EP3488557A1 - Securing an item of device use information of a device - Google Patents
Securing an item of device use information of a deviceInfo
- Publication number
- EP3488557A1 EP3488557A1 EP17737533.4A EP17737533A EP3488557A1 EP 3488557 A1 EP3488557 A1 EP 3488557A1 EP 17737533 A EP17737533 A EP 17737533A EP 3488557 A1 EP3488557 A1 EP 3488557A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- usage information
- data
- information
- blockchain
- transaction data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the invention relates to a method and a system for securing device usage information of a device.
- a usage may be defined, for example, over operating hours which a device is in use, or traveled distances of a vehicle.
- Such information may be stored in an electronic proof of use or electronic equipment certificate, for example a mileage counter of a vehicle or an operating hours counter of a machine or on a trustworthy server.
- the invention relates to a method for securing device usage information of a device, comprising the following steps:
- Block chain data structure is based on a cryptocurrency and includes the transaction data or a checksum of the Trans ⁇ action data;
- the block chain technology implements a distributed, subtly ⁇ rale database in which transactions are protected against manipulation can be stored. For this, transactions are stored in a block.
- a hash value of a predecessor block is stored in addition to one or more transactions.
- the protection is produced by a multi ⁇ plurality of trusted nodes in a network Blockchain- which performs a so-called mining or validating blocks.
- a new block is formed at regular intervals, for example every 10 minutes, and the hash value of an existing block is also stored.
- the validity of checked the transactions In addition, a so-called cryptographic puzzle is solved, for which the mining nodes have to apply computing capacity. The effort is, for example, by a certain amount in the
- Cryptocurrency on which the blockchain is based rewards is also referred to as proof of work detection. It is shown the solution of a rechenin ⁇ intensive task which is to be released depending on the contents of a block.
- the chain of blocks is stored at a plurality of block chain nodes, there is a synchronization of the participating nodes. The information about the transactions is therefore stored redundantly in the network.
- each node can not be trusted individually in a block is particularly validated by the fact that egg ⁇ ne certain time after the creation of the block or GeWiS ⁇ se number formed on after block Blocks is waited until the chain is long enough that you can be trusted. For example, parallel forms another chains ⁇ path that turns out to be untrusted, since the plurality of nodes gebil- transactions therein These blocks or a block are not verified, but instead form further blocks in the trusted longer chain. An attacker should not have more computational power than the rest of the blockchain in common, as otherwise he would be able to form chains that are sufficiently long enough by fraudulent mining himself.
- a blockchain data structure or block comprises transaction data and at least one hash value formed as a function of a predecessor block. This forms a chain of transactions. Once in the chain appearing transactions can not be changed unnoticed.
- the transaction data relates to one or more transactions.
- a block chain data structure is in particular a checksum of transaction data or this test ⁇ sum and other data such as a time stamp included. For example, a checksum of Transakti ⁇ onswill, which consist of a plurality of transactions, is formed.
- cryptographic hash functions are used for the check sum generation.
- Blockchains are conceivable in which mining is carried out without incentive, since, for example, all nodes are trusted.
- the transaction data are generated as a function of the device utilization information, for example by a processor of the device itself or by a central computer assigned to a plurality of devices in an automation network.
- a block-chain data structure is formed, for example by one or more blockchain nodes, which have determined the transaction data or its checksum from the network.
- the Actnut ⁇ Zung information is stored in this way protected against manipulation in a block chain.
- blocks are generated actively deposit which Gerä ⁇ teöns very a device protected against manipulation.
- the generated blockchain data structure is finally sent in parallel to a blockchain node or to a plurality of blockchain nodes, possibly also by a plurality of nodes that have formed the same blockchain data structure.
- the device is, for example, a machine for an industrial application, for example a machine tool, a construction machine, a car or an aircraft. tool or components of an industrial plant, such as drives, converters or turbines.
- the device usage data of these devices are protected against change by a decentralized security structure. Due to the distributed block chain database, the device usage information of the device can not be subsequently manipulated.
- no central trusted Stel ⁇ le or instance is required at the same time in an advantageous manner. In particular, no central instance is required which issues trusted keys to protect the device usage data.
- the device usage information can be checked by a third party at any time, even long after the block has been created. Manipulations of usage data, such as odometer manipulations, are thus prevented within the framework of an established blockchain network.
- a transaction includes the device usage information is valid only preferably, if the value of ⁇ Artificialnut Zung information is greater than that of a preceding
- the transaction data is not inserted in plain text in the blockchain, but a hash value of the transaction is formed.
- the transaction data itself is also available in the blockchain network.
- a transaction check can be performed by mining nodes or miners. The transaction data or a transaction in plain text are thus distributed in the network and in particular sent from one device to one or more blockchain nodes.
- the device usage information to a usage information of the device and an iden ⁇ approximate information of the device.
- the transaction data thus indicate usage information of the device and the associated identification information for identifying the device.
- the usage information on a duration a mileage, operating hours, conducteda ⁇ th, diagnostic data, wear data or maintenance data has in common that they are to be protected against manipulation, since they influence, for example, the value of the device or a case of liability can be declared. Therefore, these are sensitive data which should be reliably traceable for third parties.
- a hash value of the homelesssin- formation is formed, and the hash value is included in the Transakti ⁇ onschal.
- the usage information is not publicly available in the blockchain database.
- a hash value of the homelesssin- formation and is formed of a random or pseudo-random string and the hash value is included in the Transsuresda ⁇ th. This increases the confidentiality protection of the user Information in the public blockchain database again.
- the identification information is designed as a pseudonym information of the device.
- confidential information which should not be published, for example, due to contractual arrangements, in the decentralized and public data structure can be circulated.
- the pseudonym information is formed as a hash value of the identity information or as a hash value of the identity information and a random or pseudo-random string. This allows for better confidentiality protection of the identity information in the public blockchain database.
- a hash value of the Adjustment ⁇ Zung information is formed, and the hash value is in the
- Transaction data The underlying the block chain data structure transaction data thus comprise advantageously a common checksum that includes all relevant for the use of the device or the data on these Since ⁇ th based.
- the blockchain data structure has further transaction data, a timestamp, a digital signature and / or a proof of work proof.
- the transaction data or the device usage information or the usage information or the identity information is secured by means of a cryptographic checksum or a message authentication code or a digital signature or a certificate.
- an additional protection of the device usage information is provided in the decentralized blockchain data structure, which is based on a central trustworthy entity.
- the cryptographic Checksums, signatures, or certificates are generated and verified using key pairs from a PKI infrastructure.
- a particularly advantageous combination of subtle ⁇ eral and central tamper protection mechanisms is set to turn on.
- the safety of data stored in the block chain device usage information is enhanced in addition to the achieved by the formation Blockchain- including the mining safety ⁇ additionally by a cryptographic security based on a trusted authority.
- the transaction data is shared with the cryptographic
- the invention further relates to a system for securing device usage information of a device, comprising:
- a first processor for generating transaction data in dependence on the device usage information
- At least one second processor for generating a
- Blockchain data structure wherein the blockchain data structure is based on a cryptocurrency and comprises the transaction data or a checksum of the transaction data;
- At least one blockchain node for sending the generated blockchain data structure to at least one other
- the unit can be implemented in terms of hardware and / or software.
- the respective unit may be embodied as a device or as part of a device, for example as a computer or as a microprocessor.
- the respective unit as Computer program product, be designed as a function, as a routine, as part of a program code or as an executable object.
- a processor is to be understood as an electronic circuit for computer-based data processing, for example a CPU. It can be the CPU of a computer han ⁇ spindles or a microprocessor of a microchip.
- the first processor is further designed to secure the device usage information or a usage information or an identity information by means of a cryptographic checksum or a message authentication code or a certificate.
- the second processor is further configured to form a hash value via the device usage information or via the usage information or via the identity information, in each case in particular according to a combination with a random or pseudorandom character string.
- the second processor is formed on the blockchain node.
- the unit and the first Pro ⁇ cessor on the device are formed.
- the unit is the node associated with the device in an automation network, in particular a diagnostic computer.
- Figure 1 is a schematic representation of a network for
- Figure 2 is a schematic representation of a block chain according to the embodiment of the invention
- Figure 3 is a schematic representation of transaction data according to the embodiment of the invention.
- An embodiment of the invention relates to the coupling of multiple devices Dl, D2, D3, D4 via an open network NW with different block chain nodes BN1, BN2, BN3.
- these are nodes of the blockchain network Bitcoin, which uses the crypto currency Bitcoin as an incentive.
- Over the open network NW exchange of Block Chain data structures and transactions, so if several block chain nodes, especially the three exemplary ge Service ⁇ th, are responsible for the mining of blocks.
- Miner nodes large data centers that have enough computing power to solve cryptographic puzzle so quickly that they - provided a validation by other nodes and if the ge ⁇ formed by them chain continues - the remuneration for the Mining Sustainer ⁇ th.
- transaction data TD occurs in the example described by the devices Dl to D4 in each case for itself.
- a respective processor PD1 is provided on a respective device Dl.
- the formation of the transaction data TD of several devices D1 to D2 in an automation network AN is performed centrally by a higher-level instance Z.
- Transaction data TD are formed depending on a device usage information 1.
- Transaction data may include device usage information for a variety of different uses.
- transaction data includes the device usage information of multiple devices.
- a usage information of the machines is available via the diagnostic computer D. This comprises identification information 3 of the machine and utilization information 2 of the machine.
- a device usage information 1 can also be read from a respective memory of a respective device.
- FIG. 2 illustrates the principle of blockchain data structures. It is illustratively an extract from a block chain chain shown with three blocks Bl, B2, B3.
- the blocks Bl to B3 each contain the hash value of the repeat procedure ⁇ gerblockes HBP, HB1, HB2.
- the block Bl has the hash value HBp of the preceding block
- the block B2 has an entry in the data structure with the hash value HB1 of the predecessor block Bl.
- the third block B3 has the hash value HB2 of the predecessor block B2.
- FIG. 3 schematically describes a transaction TD according to an exemplary embodiment of the invention.
- Transaction ⁇ data TD have in the equipment usage information 1 in particular an identification information 3, for example, a machine ID "Siemens SiXY SN3175438".
- the transaction data TD has usage information 2 of the device, including information on operating hours, error codes, a degradation status, a next maintenance and a time stamp.
- usage information 2 of the device including information on operating hours, error codes, a degradation status, a next maintenance and a time stamp.
- the first entry a is the information "Betriebshunt: 3617”
- the second entry b is the information "Error Codes: 012 716”
- the third entry c is the information "Degradation Status: 67%”
- the fourth entry d is the information "Next maintenance : 7 weeks / 320h "and the fifth entry e contains the information” Time stamp: 20160219-102237 ".
- the transaction data TD have, in particular, in addition to the device usage information 1, a cryptographic checksum of the device usage information 1, for example a message authentication code, which is calculated by means of a cryptographic secret.
- the cryptographic checksum can in particular ⁇ sondere be a message authentication code (Message au- tication code), eg AES CBCMAC or HMAC-SHA256, or a digital signature, such as RSA PKCS # 1, DSA, ECDSA.
- a cryptographic checksum may be formed via the transaction itself, or a portion of the transaction, or through the hash value of the transaction, or via a hash value of a portion of the transaction.
- a cryptographic checksum can be formed.
- the cryptographic checksum is contained in a transaction ⁇ th, that it represents transaction data.
- the cryptographic key used to form the cryptographic checksum can be in particular a device key of the specified in the transaction data device.
- a device or a diagnostic system associated with the device can digitally signing information.
- the signature can be contained as transaction data in a transaction, which is signed with a further transaction signature key. Alternatively, the signature may be determined directly Sig ⁇ nature of the block chain transaction.
- a hash value determined from the transaction data TD is advantageously entered.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Organic Low-Molecular-Weight Compounds And Preparation Thereof (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102016215914.3A DE102016215914A1 (en) | 2016-08-24 | 2016-08-24 | Securing a device usage information of a device |
PCT/EP2017/066567 WO2018036700A1 (en) | 2016-08-24 | 2017-07-04 | Securing an item of device use information of a device |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3488557A1 true EP3488557A1 (en) | 2019-05-29 |
Family
ID=59313226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17737533.4A Ceased EP3488557A1 (en) | 2016-08-24 | 2017-07-04 | Securing an item of device use information of a device |
Country Status (7)
Country | Link |
---|---|
US (1) | US11658825B2 (en) |
EP (1) | EP3488557A1 (en) |
JP (1) | JP2019532556A (en) |
KR (1) | KR20190038939A (en) |
CN (1) | CN109845189A (en) |
DE (1) | DE102016215914A1 (en) |
WO (1) | WO2018036700A1 (en) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016215914A1 (en) | 2016-08-24 | 2018-03-01 | Siemens Aktiengesellschaft | Securing a device usage information of a device |
WO2019018282A1 (en) | 2017-07-17 | 2019-01-24 | Cryptowerk Corp. | Method and system of secure configuration of at least one electronic device |
DE102018204021A1 (en) * | 2018-03-16 | 2019-09-19 | Audi Ag | Method for exchanging data with a vehicle control unit |
DE102018204904A1 (en) * | 2018-03-29 | 2019-10-02 | Siemens Aktiengesellschaft | Device and method for monitoring an object in rail traffic |
CA3098730A1 (en) | 2018-05-10 | 2019-11-14 | Miovision Technologies Incorporated | Blockchain data exchange network and methods and systems for submitting data to and transacting data on such a network |
JP2019211821A (en) * | 2018-05-31 | 2019-12-12 | ソニー株式会社 | Information processing apparatus, information processing method and program |
CN108805571B (en) * | 2018-06-11 | 2021-02-26 | 北京京东尚科信息技术有限公司 | Data protection method, platform, block chain node, system and storage medium |
DE102018210318B4 (en) * | 2018-06-25 | 2022-12-08 | Volkswagen Aktiengesellschaft | Method for securing vehicle components and corresponding vehicle component |
GB201811263D0 (en) * | 2018-07-10 | 2018-08-29 | Netmaster Solutions Ltd | A method and system for managing digital using a blockchain |
EP3595267B1 (en) * | 2018-07-11 | 2020-06-17 | Siemens Aktiengesellschaft | Method, devices and system for exchanging data between a distributed database system and devices |
JP7056430B2 (en) * | 2018-07-18 | 2022-04-19 | 株式会社デンソー | History management method, history management device and history management system |
JP7056429B2 (en) * | 2018-07-18 | 2022-04-19 | 株式会社デンソー | History management method and history management device |
KR102135502B1 (en) * | 2018-08-09 | 2020-07-17 | 현대위아 주식회사 | Machine license verification system and registration method and authenticating method based on private block chain |
US11442926B2 (en) | 2018-09-05 | 2022-09-13 | Nhn Corporation | Method and system for storing driving record data based on block chain |
WO2020123926A1 (en) * | 2018-12-13 | 2020-06-18 | Login Id Inc. | Decentralized computing systems and methods for performing actions using stored private data |
DE102018010027A1 (en) * | 2018-12-19 | 2020-06-25 | Daimler Ag | Settlement system |
US11316841B2 (en) * | 2019-03-25 | 2022-04-26 | Micron Technology, Inc. | Secure communication between an intermediary device and a network |
US11165582B2 (en) * | 2019-05-20 | 2021-11-02 | Chia Network Inc. | Consensus layer architecture for maintaining security with reduced processing power dependency in untrusted decentralized computing platforms |
EP3889869B1 (en) * | 2019-09-02 | 2023-03-01 | Advanced New Technologies Co., Ltd. | Managing blockchain-based centralized ledger systems |
CN111226248B (en) * | 2019-09-02 | 2024-03-26 | 创新先进技术有限公司 | Managing a blockchain-based centralized ledger system |
US20210083876A1 (en) * | 2019-09-17 | 2021-03-18 | Micron Technology, Inc. | Distributed ledger appliance and methods of use |
SG11202102600QA (en) | 2020-04-22 | 2021-04-29 | Alipay Hangzhou Inf Tech Co Ltd | Managing transaction requests in ledger systems |
SG11202103218YA (en) | 2020-04-22 | 2021-04-29 | Alipay Hangzhou Inf Tech Co Ltd | Managing transaction requests in ledger systems |
EP3837657B1 (en) | 2020-04-22 | 2022-12-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
US20210392003A1 (en) * | 2020-06-12 | 2021-12-16 | Login Id Inc. | Decentralized computing systems and methods for performing actions using stored private data |
JP7413231B2 (en) | 2020-11-04 | 2024-01-15 | 株式会社東芝 | Information processing method, information processing system, and information processing device |
AT524500B1 (en) * | 2020-12-04 | 2023-02-15 | Plasser & Theurer Export Von Bahnbaumaschinen Gmbh | Method and system for operating a railway system |
KR102575305B1 (en) * | 2021-07-26 | 2023-09-06 | 세종대학교산학협력단 | Method for handling charge, computing device for executing the method |
US11854009B2 (en) | 2021-10-07 | 2023-12-26 | Chia Network Inc. | Method for pooling in a proof-of-space-based blockchain via singletons |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005051734A (en) | 2003-07-15 | 2005-02-24 | Hitachi Ltd | Electronic document authenticity assurance method and electronic document disclosure system |
JP4248330B2 (en) * | 2003-07-31 | 2009-04-02 | トヨタ自動車株式会社 | Component usage history collection system |
US7653816B2 (en) * | 2003-12-30 | 2010-01-26 | First Information Systems, Llc | E-mail certification service |
US8893231B2 (en) | 2006-11-16 | 2014-11-18 | Nokia Corporation | Multi-access authentication in communication system |
US10547687B2 (en) * | 2007-01-17 | 2020-01-28 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
JP2008294596A (en) | 2007-05-23 | 2008-12-04 | Hitachi Ltd | Authenticity assurance system for spreadsheet data |
US20100027780A1 (en) | 2007-10-04 | 2010-02-04 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Systems and methods for anonymizing personally identifiable information associated with epigenetic information |
JP5112348B2 (en) * | 2008-01-18 | 2013-01-09 | 株式会社 自動車生活総合研究所 | Vehicle management history authentication system and method |
US9755833B2 (en) | 2008-12-03 | 2017-09-05 | Nec Corporation | Identification information management system, method of generating and managing identification information, terminal, and generation and management programs |
JP5841765B2 (en) | 2010-03-31 | 2016-01-13 | 有限会社 杉浦技術士事務所 | Surgery schedule determination apparatus and method |
JP2013094318A (en) | 2011-10-31 | 2013-05-20 | Fujifilm Corp | Medical device, medical device system, and medical device maintenance method |
US8949823B2 (en) * | 2011-11-16 | 2015-02-03 | Flextronics Ap, Llc | On board vehicle installation supervisor |
US10340038B2 (en) * | 2014-05-13 | 2019-07-02 | Nant Holdings Ip, Llc | Healthcare transaction validation via blockchain, systems and methods |
US9373200B2 (en) | 2014-06-06 | 2016-06-21 | Vivint, Inc. | Monitoring vehicle usage |
DE102014224202A1 (en) | 2014-11-27 | 2016-06-02 | Robert Bosch Gmbh | A method for providing vehicle data of a vehicle, method for evaluating vehicle data of at least one vehicle and method for monitoring a traffic event |
US10755566B2 (en) * | 2014-12-02 | 2020-08-25 | Here Global B.V. | Method and apparatus for determining location-based vehicle behavior |
EP3256998A1 (en) * | 2015-02-11 | 2017-12-20 | British Telecommunications Public Limited Company | Validating computer resource usage |
CA2991905C (en) * | 2015-07-10 | 2020-04-28 | Whether or Knot LLC | Systems and methods for electronic data distribution |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US9779557B2 (en) * | 2015-08-18 | 2017-10-03 | Carfit Corp. | Automotive activity monitor |
US20170132625A1 (en) * | 2015-11-05 | 2017-05-11 | Mastercard International Incorporated | Method and system for use of a blockchain in a transaction processing network |
CN105591753A (en) * | 2016-01-13 | 2016-05-18 | 杭州复杂美科技有限公司 | Application method of CA certificate on block chain |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
US10679215B2 (en) * | 2016-02-22 | 2020-06-09 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
US10022613B2 (en) * | 2016-05-02 | 2018-07-17 | Bao Tran | Smart device |
US20180284745A1 (en) * | 2016-05-09 | 2018-10-04 | StrongForce IoT Portfolio 2016, LLC | Methods and systems for self-organization of collected data using 3rd party data from a data marketplace in an industrial internet of things environment |
US10755327B2 (en) * | 2016-07-18 | 2020-08-25 | Royal Bank Of Canada | Distributed ledger platform for vehicle records |
DE102016215914A1 (en) | 2016-08-24 | 2018-03-01 | Siemens Aktiengesellschaft | Securing a device usage information of a device |
-
2016
- 2016-08-24 DE DE102016215914.3A patent/DE102016215914A1/en not_active Ceased
-
2017
- 2017-07-04 KR KR1020197008450A patent/KR20190038939A/en not_active Application Discontinuation
- 2017-07-04 EP EP17737533.4A patent/EP3488557A1/en not_active Ceased
- 2017-07-04 CN CN201780065900.6A patent/CN109845189A/en active Pending
- 2017-07-04 US US16/326,782 patent/US11658825B2/en active Active
- 2017-07-04 WO PCT/EP2017/066567 patent/WO2018036700A1/en unknown
- 2017-07-04 JP JP2019510857A patent/JP2019532556A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US11658825B2 (en) | 2023-05-23 |
WO2018036700A1 (en) | 2018-03-01 |
DE102016215914A1 (en) | 2018-03-01 |
CN109845189A (en) | 2019-06-04 |
JP2019532556A (en) | 2019-11-07 |
KR20190038939A (en) | 2019-04-09 |
US20190190720A1 (en) | 2019-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3488557A1 (en) | Securing an item of device use information of a device | |
EP3488555B1 (en) | Secure processing of an authorisation verification request | |
EP3108610B1 (en) | Method and system for creating and checking the validity of device certificates | |
EP3610605B1 (en) | Method and device for generating a cryptographic timestamp for a digital document on a majority basis | |
EP3673623B1 (en) | Method and control system for controlling and/or supervising of devices | |
EP3488556B1 (en) | Secure configuration of a device | |
EP3382616A1 (en) | Method and device for computer-assisted provision of a secure digital twin | |
EP3292496B1 (en) | Apparatus and method for using a customer device certificate on a device | |
EP3777088B1 (en) | Method and system for controlling a release of a resource | |
EP3763089B1 (en) | Method and control system for controlling and/or supervising of devices | |
EP4147099A1 (en) | System and method for verifying components of an industrial monitoring system | |
EP3422274A1 (en) | Method for configuring or changing a configuration of a payment terminal and/or for allocating a payment terminal to an operator | |
WO2019081434A1 (en) | Method and control system for controlling and/or monitoring devices | |
EP3718263B1 (en) | Method and control system for controlling and/or supervising of devices | |
WO2020193136A1 (en) | Intrusion detection for computer systems | |
EP4169207B1 (en) | Method, devices and system for exchanging data between a distributed database system and devices | |
DE102016215520A1 (en) | Method and arrangement for secure electronic data communication | |
EP3734478A1 (en) | Method for allocating certificates, management system, use of same, technical system, system component and use of identity provider | |
EP3617976A1 (en) | Method for operating a distributed database system, distributed database system, and industrial automation | |
EP3671599A1 (en) | Distributed database system, industry automation system and method for operating a distributed database system | |
WO2023169926A1 (en) | Requesting a certificate in a documented manner using a registration point | |
EP3907959A1 (en) | Secure data export from a distributed database system | |
WO2024012624A1 (en) | Method for securely generating a token which can be issued, method for securely destroying a token, and token issuer | |
EP4322471A1 (en) | Method for identity comparison of transmitted data within a publish-subscribe based communication network | |
EP3829103A1 (en) | Device and method for forming blocks of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20190220 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200414 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20210427 |