Mobile identity provider with two factor authentication
A code, security technology, applied in the field of parameter interface, can solve problems such as network security and the problem of determining authorized users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] Example methods for modifying environment settings are presented. In an example, a user may modify the building automation system's environmental settings via generating a machine-readable code that is read by a reader device located in the environmental control access panel.
[0038] refer to figure 1 , showing an exemplary topology diagram for a building automation system approach. Building wide area network 55 includes a number of systems and components that communicate by wire or wirelessly. The building wide area network 55 generally includes multiple building automation systems 100 and is accessible via a "building synergy interface system" or "BSIS". BSIS 200 may be altered by one or more mobile computing devices 300 capable of generating graphical displays readable by BSIS 200 , which may be part of environmental control access panel 250 . BSIS 200 may also include access to data storage devices including building information database 210 and user database 22...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 