-
公开(公告)号:US10038565B2
公开(公告)日:2018-07-31
申请号:US13722810
申请日:2012-12-20
Applicant: GM Global Technology Operations LLC
Inventor: Ansaf I. Alrabady , Kevin M. Baltes , J. David Rosa , Thomas M. Forest , Alan D. Wist
CPC classification number: H04L9/3249 , G06F21/572 , H04L9/3247 , H04L2209/84
Abstract: Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data.
-
公开(公告)号:US20250148083A1
公开(公告)日:2025-05-08
申请号:US18503938
申请日:2023-11-07
Applicant: GM Global Technology Operations LLC
Inventor: Brian Farrell , John Jen , J. David Rosa
Abstract: A system may include data processing hardware and memory hardware in communication with the data processing hardware. The memory hardware may store instructions that when executed on the data processing hardware cause the data processing hardware to perform operations. The operations include requesting, via a boot manager of a host module, a hardware security module (HSM) to verify an application software of the host module and configuring, via the verified application software, a memory protection unit (MPU) to at least one of no execute and no write for at least one area of a memory of the host module. The operations further include executing the application software with the HSM enabled.
-
公开(公告)号:US09270468B2
公开(公告)日:2016-02-23
申请号:US13904715
申请日:2013-05-29
Applicant: GM Global Technology Operations LLC
Inventor: Ansaf I. Alrabady , J. David Rosa
CPC classification number: G06F12/1408 , G06F2212/1052 , H04L9/007 , H04L9/3247 , H04L9/3263 , H04L2209/24 , H04L2209/64 , H04L2209/72 , H04L2209/84
Abstract: Methods are provided for securely loading software objects into an electronic control unit. The methods include receiving a first software object comprising a second level public key certificate, a first encryption signature and a first set of software. Once the first software object is received, validating the first second level public key is validated with the embedded root public key, the first encryption signature with the first second level public key certificate, and the first set of software with the first encryption signature. When the first set of software is valid, then the first second level public key certificate and the first set of software are stored to non-volatile memory. Once stored, a consecutive software object is received comprising only a consecutive encryption signature and a consecutive set of software from the programming source. The consecutive encryption signature is validated with the stored second level public key certificate, and the consecutive set of software is validated with the consecutive encryption signature.
Abstract translation: 提供了将软件对象牢固地加载到电子控制单元中的方法。 所述方法包括接收包括第二级公钥证书,第一加密签名和第一软件集的第一软件对象。 一旦接收到第一个软件对象,验证第一个第二级公钥就可以用嵌入式根公钥,具有第一级二级公钥证书的第一加密签名和具有第一加密签名的第一组软件来验证。 当第一组软件有效时,第一级公钥证书和第一组软件被存储到非易失性存储器中。 一旦存储,接收到包括来自编程源的连续加密签名和连续的一组软件的连续的软件对象。 使用存储的第二级公钥证书验证连续的加密签名,并且使用连续的加密签名验证连续的软件集合。
-
-