摘要 |
<p>A method for maintaining the security of a wireless database management system (250) (WDMS) including steps of encrypting data (320) for transmission through both hard-wired and wireless networks (310), authenticating user identities, timing out idle connections, assigning sessions, and categorizing types of users access. Each component of the structure of a WDMS is described along with the various security techniques employed for securing the data transmitted and received by that component.</p> |