摘要 |
A method for identifying manipulation of data records (LOG1,.., LOGn) in a system comprising a computation apparatus and an external security apparatus, wherein the data records are stored in the computation apparatus, having the method steps of: allocation of a secret to a computation apparatus, generation of a first cryptographic key (K1) by a one-way function (H) on the basis of the secret (SEC), storage of the secret (SEC) on a security apparatus that is different from the computation apparatus, use of the first cryptographic key (K1) for the purpose of protecting a first data record (LOG1), and generation of a respective next cryptographic key (Kn) by the same one-way function (H) on the basis of the respectively preceding cryptographic key (Kn-1) for the purpose of protecting (38) a next data record (LOGn) on the computation apparatus and simultaneous erasure or overwriting of the respectively preceding cryptographic key (Kn-1). |
申请人 |
Siemens Aktiengesellschaft |
发明人 |
BUSSER, Jens-Uwe;CUELLAR, Jorge;MUNZERT, Michael;PATZLAFF, Heiko;STIJOHANN, Jan |