WO2005025179A1 - Verfahren zum übermitteln von elektronischen daten über zwei unterschiedliche netzwerk zur erhöhung der internetsicherheit - Google Patents
Verfahren zum übermitteln von elektronischen daten über zwei unterschiedliche netzwerk zur erhöhung der internetsicherheit Download PDFInfo
- Publication number
- WO2005025179A1 WO2005025179A1 PCT/IB2004/000612 IB2004000612W WO2005025179A1 WO 2005025179 A1 WO2005025179 A1 WO 2005025179A1 IB 2004000612 W IB2004000612 W IB 2004000612W WO 2005025179 A1 WO2005025179 A1 WO 2005025179A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packets
- types
- network
- networks
- sender
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/14—Channel dividing arrangements, i.e. in which a single bit stream is divided between several baseband channels and reassembled at the receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates to a method according to claim 1, which drastically reduces today's rates of hacker attacks on computer systems.
- the present invention relates to a method according to claim 1, which drastically reduces today's rates of hacker attacks on computer systems.
- For the security of computer systems there are numerous facilities that do not fulfill their purpose. They consume a great deal of resources and yet computer hackers cause $ 600- $ 800 billion (US dollars) of damage worldwide each year.
- the central element in communication among computer systems is the package.
- the data is split into packets serially. This means the following: the first X - bits become packet 1, the second X - bits are packet 2, and so on. Are defined.
- These packets are then sent on a network (e.g., the Internet) from the sender to the recipient.
- the packets contain - apart from data - addresses and rules, as they must be reassembled at the receiver. Even if partially encrypted, everything is in the same place, at the same time (in the same time window), to find in a package and in the same network. That is why the data in such packets in a network are so vulnerable to unauthorized access.
- the object of the invention is to eliminate these disadvantages. This object is solved by the features of claim 1.
- the spatial (geographic) and spectral separation of the data during the time-shifted transmission in two networks give the unauthorized access to the actual data as good as no chance.
- the quintessence of the method is the spatial (geographic) and the spectral separation of the data and a small time shift of transmission in two networks (dual network) Figure 1, so that the separate data - by a new method of packet processing Table 1 - already implicitly encrypted are.
- FIG. 1 shows an embodiment of the dual network according to the invention, with a sender and with a receiver, as well as with the distance traveled in the U network (dashed lines) of a U packet (dashed arrows) and with the distance traveled in the G network (solid lines) of a G packet (solid arrows).
- a sender 1 who sends a message to a receiver 8. The message consists of U packets 4u, and G packets 4g.
- a U-packet 4u in the U-network 5u goes back the following way:
- a G package 4g in the G - network 5g goes back the following way:
- Duplication means the doubling of the number of nodes - in today's network. Only quasi - doubling, because the number of U - nodes and the number of G - nodes do not have to be identical. (The number of routers or gateways, in the U - network and in the G - network need not be identical.) The nodes of the two networks are in different places.
- the available spectrum (bandwidth) is used dynamically. This dynamic assignment of the channels, the removal of the nodes of the two networks and the dynamic routing provide the spatial (geographical) and spectral separation of the U packets and the G packets during the transmission.
- Each end device (PC, server) has two identities: U - identity, G - identity. One connects it to the U - network, the other to the G - network. Search the U packages their way in the U - network, the G - packets in the G - network. Without any indication that they belong together and that they will reach the same end device.
- Router, gateway Devices that are responsible for forwarding the packets in the respective network (router, gateway) are each connected to only one network (U network or G network) and perform their tasks as if there were only one network. As is usual today - before the introduction of the dual network.
- the U packets and the G packets are reassembled.
- a shipment usually consists of more than just a package.
- a component of the packages is an identification of the item (Message - ID).
- the sender sends the G message identification (G message ID) of the transmission in the G network (or vice versa) to the receiver.
- G message ID G message identification
- the dual network proposed here is suitable for any transmission medium. Undoubtedly, connecting the end devices to the two networks is easier in the case of wireless communication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04716285A EP1665712A1 (de) | 2003-09-10 | 2004-03-02 | Verfahren zum übermitteln von elektronischen daten über zwei unterschiedliche netzwerke zur erhöhung der internetsicherheit |
US10/595,155 US20070050516A1 (en) | 2003-09-10 | 2004-03-02 | Method for transmitting electronic data via a dual network in order to increase internet security |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH1544/03 | 2003-09-10 | ||
CH01544/03A CH694215A5 (de) | 2003-09-10 | 2003-09-10 | Verfahren zum Uebermitteln von elektronischen Daten ueber ein duales Netzwerk zur Erhhoehung der Internetsicherheit. |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005025179A1 true WO2005025179A1 (de) | 2005-03-17 |
Family
ID=32855174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/000612 WO2005025179A1 (de) | 2003-09-10 | 2004-03-02 | Verfahren zum übermitteln von elektronischen daten über zwei unterschiedliche netzwerk zur erhöhung der internetsicherheit |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070050516A1 (de) |
EP (1) | EP1665712A1 (de) |
CH (1) | CH694215A5 (de) |
WO (1) | WO2005025179A1 (de) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007149014A1 (en) * | 2006-06-20 | 2007-12-27 | Telefonaktiebolaget Lm Ericsson (Publ) | A user terminal for enhanced security in a wireless communications system, and a system for its use |
EP2043327A3 (de) * | 2007-09-26 | 2009-06-10 | Xerox Corporation | Sichere Dokumentübertragung |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8997207B2 (en) * | 2009-09-24 | 2015-03-31 | Sap Ag | Modular secure data transfer |
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
US9667530B2 (en) | 2013-05-06 | 2017-05-30 | International Business Machines Corporation | Privacy preserving query method and system for use in federated coalition networks |
GB2519119A (en) * | 2013-10-10 | 2015-04-15 | Ibm | Linear network coding in a dynamic distributed federated database |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002052787A2 (en) * | 2000-12-22 | 2002-07-04 | The Charles Stark Draper Laboratory, Inc. | Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks |
WO2003055175A1 (en) * | 2001-12-19 | 2003-07-03 | The Charles Stark Draper Laboratory, Inc. | Camouflage of network traffic to resist attack |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5793953A (en) * | 1995-07-07 | 1998-08-11 | Sun Microsystems, Inc. | Method and apparatus for allowing packet data to be separated over multiple bus targets |
JP3159055B2 (ja) * | 1996-05-16 | 2001-04-23 | ヤマハ株式会社 | 通信システム |
US6192414B1 (en) * | 1998-01-27 | 2001-02-20 | Moore Products Co. | Network communications system manager |
US6496477B1 (en) * | 1999-07-09 | 2002-12-17 | Texas Instruments Incorporated | Processes, articles, and packets for network path diversity in media over packet applications |
US6820133B1 (en) * | 2000-02-07 | 2004-11-16 | Netli, Inc. | System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination |
CA2405783A1 (en) * | 2000-04-17 | 2001-10-25 | Mitch A. Benjamin | Secure dynamic link allocation system for mobile data communication |
US6836804B1 (en) * | 2000-10-30 | 2004-12-28 | Cisco Technology, Inc. | VoIP network |
US7636724B2 (en) * | 2001-08-31 | 2009-12-22 | Peerify Technologies LLC | Data storage system and method by shredding and deshredding |
US6870821B2 (en) * | 2003-01-30 | 2005-03-22 | Nokia Corporation | Flexible layer overlay for seamless handovers between full rate and half rate channels |
US6919829B2 (en) * | 2003-06-20 | 2005-07-19 | Nokia Corporation | Bit swapping for different interleaving depths |
-
2003
- 2003-09-10 CH CH01544/03A patent/CH694215A5/de not_active IP Right Cessation
-
2004
- 2004-03-02 WO PCT/IB2004/000612 patent/WO2005025179A1/de active Application Filing
- 2004-03-02 US US10/595,155 patent/US20070050516A1/en not_active Abandoned
- 2004-03-02 EP EP04716285A patent/EP1665712A1/de not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002052787A2 (en) * | 2000-12-22 | 2002-07-04 | The Charles Stark Draper Laboratory, Inc. | Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks |
WO2003055175A1 (en) * | 2001-12-19 | 2003-07-03 | The Charles Stark Draper Laboratory, Inc. | Camouflage of network traffic to resist attack |
Non-Patent Citations (1)
Title |
---|
YAO WANG ET AL: "Wireless video transport using path diversity: multiple description vs. layered coding", PROCEEDINGS 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING. ICIP 2002. ROCHESTER, NY, SEPT. 22 - 25, 2002, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, NEW YORK, NY: IEEE, US, vol. 2 OF 3, 22 September 2002 (2002-09-22), pages 21 - 24, XP010607250, ISBN: 0-7803-7622-6 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007149014A1 (en) * | 2006-06-20 | 2007-12-27 | Telefonaktiebolaget Lm Ericsson (Publ) | A user terminal for enhanced security in a wireless communications system, and a system for its use |
EP2043327A3 (de) * | 2007-09-26 | 2009-06-10 | Xerox Corporation | Sichere Dokumentübertragung |
Also Published As
Publication number | Publication date |
---|---|
US20070050516A1 (en) | 2007-03-01 |
CH694215A5 (de) | 2004-09-15 |
EP1665712A1 (de) | 2006-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19740547B4 (de) | Vorrichtung und Verfahren zum Sicherstellen sicherer Kommunikation zwischen einer anfordernden Entität und einer bedienenden Entität | |
DE69333852T2 (de) | Verfahren, Gerät und Anordnung zur Verschlüsselung von Daten die über verbundene Netze übertragen werden | |
DE60225223T2 (de) | Geschaltetes vollduplex-Ethernet Kommunikationsnetz und Verfahren dafür | |
DE602004008055T2 (de) | Intelligente integrierte netzwerksicherheitseinrichtung | |
DE60203433T2 (de) | Externer Zugriff auf eine gesicherte Vorrichtung in einem privaten Netzwerk | |
EP2018015B1 (de) | Verfahren und Vorrichtung für eine anonyme verschlüsselte mobile Daten- und Sprachkommunikation | |
DE60104876T2 (de) | Prüfung der Konfiguration einer Firewall | |
DE202016008885U1 (de) | Regelbasierte Erkennung von Netzwerkbedrohungen für verschlüsselte Kommunikationen | |
DE60121755T2 (de) | Ipsec-verarbeitung | |
WO2018099736A1 (de) | Verfahren für ein kommunikationsnetzwerk und elektronische kontrolleinheit | |
EP3518489A1 (de) | Verfahren und system zur offenlegung mindestens eines kryptographischen schlüssels | |
EP1721235B1 (de) | Kommunikationssystem und verfahren zur bereitstellung eines mobilen kommunikationsdienstes | |
DE102009004490A1 (de) | Verfahren und System zur Authentifizierung von Netzknoten eines Peer-to-Peer Netzwerks | |
EP1665712A1 (de) | Verfahren zum übermitteln von elektronischen daten über zwei unterschiedliche netzwerke zur erhöhung der internetsicherheit | |
DE69530886T2 (de) | Prüfung der Echtheit von zwischen zwei Stationen eines Telecommunikationsnetz übertragenen Daten | |
DE102019210226A1 (de) | Vorrichtung und Verfahren für Angriffserkennung in einem Kommunikationsnetzwerk | |
DE102019210224A1 (de) | Vorrichtung und Verfahren für Angriffserkennung in einem Rechnernetzwerk | |
EP3149913A1 (de) | System und verfahren für eine sichere und anonyme kommunikation in einem netzwerk | |
EP4052440A1 (de) | Übertragungsvorrichtung zum übertragen von daten | |
DE102016100692A1 (de) | Netzwerkschutzentität und Verfahren zum Schutz eines Kommunikationsnetzwerks gegen betrügerische Nachrichten | |
DE60219244T2 (de) | Aktives Netzwerk | |
WO2011082771A1 (de) | Verfahren zur anonymisierung von verbindungsdaten in ip-paketen | |
DE602004000630T2 (de) | Adressverarbeitung von Kommunikationsendgeräten durch Integration und/oder Extraktion von Kommunikationsschnittstellenmerkmalen in der Adresse | |
DE69925381T2 (de) | Verfahren zum transport von paketen von einer zugangsschnittstelle zu einem geteilten netz | |
DE19958638C2 (de) | Vorrichtung und Verfahren zum individuellen Filtern von über ein Netzwerk übertragener Informationen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004716285 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007050516 Country of ref document: US Ref document number: 10595155 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2004716285 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10595155 Country of ref document: US |