loading
secure
computing
analyzing
process token
request waiting
token
verify
check system request
granted
connection