首页>
外国专利>
SECURE IDENTIFICATION OF COMPUTING DEVICE AND SECURE IDENTIFICATION METHODS
SECURE IDENTIFICATION OF COMPUTING DEVICE AND SECURE IDENTIFICATION METHODS
展开▼
机译:计算设备的安全标识和安全标识方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
The method implemented in a computing device makes it possible to identify this computing device and/or user to an application on the computing device. The method includes receiving a function call for the public identifier, responding to the function call, performing a hash operation, and returning the public identifier. Responding to the function call includes requesting a publisher ID at a first memory location in the device and requesting a personal ID at a second memory location. Performing a hash operation on the issuer ID and personal ID creates a public identifier. The public identifier is returned to the application. It also explains how to enable developers to test applications on mobile devices or emulators. Mobile devices programmed to return a public identifier to an application are also described.
展开▼