54 |
Title |
TI |
[EN] Communication method for multisubscriber networks, which is protected from deception, eavesdropping and hacking |
71/73 |
Applicant/owner |
PA |
FACHHOCHSCHULE SCHMALKALDEN, DE
;
ROZEK JAN, DE
;
ROZEK THOMAS, DE
;
ROZEK WERNER, DE
|
72 |
Inventor |
IN |
ROZEK JAN, DE
;
ROZEK THOMAS, DE
;
ROZEK WERNER, DE
|
22/96 |
Application date |
AD |
Nov 17, 2008 |
21 |
Application number |
AN |
91855708 |
|
Country of application |
AC |
US |
|
Publication date |
PUB |
May 19, 2015 |
33 31 32 |
Priority data |
PRC PRN PRD |
DE
102008010794
Feb 22, 2008
|
33 31 32 |
PRC PRN PRD |
EP
2008065658
Nov 17, 2008
|
51 |
IPC main class |
ICM |
H04L 29/06
(2006.01)
|
51 |
IPC secondary class |
ICS |
H04L 9/32
(2006.01)
|
|
IPC additional class |
ICA |
|
|
IPC index class |
ICI |
|
|
Cooperative patent classification |
CPC |
H04L 2209/80
H04L 63/0428
H04L 63/068
H04L 63/123
H04L 9/3236
|
|
MCD main class |
MCM |
H04L 29/06
(2006.01)
|
|
MCD secondary class |
MCS |
H04L 9/32
(2006.01)
|
|
MCD additional class |
MCA |
|
57 |
Abstract |
AB |
[EN] The invention relates to a P2P communication method for multi-subscriber networks, which is protected from deception, eavesdropping and hacking, and wherein the communication carried out in an interval is predominantly carried out in separate rooms, allocated to the P2P communication, and with separate reference data allocated to the P2P communication. At least part of the separate random reference data and/or random data is generated in at least one unit that participates in the P2P communication and is exchanged within the P2P communication in the form of relative data. The separate P2P communication is initiated with respect to at least one global random reference date valid for the time of the P2P communication, the random reference date being valid for a randomly determined time range and being stored in all units that carry out the P2P communications in a secret and non-deceivable manner. |
56 |
Cited documents identified in the search |
CT |
US000004322577A US000006282496B1 US000006798884B1 US020050075811A1 US020050114660A1 US020070273504A1 US020080004904A1 US020090316900A1
|
56 |
Cited documents indicated by the applicant |
CT |
DE000010043310A1 DE000010043313A1 DE000010104307A1 DE000010222492A1
|
56 |
Cited non-patent literature identified in the search |
CTNP |
|
56 |
Cited non-patent literature indicated by the applicant |
CTNP |
A. Menezes, P. Van Oorschot, S. Vanstone; "Chapter 9: Hash Functions and Data Integrity," Handbook of Applied Cryptography; Oct. 1, 1996, pp. 321-383, CRC Press, Boca Raton, Florida. 1; International Search Report for PCT/EP2008/065658 dated Jul. 28, 2009. 1
|
|
Citing documents |
|
Determine documents
|
|
Sequence listings |
|
|
|
Search file IPC |
ICP |
H04L 29/06
H04L 9/32
|