Examples of 'cryptoprocessor' in a sentence

Meaning of "cryptoprocessor"

A cryptoprocessor is a specialized hardware device that is designed to secure cryptographic operations
Show more definitions
  • A dedicated computer on a chip or microprocessor that carries out cryptographic operations.

How to use "cryptoprocessor" in a sentence

Basic
Advanced
cryptoprocessor
Data processed by a cryptoprocessor is also frequently encrypted.
Process of security of an electronic unit with cryptoprocessor.
The secure cryptoprocessor can be tamper proof.
The comparison is preferably performed by the cryptoprocessor.
The secure cryptoprocessor is in communication with a microcontroller.
This microcontroller is also called a cryptoprocessor.
It is also known that a cryptoprocessor consumes a large amount of current.
Such a processor is generally called a security processor or cryptoprocessor.
Said cryptoprocessor is programmed or wired.
Preferably the client device comprises a secure cryptoprocessor or hardware security module.
Said cryptoprocessor represents an algorithm opposite the one used to encrypt said data.
The provided protection mechanisms are compatible with usual cryptoprocessor structures and require no modification thereof.
The Trusted Platform Module ( TPM ) is an international standard for a secure cryptoprocessor.
The internal design of the cryptoprocessor can be tailored to prevent these attacks.
However, the present invention may apply to any type of cryptoprocessor.

See also

In an electronic component, a cryptoprocessor is a processor that is dedicated to cryptographic operations.
Cryptographically validating the identity of a client device using a secure cryptoprocessor of the client device ;.
Conventional example of a cryptoprocessor will now be described in relation with FIG . 1.
The activation phase may start with the connection of deactivated cryptoprocessor 24 to the activation tool.
Cryptoprocessor 24 is also dedicated to the detection of attempts of unauthorized access to reader 10.
The buffer zone is generally a register of cryptoprocessor 2, and is very close to it.
In the present case, the authenticator ( 3 ) may be associated with a memory or a cryptoprocessor.
However, the key register of the cryptoprocessor remains sensitive to laser attacks.
Thus, component 1 of the disclosed embodiments essentially has one cryptoprocessor circuit 2.
Trusted Platform Module ( TPM ) is a secure cryptoprocessor that can store cryptographic keys to protect information.
At the same time, the read data DATA is sent to the cryptoprocessor 21.
According to a second embodiment, the cryptoprocessor is a cryptoprocessor attached to the media reader 30.
FIG . 2 is a block diagram of a system using a ciphering / deciphering unit of cryptoprocessor type ;.
FIG . 2 shows an embodiment of a card reader cryptoprocessor according to the present invention.
As an example, a cryptoprocessor equipping a card reader, for example, a bank card reader, is considered.
A method as claimed in claim 1 wherein the secure cryptoprocessor comprises a Trusted Platform Module.
The step E 524 consists in receiving a signature calculated by the cryptoprocessor.
Thereby, key K f stored at the level of cryptoprocessor 24 in the activation phase is deleted.
Cryptoprocessor 10 further comprises a security module or automaton 16.
According to a first embodiment, said data DATA is sent via the cryptoprocessor interface 37.
The elements common with cryptoprocessor 10 of FIG . 1 are designated with the same reference numerals.
Key K f is then stored at the level of cryptoprocessor 24.
At step 42, cryptoprocessor 24 has detected that an unauthorized substitution attempt has occurred.
The power supply of chip 26 may be ensured by cryptoprocessor 24.
As a variation, the link between cryptoprocessor 24 and chip 26 may be any type of long-haul link.
In a second stage, the media reader 30 recognises whether the media 10 is equipped with a cryptoprocessor.
To this end, it sends the track read via its cryptoprocessor interface 37 to the media 10.
Chip 26 is capable of receiving a signal R, called random variable hereafter, provided by cryptoprocessor 24.
Chip 26 is capable of providing cryptoprocessor 24 with a binary signal S, called chip signature hereafter.
At step 31, cryptoprocessor 24 provides serial number N to the activation tool.

Search by letter in the English dictionary