METHODS AND SYSTEMS FOR BYPASSING AUTHENTICITY CHECKS FOR SECURE CONTROL MODULES
    1.
    发明申请
    METHODS AND SYSTEMS FOR BYPASSING AUTHENTICITY CHECKS FOR SECURE CONTROL MODULES 审中-公开
    用于安全控制模块的认证检查的方法和系统

    公开(公告)号:US20140181526A1

    公开(公告)日:2014-06-26

    申请号:US13722810

    申请日:2012-12-20

    CPC classification number: H04L9/3249 G06F21/572 H04L9/3247 H04L2209/84

    Abstract: Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data.

    Abstract translation: 提供了用于绕过安全控制模块的真实性检查的方法和系统。 在一个实施例中,一种方法包括:从安全源接收真实性数据,其中所述真实性数据包括签名和所述控制模块唯一的标识符; 使用真实性数据对控制模块进行编程; 并基于真实性数据绕过控制模块的控制程序的真实性检查。

    SYSTEM AND METHOD FOR DATA ACCESS IN A MULTICORE PROCESSING SYSTEM TO REDUCE ACCESSES TO EXTERNAL MEMORY

    公开(公告)号:US20180292988A1

    公开(公告)日:2018-10-11

    申请号:US15482195

    申请日:2017-04-07

    Abstract: A memory access method in a multicore processor integrated circuit (IC) is provided. The method comprises partitioning local memory on the IC into a plurality of memory regions wherein each memory region comprises one or more memory segments and assigning each memory region to one or more processing entities or applications wherein each processing entity comprises a processor core or a processing device that is under the control of a processor core and wherein the application is capable of being performed by one of the processing entities. The method further comprises monitoring, with each processing entity, the usage of each memory segment in each region assigned to the processing entity and assigned to the applications performed by the processing entity and swapping the data in a memory segment from a memory region experiencing a miss for desired data when the miss causes a data access with external memory.

    METHODS TO IMPROVE SECURE FLASH PROGRAMMING
    3.
    发明申请
    METHODS TO IMPROVE SECURE FLASH PROGRAMMING 有权
    改进安全闪存编程的方法

    公开(公告)号:US20140359296A1

    公开(公告)日:2014-12-04

    申请号:US13904715

    申请日:2013-05-29

    Abstract: Methods are provided for securely loading software objects into an electronic control unit. The methods include receiving a first software object comprising a second level public key certificate, a first encryption signature and a first set of software. Once the first software object is received, validating the first second level public key is validated with the embedded root public key, the first encryption signature with the first second level public key certificate, and the first set of software with the first encryption signature. When the first set of software is valid, then the first second level public key certificate and the first set of software are stored to non-volatile memory. Once stored, a consecutive software object is received comprising only a consecutive encryption signature and a consecutive set of software from the programming source. The consecutive encryption signature is validated with the stored second level public key certificate, and the consecutive set of software is validated with the consecutive encryption signature.

    Abstract translation: 提供了将软件对象牢固地加载到电子控制单元中的方法。 所述方法包括接收包括第二级公钥证书,第一加密签名和第一软件集的第一软件对象。 一旦接收到第一个软件对象,验证第一个第二级公钥就可以用嵌入式根公钥,具有第一级二级公钥证书的第一加密签名和具有第一加密签名的第一组软件来验证。 当第一组软件有效时,第一级公钥证书和第一组软件被存储到非易失性存储器中。 一旦存储,接收到包括来自编程源的连续加密签名和连续的一组软件的连续的软件对象。 使用存储的第二级公钥证书验证连续的加密签名,并且使用连续的加密签名验证连续的软件集合。

Patent Agency Ranking