Controlling physical access to secure areas via client devices in a network environment
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G07C-009/00
출원번호
US-0853578
(2015-09-14)
등록번호
US-9438635
(2016-09-06)
발명자
/ 주소
Tse, Kar Fai
출원인 / 주소
AirWatch LLC
인용정보
피인용 횟수 :
0인용 특허 :
86
초록▼
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.
대표청구항▼
1. A non-transitory computer-readable medium encoded with executable instructions that, when executed, cause at least one computing device to at least: identify a request to receive a physical access credential, wherein the request comprises at least one user access credential associated with the mo
1. A non-transitory computer-readable medium encoded with executable instructions that, when executed, cause at least one computing device to at least: identify a request to receive a physical access credential, wherein the request comprises at least one user access credential associated with the mobile device and at least one physical access point identifier, the at least one physical access point identifier being associated with a physical lock actuator;authenticate the at least one user access credential;determine whether the mobile device is in compliance with at least one compliance rule, the at least one compliance rule comprising a mobile device management restriction and a hardware restriction, the mobile device management restriction comprising a requirement that the mobile device be enrolled with a mobile device management system and the hardware restriction comprising a requirement that the mobile device includes particular computer hardware components; andwhen the at least one user access credential is authenticated and the mobile device is in compliance with the at least one compliance rule:authorize the mobile device to receive the physical access credential through the computer network, andauthorize the mobile device to transmit the physical access credential to the physical lock actuator associated with the at least one physical access point identifier to cause the physical lock actuator to be in an unlocked state. 2. The non-transitory computer-readable medium of claim 1, wherein the at least one user access credential is obtained by a sensor associated with the mobile device. 3. The non-transitory computer-readable medium of claim 1, the instructions further causing the at least one computing device to at least: requesting at least one additional user credential from the mobile device;authenticating the at least one additional user access credential; andif the at least one additional user access credential is authenticated, authorizing the mobile device to receive the physical access credential through the computer network. 4. The non-transitory computer-readable medium of claim 3, wherein the additional user credential comprises a biometric identifier representative of a biometric characteristic of a user associated with the user access credential. 5. The non-transitory computer-readable medium of claim 1, the instructions further causing the at least one computing device to at least: if the at least one user access credential is not authenticated or the mobile device is not in compliance with the at least one compliance rule, refusing to authorize the mobile device to receive the physical access credential through the computer network. 6. The non-transitory computer-readable medium of claim 1, the instructions further causing the at least one computing device to at least: if the at least one user access credential is not authenticated or the mobile device is not in compliance with the at least one compliance rule, revoking the physical access credential. 7. The non-transitory computer-readable medium of claim 1, the instructions further causing the at least one computing device to at least: determining whether the at least one user access credential is associated with a particular user group; andsending the physical access credential to the physical lock actuator in response to determining that the particular user group is an authorized user group. 8. A system, comprising: at least one computing device; andan application executed by the at least one computing device, the application configured to cause the at least one computing device to at least:identify a request for a physical access credential, wherein the request comprises at least one user access credential associated with the mobile device and at least one physical access point identifier, the at least one physical access point identifier being associated with a physical lock actuator;authenticate the at least one user access credential;determine whether the mobile device is in compliance with at least one compliance rule, the at least one compliance rule comprising a mobile device management restriction and a hardware restriction, the mobile device management restriction comprising a requirement that the mobile device be enrolled with a mobile device management system and the hardware restriction comprising a requirement that the mobile device includes particular computer hardware components; andwhen the at least one user access credential is authenticated and the mobile device is in compliance with the at least one compliance rule:authorize the mobile device to receive the physical access credential through the computer network, andauthorize the mobile device to transmit the physical access credential to the physical lock actuator associated with the at least one physical access point identifier to cause the physical lock actuator to be in an unlocked state. 9. The system of claim 8, wherein the at least one user access credential is obtained by a sensor associated with the mobile device. 10. The system of claim 8, the application further causing the at least one computing device to at least: requesting at least one additional user credential from the mobile device;authenticating the at least one additional user access credential; andif the at least one additional user access credential is authenticated, authorizing the mobile device to receive the physical access credential through the computer network. 11. The system of claim 10, wherein the additional user credential comprises a biometric identifier representative of a biometric characteristic of a user associated with the user access credential. 12. The system of claim 8, the application further causing the at least one computing device to at least: if the at least one user access credential is not authenticated or the mobile device is not in compliance with the at least one compliance rule, refusing to authorize the mobile device to receive the physical access credential through the computer network. 13. A method comprising: identifying a request to receive a physical access credential, wherein the request comprises at least one user access credential associated with the mobile device and at least one physical access point identifier, the at least one physical access point identifier being associated with a physical lock actuator;authenticating the at least one user access credential;determining whether the mobile device is in compliance with at least one compliance rule, the at least one compliance rule comprising a mobile device management restriction and a hardware restriction, the mobile device management restriction comprising a requirement that the mobile device be enrolled with a mobile device management system and the hardware restriction comprising a requirement that the mobile device includes particular computer hardware components; andwhen the at least one user access credential is authenticated and the mobile device is in compliance with the at least one compliance rule:authorizing the mobile device to receive the physical access credential through the computer network, andauthorizing the mobile device to transmit the physical access credential to the physical lock actuator associated with the at least one physical access point identifier to cause the physical lock actuator to be in an unlocked state. 14. The method of claim 13, wherein the at least one user access credential is obtained by a sensor associated with the mobile device. 15. The method of claim 13, further comprising: requesting at least one additional user credential from the mobile device;authenticating the at least one additional user access credential; andif the at least one additional user access credential is authenticated, authorizing the mobile device to receive the physical access credential through the computer network. 16. The method of claim 15, wherein the additional user credential comprises a biometric identifier representative of a biometric characteristic of a user associated with the user access credential. 17. The method of claim 13, further comprising: if the at least one user access credential is not authenticated or the mobile device is not in compliance with the at least one compliance rule, refusing to authorize the mobile device to receive the physical access credential through the computer network. 18. The method of claim 13, further comprising: if the at least one user access credential is not authenticated or the mobile device is not in compliance with the at least one compliance rule, revoking the physical access credential. 19. The method of claim 13, further comprising: determining whether the at least one user access credential is associated with a particular user group; andsending the physical access credential to the physical lock actuator in response to determining that the particular user group is an authorized user group.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (86)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.