Encryption bridge system and method of operation thereof

作者: Lev M. Bolotin , Simon B. Johnson

DOI:

关键词:

摘要: A method of operation an encryption bridge system that includes: verifying authentication parameter using a self-authenticating bridge; and controlling for the disposed between computer storage in response to verification including determining whether data is received from or system.

参考文章(75)
John Michael, Data encryption device ,(2009)
Mark Stanley Krawczewicz, Daniel Ricciotti, Jeffrey Minushkin, System and method for self-authenticating token ,(2009)
Kyougo Suzuki, Yuzou Matsuo, IC memory card having read/write inhibit capabilities ,(1994)
Michael Long, Software for a lock ,(2002)
Mitsuhiro Matsuo, Nobuyuki Saito, Tomonori Kumagai, Encryption/decryption device, communication controller, and electronic instrument ,(2006)
Wei Loon Ng, Wen Xiang Xie, Data storage device security method and apparatus ,(2002)
Laszlo Elteto, James W. Yip, Jenine Ann McQuaid, Michael Lloyd Cochran, Boot-up and hard drive protection using a USB-compliant token ,(2003)
Francis L. Nguyen, Leigh Perona, Kin Doe, Method and apparatus for a secure computing environment ,(2001)