Third-party access control
First Claim
Patent Images
1. A method for access control, comprising:
- performing a communication to a third-party in response to an attempt by an individual to access an object;
obtaining a control input from the third-party using the communication;
determining whether to allow the individual to access the object in response to the control input.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for third-party access control include performing a communication to a third-party in response to an attempt by an individual to access an object. A control input from the third-party is obtained using the communication and a determination is made whether to allow the individual to access the object in response to the control input.
-
Citations
17 Claims
-
1. A method for access control, comprising:
-
performing a communication to a third-party in response to an attempt by an individual to access an object; obtaining a control input from the third-party using the communication; determining whether to allow the individual to access the object in response to the control input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for access control, comprising:
-
a set of settings by a third-party for controlling access to an object by an individual; access controller that performs a communication to the third-party in response to an attempt by the individual to access the object and in response to the settings, the access controller obtaining a control input from the third-party using the communication and then determining whether to allow the individual to access the object in response to the control input. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
Specification