Method and computer system for coding a message

A message coding and computer technology, applied in the direction of secure communication device, usage of multiple keys/algorithms, digital transmission system, etc., can solve the problems that CMIP cannot consider the failure of production, etc., and achieve fast executable and improved security Effect

Inactive Publication Date: 2009-10-14
SIEMENS AG
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] Based on fundamentally more complexities compared to SNMPv1 and SNMPv2, CMIP cannot be considered for production nor be successful in the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and computer system for coding a message
  • Method and computer system for coding a message
  • Method and computer system for coding a message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] get-request

[0068] Fig. 1 schematically depicts a first computer unit C1 and a second computer unit C2. The first computer unit C1 has an SNMPv1 management operator MA and a first agent agent PA1.

[0069] The second computer unit C2 has an SNMPv1 agent AQ and a second agent agent PA2 on the side of the second computer unit C2.

[0070] In a first step 101, an acquisition request is formed in the first computer unit C1. Formation of a get request is understood to mean the encoding of an encoded digital message into an encoded message using the encoding format of the SNMPv1 network protocol. This takes place in the first device 101 of the first computer unit C1 for encoding digital messages using the Internet protocol encoding format.

[0071] In a second step 102, a get-request, ie a coded message CN, is sent from the first device N1 to the first agent-intermediary PA1 on the part of the first computer C1.

[0072] In a third step 103 the encoded message CN is rec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention describes a method for a network protocol such as SNMPv1, according to which a message is encoded (101) into a coded message in a first computer unit (C1) using the encoding format of the network protocol (CN). The encoded message (CN) is cryptographically processed (104). The resulting cryptographically processed message (KBN) is re-encoded using the encoding format of the network protocol (105). The cryptographically processed message (CKN) encoded in this way is transmitted from the first computer unit (C1) to the second computer unit (C2). The message received in the 2nd computer unit (C2) is then decoded (109) according to the encoding format of the network protocol, and the decoded message (DKN) is subjected to reverse cryptographic processing (110). The inverse cryptographically processed message (IKN) is then re-decoded according to the encoding format of the network protocol.

Description

technical field [0001] Various network protocols are known within the scope of the management of computer networks. The task of managing computer networks is becoming more and more difficult due to the high popularity of computers and their ever-increasing networking, while the network management systems required for this are also becoming more and more powerful. In the field of computer network management, the security issues of network management are always gaining more and more significance. The security of network management has a great relationship with the security technology used in the system. Background technique [0002] Various network protocols for network management are known from the literature (M. Rose, The Simple Book, PTR Prentice Hall, 2. Edition, ISBN 0-13-177254-6, pp. 59-91, 1994), for example in 1 Type (SNMPv1 and Type 2 (SNMPv2) Simple-Network-Management-Protocol (SNMP) or Common-Management-Internet-Protocol (CMIP). [0003] For monitoring and contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14H04L12/24
CPCH04L63/126H04L63/123H04L63/0428H04L12/24H04L69/06H04L41/00H04L29/06H04L9/40
Inventor C·卡佩拉洛G·霍夫曼K·卢卡斯M·蒙策尔特
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products