Online security key protection method and system
A security key and security technology, applied in the field of information security, can solve the problems of encryption and decryption operation speed and network transmission speed performance bottleneck, local cache and encryption and decryption operation process leakage, complex process and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.
[0039] In order to make the purpose, technical solution and advantages of the present invention more clear, the working principle of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, as shown in the appended figure 1 to attach Figure 4 mentioned.
[0040] Such as figure 1 As shown, the terminal devic...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com