End-to-end secure communication system for communication of power trusted computing platform
A technology of trusted computing and secure communication, applied in the fields of information security and Internet of Things, to achieve the effect of solving technical problems of communication security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The embodiments will be described in detail hereinafter, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following examples do not represent all implementations consistent with this application. These are merely examples of systems and methods consistent with aspects of the present application as recited in the claims.
[0025] see figure 1 , which is a schematic structural diagram of an end-to-end secure communication system for an electric power trusted computing platform in the present application. Depend on figure 1 It can be seen that an end-to-end secure communication system for electric power trusted computing platform provided by this application includes information concentration and interaction terminal, electric port terminal securit...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


