Patent application number | Description | Published |
20120075481 | Method for authenticating a charge-coupled device (CCD) - In a method for authenticating a charge-coupled device (CCD), e.g., in a digital camera including the charge-coupled device, a physical unclonable function is utilized for the authentication. In the method, a response to be measured of pixels in the charge-coupled device to a defined incident light is used as the physical unclonable function. | 03-29-2012 |
20130003966 | Cryptographic hardware module and method for updating a cryptographic key - A cryptographic hardware module has an arithmetic unit, a memory storing at least one first key, a logic and a cryptographic device. The hardware module loads at least one second encrypted key into the hardware module and decrypts the at least one second encrypted key via the cryptographic device using the at least one first key. | 01-03-2013 |
20130117578 | METHOD FOR VERIFYING A MEMORY BLOCK OF A NONVOLATILE MEMORY - In a method for verifying a memory block of a nonvolatile memory, at a first point in time, a first authentication code for the memory block is determined while using a secret keyword and is stored in an authentication code memory table, and at a second point in time, for the verification, a second authentication code for the memory block is determined while using the secret keyword and is compared to the first authentication code and the memory block is verified if the first authentication code and the second authentication code agree. | 05-09-2013 |
20130128664 | MEMORY MODULE FOR SIMULTANEOUSLY PROVIDING AT LEAST ONE SECURE AND AT LEAST ONE INSECURE MEMORY AREA - A memory module has at least one secure and at least one insecure memory area, separate write/read electronic units for each of the memory areas and at least one shared analog circuit part such as a voltage supply circuit for supplying the write/read electronic units and/or the memory areas. | 05-23-2013 |
20140253007 | METHOD AND DEVICE FOR IDENTIFYING AN ELECTRIC MACHINE - A method for generating a challenge-response pair in an electric machine as a basis for an identification or authentication is described, the electric machine having a stator and a rotor, a first alternating voltage between two points of a first defined point pair of the electric machine being applied as a challenge, which causes an induction in the electric machine, a variable dependent on the caused induction being determined as a response. The first alternating voltage has a frequency which is higher than the working frequency of the electric machine. | 09-11-2014 |
20140298458 | DEVICE AND METHOD FOR PROCESSING DATA - An electronic device for processing data includes: an input interface for receiving input data; a processing module for processing data; and an encoding unit configured to encode data words received at the input interface as input data, in order to obtain encoded data words. The encoding unit is configured to encode the data words in such a manner that a specified proportion of all encoded data words have a specified Hamming distance and/or a specified Hamming weight. The processing module is configured to process the encoded data words. | 10-02-2014 |
20140301550 | METHOD FOR RECOGNIZING A MANIPULATION OF A SENSOR AND/OR SENSOR DATA OF THE SENSOR - A method for data transmission between a sensor and an electronic control and/or regulating unit (ECU), the transmitted sensor data (x | 10-09-2014 |
20150381372 | REDUCTION OF MEMORY REQUIREMENT FOR CRYPTOGRAPHIC KEYS - For communication of a first participant with at least one additional participant in a communication system via multiple protocols, the protocols using at least two different certificate formats, the first participant uses different certificates with the respective certificate formats for the communication via the different protocols, the different certificates being based on a shared public key. The first participant holds a shared associated private key for the different certificates. Provision of the certificates for the first participant includes generating the public key and the associated private key, signing the public key for provision of the first certificate, and signing the public key for provision of the second certificate. | 12-31-2015 |