Users of a social networking platform may provide electronic keys to other users of the social networking platform. Use of an electronic key may be subject to one or more conditions specified by the issuer of the electronic key. Data may be provided that enables the recipient to use the electronic k
Users of a social networking platform may provide electronic keys to other users of the social networking platform. Use of an electronic key may be subject to one or more conditions specified by the issuer of the electronic key. Data may be provided that enables the recipient to use the electronic key in accordance with the one or more conditions on use of the electronic key.
대표청구항▼
1. A system comprising: at least one processor; andat least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising: receiving, based on
1. A system comprising: at least one processor; andat least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising: receiving, based on input provided by a user, data identifying a recipient for an electronic key to a physical lock;receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key;receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;determining that the user has authority to issue the electronic key to the physical lock;in response to determining that the user has authority to issue the electronic key to the physical lock, storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key;after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock;determining that the received lock code is valid for the physical lock;determining that the one or more conditions on use of the electronic key are satisfied; andin response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock. 2. The system of claim 1: wherein the operations further comprise: accessing, from a social networking platform, data identifying a set of users that are connected to the user in the social networking platform; andproviding, to an electronic device associated with the user, information identifying the set of users that are connected to the user in the social networking platform;wherein receiving, based on input provided by the user, data identifying the recipient for the electronic key comprises receiving, based on input provided by the user, data indicating selection of one or more users from among the set of users that are connected to the user in the social networking platform. 3. The system of claim 1, wherein the operations further comprise: receiving, based on input provided by the user, revocation data indicating that the recipient should no longer have access to the electronic key;based on the revocation data: storing, in the electronic storage, key data that indicates that the electronic key is revoked; andtransmitting, to an electronic address for the recipient, data indicating that access to the electronic key by the recipient is terminated;after receiving the revocation data, receiving use data indicating an attempted use of the electronic key; andbased on the revocation data, transmitting, to the electronic device associated with the recipient, data indicating that the access to the physical lock is denied. 4. The system of claim 1, wherein the operations further comprise: receiving, from an electronic device, use data indicating an attempted use of the electronic key, the use data identifying the electronic key and including description information that describes the attempted use;accessing the stored key data; andevaluating the description information that describes the attempted use of the electronic key against the key data indicating the one or more conditions on use of the electronic key;wherein determining that the attempted use of the electronic key satisfies the one or more conditions on use of the electronic key is based on the evaluation. 5. The system of claim 4, wherein receiving, from the electronic device, the use data comprises, receiving the use data from a mobile phone associated with the recipient; wherein providing the access data, comprises transmitting an access code to the mobile phone associated with the recipient. 6. The system of claim 4, wherein receiving, from an electronic device, use data indicating an attempted use of the electronic key comprises receiving, based on input from the recipient, authentication data identifying the recipient; wherein the operations further comprise: evaluating the authentication data against stored reference data associated with the recipient; andbased on the evaluation of the authentication data, confirming the identity of the recipient;wherein the access data is provided in response to confirming the identity of the recipient. 7. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating a period of time during which the electronic key is operable; wherein storing the key data comprises storing key data indicating the period of time;wherein accessing the stored key data comprises accessing the key data indicating the period of time;wherein evaluating the description information that describes the use of the electronic key against the key data indicating the one or more conditions on use of the electronic key comprises: determining a time of the use;comparing the time with the time period;wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises determining that the determined time is within the time period;wherein the access data is provided in response to determining that the determined time is within the time period. 8. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating that the electronic key is operable only when the user is in a location other than a physical space to which access is controlled by the physical lock; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises determining that the user is in a location other than the physical space; andwherein the access data is provided in response to determining that the user is not present in the physical space;wherein the operations further comprise: receiving, from the electronic device, second use data indicating an attempted second use of the electronic key;determining that the user is present in the physical space; andbased on determining that the user is present in the physical space, transmitting, to the electronic device, data indicating that access to the physical lock is denied. 9. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating that the electronic key is operable only when the recipient has a particular qualification other than having been issued the electronic key; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises determining that the recipient has the qualification; andwherein the access data is provided in response to determining that the user has the particular qualification. 10. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating that use of the electronic key by the recipient requires approval by the user; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises: in response to receiving the use data, transmitting, to an electronic address for the user, a request for approval of the attempted use of the electronic key; andreceiving, based on input from the user, approval data indicating approval of the attempted use of the electronic key by the recipient; andwherein the access data is provided in response to receiving the approval data. 11. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating a predetermined number of times that the electronic key can be used by the recipient; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises: determining a number of times that the electronic key has previously been used by the recipient; anddetermining that the number of times that the electronic key has previously been used by the recipient is less than the predetermined number of times that the electronic key can be used by the recipient; andwherein the access data is provided in response to determining that the number of times that the electronic key has previously been used by the recipient is less than the predetermined number of times that the electronic key can be used by the recipient. 12. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating that the electronic key may be used only when the recipient is accompanied by one of a predetermined set of one or more persons; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises: receiving presence data that indicates the identity of a person accompanying the recipient when the use of the electronic key is attempted; andbased on the presence data, determining that the person is one of the predetermined set of one or more persons and that the person accompanies the recipient; andwherein the access data is provided in response to determining that the person is one of the predetermined set of one or more persons and that the person accompanies the recipient. 13. The system of claim 4, wherein receiving data indicating the one or more conditions on use of the electronic key comprises receiving data indicating that the electronic key may be used only when the recipient is accompanied by a person who satisfies one or more criteria; wherein determining that the use of the electronic key satisfies the one or more conditions on use of the electronic key comprises: receiving presence data that indicates the identity of a person that accompanies the recipient when the use of the electronic key is attempted; anddetermining that the person satisfies the one or more criteria and that the person accompanies the recipient; andwherein the access data is provided in response to determining that the person satisfies the one or more criteria and that the person accompanies the recipient. 14. The system of claim 4, wherein the operations further comprise: receiving, based on input from the user, data indicating that the user authorizes the recipient to transfer the electronic key to one or more other users of a social networking platform;receiving, based on input from the user, data indicating one or more restrictions on the transfer of the electronic key by the recipient;receiving, based on input from the recipient, a request to transfer the electronic key to a second recipient that has not been granted an electronic key to the physical lock;determining that the transfer to the second recipient satisfies the one or more restrictions on transfer of the electronic key by the recipient; andin response to determining that the transfer to the second recipient satisfies the one or more restrictions on transfer of the electronic key by the recipient: storing, in the electronic storage, second key data that identifies the second recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key;accessing, from profile data for the second recipient from the social networking platform, an electronic address for the second recipient; andtransmitting, to the electronic address for the second recipient, data that (i) indicates that the electronic key is transferred to the second recipient and (ii) enables the recipient to use the electronic key in accordance with the one or more conditions on use of the electronic key. 15. The system of claim 4, wherein receiving, based on input provided by a user, data identifying the recipient for the electronic key to the physical lock comprises receiving, based on input provided by the user through a social networking platform, the data indicating a recipient for the electronic key to the physical lock; wherein receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key comprises receiving, based on input provided by the user through the social networking platform, data identifying the physical lock to which the user desires to provide the electronic key;wherein receiving, based on input provided by the user, data indicating the one or more conditions on use of the electronic key comprises receiving, based on input provided by the user through the social networking platform, the data indicating the one or more conditions on use of the electronic key; andwherein the operations comprises transmitting, through the social networking platform, data indicating that the electronic key is transferred to the recipient. 16. The system of claim 4, wherein receiving, based on input provided by the user, data identifying the recipient for the electronic key comprises receiving input provided by the user through a service that operates independently from a social networking platform and that accesses profile data for the recipient through electronic communications with the social networking platform. 17. At least one non-transitory computer-readable storage medium encoded with executable instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising: receiving, based on input provided by a user, data identifying a recipient for an electronic key to a physical lock, the recipient being connected to the user in a social networking platform;receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key;receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;determining that the user has authority to issue the electronic key to the physical lock;in response to determining that the user has authority to issue the electronic key to the physical lock, storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key;after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock;determining that the received lock code is valid for the physical lock;determining that the one or more conditions on use of the electronic key are satisfied; andin response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock. 18. A method comprising: receiving, based on input provided by a user, data indicating a recipient for an electronic key to a physical lock, the recipient being connected to the user in a social networking platform;receiving, based on input provided by the user, data identifying the physical lock to which the user desires to provide the electronic key;receiving, based on input provided by the user, data indicating one or more conditions on use of the electronic key;storing, in electronic storage, key data that identifies the recipient of the electronic key, the physical lock for which the electronic key is granted, and the one or more conditions on use of the electronic key;after storing the key data, receiving, from an electronic device associated with the recipient, a lock code obtained from the physical lock through proximity-dependent communication with the physical lock;determining that the received lock code is valid for the physical lock;determining that the one or more conditions on use of the electronic key are satisfied; andin response to determining (i) that the received lock code is valid for the physical lock and (ii) that the one or more conditions on use of the electronic key are satisfied, providing, to the electronic device associated with the recipient or to the physical lock, access data configured to cause the physical lock to unlock. 19. The method of claim 18, wherein the physical lock is configured to provide different lock codes at different times, and wherein determining that the received lock code is valid for the physical lock comprises determining that the received lock code is a current lock code of the physical lock at a current time. 20. The method of claim 18, wherein receiving the lock code comprises receiving a lock code, from the electronic device associated with the recipient, that the electronic device obtained from the physical lock through direct wireless communication with the physical lock. 21. The method of claim 18, further comprising verifying that the electronic device associated with the recipient is currently within a predetermined level of proximity of the physical lock based at least in part on determining that the received lock code is valid for the physical lock; and providing the access data comprises providing the access data, while the electronic device is within the predetermined level of proximity of the physical lock, based on verifying that the electronic device is currently within a predetermined level of proximity of the physical lock.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (23)
Takayama,Hisashi; Furuyama,Junko, Authentication method, system and apparatus of an electronic value.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.