Method and apparatus for security in a data processing system
A safe and secure processing technology, applied in the direction of security devices, data processing applications, secure communication devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by those of ordinary skill in the art that these embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures and techniques have been shown in detail in order not to obscure the embodiments.
[0028] It should also be noted that the embodiments may be described as processes represented by flowcharts, block diagrams or block diagrams. Although a flowchart may describe operations as a sequential process, many of the operations may be performed in parallel or simultaneously. Additionally, the order of operations can be rearranged. When the operation is complete, the process ends. A procedure may correspond to a method, function, procedure, subroutine, subroutine,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 