Method and apparatus for communicating securely with a token
A token and trusted technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as damage to the security of tokens
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Methods and apparatus for securely communicating with tokens are described below. In the following description, specific details are given, such as communication protocols, types, and interrelationships of system components, etc., in order to provide a complete understanding of one or more embodiments of the present invention. It will be apparent, however, to one skilled in the art that one or more embodiments of the invention may be practiced without these specific details. Additionally, well-known architectures, control structures, gate level circuits and full software instruction sequences and techniques are not shown in the present invention for clarity of description. Those skilled in the art will be able to implement the appropriate function from the description of the invention without undue experimentation.
[0016] "One embodiment", "an embodiment", "an example embodiment" and the like in the specification indicate that the described embodiment may include spe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com