Hardware-based security module - Ethernet security dongle for secure authentication
Hardware-based security module - Ethernet security dongle for secure authentication
A German university offers a hardware-based security module that enables authentication of common information processing devices without having to modify them. It can be used for bluetooth, Wifi, near field communication (NFC), zigbee applications or proprietary data transmission systems, as well as for mobile devices such as smartphones and tablets. It is more tamper-proof than previous encryption solutions. Licensees are sought.
Data can be encrypted for transfer using software-based or hardware-based security modules. However, the cryptographic key stored in this software or hardware gives attackers the opportunity to use it for their own ends. The use of mobile devices, such as smartphones and tablets, is problematic because the necessary keys are stored on the device and can be discovered. A German university offers is a retrofittable, protocol-independent, hardware-based security module for encrypting and decrypting data for internode transmission. This solution offers tamper-resistant level 2 encryption with an access-protected key. The invention can be used for bidirectional wireless or wired communication with stationary and mobile information or data processing devices connected to the internet, regardless of operating system. The security module has two interfaces, a programming device, a data transmission system, a central processing unit (CPU) for performing cryptographic operations, and protected memory for storing cryptographic keys. The interface for connecting the module to the transmission path has no access rights of any kind and the key can be neither written to memory nor read from the data stream in the transmission path. The second interface can store the key, but it cannot be read. The cryptographic key on the hardware-based security module must be written to the proper area of the memory through this second interface. Additionally, the module has a monitoring circuit that deletes the cryptographic key from the memory when unauthorized tampering is detected. This allows the hardware-based security module to be taken out of service to prevent the keys from being accessed. The security module is easy to use and can authenticate common information/data processing devices without the need for modification. It supports bluetooth, Wifi, zigbee applications and proprietary data transmission systems. It is also suitable for mobile devices such as smartphones, tablets, laptops, smartwatches, and remote keyless entry systems. It is more tamper-resistant than current encryption solutions. The university offers license agreements to industrial partners active in electronics, data communitation and information technology. The partner can use and further develop the solution.
Type: Technology Offer
Country: Germany
Profile updated on: 23/05/2022
Profile valid until: 19/11/2022
Partnership
Development stage | Under development/lab tested |
---|---|
Development stage - comment | Technology Readiness Level 5 The technology has been validated in extensive testing. |
Cooperation Ipr Status | Patent(s) applied for but not yet granted |
Cooperation Ipr Comment | An application for a patent has been submitted to the German Patent and Trademark Office |
Cooperation Partner Area | Partners are sought for license agreements Type of parner: Industry (electronics, data communication, information technology) Role of partner: License technology, integrate it in own products and solutions, possibly adjust and further develop it. |
Cooperation Partner Sought |
Company / Organisation
Organisation type | University |
---|---|
Company Turnover | |
Company Since | 0 |
Company Transnational | Si |
Technological fields
-
Security systems
INDUSTRIAL MANUFACTURING; MATERIAL AND TRANSPORT / Transport and Shipping Technologies
-
Electronic engineering
ELECTRONICS; IT AND TELECOMMS / Electronic circuits; components and equipment
Attachments
# | File Preview | File name |
---|---|---|
1 | 4872_4873_image.jpg | |
2 | 4872_4873_image.jpg | |
3 | 4872_4873_image.jpg | |
4 | 4872_4873_image.jpg | |
5 | 4872_4873_image.jpg |