-
公开(公告)号:US20210089007A1
公开(公告)日:2021-03-25
申请号:US16633781
申请日:2018-05-15
发明人: Hans Aschauer , Kai Fischer , Markus Heintel
IPC分类号: G05B19/418
摘要: A method and a device, by which a customer/buyer of an additively manufactured workpiece can verify whether the quality of the printed workpiece matches the specifications prescribed by the manufacturer is provided. The manufacturer can in this case control and/or monitor in particular a number of authorized workpieces. In addition, in the event of damage, it can be proved whether a workpiece authorized by the manufacturer has been used.
-
2.
公开(公告)号:US10715517B2
公开(公告)日:2020-07-14
申请号:US16388417
申请日:2019-04-18
发明人: Hans Aschauer , Steffen Fries , Markus Heintel , Wolfgang Klasen , Axel Pfau , Franz Sperl , Georg Trummer , Johannes Zwanzger , Rainer Falk
IPC分类号: H04L29/06 , H04W12/00 , H04B10/116
摘要: A retrieval device for secure retrieval of optical information for a first device from a light source of a second device includes, a housing made from at least one material which is opaque for the light emitted from the light source. The housing is arranged to contain the light from at least a part of the light source. The retrieval device includes an attachment adapted to detachably attach the housing to the second device, a light receiver arranged to receive optical information from the light source, said light receiver located inside the housing, and a connector arranged to transfer an optical and/or electrical signal from the light receiver to the first device.
-
公开(公告)号:US10692403B2
公开(公告)日:2020-06-23
申请号:US15610035
申请日:2017-05-31
发明人: Hans Aschauer , Rainer Falk , Kai Fischer , Steffen Fries , Markus Heintel , Anton Sebastian Huber , Wolfgang Klasen , Joachim Koppers , Axel Pfau , Georg Trummer , Johannes Zwanzger , Franz Sperl , Bernhard Quendt
摘要: A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.
-
公开(公告)号:US11336657B2
公开(公告)日:2022-05-17
申请号:US16610937
申请日:2018-05-09
发明人: Kai Fischer , Daniela Friedrich , Markus Heintel
摘要: The invention relates to a communication network having at least one network element (NE), via which data associated with the communication are conducted. The method comprises the following steps: securing, by means of a first cryptographic security function, the data (D) that are transferred from at least one first communication device (PLC1) to at least one second communication device (PLC2), providing a second cryptographic security function, which secures, between a communication device and a network element, messages that are conducted from the first communication device to the at least second communication device via the at least one network element and that contain the data, providing a checking function by means of the at least one network element, which checking function checks the authenticity and/or integrity of the messages on the basis of the second security function, continuing (6) or stopping (5) the communication in accordance with the result of the check (4) by the checking function, wherein, if the communication is continued, the data remain secured by means of the first security function until the data are received by the at least second communication device.
-
公开(公告)号:US10951622B2
公开(公告)日:2021-03-16
申请号:US15769913
申请日:2015-10-22
摘要: A method and device are provided for use in a network including at least one existing device. At least one virtual sub-network is established within the network and a certain trust level is assigned to the at least one virtual sub-network. The device is assigned a first trust level. The device receives a token correlated with the assigned first trust level. The device is permitted into the at least one virtual subnet upon presentation of that token if the first trust level corresponds or includes the certain trust level.
-
公开(公告)号:US10928808B2
公开(公告)日:2021-02-23
申请号:US15756126
申请日:2015-09-21
发明人: Dagmar Beyer , Markus Heintel
IPC分类号: G05B19/418 , G06F9/50 , G06Q10/06
摘要: Provided is a method and an arrangement for enabling a processing step for an object that is to be processed, wherein an availability result, which indicates an availability of the processing step, is determined for the processing step on the basis of rules.
-
7.
公开(公告)号:US20200089890A1
公开(公告)日:2020-03-19
申请号:US16466869
申请日:2017-10-10
发明人: Hans Aschauer , Steffen Fries , Markus Heintel , Dominik Merli , Rainer Falk
IPC分类号: G06F21/57
摘要: Provided is a device unit, including a module, which can configure the device unit with an operating state from among different operating states during the start-up process and/or during ongoing operation of the device unit, wherein a first protected operating state of the different operating states is designed to allow the execution of at least one operating process which can be predefined and to optionally protect the operating process by means of defined cryptographic means, wherein at least one second operating state of the different operating states is designed to deactivate the first protected operating state and to allow at least one other changeable operating process and to optionally protect the operating process by means of specifiable cryptographic means.
-
公开(公告)号:US20240356764A1
公开(公告)日:2024-10-24
申请号:US18686102
申请日:2022-08-22
发明人: Rainer Falk , Kai Fischer , Steffen Fries , Markus Heintel , Wolfgang Klasen , Aliza Maftun
IPC分类号: H04L9/32
CPC分类号: H04L9/3268 , H04L9/3297
摘要: Various embodiments of the teachings herein include a method for assigning a digital model to a physical component of an automation system. An example method includes: consulting a physical component with a piece of link information referring to a digital model of the physical component in a digital twin of the physical component; and using the link information to determine the digital model to which the link information refers and assign said digital model to the physical component.
-
公开(公告)号:US11784790B2
公开(公告)日:2023-10-10
申请号:US17429678
申请日:2020-01-13
发明人: Hans Aschauer , Gökçe Aydos , Markus Heintel , Johannes Zwanzger
CPC分类号: H04L9/0637
摘要: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set is used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream is output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
-
公开(公告)号:US20220158822A1
公开(公告)日:2022-05-19
申请号:US17429678
申请日:2020-01-13
发明人: Hans Aschauer , Gökçe Aydos , Markus Heintel , Johannes Zwanzger
IPC分类号: H04L9/06
摘要: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
-
-
-
-
-
-
-
-
-