Method, system, and computer program product for network bound proxy re-encryption and pin translation
A re-encryption, computer technology, applied in point-of-sale network systems, computing, transmission systems, etc., can solve problems such as performance bottlenecks and huge costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0112] For purposes of description below, the terms "end", "upper", "lower", "right", "left", "vertical", "horizontal", "top", "bottom", "transverse", " "Portrait" and its derivatives shall refer to the orientation of the disclosed subject matter as it is shown in the drawings. It should be understood, however, that the disclosed subject matter may employ various alternative variations and step sequences, except where the contrary is expressly specified. It is also to be understood that the specific devices and processes shown in the drawings and described in the following specification are merely exemplary embodiments or aspects of the disclosed subject matter. Accordingly, specific dimensions and other physical characteristics associated with the embodiments or aspects disclosed herein are not to be considered as limiting unless otherwise indicated.
[0113] No aspect, component, element, structure, act, step, function, instruction etc. used herein should be construed as cr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


