Method and computer system for securing communication in networks
First Claim
1. Method for safeguarding the communication in a network with an intermediate arrangement of a safety computer system, realized as an embedded system including embedded hardware and embedded software, between a protection-requiring data processing facility and the network,the method comprising the steps of:
- monitoring and/or controlling data exchange between the protection-requiring data processing facility and the network by the embedded system,wherein the embedded system is an autonomous unit including monitoring and/or control functions installed thereon, andwherein all data required for correct execution of the monitoring and/or control functions installed on the embedded system are available on the embedded system, andfurther comprising the step of;
establishing a connection for data transmission between the protection-requiring data processing facility and the network by the embedded system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a computer system for securing communication in networks of data processing units which can be used especially for individually created security units for portable computer systems. In order to secure the communication, the data exchange between a data processing unit to be protected and the network is monitored and/or controlled by means of a computer program which is implemented in a security computer system as embedded software, the security computer system being inserted between the data processing device to be protected and the network. A computer system providing such protection is embodied as a single board computer or as a chip solution and comprises means for exchanging data with the data processing unit to be protected, means for exchanging data with the network, and means for monitoring and/or controlling the communication between the data processing unit to be protected and the network.
47 Citations
30 Claims
-
1. Method for safeguarding the communication in a network with an intermediate arrangement of a safety computer system, realized as an embedded system including embedded hardware and embedded software, between a protection-requiring data processing facility and the network,
the method comprising the steps of: -
monitoring and/or controlling data exchange between the protection-requiring data processing facility and the network by the embedded system, wherein the embedded system is an autonomous unit including monitoring and/or control functions installed thereon, and wherein all data required for correct execution of the monitoring and/or control functions installed on the embedded system are available on the embedded system, and further comprising the step of; establishing a connection for data transmission between the protection-requiring data processing facility and the network by the embedded system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification