摘要 |
A method of authenticating communications includes receiving, by a computer (116), a first set of credentials (220), verifying (212) the first set of credentials by comparing the first set of credentials to a plurality of sets of credentials stored in a database (216), subsequent to verifying the first set of credentials, deriving a second set of credentials (214), and transmitting (230) notification of the second set of credentials to a remote computer. |