作者: Uwe Demsky , Matthias Besch , Rainer Hans Baumgart , Kai Martius
DOI:
关键词:
摘要: A security token is scanned by a pure reader that connected to computer. This immediately loads from the into computer virtual machine having operating system. Then an identification/authentication code entered via peripheral of computer, whereupon data can be exchanged between and system, thence system remote location.