DE102008010782B4 - Quality monitoring control of secret unmanipulatory P2P communications - Google Patents
Quality monitoring control of secret unmanipulatory P2P communications Download PDFInfo
- Publication number
- DE102008010782B4 DE102008010782B4 DE102008010782.4A DE102008010782A DE102008010782B4 DE 102008010782 B4 DE102008010782 B4 DE 102008010782B4 DE 102008010782 A DE102008010782 A DE 102008010782A DE 102008010782 B4 DE102008010782 B4 DE 102008010782B4
- Authority
- DE
- Germany
- Prior art keywords
- date
- data
- unit
- person
- global
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004891 communication Methods 0.000 title claims abstract description 51
- 238000012544 monitoring process Methods 0.000 title claims abstract description 5
- 238000000034 method Methods 0.000 claims abstract description 38
- 239000013598 vector Substances 0.000 claims abstract description 11
- 238000013519 translation Methods 0.000 claims abstract description 3
- 230000005540 biological transmission Effects 0.000 claims description 9
- 230000000903 blocking effect Effects 0.000 claims description 5
- 238000000275 quality assurance Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000012360 testing method Methods 0.000 description 5
- 230000008602 contraction Effects 0.000 description 3
- 238000013480 data collection Methods 0.000 description 3
- 238000006073 displacement reaction Methods 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 101100245764 Arabidopsis thaliana PSI2 gene Proteins 0.000 description 2
- 238000003908 quality control method Methods 0.000 description 2
- 101100240606 Caenorhabditis elegans scc-2 gene Proteins 0.000 description 1
- 238000009954 braiding Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 229960003692 gamma aminobutyric acid Drugs 0.000 description 1
- BTCSSZJGUNDROE-UHFFFAOYSA-N gamma-aminobutyric acid Chemical compound NCCCC(O)=O BTCSSZJGUNDROE-UHFFFAOYSA-N 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000008733 trauma Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Qualität überwachendes Steuerungsverfahren von geheimen unmanipulierbaren P2P-Kommunikationen, dadurch gekennzeichnet, – dass die am Verfahren beteiligten Einheiten personzugeordnete Einheiten und Kommunikation ausführende Einheiten sind, zwischen denen ein Teil von Daten in Form relativer Daten ausgetauscht werden, wobei ein relatives Datum aus der vektoriellen Subtraktion zwischen einem als Vektor interpretierten Datum (Minuend) und einem als Vektor interpretierten Zufallsdatum und/oder einem weiteren, als Translations-Rotationsvektor interpretierten Zufallsdatum berechnet wird, – dass jeder Person und Einheit mindestens ein kennzeichnendes Datum zugeordnet ist, wobei ein Einheit kennzeichnendes Datum untrennbar und unmanipulierbar mit der Einheit verbunden ist und die Person kennzeichnenden Daten unmanipulierbar in der personzugeordneten Einheit gespeichert sind, – dass in jeder am Verfahren beteiligten Einheit neben dem Einheit kennzeichnenden Datum oder neben den Einheit kennzeichnenden Daten mindestens ein weiteres eine Person und Einheit kennzeichnendes Datum (KDT) eines Trustcenters und mehr als ein einheitliches globales Datum gespeichert sind, wobei das globale Datum ein Kenndatum, ein Bitortdatum, ein Weltzeitdatum, ein Steuerdatum und ein globales Zufallsbezugsdatum enthält, – dass das Bitortdatum den Bitort im globalen Zufallsbezugsdatum zur Entnahme eines globalen Teilbezugsdatums angibt, – dass das globale Teilbezugsdatum alle Daten bereitstellt, die zur Berechnung aller zur Kommunikationseröffnung erforderlichen relativen Daten benötigt werden, – dass jede am Verfahren beteiligte Einheit ein oder mehrere Fehlerzähler und mindestens ein Statusregister enthält, – dass sich eine Person anhand ihrer zugeordneten Einheit authentisiert, – dass sich die personzugeordneten Einheiten und die Kommunikation ausführenden Einheiten und die Kommunikation ausführenden Einheiten untereinander authentifizieren, ...A quality monitoring control method of secret unmanipulatable P2P communications, characterized in that the units involved in the procedure are person-assigned units and communication execution units between which a part of data is exchanged in the form of relative data, a relative date from the vectorial subtraction between a date (Minuend) interpreted as a vector and a random data interpreted as a vector and / or another random date interpreted as a translation rotation vector, - that each person and unit is assigned at least one characteristic date, a unit identifying date being inseparable and unmanipulatable is associated with the unit and the person characterizing data is stored unmanipulatable in the person-assigned unit, - that in each unit involved in the procedure next to the unit identifying date or next to the unit characterizing data is stored at least one further person and entity identifying date (KDT) of a trust center and more than one uniform global date, the global date including a date of identification, a bit location date, a world time date, a control date and a global random date; Bitlocate_date indicates the bitlocation in the global randomization datum to extract a global datum datum - that the global datum datum provides all the data needed to compute all the relative data required to open the datum, - that each entity involved in the procedure contains one or more error counters and at least one status register In that a person authenticates on the basis of his or her assigned unit, - that the person-assigned units and the communication-executing units and the communication-executing units authenticate with each other,
Description
Die vorliegende Erfindung betrifft ein Verfahren zur Qualität überwachenden Steuerung von geheimen unmanipulierbaren P2P-Kommunikationen.The present invention relates to a method for quality control of secret unmanipulatable P2P communications.
Der Cyberspace wird immer mehr zum Spielfeld von Kriminellen und Agenten. Damit bei einer P2P-Kommunikation die Daten gegenüber Dritte geschützt werden können, sind aus dem Stand der Technik Verfahren und Anordnungen bekannt, die die Daten innerhalb einer Kommunikation in verschlüsselter Form oder in Form relativer Daten austauschen. So ist in
In der Druckschrift
Ein initiierendes Gerät sendet Daten zu einem Sekundärgerät, das die empfangenen Daten in Verbindung mit den zu erwartenden Daten prüft, die empfangenen Daten falls erforderlich korrigiert und an das initiierendes Gerät zurücksendet. Das initiierende Gerät überprüft die empfangenen Daten des Sekundärgerätes und berechnet eine Gesamtbitfehlerrate und/oder eine Paketfehlerrate.An initiating device sends data to a secondary device, which checks the received data in conjunction with the expected data, corrects the received data if necessary, and sends it back to the initiating device. The initiating device checks the received data of the secondary device and calculates a total bit error rate and / or a packet error rate.
Die Druckschrift
Ein Verfahren zur biometrischen Authentifizierung einer Person wird in
Druckschrift
Aus dem Stand der Technik sind Verfahren und Anordnungen, die den erfindungsgemäßen Lösungen entsprechen, nicht bekannt.The prior art does not disclose methods and arrangements which correspond to the solutions according to the invention.
Die Aufgabe der Erfindung besteht darin, ein Qualität überwachendes Steuerungsverfahren von geheimen unmanipulierbaren P2P-Kommunikationen zu schaffen. Ziel der Erfindung ist die Sicherung der Unmanipulierbarkeit von P2P-Kommunikationen. Erfindungsgemäß wird die Aufgabe durch die in den Ansprüchen dargestellte Lehre gelöst. Die Erfindung wird exemplarisch anhand der in den
Ausschnittsweise werden in
Zur Bildung der geheimen Anschriftdaten werden unter Verwendung des Bitortdatum SODki aus dem globalen Teilbezugsdatum GZBiμ Flechtdaten entnommen, die in den öffentlichen Anschriftdaten ABA, ADA, ABI und ADI eingeflochten werden.To form the secret address data, braiding data is taken from the global partial reference date GZBi ™ using the bit location data SODki, which is woven into the public address data ABA, ADA, ABI and ADI.
Anhand der in der Legende zur
Legende zur Fig. 4:Legend to FIG. 4:
P2P-Steuerinformation PSI1k
PGNRi – PSES-Gerätenummer mit Sendeeinheit (i = 1) u. Empfangseinheit (i = 2)
SKNi – SID-Kartennummer mit Absender Karte (i = 1) u. Adressaten-Karte (i = 2)
SKGi – SID-Kartengültigkeitsdatum der Absender-Karte (i = 1)
PI – Permutationsdatum
SUS1 – SID-Karten gespeicherte Unterschriftsdaten des Absenders (i = 1)
SKTN – ausgewählte SID-Karten gespeicherte Kontonummer
SOZ – SID-Karten gespeicherte Sozialversicherungsnummer
STN – SID-Karten gespeicherte Steuernummer
SSR – SID-Karten-Statusregister
KENU – Kennnummer zur z. B. UrheberkennzeichnungP2P control information PSI1k
PGNR i - PSES device number with sender unit (i = 1) u. Receiving unit (i = 2)
SKN i - SID card number with sender card (i = 1) u. Addressee card (i = 2)
SKG i - SID card validity date of sender card (i = 1)
PI - permutation date
SUS 1 - SID cards stored signature data of the sender (i = 1)
SKTN - selected SID card stored account number
SOZ - SID cards stored social security number
STN - SID cards stored tax number
SSR - SID card status register
KENU - identification number for z. B. Copyright labeling
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008010782.4A DE102008010782B4 (en) | 2008-02-22 | 2008-02-22 | Quality monitoring control of secret unmanipulatory P2P communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008010782.4A DE102008010782B4 (en) | 2008-02-22 | 2008-02-22 | Quality monitoring control of secret unmanipulatory P2P communications |
Publications (2)
Publication Number | Publication Date |
---|---|
DE102008010782A1 DE102008010782A1 (en) | 2009-08-27 |
DE102008010782B4 true DE102008010782B4 (en) | 2016-05-12 |
Family
ID=40896682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE102008010782.4A Expired - Fee Related DE102008010782B4 (en) | 2008-02-22 | 2008-02-22 | Quality monitoring control of secret unmanipulatory P2P communications |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE102008010782B4 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10123024A1 (en) * | 2001-05-11 | 2002-11-14 | Siemens Ag | Biometric authentication method uses a combination of fingerprints as an access code, thereby greatly increasing security against criminals who have obtained fingerprint copies |
DE10222492A1 (en) * | 2002-05-14 | 2003-11-27 | Werner Rozek | Sure and confidential transmission of personal and legal data is made using identification security card access to a network liked to processing centers |
US20040088405A1 (en) * | 2002-11-01 | 2004-05-06 | Vikas Aggarwal | Distributing queries and combining query responses in a fault and performance monitoring system using distributed data gathering and storage |
US20070014341A1 (en) * | 2005-07-12 | 2007-01-18 | Graham Rowse | Optimized RFID/NFC BER testing |
DE102005045483A1 (en) * | 2005-09-22 | 2007-04-05 | Marcel Hartmann | Mobile telephone has SIM card that can be blocked with mobile telephone based on reception of common blocking code by receiver and processing of blocking code by blocking arrangement |
-
2008
- 2008-02-22 DE DE102008010782.4A patent/DE102008010782B4/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10123024A1 (en) * | 2001-05-11 | 2002-11-14 | Siemens Ag | Biometric authentication method uses a combination of fingerprints as an access code, thereby greatly increasing security against criminals who have obtained fingerprint copies |
DE10222492A1 (en) * | 2002-05-14 | 2003-11-27 | Werner Rozek | Sure and confidential transmission of personal and legal data is made using identification security card access to a network liked to processing centers |
US20040088405A1 (en) * | 2002-11-01 | 2004-05-06 | Vikas Aggarwal | Distributing queries and combining query responses in a fault and performance monitoring system using distributed data gathering and storage |
US20070014341A1 (en) * | 2005-07-12 | 2007-01-18 | Graham Rowse | Optimized RFID/NFC BER testing |
DE102005045483A1 (en) * | 2005-09-22 | 2007-04-05 | Marcel Hartmann | Mobile telephone has SIM card that can be blocked with mobile telephone based on reception of common blocking code by receiver and processing of blocking code by blocking arrangement |
Also Published As
Publication number | Publication date |
---|---|
DE102008010782A1 (en) | 2009-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE112005003281B4 (en) | Electronic signature security system | |
EP0063794B1 (en) | Apparatus and process for checking identity | |
DE69022424T2 (en) | Non-rejection in computer networks. | |
EP0631408B1 (en) | Method for authentication between two electronic devices | |
DE60114986T2 (en) | METHOD FOR OUTPUTTING ELECTRONIC IDENTITY | |
DE102006043363A1 (en) | System and method for collecting traffic data using sounding vehicles | |
DE19716111A1 (en) | Procedure for mutual authentication of two units | |
DE60027838T2 (en) | Authentication device and methods using anatomical information | |
EP1805720B1 (en) | Method for securely transmitting data | |
DE102008010794B3 (en) | Method for unmanipulable, tap-proof and non-hackable P2P communication in multi-subscriber networks | |
DE102008010782B4 (en) | Quality monitoring control of secret unmanipulatory P2P communications | |
EP1864196B1 (en) | Reader with integrated encryption unit | |
DE102011054637A1 (en) | Method for configuring an electromechanical lock | |
EP0304547A2 (en) | Identification control apparatus, method for cryptographic identity control and method for detecting an interruption between a terminal and a communication system | |
EP1163559B1 (en) | Method for securing access to a data processing device and appropriate device | |
DE102008010788A1 (en) | Method for authentication and authentication of persons and units | |
DE102005057799A1 (en) | Access authorization giving method for depot e.g. boot of motor vehicle, involves automatically transmitting data set to depot, where depot checks data set and automatically opens and/or closes based on checking of data set | |
DE3619566A1 (en) | Method and system for data transmission | |
DE10152462A1 (en) | Signature of a document | |
WO2018146133A1 (en) | Method for detecting unauthorised copies of digital security tokens | |
DE102008010786B4 (en) | Procedure for conducting a preliminary investigation in cyberspace | |
DE4416253B4 (en) | Method for distributing key information in a manner compatible with data protection | |
DE10222492A1 (en) | Sure and confidential transmission of personal and legal data is made using identification security card access to a network liked to processing centers | |
WO2005055018A1 (en) | Method and device for securing digital data | |
DE10324996A1 (en) | Chip card with at least one application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8122 | Nonbinding interest in granting licences declared | ||
8120 | Willingness to grant licences paragraph 23 | ||
R012 | Request for examination validly filed |
Effective date: 20121017 |
|
R016 | Response to examination communication | ||
R016 | Response to examination communication | ||
R018 | Grant decision by examination section/examining division | ||
R020 | Patent grant now final | ||
R081 | Change of applicant/patentee |
Owner name: ROZEK, WERNER, PROF. DR.-ING. DIPL.-ING., DE Free format text: FORMER OWNER: FACHHOCHSCHULE SCHMALKALDEN, 98574 SCHMALKALDEN, DE |
|
R119 | Application deemed withdrawn, or ip right lapsed, due to non-payment of renewal fee |