Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Device, system and method for securing a negotiation of at least one cryptographic key between units

A technology of cryptographic keys and equipment, which is applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as rising slowly, computing consumption ratio exponentially rising, insecurity, etc.

Inactive Publication Date: 2016-06-15
SIEMENS SWITZERLAND
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these possibilities have the disadvantage that they are complex and error-prone because they are based on manual input or are insecure because the distribution of the keys takes place via an unsecured network.
Compared with other methods, the determination of the private key from the public key is unknown so far for elliptic curve-based cryptographic methods, and its computational cost ratio increases slowly and exponentially with the key length
[0012] Traditional methods for secure key agreement are typically costly, error-prone, and insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device, system and method for securing a negotiation of at least one cryptographic key between units
  • Device, system and method for securing a negotiation of at least one cryptographic key between units
  • Device, system and method for securing a negotiation of at least one cryptographic key between units

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Unless stated otherwise, identical or functionally identical elements are provided with the same reference symbols in the figures.

[0065] figure 1 A diagram is shown of a method for securing the negotiation of at least one cryptographic key according to an embodiment of the invention.

[0066] In this case, the equipment is manufactured in factory F. This device is a household device in the present example and is to be installed in building G after provision A. A device is, for example, a heating body whose thermal output is controlled by means of building automation, ie, the individual control of the devices in the building. Since not only a single heating element is installed in building G, but a large number of heating elements are installed, it is necessary for temperature regulation in building G that the individual heating elements communicate with each other and exchange measurement data relating to heat release, for example.

[0067] In the exemplary embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a device, system and method for securing a negotiation of at least one cryptographic key between units. The method comprising: at least one of each device during manufacture and before it is put into operation in the private and public keys stored on each device, providing private and public keys for each device; the key stored on the device management station, each key including private and public keys for one device; using at least one public function to create at least one security certificate to allow authentication checks for at least one device; and after the equipment has been put into operation, according to the stored private key and a public key stored standing negotiation between at least two devices managed by the device at least one cryptographic key.

Description

[0001] This application is a divisional application of an invention patent application with the application number 201080058855.X, the application date is November 17, 2010, and the invention title is "A device and method for ensuring the negotiation of at least one cryptographic key between devices" . technical field [0002] The present invention relates to a method and a device for securing an eavesdropping-proof and forgery-proof communication between devices and in particular to a method and a device for securing the negotiation of at least one cryptographic key. The invention furthermore relates to a computer program product enabling execution of a method for securing the negotiation of at least one cryptographic key and a data memory storing the computer program product. Background technique [0003] In modern construction technology, a large number of devices and devices are installed not only in factory buildings, but also in commercial and private buildings. In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/083H04L9/0838H04L9/3263H04L63/061H04L63/0442H04L2209/805
Inventor J.格斯纳B.伊斯勒F.利泽
Owner SIEMENS SWITZERLAND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products