Varex Imaging Corporation
DETECTION OF UNAUTHORIZED COMPONENTS
Last updated:
Abstract:
Embodiments include a method, comprising: receiving from a first device at a second device, a request for a system identifier (ID) stored on the second device; and determining, by the second device, if the system ID stored on the second device has an empty value; when the system ID stored on the second device does not have the empty value, transmitting, by the second device to the first device, a response based on the system ID stored on the second device.
Status:
Application
Type:
Utility
Filling date:
5 Mar 2019
Issue date:
5 Mar 2020