首页>
外国专利>
A method and a validation unit for controlling the charging of it - systems, in particular embedded systems, usable cryptographic methods - keys, in particular 'key information'
A method and a validation unit for controlling the charging of it - systems, in particular embedded systems, usable cryptographic methods - keys, in particular 'key information'
An engineered loading of the cryptographic methods - key, in particular of the ‘ key information ’, for example, in that the externally stored information ’, ‘ key by outdated messages ’ or ‘ key information in the case of a chopper - attack on the system of the attacker (chopper) generated information ’, ‘ key can be exchanged, so that the possibility for the attacker (chopper) is obtained, with the key, which it during further choppers - attack on the system are helpful, to prevent, it is proposed that for controlling the charging of it - systems, in particular embedded systems, and that can be used in a cryptographic methods - hardware unit (khwe) chargeable cryptographic methods - keys, in particular ‘ key information ’, of the cryptographic methods - key before the loading in the cryptographic methods - hardware unit khwe) is tested on validity. The validity check whether the of the cryptographic methods - key is valid, then takes place, in particular before the cryptographic methods - key in the cryptographic methods - hardware unit (khwe) is used and, by a system-specific application software (asw) is used.
展开▼