首页> 外国专利> A soft - and hardware combination called 'dome - goods' for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, suitable for 'man - in - the - middle' - attacks that is to be detected and weirs

A soft - and hardware combination called 'dome - goods' for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, suitable for 'man - in - the - middle' - attacks that is to be detected and weirs

机译:一种软硬件组合,称为“圆顶货物”,用于加密并防止至少两个处理器控制的终端之间的安全数据交换,适用于“中间人”攻击,该攻击将被检测到并产生堰

摘要

A soft - and hardware combination ‘ referred to as domes - goods " for the encrypted and against manipulation secure data exchange between at least two processor-controlled terminals, ‘ suited in order, - in - the - middle - attacks " can be seen and avert, such as, for example, in the personal communication (desktop - pc, a notebook, a server, mobile telephones, etc.), or embedded systems (for example, in automobiles, aeroplanes, trains, ships, etc.), as well as their tax - and / or evaluation systems (for example, production processes, in sensor systems, ‘ internet " of the things, etc.), or the like.The object of the invention, therefore, to provide a solution which makes it possible to use a coding which carries out in such a coding of a message, so that this does not become legible and / or to third is audible. The encryption is part of the invention, wherein a defence of the ‘ it is - in - the - middle - attacks " ", to achieve a hardware is preferably made of tokens or postage on the basis of the radio transmission via, for example, hf, uhf work and can be programmed.This is achieved in that a method and a device for the prevention of ‘ it is - in - the - middle - attacks " [15] and / or manipulations in the data stream [21] between at least two communicating systems [10] and [20], characterized in that implemented easily properties of software components for the encryption in front of the embodiment of the respective system - component with the aid of a hardware component can be recorded, and are available for later retrieval.
机译:可以看到软硬件组合(称为“半球形商品”),用于在至少两个处理器控制的终端之间进行加密和防止操纵的安全数据交换,“有序地进行中间攻击”。避免诸如在个人通信(台式计算机,笔记本,服务器,移动电话等)或嵌入式系统(例如在汽车,飞机,火车,轮船等)中使用,以及它们的税收和/或评估系统(例如,生产过程,传感器系统,“物联网”等)等。因此,本发明的目的是提供一种解决方案,使得可以使用在消息的这种编码中执行的编码,从而使得该消息变得不清晰和/或听不到三分之一。加密是本发明的一部分,其中,“是-为了实现硬件的中间攻击“”最好由令牌或邮资制成。在通过hf,uhf工作进行无线电传输的基础上,可以对其进行编程。这是通过一种防止“处于中间攻击”的方法和设备来实现的[15]和/或在至少两个通信系统[10]和[20]之间的数据流[21]中的操纵,其特征在于,在相应系统的实施例的前面,用于加密的软件组件的容易实现的属性-具有可以记录硬件组件的帮助,并可供以后检索。

著录项

  • 公开/公告号DE102015013949A1

    专利类型

  • 公开/公告日2017-05-04

    原文格式PDF

  • 申请/专利权人 JOHN PHILIPP DE GRAAFF;

    申请/专利号DE20151013949

  • 发明设计人 ERFINDER WIRD SPÄTER GENANNT WERDEN;

    申请日2015-10-28

  • 分类号H04L9/00;

  • 国家 DE

  • 入库时间 2022-08-21 13:22:59

相似文献

  • 专利
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号