首页>
外国专利>
TECHNIQUE FOR SECURE REMOTE CONFIGURATION OF A SYSTEM
TECHNIQUE FOR SECURE REMOTE CONFIGURATION OF A SYSTEM
展开▼
机译:系统安全远程配置的技术
展开▼
页面导航
摘要
著录项
相似文献
摘要
After a processor (133) controlled system having communications (145) capabilities is delivered to a user in its generic configuration, customization of the system is realized in accordance with the invention by downloading thereto selected information objects, e.g., software components (135) and/or data, from a server. To avoid unauthorized (145) downloading of the selected information objects, certain information in a request for the objects by the system to the server (152) is encrypted and/or cryptographically signed. Such information may be e.g., a serial number (129) identifying the system. If the server succeeds in decrypting the encrypted information and/or authenticating the digital signature, and thereby verifies the identity and legitimacy of the system (139), the server downloads the selected information objects to realize the customization.
展开▼