Method and a system for secure management of information from an electronic pen
An electronic pen, data technology, applied in the direction of electric digital data processing, computer security device, public key for secure communication, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Figure 1A shows the system architecture developed by the applicant in which an embodiment of the present invention is implemented. This architecture has been described in the background section, and will be described in further detail below.
[0037] The system in FIG. 1A includes an electronic pen 100 or user unit, and a plurality of products 110 with location codes (not shown) including writing surfaces 120 , 121 and ribbon or activation icons 125 . Only one electronic pen and one product are shown in the figure. The system also includes a network connection unit 130 and two application service processors ASH1 and ASH2, denoted by 150 and 160, respectively. The application service processors 150 and 160 are servers controlled by a third party for managing services that can be used by the electronic pen 100 . Each application service processor ASH1 150 and ASH2 160 includes processing means indicated at 151 and 161 respectively for controlling the ASH to operate in a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 