Methods and apparatus for secure communications. The techniques feature receiving over the first connection a login credential for the server, generated by the server without the use of any information identifying a computer user. The techniques further feature establishing a second secure connection with the server using a secure protocol and the login credential provided by the server.

 
Web www.patentalert.com

< Method and system for determining total code execution time in a data processor

> Apparatus and method for allocating resources within a security processing architecture using multiple queuing mechanisms

> Information processing apparatus, information processing method, information processing system and recording medium

~ 00578