18064600. NETWORK DEVICE CONFIGURED FOR CRYPTOGRAPHICALLY PROTECTED COMMUNICATION SUPPORTING MULTIPLE EXECUTION ENVIRONMENTS simplified abstract (Robert Bosch GmbH)
NETWORK DEVICE CONFIGURED FOR CRYPTOGRAPHICALLY PROTECTED COMMUNICATION SUPPORTING MULTIPLE EXECUTION ENVIRONMENTS
Organization Name
Inventor(s)
Andreas Bartelt of Stuttgart (DE)
NETWORK DEVICE CONFIGURED FOR CRYPTOGRAPHICALLY PROTECTED COMMUNICATION SUPPORTING MULTIPLE EXECUTION ENVIRONMENTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18064600 titled 'NETWORK DEVICE CONFIGURED FOR CRYPTOGRAPHICALLY PROTECTED COMMUNICATION SUPPORTING MULTIPLE EXECUTION ENVIRONMENTS
The abstract describes a network device configured for cryptographically protected communication with another network device, involving a handshake protocol, cryptographic protection of bulk data protocol, and a resumption protocol. A session handling system obtains a bulk cryptographic protection key and a resumption key from the handshake protocol, forwarding the protection key to the host system but not the resumption key.
- Cryptographically protected communication between network devices
- Handshake protocol, cryptographic protection of bulk data protocol, and resumption protocol
- Session handling system obtains bulk cryptographic protection key and resumption key
- Protection key forwarded to host system, resumption key not forwarded
Potential Applications: - Secure communication between network devices - Data protection during transmission - Secure session management
Problems Solved: - Ensuring secure communication between network devices - Protecting data from unauthorized access during transmission - Efficient session management
Benefits: - Enhanced security for network communication - Protection of sensitive data - Improved session handling efficiency
Commercial Applications: Title: Secure Communication Solutions for Network Devices This technology can be utilized in industries requiring secure data transmission, such as finance, healthcare, and government sectors. It can also be integrated into IoT devices for secure communication.
Prior Art: Research existing cryptographic communication protocols and technologies used in network devices to understand the evolution of secure communication methods.
Frequently Updated Research: Stay updated on advancements in cryptographic protocols and network security to enhance the efficiency and effectiveness of the technology.
Questions about Cryptographically Protected Communication: 1. How does the handshake protocol ensure secure communication between network devices? 2. What are the potential vulnerabilities in cryptographic protection of bulk data protocols and how can they be mitigated?
Original Abstract Submitted
A first network device configured for cryptographically protected communication with a second network device. The cryptographically protected communication comprising at least a handshake protocol, a cryptographic protection of bulk data protocol, and a resumption protocol. A session handling system obtains from the handshake protocol a first bulk cryptographic protection key and a resumption key. The first cryptographic protection key is forwarded to the host system but not the resumption key.