US 11,057,240 B2
Method and process for securing an executable image
Richard Joseph Skertic, Carmel, IN (US); and John Joseph Costello, Indianapolis, IN (US)
Assigned to ROLLS-ROYCE NORTH AMERICAN TECHNOLOGIES INC., Indianapolis, IN (US); and ROLLS-ROYCE CORPORATION, Indianapolis, IN (US)
Filed by Rolls-Royce North American Technologies Inc., Indianapolis, IN (US); and Rolls-Royce Corporation, Indianapolis, IN (US)
Filed on Feb. 22, 2019, as Appl. No. 16/283,644.
Claims priority of provisional application 62/782,984, filed on Dec. 20, 2018.
Claims priority of provisional application 62/785,601, filed on Dec. 27, 2018.
Claims priority of provisional application 62/783,017, filed on Dec. 20, 2018.
Prior Publication US 2020/0201779 A1, Jun. 25, 2020
Int. Cl. G06F 12/1018 (2016.01); G06F 21/12 (2013.01); G06F 16/182 (2019.01); G06F 21/57 (2013.01); H04L 9/06 (2006.01); H04L 12/437 (2006.01); G05B 19/042 (2006.01); H04L 9/00 (2006.01); G06F 16/23 (2019.01); B64D 31/06 (2006.01); F02C 7/26 (2006.01); H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04L 29/06 (2006.01)
CPC H04L 12/437 (2013.01) [B64D 31/06 (2013.01); F02C 7/26 (2013.01); G05B 19/0425 (2013.01); G06F 12/1018 (2013.01); G06F 16/182 (2019.01); G06F 16/2379 (2019.01); G06F 21/125 (2013.01); G06F 21/575 (2013.01); H04L 9/006 (2013.01); H04L 9/0618 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/0825 (2013.01); H04L 9/3242 (2013.01); H04L 9/3263 (2013.01); H04L 63/0435 (2013.01); H04L 63/062 (2013.01); H04L 63/0823 (2013.01); H04L 63/123 (2013.01); H04L 2209/38 (2013.01); H04L 2463/062 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method for securely loading software in a power control system, comprising:
dividing the software into n images;
generating n control hashes, each control hash a function of the nth image and a hash of the n−1 image;
recording the n control hashes in a distributed ledger;
storing each of the n images in a corresponding n security modules;
loading an i−1 image of the n images from an i−1 security module of the n security modules into a random access memory (RAM) of the power control system, where i is less than or equal to n;
loading an ith image of the n images from an ith security module into the RAM of the power control system;
generating an ith hash as a function of the ith stored image in the ith security module and a hash of the n−1 image stored in the i−1 security module;
comparing the ith hash to the ith control hash; and
flagging the ith image stored in the ith security module based upon the comparison.