1. The document describes an IBM secret key management protocol that provides secure communication between servers and terminals. 2. It uses a tamper-resistant cryptographic facility to securely store the most important keys used to generate encryption keys. 3. The protocol establishes a master key that is used to generate session keys for encryption in a similar manner to the scheme described in a 1978 paper.