Methods and systems for securely transferring embedded code and/or data designed for device to customer
A data security and equipment technology, applied in digital transmission systems, transmission systems, computer security devices, etc., can solve problems such as increasing code size and intrusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or other changes may be made without departing from the scope of the present invention. Accordingly, the following detailed description should not be taken in a limiting sense, and the scope of the invention is defined by the appended claims.
[0013] figure 1 A simplified schematic diagram of an example environment is shown in which a system according to an embodiment of the invention may be implemented. Device 17 is produced by a manufacturer (eg, a semiconductor manufacturer) at the manufacturer's location (eg, semiconductor factory 11 ), sold to customers, and delivered to customer location 13 . Furthermore, in this example may be a supplier of the software producer 12, pro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com