EP2499594A1 - Verfahren und system zum vertraulichen bereitstellen von softwarekomponenten - Google Patents
Verfahren und system zum vertraulichen bereitstellen von softwarekomponentenInfo
- Publication number
- EP2499594A1 EP2499594A1 EP10773595A EP10773595A EP2499594A1 EP 2499594 A1 EP2499594 A1 EP 2499594A1 EP 10773595 A EP10773595 A EP 10773595A EP 10773595 A EP10773595 A EP 10773595A EP 2499594 A1 EP2499594 A1 EP 2499594A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- oem
- key
- encrypted
- cryptographic
- software component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000002093 peripheral effect Effects 0.000 claims description 3
- 230000032258 transport Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the invention relates to a method and system for the confidential provision of software components, in particular of OEM software components.
- software components can be developed or manufactured.
- Software components or software components can be, for example, program sections or subroutines.
- This software ⁇ components are created using a development environment by a software component manufacturer or OEM (Original Equipment Manufacturer).
- OEM Olinal Equipment Manufacturer
- Source code of the software component When creating software components, software component manufacturers or OEMs leave their industry-specific expertise or knowledge
- the invention provides a method for confidential provision of a software component having the following steps: (A) encrypting the software component (SWK) using a secret cryptographic OEM key (K 0EM ) of a software component manufacturer (OEM);
- SWK decrypted software component
- Execution is provided on the target system device.
- the first cryptographic system key is a public areas ⁇ cher cryptographic key and the second cryptographic key system, a private cryptographic key of an asymmetric encryption method.
- the first cryptographic system key and the second cryptographic system key are a private cryptographic key of a symmetric encryption method.
- the target system device is formed by a SpeI ⁇ mable logic controller.
- the first cryptographic system key and the two ⁇ te cryptographic system key is generated as the key pair by a manufacturer of the target system device.
- the software component is symmetrically encrypted by means of the secret cryptographic OEM key of the software component manufacturer OEM.
- the secret cryptographic OEM key of the software component manufacturer OEM is asymmetrically encrypted by means of the public cryptographic key.
- the private key is tamper-proof integrated in the Zielsyt- device.
- the cryptographic checksum is formed by a message authentication code (MAC).
- MAC message authentication code
- the cryptographic checksum is formed by an electronic signature.
- the encrypted software component and the encrypted key of the OEM Softwarekomponentenher ⁇ steller OEM transported saved to disk
- the encrypted software component and the encrypted OEM key of the software component manufacturer OEM are transported in data packets via a network.
- a software component is encrypted by means of the secret cryptographic OEM key of the software component manufacturer OEM.
- a plurality of software components are simultaneously encrypted by means of the secret cryptographic OEM key of the software component manufacturer OEM.
- the invention further provides a system for confidently providing software components to a user having the features set forth in claim 13.
- the invention provides a system for confidential providing software components (SWK) for a user comprising: at least a developing device of a Softwarekompo- nenten arrangements (OEM) on the means of a development ⁇ Tools software components (SWK) can be produced, each of which cryptographic by a secret OEM Key (K 0EM ) of the software component manufacturer (OEM) are encrypted,
- the target system device comprises a programmable Steue ⁇ tion in which the private key is provided, which is generated by the manufacturer of the target system device.
- the OEM development device of the software component manufacturer is connected to the target system device via a network.
- the software component has at least one program executable on the target system device.
- the invention further provides a target system device having the features specified in claim 17.
- the invention provides a target system device with:
- a second decryption unit that decrypts a transported ⁇ te encrypted software component (ENC-SWK) by means of the decrypted by the first decryption unit OEM key (K 0 EM) of the software components manufacturer (OEM), and
- the target system device has at least one interface for receiving transported encrypted software components and encrypted OEM keys of a software component manufacturer.
- the target system device has peripheral components for sensors and actuators, which are connected via a bus to the execution unit of the target system device.
- the second cryptographic system key is a private cryptographic key of an asymmetric key method.
- the invention further provides a developing device having the features specified in claim 22.
- the invention provides a development device of a software component manufacturer
- a first encryption unit for encrypting a software component (SWC) using a secret kryp ⁇ tographischen OEM key (K 0EM) of the software component manufacturer (OEM);
- a second encryption unit for encrypting the cryptographic OEM key of the software component manufacturer (OEM) by means of a first cryptographic system key (K sys i),
- the first cryptographic system key is a public cryptographic key of an asymmetric encryption method.
- FIG. 1 shows a flow chart for illustrating a possible embodiment of the method according to the invention for the confidential provision of a method
- FIG. 2 is a block diagram illustrating a possible embodiment of a system according to the invention for the confidential provision of software components for a user.
- the invention Ver ⁇ drive to the confidential providing a software component essentially five steps S1-S5.
- a first step S1 the software component SWK is encrypted by means of a secret cryptographic OEM key K 0 EM of a software component manufacturer OEM.
- the OEM key K 0 EM of the software component manufacturer OEM is encrypted by means of a first cryptographic system key K sysl .
- the encrypted software component ⁇ ENC-SWK and the encrypted OEM key is transported (ENC K 0 EM) of the software components OEM manufacturer to a target ⁇ system device.
- This target system device is formed, for example, by a programmable logic controller PLC.
- a transport of the encrypted software component ENC-SWK and the encrypted OEM key ENC-KOEM takes place in a possible embodiment ⁇ form on a data carrier, the encrypted software component and the encrypted OEM key stores.
- the encrypted software component and the encrypted OEM key of the software component manufacturer OEM are transported in data packets over a network.
- step S4 a decryption of the encrypted transported OEM key ENC-K 0EM with ⁇ means of a second cryptographic system key K sys2 occurs.
- step S5 the transported encrypted software component ENC-SWK is decrypted by means of the decryption ⁇ seldom OEM key K 0EM , wherein the entschlüs ⁇ rare software component SWK for execution on the Zielsyt- device, for example a programmable logic controller PLC, is provided ,
- the first cryptographic system key s ysl and the second cryptographic system key K sys2 are generated as a key pair by a manufacturer of the target system device .
- the encryption and decryption takes place by means of an asymmetric encryption method, WO in the first cryptographic system key K sysl a öf ⁇ fentaji cryptographic key K pub and the second cryptographic key K sys2 a private kryptographi ⁇ shear key K priv is.
- the encryption and decryption using a symmetric encryption method is carried out, wherein the first cryptographic system key K and the second sysl kryp ⁇ tographische system key K sys2 are a private cryptographic key shear.
- a cryptographic checksum that is specific exceed checked when decrypting the encrypted software component ported trans ⁇ ENC-SWK when encrypting the software component SWK in step Sl is generated.
- These cryptographic checksum can ⁇ example, be formed by a message authentication code MAC.
- the cryptographic checksum is formed ⁇ ge by an electronic signature.
- a software component using a secret SWK kryp ⁇ tographischen OEM key of Softwarekomponentenherstel ⁇ coupler OEM is encrypted at step Sl.
- multiple software components SWK are simultaneously encrypted by means of the secret cryptographic OEM key of the software component manufacturer OEM.
- the system 1 contains at least one development assembly 2 of a software component manufacturer OEM and a target system ⁇ device 3, for example, has a programmable programmable controller PLC.
- the OEM development environment 2 of the software component manufacturer OEM contains at least one development device 2A, on which software components SWK can be produced by means of a development tool.
- software components can be any software component or software components, in particular Pro ⁇ programs, subprograms or subroutines or files.
- the development environment of the software component manufacturer 2 includes a first encryption unit 2B, through which the supplied software component SWK by means of a secret cryptographic key K OEM 0 EM of the software components ⁇ manufacturer OEM is encrypted.
- This first encryption unit 2b may be a software component or gleichzei ⁇ tig encrypt multiple software components by means of the secret cryptographic key of the OEM Softwarekomponentenherstel ⁇ toddlers.
- the secret cryptographic OEM key K 0 EM of the software component manufacturer is, as shown in Fig. 2, for example, in a
- the software component SWK is preferably symmetrically encrypted by means of the secret cryptographic OEM key KQEM of the software component manufacturer OEM in the encryption unit 2B and arrives at an interface 2D of the OEM development environment 2.
- the OEM development environment 2 has a second encryption unit 2e in addition to the first encryption unit 2B.
- the second Ver ⁇ encryption unit 2e of surele from the memory 2C ⁇ sene secret cryptographic key of the OEM Softwarekom ⁇ ponentenselfs OEM is encrypted by a first cryptographic system key K Sysl.
- the encrypted by the second encryption unit 2E secret OEM key of the software component manufacturer OEM, as well as by the first encryption unit 2B encrypted Softwarekom ⁇ component ENC-SWK is via the interface 2D of the OEM development environment 2 by means of a transport means 4 to an interface 3A a target system device 3 transported.
- the target system device 3 is, for example, a memory-programmed controller SPS.
- the Transport means 4 formed by a line or a network.
- the encrypted software component ENC-SWK and the encrypted OEM key ENC-KQ EM of the software component manufacturer OEM are transported in data packets via the network to the target system device 3.
- the transport means 4 is a data carrier on which the encrypted software component ENC-SWK and the encrypted OEM key ENC-KQ EM are stored.
- ENC-SWK the encrypted software component
- ENC-KQ EM the encrypted software component
- the interface 3A to the target system device 3 reads in this embodiment the data stored on the disk key encrypted OEM ENC- Kom and the encrypted Softwarekomponen ⁇ te ENC-SWK from the disk.
- the target system device 3 has a first decision ⁇ treatment unit 3B, which decrypts the transported encrypted OEM key ENC-KQ EM means of a second cryptographic system key K sys2 .
- the target system device 3 has an execution unit 3D, which is connected via a bus 5 with peripheral components 6-1 to 6-n for sensors and actuators.
- execution unit 3D is ⁇ example, be a CPU or a microprocessor.
- the software recovered by the second decryption unit 3C component SWK can be formed for example by an executable program or subroutine, which is executed directly by the execution unit 3D of the target system device 3 after decryption.
- a public cryptographic key is K pub.
- the stored in a storage device 3E, the target system device 3 second cryptographic Systemschlüs ⁇ sel sys2 K is a private cryptographic key K priv in this embodiment.
- This private key K priv is preferably integrated into the target system device 3 in a tamper-proof manner.
- first cryptographic system key K is sysl and stored in the memory 3E of the target device 3 second cryptographic system key K sys2 a private cryptographic key of a symmetric encryption method.
- first cryptographic system key K is sysl and the second cryptographic system key K sys2 preferably generated as a key pair before ⁇ by a manufacturer of the target system device.
- the method and system according to the invention for confidential provision of software components or software components SWK protects against unauthorized reading and manipulation by using cryptographic encryption and decryption methods.
- the inventive method and system provide software components SWK, which are developed, confidentially, with a know-how protection of the software components is achieved in that unauthorized third parties can read the software component SWK neither in plain text or as source code or object code, nor unnoticed change ,
- a two-stage encryption and a two-stage decision ⁇ ment is made, wherein the encrypted OEM key EWC KOEM of the software component manufacturer OEM is transported together by means of the encrypted by the OEM key software component ENC SWK to the target system device 3.
- the corresponding system key K sysl , K sys2 are generated first. This can be done in ⁇ example by the manufacturer of the target system device. 3
- the second system key K sys2 is then stored preference ⁇ as tamper-proof by the manufacturer of the target system device 3, for example, in a particularly artillery th memory 3E.
- the first system key K sysl which is used to encrypt the OEM key of the software ⁇ component manufacturer, is stored in a memory 2C of the development environment.
- the public or first system key K sysl can be delivered directly to the development environment 2 to the software component manufacturer OEM.
- the second system key for example a private key, is preferably stored tamper-proof, for example in a firmware of the target system device 3.
- encryption takes place symmetrically, since this allows higher performance than with an asymmetric encryption method.
- the use of a symmetric encryption method causes a significantly faster decryption, in particular in the subsequent decryption of the software protection in the target system device 3.
- the secret text generated by the symmetric encryption is no longer legible without knowledge of the corresponding key.
- the OEM key used for encryption is in turn encrypted with a first system key K sysl , so that even this OEM key is not in plain text and therefore can not be used to decrypt the previously encrypted OEM software components.
- the encrypted software or Softwarekompo ⁇ component SWK can now be delivered along with the encrypted key OEM or transported. To Aus ⁇ delivery of encrypted OEM software component together with the encrypted OEM key these two data packets to the target system device 3 or the PLC hardware are loaded. In the PLC hardware or the target system device 3 of the second system key is already since the expire ⁇ tion of the hardware in a key sel Grande 3E.
- This second system key K sys2 may be, for example, a private key. Using this private key K sys2 , the OEM key is now decrypted. Following this, the software components SWK or software components are preferably decrypted by means of a symmetric decryption using the OEM key. This means that the software component SWK is ready for execution in plain text in the PLC hardware. With the method and system according to the invention, the software component manufacturer OEM can protect its generated software components or software components SWK and this
- Remove protection without any interaction between the software component manufacturer OEM and the manufacturer of the target system device 3 is necessary.
- a customer of the soft ⁇ ware components manufacturer OEM and component manufacturers can not decrypt the software components, that is the know-how protection of a software component manufacturer OEM can not be canceled by a customer or other software components manufacturer. Due to the fact that the software components or software components of a software component manufacturer OEM are encrypted, the delivery of this software or software components can also be made via insecure channels.
- the soft ⁇ ware component can be sent in electronic form via Internet download or in a MMC memory card. In the method and system according to the invention, therefore, the know-how protection does not depend on the safety of the transport channel 4.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Programmable Controllers (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102009052454A DE102009052454A1 (de) | 2009-11-09 | 2009-11-09 | Verfahren und System zum vertraulichen Bereitstellen von Softwarekomponenten |
PCT/EP2010/065370 WO2011054643A1 (de) | 2009-11-09 | 2010-10-14 | Verfahren und system zum vertraulichen bereitstellen von softwarekomponenten |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2499594A1 true EP2499594A1 (de) | 2012-09-19 |
Family
ID=43302512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10773595A Ceased EP2499594A1 (de) | 2009-11-09 | 2010-10-14 | Verfahren und system zum vertraulichen bereitstellen von softwarekomponenten |
Country Status (5)
Country | Link |
---|---|
US (1) | US9542537B2 (zh) |
EP (1) | EP2499594A1 (zh) |
CN (1) | CN102598014B (zh) |
DE (1) | DE102009052454A1 (zh) |
WO (1) | WO2011054643A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE112018000705T5 (de) | 2017-03-06 | 2019-11-14 | Cummins Filtration Ip, Inc. | Erkennung von echten filtern mit einem filterüberwachungssystem |
US10749689B1 (en) * | 2017-06-29 | 2020-08-18 | Salesforce.Com, Inc. | Language-agnostic secure application development |
US11163910B2 (en) * | 2017-06-29 | 2021-11-02 | Salesforce.Com, Inc. | Methods and systems for data migration |
EP3439228B1 (de) * | 2017-08-02 | 2020-07-29 | Siemens Aktiengesellschaft | Verfahren und vorrichtungen zum erreichen einer sicherheitsfunktion, insbesondere im umfeld einer geräte- und/oder anlagensteuerung |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10059230A1 (de) * | 2000-11-29 | 2002-06-13 | 4Friendsonly Com Internet Tech | Verfahren zur Verfügbarmachung von multimedialen Datenmengen und Datenverarbeitungssystem |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
JP3486043B2 (ja) | 1996-03-11 | 2004-01-13 | 株式会社東芝 | ソフトウエア流通システムの動作方法及びソフトウエアシステム |
DE19614654C1 (de) * | 1996-04-13 | 1997-08-21 | Leuze Electronic Gmbh & Co | Sensor-Aktor-Bussystem |
US7917760B2 (en) * | 1997-02-21 | 2011-03-29 | Multos Limited | Tamper resistant module having separate control of issuance and content delivery |
WO1999007145A1 (en) * | 1997-08-01 | 1999-02-11 | Scientific-Atlanta, Inc. | Verification of the source of program of information in a conditional access system |
EP0838796A3 (en) * | 1998-01-28 | 1998-06-10 | Siemens Aktiengesellschaft | Data or information transmission system |
US6615350B1 (en) * | 1998-03-23 | 2003-09-02 | Novell, Inc. | Module authentication and binding library extensions |
US6438235B2 (en) * | 1998-08-05 | 2002-08-20 | Hewlett-Packard Company | Media content protection utilizing public key cryptography |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
US7051005B1 (en) | 1999-03-27 | 2006-05-23 | Microsoft Corporation | Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system |
US6914985B1 (en) * | 1999-12-14 | 2005-07-05 | International Business Machines Corporation | Method and system for presentation and manipulation of PKCS enveloped-data objects |
US6792113B1 (en) | 1999-12-20 | 2004-09-14 | Microsoft Corporation | Adaptable security mechanism for preventing unauthorized access of digital data |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
DE10038779A1 (de) | 2000-08-09 | 2002-03-07 | Schneider Automation Gmbh | Verfahren zur Übertragung von Daten in ein oder aus einem Steuerungsgerät wie speicherprogrammierbare Steuerung sowie Steuerungsgerät |
EP1179908A1 (de) * | 2000-08-10 | 2002-02-13 | Siemens Aktiengesellschaft | Kommunikationsverfahren |
KR20020083851A (ko) | 2001-04-30 | 2002-11-04 | 주식회사 마크애니 | 디지털 컨텐츠의 보호 및 관리를 위한 방법 및 이를이용한 시스템 |
JP3773431B2 (ja) | 2001-09-20 | 2006-05-10 | 松下電器産業株式会社 | 鍵実装システムおよびこれを実現するためのlsi、並びに鍵実装方法 |
EP1296207B1 (de) * | 2001-09-25 | 2014-08-27 | Siemens Aktiengesellschaft | HMI Gerät und Verfahren zur Bedienung einer technischen Einrichtung, Automatisierungssystem mit HMI Gerät und Computerprogrammprodukt mit Programm zur Durchführung des Verfahrens in einem HMI Gerät oder Automatisierungssystem |
GB2384403B (en) * | 2002-01-17 | 2004-04-28 | Toshiba Res Europ Ltd | Data transmission links |
US7203844B1 (en) * | 2002-06-20 | 2007-04-10 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
JP4039923B2 (ja) * | 2002-09-20 | 2008-01-30 | 富士通株式会社 | ソフトウェア実行管理装置、ソフトウェア実行管理方法、およびソフトウェア実行管理プログラム |
US20050025182A1 (en) * | 2003-06-25 | 2005-02-03 | Ala Nazari | Systems and methods using multiprotocol communication |
US20050091496A1 (en) * | 2003-10-23 | 2005-04-28 | Hyser Chris D. | Method and system for distributed key management in a secure boot environment |
US20050246763A1 (en) * | 2004-03-25 | 2005-11-03 | National University Of Ireland | Secure digital content reproduction using biometrically derived hybrid encryption techniques |
US7747851B1 (en) * | 2004-09-30 | 2010-06-29 | Avaya Inc. | Certificate distribution via license files |
GB2439490B (en) * | 2005-03-08 | 2008-12-17 | Radio Usa Inc E | Systems and methods for modifying power usage |
US8108317B2 (en) * | 2005-08-31 | 2012-01-31 | Hand Held Products, Inc. | System and method for restricting access to a terminal |
US20070143216A1 (en) * | 2005-12-16 | 2007-06-21 | Benaloh Josh D | Data Signal with a Database and a Compressed Key |
US8296583B2 (en) * | 2006-02-24 | 2012-10-23 | Drakez Tokaj Rt. L.L.C. | Physical digital media delivery |
EP2030124A4 (en) * | 2006-05-24 | 2012-12-12 | Safend Ltd | METHOD AND SYSTEM FOR DEFENSE OF SECURITY SOFTWARE IN A USER'S COMPUTER |
US7886162B2 (en) * | 2007-05-29 | 2011-02-08 | International Business Machines Corporation | Cryptographic secure program overlays |
US8332635B2 (en) * | 2007-05-29 | 2012-12-11 | International Business Machines Corporation | Updateable secure kernel extensions |
US20090164804A1 (en) * | 2007-12-25 | 2009-06-25 | Sandisk Il Ltd. | Secured storage device |
US20100275251A1 (en) * | 2009-04-28 | 2010-10-28 | Gross Curtis T | Transferring credential information |
CA2713787C (en) * | 2009-08-28 | 2016-06-07 | Research In Motion Limited | Protocol for protecting content protection data |
US8353050B2 (en) * | 2009-09-02 | 2013-01-08 | Research In Motion Limited | Mobile device management |
US9621716B2 (en) * | 2010-06-10 | 2017-04-11 | Blackberry Limited | Method and system for secure provisioning of a wireless device |
-
2009
- 2009-11-09 DE DE102009052454A patent/DE102009052454A1/de not_active Withdrawn
-
2010
- 2010-10-14 CN CN201080050758.6A patent/CN102598014B/zh not_active Expired - Fee Related
- 2010-10-14 WO PCT/EP2010/065370 patent/WO2011054643A1/de active Application Filing
- 2010-10-14 EP EP10773595A patent/EP2499594A1/de not_active Ceased
- 2010-10-14 US US13/508,712 patent/US9542537B2/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10059230A1 (de) * | 2000-11-29 | 2002-06-13 | 4Friendsonly Com Internet Tech | Verfahren zur Verfügbarmachung von multimedialen Datenmengen und Datenverarbeitungssystem |
Also Published As
Publication number | Publication date |
---|---|
US9542537B2 (en) | 2017-01-10 |
DE102009052454A1 (de) | 2011-05-12 |
CN102598014A (zh) | 2012-07-18 |
US20120321089A1 (en) | 2012-12-20 |
WO2011054643A1 (de) | 2011-05-12 |
CN102598014B (zh) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2899714B1 (de) | Gesichertes Bereitstellen eines Schlüssels | |
EP3649768B1 (de) | Verfahren zum sicheren ersetzen eines bereits in ein gerät eingebrachten ersten herstellerzertifikats | |
EP1959606B1 (de) | Sicherheitseinheit | |
DE102011081804B4 (de) | Verfahren und System zum Bereitstellen von gerätespezifischen Betreiberdaten, welche an ein Authentisierungs-Credential gebunden werden, für ein Automatisierungsgerät einer Automatisierungsanlage | |
DE102010027586B4 (de) | Verfahren zum kryptographischen Schutz einer Applikation | |
WO2019120778A1 (de) | Vorrichtung und verfahren zum übertragen von daten zwischen einem ersten und einem zweiten netzwerk | |
EP2499774B1 (de) | Verfahren und system zur beschleunigten entschlüsselung von kryptographisch geschützten nutzdateneinheiten | |
EP3413530A1 (de) | Verfahren und vorrichtung zum austauschen von nachrichten | |
WO2011054643A1 (de) | Verfahren und system zum vertraulichen bereitstellen von softwarekomponenten | |
EP3759958B1 (de) | Verfahren, vorrichtung und computerprogrammprodukt zur überwachung einer verschlüsselten verbindung in einem netzwerk | |
EP2407843A1 (de) | Sichere Datenübertragung in einem Automatisierungsnetzwerk | |
EP1556743B1 (de) | Verfahren und vorrichtung zur vermeidung einer fehlansteuerung einer werkzeugmaschine | |
EP3556047A1 (de) | Programmierbares hardware-sicherheitsmodul und verfahren auf einem programmierbaren hardware-sicherheitsmodul | |
EP3718263B1 (de) | Verfahren und steuersystem zum steuern und/oder überwachen von geräten | |
EP2499593A1 (de) | Verfahren und system zum auflösen eines namenskonfliktes | |
EP3788807B1 (de) | Verfahren zum einrichten eines kommunikationskanals zwischen einem datengerät und einem endgerät eines benutzers | |
EP2184695A1 (de) | Verfahren zum Kombinieren von Daten mit einer zur Verarbeitung der Daten vorgesehenen Vorrichtung, korrespondierende Funktionalität zur Ausführung einzelner Schritte des Verfahrens und Computerprogram zur Implementierung des Verfahrens | |
EP3954082A1 (de) | Verfahren zum sicheren austausch von verschlüsselten nachrichten | |
EP1455312B1 (de) | Verfahren und Einrichtung zur Wartung von sicherheitsrelevanten Programmcode eines Kraftfahrzeuges | |
AT520170A1 (de) | Verfahren zum sicheren Administrieren eines Schlosses, insbesondere für einen Safe, mittels eines Computers | |
DE202016103460U1 (de) | Kommunikationsteilnehmer eines Feldbussystems und Feldbussystem | |
DE102016210423A1 (de) | Verfahren und Vorrichtung zum Übertragen von Daten | |
EP1246391A1 (de) | Verfahren und System zur kryptographischen Datenkommunikation mit mehreren Instanzen | |
EP2950227B1 (de) | Authentifizierungsverfahren | |
EP4141722A1 (de) | Sicheres betreiben einer industriellen steuerungsvorrichtung zusammen mit einem ai-modul |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120321 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS AKTIENGESELLSCHAFT |
|
17Q | First examination report despatched |
Effective date: 20160316 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS AKTIENGESELLSCHAFT |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20180516 |