Texas Instruments Incorporated
CONTROLLED SCOPE OF AUTHENTICATION KEY FOR SOFTWARE UPDATE
Last updated:
Abstract:
Techniques for updating a client device are provided that include receiving, by a client device, a software update and a certificate associated with the software update, verifying, by the client device, the certificate associated with the software update based on a stored public key of the client device, extracting an update scope value from the certificate, comparing the update scope value against a corresponding attribute of the update, and either applying the software update based on the comparing, or rejecting the software update based on the comparing.
Status:
Application
Type:
Utility
Filling date:
14 May 2020
Issue date:
18 Nov 2021