Tech. Support
(request for new user)
(request for new user)
We can “hash” the application and generate a unique code that’s recorder somewhere into our various places on the board ( flash, nand, emmc, microsd) , and use this hash footprint to validate the application up to the OS level every time we want or need, up to any bootstrap.
Then, depending on the hash comparison result, we may decide to bootstrap application 1 or 2 for example, and manage the situation.
The hash coding, is extremely safe, because it is based on so complex a mathematical algorithm that makes it infeasible that 2 different files get the same hash value.
Federal ID Number 811523802
VAT RO36203804
R.C. N. J40/8303/14.06.2016