Patents by Inventor Christopher Huth

Christopher Huth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210026760
    Abstract: A computer-implemented method for testing a system, the tested system being a computer program, a hardware system, or an embedded system. In the method, using a static analysis, a first part of an execution structure for the system is examined to see if the system runs corresponding execution paths without errors when the first part of the execution structure is executed. If in the static analysis error-free execution is determined for the first part of the execution structure, the system is examined using a dynamic analysis which leaves out execution paths which correspond to the first part of the execution structure.
    Type: Application
    Filed: June 4, 2020
    Publication date: January 28, 2021
    Inventors: Christopher Huth, Hans Loehr, Rakshith Amarnath, Simon Greiner
  • Patent number: 10757119
    Abstract: A method for protecting a network having multiple network subscribers against a cyberattack, in which bits or bit sequences of a message are transmitted between the network subscribers in the network via different voltage levels on at least one transmission route of the network. For this purpose, at least one characteristic of the voltage levels or of the transmitted bits or bit sequences is actively modified in at least one of the network subscribers or on the at least one transmission route and the origin of the transmitted bits or of the at least one transmission route is determined on the basis of the at least one characteristic. The cyberattack on the network is detected or the cyberattack on the network is localized in the network as a function of the ascertained origin.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: August 25, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Christopher Huth, Clemens Schroff, Herve Seudie, Marcel Kneib
  • Publication number: 20200172392
    Abstract: A method is provided for checking a sensor value of a MEMS sensor. In the process, an output signal of the MEMS sensor is detected and the sensor value is ascertained as a function of the output signal. In addition, frequency components of the output signal are examined and a determination is made as to whether the ascertained sensor value is reliable or unreliable as a function of the examination of the frequency components. If the sensor value is determined to be unreliable, the sensor value is discarded or provided with a lower weighting, or a warning it output relating to the unreliability of the sensor value or an item of information about the unreliability of the sensor value is stored.
    Type: Application
    Filed: November 15, 2019
    Publication date: June 4, 2020
    Inventors: Christopher Huth, Oliver Willers
  • Publication number: 20190364054
    Abstract: A method for authenticating a message transmitted via a communication channel, including the following: sampling recurring signal edges within a data frame of the message, sampling values being obtained with a start time that is offset between the signal edges, reconstructing an average signal characteristic of a part of the message from the sampling values, calculating signal-technical properties of the data frame from the signal characteristic, and the message is authenticated based on the properties.
    Type: Application
    Filed: May 21, 2019
    Publication date: November 28, 2019
    Inventors: Marcel Kneib, Christopher Huth, Jo Pletinckx
  • Publication number: 20190349207
    Abstract: A method and system for authenticating a device is disclosed. The method includes the steps of: receiving a helper bit string and a first MAC; measuring a first response bit string of a physical unclonable function of the device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; decoding a result of the subtraction using a uniformly distributed random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise; determining a second MAC based on the shared secret bit string, the uniformly distributed random matrix, and the helper bit string; and determining whether the second MAC matches the first MAC.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 14, 2019
    Inventors: Jorge Guajardo MERCHAN, Paulius DUPLYS, Christopher HUTH
  • Publication number: 20190349208
    Abstract: A method for authenticating a first device is disclosed. In embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 14, 2019
    Applicant: Robert Bosch GmbH
    Inventors: Jorge Guajardo MERCHAN, Paulius DUPLYS, Christopher HUTH
  • Patent number: 10404718
    Abstract: A method for transmitting software in which a checker generates two random numbers. The checker calculates a cryptographic key based on the second random number based on a measured hardware function of the device. The checker encrypts the software into a cryptogram using the key, and transmits the cryptogram to the device. The checker transmits the first random number to the device, and receives a checksum from the device. The checker calculates a reference value based on the first random number and an emulated random access memory of the device, with the aid of the measured hardware function and a predefined cryptographic hash function. The checker subjects the checksum to a check based on the reference value, and if the check is successful, the checker transmits the second random number to the device.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: September 3, 2019
    Assignee: Robert Bosch GmbH
    Inventors: Christopher Huth, Paulius Duplys
  • Patent number: 10331887
    Abstract: An embedded system wherein the system includes a computer, a watchdog, and an electrical power supply. The computer is electrically connected to the power supply. The power supply is connected in terms of measurement to the watchdog. The watchdog is configured in such a way that the watchdog measures a power consumption of the computer, ascertains a first power signature on the basis of the power consumption, carries out a comparison of the first power signature with a specified second power signature, and introduces specified measures if the comparison fails.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: June 25, 2019
    Assignee: ROBERT BOSCH GMBH
    Inventor: Christopher Huth
  • Publication number: 20190165958
    Abstract: A method and system for authenticating a first device is disclosed. The method includes the steps of: measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being provided by one of the processor of the first device and a further physical component of the first device; deriving a shared secret bit string from a uniformly distributed random vector; encoding a helper bit string by multiplying a uniformly distributed random matrix with the uniformly distributed random vector and adding the first response bit string to a result of the multiplication; and transmitting the helper bit string to a second device that is remote from the first device.
    Type: Application
    Filed: December 27, 2017
    Publication date: May 30, 2019
    Inventors: Jorge Guajardo Merchan, Paulius Duplys, Christopher Huth
  • Patent number: 10298389
    Abstract: A method for operating a primary unit that exchanges information with at least one secondary unit, including the following: ascertainment by the primary unit of a first number of primary measured values, in particular measured values of an entropy source shared with the secondary unit; reconciliation by the primary unit of the first number of primary measured values, in particular with a corresponding number of secondary measured values that have been obtained by the secondary unit, to obtain reconciled primary measured values, the secondary measured values having been obtained by the secondary unit in particular from the shared entropy source; and application by the primary unit of a secret-sharing method to share secret data with the secondary unit, the secret-sharing method being executed as a function of the reconciled primary measured values.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: May 21, 2019
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Paulius Duplys
  • Patent number: 10171236
    Abstract: A method for operating a primary unit which exchanges pieces of information with a secondary unit, including receiving first pieces of information from the secondary unit, the first pieces of information formed as a function of at least one first measured value of a physical variable in the area of the secondary unit and as a function of a first random number; measuring the physical variable in the area of the primary unit to obtain a second measured value; ascertaining a first estimated value for the first random number as a function of the first pieces of information and the second measured value; measuring the physical variable in the area of the primary unit to obtain a third measured value; forming second pieces of information as a function of the first estimated value and the third measured value; transmitting the second pieces of information to the secondary unit.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: January 1, 2019
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Paulius Duplys
  • Patent number: 10169612
    Abstract: A method for executing a safety-critical function of a computing unit in a cyber-physical system, a request being received for the execution of the safety-critical function, an environment-specific and/or user-specific measurement value being acquired by at least one sensor of the computing unit, the environment-specific measurement value describing an environment of the computing unit, the user-specific measurement value describing an interaction of a user with the computing unit, the safety-critical function being executed if the environment-specific and/or the user-specific measurement value fulfills a specified criterion.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: January 1, 2019
    Assignee: ROBERT BOSCH GMBH
    Inventors: Paulius Duplys, Christopher Huth
  • Publication number: 20180337938
    Abstract: A method for protecting a network against a cyberattack, in which for a message in the network first characteristics of a first transmission of the message are determined and an origin of the message in the network is determined by a comparison of the first characteristics with at least one fingerprint of at least one subscriber or a segment of the network or a transmission route. If a manipulation of the message is detected, a point of attack of the cyberattack in the network is detected and localized in particular on the basis of the origin of the message.
    Type: Application
    Filed: April 30, 2018
    Publication date: November 22, 2018
    Inventors: Marcel Kneib, Christopher Huth, Clemens Schroff, Hans Loehr, Herve Seudie, Paulius Duplys, Rene Guillaume, Robert Szerwinski, Sebastien Leger
  • Publication number: 20180337934
    Abstract: A method for protecting a network having multiple network subscribers against a cyberattack, in which bits or bit sequences of a message are transmitted between the network subscribers in the network via different voltage levels on at least one transmission route of the network. For this purpose, at least one characteristic of the voltage levels or of the transmitted bits or bit sequences is actively modified in at least one of the network subscribers or on the at least one transmission route and the origin of the transmitted bits or of the at least one transmission route is determined on the basis of the at least one characteristic. The cyberattack on the network is detected or the cyberattack on the network is localized in the network as a function of the ascertained origin.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 22, 2018
    Inventors: Christopher Huth, Clemens Schroff, Herve Seudie, Marcel Kneib
  • Patent number: 10111091
    Abstract: A method is provided for generating a secret sequence of values in a first device as a function of measured physical properties of a transmission channel between the first device and at least one second device. With this method, movements are detected by at least one sensor, which have an effect on the physical properties of the transmission channel. The measurement of the physical properties of the transmission channel is carried out as a function of the detected movements.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: October 23, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Rene Guillaume
  • Patent number: 10075294
    Abstract: A method is described for generating a secret sequence of values in a first device as a function of measured physical properties of a transmission channel between the first device and at least one second device. In this context, movements are detected by at least one sensor, and as a function of the detected movements, it is determined whether values of the physical properties of the transmission channel measured during the detected movements are suitable for generating the secret sequence of values.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: September 11, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Rene Guillaume
  • Patent number: 10003586
    Abstract: A method for generating a secret key via a reciprocal communication channel connecting a first communication node and a second communication node, wherein the first communication node obtains a first sample by a measurement of the communication channel, the first communication node performs a quantization of the first sample, the first communication node performs a matching of the quantized sample with the second communication node via the communication channel, during the matching, the first communication node obtains and quantizes a second sample by a second measurement of the communication channel and the communication nodes obtain the key from the samples by a privacy amplification.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: June 19, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventors: Rene Guillaume, Christopher Huth
  • Patent number: 9967058
    Abstract: A method for reconciling bit strings over a communications network. A first subscriber ascertains error correction information for each one of a plurality of different blocks, which each include a predetermined number of bits from a first bit string, and transmits the same over the communications network. Each of the blocks having at least one bit in common with at least one other one of the blocks.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: May 8, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventors: Paulius Duplys, Christopher Huth
  • Publication number: 20170230170
    Abstract: A method for operating a primary unit that exchanges information with at least one secondary unit, including the following: ascertainment by the primary unit of a first number of primary measured values, in particular measured values of an entropy source shared with the secondary unit; reconciliation by the primary unit of the first number of primary measured values, in particular with a corresponding number of secondary measured values that have been obtained by the secondary unit, to obtain reconciled primary measured values, the secondary measured values having been obtained by the secondary unit in particular from the shared entropy source; and application by the primary unit of a secret-sharing method to share secret data with the secondary unit, the secret-sharing method being executed as a function of the reconciled primary measured values.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 10, 2017
    Inventors: Christopher Huth, Paulius Duplys
  • Publication number: 20170180392
    Abstract: A method for transmitting software in which a checker generates two random numbers. The checker calculates a cryptographic key based on the second random number based on a measured hardware function of the device. The checker encrypts the software into a cryptogram using the key, and transmits the cryptogram to the device. The checker transmits the first random number to the device, and receives a checksum from the device. The checker calculates a reference value based on the first random number and an emulated random access memory of the device, with the aid of the measured hardware function and a predefined cryptographic hash function. The checker subjects the checksum to a check based on the reference value, and if the check is successful, the checker transmits the second random number to the device.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 22, 2017
    Inventors: Christopher Huth, Paulius Duplys