摘要 |
The authentication forms two morphological identifications (ID1, ID2), an identifier reference encrypted with a first key (CE), and a second key (CR). The second identifier (ID2) and key are used by a second device (5), to create then return an encoding table. The first device (2) encrypts the first identifier (ID1) with the encoding table to compare with the encrypted first reference code.
|