Access management method and device
An access management and access token technology, applied in security devices, secure communication devices, computer security devices, etc., can solve the problem of inability to obtain permanent access to access-controlled devices.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] By receiving the access token from the access service via the user device instead of via the gateway, the advantage can be obtained that access to the controlled device can be made simpler, since the access controlled device may no longer need to be equipped with a different communication capability towards the gateway . Examples of accessing controlled devices and user devices are provided below.
[0041] figure 1A system according to at least some embodiments of the invention is shown. The system includes an access-controlled device 120, which may include, for example, an IoT device or another type of access-controlled device, such as a medical patient information repository or its controller. Access-controlled device 120 may include a processing core and memory, and may be powered by a stable power source or, for example, by a rechargeable battery. For example, access-controlled devices 120 may include personal wearable and / or embedded devices. Access-controlled ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


