作者: Jose Raphel , Amarnath Mullick , Shashidhara Mysore Nanjundaswamy , Kailash Kailash
DOI:
关键词: Computer security 、 Encryption 、 Authorization 、 Geography 、 Epoch (reference date) 、 Authentication 、 Public-key cryptography 、 Distributed security 、 Key (cryptography)
摘要: Systems, methods and apparatus for a distributed security that provides authentication authorization management. The system can include an epoch processor is used to validate data valid only epoch. maintain public key be decrypt the during valid. receive new each also determine if or was fraudulently generated based on contents of data, verifying whether in which it decrypted.