A method, system and computer program product for access control
A technology for access control and access to resources, applied in computer security devices, calculations, instruments, etc., can solve problems such as becoming abolished
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Figure 2 is an exemplary block diagram of a computer system suitable for operation of various embodiments of the invention. Central processing unit (CPU) 202 is communicatively coupled to storage 204 and input / output (I / O) interface 206 via data bus 208 . Storage 204 can be any read / write storage device, such as a random access memory (RAM) or a non-volatile storage device. Examples of non-volatile storage devices include disk or tape storage devices. The I / O interface 206 is an interface to a device for inputting or outputting data, or for inputting and outputting data. Examples of I / O devices that can be connected to the I / O interface include keyboards, mice, displays (eg, monitors), and network connections.
[0030]FIG. 3 is an exemplary block diagram of a system for authenticating access to a resource 302 in accordance with a preferred embodiment of the present invention. Many elements of FIG. 3 are the same as those described above with respect to FIG. 1, and th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 