Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and security module for providing a security function for a device

A security module and security function technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as complex update of trust anchors, and achieve the effect of low cost

Inactive Publication Date: 2018-08-03
SIEMENS AG
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This means: trust anchors can only be complexly updated in response to changes in security standards, for example

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and security module for providing a security function for a device
  • Method and security module for providing a security function for a device
  • Method and security module for providing a security function for a device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] figure 1 is a flowchart of a first embodiment of the disclosed method 100 .

[0076] The method 100 can provide security functions, such as cryptographic functions, for devices, such as measuring devices for high-frequency technology, measuring devices, control devices, receiving devices of satellite communication stations or field devices of power plants.

[0077] In order to provide the security function, for example a security module is installed in the device or is a subassembly of the device, wherein the security module in particular performs several, preferably all, of the subsequent method steps.

[0078] In a first method step, a request for executing a safety function is received, for example via a communication interface. The security function can be, for example, a cryptographic function which provides, inter alia, a cryptographic key, a digital certificate or a cryptographic function. The cryptographic function can, for example, implement a cryptographic m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and a security module for providing a security function for a device are disclosed. The invention relates to a method (100) for providing a security function, in particular a cryptographic function, for a device (600), wherein the following method steps are carried out: receiving (110) a request to execute the security function; loading (120) a security application (214, 216, 316) for thesecurity function via a control application (232), wherein the control application (232) is stored on a first internal memory (520) of a security module (500) and the security application (214, 216,316) is transferred from a memory which is external to the security module; checking (130) an integrity of the security application (214, 216, 316) by means of security information; executing (140) the security application (214, 216, 316) and providing the security function, wherein the execution and provision steps are carried out after the successful integrity checking step (130).

Description

technical field [0001] The invention relates to a method and a security module for password protection of a device. Background technique [0002] Devices such as embedded systems can currently be found in all branches of industry. The (password) protection of these devices is playing an increasingly important role in order to be able to guarantee safe operation. Objectives such as integrity, confidentiality or authenticity of these platforms can be achieved through cryptographic functions. Intentional targeted attacks are thereby prevented. [0003] One possibility for securing embedded systems is the integration of hardware-based trust anchors. This trust anchor can perform a variety of tasks, such as security functions that can provide cryptographic keys to secure applications at runtime, create and verify integrity checks for application and configuration data, sign data, and provide cryptographically strong random numbers ,etc. [0004] In many cases, a trust anchor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/51G06F21/57G06F21/64
CPCG06F21/44G06F21/57G06F21/64G06F21/51G06F21/74H04L63/0884H04L63/123
Inventor R.法尔克S.弗里斯M.海因特尔D.默利S.皮卡
Owner SIEMENS AG