CIRCUIT ARRANGEMENT AND METHOD FOR STARTING UP A CIRCUIT ARRANGEMENT
First Claim
Patent Images
1. A circuit arrangement, comprising:
- at least one crypto unit configured to provide at least one cryptographic function; and
an access monitoring interface configured to check an access request from an application computer program to a cryptographic function of the crypto unit, wherein the access monitoring interface is configured such that;
it checks whether the application computer program is authorized to access the cryptographic function of the crypto unit, by checking whether the application computer program contains a valid certificate which allows that application computer program use of the cryptographic function, if the application computer program is authorized to access the cryptographic function of the crypto unit, the cryptographic function is called, and if the application computer program is not authorized to access the cryptographic function of the crypto unit, the access request is refused.
1 Assignment
0 Petitions
Accused Products
Abstract
A circuit arrangement has a crypto unit which provides at least one cryptographic function. An access monitoring interface is also provided in order to check an access request from an application computer program to a cryptographic function of the crypto unit. The access monitoring interface is designed such that it checks whether the application computer program is authorized to access the cryptographic function, and the cryptographic function is called only if it is authorized to do so.
-
Citations
25 Claims
-
1. A circuit arrangement, comprising:
-
at least one crypto unit configured to provide at least one cryptographic function; and
an access monitoring interface configured to check an access request from an application computer program to a cryptographic function of the crypto unit, wherein the access monitoring interface is configured such that;
it checks whether the application computer program is authorized to access the cryptographic function of the crypto unit, by checking whether the application computer program contains a valid certificate which allows that application computer program use of the cryptographic function, if the application computer program is authorized to access the cryptographic function of the crypto unit, the cryptographic function is called, and if the application computer program is not authorized to access the cryptographic function of the crypto unit, the access request is refused. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for starting up a circuit arrangement, comprising:
-
checking whether a user who is starting up the circuit arrangement is authorized to use at least one function provided by the circuit arrangement; and
starting up the circuit arrangement, if the user is not authorized to use the at least one function provided by the circuit arrangement, in a first mode, in which the user has no access to the at least one function provided by the circuit arrangement. - View Dependent Claims (10)
-
-
11. A method for starting up a circuit arrangement, comprising:
-
checking whether a user who is starting up the circuit arrangement is authorized to use at least one cryptographic function provided by the circuit arrangement;
starting up the circuit arrangement, if the user is not authorized to use the at least one cryptographic function provided by the circuit arrangement, in a first mode in which the user has no access to the at least one cryptographic function provided by the circuit arrangement; and
starting up the circuit arrangement, if the user is authorized to use the at least one cryptographic function provided by the circuit arrangement, in a second mode, in which the user has access to the at least one cryptographic function provided by the circuit arrangement. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for operating a circuit arrangement, comprising:
-
receiving an access request from an application computer program to a cryptographic function which is provided by the circuit arrangement;
carrying out a check to determine whether the application computer program is authorized to access the cryptographic function;
calling, if the application computer program is authorized to access the cryptographic function, the cryptographic function; and
refusing, if the application computer program is not authorized to access the cryptographic function, the access request.
-
-
17. A circuit arrangement comprising:
-
at least one first computation unit configured to execute at least one computer program;
an access monitoring interface unit configured to check an access request to the first computation unit;
an input/output interface which is shared by the first computation unit and the access monitoring interface unit; and
a computation-unit-external bus which is coupled to the input/output interface, wherein the access monitoring interface unit is coupled to the input/output interface such that the access request is determined by it, and wherein the access monitoring interface unit is configured such that;
it checks whether the access request satisfies a predetermined access criterion, if the access request satisfies the predetermined access criterion, the first computation unit is allowed to process the access request, and if the access request does not satisfy the predetermined access criterion, the access request is refused, or a predetermined action is carried out. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification