Method and arrangement for secure communication between network units in a communication network
A technology of network device and communication network, applied in the field of secure communication, can solve the problem that secret and real communication is difficult to be guaranteed, and achieve the effects of low cost, attack prevention and low consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] figure 1 A schematic view of a first embodiment of a device 1 with a first network device Sec and a second network device P in a communication network is shown. Between the first network device Sec and the second network device P there is figure 1 Communication connections are shown by dotted lines. For better readability, additional components of the communication network are not included in the figure 1 shown in .
[0054] The second network device P is a general-purpose computer composed of standard components and thus an unsecured or unsecured platform, whereas the first network device Sec is a secure controller, ie a secured or secure platform.
[0055] The secure controller Sec comprises secure hardware components HK for securely storing and securely executing software, while the non-secure platform P comprises secure software components SK for securely storing and securely executing software. By means of the secure software component SK, the software on the i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 