Multi-chip key synchronization method and system and password equipment
A technology of key synchronization and cryptographic equipment, which is applied in the field of information security, can solve problems such as increasing the complexity of business systems and increasing system load, and achieve the effect of improving business processing efficiency and reducing business load
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.
[0024] figure 1 For a schematic flowchart of a multi-chip key synchronization method provided in the embodiment of this application, see figure 1 , the multi-chip key synchronization method in this embodiment includes:
[0025] S101. The scheduling intermediate unit acquires resource usage rights of the chip.
[0026] Such as figure 2 As shown, the scheduling intermediate unit is responsible for the communication scheduling between the application program and the chip. The scheduling intermediate unit is mainly divided into several levels such as reading configuration files, instruction packaging, obtaining chip resource usage rights, communication layer, and releasing chip resource usage rights. .
[0027] Therefore, before the scheduling intermediate unit in this embodiment obtains the resource usage right of the chip, it first reads the configu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com