Security module for performing security functions on untrusted platforms
A technology for security functions and security modules, which is applied in user identity/authority verification, countermeasures to attack encryption mechanisms, encryption devices with shift registers/memory, etc., and can solve problems such as difficulty in finding and extracting information.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032]The description and drawings illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements not explicitly described or shown herein but which embody the principles of the invention and are included within its scope. In addition, the examples cited herein are in principle intended for demonstration purposes to help readers understand the principles of the present invention and the ideas contributed by inventors to advance technology, and are not to be construed as being limited to these specifically cited examples and conditions. Furthermore, as used herein, the term "or" is non-exclusive (ie, and / or) unless otherwise indicated (eg, "otherwise" or "alternatively"). Furthermore, the embodiments described herein are not necessarily mutually exclusive, and some embodiments may be combined with one or more other embodiments to form new embodiments.
[0033] In the deployment of secure softwar...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


