Token-based access control

Implementations of the present disclosure relate to methods, systems and products for access control. In one implementation, a computer-implemented method is proposed. According to the method, a token for accessing an object is received from a terminal device via a communication channel, where the c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Li, Yong Chao, Ji, Zi Lian, Li, Ping, Wang, Zhao Li, Meng, Xian Dong
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Implementations of the present disclosure relate to methods, systems and products for access control. In one implementation, a computer-implemented method is proposed. According to the method, a token for accessing an object is received from a terminal device via a communication channel, where the communication channel is built based on a Light Fidelity connection which is deployed within a restrictive area. A validity of the received token is determined. An access to the object is controlled based on the validity of the received token.