NCR Corporation
Security device key management

Last updated:

Abstract:

A method includes using a cryptographic infrastructure via a security processor in a device to communicate with a host, and managing, via the security processor, a cryptographic relationship with a security peripheral coupled to the security processor independent of the cryptographic infrastructure used to communicate with the host.

Status:
Grant
Type:

Utility

Filling date:

26 Aug 2014

Issue date:

15 Oct 2019