Requesting and Receiving security statuses

Figure 3 – Requesting and Receiving security statuses