Securing electronic control unit code
First Claim
1. A method for securing program code for an electronic control unit, comprising:
- transmitting an order for the program code to a developer, the order including specifications and an authentication key;
receiving the program code and the authentication certification from the developer;
verifying the authentication certificate to determine whether the developer was an authorized source of the program code;
generating metadata identifying the authorized source of the program code; and
embedding the metadata in the program code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for securing electronic control unit code. In one implementation, a method is provided. According to the method, an order for the program code may be transmitted to a developer. The order may include specifications and an authentication key. The method may further include receiving the program code and the authentication certification from the developer and verifying the authentication certificate to determine whether the developer was an authorized source of the program code. The method may generate metadata identifying the authorized source of the program code and embed the metadata in the program code.
-
Citations
20 Claims
-
1. A method for securing program code for an electronic control unit, comprising:
-
transmitting an order for the program code to a developer, the order including specifications and an authentication key; receiving the program code and the authentication certification from the developer; verifying the authentication certificate to determine whether the developer was an authorized source of the program code; generating metadata identifying the authorized source of the program code; and embedding the metadata in the program code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing program code for an electronic control unit, comprising:
a server, the server adapted to; transmit an order for the program code to a developer, the order including specifications and an authentication key; receive the program code and the authentication certification from the developer; verify the authentication certificate to determine whether the developer was an authorized source of the program code; generate metadata identifying the authorized source of the program code; and embedding the metadata in the program code. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification