Resources Contact Us Home
Remote access terminal security

Image Number 6 for United States Patent #4916738.

The invention provides a method of securing remote terminal access to a central computer. The method uses the services of a physically secure coprocessor which is, or will be, coupled to the remote terminal for the purposes of effecting remote access to the central computer. The method comprises transferring an encrypted decryption key from the central computer to the physically secure coprocessor. The coupling between the coprocessor and remote terminal allows a file to be encrypted which can confirm that the remote terminal (which is the source of the encrypted file) has or had access to the specific coprocessor to which the encrypted decryption key had previously been transferred. Thereafter the encrypted file is transferred to the central computer and is examined there to confirm that the source of the file has access to the specific coprocessor which received the encrypted decryption key. Access is allowed, by the remote terminal, to the central computer after confirmation is produced by the examination at the central computer.

  Recently Added Patents
Bandpass filter and radio communication module and radio communication device using the same
Die seal ring
Image forming unit having agitating portion and image forming apparatus
Substantially aligned boron nitride nano-element arrays and methods for their use and preparation
Visually tracking an object in real world using 2D appearance and multicue depth estimations
Non-volatile semiconductor memory and data processing method in non-volatile semiconductor memory
  Randomly Featured Patents
Nectarine tree (Scarlet Red)
Video display apparatus and video display method
Multiple tier stopping and method of constructing stopping
Rapidly crystallizing polyethylene terephthalate blends
Scrubber scale prevention
Semiconducting nanoparticles with surface modification
Noise blanker
Energy conserving thermostat
Electrolytic cell
Method and system for describing and extracting application information