WiFi chip and security chip information interaction method
A security chip and information interaction technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as easy leakage of user privacy data and attacks, and achieve high reliability, good scalability, and reasonable interaction logic Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Embodiments of the present application are described in detail below, examples of which are shown in the accompanying drawings, and the embodiments described below by referring to the accompanying drawings are exemplary and are intended to explain the present application and cannot be construed as a reference to the present application. limits.
[0031] The network topology of smart devices currently on the market is as follows: figure 1 shown. It mainly consists of three parts, cloud server, mobile APP and smart devices. In order to ensure the security of users' data and information, a security system needs to be added to this network system, and corresponding security scheme supporting measures need to be added to these three parts at the same time. The invention is applied to the smart device end and is a part of the security system of the smart device end.
[0032] like figure 2 As shown, the security solution on the smart device side is implemented based on th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


