PROTECTION OF SOFTWARE MODELS
First Claim
1. A method for encrypting a software model having software components of a technical system, a control unit and/or a system controlled or regulated by a control unit, the method comprising:
- generating a public key and a master key;
generating a decryption structure that includes at least one definition of a component group of the software components of the software model;
at least partially encrypting the software model via the public key; and
at least partially integrating the decryption structure into the encrypted software model such that the at least one component group is only decryptable via a secret key that includes the definition of the at least one component group.
2 Assignments
0 Petitions
Accused Products
Abstract
An encryption method is provided that has a software model of a technical system, the model including software components is encrypted by a public key and a decryption structure, wherein the latter includes definitions of component groups of the software model. The decryption structure is integrated at least partially into the encrypted software model. Correspondingly, in a decryption method according to the invention, via a secret key that likewise comprises definitions of component groups, only the particular component groups are decrypted whose definitions the secret key includes in agreement with the definitions of the encrypted software model. The definitions of the secret key can be extended after the fact by a key extension, so that additional component groups can be decrypted with an extended secret key.
-
Citations
21 Claims
-
1. A method for encrypting a software model having software components of a technical system, a control unit and/or a system controlled or regulated by a control unit, the method comprising:
-
generating a public key and a master key; generating a decryption structure that includes at least one definition of a component group of the software components of the software model; at least partially encrypting the software model via the public key; and at least partially integrating the decryption structure into the encrypted software model such that the at least one component group is only decryptable via a secret key that includes the definition of the at least one component group. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification