Electronic lock authentication method and system
First Claim
1. A method of authenticating a lock system, comprising:
- issuing via an electronic lock an advertisement indicating a presence of the electronic lock to a cellular phone, wherein the issuing is performed while the electronic lock is in a low power sleep state;
scanning via the cellular phone for the advertisement, wherein the scanning is performed when the cellular phone is in a low power scan mode;
initiating wireless communication by the cellular phone with the electronic lock, wherein the initiating is performed in response to the cellular phone determining that the electronic lock is in a specified range;
transmitting an encrypted lock identification from the electronic lock to the cellular phone after initiating the wireless communication;
transmitting the encrypted lock identification and an encrypted phone identification from the cellular phone to a network;
requesting via the network additional credential information from the cellular phone;
transmitting the additional credential information from the cellular phone to the network;
determining via the network whether the cellular phone is permitted access to the electronic lock based at least in part on the encrypted lock identification, the encrypted phone identification, and the additional credential information;
transmitting an encrypted grant/deny message from the network to the cellular phone based upon the determining; and
transmitting the encrypted grant/deny message from the cellular phone to the electronic lock.
2 Assignments
0 Petitions
Accused Products
Abstract
An electronic lock authentication system and associated method including an electronic lock and a cellular phone in communication with a network and in wireless communication with the electronic lock. The electronic lock has a lock identification and is configured to transmit the lock identification wirelessly to the cellular phone. The cellular phone has a phone identification and is configured to transmit the lock identification and the phone identification to the network. The network is configured to make a decision in real time whether the cellular phone is permitted access to the electronic lock based on the lock identification and the phone identification, and is further configured to transmit a grant/deny message to the cellular phone based on the decision, and the cellular phone is configured to transmit the grant/deny message to the electronic lock.
65 Citations
8 Claims
-
1. A method of authenticating a lock system, comprising:
-
issuing via an electronic lock an advertisement indicating a presence of the electronic lock to a cellular phone, wherein the issuing is performed while the electronic lock is in a low power sleep state; scanning via the cellular phone for the advertisement, wherein the scanning is performed when the cellular phone is in a low power scan mode; initiating wireless communication by the cellular phone with the electronic lock, wherein the initiating is performed in response to the cellular phone determining that the electronic lock is in a specified range; transmitting an encrypted lock identification from the electronic lock to the cellular phone after initiating the wireless communication; transmitting the encrypted lock identification and an encrypted phone identification from the cellular phone to a network; requesting via the network additional credential information from the cellular phone; transmitting the additional credential information from the cellular phone to the network; determining via the network whether the cellular phone is permitted access to the electronic lock based at least in part on the encrypted lock identification, the encrypted phone identification, and the additional credential information; transmitting an encrypted grant/deny message from the network to the cellular phone based upon the determining; and transmitting the encrypted grant/deny message from the cellular phone to the electronic lock. - View Dependent Claims (2, 3, 4)
-
-
5. An electronic lock authentication system, comprising:
-
an electronic lock, wherein the electronic lock has a low power sleep state; a cellular phone in communication with a network and in wireless communication with the electronic lock, wherein the cellular phone is operable in a low power scan mode and the electronic lock is configured to advertise its presence to the cellular phone while in the low power sleep state, and further wherein the cellular phone is configured to scan for the electronic lock in wireless communication range while in the low power scan mode and to initiate wireless communication with the electronic lock that are determined to be in wireless communication range; wherein the electronic lock has a lock identification and is configured to encrypt the lock identification and transmit the encrypted lock identification wirelessly to the cellular phone after the cellular phone initiates wireless communication with the electronic lock; wherein the cellular phone has a phone identification and is configured to encrypt the phone identification and transmit the encrypted lock identification and the encrypted phone identification to the network; wherein the network is configured to make a decision in real time whether the cellular phone is permitted access to the electronic lock based at least in part on the encrypted lock identification and the encrypted phone identification, wherein the network is configured to transmit a message to the cellular phone indicative of a requirement for additional credential information in order to make the decision; wherein a user of the cellular phone is prompted to input the additional credential information into the cellular phone in response to the message from the network; wherein the network is further configured to determine whether the additional credential information is correct and transmit an encrypted grant/deny message to the cellular phone based on the decision; and wherein the cellular phone is configured to transmit the encrypted grant/deny message to the electronic lock. - View Dependent Claims (6, 7, 8)
-
Specification