Varex Imaging Corporation
DETECTION OF UNAUTHORIZED COMPONENTS

Last updated:

Abstract:

Embodiments include a method, comprising: receiving from a first device at a second device, a request for a system identifier (ID) stored on the second device; and determining, by the second device, if the system ID stored on the second device has an empty value; when the system ID stored on the second device does not have the empty value, transmitting, by the second device to the first device, a response based on the system ID stored on the second device.

Status:
Application
Type:

Utility

Filling date:

5 Mar 2019

Issue date:

5 Mar 2020