Cryptographic key distribution
A technology for encrypting keys and keys, applied in key distribution, to solve problems such as lack of flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] figure 1 A wireless temperature sensor 1 is shown containing an integrated circuit radio chip 2 , a battery 3 and a thermometer 4 . It should be understood that the wireless temperature sensor also contains other familiar discrete components such as PCBs, oscillators, capacitors, resistors, housings, user interface features, etc., which for simplicity are listed in figure 1 not shown in
[0051] The radio chip 2 contains a processor 5, memory 6 (which may contain both volatile and non-volatile memory types), LTE Cat-M1 (LTE-M) radio 7, hardware encryption engine 8, input / output peripherals 9, such as USB interface and key storage system 12. These elements are all connected to a bus system 10 supporting direct memory access (DMA) through bus masters other than processor 5 only. Chip 2 supports memory-mapped peripheral access.
[0052] In this example, processor 5 is an Arm TM Cortex-M series processor, but said processor can be any type of processor. The processor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



