作者: Lev M. Bolotin , Simon B. Johnson
DOI:
关键词:
摘要: A method of operation an encryption bridge system that includes: verifying authentication parameter using a self-authenticating bridge; and controlling for the disposed between computer storage in response to verification including determining whether data is received from or system.