SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS
First Claim
Patent Images
1. A method for verifying electronic software code integrity, the method comprising:
- providing a list of encryption keys to a client, each encryption key on the list correlated to a respective time factor;
encrypting a software code packet using one of the plurality of encryption keys based at least in part on a specific time factor;
delivering the encrypted software code packet to the client; and
informing the client to choose an encryption key for decryption based on the specific time factor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for verifying electronic software code integrity may comprise providing a list of encryption keys to a client, encrypting a software code packet using one of the plurality of encryption keys, delivering the encrypted software code packet to the client, and informing the client to choose an encryption key for decryption based on the specific time factor. Each encryption key on the list may correlate to a respective time factor. The one of the plurality of encryption keys may be chosen from the list based at least in part on a specific time factor.
-
Citations
12 Claims
-
1. A method for verifying electronic software code integrity, the method comprising:
-
providing a list of encryption keys to a client, each encryption key on the list correlated to a respective time factor; encrypting a software code packet using one of the plurality of encryption keys based at least in part on a specific time factor; delivering the encrypted software code packet to the client; and informing the client to choose an encryption key for decryption based on the specific time factor. - View Dependent Claims (2, 3, 4)
-
-
5. A method for verifying electronic software code integrity, the method comprising:
-
storing a list of encryption keys received from a server, each of the encryption keys correlated to a respective time factor; receiving an encrypted software code packet from the server, the encryption key based at least in part on a specific time factor; and choosing an encryption key for decrypting the software code based at least in part on the specific time factor. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
Specification