首页>
外国专利>
A soft - and hardware combination called 'dome - goods' for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, suitable for 'man - in - the - middle' - attacks that is to be detected and weirs
A soft - and hardware combination called 'dome - goods' for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, suitable for 'man - in - the - middle' - attacks that is to be detected and weirs
A soft - and hardware combination ‘ referred to as domes - goods " for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, ‘ suited in order, - in - the - middle - attacks " can be seen and avert, such as, for example, in the personal communication (desktop - pc, a notebook, a server, mobile telephones, etc.), or embedded systems (for example, in automobiles, aeroplanes, trains, ships, etc.), as well as their tax - and / or evaluation systems (for example, production processes, in sensor systems, ‘ internet " of the things, etc.), or the like.The object of the invention, therefore, to provide a solution which makes it possible to use a coding which carries out in such a coding of a message, so that this does not become legible and / or to third is audible. The encryption is part of the invention, wherein a defence of the ‘ it is - in - the - middle - attacks " ", to achieve a hardware is preferably made of tokens or postage on the basis of the radio transmission via, for example, hf, uhf work and can be programmed.This is achieved in that a method and a device for the prevention of ‘ it is - in - the - middle - attacks " [15] and / or manipulations in the data stream [21] between at least two communicating systems [10] and [20], characterized in that implemented easily properties of software components for the encryption in front of the embodiment of the respective system - component with the aid of a hardware component can be recorded, and are available for later retrieval.
展开▼