摘要 |
The security technique is based on storage of a large number of personal codes on the system, and using a different code for each transaction. Thus an intercepted code cannot be reused successfully. This can be used in conjunction with techniques such as matching a clock signal, authentication of a storage device or identification of the person operating the system.
|