SECURE DATA TRANSFER
    1.
    发明申请

    公开(公告)号:US20180069701A1

    公开(公告)日:2018-03-08

    申请号:US15556669

    申请日:2015-03-09

    Applicant: SAAB AB

    Inventor: Mats Jonsson

    Abstract: The disclosure relates to a system, devices and methods for distributing and using a communication scheme to enable secure communication between communication nodes in a network. A method comprises determining, in the network node, a set of available IP addresses and a set of ports, dividing, in the network node, a time frame in time slots, associating, in the network node, each time slot with an IP address, with a port associated with the IP address and with a unique cryptographic key, distributing, from the network node, the communication scheme to the communication node, receiving, in the communication node, the communication scheme and communicating, in the communication node, with another communication node in possession of a corresponding communication scheme by hopping between the IP addresses and ports according to the communication scheme and encrypting the communication using the unique cryptographic key.

    Method for authenticating software

    公开(公告)号:US10896251B2

    公开(公告)日:2021-01-19

    申请号:US16063054

    申请日:2016-12-15

    Applicant: SAAB AB

    Inventor: Mats Jonsson

    Abstract: The present invention relates to a method for authenticating software. The method comprises defining a set of parameters to use for trace mapping the software, wherein the set of parameters represents the software functionality when executed. The method further comprises: a) creating a trusted fingerprint that is created by trace mapping the software using the set of parameters when executed in a trusted environment; b) creating an operating fingerprint that is created by trace mapping the software using the set of parameters when executed in an operating environment; c) comparing the operating fingerprint with the trusted fingerprint, and identifying any difference between the trusted fingerprint and the operating fingerprint; and d) when said operating fingerprint is non-identical with the trusted fingerprint, initiating predefined action(s) in response to the identified differences between the trusted fingerprint and the operating fingerprint.

Patent Agency Ranking