Security enabler device and method for securing data communications

作者: Daniel Jakubiec

DOI:

关键词:

摘要: A security enabler device has a key management module adapted to generate and store keys destroy the generated if necessary protect security. An encryption authentication is linked data storage use provide secure network communications for terminal connected or incorporated in device. The operates conjunction with an operating code prevent access at least one of from outside

参考文章(12)
Jeffrey A. Davis, Bruce L. Lieberman, Alan R. Steiner, System and method for securely booting from a network ,(2002)
Christopher D. Faircloth, Roy T. Nelson, John M. Johnson, Lance Larsen, Portable handheld device for wireless order entry and real time payment authorization and related methods ,(2006)
Josh D. Benaloh, Paul England, Marcus Peinado, Daniel R. Simon, Transferring application secrets in a trusted operating system environment ,(2005)
Harm Peter Hofstee, Pradeep K. Dubey, James Allan Kahle, David John Craft, Method and system for controlled distribution of application code and content data within a computer network ,(2001)
Joseph Kisenwether, Mark Lowell, Michael W. Hartman, Calvin Nicholson, Stephen E. Patton, Hong J. Kim, Enhanced gaming system ,(2003)
Paul B. Schneck, Marshall D. Abrams, System for controlling access and distribution of digital property ,(1997)
Ashim Banerjee, Safwan Shah, Sandeep Gandhi, Narinder Bajwa, Sohail Aslam, Control and recruitment of client peripherals from server-side software ,(2005)