makor technologies


Part of an operating system that protects computer resources by only allowing those resources to be used by resource consumers that have been granted authority to use the resources. 
The authorization process is used to decide if a person, a program or a device X is allowed to have access to data, functionality or service Y.
RFID applications use authorization processes for access to building security systems, credit card payment processes and access to asset identification databases.

PrintTell a friend
דרונט בניית אתרים

מקור טכנולוגיות (ג. מקורטק מערכות זיהוי בע"מ), פרשקובסקי 7 ראשל"צ טלפון: 03-9507079 פקס: 03-6053633
מרחב צפון - טלפון: 054-2561550