Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Device and method for securing a negotiation of at least one cryptographic key between units

A technology of cryptographic keys and equipment, which is applied to secure communication devices and key distribution, which can solve problems such as error-prone, slow increase in calculation cost ratio, insecurity, etc.

Inactive Publication Date: 2012-09-05
SIEMENS SWITZERLAND
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these possibilities have the disadvantage that they are complex and error-prone because they are based on manual input or are insecure because the distribution of the keys takes place via an unsecured network.
Compared with other methods, the determination of the private key from the public key is unknown so far for elliptic curve-based cryptographic methods, and its computational cost ratio increases slowly and exponentially with the key length
[0011] Traditional methods for secure key agreement are typically costly, error-prone, and insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for securing a negotiation of at least one cryptographic key between units
  • Device and method for securing a negotiation of at least one cryptographic key between units
  • Device and method for securing a negotiation of at least one cryptographic key between units

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Unless stated otherwise, identical or functionally identical elements are provided with the same reference symbols in the figures.

[0068] figure 1 A diagram is shown of a method for securing the negotiation of at least one cryptographic key according to an embodiment of the invention.

[0069] In this case, the equipment is manufactured in factory F. This device is a household device in the present example and is to be installed in building G after provision A. A device is, for example, a heating body whose thermal output is controlled by means of building automation, ie, the individual control of the devices in the building. Since not only a single heating element is installed in building G, but a large number of heating elements are installed, it is necessary for temperature regulation in building G that the individual heating elements communicate with each other and exchange measurement data relating to heat release, for example.

[0070] In the exemplary embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and a device 1 for securing a negotiation of at least one cryptographic key KS. According to the invention, in a preferred embodiment a private key PS and a public key OS are provided during production of a unit and saved in said unit. The negotiation of the at least one cryptographic key KS then occurs, wherein said negotiation is secured depending on the created private key PS and / or the public key OS. The present invention can be used in building automation, for example.

Description

technical field [0001] The present invention relates to a method and a device for securing an eavesdropping-proof and forgery-proof communication between devices and in particular to a method and a device for securing the negotiation of at least one cryptographic key. The invention furthermore relates to a computer program product enabling execution of a method for securing the negotiation of at least one cryptographic key and a data memory storing the computer program product. Background technique [0002] In modern construction technology, a large number of devices and devices are installed not only in factory buildings, but also in commercial and private buildings. In this case it is possible for at least one selection of installed devices to communicate with each other and exchange data there. A possible application scenario for intercommunicating devices is building automation. In this case, a central control unit is typically provided, which activates a large number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/083H04L9/0838H04L9/3263H04L63/061H04L63/0442H04L2209/805
Inventor J.格斯纳B.伊斯勒F.利泽
Owner SIEMENS SWITZERLAND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products