Managing electronic keys
First Claim
Patent Images
1. A system comprising:
- at least one processor; and
at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising;
receiving, based on input provided by a user, data identifying a recipient for an electronic key to a physical lock;
receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key;
receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;
determining that the user has authority to issue the electronic key to the physical lock;
in response to determining that the user has authority to issue the electronic key to the physical lock, storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key;
after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock;
determining that the received lock code is valid for the physical lock;
determining that the one or more conditions on use of the electronic key are satisfied; and
in response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock.
2 Assignments
0 Petitions
Accused Products
Abstract
Users of a social networking platform may provide electronic keys to other users of the social networking platform. Use of an electronic key may be subject to one or more conditions specified by the issuer of the electronic key. Data may be provided that enables the recipient to use the electronic key in accordance with the one or more conditions on use of the electronic key.
-
Citations
21 Claims
-
1. A system comprising:
-
at least one processor; and at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising; receiving, based on input provided by a user, data identifying a recipient for an electronic key to a physical lock; receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; determining that the user has authority to issue the electronic key to the physical lock; in response to determining that the user has authority to issue the electronic key to the physical lock, storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key; after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock; determining that the received lock code is valid for the physical lock; determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. At least one non-transitory computer-readable storage medium encoded with executable instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
receiving, based on input provided by a user, data identifying a recipient for an electronic key to a physical lock, the recipient being connected to the user in a social networking platform; receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; determining that the user has authority to issue the electronic key to the physical lock; in response to determining that the user has authority to issue the electronic key to the physical lock, storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key; after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock; determining that the received lock code is valid for the physical lock; determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock.
-
-
18. A method comprising:
-
receiving, based on input provided by a user, data indicating a recipient for an electronic key to a physical lock, the recipient being connected to the user in a social networking platform; receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key; receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key; storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key; after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock; determining that the received lock code is valid for the physical lock; determining that the one or more conditions on use of the electronic key are satisfied; and in response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock. - View Dependent Claims (19, 20, 21)
-
Specification