Managing electronic keys
First Claim
Patent Images
1. A system comprising:
- at least one processor; and
at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising;
receiving, based on input provided by a user, data identifying a recipient for an electronic key that provides access to a secured resource;
receiving, based on input provided by the user, data identifying the secured resource to which the user desires to provide the electronic key;
receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;
determining that the user has authority to issue the electronic key that provides access to the secured resource;
in response to determining that the user has authority to issue the electronic key that provides access to the secured resource, storing, in electronic storage, key data that identifies the recipient of the electronic key, the secured resource for which the electronic key is granted, and the one or more conditions on use of the electronic key;
transmitting, to an electronic address for the recipient, data that indicates that the electronic key is transferred to the recipient;
receiving, by a server system, data indicating an attempt by the recipient to use the electronic key to access the secured resource;
in response to receiving the data indicating an attempt by the recipient to use an electronic device and the electronic key to access the secured resource, determining that the one or more conditions on use of the electronic key are satisfied; and
in response to determining that the one or more conditions on use of the electronic key are satisfied, communicating, by the server system, with the secured resource over a network to cause access to be granted to the secured resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Users of a social networking platform may provide electronic keys to other users of the social networking platform. Use of an electronic key may be subject to one or more conditions specified by the issuer of the electronic key. Data may be provided that enables the recipient to use the electronic key in accordance with the one or more conditions on use of the electronic key.
-
Citations
20 Claims
-
1. A system comprising:
-
at least one processor; and at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising; receiving, based on input provided by a user, data identifying a recipient for an electronic key that provides access to a secured resource; receiving, based on input provided by the user, data identifying the secured resource to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; determining that the user has authority to issue the electronic key that provides access to the secured resource; in response to determining that the user has authority to issue the electronic key that provides access to the secured resource, storing, in electronic storage, key data that identifies the recipient of the electronic key, the secured resource for which the electronic key is granted, and the one or more conditions on use of the electronic key; transmitting, to an electronic address for the recipient, data that indicates that the electronic key is transferred to the recipient; receiving, by a server system, data indicating an attempt by the recipient to use the electronic key to access the secured resource; in response to receiving the data indicating an attempt by the recipient to use an electronic device and the electronic key to access the secured resource, determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining that the one or more conditions on use of the electronic key are satisfied, communicating, by the server system, with the secured resource over a network to cause access to be granted to the secured resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one non-transitory computer-readable storage medium encoded with executable instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
receiving, based on input provided by a user, data identifying a recipient for an electronic key that provides access to a secured resource; receiving, based on input provided by the user, data identifying the secured resource to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; determining that the user has authority to issue the electronic key that provides access to the secured resource; in response to determining that the user has authority to issue the electronic key that provides access to the secured resource, storing, in electronic storage, key data that identifies the recipient of the electronic key, the secured resource for which the electronic key is granted, and the one or more conditions on use of the electronic key; transmitting, to an electronic address for the recipient, data that indicates that the electronic key is transferred to the recipient; receiving, by a server system, data indicating an attempt by the recipient to use the electronic key to access the secured resource; in response to receiving the data indicating an attempt by the recipient to use the electronic key to access the secured resource, determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining that the one or more conditions on use of the electronic key are satisfied, communicating, by the server system, with the secured resource over a network to cause access to be granted to the secured resource.
-
-
20. A method performed by one or more data processing devices, the method comprising:
-
receiving, based on input provided by a user, data identifying a recipient for an electronic key that provides access to a secured resource; receiving, based on input provided by the user, data identifying the secured resource to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; determining that the user has authority to issue the electronic key that provides access to the secured resource; in response to determining that the user has authority to issue the electronic key that provides access to the secured resource, storing, in electronic storage, key data that identifies the recipient of the electronic key, the secured resource for which the electronic key is granted, and the one or more conditions on use of the electronic key; transmitting, to an electronic address for the recipient, data that indicates that the electronic key is transferred to the recipient; receiving, by a server system, data indicating an attempt by the recipient to use the electronic key to access the secured resource; in response to receiving the data indicating an attempt by the recipient to use an electronic device and the electronic key to access the secured resource, determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining that the one or more conditions on use of the electronic key are satisfied, communicating, by the server system, with the secured resource over a network to cause access to be granted to the secured resource.
-
Specification