Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and systems for securely transferring embedded code and/or data designed for device to customer

A data security and equipment technology, applied in digital transmission systems, transmission systems, computer security devices, etc., can solve problems such as increasing code size and intrusion

Active Publication Date: 2014-06-11
INFINEON TECH AG
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in addition to increasing the code size, this scheme can still be reasonably hacked by using dummy code instead of trap routines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for securely transferring embedded code and/or data designed for device to customer
  • Methods and systems for securely transferring embedded code and/or data designed for device to customer
  • Methods and systems for securely transferring embedded code and/or data designed for device to customer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or other changes may be made without departing from the scope of the present invention. Accordingly, the following detailed description should not be taken in a limiting sense, and the scope of the invention is defined by the appended claims.

[0013] figure 1 A simplified schematic diagram of an example environment is shown in which a system according to an embodiment of the invention may be implemented. Device 17 is produced by a manufacturer (eg, a semiconductor manufacturer) at the manufacturer's location (eg, semiconductor factory 11 ), sold to customers, and delivered to customer location 13 . Furthermore, in this example may be a supplier of the software producer 12, pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to methods and systems for securely transferring embedded code or data to a customer, in particular to methods and systems for securely transferring embedded code, data files or program files designed for a device to a customer in order to prevent the embedded code, data files or program files from being used on unauthorized devices.

Description

technical field [0001] The present invention relates to methods and systems for the secure transfer of embedded code and / or data to customers, in particular for the secure transfer of embedded code, data files and / or program files designed for devices to prevent embedded code, Method and system for data file and / or program file use on unauthorized devices. Background technique [0002] Manufacturers of various devices, such as semiconductor manufacturers, for example, sell their devices, such as integrated circuit components, to eg different customers. A dedicated supplier provides embedded code or data for the corresponding device to configure and / or customize the corresponding device according to the customer's requirements and needs. The customer can then program the device purchased from the manufacturer at its location with embedded code or data obtained from the supplier. [0003] Such transmission of embedded code or data involves several piracy risks. Embedded cod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14G06F21/10
CPCG06F12/1408G06F21/57G06F2221/2107G06F21/575H04L9/0822H04L9/0894G06F2221/034
Inventor M.W.洪G.迪尔舍尔A.拉本斯坦
Owner INFINEON TECH AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products