发明名称 METHODS TO IMPROVE SECURE FLASH PROGRAMMING
摘要 Methods are provided for securely loading software objects into an electronic control unit. The methods include receiving a first software object comprising a second level public key certificate, a first encryption signature and a first set of software. Once the first software object is received, validating the first second level public key is validated with the embedded root public key, the first encryption signature with the first second level public key certificate, and the first set of software with the first encryption signature. When the first set of software is valid, then the first second level public key certificate and the first set of software are stored to non-volatile memory. Once stored, a consecutive software object is received comprising only a consecutive encryption signature and a consecutive set of software from the programming source. The consecutive encryption signature is validated with the stored second level public key certificate, and the consecutive set of software is validated with the consecutive encryption signature.
申请公布号 US2014359296(A1) 申请公布日期 2014.12.04
申请号 US201313904715 申请日期 2013.05.29
申请人 GM Global Technology Operations LLC 发明人 ALRABADY ANSAF I.;ROSA J. DAVID
分类号 H04L9/32 主分类号 H04L9/32
代理机构 代理人
主权项 1. A method for loading multiple software objects into a computing device containing a root public key, the method comprising: receiving a first software object from a programming source, the first software object comprising a second level public key certificate, a first encryption signature and a first set of data; validating the first set of data; when the first set of data is valid, then storing the second level public key certificate in a memory of the computing device and writing the first set of data to a memory of the computing device; receiving a second software object from the programming source, the second software object comprising a second encryption signature, a second set of data from the programming source and lacking the second level public key certificate; validating the second encryption signature with the stored second level public key certificate; validating the second software object with the second encryption signature and writing the second set of data to the memory of the computing device.
地址 Detroit MI US