System and method for code authentication
A code and memory technology, applied in the field of boot control mechanism using hardware signature, can solve the problems of low speed of hashing system and verification process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] In the following discussion, numerous specific details are set forth to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known elements have been shown in schematic or block diagram form, in order not to obscure the invention in unnecessary detail. In addition, for the most part, details related to network communication, electromagnetic signaling technology, etc. have been omitted as far as possible, as long as these details are not considered necessary for a thorough understanding of the present invention and are considered to be understood by those in the relevant technical circles .
[0011] Also, note that unless otherwise stated, all functions described herein can be performed by either hardware or software, a microprocessor executing firmware, or some combination thereof. In one embodiment, coded applic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 