Method for validating a digital user certificate

    公开(公告)号:US11764975B2

    公开(公告)日:2023-09-19

    申请号:US17421028

    申请日:2019-12-11

    IPC分类号: H04L29/06 H04L9/32

    CPC分类号: H04L9/3263 H04L9/3247

    摘要: A method for validating a digital user certificate of a user by a checking device is provided. The user certificate is protected by a digital signature with an issuer key of an issuance location which issues the user certificate. The method has the steps of: receiving the user certificate in the checking device, checking the user certificate using a certificate path positive list with at least one valid certificate path which is provided to the checking device by at least one positive path server, and confirming the validity of the user certificate if the issuer key of the user certificate can be traced back to a root certificate according to one of the valid certificate paths of the certificate path positive list. Also provided is a system, a checking device, a user device, a positive path server, and a computer program product which are designed to carry out the method for validating a digital user certificate.

    Method and devices for providing at least one service, in particular in the automotive environment

    公开(公告)号:US11658943B2

    公开(公告)日:2023-05-23

    申请号:US16463039

    申请日:2017-10-09

    摘要: Provided is a detection device which is suitable for receiving a service within a network assembly, having the following:—means for providing cryptographic security at or above the transport level of the communication protocol levels which can be used in the network assembly for at least one first existing communication connection between the detection device and a network access device which is arranged in the network assembly and which can be used to monitor data detected by the detection device and/or control an additional device within the network assembly using the data detected by the detection device,—means for generating and/or determining network access configuration data for at least one additional second communication connection, which is to be cryptographically secured below the transport level, between the detection device and the network access device,—means for providing the generated and/or determined network access configuration data to the network access device.

    Securing an item of device use information of a device

    公开(公告)号:US11658825B2

    公开(公告)日:2023-05-23

    申请号:US16326782

    申请日:2017-07-04

    发明人: Rainer Falk

    IPC分类号: H04L29/06 H04L9/32 H04L9/00

    摘要: Provided is a method for securing an item of device use information of a device, having the following steps: —determining the item of device use information; —generating transaction data depending on the item of device use information; —generating a blockchain data structure which is based on a cryptocurrency and includes the transaction data or a checksum of the transaction data; —sending the generated blockchain data structure to at least one blockchain node. The item of device use information of a device according to the described method is change-protected by a decentralized security structure. Thanks to the distributed blockchain database, the item of device use information of the device cannot be manipulated subsequently. The use of the decentralized blockchain technology also advantageously means that no central trusted point or party is necessary.

    Method and apparatus for erasing security-relevant information in a device

    公开(公告)号:US11556660B2

    公开(公告)日:2023-01-17

    申请号:US16096706

    申请日:2017-04-13

    发明人: Rainer Falk

    摘要: Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.

    Secure processing of an authorization verification request

    公开(公告)号:US11456879B2

    公开(公告)日:2022-09-27

    申请号:US16327213

    申请日:2017-07-04

    发明人: Rainer Falk

    摘要: Provided is a method for secure processing of an authorization verification request from a unit requesting authorization verification, the authorization verification request being included in a transaction of a block chain, wherein a registration entity performs a check on a block chain data structure and on the transaction protected by the block chain and, in the event of a successful check, forwards the authorization verification request to a certification entity. The authorization verification request is included in a transaction and the registration entity performs a check on a block chain data structure and on the transaction. The transaction and the authorization verification request are protected by the block chain. In particular, the authorization verification request can no longer be altered retrospectively and information that has been transmitted to the registration entity within the context of the authorization verification request is stored in the block chain and protected against manipulation.

    Apparatus and method for operating a software-configured processing unit for a device

    公开(公告)号:US11334689B2

    公开(公告)日:2022-05-17

    申请号:US16507507

    申请日:2019-07-10

    发明人: Rainer Falk

    IPC分类号: G06F21/76

    摘要: Provided is an apparatus (TFDC) for operating a software-configured processing unit (SDS) for a device, in particular a field device (TFD), wherein the apparatus, according to a prescribed and/or prescribable architecture, includes at least one processor (CPU) and a number of hardware units, having: a security unit (IOS; MS) configured to cause a change in the arrangement of the data bit sequence of at least one data stream provided and/or routed to the processing unit (SDS) to protect the hardware units from manipulation. The processing unit is trustworthy, i.e., is protected from manipulation and attack from the outside. The data stream arrives at the device. A “number” here and above denotes a number of one or more.