System and method for providing a secure boot architecture
A security and machine technology, applied in computer security devices, microprogram loading, memory address/allocation/relocation, etc., can solve problems such as the vulnerability of secure computing architectures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Detailed Description of the Preferred Embodiment
[0017] Reference will now be made in detail to the embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with these Embodiments, it will be understood that they are not intended to limit the invention to these Embodiments. On the contrary, the invention covers alternatives, modifications and equivalents, which may be included within the field defined by the claims of the present invention. Further, in the following detailed description of the present invention, numerous specific details are set up in order to provide a thorough understanding of the present invention. However, the invention may be practiced without these specific details. In other instances, well-known methods, components and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present invention.
[0018] Embodiments of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 