×

Managing electronic keys

  • US 9,646,165 B1
  • Filed: 01/26/2015
  • Issued: 05/09/2017
  • Est. Priority Date: 08/30/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • at least one processor; and

    at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising;

    receiving, based on input provided by a user, data identifying a recipient for an electronic key that provides access to a secured resource;

    receiving, based on input provided by the user, data identifying the secured resource to which the user desires to provide the electronic key;

    receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;

    determining that the user has authority to issue the electronic key that provides access to the secured resource;

    in response to determining that the user has authority to issue the electronic key that provides access to the secured resource, storing, in electronic storage, key data that identifies the recipient of the electronic key, the secured resource for which the electronic key is granted, and the one or more conditions on use of the electronic key;

    transmitting, to an electronic address for the recipient, data that indicates that the electronic key is transferred to the recipient;

    receiving, by a server system, data indicating an attempt by the recipient to use the electronic key to access the secured resource;

    in response to receiving the data indicating an attempt by the recipient to use an electronic device and the electronic key to access the secured resource, determining that the one or more conditions on use of the electronic key are satisfied; and

    in response to determining that the one or more conditions on use of the electronic key are satisfied, communicating, by the server system, with the secured resource over a network to cause access to be granted to the secured resource.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×