405 bytes added
, 4 years ago
For example, if we insert the word ‘Ephaptic’ in the platform encryption system, we will have an encrypted code in the three different contexts (patient, dentist and neurologist) which correspond to the three different algorithmic keys indicated by the program, for instance: the A key corresponds to the patient's algorithm, the B key to the dental context and the C key to the neurological context.