G06F21/71

System-on-chip and method for operating a system-on-chip

In different example embodiments, a system-on-chip is provided. The system-on-chip can have a control circuit with a plurality of control circuit areas, wherein the control circuit is configured to control a device, a security circuit which has a separately secured key memory and a hardware accelerator for cryptographic operations, wherein the security circuit is configured to electively enable either a read-only access or a read and write access to at least one of the control circuit areas, wherein the security circuit is furthermore configured to provide a communication path by means of the key memory and the hardware accelerator for the secured communication with a diagnostic system disposed outside the security circuit, to make the selection between the read access and the read and write access to the at least one selected area of the control circuit depending on a certificate supplied to the security circuit and authenticated by means of information stored in the key memory, and to execute the read access or the read and write access.

System for advanced protection of consumable or detachable elements
11701893 · 2023-07-18 · ·

A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.

System for advanced protection of consumable or detachable elements
11701893 · 2023-07-18 · ·

A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.

Tamper resistant module for industrial control system

An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event.

Tamper resistant module for industrial control system

An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event.

Optimization of multiple battery management for electric vehicle fleets

Provided herein are system, methods and apparatuses for controlling replaceable rechargeable batteries powering and an electric vehicle, comprising, receiving battery utilization instructions computed by a remote battery management system for using and/or recharging each of a plurality of replaceable rechargeable batteries installed in an electric vehicle for powering the electric vehicle, and controlling one or more switching circuits configured to electrically couple or de-couple each of the plurality of batteries to each other and/or to an engine of the electric vehicle according to the received battery utilization instructions to use and/or recharge the respective battery.

Optimization of multiple battery management for electric vehicle fleets

Provided herein are system, methods and apparatuses for controlling replaceable rechargeable batteries powering and an electric vehicle, comprising, receiving battery utilization instructions computed by a remote battery management system for using and/or recharging each of a plurality of replaceable rechargeable batteries installed in an electric vehicle for powering the electric vehicle, and controlling one or more switching circuits configured to electrically couple or de-couple each of the plurality of batteries to each other and/or to an engine of the electric vehicle according to the received battery utilization instructions to use and/or recharge the respective battery.

SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM

A secret share value [q] of a quotient q of a/p is obtained through secure computation using a secret share value [a] and a modulus p and [a/d.sub.0]=[(a+qp)/d.sub.0]−[q]p/d.sub.0, . . . , [a/d.sub.n−1 ]=[(a+qp)/d.sub.n−1]−[q]p/d.sub.n−1 are obtained and output through secure computation using secret share values [a] and [q], divisors d.sub.0, . . . , d.sub.n−1, and a modulus p. Here, [μ] is a secret share value of μ, a is a real number, n is an integer equal to or greater than 2, d.sub.0, . . . , d.sub.n−1 are divisors of real numbers, p is a modulus of a positive integer, and q is a quotient of a positive integer.

SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM

A secret share value [q] of a quotient q of a/p is obtained through secure computation using a secret share value [a] and a modulus p and [a/d.sub.0]=[(a+qp)/d.sub.0]−[q]p/d.sub.0, . . . , [a/d.sub.n−1 ]=[(a+qp)/d.sub.n−1]−[q]p/d.sub.n−1 are obtained and output through secure computation using secret share values [a] and [q], divisors d.sub.0, . . . , d.sub.n−1, and a modulus p. Here, [μ] is a secret share value of μ, a is a real number, n is an integer equal to or greater than 2, d.sub.0, . . . , d.sub.n−1 are divisors of real numbers, p is a modulus of a positive integer, and q is a quotient of a positive integer.

METHOD OF MANAGING ACCESS RIGHTS FOR SOFTWARE TASKS EXECUTED BY A MICROCONTROLLER, AND CORRESPONDING INTEGRATED CIRCUIT
20230015027 · 2023-01-19 ·

In an embodiment a method for managing access rights of software tasks executed by a processing unit (CPU) using a cache memory containing execution data of the tasks in memory locations, each execution data having an attribute representative of a level of access right of the respective task, includes changing the attributes of the locations of the cache memory when the access rights of at least one task changes and retaining the execution data contained in the locations of the cache memory.