A method for debugging a microprocessor and the microprocessor
A microprocessor and encryption algorithm technology, applied in the computer field, can solve problems such as illegally refreshing microprocessors and stealing, and achieve the effect of improving flexibility and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to better understand the technical solutions provided by the embodiments of the present application, a detailed description will be given below in conjunction with the accompanying drawings and specific implementation manners.
[0055] The technical terms involved in the embodiments of the present application are explained below.
[0056](1) Key pair. In asymmetric encryption technology, there are two kinds of keys, which are divided into private key and public key. The private key is held by the owner of the key pair and cannot be published. The public key is held by the key pair. announced to other parties.
[0057] (2) The private key is the key in asymmetric encryption, which is used to decrypt the data encrypted by the public key.
[0058] (3) Public key, the public key is used to encrypt data, and the data encrypted with the public key can only be decrypted with the private key.
[0059] The prior art related to this application will be described below....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


