Method of conducting secure operations on an uncontrolled network

作者: David L. Denslow

DOI:

关键词: InitializationEncryptionNetwork securityWorkstationComputer securityComputer networkAccess networkIdentifierPort (computer networking)Computer science

摘要: A method of conducting secure operations on an uncontrolled network in which authorized users are provided with a personal identifier and portable, electronically readable card part system key thereon. The is created by access port (SNAP) at the workstation, and, when used combination persona identifier, uniquely identifies user so that may be to conduct from any workstation network. Operational keys for security manager response validated request access. operational encrypted communication using initialization unique known manager.

参考文章(14)
Adrianus H. Dieleman, Validation check for remote digital station ,(1985)
Carter Lyman, B. J. Herbison, Arnold Miller, Bruce Mann, Steve Lipner, Paul Karger, Apparatus and method for secure transmission of data over an unsecure transmission channel ,(1989)
Martin M. Atalla, Webster D. Hopkins, Multilevel security apparatus and method with personal key ,(1990)
Rostislaw Prymak, Ramesh K. Karne, Stephen M. Matyas, Donald B. Johnson, An V. Le, Patrick J. McCormack, John D. Wilkins, Dennis G. Abraham, Secure management of keys using control vectors with multi-path checking ,(1990)
James Virgle Stevens, Victor Scot Leith, Secure communications system for remotely located computers ,(1991)
Stephen Michael Matyas, Bruno Oswald Brachtl, Carl Heinz Wilhelm Meyer, Controlling the use of cryptographic keys via generating station established control values ,(1988)
Mark Harvey Wallis, William L. Ferguson, In-store universal control system ,(1991)