COPY PROTECTION METHOD AND COPY-PROTECTED ELECTRONIC SYSTEM
20230179430 · 2023-06-08
Inventors
Cpc classification
H04L9/30
ELECTRICITY
H04L9/006
ELECTRICITY
H04L63/0442
ELECTRICITY
B29C45/76
PERFORMING OPERATIONS; TRANSPORTING
H04L63/062
ELECTRICITY
H04L9/3268
ELECTRICITY
H04L63/18
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
Abstract
A copy protection method for an electronic system has at least one electronic unit and at least one component which interacts with the electronic unit, in which at least one public-key infrastructure having at least one certification authority is used, wherein the certification authority issues at least one first certificate for the electronic unit and at least one second certificate for the at least one component, based on an identification feature of the electronic unit and of the component, respectively, and wherein, to check authenticity at least of the at least one component by means of the electronic unit, the respective certificates are at least mutually checked, wherein at least the first certificate is premade and loaded onto the electronic unit when producing and/or configuring the electronic unit, and/or at least the second certificate is premade and loaded onto the at least one component when producing and/or configuring the component.
Claims
1. A copy protection method, in particular an offline-capable copy protection method, for an electronic system having at least one, in particular central and/or superordinate, electronic unit and having at least one component which interacts with the electronic unit, in which at least one public-key infrastructure having at least one certification authority is used, wherein the certification authority issues at least one first certificate for the electronic unit on the basis of an identification feature of the electronic unit and at least one second certificate for the at least one component on the basis of an identification feature of the at least one component, and wherein, in order to check authenticity at least of the at least one component by means of the electronic unit, the respectively associated certificates are at least mutually checked, wherein at least the first certificate is premade, in particular offline, and is loaded onto the electronic unit, in particular offline, when producing the electronic unit and/or when configuring the electronic unit, and/or in that at least the second certificate is premade, in particular offline, and is loaded onto the at least one component, in particular offline, when producing the at least one component and/or when configuring the at least one component.
2. The copy protection method as claimed in claim 1, wherein at least the identification feature of the electronic unit that is used to issue the first certificate is transmitted to the certification authority via a transmission path that is independent from electronic data connections of the electronic unit.
3. The copy protection method as claimed in claim 1, wherein a specific public key of the public-key infrastructure and a specific private key of the public-key infrastructure are loaded onto the electronic unit, in particular offline, when producing the electronic unit and/or when configuring the electronic unit, and/or in that a further specific public key of the public-key infrastructure and a further specific private key of the public-key infrastructure are loaded onto the at least one component, in particular offline, when producing the at least one component and/or when configuring the at least one component.
4. The copy protection method as claimed in claim 3, wherein the public key(s) is/are stored in write-once memories of the electronic unit and/or of the at least one component.
5. The copy protection method as claimed in claim 3, wherein the private key(s) is/are stored in write-once memories of the electronic unit and/or of the at least one component in a protected manner such that it/they cannot be read.
6. The copy protection method as claimed in claim 1, wherein the certificate(s) is/are stored in rewritable memories.
7. The copy protection method as claimed in claim 1, wherein at least one additional encrypted data element is transmitted back and forth at least once between the electronic unit and the component by means of the public-key infrastructure.
8. The copy protection method as claimed in claim 7, wherein the encrypted data element is a time stamp.
9. The copy protection method as claimed in claim 1, wherein a list of identifiers of components and/or component groups compatible with the electronic unit is loaded onto the electronic unit when producing the electronic unit and/or when configuring the electronic unit.
10. The copy protection method as claimed in claim 9, wherein an identifier from the list of identifiers is assigned when producing the at least one component and/or when configuring the at least one component and is stored in a memory of the at least one component.
11. The copy protection method as claimed in claim 1, wherein the electronic unit is implemented as an electronic control device.
12. The copy protection method as claimed in claim 1, wherein the at least one component has at least one application-specific integrated circuit (ASIC), at least one field programmable gate array (FPGA) and/or at least one microcontroller (μC).
13. A copy protection method, in particular an offline-capable copy protection method, for an electronic system having at least one, in particular central and/or superordinate, electronic unit and having at least one component which interacts with the electronic unit, in which at least one public-key infrastructure having at least one certification authority is used, wherein the certification authority issues at least one first certificate for the electronic unit on the basis of an identification feature of the electronic unit and at least one second certificate for the at least one component on the basis of an identification feature of the at least one component, and wherein, in order to check authenticity at least of the at least one component by means of the electronic unit, the respectively associated certificates are at least mutually checked, the copy protection method further comprising at least one first method part having the method steps: setting up a data connection between the electronic unit and the at least one component, transmitting the first certificate from the electronic unit to the at least one component, verifying the first certificate by means of the at least one component, locally, in particular permanently or temporarily, storing the public key of the electronic unit by means of the at least one component after successful verification of the first certificate, transmitting the second certificate from the at least one component to the electronic unit, verifying the second certificate by means of the electronic unit, and locally, in particular permanently or temporarily, storing the further public key of the at least one component by means of the electronic unit after successful verification of the second certificate, and comprising at least one second method part having the method steps: generating a random number by means of the electronic unit, generating a time stamp by means of the electronic unit, locally and/or temporarily storing the random number and the time stamp by means of the electronic unit, encrypting a packet, which comprises at least the random number and at least one time stamp, by means of the further public key of the at least one component that is stored by the electronic unit, transmitting the encrypted packet from the electronic unit to the at least one component, decrypting the packet by means of the at least one component by means of the further private key of the at least one component, adding a specific identifier assigned to the at least one component to the packet, encrypting the packet which has been expanded by the specific identifier assigned to the at least one component by means of the public key of the electronic unit that is stored by the at least one component, transmitting the expanded packet from the at least one component to the electronic unit, decrypting the expanded packet by means of the electronic unit by means of the private key of the electronic unit, comparing the time stamp from the decrypted expanded packet with the time stamp that is locally and/or temporarily stored in the electronic unit, comparing the random number from the decrypted expanded packet with the random number locally and/or temporarily stored in the electronic unit, and matching the specific identifier from the decrypted expanded packet with identifiers from a list of identifiers which is stored in the electronic unit, and wherein authenticity of the at least one component is confirmed by the electronic unit if the following three criteria are satisfied: a) correspondence of the random numbers, b) correspondence of the time stamps, c) correspondence of the specific identifier to at least one identifier from the list of identifiers, or wherein, in the event of a discrepancy of the random numbers, in the event of a discrepancy of the time stamps or if the specific identifier transmitted to the electronic unit is absent in the list of identifiers stored by the electronic unit, a forgery and/or an incompatible component are/is identified by the electronic unit.
14. The copy protection method as claimed in claim 13, wherein when a forgery and/or an incompatible component are/is identified by the electronic unit, use of the forgery and/or use of the incompatible component within the electronic system are/is denied.
15. The copy protection method as claimed in claim 13, wherein the first method part and the second method part are carried out and/or repeated each time a component of the electronic system that interacts with the electronic unit is replaced and/or each time a component interacting with the electronic unit is newly installed.
16. The copy protection method as claimed in claim 13, wherein the second method part is carried out and/or repeated each time the electronic system is started.
17. An electronic unit, in particular an electronic control unit for an electronic system, having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 1.
18. A component of an electronic system, having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 1.
19. An electronic system having an electronic unit and having one or more components each having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 1.
20. A copy-protected electronic system, as claimed in claim 19, having at least one electronic unit and having at least one component which interacts with the electronic unit, wherein the electronic unit is provided for the purpose of checking authenticity at least of the at least one component by mutually checking certificates of a public-key infrastructure which are respectively associated with the electronic unit and the at least one component, wherein the electronic unit has a premade first certificate which is already installed when producing the electronic unit and/or when configuring the electronic unit, and/or in that the at least one component has a premade second certificate which is already installed when producing the at least one component and/or when configuring the at least one component.
21. The copy-protected electronic system as claimed in claim 20, wherein the electronic unit has a specific public key of the public-key infrastructure which is already installed when producing the electronic unit and/or when configuring the electronic unit, and has a specific private key of the public-key infrastructure which is already installed when producing the electronic unit and/or when configuring the electronic unit, and/or in that the at least one component has a further specific public key of the public-key infrastructure that is installed when producing the at least one component and/or when configuring the at least one component and has a further specific private key of the public-key infrastructure that is already installed when producing the at least one component and/or when configuring the at least one component.
22. The copy-protected electronic system as claimed in claim 20, further comprising offline checkability of the authenticity of the at least one component.
23. An electronic unit, in particular an electronic control unit for an electronic system, having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 13.
24. A component of an electronic system, having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 13.
25. An electronic system having an electronic unit and having one or more components each having pre-installed software and/or programming provided at least for the purpose of carrying out the copy protection method as claimed in claim 13.
26. A copy-protected electronic system, as claimed in claim 25, having at least one electronic unit and having at least one component which interacts with the electronic unit, wherein the electronic unit is provided for the purpose of checking authenticity at least of the at least one component by mutually checking certificates of a public-key infrastructure which are respectively associated with the electronic unit and the at least one component, wherein the electronic unit has a premade first certificate which is already installed when producing the electronic unit and/or when configuring the electronic unit, and/or in that the at least one component has a premade second certificate which is already installed when producing the at least one component and/or when configuring the at least one component.
27. The copy-protected electronic system as claimed in claim 26, wherein the electronic unit has a specific public key of the public-key infrastructure which is already installed when producing the electronic unit and/or when configuring the electronic unit, and has a specific private key of the public-key infrastructure which is already installed when producing the electronic unit and/or when configuring the electronic unit, and/or in that the at least one component has a further specific public key of the public-key infrastructure that is installed when producing the at least one component and/or when configuring the at least one component and has a further specific private key of the public-key infrastructure that is already installed when producing the at least one component and/or when configuring the at least one component.
28. The copy-protected electronic system as claimed in claim 26, comprising offline checkability of the authenticity of the at least one component.
Description
DRAWINGS
[0061] Further advantages emerge from the following description of the drawings. The drawings illustrate four exemplary embodiments of the invention. The drawings, the description and the claims contain numerous features in combination. A person skilled in the art will also expediently consider the features individually and will combine them to form further useful combinations.
[0062] In the drawings:
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
[0069]
[0070]
[0071]
[0072] The electronic units 12 of the electronic systems 10, 10′, 10″ are superordinate to the components 14, 36 of the electronic systems 10, 10′, 10″. The electronic units 12 of the electronic systems 10, 10′, 10″ each have pre-installed software and/or programming provided at least for the purpose of carrying out a copy protection method (described herein). Alternatively, a software patch can be loaded onto the electronic units 12 of the electronic systems 10, 10′, 10″, which software patch is provided for the purpose of making it possible to carry out the copy protection method described herein. Alternatively, a hardware element 112 (see
[0073] The electronic unit 12 is provided for the purpose of checking authenticity of the components 14, 36. The electronic unit 12 is provided for the purpose of checking the authenticity of the components 14, 36 by mutually checking certificates 20, 22 of a public-key infrastructure 16 which are respectively associated with the electronic unit 12 and the components 14, 36 (cf.
[0074] The electronic systems 10, 10′, 10″ form copy-protected electronic systems 10, 10′, 10″. The copy-protected electronic systems 10; 10′; 10″ make it possible to check the authenticity of the respectively associated components 14, 36 offline.
[0075] For this purpose, the electronic units 12 of the electronic systems 10, 10′, 10″ have the first certificate 20 which is already loaded when producing the electronic unit 12 and/or when configuring the electronic units 12. The first certificate 20 has been premade offline before being loaded onto the electronic unit 12. The electronic units 12 of the electronic systems 10, 10′, 10″ also have a specific public key 24 of the public-key infrastructure 16 which is already loaded when producing the electronic units 12 and/or when configuring the electronic units 12. The electronic units 12 of the electronic systems 10, 10′, 10″ also have a specific private key 26 of the public-key infrastructure 16 which is already loaded when producing the electronic units 12 and/or when configuring the electronic units 12. The specific public key 24 of one of the electronic units 12 and the specific private key 26 of the same electronic unit 12 form a unique key pair.
[0076] For this purpose, the components 14, 36 of the electronic systems 10, 10′, 10″ also have the second certificate 22 which is already loaded when producing the components 14, 36 and/or when configuring the components 14, 36. The second certificate 22 has been premade offline before being loaded onto the components 14, 36. The components 14, 36 of the electronic systems 10, 10′, 10″ also each have a further specific public key 28 of the public-key infrastructure 16 which is loaded when producing the components 14, 36 and/or when configuring the components 14, 36. The components 14, 36 of the electronic systems 10, 10′, 10″ also have a further specific private key 30 of the public-key infrastructure 16 which is already loaded when producing the components 14, 36 and/or when configuring the components 14, 36.
[0077]
[0078] The public-key infrastructure 16 has a certification authority 18. The cryptographic generator 50 may be formed separately from the certification authority 18 together with the certification authority 18. The certification authority 18 is provided for the purpose of issuing the first certificate 20 for the electronic unit 12. The certification authority 18 is provided for the purpose of issuing the second certificate 22 for the respective components 14, 36. The manufacturer of the component 14, 36 and/or of the electronic unit 12 assigns a key pair to each component 14, 36 and/or to each electronic unit 12. The manufacturer of the component 14, 36 and/or of the electronic unit 12 respectively transmits the public key 24, 28 of the assigned key pairs, together with the respectively associated assigned identification features 48, 52, in a manner packaged in packets, to the certification authority 18 via a secure transmission path which is independent from electronic data connections of the electronic unit 12 and/or of the components 14, 36. Alternatively, it is conceivable for the manufacturer to transmit the identification features 48, 52 to the cryptographic generator 50 which assigns a key pair to each identification feature 48, 52 associated with a component 14, 36 or with an electronic unit 12 and forwards the public keys 24, 28 of the assigned key pairs, together with the respectively associated assigned identification features 48, 52, in a manner packaged in packets, to the certification authority 18 via a secure transmission path which is independent from electronic data connections of the electronic unit 12 and/or of the components 14, 36.
[0079] The first certificate 20 is then respectively issued on the basis of the transmitted identification feature 48 of the electronic unit 12 and the associated public key 24, 28 of the electronic unit 12. The second certificate 22 is then respectively issued on the basis of the transmitted identification feature 52 of the components 14, 36 and the associated public key 24, 28 of the components 14, 36. The first certificate 20 is premade. The first certificate 20 is premade offline. The second certificate 22 is premade. The second certificate 22 is premade offline. The premade certificates 20, 22 are returned from the certification authority 18 to the respective manufacturer of the electronic unit 12 and/or of the component 14, 36 via a secure transmission path which is independent from electronic data connections of the electronic unit 12 and/or of the components 14, 36.
[0080] When producing the electronic unit 12, the first certificate 20 associated with the electronic unit 12 is loaded onto the electronic unit 12 (offline). Alternatively or additionally, the first certificate 20 associated with the electronic unit 12 is loaded onto the electronic unit 12 when configuring the electronic unit 12 (offline). The first certificate 20 associated with the electronic unit 12 is stored in a rewritable memory of the electronic unit 12. When producing the component 14, 36, the second certificate 22 associated with the component 14, 36 is loaded onto the component 14, 36 (offline). Alternatively or additionally, the second certificate 22 associated with the component 14, 36 is loaded onto the component 14, 36 when configuring the component 14, 36 (offline). The second certificate 22 associated with the component 14, 36 is stored in a rewritable memory of the component 14, 36.
[0081] When producing the electronic unit 12, the specific public key 24 of the public-key infrastructure 16 that is associated with the electronic unit 12 is loaded onto the electronic unit 12 (offline). Alternatively or additionally, the specific public key 24 of the public-key infrastructure 16 that is associated with the electronic unit 12 is loaded onto the electronic unit 12 when configuring the electronic unit 12 (offline). The public key 24 assigned to the electronic unit 12 is stored in a write-once memory of the electronic unit 12. When producing the electronic unit 12, the specific private key 26 of the public-key infrastructure 16 that is associated with the electronic unit 12 is loaded onto the electronic unit 12 (offline). Alternatively or additionally, the specific private key 26 of the public-key infrastructure 16 that is associated with the electronic unit 12 is loaded onto the electronic unit 12 when configuring the electronic unit 12 (offline). The private key 26 assigned to the electronic unit 12 is stored in a write-once memory of the electronic unit 12 such that it cannot be read (in an encrypted form).
[0082] The manufacturer of the electronic unit 12 or the operator of the certification authority 18 creates a list of identifiers 56 of components 14, 36 that are compatible with the electronic unit 12 and/or of component groups that are compatible with the electronic unit 12. When producing the electronic unit 12, the list of identifiers 56 of components 14, 36 and/or component groups that are compatible with the electronic unit 12 is loaded onto the electronic unit 12 (offline). Alternatively or additionally, the list of identifiers 56 of components 14, 36 and/or component groups that are compatible with the electronic unit 12 is loaded onto the electronic unit 12 when configuring the electronic unit 12 (offline). The list of identifiers 56 of components 14, 36 and/or component groups that are compatible with the electronic unit 12 is stored in the write-once memory of the electronic unit 12 or in a rewritable memory of the electronic unit 12. It is conceivable for the list of identifiers 56 of components 14, 36 and/or component groups that are compatible with the electronic unit 12 to be stored in the memory of the electronic unit 12 such that it cannot be read (in an encrypted form).
[0083] When producing the component 14, 36, the specific public key 28 of the public-key infrastructure 16 that is associated with the component 14, 36 is loaded onto the component 14, 36 (offline). Alternatively or additionally, the specific public key 28 of the public-key infrastructure 16 that is associated with the component 14, 36 is loaded onto the component 14, 36 when configuring the component 14, 36 (offline). The public key 28 assigned to the component 14, 36 is stored in a write-once memory of the component 14, 36. When producing the component 14, 36, the specific private key 30 of the public-key infrastructure 16 that is associated with the component 14, 36 is loaded onto the component 14, 36 (offline). Alternatively or additionally, the specific private key 30 of the public-key infrastructure 16 that is associated with the component 14, 36 is loaded onto the component 14, 36 when configuring the component 14, 36 (offline). The private key 30 assigned to the component 14, 36 is stored in a write-once memory of the component 14, 36 such that it cannot be read (in an encrypted form).
[0084] The manufacturer of the components 14, 36 or the operator of the certification authority 18 assigns an identifier from the list of identifiers 56 to each component 14, 36. When producing the component 14, 36, one of the identifiers from the list of identifiers 56 is loaded onto the component 14, 36 (offline). When producing the component 14, 36, one of the identifiers from the list of identifiers 56 is stored in a memory of the component 14, 36 (offline). Alternatively or additionally, one of the identifiers from the list of identifiers 56 is loaded onto the component 14, 36 when configuring the component 14, 36 (offline) and/or is stored in the memory of the component 14, 36. The identifier assigned to the component 14, 36 is stored in a write-once memory of the component 14, 36 or in a rewritable memory of the component 14, 36. It is conceivable for the identifier assigned to the component 14, 36 to be stored in the memory of the component 14, 36 such that it cannot be read (in an encrypted form).
[0085]
[0086] The first method part 32 comprises a plurality of method steps 60, 62, 64, 66, 68, 70, 72. The method steps 60, 62, 64, 66, 68, 70, 72 of the first method part 32 may also have a sequence of method steps which differs from the sequence of method steps described below. In at least one method step 60 of the first method part 32, a data connection is set up between the electronic unit 12 and the component 14, 36. In at least one further method step 62 of the first method part 32, the first certificate 20 is transmitted from the electronic unit 12 to the component 14, 36. The first certificate 20 transmitted in the method step 62 comprises the public key 24 of the electronic unit 12. In at least one further method step 64 of the first method part 32, the first certificate 20 is verified by the component 14, 36. In the method step 64, the first certificate 20 is verified by means of a public key 110 of the certification authority 18. In the method step 64, the public key 24 of the electronic unit 12 is determined by the component 14, 36. In at least one further method step 66 of the first method part 32, the public key 24 of the electronic unit 12 is locally stored by the component 14, 36 in the memory of the component 14, 36, in particular in a ROM (permanent) of the component 14, 36 or in a RAM (temporary) of the component 14, 36, after the first certificate 20 has been successfully verified by the component 14, 36. In at least one further method step 68 of the first method part 32, the second certificate 22 is transmitted from the component 14, 36 to the electronic unit 12. The second certificate 22 transmitted in the method step 68 comprises the further public key 28 of the component 14, 36. In at least one further method step 70 of the first method part 32, the second certificate 22 is verified by the electronic unit 12. In the method step 70, the second certificate 22 is verified by means of the public key 110 of the certification authority 18. In the method step 70, the further public key 28 of the component 14, 36 is determined by the electronic unit 12. In at least one further method step 72 of the first method part 32, the further public key 28 of the component 14, 36 is locally stored by the electronic unit 12 in the memory of the electronic unit 12, in particular in a ROM (permanent) of the electronic unit 12 or in a RAM (temporary) of the electronic unit 12, after the second certificate 22 has been successfully verified by the electronic unit 12.
[0087] The second method part 34 comprises a plurality of method steps 74, 76, 78, 80, 82, 84, 86, 88, 90, 92, 94, 96, 98, 100, 102, 104, 106. The method steps 74, 76, 78, 80, 82, 84, 86, 88, 90, 92, 94, 96, 98, 100, 102, 104, 106 of the second method part 34 may also have a sequence of method steps that differs from the sequence of method steps described below. In at least one method step 74 of the second method part 34, at least one additional encrypted data element that is implemented as a time stamp and/or a cryptographically secure random number is transmitted back and forth at least once between the electronic unit 12 and the component 14, 36 by means of the public-key infrastructure 16. The electronic unit 12 has a cryptographically secure random number generator (not shown). In at least one method step 76 of the second method part 34, a cryptographically secure random number is generated by the random number generator of the electronic unit 12. In at least one method step 78 of the second method part 34, a time stamp is generated by the electronic unit 12. In at least one further method step 80 of the second method part 34, the cryptographically secure random number and the time stamp are locally and/or temporarily stored by the electronic unit 12 in the memory of the electronic unit 12. In this context, “temporarily storing” should be understood as meaning, in particular, time-limited storage during which the temporarily stored data are preferably deleted again after successfully identifying authenticity of the component 14, 36 or are overwritten when a further cryptographically secure random number or a further time stamp is generated. In at least one further method step 82 of the second method part 34, the electronic unit 12 creates a packet comprising at least the cryptographically secure random number and the time stamp. In at least one further method step 84 of the second method part 34, the packet comprising the cryptographically secure random number and the time stamp is encrypted by means of the further public key 28 of the component 14, 36 that is stored by the electronic unit 12. In at least one further method step 86 of the second method part 34, the encrypted packet is transmitted from the electronic unit 12 to the component 14, 36. In at least one further method step 88 of the second method part 34, the packet is decrypted by the component 14, 36 by means of the further private key 30 of the component 14, 36. In at least one further method step 90 of the second method part 34, the specific identifier assigned to the component 14, 36 is added to the packet by the component 14, 36. In at least one further method step 92 of the second method part 34, the packet expanded by the specific identifier assigned to the component 14, 36 is encrypted by means of the public key 24 of the electronic unit 12 that is stored by the component 14, 36. In at least one further method step 94 of the second method part 34, the packet expanded by the specific identifier assigned to the component 14, 36 is transmitted from the component 14, 36 to the electronic unit 12. In at least one further method step 96 of the second method part 34, the packet expanded by the specific identifier assigned to the component 14, 36 is decrypted by the electronic unit 12 by means of the private key 26 of the electronic unit 12. In at least one further method step 98 of the second method part 34, the time stamp from the expanded packet received by the electronic unit 12 and decrypted by the electronic unit 12 is compared with the time stamp stored locally and/or temporarily in the memory of the electronic unit 12. In at least one further method step 100 of the second method part 34, the cryptographically secure random number from the expanded packet received by the electronic unit 12 and decrypted by the electronic unit 12 is compared with the cryptographically secure random number stored locally and/or temporarily in the memory of the electronic unit 12. In at least one further method step 102 of the second method part 34, the specific identifier from the expanded packet received by the electronic unit 12 and decrypted by the electronic unit 12 is matched with identifiers from the list of identifiers 56 stored in the memory of the electronic unit 12. In at least one further method step 104 of the second method part 34, authenticity of the component 14, 36 is confirmed by the electronic unit 12 if the following three criteria are satisfied: a) correspondence of the cryptographically secure random numbers, b) correspondence of the time stamps and c) correspondence of the specific identifier to at least one identifier from the list of identifiers 56 stored in the memory of the electronic unit 12. Alternatively, in at least one further method step 106 of the second method part 34: a) in the event of a discrepancy of the cryptographically secure random numbers, b) in the event of a discrepancy of the time stamps or c) if the specific identifier transmitted to the electronic unit 12 is absent in the list of identifiers 56 stored by the electronic unit 12, a forgery and/or an incompatible component are/is identified by the electronic unit 12.
[0088] In at least one further method step 108, if a forgery and/or an incompatible component are/is identified by the electronic unit 12 in the second method part 34, use of the forgery and/or use of the incompatible component within the electronic system 10, 10′, 10″ is denied.
[0089]