|
|
|||||||||||||||||||
|
|
|||||||||||||||||||
|
|||||||||||||||||||
|
|
|||||||||||||||||||
|
A REVOLUTIONARY PATENTED NEW DYNAMIC KEY CRYPTOGRAPHIC SYSTEM Secret keys necessary for encryption, authentication, signature, etc. are obtained through a cryptographic process. |
|||||||||||||||||||
|
|||||||||||||||||||
|
|||||||||||||||||||
|
|||||||||||||||||||
|
With the Dynamic key process, every user has an electronic device, such as smartcard, microcomputer or virtual card, which is used not only as a means of authentication but also as a means of storing a user's customized profile. Such process can also be integrated within user array of convenient personal devices, such as cellular phone, cable/satellite controls, organizer, etc. |
|||||||||||||||||||
|
|
|||||||||||||||||||
|
|
|||||||||||||||||||
|
|
|||||||||||||||||||