The chip encryption method is as follows:
According to an algorithm to convert the data 2 protection protection of some data access 3 verification of the data is not encrypted but there is verification verification is generally used, the host sends a string of random numbers to the encryption chip, and then the same operation with the encryption chip, compare the results, so as to determine the operation of the program.