×

Methods and apparatuses for configuring products

  • US 8,151,110 B2
  • Filed: 12/22/2005
  • Issued: 04/03/2012
  • Est. Priority Date: 08/05/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method of manufacturing a product, the method comprising:

  • establishing a connection between a data processing system and the product while the product is being manufactured;

    selecting a first executable code for the product, the first executable code being one of a plurality of different executable codes including at least a second executable code, the first executable code comprising first executable instructions to encrypt and decrypt a first product identifier information, the second executable code comprising second executable instructions to encrypt and decrypt a second product identifier information;

    encrypting a first set of identifier information according to the first executable code;

    encrypting a second set of identifier information according to the second executable code;

    loading, while the product is being manufactured, the first set of encrypted identifier information in a format compatible with the first executable code into the product;

    loading, while the product is being manufactured, the first executable code into the product, wherein the first set of encrypted identifier information is decryptable by the first executable code, but not decryptable by the second executable code, wherein the first executable code is capable of decrypting, modifying and re-encrypting the first set of identifier information in a manner that is not compatible with the second executable code;

    loading, while another product is being manufactured, the second set of encrypted identifier information in a format compatible with the second executable code into the another product; and

    loading, while the another product is being manufactured, the second executable code into the another product, wherein the second set of encrypted identifier information is decryptable by the second executable code, but not decryptable by the first executable code, wherein the second executable code is capable of decrypting, modifying and re-encrypting the second set of identifier information in a manner that is not compatible with the first executable code.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×