If the user is in a logout state, the authentication server performs a user authentication procedure.
If the two access IPs are identical to each other, the authentication server performs the authentication procedure.
Based on information collected in the first authentication procedure, the bridge module performs a second authentication procedure is performed, on behalf of the mobile station, in the second authentication domain.
An (initial) authentication procedure of the MU is performed as a function of the identifier and the authentication data.
Name of party operating the authentication procedure
motion sensor authentication failure
The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server (160).
A procedure to authenticate the mobile node is performed based on the authentication information contained in the registration request.
At this point the back-end server can finalize its authentication procedure.
When the transmission source device (20) does not have the authentication procedure decided, an authentication procedure is acquired from outside for authenticating the transmission destination device (30).
The second path allows a network authentication module authentication procedure not supported on the first path.
The call is first connected to the authentication site, an authentication procedure is preferably selected and customized, and then performed.
Authentication credentials are collected by monitoring authentication procedure of a plurality of applications accessed by a user.
The authentication device carries out a predetermined authentication procedure with the supplicant and notifies a control server of the result.
An Authentication, Authorization and Accounting server (AAA) performs an AT access authentication process.
supervisory regime applicable to the party operating the authentication procedure
A second authentication/authorization procedure is initiated from the client terminal towards the external authentication server using the secured tunnel.
The registered application is registered in a registry according to a mobile application authentication procedure.
The registry includes a plurality of registered applications authenticated according to the mobile application authentication procedure.
The authentication procedure utilizes data as defined by the access scheme.
Requêtes fréquentes français :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Requêtes fréquentes anglais :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Traduction Translation Traducción Übersetzung Tradução Traduzione Traducere Vertaling Tłumaczenie Mετάφραση Oversættelse Översättning Käännös Aistriúchán Traduzzjoni Prevajanje Vertimas Tõlge Preklad Fordítás Tulkojumi Превод Překlad Prijevod 翻訳 번역 翻译 Перевод