Method for downloading at least one software component onto a computing device, and associated computer program product, computing device and computer system
First Claim
1. A method for downloading at least one software component to a computing device, the method being implemented by the computing device comprising an information processing unit having a memory, the method comprising:
- downloading into the memory a first application from a first distribution capability; and
connecting via the first application to a second distribution capability,wherein the connection to the second distribution capability is performed securely using an authentication code, and wherein the method further comprises;
downloading into the memory a second application from the second distribution capability, wherein the second application is encapsulated in a package protected by a cryptographic protection code, and, during downloading of the second application, the protected package is sent from the second distribution capability to the computer device;
securely connecting, via the second application to a third distribution capability; and
downloading into the memory the software component from the third distribution capability,wherein, during the connection to the third distribution capability and/or the downloading of each software component, the data exchanged between the third distribution capability and the computing device are protected by cryptographic protection, andwherein security elements associated with the cryptographic protection of the data exchanged between the third distribution capability and the computing device are stored in a security container, the security container being cryptographically protected by an unlock code and the container is encapsulated in the protected package received from the second distribution capability.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for downloading at least one software component onto a computing device, and associated computer program product, computing device and computer system are disclosed. In one aspect, the method is implemented by the computer device including an information processing unit having a memory. The downloading method includes downloading to the memory of a first application from a first distribution capability and connection to a second distribution capability via the first application. The connection to the second distribution capability is performed in a secure manner using an authentication code. The downloading method further includes downloading to the memory of a second application from the second distribution capability, secure connection to a third distribution capability via the second application, and downloading to the memory of each software component from the third distribution capability.
-
Citations
14 Claims
-
1. A method for downloading at least one software component to a computing device, the method being implemented by the computing device comprising an information processing unit having a memory, the method comprising:
-
downloading into the memory a first application from a first distribution capability; and connecting via the first application to a second distribution capability, wherein the connection to the second distribution capability is performed securely using an authentication code, and wherein the method further comprises; downloading into the memory a second application from the second distribution capability, wherein the second application is encapsulated in a package protected by a cryptographic protection code, and, during downloading of the second application, the protected package is sent from the second distribution capability to the computer device; securely connecting, via the second application to a third distribution capability; and downloading into the memory the software component from the third distribution capability, wherein, during the connection to the third distribution capability and/or the downloading of each software component, the data exchanged between the third distribution capability and the computing device are protected by cryptographic protection, and wherein security elements associated with the cryptographic protection of the data exchanged between the third distribution capability and the computing device are stored in a security container, the security container being cryptographically protected by an unlock code and the container is encapsulated in the protected package received from the second distribution capability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device, comprising an information processing unit having a memory, the memory having a downloading application configured to download at least one software component, the downloading application comprising:
-
a first capability configured to download a first application into the memory from a first distribution capability, the first application being configured to connect to a second distribution capability, wherein the first application is configured to connect to the second distribution capability in a secure manner using an authentication code, and wherein the memory is configured to store; a second capability configured to download a second application into the memory from the second distribution capability, the second application being configured to connect securely to a third distribution capability, the second application being further configured to be encapsulated in a package protected by a cryptographic protection code, and, during downloading of the second application, the protected package is configured to be sent from the second distribution capability to the computer device; and a third capability configured to download each software component from the third distribution capability into the memory, wherein, during a connection to the third distribution capability and/or the downloading of each software component, the data exchanged between the third distribution capability and the computing device are configured to be protected by cryptographic protection, and wherein security elements associated with the cryptographic protection of the data exchanged between the third distribution capability and the computing device are configured to be stored in a security container, the security container being configured to be cryptographically protected by an unlock code and the container is encapsulated in the protected package received from the second distribution capability. - View Dependent Claims (11, 12, 13, 14)
-
Specification