In numerous scenarios, specific information or systems are subject to restrictions. This mechanism is implemented to preserve sensitive data, guarantee security, and govern access privileges. Therefore, only eligible individuals or entities are granted the ability to interact with these controlled resources. Such controls often involve verification