NETWORK UNIT OF ELECTRONIC APPLIANCES, NETWORK OF ELECTRONIC APPLIANCES, AND METHOD OF USING CHIP IDENTIFICATION DEVICE

    公开(公告)号:EP3118770B1

    公开(公告)日:2019-10-30

    申请号:EP16179645.3

    申请日:2016-07-15

    申请人: Watanabe, Hiroshi

    发明人: Watanabe, Hiroshi

    IPC分类号: G06F21/73 H04L9/32

    摘要: A technology precluding attacks through peripheral devices (410, 420, 430, 440, 450) thefts to a network of electronic appliances, by utilizing physical chip identification devices (21, 22, 60), is disclosed. The electronic appliances in the network are divided into the peripheral devices (410, 420, 430, 440, 450) and the stem servers managing the registration information of the peripheral devices (410, 420, 430, 440, 450). The stem servers are under the central control with software, and the peripheral devices (410, 420, 430, 440, 450) are controlled at device-level with the physical chip identification devices implemented in the chip. Thus, the security of the whole network is efficiently enhanced.

    METHOD AND SYSTEM FOR AUTHENTICATING A COMPONENT IN A POWER CONVERTER

    公开(公告)号:EP3525125A1

    公开(公告)日:2019-08-14

    申请号:EP19154185.3

    申请日:2019-01-29

    摘要: There are provided methods (100) and apparatuses for authenticating components in an electric machine. For example, there is provided a method (100) for authenticating parts of an electric machine. The method (100) includes fetching (104), using a controller, identification data associated with a set of parts and performing a first verification step (106) on the identification data, for each part in the set. The method (100) further includes performing a second verification step (114) on the identification data, in response to the first verification step (106) being successful (108). The second verification step (114) includes comparing the identification data with data from a database that includes identification information associated with manufactured parts. Furthermore, the method (100) includes, in response to one of the first verification step and the second verification step being unsuccessful (108), issuing by the controller, a command to disable the electric machine.

    DEVICE AUTHENTICATION
    45.
    发明公开

    公开(公告)号:EP3518131A1

    公开(公告)日:2019-07-31

    申请号:EP18213787.7

    申请日:2018-12-18

    申请人: INTEL Corporation

    摘要: A device includes a microcontroller, memory including secure memory to store a private key, a set of registers, and an authentication engine. The set of registers includes a write mailbox register and a read mailbox register, and message data is to be written to the write mailbox register by a host system. The message data includes at least a portion of a challenge request, and the challenge request includes a challenge by the host system to authenticity of the device. The authentication engine generates a response to the challenge, where the response includes data to identify attributes of the device and a signature generated using the private key. The authentication engine causes at least a portion of the response to be written to the read mailbox register to be read by the host system.

    METHOD FOR PROTECTING THE CONFIDENTIALITY AND INTEGRITY OF FIRMWARE FOR AN INTERNET OF THINGS DEVICE

    公开(公告)号:EP3457310A1

    公开(公告)日:2019-03-20

    申请号:EP18190907.8

    申请日:2018-08-27

    申请人: NXP B.V.

    发明人: DOLIWA, Peter

    IPC分类号: G06F21/57 G06F21/73 G06F21/79

    摘要: A method is provided for secure firmware provisioning of a device. In the method, an integrated circuit (IC) is manufactured by a first entity for use in the device. The IC is provided to a second entity for manufacturing the device using the IC. The IC has a unique identifier (UID) and secret key derivation data (KDD). A secure memory is provided to a third entity. The secure memory has a first key pair, and the secure memory is used with a firmware provisioning toolchain of the second entity. During manufacturing of the device by the second entity, the secure memory is enabled to verify the IC by verifying the UID. The secure memory stores a firmware decryption key and is enabled to encrypt the firmware decryption key. The encrypted firmware decryption key is then provided to the IC, and the IC decrypts the encrypted firmware decryption key for use by the IC in decrypting the firmware.