Associating a user identity to a wireless signal
First Claim
1. A method comprising the computer-implemented steps of:
- providing a secured geographic area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device, wherein the physical access control device comprises an electromechanical lock;
receiving a set of user credentials from an authentication device at the access control point of the secured geographic area;
authenticating an identity of a user by verifying the user credentials;
receiving multiple instances of a set of wireless signals associated with the user;
adding one or more of the set of wireless signals to a profile associated with the user in the case that the one or more of the set of wireless signals is not currently recognized as being associated with the user;
associating the one or more of the set of wireless signals with the user;
broadcasting the one or more of the set of wireless signals along with information about the user;
enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals;
receiving another wireless signal; and
allowing the user access to the secured physical area, via the electromechanical lock, when it is determined that the received another wireless signal is a match to the machine access control (MAC) address of one or more of the set of wireless signals associated with the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
31 Citations
11 Claims
-
1. A method comprising the computer-implemented steps of:
-
providing a secured geographic area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device, wherein the physical access control device comprises an electromechanical lock; receiving a set of user credentials from an authentication device at the access control point of the secured geographic area; authenticating an identity of a user by verifying the user credentials; receiving multiple instances of a set of wireless signals associated with the user; adding one or more of the set of wireless signals to a profile associated with the user in the case that the one or more of the set of wireless signals is not currently recognized as being associated with the user; associating the one or more of the set of wireless signals with the user; broadcasting the one or more of the set of wireless signals along with information about the user; enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receiving another wireless signal; and allowing the user access to the secured physical area, via the electromechanical lock, when it is determined that the received another wireless signal is a match to the machine access control (MAC) address of one or more of the set of wireless signals associated with the user. - View Dependent Claims (2, 3, 4)
-
-
5. A system for associating a user identity to a wireless signal based on information received at an access point, the system comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to a wireless signal identifier via the bus that when executing the instructions causes the system to; provide a secured geographic area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device, wherein the physical access control device comprises an electromechanical lock; receive a set of user credentials from an authentication device at the access control point of the secured geographic area; authenticate an identity of a user by verifying the user credentials; receive multiple instances of a set of wireless signals associated with the user; add one or more of the set of wireless signals to a profile associated with the user in the case that the one or more of the set of wireless signals is not currently recognized as being associated with the user; associate the one or more of the set of wireless signals with the user; broadcast the one or more of the set of wireless signals along with information about the user; enable the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receive another wireless signal; and allow the user access to the secured physical area, via the electromechanical lock, when it is determined that the received another wireless signal is a match to the machine access control (MAC) address of one or more of the set of wireless signals associated with the user. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-readable hardware storage device storing computer instructions, which when executed, enables a computer system to associate a user identity to a wireless signal based on information received at an access point, the computer instructions comprising:
-
providing a secured geographic area with an access control point, wherein the access control point comprises a wireless reader and a physical access control device, wherein the physical access control device comprises an electromechanical lock; receiving a set of user credentials from an authentication device at the access control point of the secured geographic area; authenticating an identity of a user by verifying the user credentials; receiving multiple instances of a set of wireless signals associated with the user; adding one or more of the set of wireless signals to a profile associated with the user in the case that the one or more of the set of wireless signals is not currently recognized as being associated with the user; associating the one or more of the set of wireless signals with the user; broadcasting the one or more of the set of wireless signals along with information about the user; enabling the information about the user to be accessed by another device in proximity to the one or more of the set of wireless signals; receiving another wireless signal; and allowing the user access to the secured physical area, via the electromechanical lock, when it is determined that the received another wireless signal is a match to the machine access control (MAC) address of one or more of the set of wireless signals associated with the user. - View Dependent Claims (10, 11)
-
Specification