DATA DRIVEN EMBEDDED APPLICATION BUILDING AND CONFIGURATION
    1.
    发明申请
    DATA DRIVEN EMBEDDED APPLICATION BUILDING AND CONFIGURATION 审中-公开
    数据驱动的嵌入式应用程序构建和配置

    公开(公告)号:WO2017066194A1

    公开(公告)日:2017-04-20

    申请号:PCT/US2016/056441

    申请日:2016-10-11

    CPC classification number: G06F8/34 G06F8/41 G06F11/3616 G06F11/3664

    Abstract: Provided herein are various systems, methods and architectures for enabling a microcontroller manufacturer to provide certain modification and configuration functionality to product vendors, while still maintaining the level of control needed to ensure that a product vendor does not inadvertently (or otherwise) create code that causes the microcontroller to not work properly. In one embodiment, this functionality can be performed through the steps of displaying a set of microcontroller properties that are available for configuration, receiving user information regarding a first value corresponding to a first microcontroller property, determining whether the user information results in a valid microcontroller configuration, and in response to determining that the user information results in a valid microcontroller configuration, generating compiled code for the microcontroller.

    Abstract translation: 本文提供了用于使得微控制器制造商能够向产品供应商提供某些修改和配置功能的各种系统,方法和体系结构,同时仍然保持所需的控制水平以确保产品供应商不会无意中 (或以其他方式)创建导致微控制器无法正常工作的代码。 在一个实施例中,可以通过显示可用于配置的一组微控制器属性,接收关于对应于第一微控制器属性的第一值的用户信息,确定用户信息是否导致有效的微控制器配置 并且响应于确定用户信息导致有效的微控制器配置,为微控制器产生编译后的代码。

    SECURE CODE DELIVERY
    2.
    发明申请
    SECURE CODE DELIVERY 审中-公开
    安全代码交付

    公开(公告)号:WO2017066318A1

    公开(公告)日:2017-04-20

    申请号:PCT/US2016/056636

    申请日:2016-10-12

    Abstract: A method and apparatus for secure code delivery. In one embodiment the method is implemented on a computer system, and includes reading an access privilege from a first set of access privileges, wherein the first set of access privileges corresponds to a first file that comprises first encrypted source code. The first encrypted source code is decrypted to produce first decrypted source code. A determination is made as to whether the first access privilege is set to a first state or a second state. If the first access privilege is set to the first state, a first software development tool is permitted to access and process the first decrypted source code. If the first access privilege is set to a second state, the first software development tool is denied access to decrypted source code.

    Abstract translation: 一种用于安全代码传递的方法和设备。 在一个实施例中,该方法在计算机系统上实现,并且包括从第一组访问特权中读取访问特权,其中第一组访问特权对应于包括第一加密源代码的第一文件。 第一个加密的源代码被解密以产生第一个解密的源代码。 做出关于第一访问权限是被设置为第一状态还是第二状态的确定。 如果第一访问权限设置为第一状态,则允许第一软件开发工具访问并处理第一解密的源代码。 如果第一个访问权限设置为第二个状态,则第一个软件开发工具被拒绝访问解密的源代码。

Patent Agency Ranking