Secure communication method and device
A secure communication and trusted technology, applied in the field of communication, can solve problems such as leakage of user privacy and data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0132] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings.
[0133]The terms "first" and "second" in the specification, claims and drawings of the present application are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.
[0134] Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


