Security chip upgrading method, security chip upgrading device, terminal and security chip
A security chip and terminal technology, applied in program control devices, program loading/starting, etc., can solve the problems of low function iterability and low scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.
[0035] figure 1 It is a schematic flowchart of a method for upgrading a security chip proposed by an embodiment of the present invention.
[0036] This embodiment is illustrated by taking the method for upgrading a security chip configured as an upgrading device for a security chip.
[0037] The device for upgrading the security chip in this embodiment may be set in the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


