Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and arrangement for secure communication between network units in a communication network

A technology of network device and communication network, applied in the field of secure communication, can solve the problem that secret and real communication is difficult to be guaranteed, and achieve the effects of low cost, attack prevention and low consumption

Active Publication Date: 2015-07-22
SIEMENS AG
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the use of secure hardware components entails the disadvantage that additional problems may arise through additionally required communication between the insecure platform and the secure hardware components
[0007] Therefore, secret and authentic communication between insecure hardware platforms and secure components has so far been difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and arrangement for secure communication between network units in a communication network
  • Method and arrangement for secure communication between network units in a communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] figure 1 A schematic view of a first embodiment of a device 1 with a first network device Sec and a second network device P in a communication network is shown. Between the first network device Sec and the second network device P there is figure 1 Communication connections are shown by dotted lines. For better readability, additional components of the communication network are not included in the figure 1 shown in .

[0054] The second network device P is a general-purpose computer composed of standard components and thus an unsecured or unsecured platform, whereas the first network device Sec is a secure controller, ie a secured or secure platform.

[0055] The secure controller Sec comprises secure hardware components HK for securely storing and securely executing software, while the non-secure platform P comprises secure software components SK for securely storing and securely executing software. By means of the secure software component SK, the software on the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a first network unit (See) which comprises a secure hardware component (HK) for saving and running software. A second network unit (P) comprises a secure software component (SK) for saving and running software. A method for secure communication comprises: saving a first common secret, a first algorithm and a second algorithm on the network units; sending a first date from the second network unit to the first network unit; running the first algorithm on the first network unit and on the second network unit wherein the input is in each case formed by the second common secret and the first date; sending of a second date from the first network unit to the second network unit; running the second algorithm on the first network unit and on the second network unit; wherein the input is formed in each case by the second common secret and the second date; and use of the third common secret for a secure communication.

Description

technical field [0001] The present invention relates to methods and arrangements for secure communication between network devices in a communication network. Background technique [0002] It is often desirable to secure software to be executed on an insecure network device, such as an insecure hardware platform, from external attacks. An insecure hardware platform such as a general-purpose computer composed of standard components has no countermeasures against such external attacks on software running on the platform. An attack from the outside intends, for example, to obtain information about the running software or to manipulate the software. [0003] In order to implement measures to meet specific security requirements for running software on an insecure hardware platform, different approaches exist. [0004] If the hardware platform involved cannot be extended or changed, all measures to ensure software security must be implemented by extending the existing software. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0838H04L9/0877H04L2209/16H04L63/061H04L63/068
Inventor S.皮卡J.兹旺茨格
Owner SIEMENS AG