Stateless Server-Based Encryption Associated with a Distribution List

作者: Michael Tsirkin

DOI:

关键词:

摘要: An example method of decrypting electronic messages includes receiving, by an authentication module a decryptor device, requests from plurality destination clients. The also decryption the encrypted are derived common message sent source client. further authenticating, based on table, table stores user credentials that used to authenticate for each received authenticated client clients, using private key and providing decrypted is stored at device.

参考文章(35)
Paul E. Catinella, Clay W. von Mueller, Secured transaction system and method ,(2012)
Charles A. Rego, John Kalan, Automated provisioning of a network appliance ,(2011)
Richard McConnell, Vinay Modak, Amanda Lyons, Hrishi Talwar, Alicia Paul, John Moore, Alfred Adler, Robert Hyder, Remote mail management system ,(2003)
Ulf Schwekendiek, Tuomas Santeri Artman, Jyri Engestrom, Peer-to-peer payment processing ,(2013)
Alessandro Gadotti, Method and System of Secure Email ,(2014)
Vasileios Zissimopoulos, James Roskind, Method for authenticating kerberos users from common web browsers ,(2002)