Virtual key ring
First Claim
1. A method of managing wireless operation of a lock using a computing device, the method comprising:
- displaying by a processor in the computing device on a display, a graphical representation of a key ring having a plurality of virtual keys as a skeuomorph of keys on a key ring, wherein each virtual key appears as or is a skeuomorph of a pin and tumbler key;
receiving a pre-determined gesture input from a user of the computing device by detecting haptic contact on a touch screen, the gesture input being indicative of an interaction with the skeuomorph of keys on the key ring and/or at least one of the skeuomorphs of the pin and tumbler key;
presenting to the user on the display an impression that the user is sliding the keys along the key ring or rotating the key ring; and
accessing by the processor in response to a selection by the user of a virtual key on the graphical representation of the key ring, stored information associated with at least one of the virtual keys and the lock.
6 Assignments
0 Petitions
Accused Products
Abstract
A virtual key ring is disclosed. A graphical representation of a key ring or keychain having a plurality of keys is displayed on a computing device, and a pre-determined gesture input from a user indicative of an interaction with the key ring or chain, or one of the keys is received. The wireless operation of a lock can be managed by then accessing stored information associated with a virtual key or the lock in accordance with the pre-determined gesture. Pre-determined gestures can include, for example, movement along a predefined path on a touch screen in order to select a virtual key from among the plurality of virtual keys. The computing device can be a wireless mobile computing device such as a smartphone. The computing device can use any wireless communication technology, NFC and Wi-Fi being examples.
-
Citations
24 Claims
-
1. A method of managing wireless operation of a lock using a computing device, the method comprising:
-
displaying by a processor in the computing device on a display, a graphical representation of a key ring having a plurality of virtual keys as a skeuomorph of keys on a key ring, wherein each virtual key appears as or is a skeuomorph of a pin and tumbler key; receiving a pre-determined gesture input from a user of the computing device by detecting haptic contact on a touch screen, the gesture input being indicative of an interaction with the skeuomorph of keys on the key ring and/or at least one of the skeuomorphs of the pin and tumbler key; presenting to the user on the display an impression that the user is sliding the keys along the key ring or rotating the key ring; and accessing by the processor in response to a selection by the user of a virtual key on the graphical representation of the key ring, stored information associated with at least one of the virtual keys and the lock. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for managing wireless access to a lock including computer program code in a non-transitory medium, the computer program code comprising:
-
non-transitory instructions for displaying a graphical representation of a key ring having a plurality of virtual keys as a skeuomorph of keys on a key ring, wherein each virtual key appears as or is a skeuomorph of a pin and tumbler key; non-transitory instructions for receiving a pre-determined gesture input from a user of the computing device by detecting haptic contact on a touch screen, the gesture input being indicative of an interaction with the skeuomorph of keys on the key ring and/or at least one of the skeuomorphs of the pin and tumbler key; non-transitory instructions for presenting to the user on the display an impression that the user is sliding the keys along the key ring or rotating the key ring; and non-transitory instructions for accessing by the processor in response to a selection by the user of a virtual key on the graphical representation of the key ring, stored information associated with at least one of the virtual keys and the lock. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A mobile computer system comprising:
-
at least one wireless subsystem; a touch screen display to detect haptic contact; a processor operatively connected to the at least one wireless subsystem and the touch screen display; and a memory comprising at least one stored digital credential for a lock and stored data corresponding to at least one virtual key, wherein a virtual key appears as or is a skeuomorph of a pin and tumbler key, the memory also comprising computer program code executable by the processor to cause the mobile computer system to display on the touch screen display a graphical representation of a key ring including the at least one virtual key, appearing as a skeuomorph of keys on a key ring, receive a pre-determined gesture input by detecting haptic contact on the touch screen display indicative of an interaction with the skeuomorph of keys on the key ring and/or the skeuomorph of the pin and tumbler key, present to the user on the display an impression that the user is sliding the keys along the key ring or rotating the key ring, and access in response to a selection by the user of a virtual key on the graphical representation of the key ring, at least one of the stored digital credential and stored data. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification