US 12,438,886 B2
Preventing unregistered electronic devices from accessing a secure area
Eric R Kern, Chapel Hill, NC (US); Paola Martinez Morales, Wendell, NC (US); Drew Johnson, Fuquay-Varina, NC (US); and Christopher Scullion, Lawrenceville, GA (US)
Assigned to Lenovo Global Technology (United States) Inc., Morrisville, NC (US)
Filed by Lenovo Enterprise Solutions (Singapore) Pte Ltd., Singapore (SG)
Filed on Sep. 29, 2023, as Appl. No. 18/478,754.
Prior Publication US 2025/0112931 A1, Apr. 3, 2025
Int. Cl. G06F 21/00 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/107 (2013.01) [H04L 63/083 (2013.01); H04L 63/0876 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer program product comprising a non-transitory computer readable medium and program instructions embodied therein, the program instructions, when executed by a processor, cause the processor to perform operations comprising:
receiving, from one or more personal computing devices, user data identifying a user of the personal computing device, user device data uniquely identifying the personal computing device, a current location of the personal computing device, and an identification of one or more electronic devices transmitting a wireless signal detected by the personal computing device; and
enabling access through an entrance into a secure area in response to determining that, for each of the one or more personal computing devices, a set of conditions are satisfied, the set of conditions including:
the received user data identifying the user of the personal computing device matches data in a user data field of one of a plurality of user records stored in an authorized user data structure;
the received user device data uniquely identifying the personal computing device matches data stored in a user device field of the same user record as the received user data;
the received current location of the personal computing device is within a predetermined area near the entrance into the secure area; and
for each of the one or more electronic devices detected by the personal computing device, the identification of the electronic device matches data in a user device field of one of the plurality of user records stored in the authorized user data structure and the same user record that includes the identification of the electronic device identifies a user that has been authenticated and determined to have a current location within the predetermined area.