US 11,777,996 B2
Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
Hsin-Cheng Chiu, Bethesda, MD (US); and Steven Mark Bryant, Sterling, VA (US)
Assigned to Brivo Systems LLC, Bethesda, MD (US)
Filed by Hsin-Cheng Chiu, Bethesda, MD (US); and Steven Mark Bryant, Sterling, VA (US)
Filed on Jun. 29, 2019, as Appl. No. 16/458,044.
Application 16/458,044 is a continuation in part of application No. 15/390,507, filed on Dec. 25, 2016, abandoned.
Prior Publication US 2019/0325673 A1, Oct. 24, 2019
Int. Cl. H04L 9/40 (2022.01); G07C 9/00 (2020.01); H04W 12/08 (2021.01); G06F 16/23 (2019.01); G06F 16/908 (2019.01); G07C 9/23 (2020.01); G07C 9/20 (2020.01); G07C 9/21 (2020.01); H04W 12/06 (2021.01); H04W 12/61 (2021.01)
CPC H04L 63/205 (2013.01) [G06F 16/2365 (2019.01); G06F 16/908 (2019.01); G07C 9/00 (2013.01); G07C 9/21 (2020.01); G07C 9/215 (2020.01); G07C 9/23 (2020.01); H04L 63/08 (2013.01); H04L 63/10 (2013.01); H04W 12/08 (2013.01); H04L 63/0823 (2013.01); H04L 63/0838 (2013.01); H04L 2463/121 (2013.01); H04W 12/06 (2013.01); H04W 12/61 (2021.01)] 2 Claims
OG exemplary drawing
 
1. A method for control of a physical access portal comprising the processes: at a controller,
receiving a plurality of physical access requests (access requests) from a plurality of mobile application devices; at the controller,
determining for each mobile application device (app device) a sequence of access requests comprising at least a first access request and a second access request SOLELY GENERATED BY EACH mobile application DEVICE; at the controller, upon authenticating the first access request (predecessor), writing into non-transitory storage a one-time verification code specific to an immediately subsequent second access request (successor) from the same mobile application device; and at the controller,
upon receiving a successor, performing an authentication process by matching the stored one-time verification code associated with the predecessor; and
on the condition the authentication process passes, writing a newer one-time verification code into non-transitory storage specific to yet another immediately subsequent successor;
wherein each newer one-time verification code is synthesized WITH A MASK OF LEAST SIGNIFICANT BITS TO PROVIDE A RANGE OF TIME RELATING A REQUEST AND THE LAST SUCCESSFUL PHYSICAL ACCESS REQUEST SOLELY AT AND by the mobile application device and transmitted in both a predecessor and successor request; and,
on the condition the authentication process fails,
setting a flag of questionable chain of control associated with the mobile application device.