EP3323050A1 - Zwischenmodul zur steuerung einer kommunikation zwischen einem datenverarbeitungsgerät und einem peripheriegerät - Google Patents
Zwischenmodul zur steuerung einer kommunikation zwischen einem datenverarbeitungsgerät und einem peripheriegerätInfo
- Publication number
- EP3323050A1 EP3323050A1 EP15742204.9A EP15742204A EP3323050A1 EP 3323050 A1 EP3323050 A1 EP 3323050A1 EP 15742204 A EP15742204 A EP 15742204A EP 3323050 A1 EP3323050 A1 EP 3323050A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data processing
- processing device
- intermediate module
- communication interface
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/105—Program control for peripheral devices where the programme performs an input/output emulation function
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/102—Program control for peripheral devices where the programme performs an interfacing function, e.g. device driver
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/14—Handling requests for interconnection or transfer
- G06F13/20—Handling requests for interconnection or transfer for access to input/output bus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- the present invention relates to the control of communication between a data processing device and a peripheral device.
- Modern data processing devices are usually equipped with communication interfaces to which peripheral devices such as memory, in particular USB memory or keyboards, can be connected.
- peripheral devices such as memory, in particular USB memory or keyboards
- peripherals can be used for attacks on data processing equipment. For example, by means of a
- Peripheral devices are an attempt to install unwanted software on a data processing device.
- a protection of data processing equipment against unwanted access by peripheral devices is possible for example by deactivating certain communication interfaces of the data processing equipment.
- deactivating certain communication interfaces of the data processing equipment are often difficult due to the widespread use and importance of peripherals
- the invention is based on the finding that the above object is achieved by an intermediate module which controls the communication between a data processing device and a peripheral device.
- This intermediate module includes communication interfaces for connecting a data processing device and a peripheral device.
- the intermediate module emulates functionalities of the data processing device and the
- Peripheral to the peripheral device connecting to a data processing device and / or the data processing device connecting a peripheral device
- the intermediate module can forward the received data of the
- the invention relates to an intermediate module for controlling a communication between a data processing device and a peripheral device, having a first data processing device with a first communication interface, which can be connected to a communication interface of the peripheral device, wherein the first data processing device is designed to have a functionality of
- Emulating data processing apparatus and receiving the receive data from the peripheral device via the first communication interface; a second
- Data processing device with a second communication interface, which is connectable to a communication interface of the data processing device, wherein the first data processing device is designed to have a functionality of
- communication technology is arranged and configured between the first data processing device and the second data processing device, the receiving data to the second data processing device for forwarding to the
- the intermediate module allows a more secure connection of the peripheral device to the data processing device. From the perspective of the peripheral device is the first
- Data processing device part of the data processing device, and from the perspective of
- the second data processing device is a peripheral device with a specific functionality.
- the third data processing device may be configured to receive data received from the peripheral device to the first
- Data processing device are intended to receive and to the second
- the second data processing device can make this forwarded data available to the data processing device. Thus it can be guaranteed that no direct connection between the
- Peripheral device and the data processing device exists. Furthermore, only a certain functionality of the peripheral device, for example a memory function, can be emulated in the second data processing device.
- An unintentional access attempt by a manipulated peripheral device, for example a mass memory, which unnoticeably logs on to the data processing device as a keyboard to make inputs, can thus be prevented, since due to the emulated memory function in the second Data processing device no keystrokes are forwarded to the data processing device.
- Emulation is the imitation of the behavior of a system by another technical system.
- intermediate module functionalities of the
- Data processing device or the first data processing device mimicked.
- the intermediate module may include a memory and / or a processor to the operation of the first data processing device, the second
- the memory can be a flash memory. Data of the peripheral device can be temporarily stored in the memory in order to make it available to the data processing device.
- the processor may be a microprocessor.
- the third data processing device is designed to check the received data with regard to a predetermined forwarding rule and only forward it to the second data processing device for forwarding to the data processing device if the forwarding rule is met.
- the forwarding rule may be in a memory of the memory associated with the third data processing device
- the third data processing device is configured, according to the forwarding rule, only receive data which comprise files of a specific file type, in particular text files, graphics files, or
- Unwanted file types can, for example, executable files, such as EXE files, which are stored in a hidden memory of the USB stick.
- the USB stick can be configured to plug in after plugging in
- Data processing device transmits such unwanted file to the data processing device.
- the forwarding rule of the intermediate module limits the transmission to certain types of files, such as Word documents, it is possible to efficiently prevent transmission of the unwanted file to the data processing device.
- the third data processing device is configured, according to the forwarding rule, only receive data which comprises a specific content, in particular files with a specific signature, to the second
- Data processing device for forwarding to the data processing device
- the third data processing device is designed to control the emulation of the functionality of the data processing device in the first data processing device and the emulation of the functionality of the peripheral device in the second data processing device.
- the third data processing device can not be designed to be visible for the peripheral device or the data processing device.
- the third data processing device is embodied, only the emulation of certain functionalities of the peripheral device, in particular memory functionalities or control functionalities, in the second
- the intermediate module for peripherals can be designed with a specific functionality.
- the intermediate module can be used for different Peripheral devices, such as storage devices, input devices or output devices to be designed.
- Peripheral devices such as storage devices, input devices or output devices to be designed.
- the first communication interface and the second communication interface are each one of the following
- USB communication interface USB communication interface
- PS / 2 communication interface SATA communication interface
- HDMI communication interface DisplayPort communication interface
- Ethernet communication interface Ethernet communication interface
- Bluetooth communication interface Bluetooth communication interface
- WLAN communication interface Wireless Fidelity
- UMTS communication interface LTE communication interface.
- the first communication interface and the second communication interface are each USB interfaces, and the first data processing device emulates a USB host controller and the second
- USB peripheral device a USB peripheral device.
- USB peripherals Data processing equipment with USB peripherals can be used.
- the data processing device can be effectively protected from manipulated USB peripherals, so-called BadUSB devices.
- the intermediate module comprises a display and / or a control element in order to indicate to a user an activity of the intermediate module and / or to a user the confirmation of a forwarding of
- the control element can be at least one push-button switch, a number pad, a keyboard or a touch display.
- the display can be at least one illuminated display or a display, for example an LCD display or a foil display.
- the third data processing device is connected to the display and / or the control element for control and / or communication. This has the advantage that the display and the control element only from the third
- Data processing device can be controlled, and that the peripheral device or the data processing device can not influence the display, or simulate an actuation of the control element. In this way, efficient communication between the intermediate module and the user can be ensured.
- the third data processing device is configured, the forwarding of receive data to the second
- Data processing device after receiving an acknowledgment signal, in particular an actuation of the operating element or an operation of an operating function of a connected peripheral device to perform.
- Data processing device can only be done at a user-specified time. For example, a forwarding of received data, during the booting of the data processing device by the user can be prevented by the
- the user may be prompted to press a key combination displayed on the display on the control or attached peripheral device. In this way, a forwarding of receive data from
- Interim module predefined key combination on a connected keyboard the authenticity of this keyboard are confirmed.
- the third data processing device is configured to forward received data to the second data processing device only in certain time segments, the time segments being based on the third data processing device
- the intermediate module can forward the received data to the data processing device only after a certain time.
- the data processing device completely booted and, for example, a virus scanner is active before receiving data of the peripheral device are forwarded.
- the third data processing device is designed to receive the received data as a function of an operating state of the
- Data processing device for example, be transferred to the data processing device during the booting of an operating system.
- the third data processing device is designed, a memory of the peripheral device to the second
- unwanted software may be prevented from becoming visible in a hidden memory of the peripheral device after a virus scan, or unwanted software in the memory of the peripheral device may be adapting to an operating system of the computing device.
- the intermediate module comprises further
- Communication interfaces for connecting other peripheral devices wherein the further communication interfaces are connected to the first data processing device.
- the second emulates
- Data processing device further functionalities of other peripherals and is the third data processing device is designed to forward further receive data to the second data processing device for forwarding to the data processing device only if the further receive data fulfills further forwarding rules.
- each peripheral device can be assigned a certain functionality with certain forwarding rules.
- the other peripherals may be, for example, a USB keyboard, a USB mouse and a USB mass storage device, which are operated simultaneously.
- the second data processing device is designed to transmit transmission data from the data processing device via the second
- Receive communication interface, and the first data processing device is adapted to provide the transmission data to the peripheral device, wherein the third data processing device, the transmission data from the second
- Data processing device to the first data processing device for forwarding to the peripheral device forwards.
- This has the advantage that a transfer of data from the data processing device to the peripheral device via the intermediate module can take place.
- the third data processing device is designed to check the transmission data with regard to a predetermined transmission rule and to forward it to the first data processing device for forwarding to the peripheral device only when the transmission rule has been fulfilled.
- the invention relates to a data processing device for
- Data processing device is integrated.
- the presented methods and systems can be of various types.
- the individual elements described may be realized by hardware or software components, for example electronic components that can be manufactured by various technologies and include, for example, semiconductor chips, ASICs, microprocessors, digital signal processors, integrated electrical circuits, electro-optical circuits and / or passive components.
- the presented data processing devices for connecting the module may be computers, notebooks, or smartphones. It can also be server, or
- the data processing devices can with other
- the presented peripherals can be of different types and have different functions. These may include storage devices, input devices, or output devices. Storage devices can, for example, USB sticks, external
- Hard disks, or memory cards or memory card readers are hard disks, or memory cards or memory card readers.
- Input devices may be, for example, keyboards, mice, touchpads, webcams, or microphones
- output devices may include, for example, displays, headphones
- the peripheral devices may also be other data processing devices, for example smartphones, MP3 players, or notebooks, which can be connected to a data processing device via the intermediate module.
- FIG. 1 is a schematic representation of an intermediate module connecting a peripheral device to a data processing device
- FIG. 2 shows a schematic representation of an intermediate module which connects input devices to a data processing device
- Fig. 3 is a schematic representation of a peripheral device, which without
- Intermediate module is connected to a data processing device.
- Fig. 1 shows a schematic representation of an intermediate module 100, which a
- Peripheral device 101 connects to a data processing device 103.
- the intermediate module 100 comprises a first communication interface 105, a second communication interface 109, a first data processing device 1 13, a second data processing device 1 15 with forwarded receive data 121 and a third data processing device 1 17.
- the peripheral device 101 is designed as a storage device and comprises a communication interface 107, a Memory 123, which contains data 1 19, and a hidden memory 125, which contain unwanted data 127.
- the data processing device 103 comprises a communication interface 1 1 1.
- the intermediate module 100 is used to control a communication between a
- the first data processing device 1 13 is connected to a first communication interface 105, which communicates with a communication interface 107 of the
- Peripheral device 101 is connectable, wherein the first data processing device 1 13 is configured to emulate a functionality of the data processing device 103 and receiving receive data from the peripheral device 101 via the first communication interface 105.
- the second data processing device 1 15 is connected to a second
- Communication interface 1 1 1 of the data processing device 103 is connectable, wherein the second data processing device 1 15 is adapted to emulate a functionality of the peripheral device 101 and the received data to the
- the third data processing device 1 17 is communication technology between the first data processing device 1 13 and the second data processing device 1 15 arranged and configured, the receive data to the second
- the intermediate module 100 allows a more secure connection of the peripheral device 101 to the data processing device 103. From the perspective of the peripheral device is the first
- Data processing device 1 13 part of the data processing device 103, and from the perspective of the data processing device 103, the second data processing device 1 15 is a peripheral device 101 with a specific functionality.
- the third data processing device 1 13 is a peripheral device 101 with a specific functionality.
- Data processing device 1 17 may be configured to receive receive data, which are sent from the peripheral device 101 to the first data processing device 1 13 and which are intended for the data processing device 103, and to forward it to the second data processing device 1 15.
- the second data processing device 15 can make this forwarded data available to the data processing device 103.
- it can be ensured that there is no direct connection between the peripheral device 101 and the data processing device 103.
- only a certain functionality of the peripheral device 101 for example a memory function, can be emulated in the second data processing device 15. An unnoticed
- a manipulated peripheral device 101 for example a
- Mass memory which unnoticed logs in the data processing device as a keyboard to make unnoticed inputs, can thus be prevented because due to the emulated memory function in the second data processing device 1 15 no keystrokes are forwarded to the data processing device 103.
- Emulation is the imitation of the behavior of a system by another technical system.
- Data processing device 1 13 mimicked.
- the intermediate module 100 may include a memory and / or a processor to control the operation of the first data processing device 1 13, the second
- the memory can be a flash memory.
- Memory data 1 19 of the peripheral device 101 can be temporarily stored to provide this to the data processing device 103.
- the processor may be a microprocessor.
- the first communication interface 105 and the second communication interface 109 may be configured as USB interfaces and the first data processing device 1 13 may emulate a USB host controller.
- the intermediate module 100 can be used to connect USB peripherals, for example, USB sticks.
- the third data processing device 1 17 can control the emulation of a functionality of the peripheral device 101 in the second data processing device 15.
- This functionality may, for example, be a memory functionality, in particular stored data 11, or a control functionality of the peripheral device 101.
- the third data processing device 1 17 can apply a forwarding rule in the transmission of received data.
- This forwarding rule may be configured to allow only the transmission of receive data comprising files of a certain file type or files with a specific content to the first data processing device 15.
- the permitted file types may be, for example, text files,
- Graphics files or video files for example, the files with certain contents may be signed files
- Peripheral device 101 in Fig. 1 is a manipulated storage device, such as a BadUSB device.
- the manipulated storage device includes a public memory 123 with data 1 19 for transmission to the computing device 103 and a hidden memory 125 containing unwanted data 127.
- the third data processing device 1 17 in FIG. 1 forwards receive data to the second data processing device 15 in accordance with the forwarding rule.
- the data processing device 103 can only on the second
- Data processing device 1 15 and thus access only the forwarded receive data 121 of the storage device, but not on the storage device itself. Thus, a transfer of unwanted data 127 to the data processing device 103 can be prevented.
- the received data which are received by the first data processing device 1 13 and forwarded to the second data processing device 15, may be the data 1 19 in the memory 123 of the peripheral device 101.
- the third data processing device 1 17 may be configured to forward the transmission of received data to the second data processing device 15 only in certain
- Time sections which are stored on the third data processing device 1 17, or to allow in dependence on an operating state of the data processing device 103. If the data processing device 103 is a computer, it can be ensured in this way that the boot process of a
- Receive data is completely completed and a virus scanner, which is installed on the data processing device 103, is fully activated.
- the third data processing device 1 17 can be configured, after connecting the peripheral device 103, to completely transfer a memory 123 of the peripheral device 101 to the second data processing device 15 and make it available to the data processing device 103 and to further transfer data from the peripheral device 101 to the second Data processing device 1 15 to prevent.
- the memory of the peripheral device 101 may be a visible memory 123, which can be completely transferred to the second data processing device 15 1.
- the hidden memory 125 is not transmitted. Unwanted data 127, which may be in the hidden memory 125, consequently can not be applied to the
- Data processing device 1 15 access.
- FIG. 2 shows a schematic representation of an intermediate module 100, which
- Input devices with the data processing device 103 connects.
- the intermediate module 100 comprises a first communication interface 105, a second communication interface 109, a first data processing device 1 13, a second data processing device 1 15, a third data processing device 1 17, as well as a display 201 and an operating element 203.
- the illustrated input devices are a keyboard 205 and a Mouse 207.
- the data processing device 103 comprises a
- the third data processing device 1 17 may be designed to control the display 201 and the operating element 203. Thus, influencing the display 201 or the operating element 203, for example, preventing an indication signal or a pretense of an operation of the operating element 203, from the side of
- Peripheral device 101 or the data processing device 103 can be prevented.
- the display 201 may be configured to prompt a user, prior to forwarding receive data, such as keypad 205 or mouse 207 inputs, to the second data processing device 15 for actuating the control element 203 or to actuate an operating function of the connected input device.
- receive data such as keypad 205 or mouse 207 inputs
- intermediate module 100 may prompt the user to actuate a particular key combination, for example, simultaneously pressing multiple keys on keyboard 205 or mouse 207.
- the information which keys must be pressed on the input device can be stored in the third data processing device 1 17.
- the third data processing device 1 17 can transmit the receive data of the peripheral device 101 to the second data processing device 15.
- the intermediate module 100 may comprise further communication interfaces for connecting further peripheral devices, wherein the further communication interfaces may be connected to the first data processing device 13, and wherein the second data processing device 15 may be designed to emulate further functionalities in order to simultaneously supply further peripheral devices with different functionalities operate.
- the third data processing device 1 17 may be formed the
- FIG. 3 shows a schematic representation of a peripheral device 101 which is connected to a data processing device 103 without an intermediate module 100.
- the communication interface 1 1 1 of the data processing device 103 is connected to the communication interface 107 of the peripheral device 101. Unwanted data 127 in the hidden memory 125 of the peripheral device 101 may be applied to the
- peripheral device 101 in FIG. 3 may be a storage device having hidden, unwanted functionality, such as a keyboard function.
- the computing device 103 may not recognize this keyboard function as unwanted functionality.
- Data processing device 103 protect against such unwanted access attempts.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Information Transfer Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2015/066296 WO2017008860A1 (de) | 2015-07-16 | 2015-07-16 | Zwischenmodul zur steuerung einer kommunikation zwischen einem datenverarbeitungsgerät und einem peripheriegerät |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3323050A1 true EP3323050A1 (de) | 2018-05-23 |
Family
ID=53758185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15742204.9A Ceased EP3323050A1 (de) | 2015-07-16 | 2015-07-16 | Zwischenmodul zur steuerung einer kommunikation zwischen einem datenverarbeitungsgerät und einem peripheriegerät |
Country Status (7)
Country | Link |
---|---|
US (1) | US20180203809A1 (de) |
EP (1) | EP3323050A1 (de) |
JP (1) | JP2018519591A (de) |
KR (1) | KR20180030497A (de) |
CN (1) | CN107835987A (de) |
CA (1) | CA2989064A1 (de) |
WO (1) | WO2017008860A1 (de) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102017128655A1 (de) * | 2017-12-04 | 2019-06-06 | Anna Elischer | Verbindungseinheit und verfahren zur zugriffssteuerung |
FR3074934B1 (fr) * | 2017-12-07 | 2019-12-20 | Thales | Systeme et procede de protection d'un systeme informatique |
GB201802454D0 (en) * | 2018-02-15 | 2018-04-04 | Sec Dep For Foreign And Commonwealth Affairs | Methods and devices for removing unwanted data from original data |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5946469A (en) * | 1995-11-15 | 1999-08-31 | Dell Computer Corporation | Computer system having a controller which emulates a peripheral device during initialization |
JP2004102716A (ja) * | 2002-09-10 | 2004-04-02 | Seiko Epson Corp | シリアルインターフェースを有する電子装置 |
US7284278B2 (en) * | 2003-03-04 | 2007-10-16 | Dell Products L.P. | Secured KVM switch |
FR2949888B1 (fr) * | 2009-09-04 | 2014-12-26 | Thales Sa | Dispositif de protection contre les logiciels malveillants et ordinateur comprenant le dispositif. |
US8667191B2 (en) * | 2010-01-15 | 2014-03-04 | Kingston Technology Corporation | Managing and indentifying multiple memory storage devices |
WO2011145095A2 (en) * | 2010-05-20 | 2011-11-24 | High Sec Labs Ltd. | Computer motherboard having peripheral security functions |
CN104657671B (zh) * | 2013-11-19 | 2019-03-19 | 研祥智能科技股份有限公司 | 移动存储设备的接入权限管理方法和系统 |
-
2015
- 2015-07-16 JP JP2017564133A patent/JP2018519591A/ja active Pending
- 2015-07-16 KR KR1020187000246A patent/KR20180030497A/ko unknown
- 2015-07-16 EP EP15742204.9A patent/EP3323050A1/de not_active Ceased
- 2015-07-16 CN CN201580081640.2A patent/CN107835987A/zh active Pending
- 2015-07-16 CA CA2989064A patent/CA2989064A1/en not_active Abandoned
- 2015-07-16 US US15/744,242 patent/US20180203809A1/en not_active Abandoned
- 2015-07-16 WO PCT/EP2015/066296 patent/WO2017008860A1/de active Application Filing
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2017008860A1 * |
Also Published As
Publication number | Publication date |
---|---|
CA2989064A1 (en) | 2017-01-19 |
WO2017008860A1 (de) | 2017-01-19 |
CN107835987A (zh) | 2018-03-23 |
JP2018519591A (ja) | 2018-07-19 |
US20180203809A1 (en) | 2018-07-19 |
KR20180030497A (ko) | 2018-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE112018002031B4 (de) | Sichern einer betriebssystemkonfiguration unter verwendung von hardware | |
EP1818844B1 (de) | Verfahren zur Benutzung von Sicherheitstoken | |
EP3437012B1 (de) | Verfahren, prozessor und gerät zur integritätsprüfung von nutzerdaten | |
DE112017003335T5 (de) | Maschinelles lernen in gegnerischen umgebungen | |
EP2602738A2 (de) | Vorrichtung zum Schutz von Sicherheitstoken gegen Malware | |
EP3430558B1 (de) | Erkennen einer abweichung eines sicherheitszustandes einer recheneinrichtung von einem sollsicherheitszustand | |
DE20314722U1 (de) | Vorrichtung für sicheren Zugriff auf Digitalmedien-Inhalte, virtueller Multischnittstellen-Treiber und System für sicheren Zugriff auf Digitalmedien-Inhalte | |
DE102005008081A1 (de) | Steuerungssystem zum Steuern einer Vielzahl von Zielrechnern | |
EP3323050A1 (de) | Zwischenmodul zur steuerung einer kommunikation zwischen einem datenverarbeitungsgerät und einem peripheriegerät | |
EP2541455B1 (de) | Methode und Verfahren für PIN-Eingaben bei konsistentem Software-Stack auf Geldautomaten | |
WO2016139079A1 (de) | Schutz von speicherinhalten eines speichers eines computersystems unter verwendung einer hashfunktion | |
DE112020003881T5 (de) | System und verfahren zur durchführung von trusted computing mit fernbescheinigung und informationsisolierung auf heterogenen prozessoren über eine offene verbindung | |
WO2019242971A1 (de) | Recheneinrichtung und betriebsverfahren hierfür | |
DE10296595B4 (de) | Verfahren und Einrichtung zum Verarbeiten von Echtzeitereignissen, die einem Drahtloskommunikationsprotokoll zugeordnet sind | |
DE102015111534A1 (de) | Zwischenmodul zur Steuerung einer Kommunikation zwischen einem Datenverarbeitungsgerät und einem Peripheriegerät | |
DE102013226700A1 (de) | Fahrzeugelektronikeinheit | |
EP2191407A2 (de) | Verfahren zum prüfen einer auf einer ersten einrichtung auszuführenden oder zu installierenden version eines softwareproduktes | |
EP3752911B1 (de) | Verfahren zum installieren eines programmcodepakets in ein gerät sowie gerät und kraftfahrzeug | |
DE102012217312B4 (de) | Verfahren und System zur Aktualisierung von Code in Verarbeitungssystemen | |
DE602006000796T2 (de) | Informationsverarbeitungsvorrichtung und Verfahren zur Betriebssteuerung dafür | |
EP1756697A2 (de) | Abnehmbares sicherheitsmodul | |
DE102021211755A1 (de) | Verfahren zur Gewährleistung einer IT-Sicherheit einer Automatisierungsanlage und Sicherheitssystem | |
DE102009004430A1 (de) | Manipulationssicherheit eines Endgeräts | |
DE102019214541A1 (de) | Rechenvorrichtung und Verfahren zum Erkennen einer Bedrohung in einer virtuellen Einheit | |
WO2010108911A1 (de) | Verfahren und vorrichtung zur sicheren verarbeitung von eingabedaten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20171207 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200527 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20210806 |