Patents by Inventor Aliza Maftun

Aliza Maftun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12192348
    Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: January 7, 2025
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20240356764
    Abstract: Various embodiments of the teachings herein include a method for assigning a digital model to a physical component of an automation system. An example method includes: consulting a physical component with a piece of link information referring to a digital model of the physical component in a digital twin of the physical component; and using the link information to determine the digital model to which the link information refers and assign said digital model to the physical component.
    Type: Application
    Filed: August 22, 2022
    Publication date: October 24, 2024
    Applicant: Siemens Aktiengesellschaft
    Inventors: Rainer Falk, Kai Fischer, Steffen Fries, Markus Heintel, Wolfgang Klasen, Aliza Maftun
  • Publication number: 20230401517
    Abstract: Various embodiments of the teachings herein include a method for enhancing security of a product using a supply chain of suppliers for manufacturing or producing the product. The method may include: consulting a security information dataset including a first security provision datum of a supplier and a second security provision datum of a supplier's supplier; and matching or comparing the first security demand datum and the second security provision datum with the security demand datum. The security information dataset includes a security demand datum of a supplied entity supplied by the supplier. The security provision datum of the supplier's supplier is validated by the supplier.
    Type: Application
    Filed: October 28, 2021
    Publication date: December 14, 2023
    Applicant: Siemens Aktiengesellschaft
    Inventors: Aliza Maftun, Wolfgang Klasen
  • Patent number: 11783039
    Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: October 10, 2023
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220191010
    Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
    Type: Application
    Filed: February 14, 2020
    Publication date: June 16, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220188418
    Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module.
    Type: Application
    Filed: February 25, 2020
    Publication date: June 16, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220179950
    Abstract: A die arrangement and a method of monitoring the same are provided. The die arrangement includes a plurality of dies and a physical interconnection structure extending between and traversing the plurality of dies. The physical interconnection structure is arranged for imparting unpredictable, yet reproducible properties to a digital signal being carried on the physical interconnection structure. The die arrangement further includes a monitoring logic for monitoring the properties of the digital signal. This enables detection of tampering of topological arrangements of semiconductor dies to one another.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 9, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220164485
    Abstract: Incoming and outgoing communication of a hardware-application component is monitored and controlled at runtime of the hardware-application component. In this way, a kind of firewall is provided for ensuring secure and un-altered operation of a hardware-application performing security-critical functionalities on a field-programmable gate array. The hardware-application component may interact with other components directly and/or via an on-chip bus. The monitoring of incoming and/or outgoing communication is particularly advantageous when using third party hardware-applications or software applications, i.e., applications developed by untrusted parties. Another advantage is the possibility of monitoring and controlling all the communication between hardware-applications, hardware- and software applications, hardware-applications and peripherals, IO controllers, etc.
    Type: Application
    Filed: February 26, 2020
    Publication date: May 26, 2022
    Inventors: Thomas Zeschg, Hans Aschauer, Rainer Falk, Christian Peter Feist, Aliza Maftun, Hermann Seuschek
  • Publication number: 20220159004
    Abstract: A method for granting access to objects by entities in a computerized system includes: providing an access control list (ACL) specifying for each object access rights to the objects of the computerized system; assigning a capability requirement information to at least one of the objects in the ACL; assigning a capability information to at least one entity of the entities in the computerized system; requesting access to an object by an entity; checking if the requesting entity has an access right in accordance with the ACL; and granting access to the requested object by the requesting entity only when the capability information assigned to the requesting entity matches with the capability requirement information assigned to the requested object. The combination of an ACL based access to files with capabilities improves the security of the system.
    Type: Application
    Filed: February 18, 2020
    Publication date: May 19, 2022
    Inventors: Fabrizio De Santis, Rainer Falk, Christian Peter Feist, Aliza Maftun, Johannes Zwanzger