Method for operating a security element
一种安全元件、操作安全的技术,应用在安全装置、电气元件、传输系统等方向,能够解决过大、安全元件性能不利影响等问题,达到扩展功能、开销小的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] figure 1 A schematic diagram of a preferred embodiment of a secure element ("SecureElement") according to the invention in the form of a chip card 20 in communication with an external entity in the form of a reading device or terminal 10 is shown. For example, the secure element 20 may be a SIM card. Advantageously, the secure element in the form of a chip card 20 is configured as a JavaCard TM . However, the invention can of course also be realized in the form of a secure element having another structural form and using another operating system.
[0027] exist figure 1 A secure element 20 in the form of a chip card 20 shown in FIG. 2 is designed to exchange data with the reading device 10 . The reading device 10 can be part of a mobile phone, for example. Here, the signal transmission, the mutual control and, in simple cases, the connection between the reader 10 and the chip card 20 are understood to mean the exchange of data. In information theory, data exchange...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 