Method and device for establishing secure communication between network devices

A technology for network equipment and secure communication, which is applied in the field of arrangement between network equipment and can solve problems such as confusion and complex distinction.

Active Publication Date: 2021-05-25
PHOENIX CONTACT GMBH & CO KG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, therefore, the subsequent distinction between the two error cases is also complicated, as is shown in the method according to patent document DE 10 2012 220 990 B3: If two different shared secrets are generated, then, It is debatable whether this is due to confusion, and whether the messages exchanged for their calculations were inadvertently altered in transit, e.g. by interference, or intentionally altered by, e.g., third parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for establishing secure communication between network devices
  • Method and device for establishing secure communication between network devices
  • Method and device for establishing secure communication between network devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0177] below in particular with reference to figure 1 , which shows a basic schematic diagram of a preferred procedure for establishing a secure communication within the scope of the present invention.

[0178] here, figure 1 shows in detail the communication network used in the figure 1 A first network device called a client or initiator in a figure 1 A preferred embodiment for setting up secure communication between second network devices referred to as servers or transponders in , wherein the communication network is not further shown here for the sake of clarity. as by figure 1 It can be seen that here, under the condition of using a symmetric encryption system or symmetric encryption technology, separate authentication / authentication is performed for the first and second network devices respectively, and the password G to be used as a shared key Pw for secure communication is generated It was previously performed in which, in a symmetric encryption system / symmetric en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method for establishing secure communication between a first network device (initiator) and a second network device (responder) within a communication network and an arrangement of network devices suitable for this method, It is characterized in that separate authentication / authentication is performed for the first and second network devices using a symmetric encryption system, in which the two network devices are The same cipher is used as the key for encrypting and decrypting the data set.

Description

technical field [0001] The invention relates to a method for secure communication between a first network device (initiator) and a second network device (responder) within a communication network and to an arrangement of network devices suitable therefor, in particular configured as Arrangement between network devices of embedded systems. Background technique [0002] Hereinafter and in the claims, a network device means a device that can communicate with other devices via at least one network, both autonomously and triggered by a user, including having access to at least one network by means of a runtime system and via The network is a software component that communicates with other devices both autonomously and triggered by the user. [0003] It is known that under certain circumstances communications between network devices should be performed securely, eg in order to guarantee the integrity, confidentiality and / or availability of the communications. [0004] The integr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/3273H04L9/14H04L9/3247H04L63/0435
Inventor 托尔斯滕·福德
Owner PHOENIX CONTACT GMBH & CO KG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products