Systems and methods for locking device management including time delay policies using random time delays
First Claim
Patent Images
1. A method, comprising:
- receiving, via a locking device, a first credential of a custodian;
validating the first credential;
determining a random period of time based upon a time-delay policy when the first credential is validated;
executing a lock release protocol upon expiration of the random period of time;
requesting, via the locking device, a second credential from the custodian within a specified time period upon expiration of the random period of time;
receiving, via the locking device, the second credential from the custodian within the specified time period;
validating the second credential; and
executing a lock release command to cause the locking device to unlock when the second credential is validated.
1 Assignment
0 Petitions
Accused Products
Abstract
A locking device employs improved lock management techniques based on time delay polices that use a random period of time. The locking device receives a first credential of a custodian, validates the first credential and determines a random period of time based upon a time-delay policy when the first credential is validated. The locking device executes a lock release protocol upon expiration of the random period of time.
15 Citations
16 Claims
-
1. A method, comprising:
-
receiving, via a locking device, a first credential of a custodian; validating the first credential; determining a random period of time based upon a time-delay policy when the first credential is validated; executing a lock release protocol upon expiration of the random period of time; requesting, via the locking device, a second credential from the custodian within a specified time period upon expiration of the random period of time; receiving, via the locking device, the second credential from the custodian within the specified time period; validating the second credential; and executing a lock release command to cause the locking device to unlock when the second credential is validated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A locking device, comprising:
-
one or more network interfaces adapted to communicate in a network; a processor adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; receive a first credential of a custodian; validate the first credential; determine a random period of time based upon a time-delay policy when the first credential is validated; execute a lock release protocol upon expiration of the random period of time; request a second credential from the custodian within a specified time period upon expiration of the random period of time; receive the second credential from the custodian within the specified time period; validate the second credential within the specified time period; and execute a lock release command to cause the locking device to unlock when the second credential is validated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A tangible, non-transitory, computer-readable media having software encoded thereon, the software, when executed by a processor, operable to:
-
receive a first credential of a custodian; validate the first credential; determine a random period of time based upon a time-delay policy when the first credential is validated; execute a lock release protocol upon expiration of the random period of time; request a second credential of the custodian within a specified time period upon expiration of the random period of time; receive the second credential of the custodian within the specified time period; validate the second credential within the specified time period; and execute a lock release command to cause the locking device to unlock when the second credential is validated. - View Dependent Claims (16)
-
Specification