A method, terminal device and system for encrypting security configuration files
A security configuration and terminal equipment technology, applied in security communication devices, transmission systems, digital transmission systems, etc., can solve the problems of a large amount of effort, manual labor, and high cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] first reference Figure 1A ,1B and 1C, according to an example embodiment, the graphs are graphs of a first handshake to establish a communication session using an encrypted security profile. The components in the figures are shown in a greatly simplified fashion, only those components necessary for understanding certain embodiments of the invention are shown.
[0039] The diagram includes an enterprise host device and a client device, and shows the process of first establishing a communication session between the host device and the client device and determining the security profile used during the session. Host devices and client devices are considered endpoints for establishing a secure communication session with each other. Endpoints can be secure input / output modules (SIOMs) or peripherals such as printers, scanners, PIN pads, encrypted PIN pads, magnetic stripe readers (MSR), monitors, keyboards, value-media dispensers ), touch screen monitors, etc.).
[0040] S...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


