Patent attributes
A computer-implemented method, a computer system and a computer program product secure access to a restricted area. The method includes capturing, by a camera, a first image of a face of a first person and a second image of a face of a second person. The method also includes determining whether the face of the first person is included in a database of persons authorized to access the restricted area. The method further includes determining whether the second person is in proximity to the first person. In addition, the method includes determining whether the second person is authorized to access the restricted area. Finally, the method includes transmitting a signal that the second person is authorized to access the restricted area in response to determining that the second person is in proximity to the first person and the second person is authorized to access the restricted area.