Location-based security, privacy, access control and monitoring system

作者: David Worthy

DOI:

关键词: Computer networkComputer securityEngineeringSecurity privacyEncryptionClient-side encryptionUnit (housing)Monitoring systemKey (cryptography)SignalAccess control

摘要: A system includes a transmit unit to signal including data key, and receiving receive the signal. The determine an encryption key based at least in part on decrypt encrypted using key.

参考文章(46)
Ezzat Dabbish, Thomas Messerges, Dean Vogler, Robert Patzer, Ephrem Chemaly, Digital content rendering device and method ,(2003)
James A. Marek, David S. Hardin, Raymond A. Kamin, Allen P. Mass, Steven E. Koenck, System for providing secure and trusted computing environments through a secure computing module ,(2005)
Sultan Weatherspoon, Duncan Glendinning, Secure wireless local area network ,(2000)
Kenneth Turocy, Damon J. Blackford, Songtao Ma, Jon Washington, H. Thomas Graef, ATM currency cassette with RFID tag ,(2004)
Sompong P. Olarig, Michael F. Angelo, Location-based security for a portable computer ,(2001)
Ashok Banerjee, Puneet Agarwal, Wayne Boland, Rfid system using soa ,(2006)