Apparatus and method for generating secret key
A technology for secret keys and keys, applied in the field of machine-readable storage media, to achieve the effect of reducing the probability of success
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] figure 1 The basic application of the method according to the invention is depicted in a schematic and simplified manner. The point of departure for the observation here is the computer network 10 , which comprises a plurality of nodes 14 that are already connected to one another in a secure manner. The cloud 12 connecting these nodes 14 represents the situation in which, in addition to the nodes 14 indicated by the symbol, any number of further nodes can participate in the computer network 10 , said further nodes enabling, for example, a direct connection of the nodes 14 within the computer network 10 . .
[0017] Thus, the nodes 14 may be, for example, wireless access points (APs), which provide access to the Internet 10 by means of the general backbone 12 . In another embodiment, the computer network 10 may be a WBAN or other wireless sensor network (WSN), the lower protocol layer corresponds to the standard IEEE802.15.4, and the routing and application interface m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 