Steganographic access controls
First Claim
1. A method comprising:
- receiving, by a computing device, an access request associated with a guest mobile device;
receiving, from an authorized mobile device, a base image;
encoding one or more portions of the base image with access information to generate an encoded image, wherein the access information is steganographically encoded in the encoded image;
transmitting the encoded image for receipt by the guest mobile device;
receiving, from a camera, a captured image, wherein the captured image is a display by the guest mobile device of the encoded image; and
granting, based on verification of the access information in the captured image, access to a secured location.
1 Assignment
0 Petitions
Accused Products
Abstract
Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.
12 Citations
21 Claims
-
1. A method comprising:
-
receiving, by a computing device, an access request associated with a guest mobile device; receiving, from an authorized mobile device, a base image; encoding one or more portions of the base image with access information to generate an encoded image, wherein the access information is steganographically encoded in the encoded image; transmitting the encoded image for receipt by the guest mobile device; receiving, from a camera, a captured image, wherein the captured image is a display by the guest mobile device of the encoded image; and granting, based on verification of the access information in the captured image, access to a secured location. - View Dependent Claims (2, 3, 4, 5, 6, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
7. A system comprising:
-
a computing device configured to; receive an access request associated with a guest mobile device; receive a base image from an authorized mobile device; encode at least a first portion of the base image with access information to generate an encoded image, wherein the access information is steganographically encoded in the encoded image; and cause the encoded image to be transmitted to the guest mobile device; and a premises system comprising a monitoring device at a secured location, the premises system configured to; obtain, via the monitoring device, a captured image, wherein the captured image is a display by the guest mobile device of the encoded image; and grant, based on verification of the access information in the captured image, access to the secured location. - View Dependent Claims (8, 19, 20, 21)
-
-
9. A method comprising:
-
requesting, by a guest mobile device, an encoded image; receiving, by the guest mobile device and from an authorized mobile device, the encoded image, wherein access information, associated with an access request for a secured location, is steganographically encoded in the encoded image; displaying, by the guest mobile device, the encoded image to a monitoring device of the secured location; and obtaining, in response to the displaying, access to the secured location. - View Dependent Claims (10)
-
Specification