FIELD: information technology.
SUBSTANCE: client user is authenticated by security sever through a communication session; a pair of keys is made accessible through the security sever, wherein the pair of keys includes a public key and a private key; secure data transmission is performed between the client and the third party computer device using the pair of keys. The pair of keys has a limited period of validity determined by: a predetermined period of time, or a predetermined number of communication sessions or a predetermined number of actions.
EFFECT: secure connection between two clients and between a client and a server using a controlled policy application apparatus.
26 cl, 3 dwg
Authors
Dates
2012-04-20—Published
2006-07-13—Filed