Device and method for protecting a security module from manipulation attempts in a field device

    公开(公告)号:US10528484B2

    公开(公告)日:2020-01-07

    申请号:US13979731

    申请日:2011-12-15

    IPC分类号: G06F11/30 G06F12/14

    摘要: A device for protecting a security module from manipulation attempts in a field device. A control device is configured to control the field device, a security module is configured to provide cryptographic key data which is to be used by the control device, and an interface device is connected to the control device. The security module is configured to allow the control device access to the cryptographic key data in the security module and to prevent access to the cryptographic key data in the event of a manipulation attempt on the field device.

    Method for the secure unindirectional transmission of signals

    公开(公告)号:US09628278B2

    公开(公告)日:2017-04-18

    申请号:US13583970

    申请日:2011-02-14

    IPC分类号: H04L29/06 H04L9/32

    摘要: A method transmits a signal using a unidirectional communications link, which is protected by an asymmetric cryptography method. A counter value is incremented by a transmitter during a transmission operation. Subsequently, a challenge is determined by the transmitter on the basis of the counter value and a control command that can be executed by a receiver and, on the basis of the challenge that is determined a response is in turn determined. The challenge and the response are transmitted from the transmitter to the receiver. The challenge received is then checked by the receiver to see whether the counter value used in the challenge is greater than a counter value previously stored by the transmitting transmitter. The response received is checked on the basis of the challenge. Following successful checking of the challenge and response, the control command transmitted in the challenge is executed.

    Method for monitoring a tamper protection and monitoring system for a field device having tamper protection
    3.
    发明授权
    Method for monitoring a tamper protection and monitoring system for a field device having tamper protection 有权
    用于监控具有防篡改的现场设备的防篡改和监控系统的方法

    公开(公告)号:US09147088B2

    公开(公告)日:2015-09-29

    申请号:US14112534

    申请日:2012-04-11

    IPC分类号: G06F21/86 G05B19/042

    摘要: The embodiments relate to tamper protection of a field device. The method includes: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result is determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; determining an active status of the field device in case the non-manipulation certificate is valid; checking the field device by querying the status of the field device; transferring field device data to the monitoring device; and accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use.

    摘要翻译: 实施例涉及现场设备的防篡改。 该方法包括:检查现场设备的操作是否发生; 在确定负检查结果的情况下输出非操作证书; 转移非操作证书; 检查非操作证书的注册设备; 在非操作证书有效的情况下确定现场设备的活动状态; 通过查询现场设备的状态来检查现场设备; 将现场设备数据传送到监控设备; 并且如果现场设备具有活动状态,则接受现场设备数据。 本发明还涉及现场设备的监视系统和用途。

    Secure Transmission of a Message
    4.
    发明申请
    Secure Transmission of a Message 有权
    安全传输消息

    公开(公告)号:US20150149779A1

    公开(公告)日:2015-05-28

    申请号:US14403907

    申请日:2013-04-24

    IPC分类号: H04L9/08 H04L9/32

    摘要: The embodiments relate to methods and apparatuses for producing secure transmission of a message. The methods are based on production of a basic key that is used for producing respective transmitter keys for a plurality of transmitters. For the ascertainment of the receiver keys by respective receivers, the basic key is transmitted to the receivers, which for their part are able to ascertain a receiver key for checking the integrity of the message from a respective transmitter on the basis of the basic key and an identifier for the transmitter. The receiver ascertains a cryptographic checksum, which, in the course of the integrity check, is compared with a cryptographic checksum that has been produced by the transmitter and sent along by the respective message. The embodiments may be used within the context of automation and sensor networks.

    摘要翻译: 实施例涉及用于产生消息的安全传输的方法和装置。 该方法基于用于产生用于多个发射机的相应发射机密钥的基本密钥的生成。 为了确定相应接收机的接收机密钥,基本密钥被发送到接收机,接收机能够基于基本密钥确定用于从相应发射机检查消息的完整性的接收机密钥,以及 发射机的标识符。 接收机确定加密校验和,其在完整性检查过程中与由发送器产生并由相应消息一起发送的加密校验和进行比较。 实施例可以在自动化和传感器网络的上下文中使用。

    METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION
    5.
    发明申请
    METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION 有权
    用于监控具有防篡护器的现场设备的夯实机保护和监控系统的方法

    公开(公告)号:US20140047568A1

    公开(公告)日:2014-02-13

    申请号:US14112534

    申请日:2012-04-11

    IPC分类号: G06F21/86

    摘要: The invention relates to a method for monitoring a tamper protection of a field device, comprising the steps of: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result was determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; the registration device determining an active status of the field device in case the non-manipulation certificate is valid; a monitoring device checking the field device by querying the status of the field device and transferring field device data to the monitoring device; the monitoring device accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use.

    摘要翻译: 本发明涉及一种用于监控现场设备的防篡改的方法,包括以下步骤:检查现场设备的操纵是否发生; 在确定负检查结果的情况下输出非操作证明; 转移非操作证书; 检查非操作证书的注册设备; 注册装置在非操作证书有效的情况下确定现场设备的活动状态; 监视设备,通过查询现场设备的状态并将现场设备数据传送到监控设备来检查现场设备; 如果现场设备具有活动状态,则监视设备接受现场设备数据。 本发明还涉及现场设备的监视系统和用途。

    ELECTRONIC KEY FOR AUTHENTICATION
    7.
    发明申请
    ELECTRONIC KEY FOR AUTHENTICATION 有权
    用于认证的电子钥匙

    公开(公告)号:US20120066741A1

    公开(公告)日:2012-03-15

    申请号:US13320483

    申请日:2010-03-19

    IPC分类号: H04L9/32

    CPC分类号: G07F7/125 G06Q20/341 G07F7/10

    摘要: An electronic key supports a plurality of authentication methods and effectively prevents bidding-down attacks. For this purpose, security information is additionally provided by the electronic key, based on which a card reading device recognizes which authentication methods are supported by the electronic key. When the reading device recognizes based on said information that the electronic key supports a stronger second authentication method, but the authentication method was not recognized by the card reading device, the electronic key is, for example, rejected.

    摘要翻译: 电子钥匙支持多种认证方式,有效地防止出价下降攻击。 为此,通过电子钥匙另外提供安全信息,读卡装置基于该密钥识别电子钥匙支持哪种认证方法。 当读取装置基于所述信息识别出电子密钥支持更强的第二认证方法,但认证方法未被读卡装置识别时,电子密钥例如被拒绝。

    Method for certificate-based authentication
    8.
    发明授权
    Method for certificate-based authentication 有权
    基于证书的认证方法

    公开(公告)号:US09544298B2

    公开(公告)日:2017-01-10

    申请号:US13821511

    申请日:2011-07-22

    摘要: A first subscriber authenticates himself to a second subscriber with a certificate associated to the first subscriber. The certificate specifies one or several characteristics, which have to be fulfilled by the second subscriber. In the course of the authentication, it is verified using the certificate whether the second subscriber fulfills the characteristics, wherein a criterion required for successful authentication is that the second subscriber fulfills the characteristics(s). Characteristics of the second subscriber are verified in the framework of the authentication process, the second subscriber representing the authenticator with respect to whom the authentication is carried out. In this way, certificates for authentication dedicated communication links between two communication partners can be determined. The method can be used for any subscribers in a communication network, e.g., representing components of an automation system, such as, for example, control devices, field devices, sensors, actuators and the like.

    摘要翻译: 第一用户向具有与第一用户相关联的证书的第二用户认证自己。 证书指定一个或几个特性,这些特性必须由第二个用户来实现。 在认证过程中,使用证书验证第二用户是否满足特征,其中成功认证所需的准则是第二用户满足特征。 在认证过程的框架中验证第二用户的特性,第二用户表示认证者对其进行认证。 以这种方式,可以确定两个通信伙伴之间的认证专用通信链路的证书。 该方法可以用于通信网络中的任何用户,例如表示自动化系统的组件,例如控制设备,现场设备,传感器,致动器等。