摘要 |
A method for reliable authentication of electronic transactions, whereby each authentication is unique, immune to cryptanalysis attacks, and information from intercepted transactions cannot be used to authenticate or facilitate authentication of future transactions.
|