摘要 |
Tampering of electronic equipment may be detected by instructing the electronic equipment to perform at least one computational operation at the electronic equipment, such as hashing of at least some of the memory of the electronic equipment, to produce a result. The result is received from the electronic equipment. Tampering of the electronic equipment is detected if the result is not received within a constrained time of the instructing, even if the result is correct. Tampering also may be detected if the result is not correct.
|