Patent application number | Description | Published |
20080205363 | Method for operating a VoIP terminal device and a VoIP terminal device - In one aspect, a method for operating a cordless VoIP terminal device in a private network is provided. The VoIP terminal device is authorized to access the private network. Data stored on the VoIP terminal device is assessable via a standard interface for facilitating data access only after the VoIP terminal device has been successfully logged into the private network. A VoIP terminal device for carrying out the method is further provided. | 08-28-2008 |
20080305784 | Method for Configuring a Mobile Terminal, Configurable Mobile Terminal and Mobile Radio Network Therefor - A method for configuring a mobile terminal wherein a basic configuration for use of the mobile terminal in differently organized communication networks is set up in the mobile terminal. The basic configuration for use of the mobile terminal in a particular communication network of the communication networks is modified by a change, for which purpose data for a configuration specific to the particular network is loaded into the mobile terminal. The change remains available during the use of the mobile terminal in the particular communication network. Correspondingly a suitable mobile terminal and a suitably embodied mobile radio network implement the method. | 12-11-2008 |
20080307531 | Method for Optimizing Reconfiguration Processes in Mobile Radio Network Having Reconfigurable Terminals - Access-protected memory zones in network elements are localized in an operator's network that supporting the reconfiguration of SDR terminals in combination with protected data transmission methods which include methods for authenticating and authorizing the communication partners and for communicating in a protected manner, especially to protect integrity and confidentiality. Such access-protected data is provided by the terminal and is transmitted to the radio access network in the framework of negotiations and is temporarily stored therein or is generated directly in the RAN in the framework of processes related to the terminal. The generation and management of access-protected memory zones by the network operator result in a massive relief of the load to which the air interface is subject while also significantly alleviating the network infrastructure with regard to signaling. | 12-11-2008 |
20090193253 | METHOD AND SERVER FOR PROVIDING A MOBILE KEY - After a radio link is established between a mobile subscriber terminal and an access network, the subscriber is authenticated by a proxy server of an intermediate network forwarding, from the access network to a home network of the subscriber, authentication message(s) containing a subscriber identification. If the subscriber is authenticated and the subscriber identification is already stored in the proxy server, the proxy server assigns a group-specific mobile key to the subscriber identification. When the home agent receives a registration request message originating from a subscriber terminal and containing a subscriber identification and transmits a key request message, containing the subscriber identification, for a mobile key to the proxy server, if the subscriber identification in the key request message matches a subscriber identification stored by the proxy server, a mobile key for cryptographic protection of mobile signalling messages is provided to the home agent by the proxy server. | 07-30-2009 |
20090327475 | METHOD FOR MANAGING A COUNTER STATUS ALLOCATED TO A PAIR COMPRISING A COMMUNICATION TERMINAL AND A BASE STATION - A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved. | 12-31-2009 |
20100011426 | Subscriber-Specific Enforecement of Proxy-Mobile-IP (PMIP) Instead of Client-Mobile-IP (CMIP) - A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even if the mobile terminal supports terminal-based mobility management. This gives a network provider complete control over mobility management in his network, preventing configuration problems during the configuration of mobile terminals. In the method, after the successful authentication of a subscriber, the authentication server transmits an authentication confirmation message to an authentication client in an access network. The received authentication confirmation message contains an activation attribute for activating network-based mobility management, if the authentication server does not provide a common mobile key for terminal-based mobility management. | 01-14-2010 |
20100017601 | Method and Server for Providing a Mobility Key - A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber. | 01-21-2010 |
Patent application number | Description | Published |
20080305766 | Communication Device and Method for Setting a Security Configuration for a Communication Device - After a successful determination of an application environment for the communication device, a security configuration is selected from a number of stored security configurations and the communication device configured according to the selected security configuration. | 12-11-2008 |
20130010954 | METHOD FOR THE SECURE UNINDIRECTIONAL TRANSMISSION OF SIGNALS - A method transmits a signal using a unidirectional communications link, which is protected by an asymmetric cryptography method. A counter value is incremented by a transmitter during a transmission operation. Subsequently, a challenge is determined by the transmitter on the basis of the counter value and a control command that can be executed by a receiver and, on the basis of the challenge that is determined a response is in turn determined. The challenge and the response are transmitted from the transmitter to the receiver. The challenge received is then checked by the receiver to see whether the counter value used in the challenge is greater than a counter value previously stored by the transmitting transmitter. The response received is checked on the basis of the challenge. Following successful checking of the challenge and response, the control command transmitted in the challenge is executed. | 01-10-2013 |
20130010965 | METHOD AND DEVICE FOR PROVIDING AT LEAST ONE SECURE CRYPTOGRAPHIC KEY - A device is configured for providing at least one secure cryptographic key for performing a cryptographic security function using a control device which requires a cryptographic key therefor. A configured key provided for the security function is selected from a first configuration memory and is tested using the read configured key whether a secure replacement key associated with the read configured key is memorised in a second configuration memory, said replacement key is provided for the control device for performing the security function instead of the configured key. | 01-10-2013 |
20130014286 | METHOD AND SYSTEM FOR MAKING EDRM-PROTECTED DATA OBJECTS AVAILABLE - A method and a system make EDRM-protected data objects available to users. Access rights to an EDRM-protected data object are produced depending on partial access rights to at least one or more data objects, which data objects are contained in the respective EDRM-protected data object. The access rights to the EDRM-protected data object are calculated by a client computer of the user using an access right differentiation function depending on the partial access rights which are made available by different EDRM servers. A data object key of the EDRM-protected data object is calculated by the client computer of the user using a key differentiation function depending on partial keys which are made available by the different EDRM servers. | 01-10-2013 |
20130033230 | DEVICE AND METHOD FOR STORING ELECTRICAL ENERGY - A device for storing electrical energy in a vehicle includes at least one vehicle battery, which can be connected to an electrical power network by a vehicle charging interface of the vehicle. The vehicle battery has a storage capacity for storing electrical energy. The storage capacity of the vehicle battery is partitioned for different users. | 02-07-2013 |
20130074162 | METHOD FOR DYNAMICALLY AUTHORIZING A MOBILE COMMUNICATIONS DEVICE - Physically access-protected service access, such as a service flap having a mechanical lock, for example, are used to ensure the secure establishment of security check information. Logical access security to service functions is produced using the security check information via additional, decentralized service interfaces. For this purpose, it is not the mobile service device that is connected to the physically access-protected communications interface, but rather a second authentication module associated with the mobile service device. Security check information is provided by the authentication module for secure service access to the network via additional, decentralized communications interfaces of the network. | 03-21-2013 |
20130099744 | METHOD AND CONTROL UNIT FOR CHARGING A VEHICLE BATTERY - A vehicle battery is charged by an authorized charging station. A first cryptographically protected communication link is set up between a charging control unit of the vehicle and the charging station after successful preliminary verification of a digital certificate for the charging station by the charging control unit of the vehicle. A second communication link is then set up between the charging control unit and an authorization server for charging stations. The charging control unit transmits information from the preliminarily verified digital certificate to the authorization server via the second communication link, which information is used by the authorization server to carry out an authorization check on the respective charging station. An authorization check result is transmitted from the authorization server to the charging control unit via the second communication link, which result is used to control a charging of the vehicle battery. | 04-25-2013 |
20130100848 | METHOD FOR FILTERING AND PROCESSING DATA IN A PACKET-SWITCHED COMMUNICATION NETWORK - A method processes data in a packet-switched communication network having a plurality of network nodes, between which data packets are transmitted. Information contained in one data packet is extracted therefrom, the packet being received in a network node. One physical transmission parameter of the received data packet is ascertained, the physical transmission parameter specifies or is dependent on one property of the physical transmission of the received data packet. The received data packet is filtered based on a rule set, taking into account some of the extracted information and part of the physical transmission parameter, and further processed dependant on the filtering. An application of the method is “bootstrapping”, wherein network nodes are configured, cryptographic information being transmitted in the context of the configuration. A plausibility test of physical transmission parameters of the data packets that are transmitted during bootstrapping can ascertain whether an attacker is manipulating the bootstrapping process. | 04-25-2013 |
20130110328 | CONTROL NETWORK FOR A RAIL VEHICLE | 05-02-2013 |
20130122869 | METHOD FOR REGISTERING A WIRELESS COMMUNICATION DEVICE AT A BASE DEVICE AND CORRESPONDING SYSTEM - A method for registering a wireless communication device at a base device may include the steps of: transmitting from a wireless authentication device a piece of authentication information; receiving at the wireless communication device the piece of authentication information, e.g., using in-band communication; transferring the piece of authentication information from the wireless communication device to the base device; analyzing at the base device the transferred piece of authentication information; and incorporating the wireless communication device into a network depending on the result of the analysis. A corresponding system and to a use thereof are also provided. | 05-16-2013 |
20130132541 | Method and Device for Integrating a Device into a Network - A method and a server for integrating a device into a network, a first device identification of the device is detected being a reading device authorized for this purpose, and the detected first device identification being transmitted as configuration data into an access-protected configuration data memory of the network. The first device identification of the device is transmitted from the reading device to the configuration data memory and stored in the memory. After the device to be integrated is connected to an access node of the network, the server automatically configures the connected device for the network if a corresponding first device identification of the device is already stored in the access-protected configuration data memory of the network for the second device identification of the device connected to the access node of the network such that an efficient and secured integration of a communication-enabled terminal into a network is achieved. | 05-23-2013 |
20130132730 | Method and System for Transmitting Control Data in a Manner that is Secured Against Manipulation - A method and system for detecting manipulation when control data are transmitted from a first control unit to a second control unit via a network, which includes generating integrity check information data for the control data transmitted by the first control unit via an integrity check generating unit on the transmitter side, calculating a cryptographic checksum for the integrity check information data generated on the transmitter side via the integrity check generating unit, transmitting the integrity check information data and the cryptographic checksum to an integrity check verifying unit that verifies the cryptographic checksum on the receiver side, generating integrity check information data on the receiver side for the control data received by the second control unit using the integrity check verifying unit, and comparing the integrity check information data and the integrity check information data with the cryptographic checksum to detect the manipulation of the transmitted control data. | 05-23-2013 |
20130162038 | APPARATUS AND METHOD FOR STABILIZING AN ELECTRICAL POWER IMPORT - An apparatus and a method for stabilizing an electrical power import from a power distribution system by way of at least one subscriber connected to the power distribution system via an electrical connection. An electrical power import anomaly when electrical power is imported by the respective subscriber from the power distribution system is identified using transmitted control messages, which are determined for the respective subscriber or originate from the respective subscriber. Once an electrical power import anomaly has been identified, power consumption units or power generation units are driven correspondingly. The apparatus effectively protects the power distribution system from third-party intervention or implementation errors which can bring about an unstable system response. | 06-27-2013 |
20130167234 | Method for Processing Messages in a Communication Network Comprising a Plurality of Network Nodes - A method for processing messages in a communication network, wherein messages are transmitted between network nodes of the communication network, which are each combined with test information that is verifiable to determine whether a corresponding message is admissible, where an admissible message leads to a positive test result and an inadmissible message leads to a negative test result. For at least one message that is provided for a respective network node, an action coupled to the message is performed from the respective network node in time a message is received in the respective network node without checking the test information combined with the message, wherein, upon execution of the action, the test information is verified by the respective network node and, when the test result is negative, at least one predefined measure is performed. | 06-27-2013 |
20130170604 | METHOD AND ARRANGEMENT FOR DETECTING A QUANTITY OF PLUG CYCLES OF A PLUG CONNECTION COMPONENT - In order to monitor the number of plug cycles of a plug, such as a plug of a charging cable for an electric car, a plug cycle counter associated with the plug is counted up in an electronic memory after every plug cycle. A warning can thus be issued when a permitted quantity of plug cycles for the plug has been exceeded. Alternatively, the electrical connection at a charging station for an electric car or at a data cable for an automation system can also be cut off if the service life of the plug has been exceeded. High availability of the plug is thereby achieved, because the corresponding cable can be replaced in a timely manner. A hazard to persons due to defective current-carrying parts is also prevented. | 07-04-2013 |
20130173914 | Method for Certificate-Based Authentication - A method is disclosed for certificate-based authentication, in which a first subscriber authenticates himself to a second subscriber using a digital certificate associated to the first subscriber. The certificate specifies requirement(s) and the fulfillment of a requirement is ensured by a third subscriber. Within the framework of the authentication by the second subscriber, a validity condition is checked, and the certificate is classified as valid if the validity condition is fulfilled, based on the issue and/or absence of issue of the requirement(s) specified in the certificate by the third subscriber. Requirements may be used to restrict the validity of the certificate. The validity of a certificate can thereby be controlled in a simple and flexible manner without explicitly defining the validity in the certificate. The method can be used for authentication in any technical field, e.g., to authentication subscribers in the form of components of an automation system. | 07-04-2013 |
20130173922 | METHOD FOR CERTIFICATE-BASED AUTHENTICATION - A first subscriber authenticates himself to a second subscriber with a certificate associated to the first subscriber. The certificate specifies one or several characteristics, which have to be fulfilled by the second subscriber. In the course of the authentication, it is verified using the certificate whether the second subscriber fulfills the characteristics, wherein a criterion required for successful authentication is that the second subscriber fulfills the characteristics(s). Characteristics of the second subscriber are verified in the framework of the authentication process, the second subscriber representing the authenticator with respect to whom the authentication is carried out. In this way, certificates for authentication dedicated communication links between two communication partners can be determined. The method can be used for any subscribers in a communication network, e.g., representing components of an automation system, such as, for example, control devices, field devices, sensors, actuators and the like. | 07-04-2013 |
20130179687 | METHOD AND APPARATUS FOR AUTHENTICATING MULTICAST MESSAGES - The last link in an initialization hash chain, calculated by a transmitter based on its anchor value, is distributed as an initialization function value to a receiver in an initialization phase. Subsequently, a multicast message is received and stored by a receiver and an authentication key release message, containing a cryptographic authentication key, is received from the transmitter by the receiver. A cryptographic function value h, calculated by the receiver for the cryptographic authentication key using a prescribed cryptographic function, is compared with the initialization function value to check the validity of the cryptographic authentication key in the authentication key release message. The multicast message is authenticated by the receiver using the cryptographic authentication key which has been recognized as valid. | 07-11-2013 |
20130191907 | Method and System for Secure Data Transmission with a VPN Box - A VPN box is connected upstream of a field device. The VPN box uses a secret cryptographic key of the field device for authentication when setting up a VPN tunnel and/or when setting up a cryptographically protected communication link. | 07-25-2013 |
20130212378 | METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER - A method manages keys in a manipulation-proof manner for a virtual private network. The method includes authenticating a communication terminal on an authentication server by use of a first key over a public network and providing a communication key, which is suitable for the communication over a virtual private network in the public network, for the authenticated communication terminal over the public network. The communication key in the communication terminal is encrypted by a second key, which is provided by a manipulation-protected monitoring device. | 08-15-2013 |
20130305062 | DEVICE AND METHOD FOR PROTECTING A SECURITY MODULE FROM MANIPULATION ATTEMPTS IN A FIELD DEVICE - A device for protecting a security module from manipulation attempts in a field device. A control device is configured to control the field device, a security module is configured to provide cryptographic key data which is to be used by the control device, and an interface device is connected to the control device. The security module is configured to allow the control device access to the cryptographic key data in the security module and to prevent access to the cryptographic key data in the event of a manipulation attempt on the field device. | 11-14-2013 |
20130311791 | METHOD AND DEVICE FOR PROVIDING A CRYPTOGRAPHIC KEY FOR A FIELD DEVICE - A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which, when a physical manipulation carried out on the field device is detected, a manipulation message is emitted. The cryptographic key is only provided to the field device by the security device if the security device does not receive a manipulation message from the tamper sensors associated with the field device. | 11-21-2013 |
20140032171 | METHOD FOR TESTING TAMPER PROTECTION OF A FIELD DEVICE AND FIELD DEVICE HAVING TAMPER PROTECTION - The invention relates to a method for testing tamper protection of a field device, comprising the following steps: arrangement of at least one test element in the material of a housing of the field device, first supply of the test element with a first test signal, first measurement of the first test signal for determining a physical fingerprint, storage of the physical fingerprint, second supply of the test element with a second test signal, second measurement of the second test signal, comparison of the second test signal with the physical fingerprint and, if the second test signal deviates from the physical fingerprint, output of a tamper signal. The invention also relates to a field device having tamper protection. | 01-30-2014 |
20140041011 | METHOD AND DEVICE FOR CONTROL COMMUNICATION BETWEEN COUPLED TRAIN COMPONENTS - A method for control communication between coupled train components, wherein mechanical and electrical couplings as well as devices for exchanging data are present. When a first train component is coupled to at least one further train component, the at least one further train component is identified, and filtering for a permissible data communication is performed as a function of the identification in that only selected data traffic is permitted. Furthermore, a device for control communication between coupled train components is described, wherein the train buses thereof are connected via an electrical coupling, and the data communication to the respective other train component is conducted via at least one gateway with at least one Ethernet interface as well as via at least one interface for connection of each component network. As a result, the data communication of a filter policy/rule is permitted or blocked. | 02-06-2014 |
20140041061 | TAMPER PROTECTION DEVICE FOR PROTECTING A FIELD DEVICE AGAINST TAMPERING - The invention relates to a tamper protection device for protecting a field device against tampering, comprising a carrier and at least one electronic memory, wherein the at least one electronic memory is disposed in at least one partial area on the carrier, and the at least one electronic memory stores at least one predefinable security information item, and wherein the at least one electronic memory is designed in such a way as to modify the predefinable security information item in the event of at least partial damage to the tamper protection device. The invention further relates to a method for producing a field device having a tamper protection device, to a field device comprising a tamper protection device, to a tamper protection system, and to the use of a tamper protection device. | 02-06-2014 |
20140047568 | METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION - The invention relates to a method for monitoring a tamper protection of a field device, comprising the steps of: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result was determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; the registration device determining an active status of the field device in case the non-manipulation certificate is valid; a monitoring device checking the field device by querying the status of the field device and transferring field device data to the monitoring device; the monitoring device accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use. | 02-13-2014 |
20140048638 | ARRANGEMENT AND METHOD FOR LOCKING AN AUTOMATIC REELING MECHANISM OF A CHARGING CABLE FOR AN ELECTRIC VEHICLE - An automatic reeling mechanism for an electric vehicle or a charging post can automatically reel a charging cable and thus protect it against dirt and weather. In order to reduce mechanical loads and damage to the plug and minimize a risk for stumbling to a person, the automatic reeling mechanism is switched in a passive mode as long as a plug of the charging cable is plugged in and is not touched by a person. This is the case during the charging process. In this way, the automatic reeling mechanism can be comfortably used because no traction forces are active during the charging process and the charging cable can be laid out so that there is no risk of stumbling. | 02-20-2014 |
20140107875 | METHOD AND CONTROL UNIT FOR RECOGNIZING MANIPULATIONS ON A VEHICLE NETWORK - A method for detecting manipulation of at least one vehicle network of a vehicle includes determining a digital fingerprint of the at least one vehicle network, comparing the digital fingerprint of the at least one vehicle network to reference information, adapting a function of the at least one vehicle network as a function of a result of the comparison, such that operational safety is ensured, and activating a regular control mode if no manipulation of the at least one vehicle network is detected, or activating an operationally safe control mode if manipulation of the at least one vehicle network is detected. A control unit for detecting manipulation of at least one vehicle network of a vehicle carries out control tasks as a function of a result of a comparison of a digital fingerprint of at least one vehicle network to reference information of a control network. | 04-17-2014 |
20140245409 | Extension of the Attributes of a Credential Request - In order to issue a security credential, a client of a system is configured to send a credential request in order to have a credential issuer prepare a security credential. The credential request is received by a credential attribute intermediary connected between the client and the credential issuer. At least one attribute of the requesting client is ascertained by the credential attribute intermediary. The at least one attribute ascertained by the credential attribute intermediary is confirmed to the credential issuer. The security credential is issued by the credential issuer based on the credential request received by the credential attribute intermediary and based on the at least one attribute confirmed by the credential attribute intermediary. | 08-28-2014 |
20140298427 | METHOD AND NETWORK NODE DEVICE FOR RUNNING PUSH-BUTTON CONFIGURATION SESSIONS WITHIN HETEROGENEOUS NETWORK AND HETEROGENEOUS NETWORK - A heterogeneous home network (with possibly multiple hops between devices) uses a push button configuration mechanism that ensures only one single new network node device is registered for a single push button key press event and overlapping Push-Button Configuration sessions within the heterogeneous network are prevented by an enhanced mechanism for running Push Button Configuration sessions based on a Push-Button Configuration handshake procedure triggered and initiated by a virtual or physical Push-Button-Event on a new device, which wants to join the heterogeneous network for a user friendly security bootstrapping, in which multiple network node devices in the heterogeneous network belonging already to the heterogeneous network are involved in registering the new device. The Push-Button Configuration handshake procedure is initiated to get a permission information to join the network or to proceed with the Push-Button Configuration or to get a rejection information not to join the network. | 10-02-2014 |
20140321647 | METHOD AND ARRANGEMENT FOR PROVIDING A WIRELESS MESH NETWORK - A method and an arrangement for providing a wire-free mesh network are provided. An approval procedure is carried out in situations in which a subscriber who is registering on the mesh network transmits an MAC address which already exists in the mesh network, such that two different subscribers within the mesh network never have identical MAC addresses. | 10-30-2014 |
20140337952 | METHOD AND DEVICES FOR RUNNING PUSH-BUTTON CONFIGURATION SESSIONS - A method and a network node device run Push-Button Configuration sessions within a heterogeneous network, IEEE 1905.1, using a push button configuration mechanism that ensures that only one single new network node device is registered for a single push button key press event and thus overlapping Push-Button Configuration sessions within a heterogeneous network are prevented. After finishing the push button configuration mode, the number of new nodes is checked. If more than one node has been added, a configuration roll-back is performed. Preferably, the push button configuration roll-back is performed as soon as the authentication of more than one distinct node has been detected. The roll-back includes the deletion or deactivation of credentials established by the push-button configuration. | 11-13-2014 |
20150052357 | METHOD AND NETWORK NODE DEVICE FOR CONTROLLING THE RUN OF TECHNOLOGY SPECIFIC PUSH-BUTTON CONFIGURATION SESSIONS WITHIN A HETEROGENEOUS OR HOMOGENOUS WIRELESS NETWORK AND HETEROGENEOUS OR HOMOGENOUS WIRELESS NETWORK - A method and network node device control the run of technology specific Push-Button Configuration sessions within a heterogeneous or homogeneous wireless network as well as a heterogeneous or homogeneous wireless network detecting a session overlap within the network. The session is related to a configuration session (bootstrapping session, setup session) that establishes a security configuration for encrypted communication over a wireless link it is proposed an enhanced mechanism for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network by using a piece of information, e.g. a “Configuration Setup Session Identifier (CSSID),” for identifying a technology specific Push Button Configuration setup session. | 02-19-2015 |
20150073591 | CHARGING DEVICE FOR CHARGING A VEHICLE ACCUMULATOR - A vehicle accumulator connected to a charging device is charged by controlling a configurable charge program executed by a control unit of the charge device. The configurable charge program is obtained from a charge program memory, so that the vehicle accumulator can be charged in an optimal manner with an individual charging characteristic. | 03-12-2015 |
20150086015 | Cryptographically Protected Redundant Data Packets - The embodiments relate to methods for generating cryptographically protected redundant data packets. N redundant data packets are produced by N different generation units. The respective generation unit is allocated a unique identification. N cryptographically protected redundant data packets are generated by an individual cryptographic function from the N generated redundant data packets, the cryptographic function being parameterized for generating the respective cryptographically protected data packet by a cryptographic key and by the identification allocated to the corresponding generation unit. The cryptographic key may be used for a plurality of channels. The embodiments also relate to a computer program product and a device for generating cryptographically protected redundant data packets. The embodiments further relate to a communication node for generating and transmitting cryptographically protected redundant data packets and to an arrangement for a communication network having a plurality of said type of communication nodes. | 03-26-2015 |