throbber
10/14/2020
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`CLOUD
`
`DEVOPS
`
`GRC
`IDENTITY
`INCIDENT RESPONSE
`Tuesday, October 13, 2020
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
`Understanding the Shared Responsibility Model
`
`      
`
`Home  Security Bloggers Network  Webinars  Chat  Library
`
`Related Sites  Media Kit
`
`Home » Security Bloggers Network » Authentication vs. Authorization Defined: What’s the
`Dierence? [Infographic]
`
` Authentication vs. Authorization Defined:
`What’s the Dierence? [Infographic]
`
`by lrshivangini on June 11, 2020
`
`TechStrong TV – Live
`Streaming
`
`This ev
`TechStrong TV - All Episodes
`
`Featured Blog 
`
`Eric Kedrosky
`
`The Future of Multi-Cloud
`Security: A Look Ahead at
`Intelligent Cloud Security
`Posture Management Solutions
`
`Eric Kedrosky
`
`Why CISOs Must Let IAM Guide
`Cloud Security
`
`Sonrai Security Marketing
`
`[Webinar Recap] Secure Multi-
`Cloud Environments:
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 1/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 1 of 8
`
`

`

`10/14/2020
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`Intelligent Cloud Security
`IOT / ICS
`THREATS / BREACHES
`Posture Management
`
`INCIDENT RESPONSE
`
`MOR
`
`CLOUD
`
`DEVOPS
`
`GRC
`
`IDENTITY
`
`Subscribe to our Newsletters
`
`Get breaking news, free
`eBooks and upcoming events
`delivered to your inbox.
`
`Your Email
`
`View Security Boulevard Privacy
`Policy
`
`Subscribe Now
`
`Most Read on the Boulevard
`
`Security Threats Targeting the
`Remote Workforce
`
`Orca Security Finds 400,000+ Virtual
`Appliance Vulnerabilities
`
`Factcheck: Regeneron’s use of
`embryonic stem cells
`
`Trends in IT Risk Management
`
`Cybersecurity Best Practices for
`Small to Mid-Sized Businesses |
`Avast
`
`Integrate Anywhere: API-First Agile
`A
`h | Th 5 C iti
`l S
`
`Upcoming Webinars 
`
`The Future of Active Host
`Vulnerability Monitoring
`
`October 21 @ 11:00 am - 12:00 pm
`
`More Than Monitoring: How
`Observability Takes You From
`Firefighting to Fire Prevention
`
`October 27 @ 8:00 am - 9:00 am
`
`Best Practices for Driving
`Soware Quality through a
`
`WE
`
`D 2
`
`1
`
`TUE
`27
`
`WE
`D
`
`As enterprises advance towards digital maturity in the times of robust cloud-based systems
`and stringent online security, authentication and authorization are used in conjunction (also,
`oen interchangeably) with each other.
`
`Though both the terms sound similar, they refer to entirely dierent security processes.
`Within the scope of customer identity and access management (CIAM), authentication
`verifies a user’s identity, while authorization validates if the user has access to perform a
`specific function.
`
`In other words, authentication is identifying users by confirming who they say they are, while
`authorization is the process of establishing the rights and privileges of a user.
`
`Both processes play equally important roles in securing sensitive data assets from breaches
`and unauthorized access.
`
`Here, we’ll cover how they’re defined and what distinguishes one from the other.
`
`What is Authentication
`
`Authentication is the process of identifying users and validating who they claim to be. One of
`the most common and obvious factors to authenticate identity is a password. If the user
`name matches the password credential, it means the identity is valid, and the system grants
`access to the user.
`
`Interestingly, with enterprises going passwordless, many use modern authentication
`techniques like one-time passcodes (OTP) via SMS, or email, single sign-on (SSO), multi-
`factor authentication (MFA) and biometrics, etc. to authenticate users and deploy security
`beyond what passwords usually provide.
`
`What is Authorization
`
`Authorization happens aer a user’s identity has been successfully authenticated. It is about
`oering full or partial access rights to resources like database, funds, and other critical
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 2/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 2 of 8
`
`

`

`10/14/2020
`information to get the job done.
`ANALYTICS
`APPSEC
`CISO
`
`CLOUD
`
`DEVOPS
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`Federated Application Security
`28
`IOT / ICS
`THREATS / BREACHES
`MOR
`Responsibility Model
`
`GRC
`
`IDENTITY
`
`INCIDENT RESPONSE
`
`In an organization, for example, aer an employee is verified and confirmed via ID and
`password authentication, the next step would be defining what resources the employee
`would have access to.
`
`Authentication vs Authorization:
`Understanding the Techniques
`
`October 28 @ 1:00 pm - 2:00 pm
`
`NOV
`16
`
`Pentest as a Service Impact
`2020
`
`November 16 @ 1:00 pm - 2:00
`pm
`
`IAM administrators should understand the core of utilizing both authentication and
`authorization, and how one dierentiates from the other.
`
`Download Free eBook
`
`For example, an organization will allow all its employees to access their workplace systems
`(that’s authentication!). But then, not everyone will have the right to access its gated data
`(that’s authorization!).
`
`Implementing authentication with the right authorization techniques can protect
`organizations, while streamlined access will enable its workforce to be more productive.
`
`Here is the common authentication vs authorization techniques used by CIAM solutions.
`
`However note that technologies like JWT, SAML, OpenID Authorization, and OAuth are used
`in both authentication and authorization.
`Popular authentication techniques 
`
`Password-based authentication is a simple method of authentication that requires a password
`to verify the user’s identity. 
`Passwordless authentication is where a user is verified through OTP or a magic link delivered
`to the registered email or phone number.
`2FA/MFA requires more than one security level, like an additional PIN or security question, to
`identify a user and grant access to a system. 
`Single sign-on (SSO) allows users to access multiple applications with a single set of
`credentials. 
`Social authentication verifies and authenticates users with existing credentials from social
`networking platforms.
`
`Popular authorization techniques 
`
`Role-based access controls (RBAC) can be implemented for system-to-system and user-to-
`system privilege management.
`JSON web token (JWT) is an open standard for securely transmitting data between parties,
`and users are authorized using a public/private key pair.
`SAML is a standard Single Sign-On format (SSO) where authentication information is
`exchanged through XML documents that are digitally signed.
`OpenID authorization verifies user identity based on an authorization server’s authentication.
`OAuth allows the API to authenticate and access the requested system or resource.
`
`To learn more about the authentication vs authorization – concept, dierences, and
`techniques, check out the infographic created by LoginRadius.
`
`Recent Security Boulevard
`Chats
`
`Cloud, DevSecOps and Network
`Security, All Together?
`
`Security-as-Code with Tim
`Jeerson, Barracuda Networks
`
`ASRTM with Rohit Sethi, Security
`Compass
`
`Deception: Art or Science, Ofer
`Israeli, Illusive Networks
`
`Tips to Secure IoT and
`Connected Systems w/ DigiCert
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 3/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 3 of 8
`
`

`

`10/14/2020
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`CLOUD
`
`DEVOPS
`
`GRC
`
`IDENTITY
`
`INCIDENT RESPONSE
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
`Industry Spotlight 
`
`Security Threats
`Targeting the
`Remote
`Workforce
`
`How the Tech
`Landscape
`Could Change
`Post-Election
`
`Protecting
`Connected Cars
`from
`Cyberattack
`
`Orca Security
`Finds 400,000+
`Virtual
`Appliance
`Vulnerabilities
`
`U.S. Cyber
`Command Says
`it Nuked
`Trickbot, but
`Microso and
`
`Google Gives
`Cops Your
`Search Terms –
`Let the Frog-
`Boiling
`
`Top Stories 
`
`Chums Claim Credit
`
`Commence
`
`Security Humor 
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 4/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 4 of 8
`
`

`

`10/14/2020
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`CLOUD
`
`DEVOPS
`
`GRC
`
`IDENTITY
`
`INCIDENT RESPONSE
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
`From The Archive – Robert M.
`Lee’s & Je Haas’ Little Bobby
`Comics – ‘WEEK 298’
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 5/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 5 of 8
`
`

`

`10/14/2020
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`CLOUD
`
`DEVOPS
`
`GRC
`
`IDENTITY
`
`INCIDENT RESPONSE
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 6/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 6 of 8
`
`

`

`10/14/2020
`
`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`
`ANALYTICS
`
`APPSEC
`
`CISO
`
`CLOUD
`
`DEVOPS
`
`GRC
`
`IDENTITY
`
`INCIDENT RESPONSE
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
`Implementing Identity and Access
`Management with LoginRadius 
`
`Centralized identity and access management solutions can play a major role in delivering
`robust authentication and authorization for users within the organizational framework. 
`
`A cloud-based CIAM solution like LoginRadius verifies authoritative user identities and
`automates privileges and rights based on pre-defined roles. 
`
`What more? Not having to manually define permissions saves time, reduces backlogs, and
`ensure hassle-free user experience.
`
`Furthermore, with LoginRadius, opportunities to streamline CIAM are endless. That also
`includes securing access to privileged resources and safeguarding IT infrastructure from
`cyber attacks.
`
`Recent Articles By Author
`
`Best IDaaS Provider – Why Loginradius is Considered as the Best IDaaS Solution
`
`Social Engineering Attacks: Prevention and Best Practices [Infographic]
`
`Announcement – LoginRadius Announces the Availability of User Management, a
`Comprehensive Feature to Deliver More Personalized Consumer Experiences
`
`More from lrshivangini
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 7/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 7 of 8
`
`

`

`Authentication vs. Authorization Defined: What’s the Difference? [Infographic] - Security Boulevard
`10/14/2020
`*** This is a Security Bloggers Network syndicated blog from Identity Blog authored by
`ANALYTICS
`APPSEC
`CISO
`CLOUD
`DEVOPS
`GRC
`IDENTITY
`INCIDENT RESPONSE
`lrshivangini. Read the original post at:
`https://www.loginradius.com/blog/2020/06/authentication-vs-authorization-infographic/
`
`IOT / ICS
`
`THREATS / BREACHES
`
`MOR
`
` LoginRadius
`
`← Machine Learning, Deep Learning and Neural Networks, Oh My!
`
`Want To Protect Privacy? Get O Social Media, Indiana Federal Court Says →
`
`Other Mediaops
`Sites
`
`Container Journal
`
`DevOps.com
`
`DevOps Connect
`
`DevOps Institute
`
`Join the
`Community
`
`Add your blog to Security
`Bloggers Network
`
`Write for Security
`Boulevard
`
`Bloggers Meetup and
`Awards
`
`Ask a Question
`
`Email:
`info@securityboulevard.co
`m
`
`Useful Links
`
`About
`
`Media Kit
`
`Sponsors Info
`
`Copyright
`
`TOS
`
`Privacy Policy
`
`DMCA Compliance
`Statement
`
`Copyright © 2020 MediaOps Inc. All rights reserved.
`
`      
`
`https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/#:~:text=In other words%2C authe… 8/8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2024
`
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket