Location based access
First Claim
1. A non-transitory computer readable medium comprising instructions which, when executed by one or more devices, causes the one or more devices to:
- identify a physical location of a first client device and a second physical location of a second client device;
determine that the physical location of the first client device and the second physical location of the second client device meet a first criterion for allowing access through an entryway;
identify a permission level associated with the first client device and a second permission level associated with the second client device;
determine that the permission level associated with the first client device meets a second criterion for allowing access through the entryway and that the second permission level associated with the second client device does not meet the second criterion;
calculate a distance between the first client device and the second client device;
responsive at least to a determination that the first criterion and the second criterion have been met by the first client device, allow the first client device access through the entryway;
determine based on the calculated distance, that the second client device gained unauthorized access through the entryway due to proximity with the first client device; and
present an alert regarding the unauthorized access through the entryway of the second client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A non-transitory computer readable medium for location based access includes instructions which, when executed by one or more devices, causes performance of operations including identifying a physical location of a client device, determining that the physical location of the client device meets a criterion for allowing access through an entryway, identifying a permission level associated with the client device, determining that the permission level associated with the client device meets a criterion for allowing access through the entryway, and, responsive at least to determining that the criterion have been met, allowing access through the entryway.
-
Citations
19 Claims
-
1. A non-transitory computer readable medium comprising instructions which, when executed by one or more devices, causes the one or more devices to:
-
identify a physical location of a first client device and a second physical location of a second client device; determine that the physical location of the first client device and the second physical location of the second client device meet a first criterion for allowing access through an entryway; identify a permission level associated with the first client device and a second permission level associated with the second client device; determine that the permission level associated with the first client device meets a second criterion for allowing access through the entryway and that the second permission level associated with the second client device does not meet the second criterion; calculate a distance between the first client device and the second client device; responsive at least to a determination that the first criterion and the second criterion have been met by the first client device, allow the first client device access through the entryway; determine based on the calculated distance, that the second client device gained unauthorized access through the entryway due to proximity with the first client device; and present an alert regarding the unauthorized access through the entryway of the second client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
at least one network device including a hardware processor; a memory on which is stored instructions that are to cause the hardware processor to; identify a physical location of a first client device and a second physical location of a second client device; determine that the physical location of the first client device and the second physical location of the second client device meet a first criterion for allowing access through an entryway; identify a permission level associated with the first client device and a second permission level associated with the second client device; determine that the permission level associated with the first client device meets a second criterion for allowing access through the entryway and that the second permission level associated with the second client device does not meet the second criterion for access through the entryway; calculate a distance between the first client device and the second client device; responsive at least to a determination that the first criterion and the second criterion have been met by the first client device, allow the first client device access through the entryway; determine based on the calculated distance, that the second client device gained unauthorized access to the entryway due to proximity with the first client device; and present an alert regarding the unauthorized access through the entryway of the second client device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
identifying respective physical locations of a first client device and a second client device; determining that the respective physical locations of the first client device and the second client device meet a first criterion for access through an entryway; determining, based on respective permission levels associated with the first client device and the second client devices, that the first client device meets a second criterion for authorized access through the entryway and that the second client device does not meet the second criterion for access through the entryway; determining, by a hardware processor, based on a distance between the first client device and the second client device, that the second client device is piggybacking onto the first client device for unauthorized access through the entryway; and transmitting an alert regarding the unauthorized of the second client device to the entryway.
-
Specification