摘要:
A method and network node device control the run of technology specific Push-Button Configuration sessions within a heterogeneous or homogeneous wireless network as well as a heterogeneous or homogeneous wireless network detecting a session overlap within the network. The session is related to a configuration session (bootstrapping session, setup session) that establishes a security configuration for encrypted communication over a wireless link it is proposed an enhanced mechanism for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network by using a piece of information, e.g. a “Configuration Setup Session Identifier (CSSID),” for identifying a technology specific Push Button Configuration setup session.
摘要:
The invention relates to a circuit unit (1) comprising a Physical Unclonable Function (6), hereinafter referred to as PUF (6), a verification unit (5) and an information storage device (7) for storing at least one Challenge-Response-Pair (CR1); wherein the Challenge-Response-Pair (CR1) comprises a Challenge Information (C1) and a Response Information (R1) associated therewith, and wherein the verification unit (5) is embodied and/or adapted, in order to bring about an input of the challenge information (C1) into the PUF (6) and to use a PUF Response (PR1) created thereafter by the PUF (6) and the Response Information for a comparison, and in dependence of the result of the comparison release or restrict a use of the PUF (6).
摘要:
Overlapping Push Button Configuration (PBC) sessions are prevented without any deadlocks of technology specific PBC methods by controlling the run of technology specific PBC sessions within a heterogeneous network of network node devices interconnected via at least one I interface and/or over multiple hops and authenticated for the network, by enabling a two-level PBC within the heterogeneous network based on a network node device of the network node devices being authenticated for the network as registrar, which is especially selectable or determined. Level-1 of the two-level PBC performed at the abstraction layer of the heterogeneous network accomplishes the detection of the wish for PBC, prevention of overlapping PBC sessions independent of underlying communication technology, coordination of technology-specific PBC runs, whereas in level-2 of the two-level PBC performed within a technology-specific communication technology a technology-specific PBC is used, which is triggered by the level-1.
摘要:
A method of onboarding a user device onto an industrial network includes receiving a registration request from the user device. The user device is connected to a gateway device associated with a first wireless network. The registration request includes one or more network access parameters associated with the user device. At least one network access parameter from the network access parameters is indicative of the gateway device and/or the first wireless network. The method includes authenticating the user device based on the received registration request. Authenticating includes verifying validity of network access parameters of the registration request. The method allows for utilization of network access data to evaluate if the user device is indeed an actual user device or an unauthorized device. Accordingly, an overall security associated with the onboarding process is improved.
摘要:
Various teachings of the present disclosure include methods for providing cryptographic keys for signing data. The method may include: providing a plurality of keys as leaves of a hash tree structure having at least one first hash tree; evaluating a requirement criterion for a requirement for additional keys and, if the requirement criterion is satisfied, generating a plurality of additional keys available as leaves of a further hash tree; and integrating the further hash tree into the hash tree structure so a respective root of the further hash tree is signed with a leaf of the hash tree structure. A number of hash trees of the hash tree structure is not predetermined.
摘要:
Provided is a device unit, including a module, which can configure the device unit with an operating state from among different operating states during the start-up process and/or during ongoing operation of the device unit, wherein a first protected operating state of the different operating states is designed to allow the execution of at least one operating process which can be predefined and to optionally protect the operating process by means of defined cryptographic means, wherein at least one second operating state of the different operating states is designed to deactivate the first protected operating state and to allow at least one other changeable operating process and to optionally protect the operating process by means of specifiable cryptographic means.
摘要:
The invention relates to a computer-implemented method for connecting a network component to a network, in particular a mobile communications network, with an extended network access identifier. The method involves a receiving of the extended network access identifier from the network component via a network access server, wherein the extended network access identifier comprises at least one network access restriction for connecting the network component to the network. The method also involves a receiving of a requested user access profile from a user profile server via the network access server, wherein the user access profile comprises access authorisations for connecting the network component to the network. The network component is authenticated in the network via the network access server, if the received extended network access identifier fulfills thre access authorisations of the received user access profile. Then the network connection of the network component to the network via the network access server is configured by means of the access authorisations of the user access profile once the network component is authenticated. There is also a determining of the network restriction received with the extended network access identifier via the network access server, and a verifying of the configured network connection of the network component to the network via the network access server based on the determined network access restriction. Then the network component is connected to the network via the network access server, once the configured network connection is verified and the configured network connection fulfills the determined network access restrictions.
摘要:
Various embodiments of the teachings herein include a configuration device for determining an update configuration for a software update for a technical installation. The device may include: a module to acquire operating parameters of a production process of a technical installation, including configuration parameters of the technical installation; a module to load software updates for one or more elements of the technical installation; a module to use the operating parameters and the software updates as a basis for determining an update configuration for the software updates; and a module to transfer the update configuration and/or the software updates to an update server. The update server controls and/or monitors and/or records the software update of the one or more elements of the technical installation on the basis of the update configuration.
摘要:
Provided is a method for producing a product by a machine tool, wherein the control information and/or production data of a machine tool, such as a milling machine, injection molding machine, welding robot, laser cutter or 3D printer, is protected or cryptographically encrypted such that unauthorized copying or modifying is prevented, including the steps: producing product by the machine tool taking into consideration control information which controls the production of the product; generating production data by the machine tool during production of the product, wherein the production data describes the production of the product; providing protection information to the machine tool, which indicates which of the production data is to be protected, and defines a protection method for the production data which is protected; and protecting that production data which, according to the protection information, is to be protected, by the protection method defined by the protection information.
摘要:
An object of the disclosure is to simplify security enhancements based on trusted computing. For this, a first data processing apparatus configured to operate in accordance with one or more platform configuration is provided. The first data processing apparatus includes an attestation processor, a network interface, and a data storage device for storing validation data. The attestation processor is configured to establish attestation data that is indicative of a current platform configuration. The validation data facilitates a validity check of integrity data, which includes the attestation data. The first data processing apparatus is configured to provide the integrity and validation data.