Method and device for providing a cryptographic key for a field device
First Claim
Patent Images
1. A security device assembly for providing a cryptographic key for a field device, comprising:
- a security device configured for receiving from at least one tamper sensor assigned to the field device a manipulation message emitted by the at least one tamper sensor upon detecting a physical manipulation carried out on the field device by an attacker accessing the field device;
said security device being configured to make the cryptographic key available to the field device only if the security device does not receive a manipulation message from the at least one tamper sensor assigned to the field device;
wherein the at least one tamper sensor is configured to obtain an energy supply for generating the manipulation message to said security device from energy produced during the physical manipulation carried out on the field device by the attacker accessing the field device.
1 Assignment
0 Petitions
Accused Products
Abstract
A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which, when a physical manipulation carried out on the field device is detected, a manipulation message is emitted. The cryptographic key is only provided to the field device by the security device if the security device does not receive a manipulation message from the tamper sensors associated with the field device.
23 Citations
15 Claims
-
1. A security device assembly for providing a cryptographic key for a field device, comprising:
-
a security device configured for receiving from at least one tamper sensor assigned to the field device a manipulation message emitted by the at least one tamper sensor upon detecting a physical manipulation carried out on the field device by an attacker accessing the field device; said security device being configured to make the cryptographic key available to the field device only if the security device does not receive a manipulation message from the at least one tamper sensor assigned to the field device; wherein the at least one tamper sensor is configured to obtain an energy supply for generating the manipulation message to said security device from energy produced during the physical manipulation carried out on the field device by the attacker accessing the field device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing a cryptographic key for a field device, the method which comprises:
-
monitoring with one or more tamper sensors a potential physical manipulation carried out on the field device; providing a security device; and making the cryptographic key available to the field device by the security device only if, within a specified period of time, the security device does not receive from the one or more tamper sensors assigned to the field device a manipulation message reporting a physical manipulation carried out on the field device by an attacker accessing the field device; wherein at least one of the tamper sensors obtains energy for generating a manipulation message from energy produced during the physical manipulation carried out on the field device by the attacker accessing the field device. - View Dependent Claims (13, 14, 15)
-
Specification