Patent application number | Description | Published |
20110319658 | PROCESS FOR PREPARING FORMIC ACID BY REACTION OF CARBON DIOXIDE WITH HYDROGEN - A process for preparing formic acid by reaction of carbon dioxide ( | 12-29-2011 |
20120022290 | Process for Preparing Formic Acid by Reaction of Carbon Dioxide with Hydrogen - A process for preparing formic acid by reaction of carbon dioxide ( | 01-26-2012 |
20120071690 | PRODUCTION OF FORMAMIDES - A process is proposed for production of formamides by reaction of carbon dioxide with hydrogen in a hydrogenation reactor I in the presence of
| 03-22-2012 |
20120157711 | PROCESS FOR PREPARING FORMIC ACID BY REACTING CARBON DIOXIDE WITH HYDROGEN - The present invention relates to a process for preparing formic acid by reacting carbon dioxide ( | 06-21-2012 |
20130012739 | PROCESS FOR PREPARING FORMIC ACID BY REACTING CARBON DIOXIDE WITH HYDROGEN - A process for preparing formic acid by reacting carbon dioxide with hydrogen in a hydrogenation reactor in the presence of a catalyst comprising an element of group 8, 9 or 10 of the Periodic Table, a tertiary amine and a polar solvent to form formic acid-amine adducts which are subsequently dissociated thermally into formic acid and tertiary amine. | 01-10-2013 |
20130090496 | PROCESS FOR PREPARING FORMIC ACID BY REACTING CARBON DIOXIDE WITH HYDROGEN - The invention relates to a process for preparing formic acid by reacting carbon dioxide with hydrogen in a hydrogenation reactor in the presence of a catalyst comprising an element of group 8, 9 or 10 of the Periodic Table, a tertiary amine and a polar solvent to form formic acid-amine adducts which are subsequently dissociated thermally into formic acid and tertiary amine. | 04-11-2013 |
20130123526 | PROCESS FOR PREPARING FORMIC ACID BY REACTION OF CARBON DIOXIDE WITH HYDROGEN - The invention relates to a process for preparing formic acid by reaction of carbon dioxide with hydrogen in a hydrogenation reactor in the presence of a transition metal complex as a catalyst comprising at least one element from group 8, 9 or 10 of the Periodic Table and at least one phosphine ligand with at least one organic radical having at least 13 carbon atoms, of a tertiary amine and of a polar solvent to form a formic acid-amine, adduct, which is subsequently dissociated thermally to formic acid and the corresponding tertiary amine. on unit. | 05-16-2013 |
20130190532 | PROCESS FOR PREPARING FORMIC ACID - Process for obtaining formic acid by thermal separation of a stream comprising formic acid and a tertiary amine (I), in which a liquid stream comprising formic acid, tertiary amine (I) and water is produced by combining tertiary amine (I) and a formic acid source in the presence of water, water and organic decomposition products of the tertiary amine (I) are removed and formic acid is removed by distillation from the resulting liquid stream in a distillation apparatus, wherein the stream comprising water and organic decomposition products of the tertiary amine (I) which have been separated off is separated into two liquid phases, the upper liquid phase is removed and the lower, water-comprising liquid phase is recirculated to the formic acid source. | 07-25-2013 |
20140018456 | PROCESS FOR PREPARING FORMIC ACID - Process for obtaining formic acid by thermal separation of a stream comprising formic acid and a tertiary amine (I), in which a liquid stream comprising formic acid and tertiary amine (I) is produced by combining tertiary amine (I) and a formic acid source, secondary components comprised therein are separated off, formic acid is removed by distillation from the resulting liquid stream in a distillation apparatus, where the bottom output from the distillation apparatus is separated into two liquid phases, and the upper liquid phase is recirculated to the formic acid source and the lower liquid phase is recirculated to the separation of the secondary components and/or to the distillation apparatus, wherein low boilers are removed by distillation from the upper liquid phase and recirculated to the depleted stream. | 01-16-2014 |
20140148617 | PROCESS FOR PREPARING FORMIC ACID - Process for obtaining formic acid by thermal separation of a stream comprising formic acid and a tertiary amine (I), in which, in step (a), a liquid stream comprising formic acid, methanol, water and tertiary amine (I) is produced by combining methyl formate, water and tertiary amine (I), from there in step (b), methanol is separated off and in step (c), formic acid is removed by distillation from the liquid stream obtained in a distillation apparatus, wherein, when methyl formate, water and tertiary amine (I) are combined, methyl formate, water and optionally tertiary amine (I) are first introduced in step (a1) in a molar ratio of 0≦n(amine to a1)/n(mefo to a1)≦0.1, and from 70 to 100% of the hydrolysis equilibrium possible is set and then, in step (a2), tertiary amine (I) is introduced in a molar ratio of 0.1≦n(amine to a2)/n(mefo to a1)≦2, and the mixture is reacted. | 05-29-2014 |
Patent application number | Description | Published |
20090204811 | Method For The Encrypted Transmission Of Synchronization Messages - There is described a method for transmitting synchronization messages, for example PTP messages of the IEEE 1588 standard, the PTP message being inserted into a data packet in line with the Internet Protocol, the data packet having an IP header, and the data packet having a UDP header. In this case, for the encrypted transmission on the PTP message, the data packet is addressed to a UDP port that is reserved for encrypted PTP messages, the data packet is provided with an additional S-PTP header that is provided for encryption, the PTP message is extended with a pseudo random number, and the PTP message is encrypted together with the pseudo random number. | 08-13-2009 |
20100131732 | METHOD AND APPARATUS FOR CHECKING THE INTEGRITY OF DATA STORED IN A PREDETERMINED MEMORY AREA OF A MEMORY - A method checks the integrity of data stored in a predetermined memory area of a memory of a first device. The first device is coupled to at least one second device by a network The method involves providing at least one parameter which is suitable for influencing a hash value of at least one predetermined hash function. At least one hash value is calculated on the basis of the data stored in the predetermined memory, the at least one predetermined hash function and the at least one parameter. The second device checks the integrity of the data stored in the predetermined memory area of the first device on the basis of the calculated hash value or values. | 05-27-2010 |
20100313259 | Method for Establishing a Secure Connection from a Service Technician to a Component of an Automation Environment that can be Remotely Diagnosed and/or Maintained and is Experiencing Failure - A method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure. A service certificate is required for establishing the secure connection, wherein a secure initial connection is first established to the automation environment by the service technician using a one-time password. With the initial connection, a service certificate required for establishing the secure connection to the component of the automation environment experiencing the failure is subsequently transmitted from the automation environment to the service technician. The secure connection from the service technician to the component experiencing the failure is then established by means of the service certificate. The invention further relates to an automation environment that is suitable for carrying out a method of said kind. | 12-09-2010 |
20100325414 | Method and transmitting device for securely creating and sending an electronic message and method and receiving device for securely receiving and processing an electronic message - The subject matter relates to a method for securely creating and sending an electronic message, whereby the message is created using a first application running in a secure operating system, the created message is stored in a storage that can only be accessed by the secure operating system and a virtualizing unit. In a second application executed by the virtualizing unit, the internal storage is analyzed for the presence of a message and, if the message is present, the message is transmitted to a receiver. The subject matter also relates to a method for securely receiving and processing an electronic message, whereby an external storage is analyzed for the presence of a message using a second application and, if the message is present, the message is transmitted to the internal storage. The presence of the message is polled using the first application and, if the message is present, the message is transmitted from the internal storage to the first application for processing. The subject matter further relates to a transmitting device for carrying out the method for securely creating and sending the electronic message and a receiving device for carrying out the method for securely receiving and processing the electronic message. | 12-23-2010 |
20110014895 | METHOD FOR EXCHANGING DATA BETWEEN A MOBILE TELEPHONE AND A FIXED LINE TELEPHONE - The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data. | 01-20-2011 |
20110035600 | METHOD AND DEVICE FOR TRANSCODING DURING AN ENCRYPTION-BASED ACCESS CHECK ON A DATABASE - A device for transcoding during an encryption-based access check of a client device to a databank, which provides a data set in an encrypted area, has: a unit for assigning a specific access level of the client device and for providing a corresponding first group key of the client device as a function of a registration parameter, wherein the client device is allowed access to a first area, which is encrypted using the first group key, and all areas of the database subordinate to the first area as a function of the assigned access level; a unit for providing a classification result depending on a classification of the data set of the particular area by one of the client devices allowed to access the particular area; and a unit for transcoding the data set and/or a data set key for the data set as a function of the classification result. | 02-10-2011 |
20110087891 | METHOD FOR PRODUCING, ALLOCATING AND CHECKING AUTHORIZATION APPROVALS - In a method for producing, allocating and checking authorization approvals that are required in order to fulfill tasks specified by an action plan through performance, by a service technician, of actions defined by the tasks on a device or component of a distributed structure on-the-fly generation and distribution of authorization approvals for service technicians is enabled as a function of necessary actions or measures which are to be performed in the form of tasks and are defined as part of an action plan which is contained or recorded in a work schedule. | 04-14-2011 |
20120066741 | ELECTRONIC KEY FOR AUTHENTICATION - An electronic key supports a plurality of authentication methods and effectively prevents bidding-down attacks. For this purpose, security information is additionally provided by the electronic key, based on which a card reading device recognizes which authentication methods are supported by the electronic key. When the reading device recognizes based on said information that the electronic key supports a stronger second authentication method, but the authentication method was not recognized by the card reading device, the electronic key is, for example, rejected. | 03-15-2012 |
20120102319 | System and Method for Reliably Authenticating an Appliance - A system and an apparatus ( | 04-26-2012 |
20120137129 | METHOD FOR ISSUING A DIGITAL CERTIFICATE BY A CERTIFICATION AUTHORITY, ARRANGEMENT FOR PERFORMING THE METHOD, AND COMPUTER SYSTEM OF A CERTIFICATION AUTHORITY - In a method for issuing a digital certificate by a certification authority (B), a device (A) sends a request message to the certification authority (B) for issuing the certificate, the certification authority (B) receives the request message and sends a request for authenticating the device (A) to the device (A), the device (A) sends a response to the certification authority (B) in response to the received request, and the certification authority (B) checks the received response and generates the certificate and sends the certificate to the device (A), if the response was identified as correct. | 05-31-2012 |
20120260088 | METHOD AND DEVICE FOR SECURELY TRANSMITTING DATA - Cryptographic methods are used at the application level, unlike known methods using point-to-point connections that can only be sufficiently secured at the transport level. Integrity protection and confidentiality protection of data are implemented at the application level for use in network technology. | 10-11-2012 |
20120260104 | METHOD FOR TESTING ELECTRICAL COMPONENTS IN MAINS SUPPLY, IN PARTICULAR IN BUILDING - A test comment is transmitted by a test unit in the form of a data transmission via a mains supply to one or more electric components of a network. Each electric component that receives a transmitted test command transmits a test response that characterizes each electric component, in the form of a data transmission via the mains supply back to the test unit, the transmitted response being then evaluated in the test unit. | 10-11-2012 |
20120324239 | METHOD AND DEVICE FOR OPERATING A VIRTUAL MACHINE IN ACCORDANCE WITH AN ASSOCIATED INFORMATION ON ASSIGNMENT OF RIGHTS - Virtual machines are used in the utilization of distributed computer infrastructures to be able to distribute the workload to individual computers in as flexible a manner as possible. For this purpose, it is necessary to restrict the use of the virtual machine in a robust manner by regulatory or administrative defaults. A method protects a virtual machine during the migration, storage or operation thereof by way of digital rights management and encryption. For this purpose, the hypervisor or the virtual machine monitor as well as the virtual machine are expanded by corresponding functionalities. | 12-20-2012 |
20130010954 | METHOD FOR THE SECURE UNINDIRECTIONAL TRANSMISSION OF SIGNALS - A method transmits a signal using a unidirectional communications link, which is protected by an asymmetric cryptography method. A counter value is incremented by a transmitter during a transmission operation. Subsequently, a challenge is determined by the transmitter on the basis of the counter value and a control command that can be executed by a receiver and, on the basis of the challenge that is determined a response is in turn determined. The challenge and the response are transmitted from the transmitter to the receiver. The challenge received is then checked by the receiver to see whether the counter value used in the challenge is greater than a counter value previously stored by the transmitting transmitter. The response received is checked on the basis of the challenge. Following successful checking of the challenge and response, the control command transmitted in the challenge is executed. | 01-10-2013 |
20130014286 | METHOD AND SYSTEM FOR MAKING EDRM-PROTECTED DATA OBJECTS AVAILABLE - A method and a system make EDRM-protected data objects available to users. Access rights to an EDRM-protected data object are produced depending on partial access rights to at least one or more data objects, which data objects are contained in the respective EDRM-protected data object. The access rights to the EDRM-protected data object are calculated by a client computer of the user using an access right differentiation function depending on the partial access rights which are made available by different EDRM servers. A data object key of the EDRM-protected data object is calculated by the client computer of the user using a key differentiation function depending on partial keys which are made available by the different EDRM servers. | 01-10-2013 |
20130033230 | DEVICE AND METHOD FOR STORING ELECTRICAL ENERGY - A device for storing electrical energy in a vehicle includes at least one vehicle battery, which can be connected to an electrical power network by a vehicle charging interface of the vehicle. The vehicle battery has a storage capacity for storing electrical energy. The storage capacity of the vehicle battery is partitioned for different users. | 02-07-2013 |
20130099744 | METHOD AND CONTROL UNIT FOR CHARGING A VEHICLE BATTERY - A vehicle battery is charged by an authorized charging station. A first cryptographically protected communication link is set up between a charging control unit of the vehicle and the charging station after successful preliminary verification of a digital certificate for the charging station by the charging control unit of the vehicle. A second communication link is then set up between the charging control unit and an authorization server for charging stations. The charging control unit transmits information from the preliminarily verified digital certificate to the authorization server via the second communication link, which information is used by the authorization server to carry out an authorization check on the respective charging station. An authorization check result is transmitted from the authorization server to the charging control unit via the second communication link, which result is used to control a charging of the vehicle battery. | 04-25-2013 |
20130110328 | CONTROL NETWORK FOR A RAIL VEHICLE | 05-02-2013 |
20130132721 | Method and Apparatus for Providing a Key Certificate in a Tamperproof Manner - A method and a server are configured to provide, in a tamperproof manner, a key certificate for a public device key of a user device, which is installed for a user, by means of a server belonging to a service provider who provides the user with a service via the user device, wherein the server provides the user device with the key certificate if a signing request message received by the user device is successfully verified by the server using a one-time password generated for the user device by the server. | 05-23-2013 |
20130142336 | METHOD OF GROUP KEY GENERATION AND MANAGEMENT FOR GENERIC OBJECT ORIENTED SUBSTANTIATION EVENTS MODEL - A method and an apparatus provide dedicated group key distribution in systems employing generic object oriented substation events (GOOSE). The method includes defining a group configuration for the GOOSE system via a plurality of field devices, verifying possession by each field device in the group of an asymmetric key pair, distributing a group key individually to each field group member device by a substation controller via a secure interaction between the substation controller and the group member device, and updating the group key after the group configuration has changed. | 06-06-2013 |
20130162038 | APPARATUS AND METHOD FOR STABILIZING AN ELECTRICAL POWER IMPORT - An apparatus and a method for stabilizing an electrical power import from a power distribution system by way of at least one subscriber connected to the power distribution system via an electrical connection. An electrical power import anomaly when electrical power is imported by the respective subscriber from the power distribution system is identified using transmitted control messages, which are determined for the respective subscriber or originate from the respective subscriber. Once an electrical power import anomaly has been identified, power consumption units or power generation units are driven correspondingly. The apparatus effectively protects the power distribution system from third-party intervention or implementation errors which can bring about an unstable system response. | 06-27-2013 |
20130167234 | Method for Processing Messages in a Communication Network Comprising a Plurality of Network Nodes - A method for processing messages in a communication network, wherein messages are transmitted between network nodes of the communication network, which are each combined with test information that is verifiable to determine whether a corresponding message is admissible, where an admissible message leads to a positive test result and an inadmissible message leads to a negative test result. For at least one message that is provided for a respective network node, an action coupled to the message is performed from the respective network node in time a message is received in the respective network node without checking the test information combined with the message, wherein, upon execution of the action, the test information is verified by the respective network node and, when the test result is negative, at least one predefined measure is performed. | 06-27-2013 |
20130173914 | Method for Certificate-Based Authentication - A method is disclosed for certificate-based authentication, in which a first subscriber authenticates himself to a second subscriber using a digital certificate associated to the first subscriber. The certificate specifies requirement(s) and the fulfillment of a requirement is ensured by a third subscriber. Within the framework of the authentication by the second subscriber, a validity condition is checked, and the certificate is classified as valid if the validity condition is fulfilled, based on the issue and/or absence of issue of the requirement(s) specified in the certificate by the third subscriber. Requirements may be used to restrict the validity of the certificate. The validity of a certificate can thereby be controlled in a simple and flexible manner without explicitly defining the validity in the certificate. The method can be used for authentication in any technical field, e.g., to authentication subscribers in the form of components of an automation system. | 07-04-2013 |
20130173922 | METHOD FOR CERTIFICATE-BASED AUTHENTICATION - A first subscriber authenticates himself to a second subscriber with a certificate associated to the first subscriber. The certificate specifies one or several characteristics, which have to be fulfilled by the second subscriber. In the course of the authentication, it is verified using the certificate whether the second subscriber fulfills the characteristics, wherein a criterion required for successful authentication is that the second subscriber fulfills the characteristics(s). Characteristics of the second subscriber are verified in the framework of the authentication process, the second subscriber representing the authenticator with respect to whom the authentication is carried out. In this way, certificates for authentication dedicated communication links between two communication partners can be determined. The method can be used for any subscribers in a communication network, e.g., representing components of an automation system, such as, for example, control devices, field devices, sensors, actuators and the like. | 07-04-2013 |
20130179687 | METHOD AND APPARATUS FOR AUTHENTICATING MULTICAST MESSAGES - The last link in an initialization hash chain, calculated by a transmitter based on its anchor value, is distributed as an initialization function value to a receiver in an initialization phase. Subsequently, a multicast message is received and stored by a receiver and an authentication key release message, containing a cryptographic authentication key, is received from the transmitter by the receiver. A cryptographic function value h, calculated by the receiver for the cryptographic authentication key using a prescribed cryptographic function, is compared with the initialization function value to check the validity of the cryptographic authentication key in the authentication key release message. The multicast message is authenticated by the receiver using the cryptographic authentication key which has been recognized as valid. | 07-11-2013 |
20130191907 | Method and System for Secure Data Transmission with a VPN Box - A VPN box is connected upstream of a field device. The VPN box uses a secret cryptographic key of the field device for authentication when setting up a VPN tunnel and/or when setting up a cryptographically protected communication link. | 07-25-2013 |
20130305062 | DEVICE AND METHOD FOR PROTECTING A SECURITY MODULE FROM MANIPULATION ATTEMPTS IN A FIELD DEVICE - A device for protecting a security module from manipulation attempts in a field device. A control device is configured to control the field device, a security module is configured to provide cryptographic key data which is to be used by the control device, and an interface device is connected to the control device. The security module is configured to allow the control device access to the cryptographic key data in the security module and to prevent access to the cryptographic key data in the event of a manipulation attempt on the field device. | 11-14-2013 |
20130311791 | METHOD AND DEVICE FOR PROVIDING A CRYPTOGRAPHIC KEY FOR A FIELD DEVICE - A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which, when a physical manipulation carried out on the field device is detected, a manipulation message is emitted. The cryptographic key is only provided to the field device by the security device if the security device does not receive a manipulation message from the tamper sensors associated with the field device. | 11-21-2013 |
20140047568 | METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION - The invention relates to a method for monitoring a tamper protection of a field device, comprising the steps of: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result was determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; the registration device determining an active status of the field device in case the non-manipulation certificate is valid; a monitoring device checking the field device by querying the status of the field device and transferring field device data to the monitoring device; the monitoring device accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use. | 02-13-2014 |
20140048638 | ARRANGEMENT AND METHOD FOR LOCKING AN AUTOMATIC REELING MECHANISM OF A CHARGING CABLE FOR AN ELECTRIC VEHICLE - An automatic reeling mechanism for an electric vehicle or a charging post can automatically reel a charging cable and thus protect it against dirt and weather. In order to reduce mechanical loads and damage to the plug and minimize a risk for stumbling to a person, the automatic reeling mechanism is switched in a passive mode as long as a plug of the charging cable is plugged in and is not touched by a person. This is the case during the charging process. In this way, the automatic reeling mechanism can be comfortably used because no traction forces are active during the charging process and the charging cable can be laid out so that there is no risk of stumbling. | 02-20-2014 |
20140173688 | Method and System for Providing Device-Specific Operator Data for an Automation Device in an Automation Installation - Method and system for providing device-specific operator data for an automation device in an automation installation, which automation device authenticates itself to an authentication server in the automation installation via at least one authentication credential, wherein if up-to-date device-specific operator data from the installation operator of the automation installation are available for the automation device, then the up-to-date device-specific operator data are tied to the authentication credential of the authentication device. | 06-19-2014 |
20140245409 | Extension of the Attributes of a Credential Request - In order to issue a security credential, a client of a system is configured to send a credential request in order to have a credential issuer prepare a security credential. The credential request is received by a credential attribute intermediary connected between the client and the credential issuer. At least one attribute of the requesting client is ascertained by the credential attribute intermediary. The at least one attribute ascertained by the credential attribute intermediary is confirmed to the credential issuer. The security credential is issued by the credential issuer based on the credential request received by the credential attribute intermediary and based on the at least one attribute confirmed by the credential attribute intermediary. | 08-28-2014 |
20140358257 | System and method for providing a control program code - A system for providing a control program code (SPC) for controlling a device connected to a control device has: an authentication service which, after successful authentication of the device with respect to the authentication service, transmits a device ID (FG-ID) of the authenticated device to a commissioning service which, on the basis of the device ID (FG-ID) of the authenticated device, transmits a control program code (SPC) to a control device which controls the authenticated device using the control program code (SPC). | 12-04-2014 |
20150073591 | CHARGING DEVICE FOR CHARGING A VEHICLE ACCUMULATOR - A vehicle accumulator connected to a charging device is charged by controlling a configurable charge program executed by a control unit of the charge device. The configurable charge program is obtained from a charge program memory, so that the vehicle accumulator can be charged in an optimal manner with an individual charging characteristic. | 03-12-2015 |
20150086015 | Cryptographically Protected Redundant Data Packets - The embodiments relate to methods for generating cryptographically protected redundant data packets. N redundant data packets are produced by N different generation units. The respective generation unit is allocated a unique identification. N cryptographically protected redundant data packets are generated by an individual cryptographic function from the N generated redundant data packets, the cryptographic function being parameterized for generating the respective cryptographically protected data packet by a cryptographic key and by the identification allocated to the corresponding generation unit. The cryptographic key may be used for a plurality of channels. The embodiments also relate to a computer program product and a device for generating cryptographically protected redundant data packets. The embodiments further relate to a communication node for generating and transmitting cryptographically protected redundant data packets and to an arrangement for a communication network having a plurality of said type of communication nodes. | 03-26-2015 |
20150143545 | Function for the Challenge Derivation for Protecting Components in a Challenge-Response Authentication Protocol - The invention relates to a device for authenticating a product with respect to at least one authenticator. Said device comprises a capturing unit, a test unit and a transmitting unit. Said capturing unit is designed to capture a challenge emitted by the authenticator. Said test unit is designed to test an authorization from the authenticator for capturing a response to the emitted challenge. Said transmitter unit is designed to transmit a predetermined response to the authenticator in accordance with the tested authorization and the captured challenge. As a result, increased security during the authentication is ensured. The invention also relates to a system comprising said type of device and an authenticator, and to a method and a computer program product for authenticating a product. | 05-21-2015 |
20150149779 | Secure Transmission of a Message - The embodiments relate to methods and apparatuses for producing secure transmission of a message. The methods are based on production of a basic key that is used for producing respective transmitter keys for a plurality of transmitters. For the ascertainment of the receiver keys by respective receivers, the basic key is transmitted to the receivers, which for their part are able to ascertain a receiver key for checking the integrity of the message from a respective transmitter on the basis of the basic key and an identifier for the transmitter. The receiver ascertains a cryptographic checksum, which, in the course of the integrity check, is compared with a cryptographic checksum that has been produced by the transmitter and sent along by the respective message. The embodiments may be used within the context of automation and sensor networks. | 05-28-2015 |
20150155709 | Avoiding an overload for transmission links within a power supply system - A method and a regulating unit for avoiding overloads for link sections within a power supply system use requirements for loads to determine which link sections can be enabled for loads. | 06-04-2015 |
20150215301 | Authentication of a First Device by a Switching Center - A method, a first device, and a switching center are described. A first device is authenticated by a switching center inside a network taking into account the use of additional (e.g., virtual) network interfaces. A device uses certificates to transfer additional MAC addresses for authentication. As a result, a device having a plurality of MAC addresses gains access to a network from a plurality of MAC addresses in a one-off authentication process. | 07-30-2015 |
20150215321 | Authorising A User By Means of a Portable Communications Terminal - A method and system for authorizing a user at a field device by a portable communications device. A first information is acquired by the portable communications device for identifying the field device. The portable communications device sends to a system the first information and a second information for identifying at least one of (i) the portable communications device, and (ii) the user thereof. The system determines a first piece of access information on the basis of the first information and the second information, and sends the first piece of access information to the portable communications device. The portable communications device transmits the second information and the first piece of access information to the field device. The field device determines a second piece of access information on the basis of the second information, and compares the first piece of access information with the second piece of access information. Access to the field device is allowed upon determining that the first piece of access information and the second piece of access information match. | 07-30-2015 |
20150293748 | Random Number Generator and Method for Generating Random Numbers - A random number generator for generating random numbers using a solid-state memory is proposed. The random number generator includes a determination unit for determining management data stored in the solid-state memory and for managing the solid-state memory during operation. The random number generator also includes a computing unit for calculating a starting value on the basis of the determined management data. The random number generator also includes a generation unit for generating a random number on the basis of the calculated starting value. | 10-15-2015 |
20150350072 | Apparatus and Method for Transmitting Data - An apparatus ( | 12-03-2015 |
20160006570 | GENERATING A KEY DERIVED FROM A CRYPTOGRAPHIC KEY USING A PHYSICALLY UNCLONABLE FUNCTION - The embodiments relate to a method and a device for generating a key derived from a cryptographic key using at least one physically unclonable function. At least one request value is assigned to the cryptographic key and to at least one derivation parameter. A response value is generated on a circuit unit using the at least one physically unclonable function dependent on at least one respective request value. The derived key is derived from the at least one response value. | 01-07-2016 |
20160057134 | Updating of a Digital Device Certificate of an Automation Device - The invention relates to an automation device ( | 02-25-2016 |