Using received audio identifications for access control
An audio, user-friendly technology used in instruments, electrical components, individual input/output registers, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Turning now to the drawings, examples are described in detail, in which like numerals indicate like (but not necessarily identical) elements throughout the several figures.
[0029] figure 1 is a block diagram depicting a system 100 that receives an audio token from a user computing device to allow access to a location, according to some examples. Such as figure 1 As depicted, system 100 includes network computing devices 110 , 130 , and 140 configured to communicate with each other via one or more networks 120 . In some embodiments, a user associated with a device must install applications and / or make feature selections to benefit from the techniques described herein.
[0030] In one example, the network 120 may include a local area network ("LAN"), a wide area network ("WAN"), an intranet, the Internet, a storage area network ("SAN"), a personal area network ("PAN"), a metropolitan area network (" MAN"), wireless local area network ("WLAN"), virtual private network...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


