摘要 |
A method and apparatus for creating and implementing a security protocol. The security protocol preferably includes a dichotomous, or two-part, code. The first part includes a digital component such as an alphanumeric sequence while the second part includes an analog component such as that encountered in any physical attribute. The analog component may also be modeled as a number of different information prototypes, such as a span of time or a musical tone. The resultant combination may be embodied, for example, by a dichotomous password that is used to gain clearance to secure assets and features the ability to "profile" the user requesting secure access in real-time. The password may include a string of characters in which part of the password constitutes entry of each character over varied intervals of time. |