Secure software authentication and verification
A software, non-secure technology, applied in secure communication devices, digital data authentication, computer security devices, etc., can solve problems such as low power processing capacity/resource difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] In the following description, specific details are given to provide a thorough understanding of the described embodiments. However, one skilled in the art will understand that the described embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order to avoid obscuring the implementations in unnecessary detail. In other instances, well-known circuits, structures and techniques may be shown in detail in order not to obscure the implementations.
[0025] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or embodiments. Likewise, the term "embodiments" does not require that all embodiments include the discussed feature, advantage or mode of operation.
[0026] Overview
[0027] One feature provides secure loading and ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


