Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated t
Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level.
대표청구항▼
1. A method for simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock;authenticating the credential;unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential;
1. A method for simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock;authenticating the credential;unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential;determining a security level associated with the lock; andconditionally capturing the credential based on the security level, wherein conditionally capturing the credential comprises revoking the credential until a re-lock status of the lock is indicated;wherein conditionally capturing the credential comprises when a low security level is associated with the lock, the credential is not captured;wherein conditionally capturing the credential comprises when a security level greater than the low security level is associated with the lock, the credential is captured to restrict access to a second resource during a time when the credential is captured;determining that the lock is relocked subsequent to unlocking the lock;based on determining that the lock is relocked, releasing the credential when the credential was captured. 2. The method of claim 1, wherein authenticating the credential comprises a validation of at least one of a key, a username, a password, and a personal identification number (PIN). 3. The method of claim 1, wherein the credential is captured responsive to determining that the security level corresponds to at least one of a medium security level and a high security level. 4. The method of claim 1, wherein the credential is captured responsive to determining that the security level corresponds to a medium security level, the method further comprising: causing a prompt to be presented that requests a response that the lock is relocked; receiving the response; and providing access to the second resource based on receiving the response. 5. The method of claim 1, wherein the credential is captured responsive to determining that the security level corresponds to a high security level, the method further comprising: verifying that the lock is relocked; and providing access to the second resource based on verifying that the lock is relocked. 6. The method of claim 1, wherein the lock is unlocked via a first device associated with a first user, the method further comprising: relocking the lock via a second device associated with a second user; and providing access to the first user to a second resource based on verifying that the lock is relocked. 7. The method of claim 1, wherein the lock is a physical, electro-mechanical lock. 8. The method of claim 1, wherein determining a security level associated with the lock comprises determining the security level based on an internal security policy associated with the lock and a security policy defined in the credential. 9. The method of claim 1, wherein the credential is captured so that access to subsequent resources is determined using a security policy. 10. The method of claim 1, wherein the lock is a removable lock core. 11. The method of claim 1, wherein the security level is based on a system-wide security policy, a user's credentials, and security policy associated with the lock. 12. An apparatus comprising: at least one processor; andmemory having instructions stored thereon that, when executed by the at least one processor, cause the apparatus to:receive an electronic credential to be applied to a lock,receive an indication that the lock has authenticated the credential,determine a security level associated with the lock,conditionally capture the credential when the security level is of a pre-defined security level, wherein capturing the credential comprises revoking the credential until a re-lock status of the lock is indicated; wherein conditionally capturing the credential comprises when a low security level is associated with the lock, the credential is not captured;wherein conditionally capturing the credential comprises when a security level greater than the low security level is associated with the lock, the credential is captured to restrict access to a second resource during a time when the credential is captured;determine that the lock is relocked subsequent to unlocking the lock;based on determining that the lock is relocked, releasing the credential when the credential was captured. 13. The apparatus of claim 12, wherein the instructions, when executed by the at least one processor, cause the apparatus to: receive the electronic credential via a wireless transmission. 14. The apparatus of claim 13, wherein the wireless transmission comprises as least one of a near field communication (NFC) and a Bluetooth communication. 15. The apparatus of claim 12, wherein the apparatus comprises a mobile phone, and wherein an application configured to run on the mobile phone simulates the capture of the credential. 16. The apparatus of claim 12, wherein the apparatus comprises at least one of a smart card and a phone configured to emulate a smart card to the lock. 17. The apparatus of claim 12, wherein the instructions, when executed by the at least one processor, cause the apparatus to: receive an indication that the lock is relocked, and release the credential when the credential was captured based on the pre-defined security level. 18. The apparatus of claim 17, wherein the instructions, when executed by the at least one processor, cause the apparatus to: determine that a medium security level is used, cause a prompt to be presented based on determining that the medium security level is used, wherein the prompt requests a response that the lock is relocked after a timeout has expired, receive the response, and provide access to the second resource based on receiving the response. 19. The apparatus of claim 18, wherein the prompt comprises a pop-up message. 20. The apparatus of claim 17, wherein the instructions, when executed by the at least one processor, cause the apparatus to: determine that a high security level is used, verify that the lock is relocked based on determining that the high security level is used, and provide access to the second resource based on verifying that the lock is relocked. 21. The apparatus of claim 12, wherein the lock is a physical, electro-mechanical lock. 22. The apparatus of claim 12, wherein the apparatus comprises a phone, and wherein the credential comprises a hand gesture.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (27)
Harkins, Michael; Fale, Casey, Access control system.
Benore Randolph C. (North Canton OH) Gagliano Joseph (Canton OH) Gibson Shawn (Newago MI) Grosswiller Leo J. (East Canton OH) McGeorge Gram (Spring Lake MI) Neidlinger Donald (Grand Haven MI), Electronic security system.
Higham John D. ; Godlewski Peter P. ; Arnold Richard C. ; Holmes William K., Methods and devices for dispensing pharmaceutical and medical supply items.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.