USING RECEIVED AUDIO IDENTIFICATIONS FOR ACCESS CONTROL

The examples provide an access computing device that is configured to receive configurable audio tokens from user computing devices and allow or deny access to users associated with the audio tokens. The system receives an audio token communicated from a user computing device. The audio token includ...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: MADAN, Arjita
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The examples provide an access computing device that is configured to receive configurable audio tokens from user computing devices and allow or deny access to users associated with the audio tokens. The system receives an audio token communicated from a user computing device. The audio token includes a set of data associated with a user account associated with the user computing device. The system analyzes the set of data in the audio token. In response to determining that the audio token is associated with the user account and that the user account is allowed entry to a secured location, the system performs an action to allow access to a user associated with the user account. If the user account is not allowed entry, then the system does not perform an action to allow entry.