×

Communication method for multisubscriber networks, which is protected from deception, eavesdropping and hacking

  • US 9,037,853 B2
  • Filed: 11/17/2008
  • Issued: 05/19/2015
  • Est. Priority Date: 02/22/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for unalterable, tap-proof and non-hackable P2P communication in multi-subscriber networks wherein part of data are relative data calculated with reference to a space or a plurality of spaces, to a reference point or a plurality of reference points, comprising:

  • performing each P2P communication with reference to at least one global random reference data element valid for a randomly defined time interval, and to a separate random reference data element and/or random data element valid for one P2P communication,storing at least said global random reference data valid for randomly defined time intervals secretly and unalterably in each P2P communication performing transmitting/receiving unit,wherein only units involved in a P2P communication have knowledge about the separate random reference data and/or random data valid for said P2P communication,determining at least a part of the separate random reference data and/or random data valid for said P2P communication in at least one unit involved in said P2P communication, and exchanging said at least a part in form of relative data between the units involved in said P2P communication,determining at least one exchanged relative data element of at least one random reference data element, and/or random data element, and/or data element identifying a person, and/or data element identifying a unit, and/or P2P control data element with reference to said currently valid global random reference data element,determining at least another exchanged relative data element or all of the other exchanged relative data with reference to said separate random reference data and/or random data valid for said P2P communication, anddetermining a relative data element by vector subtractions with a vector of a respective data element point as a minuend and a vector of a random reference point as a first subtrahend and a translation/rotation vector as a second subtrahend with reference to a space associated with a type of the relative data element, wherein;

    a transmitting unit of a subscriber determines a plurality of random numbers, at least one data element identifying a person and/or a unit, and/or an interlace data element, and/or a P2P control data element, and a component data element or a plurality of component data, wherein presence of a component data element is indicated by an activated bit in a component identification data element associated with that component data element,at least one component data element is a permutation data element PI,the transmitting unit determines relative data having a data length DATL1 from the determined data, arranges said relative data in a predefined order into one data block or two data blocks or a plurality of data blocks, determines at least one hash value from said data blocks, interlaces partial data of each hash value into at least one predefined portion of the associated data block in function of interlace control data 2, packages the interlaced data into P2P data blocks having a data length of DATL2, and calculates relative data thereof,the transmitting unit uses all of the relative data of the P2P data blocks as data blocks of a P2P header, or uses a predefined number of relative data of the P2P data blocks as data blocks of the P2P header and the remaining rest as data blocks of a P2P data end block,the transmitting unit interlaces partial data of the relative data element of the first P2P data block into the relative data of the other P2P data blocks of the P2P header in function of interlace control data 1 which are identical for all units, first transmits said interlaced P2P data blocks as a P2P header, in presence of interlace data intended for proper data interlaces the proper data with the interlace data and continues to use it as proper data, and/or divides the proper data into data packets, generates a hash value for each data packet, adds the hash value to the respective data packet, encrypts and/or permutes and/or re-permutes a data packet with its hash value or data packets with its hash values, wherein said permutations and/or re-permutations are applied before and/or following encryption,the transmitting unit determines, from all the hash values or from all preceding hash values or from all the hash values of the data packets a total hash value, provides it with at least one flag, adds both to the proper data at the end of the proper data, and encodes and/or permutes and/or re-permutes in conjunction with the last data packet with its hash value added or the last data packets with their hash values added,if a P2P data end block is present, the transmitting unit transmits it last,a receiving unit receives the P2P header, de-interlaces the data of the relative data element of the first P2P data block from the relative data of the other P2P data blocks of the P2P header using said interlace control data 1, determines, from the relative data of the first P2P data block, the first part of the predefined sequence of relative data with a data length of DATL1 of the first data block,the receiving unit determines, from the relative data with a data length DATL1 of the first P2P data block, the random numbers, P2P control data, data identifying the data transmitting person and/or the data transmitting unit and the data receiving person and/or unit, identifies, from said identifying data, itself as an authorized recipient, thereupon determines the remaining part of the first data block interlaced with the partial data of its hash values from the remaining relative P2P data blocks of the P2P header,the receiving unit determines all the hash values by de-interlacing the partial data of the hash values from the first data block interlaced with the partial data of its hash values, calculates the hash value or the hash values over the de-interlaced data block, compares all the receiver and transmitter side hash values of the first data block with each other, in case of a match detects the integrity of the data of the first data block,the receiving unit determines, from the remaining portion of the predefined sequence of the first data block, the relative data with a data length of DATL1, and therefrom the first existing component data such as the permutation data element or permutation data PI,the receiving unit re-permutes and/or permutes and/or decrypts the encrypted and/or permuted and/or re-permuted data packets with its hash values added, wherein said re-permutations and/or permutations are applied before and/or following decryption,the receiving unit determines the hash value for each data packet, compares it with the received hash value, calculates the total hash value, identifies the received total hash value by the hash value indication or indications, and compares the received total hash value with the calculated total hash value, detects integrity of the data upon a match in all comparisons,the receiving unit, if a P2P data end block is present, determines the remaining P2P data blocks from the relative data with a data length of DATL2, de-interlaces the partial data of the hash value or hash values from the second data block interlaced with the partial data of its hash values, calculates the hash value or hash values over the second data block, compares all the receiver and transmitter side hash values of the second data block with each other, in case of a match detects the integrity of the data of the second data block, andthe receiving unit determines the remaining component data provided from the predefined sequence of relative data of the second data block.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×