Security unit and method for protecting data
A security unit and data protection technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve the problem of digital data being only usable
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0111] DT2 Data transmission of encrypted second data D2 from the main processing unit 20 to the security unit 30 (first embodiment; reference: FIGS. 1 and 2 )
[0112] DT23 Key exchange between security unit 30 and presentation processing unit 42 (second embodiment; reference: FIGS. 3 and 4 )
[0113] DT3 Data transmission of re-encrypted second data D2 from the security unit 30 to the main processing unit 20 (first embodiment; reference: FIGS. 1 and 2 )
[0114] DT4 of the re-encrypted (first embodiment; reference: FIGS. 1 and 2 ) or encrypted (second embodiment; reference: FIGS. 3 and 4 ) second data D2 from the main processing unit 20 to the rendering processing unit 42 data transmission
[0115] DT5 Data transfer of processed first data D1 from main processing unit 20 to rendering processing unit 42
[0116] DT6 Data transfer of combined data D1+D2 from presentation data unit 42 to output device 44 .
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 