Token-based access control
Implementations of the present disclosure relate to methods, systems and products for access control. In one implementation, a computer-implemented method is proposed. According to the method, a token for accessing an object is received from a terminal device via a communication channel, where the c...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Implementations of the present disclosure relate to methods, systems and products for access control. In one implementation, a computer-implemented method is proposed. According to the method, a token for accessing an object is received from a terminal device via a communication channel, where the communication channel is built based on a Light Fidelity connection which is deployed within a restrictive area. A validity of the received token is determined. An access to the object is controlled based on the validity of the received token. |
---|