Lawrence ChangFollow


Identifying and authenticating a user in an environment such as their home or office typically requires the user to use a key, punch a code in a keypad, carry a smartphone, carry a key fob, etc. Each one of these options has drawbacks from a user experience standpoint and in some cases can be abused or spoofed.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.