作者: Eric D. Crahen , Kevin Ross O'neill , Nathan R. Fitch , Bradley Jeffery Behm , Gregory B. Roth
DOI:
关键词:
摘要: Systems and methods for authentication generate keys from secret credentials shared between authenticating parties authenticators. Generation of the may involve utilizing specialized information that, as a result being used to keys, renders generated usable smaller scope uses than credential. Further, key generation multiple invocations function where each at least subset results in that has permissible use produced previous invocation function. Generated be signing sign messages. One or more actions taken depending on whether message and/or manner which was submitted complies with restrictions key's use.