Patents by Inventor Jeffrey Scott Neafsey
Jeffrey Scott Neafsey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10257706Abstract: A system and method for the management of electronic credentials stored on mobile devices. The system may encrypt information that is provided to a lock device and an access control system using diversification keys. The diversification keys may be generated by supplying a master key and a component identifier such as, for example, a mobile device identifier, to a diversification algorithm. The mobile device may be a conduit for the communication of information between the access control system and the lock device. The mobile device may be unable to decrypt information that has been encrypted by a diversification key. Embodiments also provide for enrolling administrative mobile devices with the access control system, the distribution and revocation of credential identifiers for user mobile device, and removing administrative mobile devices that are enrolled with lock devices.Type: GrantFiled: June 2, 2015Date of Patent: April 9, 2019Assignee: Schlage Lock Company LLCInventors: Todd Eberwine, Jeffrey Scott Neafsey, Jon P. Torre, Donald Lee Beene, Hamid Abouhashem, Michelle Vickrey, Andrew Oliver
-
Patent number: 10204464Abstract: A server may receive information from a computer, store the information in a database at the server, determine a reader device that is configured to receive and/or process credential information and/or a unique identifier and to receive the information based on an analysis of the information, select one or more mobile devices to deliver the information to the reader, and transmit data to the one or more mobile devices where the data includes at least a portion of the information.Type: GrantFiled: August 16, 2013Date of Patent: February 12, 2019Assignee: Schlage Lock Company LLCInventors: Todd Eberwine, Jeffrey Scott Neafsey
-
Patent number: 10037525Abstract: A wireless connection may be established between a mobile device and a reader device and/or a sensor. The reader device and/or sensor may authenticate the mobile device. The reader device and/or sensor may receive a credential or token from the mobile device. An action may be performed based on certain criteria such as if the credential or token is valid.Type: GrantFiled: February 10, 2014Date of Patent: July 31, 2018Assignee: Schlage Lock Company LLCInventor: Jeffrey Scott Neafsey
-
Patent number: 9531721Abstract: Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered user and communicating the encrypted first identifier to the mobile device. The lock device receives, from the mobile device, a first data set that includes at least the encrypted first identifier. The lock device may encrypt the first data set to generate a second data set and communicates the encrypted second data set to the mobile device. The server receives a third data set that includes at least the encrypted second data set and a second identifier that can also be related to the registered user. The server extracts from the communicated third data set the first and second identifiers, and the extracted first and second identifiers are compared to verify that the second identifier is indeed related to the first identifier.Type: GrantFiled: July 10, 2015Date of Patent: December 27, 2016Assignee: Schlage Lock Company LLCInventors: Jeffrey Scott Neafsey, Joseph Wayne Baumgarte, Matthew Dexter, Ed Harrold
-
Patent number: 9406180Abstract: A wireless access control system is provided including an electronic lock, a wireless transport device configured for wireless communication with a network and with the electronic lock and having access privilege to the electronic lock, and wherein the wireless transport device is configured to wirelessly receive data from the network, to wirelessly deliver the data to the electronic lock, and to verify to the network that the data has been successfully transferred to the electronic lock. In one embodiment, the wireless transport device is a cellular phone. A method is also provided including transporting data wirelessly from a network to a plurality of cellular phones having access privileges to an electronic lock, and delivering the data to the electronic lock wirelessly using at least one of the cellular phones.Type: GrantFiled: August 16, 2013Date of Patent: August 2, 2016Assignee: Schlage Lock Company, LLCInventors: Todd Eberwine, Jeffrey Scott Neafsey
-
Patent number: 9312926Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.Type: GrantFiled: February 7, 2014Date of Patent: April 12, 2016Assignee: Schlage Lock Company LLCInventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
-
Patent number: 9307403Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.Type: GrantFiled: February 7, 2014Date of Patent: April 5, 2016Assignee: Schlage Lock Company LLCInventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
-
Publication number: 20160014131Abstract: Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered user and communicating the encrypted first identifier to the mobile device. The lock device receives, from the mobile device, a first data set that includes at least the encrypted first identifier. The lock device may encrypt the first data set to generate a second data set and communicates the encrypted second data set to the mobile device. The server receives a third data set that includes at least the encrypted second data set and a second identifier that can also be related to the registered user. The server extracts from the communicated third data set the first and second identifiers, and the extracted first and second identifiers are compared to verify that the second identifier is indeed related to the first identifier.Type: ApplicationFiled: July 10, 2015Publication date: January 14, 2016Inventors: Jeffrey Scott Neafsey, Joseph Wayne Baumgarte, Matthew Dexter, Ed Harrold
-
Publication number: 20150350913Abstract: A system and method for the management of electronic credentials stored on mobile devices. The system may encrypt information that is provided to a lock device and an access control system using diversification keys. The diversification keys may be generated by supplying a master key and a component identifier such as, for example, a mobile device identifier, to a diversification algorithm. The mobile device may be a conduit for the communication of information between the access control system and the lock device. The mobile device may be unable to decrypt information that has been encrypted by a diversification key. Embodiments also provide for enrolling administrative mobile devices with the access control system, the distribution and revocation of credential identifiers for user mobile device, and removing administrative mobile devices that are enrolled with lock devices.Type: ApplicationFiled: June 2, 2015Publication date: December 3, 2015Inventors: Todd Eberwine, Jeffrey Scott Neafsey, Jon P. Torre, Donald Lee Beene, Hamid Abouhashem, Michelle Vickrey, Andrew Oliver
-
Publication number: 20140229385Abstract: A wireless connection may be established between a mobile device and a reader device and/or a sensor. The reader device and/or sensor may authenticate the mobile device. The reader device and/or sensor may receive a credential or token from the mobile device. An action may be performed based on certain criteria such as if the credential or token is valid.Type: ApplicationFiled: February 10, 2014Publication date: August 14, 2014Inventor: Jeffrey Scott Neafsey
-
Publication number: 20140223523Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.Type: ApplicationFiled: February 7, 2014Publication date: August 7, 2014Inventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
-
Publication number: 20140219453Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.Type: ApplicationFiled: February 7, 2014Publication date: August 7, 2014Inventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
-
Publication number: 20140049370Abstract: A wireless access control system is provided including an electronic lock, a wireless transport device configured for wireless communication with a network and with the electronic lock and having access privilege to the electronic lock, and wherein the wireless transport device is configured to wirelessly receive data from the network, to wirelessly deliver the data to the electronic lock, and to verify to the network that the data has been successfully transferred to the electronic lock. In one embodiment, the wireless transport device is a cellular phone. A method is also provided including transporting data wirelessly from a network to a plurality of cellular phones having access privileges to an electronic lock, and delivering the data to the electronic lock wirelessly using at least one of the cellular phones.Type: ApplicationFiled: August 16, 2013Publication date: February 20, 2014Inventors: Todd Eberwine, Jeffrey Scott Neafsey
-
Publication number: 20140052777Abstract: A method, system or apparatus including a server that may receive information from a computer, store the information in a database at the server, determine a reader device to receive the information based on an analysis of the information, select one or more mobile devices to deliver the information to the reader device, and transmit viral data to the one or more mobile devices where the viral data includes at least a portion of the information.Type: ApplicationFiled: August 16, 2013Publication date: February 20, 2014Inventors: Todd Eberwine, Jeffrey Scott Neafsey
-
Publication number: 20120089943Abstract: Initiating and completing transactions using a notification architecture associated in part with an operating system executing on a first computing device. The transactions are associated with a second computing device (e.g., a merchant computing device). Transaction messages relating to the transactions are conveyed via the notification architecture to the first computing device of a user. User interface notification elements associated with the operating system on the first computing device display the transaction messages, and receive authorization from the user relating to the transactions. The authorization is provided to the merchant computing device by the notification architecture. The transactions are completed without executing, on the first computing device, an application associated with the merchant computing device.Type: ApplicationFiled: October 6, 2010Publication date: April 12, 2012Applicant: MICROSOFT CORPORATIONInventors: Kalpit Jain, Jeffrey Scott Neafsey