Method for Operating a Sensor Apparatus and Sensor Apparatus
1 Assignment
0 Petitions
Accused Products
Abstract
A sensor apparatus includes a housing with a security device, a secure first computation device, a second computation device (AC) and a sensor element. The sensor apparatus detects a temperature in the housing, to activate the first computation device only when the detected temperature is in a predefined temperature range, to determine a session key by the first computation device and to store the session key in a second memory of the second computation device, to deactivate the first computation device after the session key has been stored, to determine data on the basis of a sensor signal detected using the sensor element and to encrypt and/or sign the data by the second computation device on the basis of the session key.
75 Citations
32 Claims
-
1-15. -15. (canceled)
-
16. A method for operating a sensor apparatus that comprises:
-
a housing having a security device configured to detect unauthorized access to the housing; a secure first computation device having a secure non-volatile first memory arranged in the housing; a second computation device having a second memory or is assigned the second memory arranged in the housing with the second memory; and at least one sensor element electrically coupled to the second computation device configured to supply a sensor signal to the second computation device, the method comprising; detecting a temperature in the housing; activating the first computation device only when the detected temperature is in a predefined temperature range; determining a session key by the first computation device; storing the session key in the second memory; deactivating the first computation device after the session key is stored in the second memory; determining data based at least in part on the sensor signal; and at least one of encrypting and signing the data by the second computation device based on the session key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
the second computation device is operated using at least one of the at least one program, the at least one identification data item, and the at least one parameter.
-
-
20. The method as claimed in claim 16, further comprising:
-
monitoring one or more of the security device of the housing, at least one operating variable, and an ambient variable; and deleting at least the session key from the second memory upon determining at least one of a violation of the integrity of the housing, an impermissible value, an impermissible change in the value of the at least one operating variable, and an ambient variable.
-
-
21. The method as claimed in claim 20, further comprising deleting from the second memory one or more of the at least one identification data item and the at least one parameter.
-
22. The method as claimed in claim 21, wherein deleting is effected by overwriting.
-
23. The method as claimed in claim 20, wherein at least one of:
-
the ambient variable is the temperature in the housing and the operating variable is an operating voltage of the sensor apparatus.
-
-
24. A sensor apparatus comprising:
-
a housing; a security device arranged in the housing configured to detect unauthorized intrusion into the housing; a secure first computation device arranged in the housing having a secure non-volatile first memory; a second computation device one of having a second memory and being assigned the second memory is arranged in the housing with the second memory; and at least one sensor element that is electrically coupled to the second computation device and configured to supply a sensor signal to the second computation device, wherein the sensor apparatus is configured to; detect a temperature in the housing activate the first computation device only when the detected temperature is in a predefined temperature range determine a session key by the first computation device; store the session key in the second memory; deactivate the first computation device after the session key has been stored in the second memory; determine data based on the sensor signal; and at least one of encrypt and sign the data by the second computation device based on the session key. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
Specification