Methods and systems for bypassing authenticity checks for secure control modules
First Claim
Patent Images
1. A method of bypassing an authenticity check for a secure control module, comprising:
- receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier (ID) that is unique to the control module;
programming the control module with the authenticity data; and
selectively bypassing the authenticity check of a control program of the control module when the signature of the authenticity data is valid and when the ID of the authenticity data matches an identifier of the control module, wherein the control program includes instructions that when executed by a processor control one or more components of a vehicle,wherein the authenticity check authenticates a digital signature of the control program.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data.
14 Citations
16 Claims
-
1. A method of bypassing an authenticity check for a secure control module, comprising:
-
receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier (ID) that is unique to the control module; programming the control module with the authenticity data; and selectively bypassing the authenticity check of a control program of the control module when the signature of the authenticity data is valid and when the ID of the authenticity data matches an identifier of the control module, wherein the control program includes instructions that when executed by a processor control one or more components of a vehicle, wherein the authenticity check authenticates a digital signature of the control program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for bypassing an authenticity check, comprising:
-
a secure control module that includes non-volatile memory and a processor; and a control program that includes instructions that when executed by the processor control one or more components of a vehicle, and that includes authenticity data that is received from a secure source, that stores the authenticity data in the non-volatile memory, and that selectively bypasses the authenticity check of the control program when a signature of the authenticity data is valid and when an identifier (ID) of the authenticity data matches a unique identifier of the control module, wherein the authenticity check authenticates a digital signature of the control program. - View Dependent Claims (14, 15, 16)
-
Specification