EP1728137A1 - Anordnung mit einem integrierten schaltkreis - Google Patents
Anordnung mit einem integrierten schaltkreisInfo
- Publication number
- EP1728137A1 EP1728137A1 EP05716983A EP05716983A EP1728137A1 EP 1728137 A1 EP1728137 A1 EP 1728137A1 EP 05716983 A EP05716983 A EP 05716983A EP 05716983 A EP05716983 A EP 05716983A EP 1728137 A1 EP1728137 A1 EP 1728137A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- integrated circuit
- memory
- function modules
- data
- arrangement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- the invention relates to an arrangement with an integrated circuit and an integrated circuit with function modules, the function modules comprising a central processing unit, by means of which data can be processed and programs can be executed, and a cache memory.
- Previously tamper-proof systems with high security requirements regularly consist of several discrete assemblies, to which different functions are assigned, for example a central processing unit, an encryption unit and various memories are each regularly an independent unit that is connected to the other units.
- the requirement of several assemblies and their combination and coordination with each other goes hand in hand with high costs in series production.
- the object of the invention is to create an arrangement of the type mentioned at the outset which satisfies the highest requirements of security against manipulation and at the same time is suitable for series production at lower costs.
- the object according to the invention is achieved by means of an integrated circuit of the type mentioned at the outset, which comprises an encryption unit as a function module, by means of which data or program code can be encrypted and decrypted.
- an encryption unit as a functional module of the integrated circuit is an element of this component, the additional provision, assembly and adjustment to surrounding components can be saved in the manufacture and development of an arrangement with an integrated circuit according to the invention.
- the encryption unit is difficult to separate from the integrated circuit, of which it is a component, and attempts at manipulation are therefore doomed to fail.
- an integrated circuit according to the invention in particular the separation of individual function modules, is particularly difficult if the integrated circuit is designed as a semiconductor chip, in particular if individual function modules interlock like a puzzle, in such a way that individual function modules are no longer discreetly recognizable.
- Particularly complex geometrical entanglements can be selected here, so that the semiconductor structures mixed together can be analyzed with the intention of manipulation, can no longer be recognized as separable.
- the function modules comprise a first memory in which cryptological keys are stored.
- the integration of such a first memory makes targeted access and targeted reading of the cryptological keys difficult.
- the effort for managing cryptological keys by the manufacturer of the devices is completely eliminated with additional security gain if the function modules comprise a random number generator (RNG) which generates the cryptological keys as it were autonomously.
- RNG random number generator
- a real-time clock can advantageously be integrated into the integrated circuit, the correct function of which is also highly relevant for security against manipulation.
- a safety sensor can advantageously be integrated in the circuit as a function module, by means of which at least one operating parameter of the integrated circuit can be monitored.
- Suitable operating parameters for monitoring are, for example, the clock frequency of the real-time clock, the system or CPU clock, or an operating temperature, or an operating voltage of the integrated circuit, or the state of a protective layer on the integrated circuit, or a combination of the aforementioned operating parameters.
- the monitoring of the state of a protective layer on the integrated circuit is particularly effective since the protective layer must be destroyed in order to mechanically access the structure of the semiconductor chip.
- the protective layer is formed as an active protective layer and is applied directly to the die of the semiconductor chip.
- the active protective layer consists of at least one elongated electrical line which runs along the surface of the die, in particular in sections in mutually parallel paths.
- the monitoring can be, for example, a monitoring of the ohmic resistance of the electrical line, wherein a change in the resistance value, which suggests a destruction of the electrical line, advantageously deletes the data to be protected.
- the microcontroller is preferably brought into a secure state, for example a reset. In this way, the "integrated circuit" system according to the invention becomes comparatively intrinsically safe.
- the monitoring of the operating parameter is expediently designed in such a way that at least one limit value is specified for the operating parameter to be monitored, which: measures operating parameters and compares them with the limit value, and deletes the content of the first memory when the limit value is exceeded or fallen below becomes.
- the limit value is expediently to be selected such that the specifications of normal operation do not lead to an interruption in the function of the arrangement, for example in the automotive sector at a temperature of -40 ° C. the data is not yet deleted.
- the manageability and safety of the integrated circuit according to the invention is additionally increased if it is arranged in a housing and has connection contacts led out of the housing. Accordingly, for the purpose of mechanical manipulation, the housing must first be opened.
- a higher integration of the circuit according to the invention can be achieved "if individual function modules have an essentially flat extension and are arranged adjacent to one another in the direction of the surface normals.
- the central processing unit can be stacked with different memories or other function modules.
- Attacks that infer conclusions about the functional state from the behavior of the supply current of the integrated circuit can advantageously be warded off if the functional modules include an integrated voltage regulator that regulates the operating voltage and in this way comparatively noises these operating parameters to the outside.
- the integrated circuit according to the invention has particular advantages in an arrangement with a second memory which is connected to the integrated circuit according to the invention by means of a data bus, in which second memory data or program code are stored in encrypted form and which has memory cells, each of which has a memory address and each memory cell can be addressed directly by reading or writing.
- a data bus in which second memory data or program code are stored in encrypted form and which has memory cells, each of which has a memory address and each memory cell can be addressed directly by reading or writing.
- a Battery is connected, so that the voltage supply is maintained in the absence of any other power supply. In this respect, costs can also be saved if the second memory is inexpensively volatile and is buffered by means of the battery.
- a third memory can be expedient, which is connected to the integrated circuit by means of a data bus and is non-volatile, in particular as a flash. or ROM is formed, the data or program code preferably being stored in encrypted form in the third memory.
- Buffering of the safety sensors by means of a battery is particularly advantageous.
- an auxiliary energy source for example a capacitor, integrated in the housing can be provided, which provides the energy in the event of a registered manipulation attempt to erase the memories, in particular the first memory.
- FIG. 1 is a schematic representation of an inventive arrangement.
- FIG. 1 shows an integrated circuit 1 with various function modules 2, which is connected to external components 3.
- the integrated circuit has further function modules 2, namely a cache memory 5, an encryption unit 6, a first memory 7, a real-time clock 8, a random number generator 80 and a safety sensor system 9.
- function modules 2 namely a cache memory 5, an encryption unit 6, a first memory 7, a real-time clock 8, a random number generator 80 and a safety sensor system 9.
- a voltage regulator 10 and an auxiliary power source 12 integrated components of the integrated circuit 1 designed as a semiconductor chip 13.
- the central processing unit 4 processes data or executes programs which it reads out of the cache memory 5 by means of a first data bus 15.
- the cache memory 5 is connected to the encryption unit 6 by means of a second data bus 16.
- the encryption unit 6 reads the encrypted data or code from the second or third memory 40, 41 using the address data bus 32, decrypts it using the cryptographic key 18 stored in the first memory 7 and writes it to the cache or to others internal registers of the central processing unit 4.
- the cryptological keys 18 have previously been generated by the random number generator 80.
- the random number generator 80 uses, for example, the start values from the statistical fluctuations (noise) of internal, physical measured variables, such as chip temperature, supply voltage, clock frequency, to generate the cryptographic keys 18 which are stored in the first memory 7; ,
- the safety sensor system 9 In addition to the operating temperature T, the operating voltage M, the clock frequency f, the safety sensor system 9 also monitors the ohmic resistance R of a protective layer 20, which consists of there are essentially mutually parallel tracks of an electrical line 21 which are applied directly to the die of the semiconductor chip 13.
- the measured resistance R is permanently compared with a limit value, and if the limit value is exceeded, the central processing unit 4 causes the first memory 7 to be erased, the integrated circuit 1 subsequently being transferred to a secure state, for example a reset.
- the integrated circuit 1 is surrounded by a housing 30 which has connection contacts 3-1 which are at least partially connected to an address data bus 32.
- the integrated circuit 1 exchanges data with a second memory 40 and a third memory 41 by means of the address data bus 32.
- the second memory 40 is designed as volatile RAM and is protected against voltage failure by means of a battery 43, as is the integrated circuit 1.
- the third memory 41 is designed as a non-volatile flash or ROM.
- the data stored in the second memory 40 and third memory 41 are encrypted using the cryptological key 18 and are encrypted or decrypted each time they are accessed using the: encryption unit 6.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Semiconductor Integrated Circuits (AREA)
- Microcomputers (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004014435A DE102004014435A1 (de) | 2004-03-24 | 2004-03-24 | Anordnung mit einem integrierten Schaltkreis |
PCT/EP2005/051072 WO2005098567A1 (de) | 2004-03-24 | 2005-03-10 | Anordnung mit einem integrierten schaltkreis |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1728137A1 true EP1728137A1 (de) | 2006-12-06 |
Family
ID=34961946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05716983A Ceased EP1728137A1 (de) | 2004-03-24 | 2005-03-10 | Anordnung mit einem integrierten schaltkreis |
Country Status (8)
Country | Link |
---|---|
US (1) | US8577031B2 (ru) |
EP (1) | EP1728137A1 (ru) |
JP (1) | JP2007535736A (ru) |
CN (1) | CN1934517A (ru) |
BR (1) | BRPI0509073A (ru) |
DE (1) | DE102004014435A1 (ru) |
RU (1) | RU2412479C2 (ru) |
WO (1) | WO2005098567A1 (ru) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007008293B4 (de) * | 2007-02-16 | 2010-02-25 | Continental Automotive Gmbh | Verfahren und Vorrichtung zum gesicherten Speichern und zum gesicherten Lesen von Nutzdaten |
US8205097B2 (en) * | 2007-07-05 | 2012-06-19 | Nxp B.V. | Microprocessor in a security-sensitive system |
DE102007048284A1 (de) * | 2007-09-27 | 2009-04-09 | Continental Automotive Gmbh | Geschwindigkeitsdatenübertragungseinrichtung |
DE102008061710A1 (de) * | 2008-12-12 | 2010-06-17 | Continental Automotive Gmbh | Verfahren zum Betreiben einer Sensorvorrichtung und Sensorvorrichtung |
DE102008054627A1 (de) * | 2008-12-15 | 2010-06-17 | Robert Bosch Gmbh | Steuergerät mit dem Verfahren zum Manipulationsschutz Computerprogramm, Computerprogrammprodukt |
US8812871B2 (en) * | 2010-05-27 | 2014-08-19 | Cisco Technology, Inc. | Method and apparatus for trusted execution in infrastructure as a service cloud environments |
US8990582B2 (en) * | 2010-05-27 | 2015-03-24 | Cisco Technology, Inc. | Virtual machine memory compartmentalization in multi-core architectures |
EP2506176A1 (en) * | 2011-03-30 | 2012-10-03 | Irdeto Corporate B.V. | Establishing unique key during chip manufacturing |
FR2980285B1 (fr) | 2011-09-15 | 2013-11-15 | Maxim Integrated Products | Systemes et procedes de gestion de cles cryptographiques dans un microcontroleur securise |
US8861728B2 (en) * | 2012-10-17 | 2014-10-14 | International Business Machines Corporation | Integrated circuit tamper detection and response |
DE102013109096A1 (de) * | 2013-08-22 | 2015-02-26 | Endress + Hauser Flowtec Ag | Gegen Manipulation geschütztes elektronisches Gerät |
RU2585988C1 (ru) * | 2015-03-04 | 2016-06-10 | Открытое Акционерное Общество "Байкал Электроникс" | Устройство шифрования данных (варианты), система на кристалле с его использованием (варианты) |
US10216963B2 (en) * | 2016-12-12 | 2019-02-26 | Anaglobe Technology, Inc. | Method to protect an IC layout |
KR20190075363A (ko) * | 2017-12-21 | 2019-07-01 | 삼성전자주식회사 | 반도체 메모리 장치, 이를 포함하는 메모리 시스템 및 메모리 모듈 |
DE102019209355A1 (de) * | 2019-06-27 | 2020-12-31 | Audi Ag | Steuergerät für ein Kraftfahrzeug und Kraftfahrzeug |
DE102019006834A1 (de) * | 2019-09-21 | 2021-03-25 | Thomas Hoffermann | USB-Stick mit Manipulationsschutz |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2182176A (en) * | 1985-09-25 | 1987-05-07 | Ncr Co | Data security device for protecting stored data |
EP0495645A1 (en) * | 1991-01-18 | 1992-07-22 | NCR International, Inc. | Data security device |
US5473692A (en) * | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
WO1996000953A2 (en) * | 1994-06-28 | 1996-01-11 | National Semiconductor Corporation | Secure data processor with cryptography and tamper detection |
DE19512266A1 (de) * | 1994-09-23 | 1996-03-28 | Rainer Jacob | Vorrichtung zum Schutz einer elektronischen Schaltung vor Manipulation |
US5943421A (en) * | 1995-09-11 | 1999-08-24 | Norand Corporation | Processor having compression and encryption circuitry |
WO2000028399A1 (de) * | 1998-11-05 | 2000-05-18 | Infineon Technologies Ag | Schutzschaltung für eine integrierte schaltung |
EP1054316A1 (de) * | 1999-05-15 | 2000-11-22 | Scheidt & Bachmann Gmbh | Vorrichtung zur Sicherung elektronischer Schaltungen gegen unberechtigten Zugang |
US6330668B1 (en) * | 1998-08-14 | 2001-12-11 | Dallas Semiconductor Corporation | Integrated circuit having hardware circuitry to prevent electrical or thermal stressing of the silicon circuitry |
US6523118B1 (en) * | 1998-06-29 | 2003-02-18 | Koninklijke Philips Electronics N.V. | Secure cache for instruction and data protection |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4860351A (en) * | 1986-11-05 | 1989-08-22 | Ibm Corporation | Tamper-resistant packaging for protection of information stored in electronic circuitry |
US5343616B1 (en) | 1992-02-14 | 1998-12-29 | Rock Ltd | Method of making high density self-aligning conductive networks and contact clusters |
RU94036200A (ru) | 1994-09-28 | 1996-07-10 | Н.Б. Петров | Резервируемая микросхема |
RU95103311A (ru) | 1995-03-07 | 1996-11-27 | А.Г. Соколов | Интегральная схема акселерометра |
US5824571A (en) * | 1995-12-20 | 1998-10-20 | Intel Corporation | Multi-layered contacting for securing integrated circuits |
JP3440763B2 (ja) * | 1996-10-25 | 2003-08-25 | 富士ゼロックス株式会社 | 暗号化装置、復号装置、機密データ処理装置、及び情報処理装置 |
US5828753A (en) * | 1996-10-25 | 1998-10-27 | Intel Corporation | Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package |
US5861662A (en) * | 1997-02-24 | 1999-01-19 | General Instrument Corporation | Anti-tamper bond wire shield for an integrated circuit |
US7110227B2 (en) * | 1997-04-08 | 2006-09-19 | X2Y Attenuators, Llc | Universial energy conditioning interposer with circuit architecture |
JP3295346B2 (ja) * | 1997-07-14 | 2002-06-24 | 株式会社半導体エネルギー研究所 | 結晶性珪素膜の作製方法及びそれを用いた薄膜トランジスタ |
US6198250B1 (en) | 1998-04-02 | 2001-03-06 | The Procter & Gamble Company | Primary battery having a built-in controller to extend battery run time |
EP1041482A1 (de) | 1999-03-26 | 2000-10-04 | Siemens Aktiengesellschaft | Manipulationssichere integrierte Schaltung |
GB9930145D0 (en) * | 1999-12-22 | 2000-02-09 | Kean Thomas A | Method and apparatus for secure configuration of a field programmable gate array |
US7005733B2 (en) | 1999-12-30 | 2006-02-28 | Koemmerling Oliver | Anti tamper encapsulation for an integrated circuit |
GB2365153A (en) * | 2000-01-28 | 2002-02-13 | Simon William Moore | Microprocessor resistant to power analysis with an alarm state |
TW492114B (en) * | 2000-06-19 | 2002-06-21 | Advantest Corp | Method and apparatus for edge connection between elements of an integrated circuit |
DE10044837C1 (de) * | 2000-09-11 | 2001-09-13 | Infineon Technologies Ag | Schaltungsanordnung und Verfahren zum Detektieren eines unerwünschten Angriffs auf eine integrierte Schaltung |
JP2002175689A (ja) * | 2000-09-29 | 2002-06-21 | Mitsubishi Electric Corp | 半導体集積回路装置 |
JPWO2003015169A1 (ja) * | 2001-08-07 | 2004-12-02 | 株式会社ルネサステクノロジ | 半導体装置およびicカード |
GB0202431D0 (en) * | 2002-02-02 | 2002-03-20 | F Secure Oyj | Method and apparatus for encrypting data |
JP2004007472A (ja) * | 2002-03-22 | 2004-01-08 | Toshiba Corp | 半導体集積回路、データ転送システム、及びデータ転送方法 |
US6967350B2 (en) * | 2002-04-02 | 2005-11-22 | Hewlett-Packard Development Company, L.P. | Memory structures |
-
2004
- 2004-03-24 DE DE102004014435A patent/DE102004014435A1/de not_active Withdrawn
-
2005
- 2005-03-10 BR BRPI0509073-3A patent/BRPI0509073A/pt not_active IP Right Cessation
- 2005-03-10 WO PCT/EP2005/051072 patent/WO2005098567A1/de active Application Filing
- 2005-03-10 EP EP05716983A patent/EP1728137A1/de not_active Ceased
- 2005-03-10 RU RU2006137366/08A patent/RU2412479C2/ru active
- 2005-03-10 US US10/599,230 patent/US8577031B2/en active Active
- 2005-03-10 CN CNA2005800090492A patent/CN1934517A/zh active Pending
- 2005-03-10 JP JP2007504396A patent/JP2007535736A/ja not_active Withdrawn
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2182176A (en) * | 1985-09-25 | 1987-05-07 | Ncr Co | Data security device for protecting stored data |
EP0495645A1 (en) * | 1991-01-18 | 1992-07-22 | NCR International, Inc. | Data security device |
WO1996000953A2 (en) * | 1994-06-28 | 1996-01-11 | National Semiconductor Corporation | Secure data processor with cryptography and tamper detection |
US5473692A (en) * | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
DE19512266A1 (de) * | 1994-09-23 | 1996-03-28 | Rainer Jacob | Vorrichtung zum Schutz einer elektronischen Schaltung vor Manipulation |
US5943421A (en) * | 1995-09-11 | 1999-08-24 | Norand Corporation | Processor having compression and encryption circuitry |
US6523118B1 (en) * | 1998-06-29 | 2003-02-18 | Koninklijke Philips Electronics N.V. | Secure cache for instruction and data protection |
US6330668B1 (en) * | 1998-08-14 | 2001-12-11 | Dallas Semiconductor Corporation | Integrated circuit having hardware circuitry to prevent electrical or thermal stressing of the silicon circuitry |
WO2000028399A1 (de) * | 1998-11-05 | 2000-05-18 | Infineon Technologies Ag | Schutzschaltung für eine integrierte schaltung |
EP1054316A1 (de) * | 1999-05-15 | 2000-11-22 | Scheidt & Bachmann Gmbh | Vorrichtung zur Sicherung elektronischer Schaltungen gegen unberechtigten Zugang |
Non-Patent Citations (1)
Title |
---|
See also references of WO2005098567A1 * |
Also Published As
Publication number | Publication date |
---|---|
BRPI0509073A (pt) | 2007-08-21 |
DE102004014435A1 (de) | 2005-11-17 |
US20080219441A1 (en) | 2008-09-11 |
RU2412479C2 (ru) | 2011-02-20 |
US8577031B2 (en) | 2013-11-05 |
RU2006137366A (ru) | 2008-04-27 |
JP2007535736A (ja) | 2007-12-06 |
CN1934517A (zh) | 2007-03-21 |
WO2005098567A1 (de) | 2005-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005098567A1 (de) | Anordnung mit einem integrierten schaltkreis | |
DE69527773T2 (de) | Schaltungsanordnung zur Überwachung der Benutzung von Funktionen in einem integrierten Schaltungkreis | |
EP1089219B1 (de) | Verfahren zur Sicherung eines Datenspeichers | |
DE69531556T2 (de) | Verfahren und einrichtung zur sicherung von in halbleiterspeicherzellen gespeicherten daten | |
EP2727277B1 (de) | System zur sicheren übertragung von daten und verfahren | |
DE102013222321A1 (de) | Elektronisches Gerät mit einer Vielzahl von Speicherzellen und mit physikalisch unklonbarer Funktion | |
DE102013205729A1 (de) | Vorrichtung und Verfahren mit einem Träger mit Schaltungsstrukturen | |
DE102014208855A1 (de) | Verfahren zum Durchführen einer Kommunikation zwischen Steuergeräten | |
DE102012102856A1 (de) | Vorrichtung und Verfahren zum Lesen und Speichern von Daten | |
EP1999521A1 (de) | Feldgerät | |
EP2191408A1 (de) | Verfahren und vorrichtung zum codieren von datenworten | |
DE10326089B3 (de) | Manipulationsüberwachung für eine Schaltung | |
DE102010010851A1 (de) | Ausspähungsschutz bei der Ausführung einer Operationssequenz in einem tragbaren Datenträger | |
EP2359300A1 (de) | Verfahren zum sicheren speichern von daten in einem speicher eines tragbaren datenträgers | |
DE10164419A1 (de) | Verfahren und Anordnung zum Schutz von digitalen Schaltungsteilen | |
DE102012219205A1 (de) | Vorrichtung und Verfahren zur Ausführung eines kryptographischen Verfahrens | |
EP3371733B1 (de) | Verschlüsseln des speicherinhalts eines speichers in einem eingebetteten system | |
DE102004028338A1 (de) | Tachograph | |
DE102014208853A1 (de) | Verfahren zum Betreiben eines Steuergeräts | |
WO2004036649A1 (de) | Chip mit angriffsschutz | |
DE102010047186B4 (de) | Verfahren zum Unterstützen einer Bindung eines Chips an ein elektronisches Gerät und Chip bzw. elektronisches Gerät hierfür | |
EP3876123B1 (de) | Anordnung und betriebsverfahren für einen sicheren hochfahrablauf einer elektronischen einrichtung | |
EP1669825B1 (de) | Verfahren und Vorrichtung zur Zuordnung einer Steckplatznummer und/oder von Konfigurierungsdaten zu einer Baugruppe | |
DE102021200770A1 (de) | Anordnung, die eine mehrschicht- leiterplatte aufweist, undverfahren zum betreiben einer mehrschicht- leiterplatte | |
DE102017116280B4 (de) | Speicheranordnung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060814 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: CONTINENTAL AUTOMOTIVE GMBH |
|
17Q | First examination report despatched |
Effective date: 20100531 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20110218 |