Secure computer architectures, systems, and applications
Abstract:
Secure computer architectures, systems, and applications are provided herein. An exemplary system includes a legacy environment which is an off-the-shelf computing system, a trusted environment device that communicates with a network, and at least one peripheral that is communicatively coupled with the trusted environment device or having an authentication module.
Public/Granted literature
Information query
Patent Agency Ranking
0/0