Security architecture for using host memory in the design of a secure element
A security element and memory technology, applied in security devices, electrical components, computer security devices, etc., can solve problems such as scalability and non-ideal processes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention, including structures, systems, and methods, may be practiced without these specific details. Descriptions and characterizations are the ordinary meanings used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components and circuits have not necessarily been described in detail so as not to unnecessarily obscure aspects of the present invention.
[0024] References in the specification to "one embodiment," "an embodiment," "an exemplary embodiment," and the like indicate that the embodiment may include a particular feature, structure, or characteristic. But each embodiment does not necessarily include a specific feature, structure or c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com