Process for the protection of stored program controls from...

Data processing: generic control systems or specific application – Generic control system – apparatus or process – Having preparation of program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C700S087000, C700S088000, C700S021000, C700S023000, C711S163000, C711S167000, C711S173000, C713S167000, C713S152000, C713S152000, C380S240000, C380S241000, C380S242000, C703S026000, C703S027000, C340S005740, C340S005800

Reexamination Certificate

active

06438432

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to a method for protecting stored-program control systems from being overwritten.
BACKGROUND INFORMATION
Methods for protecting stored-program control systems, which are preferably used in motor vehicles, are already known. In German Patent No. 43 44 866 a control device, in particular a motor vehicle control device, is programmed via an external programming device. In order to prevent unintentional programming, an inquiry must be made by the control device to the external programming device. The inquiry is accomplished via a means which can detect a signal to authorize programming if the external programming device is connected with its serial transmission line to the control device. After this security inquiry, programming of the control device is accomplished into a programmable nonvolatile memory of the control device, via the serial interface. This conventional method represents a purely hardware-based programming protection system. The purely hardware based protection system for the programmable memory requires the use of various electronic components in the control device, which are capable of detecting connection of the data transmission line on a hardware basis. This implies additional physical complexity for the control device.
Also, simple software security systems, which generally invoked by the programming device or tester, are conventional. With purely software-based security systems, there is always the risk that a skip in the program routine will cause authorization for programming to be granted incorrectly.
SUMMARY OF THE INVENTION
The method according to the present invention has the advantage that unintentional programming of the program memory cannot occur, since the programming routine contains additional security inquiries which check for authorization before execution of each programming segment. It is particularly advantageous if the programming routines that are stored in the control device are structured in the form of modules. As a result, unintentional deletion and writing of new data into the programmable memory is no longer possible, since the program cannot be activated even by an unintentional jump to an arbitrary position.
It is also advantageous to assemble the program routine from instruction sequences. When the instruction sequence is executed, authorization is also checked after each instruction.
It is advantageous in this context to store authorization flags in a RAM (random access memory). Advantageously, the authorization is performed not simply by storing once, but by repeatedly storing the authorization flag in the RAM in redundant fashion, and further programming can be accomplished only after checking multiple authorization flags.
A further advantageous embodiment is represented by storage of the authorization in the form of specific RAM address contents, whereby the program routine checks the contents of the addresses. It is also possible to generate the authorization as a combination of registers and data transferred from the programming device.
It is further advantageous, for authorization of the programming routine, for signals to be sent by the external programming device, which causes flags to be set in the programming routine.
This authorization can be implemented by the external programming device as a one-time transfer of the authorization signals, so that the authorizations are accessed in memory during programming.
Also advantageous, however, is a variant which queries the authorization from the programming device between the


REFERENCES:
patent: 4494114 (1985-01-01), Kaish
patent: 4667176 (1987-05-01), Matsuda
patent: 4897630 (1990-01-01), Nykerk
patent: 5107427 (1992-04-01), Peter et al.
patent: 5146215 (1992-09-01), Drori
patent: 5451822 (1995-09-01), Bechtel et al.
patent: 5646938 (1997-07-01), Wagener
patent: 5694011 (1997-12-01), Corey et al.
patent: 5724951 (1998-03-01), Mukumoto
patent: 5844517 (1998-12-01), Lambropoulos
patent: RE36181 (1999-04-01), Koopman, Jr. et al.
patent: 5970251 (1999-10-01), Zimmermann et al.
patent: 6243837 (2001-06-01), Zimmermann et al.
patent: 43 44 866 (1995-07-01), None
patent: 0 169 913 (1986-02-01), None
patent: 0 455 174 (1991-11-01), None
patent: 0 587 936 (1994-03-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Process for the protection of stored program controls from... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Process for the protection of stored program controls from..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Process for the protection of stored program controls from... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2888789

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.