Bootloader verification extension method
An extension method, a technology of verifiers, applied in the field of electronic equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] figure 1 A schematic diagram showing a first example method 100 for enabling a device to perform asymmetric verification of data according to the teachings of the present disclosure. The method 100 of the first embodiment includes the following steps.
[0041] At step S110, the device obtains the asymmetric verifier application from the external storage device in response to the request to verify the signature associated with the first data. The method then proceeds to step S115.
[0042] At step S115, the device loads the asymmetric verifier application. The method then proceeds to step S120.
[0043] At step S120, the device executes the asymmetric verifier application. The method then proceeds to step S130.
[0044] At step S130, the device uses the asymmetric verifier application to verify the signature associated with the first data to perform asymmetric key cryptography. The asymmetric verifier application uses one or more keys to verify the signature. The one or more...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


