-
公开(公告)号:US20180069701A1
公开(公告)日:2018-03-08
申请号:US15556669
申请日:2015-03-09
Applicant: SAAB AB
Inventor: Mats Jonsson
CPC classification number: H04L9/3226 , H04L9/14 , H04L61/2007 , H04L63/04 , H04L63/0428 , H04L63/061 , H04L69/162
Abstract: The disclosure relates to a system, devices and methods for distributing and using a communication scheme to enable secure communication between communication nodes in a network. A method comprises determining, in the network node, a set of available IP addresses and a set of ports, dividing, in the network node, a time frame in time slots, associating, in the network node, each time slot with an IP address, with a port associated with the IP address and with a unique cryptographic key, distributing, from the network node, the communication scheme to the communication node, receiving, in the communication node, the communication scheme and communicating, in the communication node, with another communication node in possession of a corresponding communication scheme by hopping between the IP addresses and ports according to the communication scheme and encrypting the communication using the unique cryptographic key.
-
公开(公告)号:US10896251B2
公开(公告)日:2021-01-19
申请号:US16063054
申请日:2016-12-15
Applicant: SAAB AB
Inventor: Mats Jonsson
Abstract: The present invention relates to a method for authenticating software. The method comprises defining a set of parameters to use for trace mapping the software, wherein the set of parameters represents the software functionality when executed. The method further comprises: a) creating a trusted fingerprint that is created by trace mapping the software using the set of parameters when executed in a trusted environment; b) creating an operating fingerprint that is created by trace mapping the software using the set of parameters when executed in an operating environment; c) comparing the operating fingerprint with the trusted fingerprint, and identifying any difference between the trusted fingerprint and the operating fingerprint; and d) when said operating fingerprint is non-identical with the trusted fingerprint, initiating predefined action(s) in response to the identified differences between the trusted fingerprint and the operating fingerprint.
-