Process for detecting defective component exchanges
First Claim
1. A method of detecting an unauthorized exchange of components comprising the steps of:
- providing a message to be sent from a control unit to a first component wherein said message includes a randomly generated or not easily reproducible value used for checking said first component;
accessing, in said first component, an assignment field and assigning an identification to each of said randomly generated or not easily reproducible value;
transmitting said assigned identification back to said control unit; and
deciding, in said control unit, on the basis of the identification, whether the first component is a component which is authorized for use.
3 Assignments
0 Petitions
Accused Products
Abstract
Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data field of the message (3) a randomly generated or not easily reproducible value (5, 6) being entered, which is used for checking the installed component (2). The component (2) accesses an assignment field (8) and, as a result, assigns an identification (9) to each not easily reproducible or random value (5, 6) transmitted together with the message (3), and the component (2) transmits the identification corresponding to the value (5, 6) back to the control unit (1). The control unit (1) decides on the basis of the identification (9) whether the component (2) is that the component (2) which is authorized for use in the particular technical system.
-
Citations
9 Claims
-
1. A method of detecting an unauthorized exchange of components comprising the steps of:
-
providing a message to be sent from a control unit to a first component wherein said message includes a randomly generated or not easily reproducible value used for checking said first component;
accessing, in said first component, an assignment field and assigning an identification to each of said randomly generated or not easily reproducible value;
transmitting said assigned identification back to said control unit; and
deciding, in said control unit, on the basis of the identification, whether the first component is a component which is authorized for use. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a component, comprising of steps of:
-
providing to said component an encoded message containing an authentication portion;
assigning an identification value to said authentication portion as a function of an assignment field;
providing a response message from said component including said identification value; and
determining, as a function of said response message, whether said component is authentic. - View Dependent Claims (9)
-
Specification