Encryption communication method and system of Arm architecture application processor
An application processor, encrypted communication technology, applied in transmission systems, wireless communication, security devices, etc., can solve the problems of inconvenient embedding of encryption modules, bypass, etc., to reduce the risk of being bypassed, high security, communication safe effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Embodiments and examples of the present invention will be described in detail below with reference to the drawings.
[0031] The scope of applicability of the present invention will become apparent from the detailed description given below. It should be understood, however, that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are given for purposes of illustration only.
[0032] figure 1 A flow chart of a preferred embodiment of an encrypted communication method for an Arm architecture application processor according to the present invention is shown. The application processor and communication chip based on the Arm architecture are integrated on the SoC chip, and the communication chip is a 2G, 3G, 4G and / or 5G communication chip. Here, the 5G communication chip is used as an example for illustration. ARM defines exception levels for permission control, which are EL0, EL1, EL2, and EL3, and their exception l...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com