Data processing method, security architecture system and computing device
A security and subsystem technology, applied in data processing power supply, internal/peripheral computer component protection, measurement devices, etc., can solve problems such as digital circuit error output, violation of timing constraints, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Reference will now be made in detail to specific embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings. While the disclosure will be described in conjunction with specific embodiments, it will be understood that it is not intended to limit the disclosure to the described embodiments. On the contrary, it is intended to cover alterations, modifications and equivalents as included within the spirit and scope of the present disclosure as defined by the appended claims. It should be noted that the method operations described herein can all be realized by any functional blocks or functional arrangements, and any functional blocks or functional arrangements can be realized as physical entities or logical entities, or a combination of both.
[0035] In order to enable those skilled in the art to better understand the present disclosure, the present disclosure will be described in further detail below in conjunction with the accomp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


