Patent application number | Description | Published |
20110014895 | METHOD FOR EXCHANGING DATA BETWEEN A MOBILE TELEPHONE AND A FIXED LINE TELEPHONE - The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data. | 01-20-2011 |
20110264900 | METHOD AND ARRANGEMENT FOR CONFIGURING ELECTRONIC DEVICES - The invention relates to a method for configuring electronic devices, particularly terminals, wherein during configuration at least parts of first configuration data on a chip card are fed to an electronic device, wherein the configuration data are stored on the chip card as second configuration data such that the stored data are the result of an obfuscation following at least one first algorithm. Furthermore, at least parts of the first algorithm can be derived by the electronic device. The stored second configuration data are subjected to a de-obfuscation by the device such that, having knowledge of the first algorithm, they can be reconstructed as first configuration data and the configuration of the terminal can be based thereon. The invention further relates to an arrangement having means for carrying out the method. | 10-27-2011 |
20110289319 | METHOD FOR AUTHENTICATING KEY INFORMATION BETWEEN TERMINALS OF A COMMUNICATION LINK - With the help of a key management protocol, the transmitted key information (si) is authenticated by at least one certificate signed by the terminals (A, B), and at least one fingerprint (fp) of the public keys or certificate, which were used for authenticating the key information (si), is added to the useful part of an SIP message (INVITE). The identity information (idi) present in the header (SIPH) of an SIP message is additionally copied into a region of the header (SIPH) or the useful part (B), and a signature (S) is produced by way of the fingerprint (fp), the datum information (di) presented in the header (SIPH) of an SIP message, the copied identity information (idiā²), and optionally the certificate reference information (hz), and is inserted into a further region of the header (SIPH) of the SIP message (INVITE). Advantageously, the additional signature that is produced and inserted according to the invention also remains uninfluenced during a transmission across several networks of different network operators, thereby achieving unique authentication of the transmitted key information. With the method according to the invention, accordingly attacks on the security of the authentication in the networks of the different network operators can be avoided. | 11-24-2011 |
20140006574 | Network Device and Method for Operating a Network Device for an Automation Network | 01-02-2014 |
20140173688 | Method and System for Providing Device-Specific Operator Data for an Automation Device in an Automation Installation - Method and system for providing device-specific operator data for an automation device in an automation installation, which automation device authenticates itself to an authentication server in the automation installation via at least one authentication credential, wherein if up-to-date device-specific operator data from the installation operator of the automation installation are available for the automation device, then the up-to-date device-specific operator data are tied to the authentication credential of the authentication device. | 06-19-2014 |
20140223187 | Method for Authenticating Key Information Between Terminals of a Communication Link - With the help of a key management protocol, the transmitted key information is authenticated by at least one certificate signed by the terminals, and at least one fingerprint of the public keys or certificate, which were used for authenticating the key information, is added to the useful part of an SIP message. The identity information present in the header of an SIP message is additionally copied into a region of the header or the useful part, and a signature is produced by way of the fingerprint, the datum information presented in the header of an SIP message, the copied identity information, and optionally the certificate reference information, and is inserted into a further region of the header of the SIP message. The additional signature that is produced and inserted can remain uninfluenced during a transmission across several networks of different network operators. | 08-07-2014 |
20150215301 | Authentication of a First Device by a Switching Center - A method, a first device, and a switching center are described. A first device is authenticated by a switching center inside a network taking into account the use of additional (e.g., virtual) network interfaces. A device uses certificates to transfer additional MAC addresses for authentication. As a result, a device having a plurality of MAC addresses gains access to a network from a plurality of MAC addresses in a one-off authentication process. | 07-30-2015 |
20150264080 | Testing Integrity of Property Data of a Device Using a Testing Device - The invention relates to a method and a test system for testing integrity of property data of a device using a testing device within a network, the devices and their respective property data within the network, such as all the measurement or control device distributed inside an industrial automation system, being taken into account in order to simplify testing of a large number of devices. The various property data are tested for an identity and are labelled, and calculations, which are carried out by the testing device for testing purposes, are initiated on the basis of the labelling. By taking other devices in the system into account, security requirements can be fulfilled during testing and the computational effort for the testing device can also be reduced. | 09-17-2015 |