NCR Corporation
Security device key management
Last updated:
Abstract:
A method includes using a cryptographic infrastructure via a security processor in a device to communicate with a host, and managing, via the security processor, a cryptographic relationship with a security peripheral coupled to the security processor independent of the cryptographic infrastructure used to communicate with the host.
Status:
Grant
Type:
Utility
Filling date:
26 Aug 2014
Issue date:
15 Oct 2019