Wireless communication protocol based lock management
First Claim
Patent Images
1. A method for enhancing physical security, the method comprising:
- monitoring, by one or more processors, a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person;
receiving, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock;
comparing, by one or more processors, the first set of information to a predefined rule, wherein the predefined rule specifies whether the disengaged lock can be engaged;
determining, by one or more processors, that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for enhancing physical security, a processor receives, via a wireless communication protocol, a first set of information from a first device associated with a first person. A processor compares the first set of information to a predefined rule, wherein the predefined rule specifies whether a lock can be engaged. A processor determines that the lock cannot be engaged, based on the first information and the predefined rule.
-
Citations
16 Claims
-
1. A method for enhancing physical security, the method comprising:
-
monitoring, by one or more processors, a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person; receiving, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock; comparing, by one or more processors, the first set of information to a predefined rule, wherein the predefined rule specifies whether the disengaged lock can be engaged; determining, by one or more processors, that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for ensuring safety within a physical security system, the computer program product comprising:
-
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to monitor a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person; program instructions to receive, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock; program instructions to compare the first set of information to a predefined rule, wherein the predefined rule specifies that the disengaged lock cannot be engaged if the first set of information from the first device is associated with any person; and program instruction to determine that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A computer system for ensuring safety within a physical security system, the computer system comprising:
-
one or more computer processors, one or more computer readable storage media, and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to monitor a location, associated with a disengaged lock, for a set of devices, wherein each device is associated with one person; program instructions to receive, via a wireless communication protocol, a first set of information from a first device associated with a first person, wherein the first set of information includes that the first device is in the location associated with the disengaged lock; program instructions to compare the first set of information to a predefined rule, wherein the predefined rule specifies that the disengaged lock cannot be engaged if the first set of information from the first device is associated with any person; and program instruction to determine that the disengaged lock cannot be engaged, based on the first set of information and the predefined rule. - View Dependent Claims (13, 14, 15, 16)
-
Specification