After a NetKey/ IDKey has been produced, the secret keys can only be used for cryptographic operations inside the TCOS chip. The use of secret keys is protected by a PIN, i.e., only authorized users can use secret keys.  

 
 
Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
Ok