Best practices
Although Akamai provides secure transmission and environments for a scalable, zero rate billing network, it does not guarantee end-to-end package security and integrity. It is the auto manufacturer's responsibility to guarantee the safety of all communications.
Akamai provides best practices for the following areas:
-
UID support
-
Firmware files storage
-
Efficient files distribution
-
Burst rate limiting
-
Integrity and safety checking
-
Certificates
-
Domain flexibility
The following table shows the recommendations for the proper use of UID, firmware files storage, efficient files distribution, burst rate limiting, integrity and safety checking, certificates, and domain flexibility.
Recommendation | Non-compliance Result |
---|---|
UID Support | |
To keep individual vehicle reporting consistent, the UID of an individual vehicle must remain unique and static over the course of a reporting cycle. | May result in receiving invalid or erroneous results in the reports. |
Firmware Files Storage | |
To prevent downloading a wrong or corrupted file, each firmware file must have a unique URL. To avoid collision of firmware files, you can use a naming convention. For example: my-domain://<make or head unit>/<model>/patch-name/version .If you find a corrupted firmware file at the origin, in NetStorage, or in the cache, remove and replace it with a different URL. | May result in the delivery of invalid files, excess download costs, or delayed delivery of files. |
Efficient Files Distribution | |
For efficient downloads, data and burst rates reduction, cost reduction, and contract compliance, consider the following solutions in your OTA Updates system. | May result in excess download costs and delayed delivery of files. |
Burst Rate Limiting | |
To manage the download rates of all cars within a billable region so they comply with your contract-specified burst rate, consider the following solutions in your OTA Updates system: | May significantly higher download costs. |
Integrity and Safety Checking | |
To keep communications secure between the OTA Updates system and head units, use an authentication and integrity mechanism for all data delivered over the system. Consider the following solutions in your OTA Updates system: | May result in accidental or malicious application of invalid or dangerous files. |
Certificates | |
To keep communications secure between the OTA Updates system and head units, consider the following solutions in your OTA Updates system: Note: Head units must allow for changes to both the certificates and the CA/Trusted Root certificates. | May result in long-term supportability issues. |
Domain Flexibility | |
For flexibility in removing vehicles from the OTA Updates system or shifting vehicles from the OTA Updates system to other networks, head units must be able to change the domains they use to connect to the OTA Updates system. Consider the following solutions in your OTA Updates system: | May prevent head units with older software from receiving firmware updates from the OTA Updates system. |
Updated about 3 years ago