Program update method and server
First Claim
Patent Images
1. A server which operates for program update in a system including an LSI device, the server executing:
- a first step of receiving from the system an ID, which is implemented before the program update, of the LSI device and an application ID which is identification information of an update object program;
a second step of referring to a first table which indicates correspondences between application IDs and LSI IDs to determine whether or not the update object program is to be transmitted to the system;
if it is determined at the second step that the update object program is to be transmitted to the system, a third step of transmitting to the system a common key-encrypted program generated by encrypting the update object program with a common key and common key information from which the common key is derived;
a fourth step of determining whether the program update was successfully performed; and
a fifth step of deleting old program from a secure memory and writing information about the update object program into the secure memory if it is determined that the program update was successfully performed.
1 Assignment
0 Petitions
Accused Products
Abstract
A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
65 Citations
3 Claims
-
1. A server which operates for program update in a system including an LSI device, the server executing:
-
a first step of receiving from the system an ID, which is implemented before the program update, of the LSI device and an application ID which is identification information of an update object program; a second step of referring to a first table which indicates correspondences between application IDs and LSI IDs to determine whether or not the update object program is to be transmitted to the system; if it is determined at the second step that the update object program is to be transmitted to the system, a third step of transmitting to the system a common key-encrypted program generated by encrypting the update object program with a common key and common key information from which the common key is derived; a fourth step of determining whether the program update was successfully performed; and a fifth step of deleting old program from a secure memory and writing information about the update object program into the secure memory if it is determined that the program update was successfully performed. - View Dependent Claims (2, 3)
-
Specification