Assessing the security module's resistance to attacks that divert communication channels
A technology of security modules and communication channels, applied in the field of transactions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In different drawings, the same elements are assigned the same reference numerals. For the sake of clarity, only those elements and steps helpful for understanding the embodiments are shown and will be described. Specifically, coding and communication protocols used for near-field transmission or telecommunications in GSM mode will not be detailed, and the embodiments are compatible with conventional protocols. In addition, the circuits forming the mobile communication device will not be described in detail, and the embodiments here are also compatible with conventional programmable devices.
[0027] figure 1 The type of mobile telecommunication equipment (for example, mobile phone) to which the embodiment is applied is very briefly shown as an example. The different elements (keyboard, display, speakers, etc.) that interface with the user are not shown because these elements will not be modified by the implementation of the embodiments to be described.
[0028] The devic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 