To give you some ideas of how you can use this cryptographic
hardware with your system, read these usage scenarios.
Scenario: Protect private keys with cryptographic hardware
This scenario might be useful for a company that needs to increase the security of the system digital certificate private keys that are associated with the SSL-secured business transactions.
Scenario: Write an i5/OS application to use the Cryptographic Coprocessor
This scenario could help an i5/OS™ programmer reason through the process
of writing a program that calls the Cryptographic Coprocessor to verify user
data such as financial personal identification numbers (PINs), which are entered
at automatic teller machines (ATMs).