Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the first request being transformed with the first type of split private key. A second authentication request that is transformed with a private portion of a second type private key is also received. A second user is authenticated for a second level of network access based upon the second request being transformed with the second type of split private key.

 
Web www.patentalert.com

< Application-based data encryption system and method thereof

> Battery authentication system

> Method for ciphering a compressed audio or video stream with error tolerance

~ 00546