Targeted Secure Software Deployment
The techniques and systems described herein are directed to providing targeted, secure software deployment in a computing system. An identity of the computing device can be determined and verified using a trusted platform module (TPM) of the computing device, and a software update can be expressly c...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
04.01.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!