Patents by Inventor Hans Aschauer

Hans Aschauer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12192348
    Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: January 7, 2025
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Patent number: 12034875
    Abstract: Methods and devices are provided for establishing secure communication between the devices without relying on local time information. According to the methods, a client device, which is going to establish the secure communication to a server device, is provided by the server device with a proof of its integrity. The proof of integrity of the server device is issued by a trusted third party (TTP) to which both devices have a trust relation.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: July 9, 2024
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Fabrizio De Santis, Steffen Fries
  • Publication number: 20240223389
    Abstract: Various teachings of the present disclosure include methods for providing cryptographic keys for signing data. The method may include: providing a plurality of keys as leaves of a hash tree structure having at least one first hash tree; evaluating a requirement criterion for a requirement for additional keys and, if the requirement criterion is satisfied, generating a plurality of additional keys available as leaves of a further hash tree; and integrating the further hash tree into the hash tree structure so a respective root of the further hash tree is signed with a leaf of the hash tree structure. A number of hash trees of the hash tree structure is not predetermined.
    Type: Application
    Filed: April 26, 2022
    Publication date: July 4, 2024
    Applicant: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Fabrizio De Santis, Rainer Falk, Andreas Furch, Daniel Schneider, Thomas Zeschg
  • Publication number: 20240152627
    Abstract: Various embodiments of the teachings herein include a method for determining the integrity of data processing of operative data using a trusted execution environment. The method may include: presenting the trusted execution environment with input data including the operative data and test data; processing the input data to produce output data; subjecting that portion of the output data formed by the processed test data to a comparison with reference data; and using the comparison as a basis for determining the integrity of the data processing.
    Type: Application
    Filed: March 1, 2022
    Publication date: May 9, 2024
    Applicant: Siemens Aktiengesellschaft
    Inventors: Rainer Falk, Hans Aschauer, Omar Belhachemi, Christian Peter Feist, Hermann Seuschek, Thomas Zeschg
  • Patent number: 11914715
    Abstract: Provided is a device unit, including a module, which can configure the device unit with an operating state from among different operating states during the start-up process and/or during ongoing operation of the device unit, wherein a first protected operating state of the different operating states is designed to allow the execution of at least one operating process which can be predefined and to optionally protect the operating process by means of defined cryptographic means, wherein at least one second operating state of the different operating states is designed to deactivate the first protected operating state and to allow at least one other changeable operating process and to optionally protect the operating process by means of specifiable cryptographic means.
    Type: Grant
    Filed: October 10, 2017
    Date of Patent: February 27, 2024
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Hans Aschauer, Steffen Fries, Markus Heintel, Dominik Merli, Rainer Falk
  • Patent number: 11917081
    Abstract: An issuing device is configured to: respond to a challenge request by transmitting a challenge; and respond to a certification request including a public key and ownership information thereof by issuing a digital certificate certifying the ownership information. The ownership information includes counterparty identity information relating to a ledger of a distributed database. The digital certificate is issued if it is successfully verified that a valid response to the challenge has been posted to the ledger of the distributed database and is associated therein with the counterparty identity information of the certification request. The digital certificate facilitates proofing that an owner of a public key is a given counterparty to a blockchain ledger. Also, a corresponding requesting device and corresponding methods and computer program products for issuing and requesting a digital certificate are disclosed.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: February 27, 2024
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Fabrizio De Santis, Steffen Fries
  • Patent number: 11784790
    Abstract: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set is used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream is output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: October 10, 2023
    Inventors: Hans Aschauer, Gökçe Aydos, Markus Heintel, Johannes Zwanzger
  • Patent number: 11783039
    Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: October 10, 2023
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20230308266
    Abstract: Various embodiments of the teachings herein include a method for onboarding an IoT device (3) of a manufacturer, in a manner secure against quantum computer attacks, in an infrastructure of a customer by means of a first server (1) of a manufacturer domain of the manufacturer and a second server (2) of a customer domain of the customer. In some embodiments, three authenticated and encrypted communication channels and a key encapsulation method are used to provide a device certificate of the customer domain for the IoT device on the IoT device.
    Type: Application
    Filed: March 28, 2023
    Publication date: September 28, 2023
    Applicant: Siemens Aktiengesellschaft
    Inventors: Andreas Furch, Hans Aschauer, Fabrizio De Santis, Rainer Falk, Malek Safieh, Daniel Schneider, Florian Wilde, Thomas Zeschg
  • Patent number: 11755719
    Abstract: The following relates to a hardware security module for usage with manufacturing devices and a method for operating the same is provided. The security module includes: a secure element, which is adapted to detect an operating mode of the hardware security module; a first interface which is adapted to receive commands for controlling the hardware security module; a central processing unit for processing application program code in a secure environment; a second interface which is adapted for receiving configuration data, wherein the second interface is activated and deactivated in dependence of the detected operating mode.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: September 12, 2023
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Daniel Schneider
  • Patent number: 11424933
    Abstract: A method and to an apparatus for achieving cryptographic protection of a plurality of messages in a message exchange, for example, in particular the cryptographic protection being implemented by means of digital signatures and nonces is provided. The nonces are not transmitted directly, but rather can be reproducibly calculated from preceding messages, wherein a checksum of a previous message is also considered for each nonce. Consideration is implemented in such a way that cryptographical calculations in particular intended for the creation of the digital signature and the nonce may be calculated one single time and not separately for the nonce and the digital signature.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: August 23, 2022
    Inventors: Hans Aschauer, Steffen Fries
  • Publication number: 20220247581
    Abstract: Methods and devices are provided for establishing secure communication between the devices without relying on local time information. According to the methods, a client device, which is going to establish the secure communication to a server device, is provided by the server device with a proof of its integrity. The proof of integrity of the server device is issued by a trusted third party (TTP) to which both devices have a trust relation.
    Type: Application
    Filed: March 31, 2020
    Publication date: August 4, 2022
    Inventors: Hans Aschauer, Fabrizio De Santis, Steffen Fries
  • Publication number: 20220188418
    Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module.
    Type: Application
    Filed: February 25, 2020
    Publication date: June 16, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220191010
    Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.
    Type: Application
    Filed: February 14, 2020
    Publication date: June 16, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220179950
    Abstract: A die arrangement and a method of monitoring the same are provided. The die arrangement includes a plurality of dies and a physical interconnection structure extending between and traversing the plurality of dies. The physical interconnection structure is arranged for imparting unpredictable, yet reproducible properties to a digital signal being carried on the physical interconnection structure. The die arrangement further includes a monitoring logic for monitoring the properties of the digital signal. This enables detection of tampering of topological arrangements of semiconductor dies to one another.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 9, 2022
    Inventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
  • Publication number: 20220173906
    Abstract: Provided is a control system, with which, for example, the execution of smart contracts in blockchains can be improved.
    Type: Application
    Filed: February 25, 2020
    Publication date: June 2, 2022
    Inventors: Hans Aschauer, Andreas Bogner, Ingo Wenda, Markus Dichtl
  • Publication number: 20220164485
    Abstract: Incoming and outgoing communication of a hardware-application component is monitored and controlled at runtime of the hardware-application component. In this way, a kind of firewall is provided for ensuring secure and un-altered operation of a hardware-application performing security-critical functionalities on a field-programmable gate array. The hardware-application component may interact with other components directly and/or via an on-chip bus. The monitoring of incoming and/or outgoing communication is particularly advantageous when using third party hardware-applications or software applications, i.e., applications developed by untrusted parties. Another advantage is the possibility of monitoring and controlling all the communication between hardware-applications, hardware- and software applications, hardware-applications and peripherals, IO controllers, etc.
    Type: Application
    Filed: February 26, 2020
    Publication date: May 26, 2022
    Inventors: Thomas Zeschg, Hans Aschauer, Rainer Falk, Christian Peter Feist, Aliza Maftun, Hermann Seuschek
  • Publication number: 20220158822
    Abstract: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
    Type: Application
    Filed: January 13, 2020
    Publication date: May 19, 2022
    Inventors: Hans Aschauer, Gökçe Aydos, Markus Heintel, Johannes Zwanzger
  • Patent number: 11303440
    Abstract: A programmable hardware security module, a method for securing a private key of a cryptographic key pair, and a method for securely providing a private key of a cryptographic key pair on a programmable hardware security module, wherein with the described devices and methods, a decentralised PKI is built, via which device keys and device certificates can be generated and target devices can be provided securely, where in this regard, the key-pair-specific transport key plays a central role in protecting the generated private key that is to be transferred, and where this is linked to the particular key pair intended for a target device via a key derivation from a master key utilizing a key-pair-specific derivation parameter.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: April 12, 2022
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Daniel Schneider, Rainer Falk
  • Patent number: 11206147
    Abstract: A method for producing a cryptographic timestamp for a digital document using multiple time servers is provided. In the method, a nonce value is produced and a current hash value is formed from the nonce value and the digital document. Then, a time server is repeatedly selected, the current hash value is transmitted to the selected time server, a response comprising a digital signature of the current hash value and a time indication is received by the selected time server, and an additional hash value is determined from the received response and used as the current hash value. The cryptographic timestamp for the digital document is formed from the nonce value and the multiple received responses. The method produces a tamperproof timestamp on a majority basis and is suitable for dating and protocolling in the field of automation and IoT.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: December 21, 2021
    Inventors: Hans Aschauer, Steffen Fries, Dominik Merli