Using temporary access codes
First Claim
1. A method of managing access by a user, comprising:
- requesting an access code from an external server;
the external server providing the access code to the user only if the user is authorized for access;
the access code being provided to an input unit; and
the user being granted access by a security component if the access code is valid, wherein the security component determines validity of the access code without accessing any user authorization information, wherein the access code is based, at least in part, on a master key at the external server and wherein the security component determines validity of the access code using a unique symmetric key that is derived from the master key and wherein the unique symmetric key is derived from the master key in combination with one of;
a serial number of the security component and a serial number of a component associated with the security component.
2 Assignments
0 Petitions
Accused Products
Abstract
Managing access by a user includes requesting an access code from an external server, the external server providing the access code to the user only if the user is authorized for access, the access code being provided to an input unit, and the user being granted access by a security component if the access code is valid. The input unit may be a keypad. The access code maybe provided using RF communication, such as NFC, Bluetooth, and/or Bluetooth Smart. The device may request the access code from the external server. The device may be a mobile device. Managing access by a user may also include the user entering a PIN in addition to the access code. The pin may be entered by the user'"'"'s device. The access may be to a physical area and the user may be granted access by having a door open.
-
Citations
23 Claims
-
1. A method of managing access by a user, comprising:
-
requesting an access code from an external server; the external server providing the access code to the user only if the user is authorized for access; the access code being provided to an input unit; and the user being granted access by a security component if the access code is valid, wherein the security component determines validity of the access code without accessing any user authorization information, wherein the access code is based, at least in part, on a master key at the external server and wherein the security component determines validity of the access code using a unique symmetric key that is derived from the master key and wherein the unique symmetric key is derived from the master key in combination with one of;
a serial number of the security component and a serial number of a component associated with the security component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium containing software that manages access by a user, the software comprising:
-
executable code that requests an access code from an external server; executable code that receives the access code from the external server, wherein the external server provides the access code only if the user is authorized for access; and executable code that provides the access code to an input unit, wherein the user is granted access by a security component if the access code is valid, wherein the security component determines validity of the access code without accessing any user authorization information, wherein the access code is based, at least in part, on a master key at the external server and wherein the security component determines validity of the access code using a unique symmetric key that is derived from the master key and wherein the unique symmetric key is derived from the master key in combination with one of;
a serial number of the security component and a serial number of a component associated with the security component. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification