-
公开(公告)号:US20220191010A1
公开(公告)日:2022-06-16
申请号:US17432153
申请日:2020-02-14
Applicant: Siemens Aktiengesellschaft
Inventor: Hans Aschauer , Rainer Falk , Christian Peter Feist , Steffen Fries , Aliza Maftun , Hermann Seuschek , Thomas Zeschg
IPC: H04L9/08
Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
-
公开(公告)号:US20240223389A1
公开(公告)日:2024-07-04
申请号:US18558071
申请日:2022-04-26
Applicant: Siemens Aktiengesellschaft
Inventor: Hans Aschauer , Fabrizio De Santis , Rainer Falk , Andreas Furch , Daniel Schneider , Thomas Zeschg
CPC classification number: H04L9/50 , H04L9/0825 , H04L9/3236 , H04L9/3247
Abstract: Various teachings of the present disclosure include methods for providing cryptographic keys for signing data. The method may include: providing a plurality of keys as leaves of a hash tree structure having at least one first hash tree; evaluating a requirement criterion for a requirement for additional keys and, if the requirement criterion is satisfied, generating a plurality of additional keys available as leaves of a further hash tree; and integrating the further hash tree into the hash tree structure so a respective root of the further hash tree is signed with a leaf of the hash tree structure. A number of hash trees of the hash tree structure is not predetermined.
-
公开(公告)号:US20220188418A1
公开(公告)日:2022-06-16
申请号:US17438618
申请日:2020-02-25
Applicant: SIEMENS AKTIENGESELLSCHAFT
Inventor: Hans Aschauer , Rainer Falk , Christian Peter Feist , Steffen Fries , Aliza Maftun , Hermann Seuschek , Thomas Zeschg
Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module. The analyzed execution environment of the configurable hardware module is verified as admissible for execution of the hardware-application component if the analyzed execution environment matches the characterizing parameters provided by the characterizing unit.
-
公开(公告)号:US12192348B2
公开(公告)日:2025-01-07
申请号:US17432153
申请日:2020-02-14
Applicant: Siemens Aktiengesellschaft
Inventor: Hans Aschauer , Rainer Falk , Christian Peter Feist , Steffen Fries , Aliza Maftun , Hermann Seuschek , Thomas Zeschg
IPC: H04L9/08
Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
-
公开(公告)号:US20220179950A1
公开(公告)日:2022-06-09
申请号:US17425808
申请日:2019-12-04
Applicant: Siemens Aktiengesellschaft
Inventor: Hans Aschauer , Rainer Falk , Christian Peter Feist , Steffen Fries , Aliza Maftun , Hermann Seuschek , Thomas Zeschg
IPC: G06F21/55
Abstract: A die arrangement and a method of monitoring the same are provided. The die arrangement includes a plurality of dies and a physical interconnection structure extending between and traversing the plurality of dies. The physical interconnection structure is arranged for imparting unpredictable, yet reproducible properties to a digital signal being carried on the physical interconnection structure. The die arrangement further includes a monitoring logic for monitoring the properties of the digital signal. This enables detection of tampering of topological arrangements of semiconductor dies to one another.
-
6.
公开(公告)号:US20240152627A1
公开(公告)日:2024-05-09
申请号:US18549069
申请日:2022-03-01
Applicant: Siemens Aktiengesellschaft
Inventor: Rainer Falk , Hans Aschauer , Omar Belhachemi , Christian Peter Feist , Hermann Seuschek , Thomas Zeschg
CPC classification number: G06F21/577 , G06F21/602
Abstract: Various embodiments of the teachings herein include a method for determining the integrity of data processing of operative data using a trusted execution environment. The method may include: presenting the trusted execution environment with input data including the operative data and test data; processing the input data to produce output data; subjecting that portion of the output data formed by the processed test data to a comparison with reference data; and using the comparison as a basis for determining the integrity of the data processing.
-
公开(公告)号:US11783039B2
公开(公告)日:2023-10-10
申请号:US17438618
申请日:2020-02-25
Applicant: SIEMENS AKTIENGESELLSCHAFT
Inventor: Hans Aschauer , Rainer Falk , Christian Peter Feist , Steffen Fries , Aliza Maftun , Hermann Seuschek , Thomas Zeschg
CPC classification number: G06F21/57 , G06F21/76 , G06F2221/034
Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module. The analyzed execution environment of the configurable hardware module is verified as admissible for execution of the hardware-application component if the analyzed execution environment matches the characterizing parameters provided by the characterizing unit.
-
公开(公告)号:US20230308266A1
公开(公告)日:2023-09-28
申请号:US18191432
申请日:2023-03-28
Applicant: Siemens Aktiengesellschaft
Inventor: Andreas Furch , Hans Aschauer , Fabrizio De Santis , Rainer Falk , Malek Safieh , Daniel Schneider , Florian Wilde , Thomas Zeschg
CPC classification number: H04L9/0852 , H04L9/3215 , H04L9/3265
Abstract: Various embodiments of the teachings herein include a method for onboarding an IoT device (3) of a manufacturer, in a manner secure against quantum computer attacks, in an infrastructure of a customer by means of a first server (1) of a manufacturer domain of the manufacturer and a second server (2) of a customer domain of the customer. In some embodiments, three authenticated and encrypted communication channels and a key encapsulation method are used to provide a device certificate of the customer domain for the IoT device on the IoT device.
-
公开(公告)号:US20220164485A1
公开(公告)日:2022-05-26
申请号:US17434872
申请日:2020-02-26
Applicant: Siemens Aktiengesellschaft
Inventor: Thomas Zeschg , Hans Aschauer , Rainer Falk , Christian Peter Feist , Aliza Maftun , Hermann Seuschek
Abstract: Incoming and outgoing communication of a hardware-application component is monitored and controlled at runtime of the hardware-application component. In this way, a kind of firewall is provided for ensuring secure and un-altered operation of a hardware-application performing security-critical functionalities on a field-programmable gate array. The hardware-application component may interact with other components directly and/or via an on-chip bus. The monitoring of incoming and/or outgoing communication is particularly advantageous when using third party hardware-applications or software applications, i.e., applications developed by untrusted parties. Another advantage is the possibility of monitoring and controlling all the communication between hardware-applications, hardware- and software applications, hardware-applications and peripherals, IO controllers, etc. It is beneficial especially in case a hardware-application is compromised and tries to compromise the rest of the embedded device, or in case a corrupted software application tries to compromise the associated hardware-application at runtime.
-
-
-
-
-
-
-
-