首页>
外国专利>
Access authorization allocating and verifying method for e.g. computer system, involves verifying fulfillment of requirement through another requirement, and permitting access to access region of restriction region based on verification
Access authorization allocating and verifying method for e.g. computer system, involves verifying fulfillment of requirement through another requirement, and permitting access to access region of restriction region based on verification
The method involves transferring two data sets with access requirements by a computer system (10) to another computer system (10). One data set is decoded by the latter system to determine one requirement, and a third data set is produced by the latter system. One of the data sets and the third data set are transferred to a verification unit of a restriction region (30). The fulfillment of the requirement is verified by the verification unit through the other requirement. The access to an access region of the restriction region is permitted by the verification unit based on the verification. An independent claim is also included for a device for executing a method of allocating and verifying an access authorization for a restriction region.
展开▼