Allowing access to a device responsive to secondary signals previously associated with authorized primary input

ABSTRACT

A method is provided for controlling access to a target device. The method comprises receiving, by the target device, primary input from a user or user device, wherein the primary input matches a predetermined input stored by the target device and authorizes the user or user device to access the target device. The method further comprises storing, by the target device, one or more wireless secondary signals that are detected by the target device during a time period in which the primary input is received. Still further, the method comprises allowing access to the target device in response to receiving the primary input, and then allowing access to the target device in response to subsequently receiving at least one of the one or more wireless secondary signals matching one or more of the stored wireless secondary signals in the absence of receiving the primary input.

BACKGROUND Field of the Invention

The present invention relates to methods and systems for controllingaccess to a device.

Background of the Related Art

Near field communication and RFID are two examples of technology thatcan be used to facilitate transmission of authentication data forgaining access to a device, such as a computer or a vehicle. Suchauthentication mechanisms are becoming more mainstream, with many modernvehicles now automatically unlocking their doors in response to acertain detectable proximity of an approaching keyless remote.Unfortunately, the accidental loss of the keyless remote can prevent auser from gaining access to the associated device when they need itmost. For example, a user that has lost their vehicle's keyless remotein a shopping mall has most likely also lost their other keys and willbe unable to gain access to their vehicle to go home from the mall ortimely pick up their child.

BRIEF SUMMARY

One embodiment of the present invention provides a method forcontrolling access to a target device. The method comprises receiving,by the target device, primary input from a user or user device, whereinthe primary input matches a predetermined input stored by the targetdevice and authorizes the user or user device to access the targetdevice. The method further comprises storing, by the target device, oneor more wireless secondary signals that are detected by the targetdevice during a time period in which the primary input is received.Still further, the method comprises allowing access to the target devicein response to receiving the primary input, and allowing access to thetarget device in response to subsequently receiving at least one of theone or more wireless secondary signals matching one or more of thestored wireless secondary signals in the absence of receiving theprimary input.

Another embodiment of the present invention provides a computer programproduct for controlling access to a target device, the computer programproduct comprising a non-transitory computer readable storage mediumhaving program instructions embodied therewith, where the programinstructions are executable by a processor to cause the processor toperform a method. The method comprises receiving, by the target device,primary input from a user or user device, wherein the primary inputmatches a predetermined input stored by the target device and authorizesthe user or user device to access the target device. The method furthercomprises storing, by the target device, one or more wireless secondarysignals that are detected by the target device during a time period inwhich the primary input is received. Still further, the method comprisesallowing access to the target device in response to receiving theprimary input, and allowing access to the target device in response tosubsequently receiving at least one of the one or more wirelesssecondary signals matching one or more of the stored wireless secondarysignals in the absence of receiving the primary input.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is an illustration of a person locking or unlocking theirvehicle.

FIG. 2 is a diagram of the vehicle receiving a primary signal from akeyless remote, as well as various wireless secondary signals from otherdevices.

FIG. 3 is a diagram of the vehicle receiving the various wirelesssecondary signals from the other devices in the absence of the primarysignal from the keyless remote.

FIG. 4 is a diagram of a computer capable of implementing an embodimentof the present invention.

FIG. 5 is a flowchart of a method according to an embodiment of thepresent invention.

DETAILED DESCRIPTION

One embodiment of the present invention provides a method forcontrolling access to a target device. The method comprises receiving,by the target device, primary input from a user or user device, whereinthe primary input matches a predetermined input stored by the targetdevice and authorizes the user or user device to access the targetdevice. The method further comprises storing, by the target device, oneor more wireless secondary signals that are detected by the targetdevice during a time period in which the primary input is received.Still further, the method comprises allowing access to the target devicein response to receiving the primary input, and allowing access to thetarget device in response to subsequently receiving at least one of theone or more wireless secondary signals matching one or more of thestored wireless secondary signals in the absence of receiving theprimary input.

The target device will preferably be, or include, a computer system. Forexample, the target device may be a computer system, such as a remoteserver, desktop computer, notebook computer, tablet computer, orsmartphone. Alternatively, the target device may be a device thatincludes a computer system, such as a modern vehicle, home automationsystem, building security system, television, entertainment system,appliance, or office equipment.

In certain implementations, allowing access to the target device mayinclude allowing physical access to the target device. For example, atarget device that includes an electronically actuatable lock may bephysically accessed by actuating the lock to an unlocked position. Inother implementations, allowing access to the target device may includeallowing access to a computer system, such as the use of the hardware orsoftware features of the computer system. Often, access to a computersystem may be gained through an authentication process, such as bysubmitting suitable credentials like a username and password.

A user may directly provide primary input to the target device, such asby typing one or more words or codes on a keyboard or keypad attached tothe target device, speaking into a microphone coupled to a system withvoice-recognition capabilities, positioning themselves in front of acamera of a system with a facial-recognition system, contacting afingerprint scanner, or using any other biometric technology.Alternatively, a user may indirectly provide primary input to the targetdevice using a user device. Such a user device may include varioustechnologies and have various form factors. One popular user device is aremote transmitter unit of a remote keyless system, which is commonlyprovided with a new vehicle. Another type of user device is a keycard,which is typically a thin rectangular card using a barcode, magneticstripe, RFID circuitry, or a microchip.

The primary input may take the various forms so long as the targetdevice includes a device, such as a receiver, reader or keypad, whichcan receive the primary input. For example, the primary input may be ineither a digital or analog format. Furthermore, the primary input may,without limitation, be transmitted in electromagnetic radiation,pressure waves, and mechanical forces. Optionally, the primary input maybe manually entered into the target device by the user, or the primaryinput may be electronically transmitted to the target device by the userdevice.

Similarly, the secondary signals may vary widely, such that the targetdevice will preferably be capable of receiving secondary signals ofmultiple types. For example, the target device may include one or morereceivers in the form of an antennae for detecting variouselectromagnetic signals. In one instance, the target device will includea radio-frequency identification (RFID) tag reader, which may include aradio wave transmitter to provide energy to a passive RFID tag. Whilethe target device may be designed to accommodate and expect a given formof primary input, such as a particular remote unit of a keyless remotesystem, the type of secondary signals that the target device may receiveis an uncertainty. However, the target device may include one or morereceivers that are designed to detect whatever types of secondarysignals are available. The types of receivers will preferably beselected to reflect the types of secondary signals that are most likelyto be detected. For example, at least one of the one or more wirelesssecondary signals may be received from a device selected from a wirelessheadset, a smartwatch, a mobile communication device, and combinationsthereof. It should be understood that these secondary signal may bedetectable as a consequence of these other devices performing their ownfunctions and capabilities without intentionally transmitting any signalto the target device. Accordingly, the functionality of the devices thatmay provide such secondary signals need not be modified or even aware ofthe target device.

The target device is responsible for determining whether the primaryinput matches a predetermined input stored by the target device. Suchpredetermined input may be a static signal or code, or a rolling seriesof signals or codes. The predetermined input is preferably stored in anon-volatile data storage component of the target device, such that thetarget device may retrieve the predetermined input and compare it withinput received by the target device. While the primary input may be in aformat or media that is distinct from the secondary signals, thus makingit clear when primary input has been received, it is also possible thatthe primary input and secondary signals are of the same signal formatand type. In the latter situation, the target device may perform signalfiltering in order to separately identify each signal and determinewhether any of the received signals matches the predetermined input. Ifone of the received signals matches the predetermined input, then thatmatching signal is the primary input (i.e., an authentication or accessevent has occurred) and the other received signals are stored assecondary signals having been detected by the target device during atime period in which the primary input was received. If none of thereceived signals matches the predetermined input, then there ispresently no primary input and the other received signals aredisregarded since they are not coincident with primary input matchingthe predetermined input.

In one embodiment, the primary input is a wireless primary signal,wherein the wireless primary signal and the one or more wirelesssecondary signals are receive by one or more receiver of the targetdevice. For example, the wireless primary signal and each of the one ormore wireless secondary signals may be independently selected from radiofrequency identification signals and short wavelength UHF radio signals.

In another embodiment, the step of allowing access to the target devicein response to receiving the primary input includes allowing a firstlevel of access to the target device, and the step of allowing access tothe target device in response to receiving at least one of the one ormore wireless secondary signals in the absence of receiving the primaryinput includes allowing a second level of access that is lower than thefirst level of access. Accordingly, the primary input is alwayspreferred, but if the primary input cannot be provided, perhaps due to aloss of a necessary user device, then receiving the at least one of theone or more wireless secondary signals will provide the second level ofaccess to the target device. For example, the second level of access mayprovide access to fewer features of the target device or access over ashorter duration than does the first level of access. Furthermore,access to the target device that is allowed in response to receiving atleast one of the one or more wireless secondary signals in the absenceof receiving the primary input may be limited to a number of consecutiveinstances of allowing access before requiring the primary input to allowa subsequent access, or limited to a maximum time period since theprimary input was last received. These limitations can be implemented toprevent long term access to the target device without providing theprimary input.

In a further embodiment, the method may measure a signal strength ofeach of the one or more wireless secondary signals that are detected bythe target device, and store, for each of the one or more wirelesssecondary signals, the measured signal strength in association with thecorresponding wireless secondary signal. Accordingly, the method mayallow access to the target device in response to receiving at least oneof the one or more wireless secondary signals with a signal strengthwithin a predetermined range of the measured signal strength that isstored in association with the corresponding secondary wireless signalin the absence of receiving the primary input.

In a still further embodiment, the method stores two or more wirelesssecondary signals that are detected by the target device during a timeperiod in which the primary input is received, and allows access to thetarget device in response to receiving a plurality of the two or morewireless secondary signals in the absence of receiving the primaryinput. Preferably, the target device will detect and store as manywireless secondary signals as are available. Furthermore, the number orpercentage of those stored secondary signals that must be subsequentlyreceived in order to gain access to the target device without theprimary input may be increased in high security applications anddecreases in low security applications. In one example, the second(lower) level of access may vary as a function of the number of wirelesssecondary signals received in the absence of the primary input relativeto the number of wireless secondary signals that were detected by thetarget device during a time period in which the primary input isreceived.

Yet another embodiment of the present invention provides a computerprogram product for controlling access to a target device, the computerprogram product comprising a non-transitory computer readable storagemedium having program instructions embodied therewith, where the programinstructions are executable by a processor to cause the processor toperform a method. The method comprises receiving, by the target device,primary input from a user or user device, wherein the primary inputmatches a predetermined input stored by the target device and authorizesthe user or user device to access the target device. The method furthercomprises storing, by the target device, one or more wireless secondarysignals that are detected by the target device during a time period inwhich the primary input is received. Still further, the method comprisesallowing access to the target device in response to receiving theprimary input, and allowing access to the target device in response tosubsequently receiving at least one of the one or more wirelesssecondary signals matching one or more of the stored wireless secondarysignals in the absence of receiving the primary input.

The foregoing computer program products may further include programinstructions for implementing or initiating any one or more aspects ofthe methods described herein. Accordingly, a separate description of themethods will not be duplicated in the context of a computer programproduct.

FIG. 1 is an illustration of a person 10 locking or unlocking theirvehicle 70. As shown, the person 10 is holding a remote unit(transmitter) 20 that communicates a primary input signal to a keylessentry system (not shown) of the vehicle 70. The person 10 is also usinga Bluetooth™ headset 30, wearing a suit jacket 40 having an RFID tag 42stitched into the lining, wearing a Bluetooth™ smartwatch 50, carrying asmartphone 60, and carrying a briefcase 70 with an embedded RFID tag 72.Each of the Bluetooth™ headset 30, RFID tag 42, Bluetooth™ smartwatch50, smartphone 60, and carrying RFID tag 72 may produce secondarysignals that are detectable by a receiver (now shown) associated withthe vehicle 80. A more detailed discussion of how the vehicle 80receives and processes signals or other input from the remote unit 20and devices 30, 50, 60 and RFID tags 42, 72 is provided below inreference to FIGS. 2-3.

FIG. 2 is a diagram of the vehicle 80 receiving a primary signal 21 froma keyless remote 20, as well as various wireless secondary signals fromother devices. For example, the vehicle 80 has one or more receivers orreaders 82 that may receive separate secondary signals 31, 51 from therespective Bluetooth™ devices 30, 50, separate secondary signals 41, 71from the respective RFID tags 42, 72, and a secondary signal 61 from themobile communication device (smartphone) 60.

The keyless remote 20 includes a button 22 that may be manuallydepressed by the user to activate a switch 24 so that electrical energyis supplied from a battery 26 to a signal or code transmitter 28.Accordingly, the transmitter 28 transmits the wireless signal 21containing identifying information, such as an encrypted code, to thevehicle 80. The receivers and/or readers 82 detect the signals 21, 31,41, 51, 61, 71 and the processor (CPU) 92 executes the access controllogic 88 to compare each signal with the authorized primary input(predetermined input) 84 stored in the data storage and memory 90. Ifthe signal 21 matches the authorized primary input 84, then theprocessor 92 identifies signal 21 as the primary input and stores theother signals 31, 41, 51, 61, 71 in secondary signals data 86, sincethose signals were detected during the same time period that the primaryinput was received. Optionally, the method may store a signal strengthassociated with each of the secondary signals in order to bettervalidate or differentiate each secondary signal from other signals orbackground noises. In addition, the access control logic 88 may causethe processor 92 to allow physical access to the vehicle 80, such as byunlocking the electronic door locks 94, or allow access to other vehiclefunctions 96. As an alternative to using the keyless remote 20, the usermay manually enter the same or different primary input through a keypad98 or other means for providing manual input.

FIG. 3 is a diagram of the vehicle 80 receiving the various wirelesssecondary signals 31, 41, 51, 61, 71 from the corresponding devices 30,42, 50, 60, 72 in the absence of the primary signal from the keylessremote. The processor 92 executes the access control logic 88 andcompares each of the detected wireless secondary signals 31, 41, 51, 61,71 to the secondary signals or codes stored in the second signals data86. The processor 92 may apply various criteria established by theaccess control logic 88 in order to determine whether or not to allow alevel of access to the vehicle 80. For example, the processor 92 mayunlock the electronic door locks 94 and/or enable other vehiclefunctions 96 in response to determining that the currently received oneor more secondary signals 31, 41, 51, 61, 71 include one or more of thesecondary signals stored in a secondary signals data 86.

The criteria for allowing access based on received secondary signals mayspecify a minimum number of received secondary signals that must match asignal stored in the secondary signal data 86, or a minimum percentageof the stored secondary signals that must be matched by one of thereceived secondary signals. Embodiments of the present invention are notlimited to any specific criteria.

Furthermore, the specific level of access may be limited when the accessis obtained using only secondary signals in the absence of the primaryinput. For example, access or use of the vehicle 80 may be limited to acertain mile range, limited to a certain area, or limited in movement inthe direction of a certain location (such as a school, home, etc.).Optionally, a level of access to the vehicle 80 may be dependent on thelevel of matching between the currently received secondary signals 31,41, 51, 61, 71 and those stored in the secondary signal data 86 (e.g. 4out of 5 secondary signals may be currently present as compared with thesecondary signals detect during a previous authentication event). In afurther option, if the vehicle has not yet completed a route to anactive destination of a navigation feature of the vehicle, then thevehicle may limit access to completing the route.

Example

As a specific application example, assume that Gary accesses his vehicleusing his key fob (keyless remote), and his vehicle stores a firstsecondary signal from an RFID in Gary's clothing and a second secondarysignal from the Bluetooth™ device in Gary's cell phone during the timeperiod that the keyless remote is used to successfully access thevehicle. Gary stops at a store on his way to pick up his child.Unfortunately, Gary loses his key fob in the store. However, uponreturning to the vehicle, a receiver in the vehicle detects thecombination of the RFID signal (matching the stored first secondarysignal) and the Bluetooth™ signal (matching the stored second secondarysignal). Since the currently received first and second secondary signalsmatch the most recently stored secondary signals, the vehicle allowsGary access to drive the car.

While much of the foregoing discussion is provided in the context of thetarget device being a vehicle, the present invention is not limited toaccessing a vehicle. As previously stated, the target device may be, orinclude, a computer system. For example, the target device may be acomputer system, such as a remote server, desktop computer, notebookcomputer, tablet computer, or smartphone, or the target device may be adevice that includes a computer system, such as a modern vehicle, homeautomation system, building security system, television, entertainmentsystem, appliance, or office equipment. The computer shown in FIG. 4represent either a standalone computer or a network computer that is atarget device.

FIG. 4 is a diagram of a computer 100 capable of implementingembodiments of the present invention. The computer 100 includes aprocessor unit 104 that is coupled to a system bus 106. The processorunit 104 may utilize one or more processors, each of which has one ormore processor cores. A video adapter 108, which drives/supports adisplay 110, is also coupled to system bus 106. The system bus 106 iscoupled via a bus bridge 112 to an input/output (I/O) bus 114. An I/Ointerface 116 is coupled to the I/O bus 114. The I/O interface 116affords communication with various I/O devices, including a keyboard118, receiver(s) and/or reader(s) 120, a USB mouse 124, and USB port(s)126. As depicted, the computer 100 is able to communicate with othernetwork devices via the network 111 using a network adapter or networkinterface controller 130.

A hard drive interface 132 is also coupled to the system bus 106. Thehard drive interface 132 interfaces with a hard drive 134. In apreferred embodiment, the hard drive 134 communicates with system memory136, which is also coupled to the system bus 106. System memory isdefined as a lowest level of volatile memory in the computer 100. Thisvolatile memory includes additional higher levels of volatile memory(not shown), including, but not limited to, cache memory, registers andbuffers. Data that populates the system memory 136 includes theoperating system (OS) 138 and application programs 144.

The operating system 138 includes a shell 140 for providing transparentuser access to resources such as application programs 144. Generally,the shell 140 is a program that provides an interpreter and an interfacebetween the user and the operating system. More specifically, the shell140 executes commands that are entered into a command line userinterface or from a file. Thus, the shell 140, also called a commandprocessor, is generally the highest level of the operating systemsoftware hierarchy and serves as a command interpreter. The shellprovides a system prompt, interprets commands entered by keyboard,mouse, or other user input media, and sends the interpreted command(s)to the appropriate lower levels of the operating system (e.g., a kernel142) for processing. Note that while the shell 140 may be a text-based,line-oriented user interface, the present invention may support otheruser interface modes, such as graphical, voice, gestural, etc.

As depicted, the operating system 138 also includes the kernel 142,which includes lower levels of functionality for the operating system138, including providing essential services required by other parts ofthe operating system 138 and application programs 144. Such essentialservices may include memory management, process and task management,disk management, and mouse and keyboard management. As shown, thecomputer 100 includes application programs 144 in the system memory ofthe computer 100, including, without limitation, the authorized primaryinput 84, the secondary signals data 86, and the access control logic88. The logic and data may be used to implement one or more of theembodiments disclosed herein. For example, the access control logic 88may cause the processor 104 to control the computer system according toone or more embodiments of the present invention, such that a user maylogon to the computer system generally or logon to an applicationprogram or other feature of the computer system in response to providingthe necessary primary input or the computer system detecting sufficientsecondary signals to meet the necessary access criteria. Optionally, oneor more aspect of the access control logic may be implemented in theoperating system 138, rather than the applications 144.

The hardware elements depicted in the computer 100 are not intended tobe exhaustive, but rather are representative. For instance, the computer100 may include alternate memory storage devices such as magneticcassettes, digital versatile disks (DVDs), Bernoulli cartridges, and thelike. These and other variations are intended to be within the scope ofthe present invention.

FIG. 5 is a flowchart of a method 160 according to one embodiment of thepresent invention. In step 162, the method includes receiving, by atarget device, primary input from a user or user device, wherein theprimary input matches a predetermined input stored by the target deviceand authorizes the user or user device to access the target device. Instep 164, the method includes storing, by the target device, one or morewireless secondary signals that are detected by the target device duringa time period in which the primary input is received. Step 166 of themethod includes allowing access to the target device in response toreceiving the primary input, and step 168 of the method includesallowing access to the target device in response to receiving at leastone of the one or more wireless secondary signals in the absence ofreceiving the primary input.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable storage medium(s) maybe utilized. A computer readable storage medium may be, for example, butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, or device, or any suitablecombination of the foregoing. More specific examples (a non-exhaustivelist) of the computer readable storage medium would include thefollowing: a portable computer diskette, a hard disk, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or Flash memory), a portable compact discread-only memory (CD-ROM), an optical storage device, a magnetic storagedevice, or any suitable combination of the foregoing. In the context ofthis document, a computer readable storage medium may be any tangiblemedium that can contain, or store a program for use by or in connectionwith an instruction execution system, apparatus, or device. Furthermore,any program instruction or code that is embodied on such computerreadable storage medium (including forms referred to as volatile memory)is, for the avoidance of doubt, considered “non-transitory”.

Program code embodied on a computer readable storage medium may betransmitted using any appropriate medium, including but not limited towireless, wireline, optical fiber cable, RF, etc., or any suitablecombination of the foregoing. Computer program code for carrying outoperations for aspects of the present invention may be written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Smalltalk, C++ or the likeand conventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network, includinga local area network (LAN) or a wide area network (WAN), or theconnection may be made to an external computer (for example, through theInternet using an Internet Service Provider).

Aspects of the present invention may be described with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, and/or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored as non-transitoryprogram instructions in a computer readable storage medium that candirect a computer, other programmable data processing apparatus, orother devices to function in a particular manner, such that the programinstructions stored in the computer readable storage medium produce anarticle of manufacture including non-transitory program instructionswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,components and/or groups, but do not preclude the presence or additionof one or more other features, integers, steps, operations, elements,components, and/or groups thereof. The terms “preferably,” “preferred,”“prefer,” “optionally,” “may,” and similar terms are used to indicatethat an item, condition or step being referred to is an optional (notrequired) feature of the invention.

The corresponding structures, materials, acts, and equivalents of allmeans or steps plus function elements in the claims below are intendedto include any structure, material, or act for performing the functionin combination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but it is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

1. A method, comprising: receiving, by a target device, primary inputfrom a user or user device, wherein the primary input matches apredetermined input stored by the target device and authorizes the useror user device to access the target device; receiving, by the targetdevice, one or more wireless secondary signals during a time period inwhich the primary input is received by the target device; storing, bythe target device, the one or more wireless secondary signals; allowingaccess to the target device in response to the target device receivingthe primary input; and then allowing access to the target device inresponse to the target device receiving a wireless secondary signal thatmatches at least one of the one or more stored wireless secondarysignals in the absence of receiving the primary input.
 2. The method ofclaim 1, wherein allowing access to the target device in response toreceiving the primary input, includes allowing a first level of accessto the target device; and wherein allowing access to the target devicein response to receiving at least one of the one or more wirelesssecondary signals in the absence of receiving the primary input,includes allowing a second level of access that is lower than the firstlevel of access.
 3. The method of claim 2, wherein the second level ofaccess provides access to fewer features or a shorter duration than doesthe first level of access.
 4. The method of claim 1, wherein allowingaccess to the target device includes allowing physical access to thetarget device.
 5. The method of claim 4, wherein the target deviceincludes an electronically actuatable lock.
 6. The method of claim 1,wherein allowing access to the target device includes allowing access toa computer system.
 7. The method of claim 6, wherein the computer systemis selected from a remote server, desktop computer, notebook computer,tablet computer, and smartphone.
 8. The method of claim 1, wherein theprimary input is a wireless primary signal, and wherein the wirelessprimary signal and the one or more wireless secondary signals arereceived by one or more receiver of the target device.
 9. The method ofclaim 8, wherein the wireless primary signal and each of the one or morewireless secondary signals are independently selected from radiofrequency identification signals and short wavelength UHF radio signals.10. The method of claim 1, wherein the primary input is manually enteredinto the target device by the user.
 11. The method of claim 1, whereinthe primary input is electronically transmitted to the target device bythe user device.
 12. The method of claim 11, wherein the user device isselected from a keyless entry transmitter and a keycard.
 13. The methodof claim 1, wherein at least one of the one or more wireless secondarysignals is transmitted from a radio-frequency identification tag. 14.The method of claim 1, wherein at least one of the one or more wirelesssecondary signals is transmitted from a device selected from a wirelessheadset, a smartwatch, a mobile communication device, and combinationsthereof.
 15. The method of claim 1, wherein allowing access to thetarget device in response to receiving at least one of the one or morewireless secondary signals in the absence of receiving the primary inputis limited to a number of consecutive instances of allowing accessbefore requiring the primary input to allow a subsequent access.
 16. Themethod of claim 1, wherein allowing access to the target device inresponse to receiving at least one of the one or more wireless secondarysignals in the absence of receiving the primary input is limited to amaximum time period since the primary input was last received.
 17. Themethod of claim 1, further comprising: measuring a signal strength ofeach of the one or more wireless secondary signals that are detected bythe target device; and storing, for each of the one or more wirelesssecondary signals, the measured signal strength in association with thecorresponding wireless secondary signal; wherein allowing access to thetarget device in response to receiving at least one of the one or morewireless secondary signals in the absence of receiving the primaryinput, includes allowing access to the target device in response toreceiving at least one of the one or more wireless secondary signalswith a signal strength within a predetermined range of the measuredsignal strength that is stored in association with the correspondingsecondary wireless signal in the absence of receiving the primary input.18. The method of claim 1, wherein storing one or more wirelesssecondary signals that are detected by the target device during a timeperiod in which the primary input is received, includes storing two ormore wireless secondary signals that are detected by the target deviceduring a time period in which the primary input is received; and whereinallowing access to the target device in response to receiving at leastone of the one or more wireless secondary signals in the absence ofreceiving the primary input, includes allowing access to the targetdevice only in response to receiving a plurality of the two or morewireless secondary signals in the absence of receiving the primaryinput.
 19. The method of claim 1, wherein the second level of accessvaries as a function of the number of wireless secondary signalsreceived in the absence of the primary input relative to the number ofwireless secondary signals that are detected by the target device duringa time period in which the primary input is received.
 20. A computerprogram product for controlling access to a target device, the computerprogram product comprising a non-transitory computer readable storagemedium having program instructions embodied therewith, the programinstructions executable by a processor to cause the processor to performa method comprising: receiving, by a target device, primary input from auser or user device, wherein the primary input matches a predeterminedinput stored by the target device and authorizes the user or user deviceto access the target device; receiving, by the target device, one ormore wireless secondary signals during a time period in which theprimary input is received by the target device; storing, by the targetdevice, the one or more wireless secondary signals; allowing access tothe target device in response to the target device receiving the primaryinput; and then allowing access to the target device in response to thetarget device receiving a wireless secondary signal that matches atleast one of the one or more stored wireless secondary signals in theabsence of receiving the primary input.