Cryptographic Coprocessor scenarios
To give you some ideas of how you can use this cryptographic hardware with your system running the i5/OS operating system, read these usage scenarios.
- Scenario: Protecting private keys with cryptographic hardware
This scenario might be useful for a company that needs to increase the security of the system digital certificate private keys that are associated with the i5/OS SSL-secured business transactions.- Scenario: Writing an i5/OS application to use the Cryptographic Coprocessor
This scenario could help an i5/OS programmer reason through the process of writing a program that calls the Cryptographic Coprocessor to verify user data such as financial personal identification numbers (PINs), which are entered at automatic teller machines (ATMs).
Parent topic:
4764 and 4758 Cryptographic Coprocessors