A computer system includes an interface and a processor. The interface is adapted to receive a request from another computer system for identification of the first computer system. The adapter also furnishes a hash value that identifies the first computer system to the other computer system. The processor is coupled to the interface and is adapted to encrypt an identifier that identifies the first computer system with a key associated with the other computer system to provide the hash value.

 
Web www.patentalert.com

< Method of authentication via a secure wireless communication system

< Using permissions to allocate device resources to an application

> Security restrictions on binary behaviors

> Messaging with instructions for media playback

~ 00616