Token verification and data integrity protection
A data integrity and token technology, applied in digital data protection, digital data authentication, data processing applications, etc., can solve problems such as large hardware costs and high computing intensity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] figure 1 The inventive system is shown with a wired connection between the checking entity and the verification token. In this embodiment, the checking entity is a laptop 101 which is at least indirectly connected to the verification token, for example via a serial interface. The verification token 102 is included in a device 103 , for example a control device, and is connected to the laptop 101 via the device 103 .
[0020] figure 2 The system of the invention is shown with connections formed through a network between inspection entities and verification tokens. The checking entity is, for example, a computer 201 designed to manage devices through remote access (Remote Device Management, remote device management). The computer 201 is connected to a verification token 202 , which is included by the device 203 , through a network such as the Internet. The device 203 is connected to the network 205 through an M2M (Machine-to-Machine, machine-to-machine) module 204 an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 