System and method for code authentication
A code and memory technology, applied in the field of boot control mechanism using hardware signature, can solve the problems of low speed of hashing system and verification process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] In the following discussion, numerous specific details are set forth to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known elements have been shown in schematic or block diagram form, in order not to obscure the invention in unnecessary detail. In addition, for the most part, details related to network communication, electromagnetic signaling technology, etc. have been omitted as far as possible, as long as these details are not considered necessary for a thorough understanding of the present invention and are considered to be understood by those in the relevant technical circles .
[0011] Also, note that unless otherwise stated, all functions described herein can be performed by either hardware or software, a microprocessor executing firmware, or some combination thereof. In one embodiment, coded applic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
