System and method for authentication of software
A technology of software and software mirroring, applied in the field of certified devices, non-transitory computer-readable media, and systems, and can solve the problems of manufacturing, operation, expansion and cost overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] figure 1 is a block diagram of an example of a system (eg, a system for authentication of software) 10 in accordance with at least one example embodiment. In some example embodiments, non-limiting examples of system 10 may include stationary computing systems (eg, servers, desktop computers, and / or kiosks, etc.) or subsystems thereof. In some example embodiments, non-limiting examples of system 10 may include portable computing systems (e.g., mobile phones, wearable devices, smart devices, game consoles, tablet and / or laptop computers, etc.) and subsystems thereof . In some example embodiments, non-limiting examples of system 10 may include subsystems included in any system other than a stand-alone computing system, such as home appliances, Internet of Things (IoT) devices, industrial equipment, and / or transportation vehicles, etc.).
[0024] refer to figure 1 , system 10 may include at least one processor 12, system memory 14, and / or system storage 16, etc., but ex...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


