Electronic access control and location tracking system
First Claim
1. An electronic method for granting access from a remote location to an individual located at an access point of a controlled access area when the individual is located at a closed entrance for the controlled access area, said method comprising the steps of:
- (a) electronically receiving one or more digital keys from an access control computer system by a portable electronic device of a first party, each of said one or more digital keys providing access for the first party to an associated access point of a controlled access area;
(b) electronically storing the digital key to an electronic keychain database contained within the portable electronic device;
(c) electronically determining by the portable electronic device which digital key from one or more digital keys stored in the electronic keychain database is needed by the first party for accessing to a specific access point of a controlled access area;
(d) wirelessly transmitting the digital key determined in step (c) by the portable electronic device to one or more beacons located in an immediate proximity to a closed entrance for the controlled access area for sending of the digital key by the one or more beacons to the access control computer system in order for granting of access by the access control computer system.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allows for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest'"'"'s electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest'"'"'s smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.
-
Citations
27 Claims
-
1. An electronic method for granting access from a remote location to an individual located at an access point of a controlled access area when the individual is located at a closed entrance for the controlled access area, said method comprising the steps of:
-
(a) electronically receiving one or more digital keys from an access control computer system by a portable electronic device of a first party, each of said one or more digital keys providing access for the first party to an associated access point of a controlled access area; (b) electronically storing the digital key to an electronic keychain database contained within the portable electronic device; (c) electronically determining by the portable electronic device which digital key from one or more digital keys stored in the electronic keychain database is needed by the first party for accessing to a specific access point of a controlled access area; (d) wirelessly transmitting the digital key determined in step (c) by the portable electronic device to one or more beacons located in an immediate proximity to a closed entrance for the controlled access area for sending of the digital key by the one or more beacons to the access control computer system in order for granting of access by the access control computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An electronic system for controlling access by an individual located at an access point of a controlled access area for a location, said system comprising:
-
an access control computer specifically programmed to monitor, grant and deny access authorizations for one or more access points of a controlled access area for a location; an access control electronic database storing access permissions for one or more individuals, said access control electronic database in electronic communication with the access control computer; at least one beacon located in the proximity of a controlled access area;
said at least one beacon in electronic communication with the access control computer; anda portable electronic device specifically programmed with a software application for processing or retaining access permissions for a particular individual from the one or more individuals, said access permissions in the form of one or more digital keys and said portable electronic device specifically programmed to determine which specific digital key to select from the one or more digital keys based on information received from the at least one beacon associated with a specific access point that the particular individual seeks entry at, said portable electronic device carried by or on the person of the particular individual when the particular individual seeks access to an access point of the controlled access area; wherein when the particular individual is in range of the at least one beacon, said portable electronic device is programmed to receive a signal from the a particular beacon of said at least one beacon associated with a particular access point for the controlled access area and in response said portable electronic device is programmed to determine which specific digital key from the one or more digital keys is associated with the particular beacon and the portable electronic device is programmed to transmit the specific digital key to the particular beacon and said particular beacon is programmed to transmit the specific digital key to the access control computer which based on information stored in the access control electronic database is programmed to determine whether or not to grant access to the particular individual for the controlled access area. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An electronic method for determining whether an individual has arrived at an authorized location within a controlled access area within a certain time period after being granted access into the controlled access area, said method comprising the steps of:
-
(a) electronically receiving a digital key wirelessly transmitted from a portable electronic device of a particular individual who has been granted access into controlled access area by an access control computer system, the access control computer system is in electronic communication with one or more beacons placed throughout the controlled access area; (b) wirelessly transmitting the digital key by the one or more beacons to the access control computer system; (c) obtaining by the access control computer system from an access control electronic database location information of each beacon who transmits the digital key which is stored in the access control electronic database; (d) reviewing information stored in the access control electronic database for the digital key by the access control computer system to identify a final authorized location for the particular individual within the controlled access area; and (e) determining by the access control computer system whether the particular individual has reached the final authorized location within a preconfigured period of time based on a programmed locations of the beacons which transmit the digital key to the access control computer system. - View Dependent Claims (20, 21, 22)
-
-
23. An electronic method for providing access to a controlled access area with the use of a digital access key, said method comprising the steps of:
-
(a) electronically receiving an electronic request by an access control computer system from an electronic device of a first party for a digital access key to be generated for allowing access to a controlled access area; (b) electronically reviewing access permissions or privileges information for the first party previously stored in an access control electronic database by the access control computer system; (c) if proper access permissions or privileges for the first party are determined by the access control computer system from the review in step (b), electronically creating a digital access key by the access control computer system for providing access to a controlled access area; and (d) electronically forwarding the digital access key to the electronic device of the first party or an electronic device of a second party. - View Dependent Claims (24, 25, 26, 27)
-
Specification