The software comes encrypted by a symmetric key known to those platforms built by someone with an agreement with the software vendor. The software is delivered to the platform vendor who encrypts it. This scheme needs tamper resistant hardware to protect the secret. I hate to say it but a bit of security thru obscurity might by partially viable here.