Electronic access control system
First Claim
1. A system for authenticating a passive smart device for unlocking an electronic lock, comprising:
- one or more memory devices storing instructions; and
one or more processors configured to execute the instructions to;
receive an authentication request from a computing device, the authentication request comprising identification data associated with the passive smart device;
receive secondary identification data from the computing device;
determine whether at least a portion of the authentication request corresponds to authentication data stored in an authentication database;
store the identification data associated with the passive smart device based on the determination that at least a portion of the authentication request corresponds with the authentication data;
store the secondary identification data with the stored identification data;
receive detection data corresponding to a detection of the passive smart device when the passive smart device enters a predetermined location range associated with the electronic lock;
obtain, in response to the detection, an identifier from the passive smart device;
obtain, within a predetermined time following the detection, secondary authentication data from the computing device;
determine whether the obtained identifier corresponds with the stored identification data;
determine whether the obtained secondary authentication data corresponds with the stored secondary identification data; and
responsive to determining that (i) the obtained identifier corresponds with the stored identification data and (ii) the obtained secondary authentication data corresponds with the stored secondary identification data, direct the electronic lock to transition from a locked state to an unlocked state.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data. Based on the determination, the system may store identification data associated with a smart device corresponding to the authentication request. The system may receive detection data when the smart device is detected within a predetermined area and, in response to a detection, obtain an identifier from the smart device. The system may determine whether the obtained identifier corresponds with the stored identification data. Based on the determination, the system may direct an electronic lock to transition from a locked state to an unlocked state.
-
Citations
23 Claims
-
1. A system for authenticating a passive smart device for unlocking an electronic lock, comprising:
-
one or more memory devices storing instructions; and one or more processors configured to execute the instructions to; receive an authentication request from a computing device, the authentication request comprising identification data associated with the passive smart device; receive secondary identification data from the computing device; determine whether at least a portion of the authentication request corresponds to authentication data stored in an authentication database; store the identification data associated with the passive smart device based on the determination that at least a portion of the authentication request corresponds with the authentication data; store the secondary identification data with the stored identification data; receive detection data corresponding to a detection of the passive smart device when the passive smart device enters a predetermined location range associated with the electronic lock; obtain, in response to the detection, an identifier from the passive smart device; obtain, within a predetermined time following the detection, secondary authentication data from the computing device; determine whether the obtained identifier corresponds with the stored identification data; determine whether the obtained secondary authentication data corresponds with the stored secondary identification data; and responsive to determining that (i) the obtained identifier corresponds with the stored identification data and (ii) the obtained secondary authentication data corresponds with the stored secondary identification data, direct the electronic lock to transition from a locked state to an unlocked state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authenticating a passive smart device for unlocking an assigned electronic lock of a plurality of electronic locks, comprising:
-
one or more memory devices storing instructions; and one or more processors configured to execute the instructions to; receive an authentication request from a computing device, the authentication request comprising identification data associated with the passive smart device; determine whether at least a portion of the authentication request corresponds with authentication data stored in an authentication database; responsive to determining that at least a portion of the authentication request corresponds with the authentication data, store the identification data associated with the passive smart device and associate the identification data associated with the passive smart device with the assigned electronic lock of the plurality of electronic locks; receive secondary authentication data from the computer device; store the secondary authentication data with the stored identification data; receive detection data corresponding to a detection of the passive smart device when the passive smart device enters a predetermined location range associated with the assigned electronic lock of the plurality of electronic locks; obtain, in response to the detection, an identifier from the passive smart device; determine whether the identifier received from the passive smart device was received during a time period in which the identifier is valid; receive, within a predetermined time following the detection, secondary authentication attempt data from the computing device; determine whether the obtained identifier corresponds with the stored identification data; determine whether the secondary authentication attempt data corresponds with the stored secondary authentication data; and responsive to determining that (i) the identifier was received from the passive smart device at the assigned electric lock, (ii) the identifier was received from the passive smart device during a time period in which the identifier is valid, and (iii) the obtained identifier corresponds with the stored identification data, direct the assigned electronic lock to transition from a locked state to an unlocked state. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause a mobile computing device to:
-
receive a reservation request for access to a restricted area during a reservation time; transmit the reservation request to a key server; obtain check-in information for a user; transmit the check-in information to the key server; obtain secondary authentication data for the user, the secondary authentication data being indicative of a secret passcode; transmit the secondary authentication data to the key server; obtain a key data from the key server; establish electronic communication with a smart device; transmit the key data and at least one key limitation to the smart device; responsive to receiving verification of the key data, obtain secondary passcode information from the user and within a predetermined time following an establishment of electronic communication the smart device and a lock system; and transmit the secondary passcode information to the lock system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
Specification