USING RECEIVED AUDIO IDENTIFICATIONS FOR ACCESS CONTROL
The examples provide an access computing device that is configured to receive configurable audio tokens from user computing devices and allow or deny access to users associated with the audio tokens. The system receives an audio token communicated from a user computing device. The audio token includ...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The examples provide an access computing device that is configured to receive configurable audio tokens from user computing devices and allow or deny access to users associated with the audio tokens. The system receives an audio token communicated from a user computing device. The audio token includes a set of data associated with a user account associated with the user computing device. The system analyzes the set of data in the audio token. In response to determining that the audio token is associated with the user account and that the user account is allowed entry to a secured location, the system performs an action to allow access to a user associated with the user account. If the user account is not allowed entry, then the system does not perform an action to allow entry. |
---|