-
公开(公告)号:US11683341B2
公开(公告)日:2023-06-20
申请号:US16723861
申请日:2019-12-20
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Stefan Gehrer , Shalabh Jain , Saraswathy Ramanathapuram Vancheeswaran , Timo Lothspeich
CPC classification number: H04L63/1475 , G06F8/65 , G06F8/71
Abstract: A system includes a memory and a processor in communication with the memory. The processor is programmed to receive a runtime measurement from a sensor regarding the physical attribute of at least the separate processor during runtime; compare the runtime measurement of the physical attribute to a fingerprint that includes a baseline measurement of a physical attribute of at least a separate processor during an evaluation period of the system, and in response to the measurement exceeding a threshold, executing a countermeasure operation against software ran by the separate processor.
-
公开(公告)号:US11550904B2
公开(公告)日:2023-01-10
申请号:US17002259
申请日:2020-08-25
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Stefan Gehrer , Benjamin Hettwer , Samarjit Das
Abstract: A system includes memory, a processor in communication with the memory. The processor is programmed to define a fingerprint that includes a baseline measurement of a physical attribute of at least a separate processor during an enrollment period of the system, wherein the enrollment period includes measuring the physical attribute of the processor prior to runtime operation, receiving a runtime measurement from a sensor regarding the physical attribute of at least the separate processor during runtime, comparing the runtime measurement of the physical attribute to the fingerprint, and outputting a multi-dimensional domain image in response to the runtime measurement.
-
公开(公告)号:US11251957B2
公开(公告)日:2022-02-15
申请号:US16313221
申请日:2017-06-28
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Paulius Duplys , Rene Guillaume , Jeffrey Donne
IPC: H04L9/32 , H04W4/70 , H04L29/06 , H04W12/06 , H04L9/08 , H04W12/50 , H04L12/44 , G06F21/00 , H04L67/12
Abstract: A star topology network comprises a user device, a central gateway, and one or more sensor nodes added to the existing network. A communication between the user device and the central gateway is secured either based on public-key cryptography, symmetric-key cryptography, or by the use of a secure channel such as a wired communication. A request from the user device to the central gateway can be transmitted over the internet.
-
公开(公告)号:US11165594B2
公开(公告)日:2021-11-02
申请号:US16320769
申请日:2017-12-27
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Paulius Duplys , Christopher Huth
Abstract: A method and system for authenticating a first device is disclosed. The method includes the steps of: measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being provided by one of the processor of the first device and a further physical component of the first device; deriving a shared secret bit string from a uniformly distributed random vector; encoding a helper bit string by multiplying a uniformly distributed random matrix with the uniformly distributed random vector and adding the first response bit string to a result of the multiplication; and transmitting the helper bit string to a second device that is remote from the first device.
-
公开(公告)号:US11146410B2
公开(公告)日:2021-10-12
申请号:US16474436
申请日:2017-12-27
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Paulius Duplys , Christopher Huth
Abstract: A method for authenticating a first device is disclosed. In one embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise.
-
公开(公告)号:US11144663B2
公开(公告)日:2021-10-12
申请号:US16474712
申请日:2017-12-28
Applicant: Robert Bosch GmbH
Inventor: Attila Yavuz , Jorge Guajardo Merchan , Thang Hoang
Abstract: An oblivious encrypted search and update method includes transmitting encrypted search queries and encrypted file update requests from a trusted client to at least two different untrusted servers, receiving encrypted search entries and encrypted file entries from the untrusted servers, and decrypting the encrypted search entries and encrypted file entries with the trusted client. The trusted client re-encrypts the decrypted entries and transmits re-encrypted entries that were received from a first untrusted server to a second untrusted server and vice versa to provide obliviousness for encrypted keyword searches and encrypted file updates from the trusted client.
-
公开(公告)号:US10956356B1
公开(公告)日:2021-03-23
申请号:US16698683
申请日:2019-11-27
Applicant: Robert Bosch GmbH
Inventor: Sekar Kulandaivel , Shalabh Jain , Jorge Guajardo Merchan
Abstract: A computer system for performing control of an electronic control unit (ECU) having a processor for executing computer-readable instructions and a memory for maintaining the computer-executable instructions, the computer-executable instructions when executed by the processor perform the following functions by a processor. The functions include configuring a communication controller to while operating in a secure mode, transiting to an unsecure mode, executing a program in the unsecure mode that utilizes the communication controller; and in response to detecting a clock off request while a transmit buffer of the communication controller is not empty, inhibiting the clock off request until the transmit buffer is empty.
-
8.
公开(公告)号:US20190229916A1
公开(公告)日:2019-07-25
申请号:US16313221
申请日:2017-06-28
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Paulius Duplys , Rene Guillaume , Jeffrey Donne
Abstract: A star topology network comprises a user device, a 200 central gateway, and one or more sensor nodes added to the existing network. A communication between the user device and the central gateway is secured either based on public-key cryptography, symmetric-key cryptography, or by the use of a secure channel such as a wired communication. A request from the user device to the central gateway can be transmitted over the internet.
-
公开(公告)号:US20170083737A1
公开(公告)日:2017-03-23
申请号:US15267456
申请日:2016-09-16
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan
IPC: G06K9/00
CPC classification number: G06K9/0004 , B65D5/4212 , B65D5/422 , B65D5/4225 , B65D2203/00 , G06K9/00087 , G06K9/00577 , G06K9/18 , G06K9/3233 , G06K2009/0059
Abstract: A package includes a fingerprint panel having a fingerprint area configured for a diffuse transmission of light. An illumination side of the fingerprint area is configured to be directly illuminated with light from a light source. An opposite imaging side of the fingerprint area is configured to be directly imaged with an imaging device. The fingerprint area includes features that represent an identity of the package.
-
公开(公告)号:US20240330459A1
公开(公告)日:2024-10-03
申请号:US18194045
申请日:2023-03-31
Applicant: Robert Bosch GmbH
Inventor: Jorge Guajardo Merchan , Shalabh Jain , Pradeeep Pappachan , Stefan Gehrer , Christoph Peylo , Philipp Schott , Christopher Martin
CPC classification number: G06F21/566 , G06F21/556 , G06F21/568
Abstract: The present disclosure includes descriptions of methods and systems for executing a countermeasure against executed ransomware and for extracting an encryption key used by the ransomware. Embodiments disclosed herein comprise analyzing power consumption data of one or more processors executing the ransomware.
-
-
-
-
-
-
-
-
-