Heterogeneous fusion method, device and related equipment of trusted computing environment
A technology of trusted computing and fusion methods, which is applied to secure communication devices, public keys for secure communications, and key distribution, can solve problems such as untrustworthiness between applications in heterogeneous trusted computing environments, and achieve the effect of solving untrustworthiness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0030] The heterogeneous fusion method of a trusted computing environment provided by this application can be applied in such as figure 1 An application environment in which a client communicates with a server over a network. Among them, clients and servers can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The server can be implemented by an independent server or a s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


