Method of using a security token

作者: Uwe Demsky , Matthias Besch , Rainer Hans Baumgart , Kai Martius

DOI:

关键词:

摘要: A security token is scanned by a pure reader that connected to computer. This immediately loads from the into computer virtual machine having operating system. Then an identification/authentication code entered via peripheral of computer, whereupon data can be exchanged between and system, thence system remote location.

参考文章(3)
Pedram Keyani, Mary P Czerwinski, Desney S Tan, Spy-resistant keyboard ,(2004)
Liraz Siri, Alon R. Swartz, A practical platform for high risk applications ,(2006)