摘要 |
A method ( 100 ) of secure communications over a public network can include establishing a permanent key and an ordered sequence of limited use keys ( 102 ), enabling the use of the permanent key at any time ( 104 ) and enabling the use of the limited use keys for a predetermined usage ( 106 ). The step of establishing the order sequence of limited use keys can optionally include the step of establishing an ordered sequence of single-use keys ( 108 ). The method can further include the step of requesting ( 110 ) the ordered sequence of limited use keys from an access protected website and optionally storing ( 116 ) the ordered sequence of limited use keys and a respective status for each of the limited use keys. The method can further include the step of disabling ( 112 ) each of the limited use keys after the predetermined usage for each of the limited use keys. |