Remote access terminal security

作者: Liam David Comerford , Akhileshwari Narain Chandra , Steve Richard White

DOI:

关键词: EncryptionTerminal (electronics)CoprocessorComputer scienceOperating systemKey (cryptography)

摘要: The invention provides a method of securing remote terminal access to central computer. uses the services physically secure coprocessor which is, or will be, coupled for purposes effecting comprises transferring an encrypted decryption key from computer coprocessor. coupling between and allows file be can confirm that (which is source file) has had specific previously been transferred. Thereafter transferred examined there received key. Access allowed, by terminal, after confirmation produced examination at

参考文章(32)
Adrianus H. Dieleman, Validation check for remote digital station ,(1985)
Jonathan Oseas, Walter L. Tuchman, Richard E. Lennon, Stephen M. Matyas, Paul N. Prentice, Carl H. W. Meyer, Cryptographic verification of operational keys used in communication networks ,(1977)
Gary R. Cook, Charles R. Bruce, James E. Beitel, Edward L. Sartore, Charles F. Mosier, Computer terminal security system ,(1982)
Stephen Charles Serpell, Generation of identification keys ,(1984)