摘要 |
<p>The method involves generating a key, which is agreed between a base and a system portion during a connection, where the generated key is used at another connection between the base and the system portion. One functinality or a circuit or an index is obtained in the generation of the key, where the functinality or circuit or index is allocated or generated by the base during the former connection. The data to be transferred between the base and the system portion is identified or encrypted or decrypted based on the functinality or the circuit or index alloted to the key. An independent claim is included for a system for use with a computer system or a communication system.</p> |