Methods and systems for securely uploading files onto aircraft
First Claim
1. A system for verifying integrity of files uplinked to a remote vehicle, the system comprising:
- a communication system onboard the remote vehicle, the communication system configured to receive an uplinked file;
at least one processor onboard the remote vehicle coupled to the communication system; and
at least one storage device coupled to the at least one processor, the at least one storage device including processor executable instructions which, when executed by the at least one processor, implement data checking functionality to;
receive a first message authentication code for the uplinked file, a first acknowledgement message authentication code for the message authentication code, and a first cyclic redundancy check for the first message authentication code and the acknowledgement message authentication code;
compute a second message authentication code from the uplinked file by deriving a value from a first keyed hash function on the uplinked file and a first secret key, a second acknowledgement message authentication code from the second message authentication code by deriving a value from one of the first keyed hash function or another keyed hash function on the message authentication code and one of the first secret key or another secret key, and a second cyclic redundancy check from the second message authentication code and second acknowledgement message authentication code;
verify integrity of the uplinked file by comparing the first cyclic redundancy check with the second cyclic redundancy check;
if integrity of the uplinked file is confirmed, accept the uplinked file; and
if integrity of the uplinked file is not confirmed, reject the uplinked file.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments described herein provide for a system for verifying integrity of files uplinked to a remote vehicle. The system is configured to receive a first message authentication code (MAC) for the uplinked file, a first acknowledgement MAC for the MAC, and a first cyclic redundancy check (CRC) for the first MAC and the acknowledgement MAC. The system is also configured to compute a second MAC from the uplinked file, a second acknowledgement MAC from the second MAC and a second CRC from the second MAC and second acknowledgement MAC. Integrity of the uplinked file is verified by comparing the first CRC with the second CRC. If integrity of the uplinked file is confirmed, the uplinked file is accepted. If integrity of the uplinked file is not confirmed, the uplinked file is rejected.
10 Citations
9 Claims
-
1. A system for verifying integrity of files uplinked to a remote vehicle, the system comprising:
-
a communication system onboard the remote vehicle, the communication system configured to receive an uplinked file; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device coupled to the at least one processor, the at least one storage device including processor executable instructions which, when executed by the at least one processor, implement data checking functionality to; receive a first message authentication code for the uplinked file, a first acknowledgement message authentication code for the message authentication code, and a first cyclic redundancy check for the first message authentication code and the acknowledgement message authentication code; compute a second message authentication code from the uplinked file by deriving a value from a first keyed hash function on the uplinked file and a first secret key, a second acknowledgement message authentication code from the second message authentication code by deriving a value from one of the first keyed hash function or another keyed hash function on the message authentication code and one of the first secret key or another secret key, and a second cyclic redundancy check from the second message authentication code and second acknowledgement message authentication code; verify integrity of the uplinked file by comparing the first cyclic redundancy check with the second cyclic redundancy check; if integrity of the uplinked file is confirmed, accept the uplinked file; and if integrity of the uplinked file is not confirmed, reject the uplinked file. - View Dependent Claims (2, 3)
-
-
4. A system for verifying integrity of files uplinked to a remote vehicle, the system comprising:
-
a communication system onboard the remote vehicle, the communication system configured to receive an uplinked file; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device coupled to the at least one processor, the at least one storage device including processor executable instructions which, when executed by the at least one processor, implement data checking functionality to; receive a first message authentication code for the uplinked file, a first acknowledgement message authentication code for the message authentication code, and a first cyclic redundancy check for the first message authentication code and the acknowledgement message authentication code; compute a second message authentication code from the uplinked file by deriving a value from a first keyed hash function on the uplinked file and a first secret key, a second acknowledgement message authentication code from the second message authentication code by deriving a value from one of the first keyed hash function or another keyed hash function on the message authentication code and one of the first secret key or another secret key, and a second cyclic redundancy check from the second message authentication code and second acknowledgement message authentication code; verify integrity of the uplinked file by comparing the second acknowledgement message authentication code against the first acknowledgement message authentication code; if integrity of the uplinked file is confirmed, accept the uplinked file; and if integrity of the uplinked file is not confirmed, reject the uplinked file. - View Dependent Claims (5, 6)
-
-
7. A system for transmitting files to a remote vehicle, the system comprising:
-
a communication system at a ground unit; at least one processor coupled to the communication system; and at least one storage device coupled to the at least one processor, the at least one storage device including processor executable instructions which, when executed by the at least one processor, cause the at least one processor to; obtain a file for transmittal from the ground unit to a remote vehicle; calculate a message authentication code from the file by deriving a value from a first keyed hash function on the uplinked file and a first secret key, an acknowledgement message authentication code for the message authentication code by deriving a value from one of the first keyed hash function or another keyed hash function on the message authentication code and one of the first secret key or another secret key, and a cyclic redundancy check for the message authentication code and the acknowledgement message authentication code; uplink the file for transmittal to the remote vehicle; and uplink the message authentication code, acknowledgement message authentication code for the message authentication code, and the cyclic redundancy check for the message authentication code and the acknowledgement message authentication code with the file for transmittal to the remote vehicle. - View Dependent Claims (8, 9)
-
Specification