Dual key reflexive encryption security system

作者: Tadhg Kelly

DOI:

关键词:

摘要: A security system is disclosed, which for granting access to a host computer in response demand from remote computer. The has permanent encryption key mounted on the software portion of provides identification number associated with be sent unencrypted Using selects an device and encrypts transitory generated by transmits emplacement write-only receptor key. Thereafter comparator computer, encrypted identifying data transmitted said key, authenticates demand. Access granted upon favorable comparison identifier provided

参考文章(7)
James Virgle Stevens, Victor Scot Leith, Secure communications system for remotely located computers ,(1991)
Walter L. Tuchman, William F. Ehrsam, Stephen M. Matyas, Robert C. Elander, John L. Smith, Paul N. Prentice, Carl H. W. Meyer, Robert L. Powers, Cryptographic communication security for multiple domain networks ,(1977)
Ralph R. Bestock, Martin M. Atalla, Webster Dale Hopkins, Jae-Young Kim, Method for encrypting transmitted data using a unique key ,(1990)
Erwin Ward Bathrick, James E. Zmuda, Todd E. Matthews, Cheng-Chi Huang, Mae-Hwa Ma, Kenneth C. Kung, Method for providing mutual authentication of a user and a server on a network ,(1994)
Yasuo Iijima, Data communication system ,(1991)
Ichikawa Yasuyo, DATA COMMUNICATION SYSTEM ,(1993)