|
|
||
|
||
Root of Trust
|
|
|
|
Overview The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
Please sign in to view full IP description :
|
业务合作 |
添加产品供应商免费录入产品信息 | ||||||

