A METHOD, MEDIUM, AND APPARATUS FOR RE-PROGRAMMING FLASH MEMORY OF A COMPUTING DEVICE
    2.
    发明申请
    A METHOD, MEDIUM, AND APPARATUS FOR RE-PROGRAMMING FLASH MEMORY OF A COMPUTING DEVICE 有权
    用于重新编程计算设备的闪速存储器的方法,介质和装置

    公开(公告)号:US20160026458A1

    公开(公告)日:2016-01-28

    申请号:US14338193

    申请日:2014-07-22

    CPC classification number: G06F8/654 G06F8/658

    Abstract: A method of re-programming flash memory of a computing device is presented here. Software content having a plurality of software modules can be re-programmed by identifying, from the software modules, a first set of software modules to be programmed by delta programming and a second set of software modules to be programmed by non-delta programming. A first set of sectors of the flash memory is assigned for programming the first set of software modules, and a second set of sectors is assigned for programming the second set of software modules. At least some of the second set of sectors are designated as temporary backup memory space. The first set of sectors is programmed with the first set of software modules, using delta programming and the designated temporary backup memory space. After programming the first set of sectors, the second set of sectors is programmed with the second set of software modules, using non-delta programming.

    Abstract translation: 这里介绍一种重新编程计算设备的闪存的方法。 具有多个软件模块的软件内容可以通过从软件模块识别由增量编程编程的第一组软件模块和通过非增量编程来编程的第二组软件模块来重新编程。 分配闪存的第一组扇区用于对第一组软件模块进行编程,并且分配第二组扇区用于对第二组软件模块进行编程。 第二组扇区中的至少一些被指定为临时备份存储器空间。 第一组扇区用第一组软件模块编程,使用增量编程和指定的临时备份存储空间。 在对第一组扇区进行编程之后,使用非增量编程,第二组扇区用第二组软件模块编程。

    METHODS AND SYSTEMS FOR BYPASSING AUTHENTICITY CHECKS FOR SECURE CONTROL MODULES
    3.
    发明申请
    METHODS AND SYSTEMS FOR BYPASSING AUTHENTICITY CHECKS FOR SECURE CONTROL MODULES 审中-公开
    用于安全控制模块的认证检查的方法和系统

    公开(公告)号:US20140181526A1

    公开(公告)日:2014-06-26

    申请号:US13722810

    申请日:2012-12-20

    CPC classification number: H04L9/3249 G06F21/572 H04L9/3247 H04L2209/84

    Abstract: Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data.

    Abstract translation: 提供了用于绕过安全控制模块的真实性检查的方法和系统。 在一个实施例中,一种方法包括:从安全源接收真实性数据,其中所述真实性数据包括签名和所述控制模块唯一的标识符; 使用真实性数据对控制模块进行编程; 并基于真实性数据绕过控制模块的控制程序的真实性检查。

Patent Agency Ranking