Patents by Inventor Manuel Jauss
Manuel Jauss has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12287867Abstract: A method for operating a computing device for a control unit of a motor vehicle. The computing device including a processor core, and is configured to control an exchange of data between a connectivity zone and a security zone. The security zone includes at least one component which is necessary to drive the vehicle and has an elevated relevance with regard to safety. The connectivity zone including at least one component whose operation requires communication outside of the vehicle but is not required to drive the vehicle and does not have an elevated relevance with regard to safety. At least one first program executable by the computing device is assigned to a non-trustworthy zone, and at least one further program is assigned to a trustworthy zone. The component of the connectivity zone is assigned to the non-trustworthy zone, and the component of the security zone being assigned to the trustworthy zone.Type: GrantFiled: December 16, 2020Date of Patent: April 29, 2025Assignee: ROBERT BOSCH GMBHInventors: Manuel Jauss, Mustafa Kartal, Razvan Florin Aguridan, Roland Steffen
-
Patent number: 12255902Abstract: A method for handling an anomaly of data, in particular in a motor vehicle, is provided. At least one sensor obtains data for the anomaly detection. The sensor examines the obtained data for anomalies, and generates an event as a function of the associated data when an anomaly is detected. An event report is generated as a function of the event. The event report includes at least one variable that changes for each event report and/or is cyclically sent.Type: GrantFiled: March 15, 2021Date of Patent: March 18, 2025Assignee: ROBERT BOSCH GMBHInventors: Manuel Jauss, Roland Steffen, Mustafa Kartal
-
Patent number: 12242610Abstract: A computer-implemented method. The method includes recognizing the possibility of a manipulation of the software of a first component of a plurality of components of a vehicle electrical system of a vehicle in a central device for mitigating a manipulation of software. The central device for mitigating a manipulation is part of the vehicle electrical system, and is designed to mitigate a manipulation of software in each component of the plurality of components of the vehicle electrical system. The method further includes initiating a countermeasure for mitigating the manipulation of the software of the first component and carrying out the countermeasure for mitigating the manipulation of the software of the first component. The countermeasure includes changing a functionality of the first component and at least partially shifting the functionality of the first component to one or multiple other components of the plurality of components.Type: GrantFiled: February 14, 2023Date of Patent: March 4, 2025Assignee: ROBERT BOSCH GMBHInventors: Carsten Nobbe, Felix Hallaczek, Joachim Graf, Manuel Jauss, Marcel Kneib
-
Patent number: 12216562Abstract: A method for handling an anomaly of data, in particular in a motor vehicle. At least one sensor obtains data for the anomaly detection. The sensor examines the obtained data for anomalies, and generates an event as a function of the associated data when an anomaly is detected. It is decided whether the event is further processed, in particular stored and/or further communicated, at least in part.Type: GrantFiled: March 15, 2021Date of Patent: February 4, 2025Assignee: ROBERT BOSCH GMBHInventors: Manuel Jauss, Roland Steffen, Mustafa Kartal
-
Publication number: 20240231945Abstract: A method for operating a computing unit including at least one processor core. The method includes: assigning one or multiple application programs executable by the computing unit to one of at least two zones, the zones characterizing resources of the computing unit, which are usable for an execution of a relevant application program, executing at least one of the application programs as a function of the zone to which it is assigned.Type: ApplicationFiled: October 14, 2020Publication date: July 11, 2024Inventors: Benedikt Arthur Maximilian Mansbart, Manuel Jauss, Razvan Florin Aguridan, Roland Steffen
-
Publication number: 20240134709Abstract: A method for operating a computing unit including at least one processor core. The method includes: assigning one or multiple application programs executable by the computing unit to one of at least two zones, the zones characterizing resources of the computing unit, which are usable for an execution of a relevant application program, executing at least one of the application programs as a function of the zone to which it is assigned.Type: ApplicationFiled: October 13, 2020Publication date: April 25, 2024Inventors: Benedikt Arthur Maximilian Mansbart, Manuel Jauss, Razvan Florin Aguridan, Roland Steffen
-
Patent number: 11947807Abstract: A method for processing data stored in a memory unit. The method includes the following steps: ascertaining a randomly or pseudo-randomly formed test pattern, which characterizes at least one first subarea of a memory area of the memory unit, forming, as a function of the test pattern, a test variable associated with data stored in the at least one first subarea.Type: GrantFiled: January 30, 2020Date of Patent: April 2, 2024Assignee: ROBERT BOSCH GMBHInventors: Manuel Jauss, Mustafa Kartal
-
Publication number: 20230365162Abstract: A computer system for providing a plurality of functions for a device, in particular for a vehicle, by separation of a plurality of zones. The computer system has a plurality of system modules configured to provide functions that are differently critical for the operational security of the device. A zone is a logically and/or physically delimitable unit in the computer system. A first zone is more trustworthy than a second, less trustworthy zone. The danger of a manipulation of a more trustworthy zone is less than of a less trustworthy zone. The first zone is assigned a first number of protective mechanisms and the second zone is assigned a second number of protective mechanisms. The first number of protective mechanisms protecting the first zone from manipulation to a greater extent than that to which the second number of protective mechanisms protects the second zone.Type: ApplicationFiled: April 10, 2023Publication date: November 16, 2023Inventors: Felix Hallaczek, Alexander Kaucher, Manuel Jauss, Marcel Kneib, Nils Benecke, Razvan Florin Aguridan
-
Publication number: 20230367910Abstract: A computer system for providing a plurality of functions for a device, in particular for a vehicle. The computer system has a plurality of system modules configured to provide functions that are differently critical for the operational security of the device. Each system module or a part of a system module is assigned to one zone of a plurality of zones, a zone being a logically and/or physically delimitable unit in the computer system. A first zone is more trustworthy than a second, less trustworthy zone, the danger of a manipulation of a more trustworthy zone being less than of a less trustworthy zone. A first, more critical function being provided by a system module of the first zone and a less critical function being provided by a system module of the second zone.Type: ApplicationFiled: April 20, 2023Publication date: November 16, 2023Inventors: Felix Hallaczek, Alexander Kaucher, Manuel Jauss, Marcel Kneib, Nils Benecke, Razvan Florin Aguridan
-
Publication number: 20230333964Abstract: A method for remote verification of the integrity of a computer program in a computing unit to be checked using a verification unit. The computer program is specified by a reference program code and is in the form of stored program code in the computing unit to be checked. The method includes: selecting, by the verification unit, a pair from a list of pairs in which each pair includes a random character string and a reference check value calculated using a check value function based on the random character string of the pair and the reference program code; transmitting the random character string of the pair to a validation unit; receiving a comparison check value calculated using the check value function based on the transmitted random character string and the stored program code; comparing the received comparison check value to the reference check value of the selected pair.Type: ApplicationFiled: July 26, 2023Publication date: October 19, 2023Inventors: Marcel Kneib, Friedrich Wiemer, Manuel Jauss
-
Publication number: 20230267204Abstract: A computer-implemented method. The method comprises analyzing a communication, secured by one or more cryptographic methods, between a first component of a plurality of components of an on-board network of a vehicle and a central device for mitigating a software manipulation. The central device for mitigating a manipulation is part of the on-board network and is designed for software mitigation in each of the plurality of components of the on-board network. The method further comprises identifying the possibility of a manipulation of the software of the first component in the central device for mitigating a software manipulation, based on the analysis of the communication, and initiating a countermeasure to mitigate the manipulation of the software of the first component by way of the central device for mitigating a manipulation.Type: ApplicationFiled: February 16, 2023Publication date: August 24, 2023Inventors: Manuel Jauss, Felix Hallaczek, Marcel Kneib
-
Publication number: 20230267212Abstract: A computer-implemented method for detecting the possibility of a manipulation of the software of a first component of a multiplicity of components of an onboard network of a vehicle in a central device for mitigating a manipulation of software. The central device for mitigating a manipulation is part of the onboard network and configured for the mitigation of software in each of the multiplicity of components of the onboard network. The method includes the initiation of a countermeasure for mitigating the manipulation of the software of the first component by the central device for mitigating a manipulation and the implementation of the countermeasure for mitigating the manipulation of the software of the first component. The countermeasure against the manipulation includes resetting the software of the first component using a security module of the first component and/or an unalterable module of the first component.Type: ApplicationFiled: February 7, 2023Publication date: August 24, 2023Inventors: Manuel Jauss, Felix Hallaczek, Marcel Kneib
-
Publication number: 20230267206Abstract: A computer-implemented method. The method includes recognizing the possibility of a manipulation of the software of a first component of a plurality of components of a vehicle electrical system of a vehicle in a central device for mitigating a manipulation of software. The central device is part of the vehicle electrical system, and mitigates a manipulation of software in each component of the plurality of components. The method further includes initiating a countermeasure for mitigating the manipulation of the software of the first component by the central device; and carrying out the countermeasure for mitigating the manipulation of the software of the first component. The countermeasure for mitigating the manipulation includes a measure for preventing a repetition of the manipulation, which is selected based on an analysis of information concerning data traffic in the vehicle electrical system that took place before the possibility of a manipulation was recognized.Type: ApplicationFiled: February 16, 2023Publication date: August 24, 2023Inventors: Felix Hallaczek, Manuel Jauss, Marcel Kneib
-
Publication number: 20230267205Abstract: A computer-implemented method. The method includes recognizing the possibility of a manipulation of the software of a first component of a plurality of components of a vehicle electrical system of a vehicle, initiating a countermeasure for mitigating the manipulation of the software of the first component, and carrying out the countermeasure for mitigating the manipulation of the software of the first component. The countermeasure includes activating a write lock and/or read lock of a memory of the first component. In some examples, the recognition and the initiation may be carried out in a central device for mitigating a manipulation of software. The central device for mitigating a manipulation is part of the vehicle electrical system and is designed to mitigate a manipulation of software in each component of the plurality of components of the vehicle electrical system.Type: ApplicationFiled: February 16, 2023Publication date: August 24, 2023Inventors: Marcel Kneib, Felix Hallaczek, Manuel Jauss
-
Publication number: 20230267213Abstract: A computer-implemented method. The method includes recognizing the possibility of a manipulation of the software of a first component of a plurality of components of a vehicle electrical system of a vehicle in a central device for mitigating a manipulation of software. The central device for mitigating a manipulation is part of the vehicle electrical system, and is designed to mitigate a manipulation of software in each component of the plurality of components of the vehicle electrical system. The method further includes initiating a countermeasure for mitigating the manipulation of the software of the first component and carrying out the countermeasure for mitigating the manipulation of the software of the first component. The countermeasure includes changing a functionality of the first component and at least partially shifting the functionality of the first component to one or multiple other components of the plurality of components.Type: ApplicationFiled: February 14, 2023Publication date: August 24, 2023Inventors: Carsten Nobbe, Felix Hallaczek, Joachim Graf, Manuel Jauss, Marcel Kneib
-
Publication number: 20230073830Abstract: A method for handling an anomaly of data, in particular in a motor vehicle. At least one sensor obtains data for the anomaly detection. The sensor examines the obtained data for anomalies, and generates an event as a function of the associated data when an anomaly is detected. It is decided whether the event is further processed, in particular stored and/or further communicated, at least in part.Type: ApplicationFiled: March 15, 2021Publication date: March 9, 2023Inventors: Manuel Jauss, Roland Steffen, Mustafa Kartal
-
Publication number: 20230073058Abstract: A method for handling an anomaly of data, in particular in a motor vehicle, is provided. At least one sensor obtains data for the anomaly detection. The sensor examines the obtained data for anomalies, and generates an event as a function of the associated data when an anomaly is detected. An event report is generated as a function of the event. The event report includes at least one variable that changes for each event report and/or is cyclically sent.Type: ApplicationFiled: March 15, 2021Publication date: March 9, 2023Inventors: Manuel Jauss, Roland Steffen, Mustafa Kartal
-
Publication number: 20230024817Abstract: A computer-implemented method which identifies the possibility of manipulation of the software of a first component of a plurality of components of an on-board network of a vehicle in a central device for mitigating software manipulation. A central device for mitigating manipulation is designed to mitigate software manipulation in each of the plurality of components in the on-board network. The method includes initiation of a countermeasure for mitigating manipulation of the first component by the central device for detecting and mitigating manipulation.Type: ApplicationFiled: July 8, 2022Publication date: January 26, 2023Inventors: Felix Hallaczek, Manuel Jauss, Marcel Kneib, Mustafa Kartal
-
Publication number: 20230021594Abstract: A method for operating a computing device for a control unit of a motor vehicle. The computing device including a processor core, and is configured to control an exchange of data between a connectivity zone and a security zone. The security zone includes at least one component which is necessary to drive the vehicle and has an elevated relevance with regard to safety. The connectivity zone including at least one component whose operation requires communication outside of the vehicle but is not required to drive the vehicle and does not have an elevated relevance with regard to safety. At least one first program executable by the computing device is assigned to a non-trustworthy zone, and at least one further program is assigned to a trustworthy zone. The component of the connectivity zone is assigned to the non-trustworthy zone, and the component of the security zone being assigned to the trustworthy zone.Type: ApplicationFiled: December 16, 2020Publication date: January 26, 2023Inventors: Manuel Jauss, Mustafa Kartal, Razvan Florin Aguridan, Roland Steffen
-
Publication number: 20220028472Abstract: A method for processing data stored in a memory unit. The method includes the following steps: ascertaining a randomly or pseudo-randomly formed test pattern, which characterizes at least one first subarea of a memory area of the memory unit, forming, as a function of the test pattern, a test variable associated with data stored in the at least one first subarea.Type: ApplicationFiled: January 30, 2020Publication date: January 27, 2022Inventors: Manuel Jauss, Mustafa Kartal