-
公开(公告)号:US20230037215A1
公开(公告)日:2023-02-02
申请号:US17963020
申请日:2022-10-10
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
摘要: A system includes a server having a communication device and a processing circuit. The communication device is configured to facilitate communication with electronic devices. The processing circuit is configured to receive permission from a first user device for a guest user to access an electronic lock using a second user device, provide a notification to the second user device regarding a guest user profile, receive an activation command from the second user device based on the notification, generate the guest user profile for the guest user in response to receiving the permission and the activation command, and transmit the guest user profile to the second user device. The guest user profile is usable to allow the guest user to unlock the electronic lock.
-
公开(公告)号:US10262484B2
公开(公告)日:2019-04-16
申请号:US15587034
申请日:2017-05-04
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
IPC分类号: G07C9/00 , G01S19/13 , G01S19/16 , G01S5/00 , H04W12/04 , H04W12/06 , H04W4/029 , H04L29/08 , H04W88/02
摘要: Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a locking device, transmitting a security challenge to the mobile device, and transmitting a response to the challenge and an encrypted user profile for the locking device. The response includes data generated with an access key that is stored by both the mobile device and the locking device, and the user profile is encrypted by a server using a secret key that is stored by the server and the locking device. Authentication further includes verifying the response to the challenge, where the response is verified using the access key, and validating additional data from the mobile device. An action of the locking device may be initiated as specified by the request.
-
公开(公告)号:US20170236353A1
公开(公告)日:2017-08-17
申请号:US15444076
申请日:2017-02-27
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic
CPC分类号: H04W12/08 , G07C9/00309 , G07C9/00571 , G07C2009/00404 , G07C2009/00412 , H04W12/04 , H04W12/06
摘要: Disclosed are methods, and devices for wireless key management for authentication. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile, wherein a user profile is authenticated and encrypted by a server using a lock key that is stored by the server and the locking device, and wherein the user profile comprises a user key; transmitting the user profile; decrypting the user profile using the lock key; transmitting a security code; generating an encrypted command comprising the security code and encrypted using the user key; transmitting the command; validating the command. Validating the command can include decrypting using the user key; determining whether the security code is valid; and authenticating using the user key; and initiating, in response to validating, an action of the locking device as specified by the command.
-
公开(公告)号:US11468721B2
公开(公告)日:2022-10-11
申请号:US17011335
申请日:2020-09-03
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
摘要: A method includes establishing communication between a first mobile device and a locking device via a first wireless transceiver of the first mobile device and a second wireless transceiver of the locking device; determining a location of at least one of the first mobile device or the locking device responsive to the communication; receiving, by a server, permission for the guest user to access the locking device using a second mobile device where the permission is provided from an external device prior to the second mobile device interacting with the locking device; generating, by the server, a guest user profile in response to receiving the permission where the guest user profile includes data usable to allow the guest user to lock or unlock the locking device; and transmitting, by the server, the guest user profile to the second mobile device.
-
公开(公告)号:US10771975B2
公开(公告)日:2020-09-08
申请号:US16195464
申请日:2018-11-19
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic
摘要: A method includes receiving, by a server, a request to revoke the access rights of a user device to a lock; transmitting, by the server, a revocation command to the user device to remove an access credential from the user device; identifying, by the server, one or more trusted devices that have access rights to the lock in response to unsuccessfully transmitting the revocation command to the user device; transmitting, by the server, a key change command to the one or more trusted devices including an updated key to replace a key on the lock; transmitting, by a first one of the one or more trusted devices to encounter the lock, the key change command to the lock; and replacing, by the lock, the key with the updated key such that the user device is unable to access the lock using the access credential.
-
公开(公告)号:US20190197806A1
公开(公告)日:2019-06-27
申请号:US16293507
申请日:2019-03-05
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
CPC分类号: G07C9/00309 , G01S5/0027 , G01S19/13 , G01S19/16 , G07C9/00174 , G07C9/00571 , G07C2009/00373 , G07C2009/00396 , G07C2009/00412 , G07C2009/00642 , G07C2009/00769 , G07C2009/0092 , H04L67/306 , H04W4/029 , H04W12/04 , H04W12/06 , H04W88/02
摘要: A method includes establishing communication between a first mobile device and a locking device; determining, using a location determination circuit of the first mobile device, a location of the first mobile device responsive to the communication with the locking device, the location indicative of a determined location of the locking device; storing the location in a memory of the first mobile device; retrieving the location from the memory of the first mobile device to facilitate providing the location to a guest user; receiving, by a server, permission for the guest user to access the locking device using a second mobile device; generating, by the server, a guest user profile in response to receiving the permission, the guest user profile comprising data usable to allow the guest user to lock or unlock the locking device; and transmitting, by the server, the guest user profile to the second mobile device.
-
公开(公告)号:US20190182669A1
公开(公告)日:2019-06-13
申请号:US16195464
申请日:2018-11-19
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic
摘要: A method includes receiving, by a server, a request to revoke the access rights of a user device to a lock; transmitting, by the server, a revocation command to the user device to remove an access credential from the user device; identifying, by the server, one or more trusted devices that have access rights to the lock in response to unsuccessfully transmitting the revocation command to the user device; transmitting, by the server, a key change command to the one or more trusted devices including an updated key to replace a key on the lock; transmitting, by a first one of the one or more trusted devices to encounter the lock, the key change command to the lock; and replacing, by the lock, the key with the updated key such that the user device is unable to access the lock using the access credential.
-
公开(公告)号:US10142843B2
公开(公告)日:2018-11-27
申请号:US15444076
申请日:2017-02-27
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic
摘要: Disclosed are methods, and devices for wireless key management for authentication. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile, wherein a user profile is authenticated and encrypted by a server using a lock key that is stored by the server and the locking device, and wherein the user profile comprises a user key; transmitting the user profile; decrypting the user profile using the lock key; transmitting a security code; generating an encrypted command comprising the security code and encrypted using the user key; transmitting the command; validating the command. Validating the command can include decrypting using the user key; determining whether the security code is valid; and authenticating using the user key; and initiating, in response to validating, an action of the locking device as specified by the command.
-
公开(公告)号:US12008850B2
公开(公告)日:2024-06-11
申请号:US17963020
申请日:2022-10-10
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
CPC分类号: G07C9/00309 , G07C9/00571 , H04W12/04 , H04W12/06 , H04W12/08 , G07C2009/00404 , G07C2009/00412
摘要: A system includes a server having a communication device and a processing circuit. The communication device is configured to facilitate communication with electronic devices. The processing circuit is configured to receive permission from a first user device for a guest user to access an electronic lock using a second user device, provide a notification to the second user device regarding a guest user profile, receive an activation command from the second user device based on the notification, generate the guest user profile for the guest user in response to receiving the permission and the activation command, and transmit the guest user profile to the second user device. The guest user profile is usable to allow the guest user to unlock the electronic lock.
-
公开(公告)号:US20170236352A1
公开(公告)日:2017-08-17
申请号:US15587034
申请日:2017-05-04
发明人: Nathan Conrad , Yi Zhang , Nemanja Stefanovic , John Bartucci , Scott Kalous
CPC分类号: G07C9/00309 , G01S5/0027 , G01S19/13 , G01S19/16 , G07C9/00174 , G07C9/00571 , G07C2009/00373 , G07C2009/00396 , G07C2009/00412 , G07C2009/00642 , G07C2009/00769 , G07C2009/0092 , H04L67/306 , H04W4/029 , H04W12/04 , H04W12/06 , H04W88/02
摘要: Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a locking device, transmitting a security challenge to the mobile device, and transmitting a response to the challenge and an encrypted user profile for the locking device. The response includes data generated with an access key that is stored by both the mobile device and the locking device, and the user profile is encrypted by a server using a secret key that is stored by the server and the locking device. Authentication further includes verifying the response to the challenge, where the response is verified using the access key, and validating additional data from the mobile device. An action of the locking device may be initiated as specified by the request.
-
-
-
-
-
-
-
-
-