Controlling physical access to secure areas via client devices in a networked environment

ABSTRACT

A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of and claims the benefit of U.S.patent application Ser. No. 15/216,236, entitled “CONTROLLING PHYSICALACCESS TO SECURE AREAS VIA CLIENT DEVICES IN A NETWORKED ENVIRONMENT,”filed Jul. 21, 2016, which is a continuation of and claims the benefitof U.S. patent application Ser. No. 14/853,578, entitled “CONTROLLINGPHYSICAL ACCESS TO SECURE AREAS VIA CLIENT DEVICES IN A NETWORKEDENVIRONMENT,” filed Sep. 14, 2015, which is a continuation of and claimsthe benefit of U.S. patent application Ser. No. 13/840,156, entitled“CONTROLLING PHYSICAL ACCESS TO SECURE AREAS VIA CLIENT DEVICES IN ANETWORKED ENVIRONMENT,” filed Mar. 15, 2013, all of which are herebyincorporated by reference herein in their entirety.

BACKGROUND

Controlling physical access to buildings, rooms, secured outdoor areas,and storage containers is critical to ensure that only authenticated andauthorized users gain access to appropriate areas. To date, this hastypically been accomplished by utilizing traditional lock and keymechanisms, radio frequency identification (RFID) readers and fobs, andhuman monitored access/check points. These methods are either passive,unable to address changing conditions which may impact authorization ofvarious individuals to access certain areas, and/or require human-laborintensive solutions (i.e., security guards). Systems and methods arenecessary to take advantage of existing resources which can provide lowcost means of authorizing physical access for individuals anddynamically changing the bounds of such authorization depending onrelevant conditions pertaining thereto.

BRIEF DESCRIPTION

In some embodiments, a computer-readable medium encoded with software isprovided. When executed, the software may receive a request for aphysical access credential, where the first request comprises at leastone user access credential and at least one physical access pointidentifier. The software may also determine whether the request shouldbe granted based at least in part on the at least one user accesscredential. The software may additionally, in response to determiningthat the request should be granted, send the physical access credentialassociated with the physical access point.

In some embodiments a method is provided. The method may includereceiving, from a sensor, a device identifier from a client device. Themethod may also include sending, to a remote server, the deviceidentifier and a security identifier associated with a physical lockactuator. The method may further include in response to sending thedevice identifier and the security identifier, receiving an unlockinstruction from the remote server. The method may additionally include,in response to receiving the unlock instruction, actuating the physicallock actuator.

In some embodiments an apparatus is provided. The apparatus may includea communication system configured to recognize the presence of awireless signal. In response to recognizing the presence of a wirelesssignal, the communication system may also be configured to transmit arequest for at least one physical access credential associated with thewireless signal, wherein the request includes a user access credential.The communication system may further be configured to receive the atleast one physical access credential associated with an area where thewireless signal is present. The apparatus may also include a transceiverconfigured to send at least one physical access credential to a physicalaccess point to actuate a physical lock actuator.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following diagrams. The drawings are not necessarily toscale, emphasis instead being placed upon clearly illustrating certainfeatures of the disclosure. Moreover, in the drawings, like referencenumerals designate corresponding parts throughout the several views.

FIG. 1 is a block diagram of a networked environment according tocertain example embodiments;

FIG. 2 is a flowchart illustrating example functionality implemented asportions of a authentication service executed by a remote server in thenetworked environment of FIG. 1;

FIG. 3 is a flowchart illustrating example functionality implemented asportions of an enterprise access application executed by a client devicein the networked environment of FIG. 1; and

FIG. 4 is a schematic block diagram illustrating a remote server andcompliance server employed in the networked environment of FIG. 1.

DETAILED DESCRIPTION

Disclosed are various embodiments for systems and methods for providinga physical access credential to a client device from a remote server,where the physical access credential enables physical access to a securephysical area. An example system comprises a remote server, a clientdevice, a compliance server, and a physical access point, where theremote server performs functionality for receiving requests for physicalaccess credentials, and authorizing and distributing physical accesscredentials in response to such requests. In some embodiments, theremote server may receive, from a client device, a request for aphysical access credential. The request may include a device identifierand/or a user access credential. The remote server may determine whetherthe request should be granted based at least in part on the deviceidentifier and/or the user access credential being approved deviceidentifiers and/or user access credentials. In some embodiments, theauthentication service may authenticate the user operating the clientdevice without also authenticating the client device, or in someembodiments, merely authenticate the device, and not the user. In someembodiments, the authentication service may authenticate that theparticular pairing of the device identifier and user access credentialis an approved pairing.

The remote server may then identify a physical access credentialassociated with the approved device identifier and user accesscredential pairing, the user access credential, and/or the deviceidentifier, based at least in part on a determination that the requestshould be granted. In some embodiments, the remote server may consult acompliance server to determine if any compliance rules are applicable tothe request and/or identified physical access credential. The remoteserver may check the physical access credential and/or the request,including possibly client device profile information included in suchrequest, against these compliance rules.

Upon authorization and/or favorable comparison to the compliance rules,if applicable, the remote server may then send, to the client device,the identified physical access credential. A user may then present theclient device to a physical access point, which includes for example anear field communication device to communicate with the client device.The physical access point and the client device may communicate toestablish that the user of the client device is authorized to physicalaccess to the area beyond the physical access point. The physical accesspoint may or may not also communicate with the remote server to receiveinstructions on which physical access credentials will be accepted,and/or to verify any specific attempt to access by a client device. Onceit is determined that physical access is permitted, the physical accesspoint may actuate a mechanical device to unlock a building, location,door, gate, drawer, filing cabinet, storage unit, cabinet, and/or thelike.

The remote server may store a log of all granted and denied requests forphysical access credentials, all granted physical access credentials,all expired and/or revoked physical access credentials, and/or all usesphysical access credentials to obtain entry/access to a physical accesspoint. Any contents of these items may also be stored, and theinformation may be obtained from the remote server itself, the clientdevice, and/or the physical access point before, during, and/or aftersuch information is generated, received, and/or sent by saidsystem/subsystem.

FIG. 1 illustrates a networked environment 100 according to variousembodiments. The networked environment 100 includes a network 110, aclient device 120, a remote server 130, a compliance server 140, and aphysical access point 150. The network 110 includes, for example anytype of wireless network such as a wireless local area network (WLAN), awireless wide area network (WWAN), and/or any other type of wirelessnetwork now known and/or later developed. Additionally, the network 110includes the Internet, intranets, extranets, microwave networks,satellite communications, cellular systems, PCS, infraredcommunications, global area networks, and/or other suitable networks,etc., and/or any combination of two or more such networks. Embodimentsconsistent with this disclosure are described below in connection withWWANs (as illustrated in FIG. 1); however, it should be understood thatembodiments described herein may be used to advantage in any type ofwireless network.

In some embodiments, the network 110 facilitates the transport of databetween at least one client device, such as client device 120, theremote server 130, the compliance server 140, and the physical accesspoint 150. Client devices may include a laptop computer, a personaldigital assistant, a cellular telephone, a set-top device, musicplayers, web pads, tablet computer systems, game consoles, and/or otherdevices with like capability. Client device 120 comprises a wirelessnetwork connectivity component, for example, a PCI (Peripheral ComponentInterconnect) card, USB (Universal Serial Bus), PCMCIA (PersonalComputer Memory Card International Association) card, SDIO (SecureDigital Input-Output) card, NewCard, Cardbus, a modem, a wireless radiotransceiver (including an RFID transceiver), and/or the like.Additionally, the client device 120 may include a processor forexecuting applications and/or services, and a memory accessible by theprocessor to store data and other information. The client device 120 isoperable to communicate wirelessly with the remote server 130 and thephysical access point 150 with the aid of the wireless networkconnectivity component.

Additionally, the client device 120 may store in memory a deviceidentifier 121, user access credentials 122, a device profile 123, andpotentially other data. In some embodiments, the device identifier 121may include a software identifier, a hardware identifier, and/or acombination of software and hardware identifiers. For instance, thedevice identifier 121 may be a unique hardware identifier such as a MACaddress, a CPU ID, and/or other hardware identifiers. The user accesscredentials 122 may include a username, a password, and/or biometricdata related to facial recognition, retina recognition, fingerprintrecognition, and the like. Additionally, the device profile 123 mayinclude a listing of hardware and software attributes that describe theclient device 120. For instance, the device profile 123 may includehardware specifications of the client device 120, version information ofvarious software installed on the client device 120, and/or any otherhardware/software attributes. Additionally, the device profile 123 mayalso include data indicating a date of last virus scan, a date of lastaccess by IT, a date of last tune-up by IT, and/or any other dataindicating a date of last device check.

The client device 120 may further be configured to execute variousapplications such as an “enterprise access application” 124. Theenterprise access application 124 may be executed to transmit a requestfor a physical access credential. One such credentials are received,they may be stored on the client device 120 for later reference and/ortransmission, possible via communication system 125. Communicationsystem 125 may be the same or different than the wireless networkconnectivity component previously discussed, include the same ordifferent communication abilities, and may at least be specifically ableto communicate with physical access points 150, discussed below.

The client device 120 may also be configured to execute otherapplications such as, for example, browser applications, emailapplications, instant message applications, word processingapplications, spreadsheet applications, database applications, and/orother applications. For instance, a browser and/or word processingapplication may be executed in the client device 120, for example, toaccess and render network pages, such as web pages, documents, and/orother network content served up by remote server 130, the complianceserver 140, and/or any other computing system.

The remote server 130 and the compliance server 140 can each beimplemented as, for example, a server computer and/or any other systemcapable of providing computing capability. Further, the remote server130, compliance server 140, and any other system described herein may beconfigured with logic for performing the methods described in thisdisclosure. Although one remote server 130 and one compliance server 140are depicted in FIG. 1, certain embodiments of the networked environment100 include more than one remote server 130 and/or compliance server140. At least one of the servers may be employed and arranged, forexample, in at least one server bank, computer bank, and/or otherarrangements. For example, the server computers together may include acloud computing resource, a grid computing resource, and/or any otherdistributed computing arrangement. Such server computers may be locatedin a single installation and/or may be distributed among many differentgeographical locations. For purposes of convenience, the remote server130 and the compliance server 140 are each referred to herein in thesingular.

Various applications and/or other functionality may be executed in theremote server 130 and the compliance server 140, respectively, accordingto certain embodiments. Also, various data is stored in a data store 131that is part of and/or otherwise accessible to the remote server 130and/or a data store 141 that is part of and/or otherwise accessible tothe compliance server 140. The data stored in each of the data stores131 and 141, for example, may be accessed, modified, removed, and/orotherwise manipulated in association with the operation of theapplications and/or functional entities described herein.

The components executed in the remote server 130 include aauthentication service 135, and may include other applications,services, processes, systems, engines, and/or functionality notdiscussed in detail herein. As used herein, the term “authenticationservice” is meant to generally refer to computer-executable instructionsfor performing the functionality described herein for authorizing anddistributing physical access credentials 136. The authentication service135 is executed to receive a request for physical access 136 from anenterprise access application 124 executed on a client device 120 and todetermine whether to grant or deny the request 136. Upon determining togrant the request 136, the authentication service 135 may then sendphysical access credentials 134, as will be described.

The data stored in the data store 131 of the remote server 130 mayinclude, for example, approved device identifiers 132, approved useraccess credentials 133, physical access credentials 134, and potentiallyother data. The approved device identifiers 132 represents a listing ofdevice identifiers 121 that have been preapproved for potentiallyaccessing physical access credentials 134, which will entitle holders ofclient devices 120 to physical access at physical access points 150. Theapproved device identifiers 132 may have been previously provided to theremote server 130 by a system administrator and/or the like. Theapproved user access credentials 133 represents a listing of user accesscredentials 122 that have been pre-approved for potentially accessingphysical access credentials 134, which will entitle them to physicalaccess at physical access points 150.

The components executed in the compliance server 140 include acompliance service 143, and may include other applications, services,processes, systems, engines, and/or functionality not discussed indetail herein. As used herein, the term “compliance service” is meant togenerally refer to computer-executable instructions for performing thefunctionality described herein for authorizing the devicecharacteristics of another device, such as a client device 120. Thecompliance service 143 is executed to determine whether the devicecharacteristics of the client device 120 comply with the compliancerules 142 that are stored in the data store 141. For instance, thecompliance service 143 may identify the device characteristics from thedevice profile 123 of each client device 120. Additionally, thecompliance rules 142 represents a listing of hardware restrictions,software restrictions, and/or mobile device management restrictions thatneed to be satisfied by the client device 120 for use of physical accesscredentials 134.

In some embodiments, hardware restrictions included in the compliancerules 142 may comprise restrictions regarding use of specific clientdevices 120 and specific client device features, such as, for instance,cameras, Bluetooth, IRDA, tethering, external storage, a mobile accesspoint, and/or other hardware restrictions. Software restrictionsincluded in the compliance rules 142 may comprise restrictions regardingthe use of specific client device operating systems and/or otherapplications 125, internet browser restrictions, screen capturefunctionality, and/or other software restrictions. Mobile devicemanagement restrictions included in the compliance rules 142 compriseencryption requirements, firmware versions, remote lock and wipefunctionalities, logging and reporting features, GPS tracking, and/orother mobile device management features.

The compliance service 143 may determine whether the devicecharacteristics of a client device 120 satisfy at least one of therestrictions enumerated in the compliance rules 142. For example, thecompliance service 143 may determine that a client device 120 that has acamera, Bluetooth capability, and is executing a specified version of anoperating system is compliant with the compliance rules 142. As anotherexample, the compliance service 143 may determine that a client device120 that is associated with an external storage unit and has screencapture functionality enabled is not compliant with the compliance rules142. All of these restrictions discussed above may affect whether theclient device 120 is entitled to use a given physical access credential134. In some embodiments, however, the compliance service 143 may not beused and physical access authorization may be determined solely based onapproved user access credentials 133 and/or approved device identifiers132.

A user operating a client device 120 may wish to receive at least onephysical access credential 134 so that the user may physically access abuilding, location, door, gate, drawer, filing cabinet, storage unit,cabinet, etc. In some embodiments, the user may interact with an inputdevice to manipulate a network page displayed by a locally executedapplication, such as a browser application, to generate the request forphysical access 136. In some embodiments, the user may manipulate a userinterface generated by a locally executed application to generate therequest 136. In either case, the user may provide login informationand/or the application may automatically retrieve the login informationfrom the memory of the client device 120. Login information may be, forinstance, a unique user name, a password, biometric data, and/or othertypes of user access credentials 122. The application may thencommunicate the request to the enterprise access application 124, whichmay generate and transmit the request 136 to the authentication service135. In some embodiments, the enterprise access application 124 mayitself receive the input from the user directly and then transmit theaccess request 136 to the remote server 130.

Upon receiving the request 136, the authentication service 135determines whether to grant or deny the request 136. In someembodiments, the authentication service 135 may first authenticate theclient device 120 and the user operating the client device 120. To thisend, the authentication service 135 determines whether the deviceidentifier 121 associated with the client device 120 matches one of theidentifiers listed in the listing of approved identifiers 132. Forinstance, the device identifier 121 of the client device 120 may beincluded as part of the request 136 transmitted by the enterprise accessapplication 124. In some embodiments, the authentication service 135 mayrequest the device identifier 121 from the client device 120 in responseto receiving the access request 136. Upon identifying and/or receivingthe device identifier 121, the authentication service 135 determineswhether the device identifier 121 matches one of the approvedidentifiers 132 stored in the data store 131. In some embodiments, theauthentication service 135 may authenticate the client device 120dynamically by determining whether the device identifier 121 is within apredetermined range of approved device identifiers 132. In someembodiments, the authentication service 135 may authenticate the clientdevice 120 dynamically by performing an algorithm on the deviceidentifier 121.

Additionally, the authentication service 135 may also authenticate theuser operating the client device 120 by determining whether the useraccess credentials 122 associated with the user match one of thecredentials in the listing of approved user access credentials 133. Forinstance, the user access credentials 122 associated with the user onthe client device 120 may be included as part of the access request 136transmitted by the enterprise access application 124. In someembodiments, the authentication service 135 may request the user accesscredentials 122 from the client device 120 in response to receiving theaccess request 136. Upon identifying and/or requesting the user accesscredentials 122, the authentication service 135 may determine whetherthe user access credentials 122 matches one of the approved user accesscredentials 133 stored in the data store 131. In some embodiments, theauthentication service 135 may authenticate the user operating theclient device 120 without also authenticating the client device 120. Inother words, certain authenticated users may be authorized to gain therequested physical access regardless of what device they used to submitthe physical access request 136.

In some embodiments, having authenticated the client device 120 and theuser operating the client device 120 as authorized to receive thephysical access credential 134, the authentication service 135communicates with the compliance service 143 to further authorize theclient device 120 to receive the physical access credential 134. In someembodiments, the compliance service 143 authorizes the client device 120by determining whether device characteristics of the client device 120comply with applicable compliance rules 142. For instance, thecompliance service 143 may identify the device characteristics of theclient device 120 from the device profile 123. All or part of the deviceprofile 123 may have been provided by the client device 120 inconjunction with the request 136 and/or may be subsequently requestedfrom the client device 120 by the authentication service 135 and/or thecompliance service 143. The compliance service 143 then analyzes thedevice characteristics to determine whether the software restrictions,hardware restrictions, and/or device management restrictions defined inthe compliance rules 142 are satisfied and returns the result of thedetermination to the authentication service 135. In an alternativeembodiment, the authentication service 135 may include and performfunctionality for determining whether the client device 120 complieswith the compliance rules 143.

If the authentication service 135 determines and/or receives adetermination that the client device 120 is authorized, theauthentication service 135 then associates the client device 120 with atleast one physical access credential 134. In some embodiments, theauthentication service 135 sends the physical access credentials 134 tothe client device 120 and authorizes the client device 120 to use suchcredentials in connection with accessing physical access points 150. Insome embodiments, the authentication service 135 may also send thephysical access credentials to physical access point 150.

In some embodiments, the physical access credential 134 may be revokedat any time by the remote server 130. Revocation may occur for anynumber of reasons, including but not limited to, a change in deviceprofile 123, a change in approved device identifiers 132, a change inapproved user access credentials 133, expiration of a defined timeperiod, and/or a request from the user of the client device 120.

In some embodiments, the physical access point 150 is anelectro-mechanical device capable of sending and/or receivinginformation, and in response thereto opening a physical barrier, forexample a building, location, door, gate, drawer, filing cabinet,storage unit, cabinet, etc. Depending on the embodiment, the physicalaccess point may or may not be in communication with network 110 andservers and devices connected therewith. In these embodiments, thephysical access point may have authorized physical access credentials134 embedded and/or stored therein, either in a ROM-type storage unit,and/or in a non-networked RAM-type storage unit. A non-networkedRAM-type storage unit could be updated locally by direct connection viaUSB and/or the like, with additional security mechanisms to preventunwanted tampering/changing of the embedded/stored physical accesscredentials 134.

The physical access point 150 may include a data store 151 formaintaining data and/or applications which relate to determining whethera client device 120 may be allowed access by the physical access point150. In some embodiments, the data store 151 may only include a singleaccess code and/or datum that is expected to be matched by any clientdevice 120 providing the same, thereby entitling the client device 120to access beyond the physical barrier. In some embodiments, the datastore 151 may include a plurality of access codes, any of which may bematched by a client device 120 to verify authority to access beyond thephysical barrier. The physical access point may have a processor toimplement such methods.

The physical access point 150 may also include a physical lock actuator152, for example, a solenoid and/or other electro-mechanical actuator,which is operable to physically unlock the physical barrier upon commandto do so by the physical access point 150. The physical access point mayalso include a communication system 153 for sending and receivinginformation with a client device 120 (for example, an RFID transceiver,a wireless radio transceiver, a near field communication device, and/orthe like).

FIG. 2 is a flowchart illustrating example functionality implemented asportions of a authentication service 135 executed by a remote server 130in the networked environment 100 of FIG. 1. At block 205, a physicalaccess request 136 is received by the authentication service 135 from aclient device 120. At block 210, the authentication service 135determines whether or not the client device 120 is authorized to receivea physical access credential 134. As described, this authorizationdecision may at least be based on authentication of a device identifierand/or user access credentials and, in some embodiments, compliance bythe user device with applicable compliance rules. If the request 136 isnot authorized, then appropriate notifications are transmitted to theclient device 120 at block 215. If the request 136 is authorized, thenat block 220 the authentication service 135 identifies which physicalaccess credentials are associated with the user and/or client device120. At block 225, the authentication service 135 sends to theenterprise access application 124 the identified physical accesscredential 134, as well as any applicable compliance rules 142.

In some embodiments, creating the physical access credential may includecreating a hash of a plurality of security identifiers that will beaccepted by various physical access points 150 to allow physical access.The remote server 130 may have access to a database and/or list of suchsecurity identifiers (also referred to herein as physical access pointidentifier) and be able to determine which security identifierscorrespond to which approved user access credentials 133 and/or approveddevice identifiers 133. In many embodiments, these security identifierswith represent authentication values stored in a ROM of the physicalaccess points 150. Any suitable compatible hash function may be employedto combine the security identifiers into a hash that may be communicatedto the client device 120. The hash may then be decodable by the clientdevice 120 to derive the security identifiers for transmission to thephysical access points 150 when access is desired. The client device 120may transmit all security identifiers in an access attempt, and/orreceive a request for a specific identifier from the physical accesspoint 150. In some embodiments, the physical access point 150 mayreceive the entire un-decoded hash, and decode it independently toverify if the particular security identifier is present in the hash, andthat therefore access should be granted. In some embodiments, the hashmay be keyed and/or the like, such that an identifier associated withthe physical access point 150 may be necessary to decode the hash andretrieve the physical access credential 134 necessary for access. Otherdata elements may also be employed to decode the hash, including forexample, the device identifier 121 and/or the user access credential122. Communication as necessary between the client device 120 and thephysical access point 150 may at least assist in accomplishing decodingof the hash.

Depending on the embodiments, optionally at block 230, theauthentication service 135 may also send to the physical access point150 the identified physical access credential 134, as well as anyapplicable compliance rules 142. In these embodiments, the physicalaccess point 150 may determine conformance with the compliance rules 142by receiving the device profile 123 from the client device 120, and/orby transmitting the compliance rules 142 to the client device 120 andrequesting the client device 120 confirm conformance to the physicalaccess point 150.

In embodiments where the physical access point 150 consults the remoteserver 130 to assist in determining whether or not to permit useraccess, at optional block 235, the authentication service 135 receives arequest to determine whether the physical access credential 134 and/ordevice profile 123 provided by the client device 120 is/are sufficientfor access to the particular physical access point 150. This could occurin embodiments where some or all physical access points 150 are incommunication with the remote server 130. It could also occur inembodiments where such an interaction between a client device 120 andthe physical access point 150 was the first interaction with the clientdevice 120 with the system 100, and could initiate the first request bythe client device 120 of a physical access credential 134.

At optional block 240, the authentication service 135 determines whetheror not to authorize user/device access at the physical access point. Asdescribed, this authorization decision may at least be based onverification that the provided physical access credential 134 issufficient for access at the physical access point 150 (i.e. wherephysical access points 150 don't independently store approved physicalaccess credentials 134 for comparison to those provided by clientdevices 120), compliance by the user device with applicable compliancerules, and/or anticipated delivery of a physical access credential 134to the client device 120. If the verification request from the physicalaccess point 150 is not authorized, then appropriate notifications aretransmitted to the client device 120 and/or the physical access point150 at block 215. If the verification request is authorized, then atoptional block 245, an unlock command is sent to the physical accesspoint 150.

If the remote server 130 determines to revoke the physical accesscredential previously sent to the client device 120 and/or the physicalaccess point 150, appropriate notifications are transmitted to theclient device 120 and/or physical access point 150 at block 215. If not,the remote server 130 awaits further input and/or a change to systemparameters which would cause a change in such determination.

In some embodiments, the client device 120 may be able to detect when ithas entered a particular area by monitoring for wireless signals. Thewireless signals may be, merely by way of example, a public wirelessnetwork signal, a private wireless network signal, a near fieldcommunication signal, a radio frequency identification (RFID) signal,and/or a cellular phone network signal. In response to detecting such asignal, the wireless device 120 may send a request 136 to the remoteserver 130 for at least one physical access credential 134 associatedwith the wireless signal and/or the particular area. In someembodiments, the request 136 may include a user access credential 122, adevice identifier 121, and/or a device profile 123. The remote server130 may determine whether or not to issue physical access credentials134 based at least in part on the information in the request 136. Whichphysical access credentials 134 are provided may be based at least inpart on what areas the user associated with the request 136 isauthorized to physically access, as well as the information in therequest 136.

Once physical access credentials 134 are received, a transceiver in theclient device 120 may be able to send, either at the direction of theclient device 120 or at the request of a physical access point 150, aphysical access credential 134 to physical access points 150. In thismanner, when a user enters a certain area, characterized by the presenceof a wireless network or other signal, physical access credentials 134can be provided to a user's client device 120 automatically. In someembodiments, upon entry to the area with the wireless network or othersignal, the client device 120 can query the user as to whether torequest physical access credentials 134. At this point the client device120 can request additional information necessary to submit such arequest 136, including for example, user access credentials 122.

FIG. 3 is a flowchart illustrating example functionality implemented asportions of an enterprise access application 124 executed by a clientdevice 120 in the networked environment 100 of FIG. 1. At block 305, theenterprise access application 124 sends a request for physical access136 to the authentication service 135. The request 136 may include adevice identifier 121, user access credentials 122, the device profile123, and/or other information. At block 310, the enterprise accessapplication 124 receives the physical access credential 134 provided byauthentication service 135. Compliance rules 142 that apply to suchcredentials may also be received from remote server 130 in someembodiments. At block 315, subject to any applicable conditions such asmay be specified by the compliance rules 142, if applicable, theenterprise access application 124 communicates with a physical accesspoint 150 regarding the physical access credential 134. This may involvetransmitting the physical access credential 134, receiving a requestfrom the physical access point 150 to send verification that the deviceincludes a physical access credential, and/or other back-and-forthcommunication between the client device 120 and the physical accesspoint 150. In any case, once the physical access point 150 has verifiedthat the physical access credential 134 stored by the client device 120is authentic, the physical access point activates its physical lockactuator 152 to open the associated barrier to the secure area.

There are multiple methods by which physical access credentials 134 fora differing number of physical access points 150 may be provided to aclient device 120. In some embodiments, a single physical accesscredential 134 may be provided to a requesting client device 120. Thissingle physical access credential 134 may be acceptable to multiplephysical access points 150 to provide the desired security for the givenuser. In some embodiments, potentially, for example, in thoseembodiments where every physical access point 150 will only accept aparticular physical access credential 134, a plurality of physicalaccess credentials 134 may be provided to a requesting client device120. Then, depending on the particular embodiment, at any given physicalaccess point 150, the client device 120 may either deliver a specificphysical access credential 134, or all of its physical accesscredentials 134. In either situation, the physical access point 150 mayprompt delivery of at least one physical access credential 134, and/orthe client device 120 may initiate such delivery, potentially at theinstruction of a user. In the manner described then, different levels ofsecurity authorization may be provided to different users. For example,the chief-executive-officer of a company may have access to all doors ina building, a security guard may have access to most doors in thebuilding, and a receptionist may have access to only a few doors in thebuilding.

At block 320, the enterprise access application 124 determines whetheror not to revoke the physical access credential 134 stored on the clientdevice 120. For example, the enterprise access application 124 maydetermine that a physical access credential 134 is to be revoked basedon a compliance rule and/or other limitation associated with thephysical access credential 134. As another example, the enterpriseaccess application 124 may be instructed by the authentication service135 that the physical access credential 134 is to be revoked. If theclient device 120 determines to revoke any physical access credentials134, at block 325 appropriate notifications are transmitted to remoteserver 130 and/or other systems. If physical access credentials 134 arenot to be revoked, the enterprise access application 124 awaits furtherinput and/or change to system parameters which would cause a change insuch determination.

With reference to FIG. 4, shown is a schematic block diagram of theremote server 130 and the client device 140 according to an embodimentof the present disclosure. The remote server 130 includes at least oneprocessor circuit, for example, having a processor 403 and a memory 406,both of which are coupled to a local interface 409. To this end, theremote server 130 may comprise, for example, at least one servercomputer and/or like device. Similarly, the client device 140 includesat least one processor circuit, for example, having a processor 413 anda memory 416, both of which are coupled to a local interface 419.Additionally, the client device 120 may be in data communication with adisplay for rendering user interfaces and at least one other I/O devicefor inputting and outputting data. To this end, the client device 140may comprise, for example, at least one mobile wireless device,computer, and/or like device. The local interfaces 409 and 419 maycomprise, for example, a data bus with an accompanying address/controlbus and/or other bus structure as can be appreciated.

Stored in the memories 406 and 416 are both data and several componentsthat are executable by the processors 403 and 413. In particular, storedin the memory 406/416 and executable by the processors 403 and 413 are aauthentication service 135, an enterprise access application 124, andpotentially other applications. Also stored in the memories 406 and 416may be a data stores 131 and 418 and other data. In addition, anoperating system may be stored in the memories 406 and 416 andexecutable by the processors 403 and 413.

It is to be understood that there may be other applications that arestored in the memories 406 and 416 and are executable by the processors403 and 413 as can be appreciated. Where any component discussed hereinis implemented in the form of software, any one of a number ofprogramming languages may be employed such as, for example, C, C++, C#,Objective C, Java, Javascript, Perl, PHP, Visual Basic, Python, Ruby,Delphi, Flash, and/or other programming languages.

A number of software components are stored in the memories 406 and 416and are executable by the processors 403 and 413. In this respect, theterm “executable” means a program file that is in a form that canultimately be run by the processors 403 and 413. Examples of executableprograms may be, for example, a compiled program that can be translatedinto machine code in a format that can be loaded into a random accessportion of the memories 406 and 416 and run by the processors 403 and413, source code that may be expressed in proper format such as objectcode that is capable of being loaded into a random access portion of thememory 406/416 and executed by the processors 403 and 413, and/or sourcecode that may be interpreted by another executable program to generateinstructions in a random access portion of the memories 406 and 416 tobe executed by the processors 403 and 413, etc. An executable programmay be stored in any portion and/or component of the memories 406 and416 including, for example, random access memory (RAM), read-only memory(ROM), hard drive, solid-state drive, USB flash drive, memory card,optical disc such as compact disc (CD) and/or digital versatile disc(DVD), floppy disk, magnetic tape, and/or other memory components.

The memories 406 and 416 is defined herein as including both volatileand nonvolatile memory and data storage components. Volatile componentsare those that do not retain data values upon loss of power. Nonvolatilecomponents are those that retain data upon a loss of power. Thus, thememories 406 and 416 may comprise, for example, random access memory(RAM), read-only memory (ROM), hard disk drives, solid-state drives, USBflash drives, memory cards accessed via a memory card reader, floppydisks accessed via an associated floppy disk drive, optical discsaccessed via an optical disc drive, magnetic tapes accessed via anappropriate tape drive, and/or other memory components, and/or acombination of any two and/or more of these memory components. Inaddition, the RAM may comprise, for example, static random access memory(SRAM), dynamic random access memory (DRAM), and/or magnetic randomaccess memory (MRAM) and other such devices. The ROM may comprise, forexample, a programmable read-only memory (PROM), an erasableprogrammable read-only memory (EPROM), an electrically erasableprogrammable read-only memory (EEPROM), and/or other like memory device.

Also, the processors 403 and 413 may represent multiple processors, andthe memories 406 and 416 may represent multiple memories that operate inparallel processing circuits, respectively. In such a case, the localinterfaces 409 and 419 may be an appropriate network 109 (FIG. 1) thatfacilitates communication between any two of the multiple processors 403and 413, and/or between any two of the memories 406 and 416, etc. Thelocal interfaces 409 and 419 may comprise additional systems designed tocoordinate this communication, including, for example, performing loadbalancing. The processors 403 and 413 may be of electrical and/or ofsome other available construction.

Although the authentication service 135, the enterprise applicationservice 124, and other various systems described herein may be embodiedin software and/or code executed by general purpose hardware asdiscussed above, as an alternative the same may also be embodied indedicated hardware and/or a combination of software/general purposehardware and dedicated hardware. If embodied in dedicated hardware, eachcan be implemented as a circuit and/or state machine that employs anyone of and/or a combination of a number of technologies. Thesetechnologies may include, but are not limited to, discrete logiccircuits having logic gates for implementing various logic functionsupon an application of at least one data signal, application specificintegrated circuits having appropriate logic gates, and/or othercomponents, etc. Such technologies are generally well known by thoseskilled in the art and, consequently, are not described in detailherein.

The flowcharts of FIGS. 2 and 3 show the functionality and operation ofan implementation of portions of the authentication service 135 and theenterprise access application 124, respectively. If embodied insoftware, each box may represent a module, segment, and/or portion ofcode that comprises program instructions to implement the specifiedlogical function(s). The program instructions may be embodied in theform of source code that comprises human-readable statements written ina programming language and/or machine code that comprises numericalinstructions recognizable by a suitable execution system such asprocessors 403 and 413 in a computer system and/or other system. Themachine code may be converted from the source code, etc. If embodied inhardware, each block may represent a circuit and/or a number ofinterconnected circuits to implement the specified logical function(s).

Although the flowcharts of FIGS. 2 and 3 show a specific order ofexecution, it is understood that the order of execution may differ fromthat which is depicted. For example, the order of execution of twoand/or more blocks may be scrambled relative to the order shown. Also,two and/or more blocks shown in succession in FIGS. 2 and 3 may beexecuted concurrently and/or with partial concurrence. Further, in someembodiments, at least one of the blocks shown in FIGS. 2 and 3 may beskipped and/or omitted. In addition, any number of counters, statevariables, warning semaphores, and/or messages might be added to thelogical flow described herein, for purposes of enhanced utility,accounting, performance measurement, and/or providing troubleshootingaids, etc. It is understood that all such variations are within thescope of the present disclosure.

Also, any logic and/or application described herein, including theauthentication service 135 and the enterprise access application 124,that comprises software and/or code can be embodied in anynon-transitory computer-readable medium for use by and/or in connectionwith an instruction execution system such as, for example, a processors403 and 413 in a computer system and/or other system. In this sense, thelogic may comprise, for example, statements including instructions anddeclarations that can be fetched from the computer-readable medium andexecuted by the instruction execution system. In the context of thepresent disclosure, a “computer-readable medium” can be any medium thatcan contain, store, and/or maintain the logic and/or applicationdescribed herein for use by and/or in connection with the instructionexecution system. The computer-readable medium can comprise any one ofmany physical media such as, for example, magnetic, optical, and/orsemiconductor media. More specific examples of a suitablecomputer-readable medium would include, but are not limited to, magnetictapes, magnetic floppy diskettes, magnetic hard drives, memory cards,solid-state drives, USB flash drives, and/or optical discs. Also, thecomputer-readable medium may be a random access memory (RAM) including,for example, static random access memory (SRAM) and dynamic randomaccess memory (DRAM), and/or magnetic random access memory (MRAM). Inaddition, the computer-readable medium may be a read-only memory (ROM),a programmable read-only memory (PROM), an erasable programmableread-only memory (EPROM), an electrically erasable programmableread-only memory (EEPROM), and/or other type of memory device.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations setforth for a clear understanding of the principles of the disclosure.Many variations and modifications may be made to the above-describedembodiment(s) without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

1-20. (canceled)
 21. A method, comprising: receiving, by a physicalaccess point, a request to cause a physical lock actuator associatedwith the physical access point to be in an unlocked state, the requestbeing associated with a client device; determining, by the physicalaccess point, that the request is authorized, the determination that therequest is authorized being based at least in part on at least oneauthentication credential associated with the client device; and,causing, by the physical access point, the physical lock actuatorassociated with the physical access point to be in the unlocked state.22. The method of claim 21, wherein determining that the request isauthorized is further based at least in part on a determination that theclient device complies with at least one compliance rule.
 23. The methodof claim 22, wherein the at least one compliance rule comprises at leastone hardware restriction.
 24. The method of claim 22, wherein the atleast one compliance rule comprises at least one software restriction.25. The method of claim 22, wherein the at least one compliance rulecomprises at least one mobile device management restriction.
 26. Themethod of claim 22, wherein the determination that the client devicecomplies with the at least one compliance rule is provided by the clientdevice.
 27. The method of claim 22, wherein the determination that theclient device complies with the at least one compliance rule is providedby the physical access point.
 28. The method of claim 22, wherein thedetermination that the client device complies with the at least onecompliance rule is provided by a compliance service.
 29. The method ofclaim 28, further comprising: identifying, by the physical access point,the at least one compliance rule; identifying, by the physical accesspoint, a device profile associated with the client device; and,determining, by the physical access point, that the at least onecompliance rule is satisfied based at least in part on the deviceprofile associated with the client device.
 30. A computing device,comprising: one or more processors; and, a memory coupled to the one ormore processors, the memory storing instructions that, when executed bythe one or more processors, cause the computing system to: receive, by aphysical access point, a request to cause a physical lock actuatorassociated with the physical access point to be in an unlocked state,the request being associated with a client device; determine, by thephysical access point, that the request is authorized, the determinationthat the request is authorized being based at least in part on at leastone authentication credential associated with the client device; and,cause, by the physical access point, the physical lock actuatorassociated with the physical access point to be in the unlocked state.31. The computing device of claim 30, wherein the request comprises atleast one physical access credential, and wherein determining that therequest is authorized is further based at least in part on at least oneof the at least one physical access credential being verified.
 32. Thecomputing device of claim 31, the at least one of the at least onephysical access credential being verified in an instance in which the atleast one of the at least one physical access credential corresponds toa value stored in a data store accessible to the physical access point.33. The computing device of claim 31, the at least one of the at leastone physical access credential being verified in an instance in whichthe at least one of the at least one physical access credential has notbeen revoked.
 34. The computing device of claim 31, the at least one ofthe at least one physical access credential being verified in aninstance in which the at least one of the at least one physical accesscredential has not expired.
 35. The computing device of claim 31,further comprising instructions that, when executed by the one or moreprocessors, cause the computing system to determine that the at leastone of the at least one physical access credential is verified by:transmitting to an authorization service, by the physical access point,a request to verify the at least one physical access credential.
 36. Anon-transitory computer-readable medium storing instructions that, whenexecuted by one or more processors, cause a computing device to:receive, by a physical access point, a request to cause a physical lockactuator associated with the physical access point to be in an unlockedstate, the request being associated with a client device; determine, bythe physical access point, that the request is authorized, thedetermination that the request is authorized being based at least inpart on at least one authentication credential associated with theclient device; and, cause, by the physical access point, the physicallock actuator associated with the physical access point to be in theunlocked state.
 37. The non-transitory computer-readable medium of claim36, further storing instructions that, when executed by the one or moreprocessors, further cause the computing device to: transmit, by thephysical access point, a request for at least one physical accesscredential.
 38. The non-transitory computer-readable medium of claim 36,wherein the request for the at least one physical access credential istransmitted to the client device.
 39. The non-transitorycomputer-readable medium of claim 36, wherein the request for the atleast one physical access credential is transmitted to an authorizationservice.
 40. The non-transitory computer-readable medium of claim 36,further storing instructions that, when executed by the one or moreprocessors, further cause the computing device to: cause, by thephysical access point, at least one physical access credential to berevoked.