Controlled Security Code Verification
A code and verification device technology, applied in the field of code verification, can solve the problems of destroying the safe boot operation and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] System Overview
[0012] Figure 1A is a block diagram of an example environment 100 according to an implementation. For purposes of illustration, environment 100 includes system 116 (eg, a client-side system) that includes client device 120 and authentication (Auth) device 118 . The verification device 118 is configured to verify whether the code or program stored in the client device 120 is authorized (or verified) code. The code of the client device 120 includes at least one of an activation code for enabling the client device 120 to start (or activate) or an operation code for causing the client device 120 to perform a corresponding operation.
[0013] Authentication device 118 is coupled to client device 120 via connection 119 . In some implementations, the authentication device 118 and the client device 120 are placed proximately, and the connection 119 is wired through a data cable (eg, a fiber optic cable or a conductive cable) or is wireless. In some other i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


