Method for authenticating validity of self-contained software of equipment system
A legality certification and legality verification technology, applied in the field of software legality certification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0035] The present invention will be further described below with reference to specific embodiments, but the present invention is not limited to these specific embodiments. Those skilled in the art should realize that the present invention covers all alternatives, modifications and equivalents that may be included within the scope of the claims.
[0036] When leaving the factory, the software (or components) used for online banking transaction signature authentication is stored inside the device. By binding the software (or components) with the device, and using the method of sharing the key, the system software is used to verify the validity of the system software. authentication to ensure that the data received by the device comes from legitimate system software.
[0037] First of all, when the device leaves the factory, the system software has been stored in the secure storage space of the device, and the system software has a fingerprint algorithm and an obfuscation key sh...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap