EP3970341A1 - Method and transmission device for data transmission between two or more networks - Google Patents
Method and transmission device for data transmission between two or more networksInfo
- Publication number
- EP3970341A1 EP3970341A1 EP20735082.8A EP20735082A EP3970341A1 EP 3970341 A1 EP3970341 A1 EP 3970341A1 EP 20735082 A EP20735082 A EP 20735082A EP 3970341 A1 EP3970341 A1 EP 3970341A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- data
- transmission
- nwa
- data transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000006854 communication Effects 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 21
- 238000013468 resource allocation Methods 0.000 claims abstract description 15
- 238000011144 upstream manufacturing Methods 0.000 claims abstract description 4
- 238000012546 transfer Methods 0.000 claims description 34
- 238000010200 validation analysis Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 5
- 238000012432 intermediate storage Methods 0.000 claims 1
- 238000012545 processing Methods 0.000 description 10
- 238000011161 development Methods 0.000 description 9
- 230000018109 developmental process Effects 0.000 description 9
- 230000002457 bidirectional effect Effects 0.000 description 8
- 230000015654 memory Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000013481 data capture Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000011157 data evaluation Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- the invention relates to a method for data transmission between at least one first network and at least one second network.
- one-way communication units such as Data diodes
- a data diode with a feedback channel also known as a bidirectional network guard or security gateway
- a network guard is usually a combination of hardware and software that enables more restrictive data transmission between networks, for example compared to known firewalls:
- a bidirectional network guard is usually structured in such a way that two separate unidirectional data streams are implemented using a data diode, the data streams flowing in opposite directions. This allows data to be exchanged in both directions, with the one-way function being guaranteed for each direction or transfer path.
- data can be transmitted from a network with high security requirements to an open network with low security requirements or from a network with low security requirements to a network with high security requirements.
- an additional check or validation is usually necessary to ensure the integrity and / or security of the network with high security requirements and / or network availability .
- a data capture unit (DCU, www.siemens.com/dcu) represents a feedback-free network tap that can be used to implement cost-efficient unidirectional data transfers. Messages can be tapped retroactively via the tap connections of the DCU and unidirectional transmission paths of a network guard can be implemented.
- the invention claims a method for data transmission between at least one first network and at least one second network, wherein
- the resource allocation unit for establishing the at least one connection, at least one network access resource that can be coupled to the second network, for example a network card / adapter for WLAN and / or Ethernet, physical interfaces / slots, serial interface, CPU etc., and one the one-way communication unit upstream of the network access resource for specifying a non-reactive data transmission direction is exclusively allocated.
- the one-way communication unit can be used, for example, by means of an optical data diode or alternatively by means of a passive network tap of a DCU (e.g. data capture unit,
- one or more connections can be built up from a first network of a possible number of first networks into one or more second networks (ie a 1 to m relationship).
- one or more connection (s) can be set up from a second network of a possible number of second networks in one or more first networks (ie an n to 1 relationship).
- n first and m second networks are conceivable, which can enter into an n to m relationship via the connections established.
- four ports are provided for the use of connections between networks.
- the 1 to n possible first networks preferably have a security requirement to be met, whereas the 1 to m possible second networks have a security requirement to be met that is different from the first networks.
- the first networks have higher security requirements than the second networks. Connections between two networks with the same security requirements are also conceivable.
- the fact that the at least one connection is established via a one-way communication unit, for example a network tap that can be designed as a data diode, means that the data transmission direction is given. That is, the data transmission can depending on the arrangement and Allocation of the one-way communication unit by the resource allocation unit, either from the first to the second network or from the second to the first network, can be directed unidirectionally and thus without any reaction.
- the network tap can be integrated into the DCU mentioned above.
- the method is preferably computer implemented.
- “computer-implemented” can be understood to mean an implementation of the method in which, in particular, a processor executes at least one method step.
- a further development of the invention provides that the at least one first network fulfills a first security requirement and the at least one second network fulfills a second security requirement that is different from the first security requirement.
- a further development of the invention provides that a virtual machine is provided for the data transmission between the networks mentioned, which machine reconstructs user data from the data received in the one-way communication unit, the user data being forwarded.
- a virtual machine means a software-technical encapsulation of a computer system within an executable computer system.
- the abstracting layer between a real or host (host) computer system on which the virtual machine is running and the virtual machine is called a hypervisor or virtual machine monitor.
- host real or host
- hypervisor virtual machine monitor
- Their implementation is purely hardware-based, purely software-based, or a combination of both.
- the hypervisor generally allows several virtual machines to be operated simultaneously on one physical computer system.
- a further development of the invention provides that a validation unit (VE) is provided, which the virtual len machine is / is downstream, the user data being validated on the basis of a predetermined rule, for example for integrity, authenticity, signature, etc. in the validation unit and forwarded if the validation is positive.
- VE validation unit
- a further development of the invention provides that a data lock is provided, which is / is arranged downstream of the validation unit, the data lock preventing the forwarding of the useful data in the event of a negative validation and, if necessary, temporarily storing the useful data.
- a further development of the invention provides that the data sluice allows either a user data transfer from the virtual machine to it or a user data transfer from it to the allocated network access resource.
- a further aspect of the invention is a transmission device for data transmission between at least one first network and at least one second network, comprising:
- At least one communication unit which is designed to set up at least one connection between the first network and the second network for at least one data transmission between the at least one first network and the at least one second network and a date or data via a between the said networks are directed to the resource allocation unit, and having
- the resource allocation unit for establishing the at least one connection which is designed to exclusively allocate at least one network access resource that can be coupled to the second network and a one-way communication unit upstream of the network access resource for specifying a reaction-free data transmission direction.
- the network access resource is designed for serial data transmission.
- One property of the method and the transmission device is the exclusive or exclusive allocation of network access resources by the resource allocation unit to a virtual machine.
- the network access resources - which allow bidirectional communication - are assigned exclusively to the respective virtual machine. Even in the event that an attacker succeeds in controlling the virtual machine (abbreviated: VM) from the second network, he cannot access resources directly from the first network, as there are no incoming resources (neither unidirectional nor bidirectional) connection to the first network. In this case, an attacker is "trapped" in the virtual machine.
- VM virtual machine
- the invention enables a total of a little elaborate realization of a bidirectional gateway through a combination of one-way communication units for unidirectional unidirectional transmission or transfer links or - connections and virtualization for a safe and efficient technical implementation of control functions on just one hardware platform.
- the Data Capture Unit can be used as a hardware platform, whereby, in addition to a network access resource, resources such as a dedicated CPU core can also be exclusively assigned to each VM instance.
- Secure network connection through incoming and outgoing transfer links or connections, at least partial links of these being implemented via unidirectional coupling using a one-way communication unit.
- a unit or component in particular a communication unit or network component, can be designed as a hardware component.
- a component can include a processor.
- a processor can in particular be a main processor (Central Processing Unit, CPU), a microprocessor or a microcontroller, for example an application-specific integrated circuit or a digital signal processor, possibly in combination with a memory unit for storing program instructions , etc. act.
- a processor can, for example, also be an IC (integrated circuit) or a multi-chip module, in particular an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
- IC integrated circuit
- FPGA field programmable gate array
- ASIC application-specific integrated circuit
- English Application-Specific Integrated Circuit a SoC (System on Chip)
- a graphics processor GPU Graphics Processing Unit
- a processor for evaluating a neural network such as a TPU (Tensor Processing Unit) or a DSP (Digital Signal Processor) . Digital Signal Processor) act.
- the processor can have one or more computing cores (multi-core).
- a processor can also be understood to be a virtualized processor or a soft CPU.
- it can also be a programmable processor that is equipped with configuration steps for executing the method according to the invention or is configured with configuration steps such that the programmable processor implements the features of the method according to the invention or other aspects and partial aspects of the invention.
- the processor can have a tamper protection to protect against physical manipulation, e.g. Tamper sensors for the detection of physical attacks.
- the invention further relates to a computer program product that can be loaded directly into a programmable computer, comprising program code parts that are suitable for the Carry out steps of a computer-implemented method according to the invention.
- a computer program product such as a computer program means, for example, can be provided or delivered as a storage medium or data carrier such as a memory card, USB stick, CD-ROM, DVD or also in the form of a downloadable file from a server in a network be produced.
- the devices, devices, units or devices, modules and computer program (products) can be designed according to the developments / embodiments of the aforementioned method and their further developments / embodiments and vice versa.
- Fig. 1 is a schematic representation of an inventive
- Transmission device that is suitable for data transmission between two or more networks.
- Fig. 2 is a schematic representation of a further Ausense approximate form of the transmission device according to the invention.
- FIG. 1 shows an embodiment of the transmission device according to the invention which is suitable for data transmission between two or more networks.
- a data item or several data from a first for example, NW1 of possible several first networks NW1, NW2 to NWn, which preferably meets a high security requirement, can be entered e.g. a system network (e.g. with system components C) in a second network e.g. NWB of possible several second networks NWA, NWB to NWZ, which preferably meets a lower security requirement than the first network, e.g. an open network (monitoring network with a monitoring unit e.g. M), be transmitted.
- a data transfer takes place from one piece of data or from several data from one of the possible second networks, for example NWB, into one of the possible first networks, for example NW1, via a second transmission path marked with a solid line.
- a transmission link is used by a proxy, e.g. Psec of the first network via a network access resource NW_IF e.g. a network card for Ethernet and / or WLAN or a serial interface and via a network tap of a transmission device NG, also referred to as Network Guard, to a resource allocation unit H, also referred to as a hypervisor.
- NW_IF network access resource
- NG network tap of a transmission device NG
- a resource allocation unit H also referred to as a hypervisor.
- the transmission path is further forwarded via a network access resource NW_IF to a proxy e.g. Pop of the second network led.
- a transmission path from the proxy Pop can be routed to the proxy Psec via the units or components mentioned.
- the date or the data are passed unidirectionally over the transmission links or paths.
- the Network Guard implements and controls the unidirectional transmission paths between a first and a second network.
- the Network Guard comprises the following units / components, which can be designed in terms of hardware, firmware and / or software: a.
- NWTap Network tap NWTap
- Network access unit NW_IF or -Interface the first network interface (bidirectional) being connected to the proxy Psec from the first network.
- Another network access unit NW_IF Another network access unit NW_IF, the second network interface (bidirectional) being connected to the proxy Pop from the second network.
- a first virtual machine via which an incoming or outgoing data transfer is controlled depending on the data transfer direction (unidirectional).
- the virtual machine VM can reconstruct the actual user data from the recorded raw data - as described below under Proxy Psec or Pop.
- a transferred file is reconstructed in this step.
- Incoming network packets of the protocol are recognized and processed further.
- An advantageous embodiment according to the invention provides that packets that do not comply with the protocol are recognized (these can provide information on possible attacks to which one must react accordingly - for example via alarms and subsequent actions as part of intrusion detection and / or prevention procedure)
- hypervisor which regulates the resource management on the Network Guard.
- network interfaces and possibly also CPU (cores) are exclusively or exclusively assigned to the virtual machines by the hypervisor.
- the proxy Psec is a system component which initiates outgoing data transfers from the first network and receives incoming data transfers and processes or further derives.
- the component usually has a dedicated network port which is exclusively connected to the network guard, as shown in the figures.
- proxy Psec Since the network tap cannot act as a communication partner (as it is purely passive and free of reaction), the transfer path between proxy Psec and network tap is designed to be strictly unidirectional, which can be ensured via a hardware property.
- an optical data diode can also be used to transmit the date / data in a purely unidirectional manner.
- a unidirectional protocol such as UDP or the protocol described in the patent application EP 19163812 mentioned above can be used.
- the communication of the proxy Psec is read via the network tap (intercepted) and recorded without any reaction. These "raw data" are then passed on to the virtual machine VM.
- this section of the route is strictly unidirectional and non-reactive.
- the actual user data is therefore embedded in a Network Guard protocol. E.g. a file transfer take place.
- the proxy Pop is a system component that can act in the same way as the proxy Psec for incoming data transfers and accordingly initiates data transfer into the second network and receives and further processes or forwards outgoing data transfers.
- the component is set up in the same way as the proxy Psec, i.e. has a corresponding dedicated connection to the Network Guard.
- the Proxy Pop can request the transferred data from the virtual machine VM. This can be done push-based or pull-based. This section is usually implemented bidirectionally.
- the main protection goals for industrial plants are usually the availability and the integrity of the plant (correct, defined system behavior).
- a connection to an open network in the example of one of the second networks, a strictly unidirectional outgoing connection offers a high degree of security, which corresponds to the level of ner physical network separation is comparable.
- a unidirectional outgoing data transfer (the dashed connection in FIG. 1) can therefore usually be maintained permanently on its own.
- Data is transmitted between at least one first network NW1 or NW2 and at least one second network NWA or NWB, with
- At least one connection between the first network and the second network is established for at least one data transmission between the at least one first network and the at least one second network (see above all the dashed transfer path) and a date or data via a between the named networks arranged Res sourcenzuakushim H are directed,
- the resource allocation unit H exclusively allocates at least one network access resource NWA_IF, which can be coupled to the second network, for setting up the at least one connection to specify a non-reactive data transmission direction.
- FIG. 2 shows an embodiment variant which takes up these requirements and additionally controls incoming connections.
- the system structure from Figure 1 is expanded by the following units or components:
- Validation unit VE this takes over the tasks of filtering incoming data transfers. Data transfers that come in via the virtual machine VM are sent to the validation unit VE transferred via host-internal communication and analyzed by this using a predetermined rule. Only the data transfers that meet the rule are accepted and can later be forwarded towards Proxy Secure. Examples of such a rule for checking or validation are: o Signature validation for firmware and software
- FIG. 2 shows a further embodiment of the invention.
- the Proxy Pop is connected via a serial connection
- Interface S as an embodiment of a network access resource NW_IF.
- NW_IF Network Guard
- the connection of the Proxy Pop is usually maintained via a network access resource NW_IF.
- This variant offers the advantage that outgoing transfers can be carried out at a higher transfer rate (since a serial interface has lower transfer rates compared to Ethernet Interfaces). This is particularly advantageous if a specific implementation requires a higher amount of data transfer from the first network to the second network and less and / or less data has to be transferred from the second network to the first network.
- Computer-readable memories are, for example, volatile memories such as caches, buffers or RAM as well as non-volatile memories such as removable data carriers, hard disks, etc.
- the functions or steps described above can be present in the form of at least one set of instructions in / on a computer-readable memory.
- the functions or steps are not tied to a specific set of instructions or to a specific form of instruction set or to a specific storage medium or to a specific processor or to specific execution schemes and can be implemented through software, firmware, microcode, hardware, processors, integrated circuits etc. can be run alone or in any combination.
- a wide variety of processing strategies can be used, for example serial processing by a single processor or multiprocessing or multitasking or parallel processing, etc.
- the instructions can be stored in local memories, but it is also possible to store the instructions on a remote system and access them via the network.
- the transmission device can have one or more processors.
- processor central signal processing
- control unit or “data evaluation means” includes processing means in the broadest sense, for example servers, universal processors, graphics processors, digital signal processors, application-specific integrated circuits (ASICs), programmable logic circuits such as FPGAs, discrete analog or digital circuits and any combinations thereof, including any other processing means known to those skilled in the art or developed in the future.
- processors can consist of one or more devices or devices or units. If a processor consists of several devices, these can be designed or configured for parallel or sequential processing or execution of instructions.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102019209342.6A DE102019209342A1 (en) | 2019-06-27 | 2019-06-27 | Method and transmission device for data transmission between two or more networks |
PCT/EP2020/066620 WO2020260070A1 (en) | 2019-06-27 | 2020-06-16 | Method and transmission device for data transmission between two or more networks |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3970341A1 true EP3970341A1 (en) | 2022-03-23 |
Family
ID=71266605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20735082.8A Pending EP3970341A1 (en) | 2019-06-27 | 2020-06-16 | Method and transmission device for data transmission between two or more networks |
Country Status (6)
Country | Link |
---|---|
US (1) | US11991146B2 (en) |
EP (1) | EP3970341A1 (en) |
CN (1) | CN113994634B (en) |
AU (1) | AU2020307905B2 (en) |
DE (1) | DE102019209342A1 (en) |
WO (1) | WO2020260070A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12008147B2 (en) * | 2021-10-29 | 2024-06-11 | Mellanox Technologies, Ltd. | Co-packaged switch with integrated quantum key distribution capabilities |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4820487B2 (en) * | 1998-03-12 | 2011-11-24 | ホェール コミュニケーションズ リミテッド | Techniques for protecting data communication networks |
US7707300B1 (en) * | 2001-04-13 | 2010-04-27 | Cisco Technology, Inc. | Methods and apparatus for transmitting information in a network |
US8068504B2 (en) * | 2009-05-18 | 2011-11-29 | Tresys Technology, Llc | One-way router |
US8990433B2 (en) * | 2009-07-01 | 2015-03-24 | Riverbed Technology, Inc. | Defining network traffic processing flows between virtual machines |
US9094224B2 (en) * | 2012-07-31 | 2015-07-28 | Cisco Technology, Inc. | Acknowledged multicast convergence |
AU2014205389A1 (en) * | 2013-01-11 | 2015-06-04 | Db Networks, Inc. | Systems and methods for detecting and mitigating threats to a structured data storage system |
CN106209688B (en) * | 2016-07-13 | 2019-01-08 | 腾讯科技(深圳)有限公司 | Cloud data multicast methods, devices and systems |
US10798063B2 (en) * | 2016-10-21 | 2020-10-06 | Nebbiolo Technologies, Inc. | Enterprise grade security for integrating multiple domains with a public cloud |
US10841277B2 (en) * | 2017-08-14 | 2020-11-17 | Ut-Battelle, Llc | One step removed shadow network |
WO2019099088A1 (en) * | 2017-11-17 | 2019-05-23 | Siemens Aktiengesellschaft | Risk analysys for indusrial control system |
US10749790B2 (en) * | 2019-01-15 | 2020-08-18 | Cisco Technology, Inc. | Multicast-based content distribution for IoT networks using bit index explicit replication (BIER) |
EP3713188B1 (en) | 2019-03-19 | 2024-06-19 | Siemens Mobility GmbH | Method and apparatus for data transmission between two networks |
US20240267113A1 (en) * | 2021-06-08 | 2024-08-08 | Koninklijke Philips N.V. | Method for operating a secondary station |
-
2019
- 2019-06-27 DE DE102019209342.6A patent/DE102019209342A1/en not_active Withdrawn
-
2020
- 2020-06-16 AU AU2020307905A patent/AU2020307905B2/en active Active
- 2020-06-16 EP EP20735082.8A patent/EP3970341A1/en active Pending
- 2020-06-16 US US17/621,375 patent/US11991146B2/en active Active
- 2020-06-16 WO PCT/EP2020/066620 patent/WO2020260070A1/en unknown
- 2020-06-16 CN CN202080046925.3A patent/CN113994634B/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2020307905B2 (en) | 2023-08-17 |
CN113994634A (en) | 2022-01-28 |
WO2020260070A1 (en) | 2020-12-30 |
US20220360558A1 (en) | 2022-11-10 |
DE102019209342A1 (en) | 2020-12-31 |
CN113994634B (en) | 2024-04-26 |
AU2020307905A1 (en) | 2022-03-03 |
US11991146B2 (en) | 2024-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3669498B1 (en) | Method and control system for controlling and/or supervising of devices | |
DE69330970T2 (en) | Secure front connection system and process control process computer | |
EP3673623A1 (en) | Method and control system for controlling and/or monitoring devices | |
EP1959606B1 (en) | Safety unit | |
EP3388994A1 (en) | Method and apparatus for computer-assisted testing of a blockchain | |
EP2981926B1 (en) | Data storage device for protected data exchange between different security zones | |
EP3382616A1 (en) | Method and device for computer-assisted provision of a secure digital twin | |
EP3595267B1 (en) | Method, devices and system for exchanging data between a distributed database system and devices | |
WO2018137856A1 (en) | Method and device for the computer-supported creation and execution of a control function | |
EP3435270A1 (en) | Device and method for cryptographically protected operation of a virtual machine | |
EP3669285A1 (en) | Method and control system for controlling and/or monitoring devices | |
WO2019201461A1 (en) | Method and control system for controlling and/or monitoring devices | |
DE102018127330A1 (en) | System-on-chip and method for operating a system-on-chip | |
EP3413254A1 (en) | Method and device for providing a transaction dataset | |
EP3718263B1 (en) | Method and control system for controlling and/or supervising of devices | |
WO2020260070A1 (en) | Method and transmission device for data transmission between two or more networks | |
EP3655876B1 (en) | Single-chip system, method for operating a single-chip system, and motor vehicle | |
EP3373545A1 (en) | Safety unit, in particular for an iot device and method for executing one or more applications for secure data exchange with one or more servers providing web services | |
EP4154070A1 (en) | Digital twin-based process control in an iot network | |
EP4127994A1 (en) | Method and device for securely starting up a container instance | |
WO2021197822A1 (en) | Method for handling an anomaly in data, in particular in a motor vehicle | |
DE202015004439U1 (en) | Monitoring device and network participants | |
EP3144842A1 (en) | System and method for analysis of an object | |
EP4032243A1 (en) | System and method for managing data of an automation field device in a secure manner against manipulation | |
EP3772843A1 (en) | Method and communication device for data transmission between networks, in particular with different security requirements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20211213 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20231205 |