Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for deleting security-relevant information in a device

A technology related to information and equipment, applied in the direction of security devices, computer security devices, wireless communications, etc., can solve the problem that the manipulation sensor no longer operates the anti-manipulation function correctly

Active Publication Date: 2019-02-12
SIEMENS AG
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is also the risk that the presence manipulation sensor (also called anti-tampering function) of an accidental mobile device or of a security module contained therein will no longer function correctly and will no longer be able to perform the required anti-manipulation function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for deleting security-relevant information in a device
  • Method and apparatus for deleting security-relevant information in a device
  • Method and apparatus for deleting security-relevant information in a device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Many devices with microprocessors, such as computers, and field devices in robots, aircraft, vehicles or perhaps automation devices use encryption methods in order to communicate with communication partners in a manipulation-proof manner and / or, for example, can use Radionavigation applications of anti-manipulation signals. To this end, security-relevant information, such as encryption keys used in the encryption method, is stored in the corresponding device or is arranged in a special device in the device.

[0039] use as figure 1 The method according to the present invention as described in [0019] ensures that security-related information is deleted in a timely manner before the device becomes inoperable. In an initial state 10 of the method, security-related information is present in the device. For example, this information can be stored in a security module. In this case, at least one motion parameter of the device is determined continuously over time in method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for deleting security-relevant information in a device, having the method steps: - determining (11) at least one movement parameter of the device over time, - monitoring (12) the determined movement parameters over time depending on at least one predefined movement pattern, and - triggering (13) a process of deleting the security-relevant information if the determined movement parameter over time corresponds to the at least one predefined movement pattern. An apparatus and a computer program product for carrying out the method ensure that security-relevant data in the device are reliably and completely deleted even in the event of an accident or other unforeseen incident.

Description

technical field [0001] The present invention relates to a device and a method for deleting security-related information, such as encryption keys, contained in a mobile device or perhaps a fixed-location installed device. Background technique [0002] Mobile devices such as robots, unmanned aerial vehicles, and autonomous vehicles can store sensitive data. These sensitive data are preferably protected by encryption methods such that they can only be read by authorized entities and read in clear text. An encryption key is required for this. Such an encryption key is generated, for example, by a general key and stored in the security module. Such security-relevant information must be protected against access by unauthorized persons or against access by unauthorized devices in order to prevent manipulation of often security-critical functions that use the security-critical information. Frequently, devices are also officially permitted to operate safety-critical functions only...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88H04W12/12
CPCG06F21/88H04W12/12G06F2221/2143H04W12/02H04W12/68H04W12/082G06F21/604
Inventor R.法尔克
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products