Examples of 'secure processor' in a sentence
Meaning of "secure processor"
Secure processor: A computer processor that includes security features to prevent unauthorized access or tampering of data
How to use "secure processor" in a sentence
Basic
Advanced
secure processor
This secure processor can be produced as a removable device.
The safety of the device relies heavily on the secure processor.
The secure processor contains the keys necessary to decrypt.
Memorizing in a secured way the user personalization data by the secure processor.
This physically secure environment contains a secure processor coupled by a bus to a random access memory.
The invention furthermore relates to a mobile communication device and a secure processor.
The logically secure processor of the invention is defined in claim 1.
The protection device furthermore comprises a processor such as for example a secure processor.
NFC system of a user, comprising a secure processor and an NFC interface for contactless communications, and.
According to an embodiment, the integrated circuit comprises a secure processor.
Circuit WCD comprises a secure processor PRC and an antenna coil AC 1 connected to the processor.
This protocol is preferably carried out in the secure processor of the master device.
The secure processor SP may also generate and transmit request data CH ( step E 31 ).
Method for communication, communication device and secure processor.
In one embodiment, the secure processor is architected to use a 1K page.
See also
In practice, the same application instance is always activated in the secure processor.
Fig . 1 shows a schematic depiction of a secure processor 10 according to the invention.
First, the ControlVault chip can store and execute code using a secure processor.
Processor PROC 2 is a secure processor designated “ SP 1 ” of a SIM card.
According to one embodiment, the second processor is a secure processor of a SIM card.
A processing system comprising the logically secure processor is defined in claim 4.
An integrated circuit according to claim 1, comprising a secure processor.
The smart card of claim 21, wherein the secure processor is configured to,.
Each log is preferably given a unique log identity by the secure processor 140.
Fig . 1 is a block diagram showing a typical application of the logically secure processor of this invention ;.
FIG . 10 schematically shows a conventional terminal connected to a secure processor in a card reader.
You'll also be interested in:
Examples of using Secure
Show more
Have your men secure the floor
Secure the coaxial cable to the ceiling
Get him to a secure room under observation
Examples of using Processor
Show more
Assemble food processor with dough blade
Processor with capacity for different programmes
Do not clean the processor in the dishwasher