Still, there are a number of requirements that would make it ideal for the enterprise, including the ability to wipe data remotely and hardware encryption.
尽管如此,ipad如果能满足一些额外要求,比如能够远程擦除数据和硬件加密功能,这样对企业来说会更理想。
Finally design the application model of this hardware encryption chip in radio frequency card equivalent realization finance card standard.
最后给出了该硬件加密芯片在射频卡等效实现金融卡规范实例中的应用模型。
Therefore, this paper will introduce USB-KEY technology to the mobile platform to realize the security platform of mobile phone which supports hardware encryption.
为此,本文提出将usb - KEY等相关技术引入到手机平台,实现支持硬件加密的手机安全支撑平台。
After having realized the hardware circuit, this paper discusses software design of digital chaos encryption system in detail.
在实现了硬件系统设计之后,本文对数字混沌加密系统的软件设计也作了详细的分析和介绍。
Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。
The ISA card is made of X76F100 and the hardware principle, the principle of encryption method, the design of the cipher software and the safety characteristics of the system are also described.
同时,还详细论述了加密系统中ISA卡的硬件原理、四码代数加密法的原理、加密软件的设计以及系统的安全特性。
This paper proposes a novel efficient area reduction solution for hardware implementation of the advanced encryption standard (AES) algorithm which works in SSX11-140 secure processor architecture.
给出了在一种安全处理器(SSX11- 140)中有效缩减AES算法硬件实现面积的设计方案。
It focuses on the hardware-based encryption techniques are reviewed to introduce the advantages and disadvantages of hardware encryption technology; types and development.
本文重点对硬件加密技术进行了综述,介绍了硬件加密技术的优缺点、种类及发展趋势。
Because of high security, high speed, and good performance advantages, such as hardware-based encryption technology to protect disk data has become the mainstream of current trends and research focus.
由于安全性高、速度快、性能好等优势,硬件加密技术成为了当前保护磁盘数据的主流趋势和研究热点。
SI3016 manual recommends using circuit analysis and reliability of the circuit. Finally, the implementation of encryption algorithm based on the hardware.
在SI3016芯片与公用电话网接口电路的设计上,采用SI3016手册推荐电路并且分析了电路可靠性。
Because of the unavoidable deficiencies of the original software encryption scheme, people pay more and more attention to the hardware encryption technique.
原有采用软件加密的通信方案因其种种的缺陷使人们把目光逐渐转向了采用更加安全快速的硬件加密措施。
Because of the unavoidable deficiencies of the original software encryption scheme, people pay more and more attention to the hardware encryption technique.
原有采用软件加密的通信方案因其种种的缺陷使人们把目光逐渐转向了采用更加安全快速的硬件加密措施。
应用推荐