Method for the encryption of data
First Claim
Patent Images
1. A method comprising the steps of:
- encrypting a message in a transmission node of a communication network, using an active key, the message comprising a header, a user data part, and an encryption data part, the encryption data part comprising data of a new key,sending the message from the transmission node to a reception node of the communication network,decrypting the message at the transmission node, using the active key,after the sending of the message from the transmission node and after reception of the new key at the reception node, replacing at both the transmission node and at the reception node the active key with the new key for further communication,exchanging a fallback key between the transmission node and the reception node, andregularly using the fallback key as a fallback in the event that the connection is lost,wherein the sending of the message between the transmission node and the reception node takes place by way of near field communication,wherein for the sending of the message, the transmission node codes the active key as a barcode and represents the barcode by way of an output device, and the reception node scans the barcode by way of an input device, andwherein the active key, the new key, and the fallback key are different keys.
1 Assignment
0 Petitions
Accused Products
Abstract
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example.
9 Citations
12 Claims
-
1. A method comprising the steps of:
-
encrypting a message in a transmission node of a communication network, using an active key, the message comprising a header, a user data part, and an encryption data part, the encryption data part comprising data of a new key, sending the message from the transmission node to a reception node of the communication network, decrypting the message at the transmission node, using the active key, after the sending of the message from the transmission node and after reception of the new key at the reception node, replacing at both the transmission node and at the reception node the active key with the new key for further communication, exchanging a fallback key between the transmission node and the reception node, and regularly using the fallback key as a fallback in the event that the connection is lost, wherein the sending of the message between the transmission node and the reception node takes place by way of near field communication, wherein for the sending of the message, the transmission node codes the active key as a barcode and represents the barcode by way of an output device, and the reception node scans the barcode by way of an input device, and wherein the active key, the new key, and the fallback key are different keys. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising the steps of:
-
encrypting a message in a transmission node of a communication network, using an active key, the message comprising a header, a user data part, and an encryption data part, the encryption data part comprising data of a new key, sending the message from the transmission node to a reception node of the communication network, decrypting the message at the transmission node, using the active key, after the sending of the message from the transmission node and after reception of the new key at the reception node, replacing at both the transmission node and at the reception node the active key with the new key for further communication, exchanging a fallback key between the transmission node and the reception node, and regularly using the fallback key as a fallback in the event that the connection is lost, wherein the encryption of the message, using the active key, takes place via setting the character values of the active key off against the character values of the non-encrypted message, in accordance with a predetermined function, wherein the decryption of the message takes place via setting the character values of the active key off against the character values of the encrypted message, in accordance with a reversal function of the predetermined function, and wherein the active key, the new key, and the fallback key are different keys. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification