System and method for authorizing transfer of software into embedded systems
First Claim
1. A method of authorizing transfer of software into an embedded system, comprising the steps of:
- obtaining a hardware identification code (HWID) relating to one of a service/recalibration tool and an embedded system, obtaining a software identification code (SWID) relating to at least a portion of software information not yet resident within, and to be downloaded into, the embedded system, creating a password as a function of the HWID and the SWID, and downloading a password-protected portion of the software information into the embedded system based on the password.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authorizing transfer of software into an embedded system, comprising the steps of obtaining a hardware identification code (HWID) relating to one of a service/recalibration tool and an embedded system, obtaining a software identification code (SWID) relating to at least a portion of software information that is not resident in the embedded system but is to be downloaded into the embedded system, creating a password as a function of the HWID and the SWID, and downloading a password-protected portion of the software information from the service/recalibration tool into the embedded system based on the password.
52 Citations
20 Claims
-
1. A method of authorizing transfer of software into an embedded system, comprising the steps of:
-
obtaining a hardware identification code (HWID) relating to one of a service/recalibration tool and an embedded system, obtaining a software identification code (SWID) relating to at least a portion of software information not yet resident within, and to be downloaded into, the embedded system, creating a password as a function of the HWID and the SWID, and downloading a password-protected portion of the software information into the embedded system based on the password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of authorizing transfer of software into an embedded system, comprising the steps of:
-
providing a first identifier relating to software transferring hardware and a second identifier relating to software information that is not yet resident within, and is to be downloaded into, an embedded system to a provider of the software information, the software provider creating a password as a function of the first and second identifiers, and downloading a password-protected portion of the software information into the embedded system based on the password. - View Dependent Claims (17, 18, 19, 20)
-
Specification