Method for protecting a control device against manipulation
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
H04L-009/16
출원번호
US-0986808
(2007-11-26)
등록번호
US-8867746
(2014-10-21)
우선권정보
DE-10 2006 055 830 (2006-11-27)
발명자
/ 주소
Ceskutti, Holger
Schneider, Klaus
Liakos, Ioannis
출원인 / 주소
Robert Bosch GmbH
대리인 / 주소
Kenyon & Kenyon LLP
인용정보
피인용 횟수 :
2인용 특허 :
3
초록
A method for protecting a control device against manipulation in which a number of set of keys for decoding cryptographic functions is provided, a key switch being additionally provided, via which the cryptographic functions access sets of keys.
대표청구항▼
1. A computer-implemented method for protecting a control device against manipulation, comprising: reading, by a processor, via a key switch a respective different one of sets of keys;assigning, by the processor, the different cryptographic functions each to the respective different one of the assig
1. A computer-implemented method for protecting a control device against manipulation, comprising: reading, by a processor, via a key switch a respective different one of sets of keys;assigning, by the processor, the different cryptographic functions each to the respective different one of the assigned sets of keys; andexecuting, by the processor, the different cryptographic functions each based on the one of the assigned sets of keys to decode data,wherein: an access to the sets of keys is encapsulated by the key switch, the key switch permanently assigns the cryptographic functions to their respective assigned keys, and the key switch is recorded in a first memory device that is physically separate from a second memory device in which the sets of keys are recorded, wherein: the key switch is set in the first memory device during a production of the control device and is not modifiable thereafter the first memory device is an OTP memory in which the key switch is set by fusing memory cells, and the second memory device is a ROM. 2. The method according to claim 1, further comprising: providing the first memory device with an OTP memory area for recording the key switch. 3. The method according to claim 1, further comprising: providing an internal program memory for recording the cryptographic functions. 4. The method according to claim 1, further comprising: providing an external program memory for storing the cryptographic functions. 5. A computer-implemented method for executing cryptographic functions in a control device, comprising: reading, by a processor, sets of keys via a key switch for an assignment of the cryptographic functions to the sets of keys in each instance; andexecuting, by the processor, the cryptographic functions based on the assigned sets of keys to decode data,wherein: an access to the sets of keys is encapsulated by the key switch, the key switch permanently assigns the cryptographic functions to their respective assigned keys, and the key switch is recorded in a first memory device that is physically separate from a second memory device in which the sets of keys are recorded,wherein: the key switch is set in the first memory device during a production of the control device and is not modifiable thereafter the first memory device is an OTP memory in which the key switch is set by fusing memory cells, and the second memory device is a ROM. 6. The method according to claim 5, further comprising: providing the first memory device with an OTP memory area for recording the key switch. 7. The method according to claim 5, further comprising: providing an internal program memory for recording the cryptographic functions. 8. The method according to claim 5, further comprising: providing an external program memory for storing the cryptographic functions. 9. A control device for executing cryptographic functions, comprising: a first read-only memory area for recording sets of keys for decoding data; and a second memory area for recording a key switch, which enables an assignment of different cryptographic functions each to a respective one of the sets of keys,wherein: an access to the sets of keys is encapsulated by the key switch, the key switch permanently assigns the cryptographic functions to their respective assigned keys, and the first read-only memory area is located in a first memory device that is physically separate from a second memory device in which the second memory area is located,wherein: the key switch is set in the first memory device during a production of the control device and is not modifiable thereafter the first memory device is an OTP memory in which the key switch is set by fusing memory cells, and the second memory device is a ROM. 10. The control device according to claim 9, wherein the second memory area is an OTP memory area. 11. The control device according to claim 9, further comprising: an internal program memory for recording the cryptographic functions. 12. The control device according to claim 9, further comprising: an external program memory for storing the cryptographic functions. 13. A non-transitory computer-readable medium having a computer program, which is executable by a processor, comprising: a program code arrangement having program code for protecting a control device against manipulation by performing the following:reading, by a processor, via a key switch a respective different one of sets of keys;assigning, by the processor, the different cryptographic functions each to the respective different one of the assigned sets of keys; andexecuting, by the processor, the different cryptographic functions each based on the one of the assigned sets of keys to decode data,wherein: an access to the sets of keys is encapsulated by the key switch, the key switch permanently assigns the cryptographic functions to their respective assigned keys, and the key switch is recorded in a first memory device that is physically separate from a second memory device in which the sets of keys are recorded,wherein: the key switch is set in the first memory device during a production of the control device and is not modifiable thereafter the first memory device is an OTP memory in which the key switch is set by fusing memory cells, and the second memory device is a ROM. 14. The method according to claim 1, further comprising: providing the first memory device with an OTP memory area for recording the key switch;providing an internal program memory for recording the cryptographic functions; andproviding an external program memory for storing the cryptographic functions. 15. The method according to claim 5, further comprising: providing the first memory device with an OTP memory area for recording the key switch;providing an internal program memory for recording the cryptographic functions; andproviding an external program memory for storing the cryptographic functions. 16. The control device according to claim 9, further comprising: an internal program memory for recording the cryptographic functions; andan external program memory for storing the cryptographic functions;wherein the second memory area is an OTP memory area. 17. The control device according to claim 16, wherein: the key switch is set in the first memory device during a production of the control device and is not modifiable thereafter,the first memory device is an OTP memory in which the key switch is set by fusing memory cells, andthe second memory device is a ROM. 18. The method according to claim 1, further comprising: executing, by the processor, the cryptographic functions, which cause the processor to condition the decoding upon the processor determining that each of the following is true: the key switch exists in the first memory device, andthe keys in the second memory device match keys to which the cryptographic functions have been assigned by the key switch. 19. The method according to claim 5, further comprising: executing, by the processor, the cryptographic functions, which cause the processor to condition the decoding upon the processor determining that each of the following is true: the key switch exists in the first memory device, andthe keys in the second memory device match keys to which the cryptographic functions have been assigned by the key switch. 20. The device according to claim 9, wherein the cryptographic functions cause the processor to condition the decoding upon the processor determining that each of the following is true: the key switch exists in the second memory device, andthe keys in the first memory device match keys to which the cryptographic functions have been assigned by the key switch.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (3)
Pfab Stefan,DEX, Electronic data processing circuit.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.