer and the server, wherein the keychain comprises N keys, where N is an integer greater than or equal to 1, and wherein each of the N keys unlocks one or more of M physical locks, wherein M is an integer greater than or equal to 1, wherein each particular key of the N keys is assigned a rank that restricts;

    (i) use of the particular key, or (ii) sharing of the particular key with another mobile device, each rank comprising one of;

    a first rank that corresponds to unlimited use and unlimited sharing of the particular key;

    a second rank that corresponds to unlimited use and limited sharing of the particular key; and

    a third rank that corresponds to limited use and limited sharing of the particular key;

    transferring, from the mobile computing device, one of the N keys to a locking device using short range wireless communication to unlock one of the M physical locks, the locking device being associated with a restricted area; and

    transmitting, from the mobile computing device, user preferences of a user associated with the mobile computing device to at least one of the locking device and the one of the computer and the server, the user preferences being associated with one or more settings of the restricted area,wherein receipt of the one or more settings results in adjustment of the restricted area in accordance with the one or more settings.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×