摘要:
A method in which user information is transmitted from at least one data source to a processing unit of a learning device. The user information is used, by the processing unit via a machine learner, to generate at least one user model. The at least one user model is adapted via an adaptation of parameters used by the at least one machine learner to generating the at least one user model. The parameters, used by the at least one machine learner for generating the at least one user model, are adapted as a function of at least one predefined rule. The user model generated on the basis of the adapted parameters is used to personalize at least one terminal.
摘要:
A method, a data protection module and a network system for protecting data of an electronic device, on which sensitive data are recorded or supplied; the sensitive data being processed by external services, in particular, Internet services. The data protection module is used for automatically computing data protection configurations for the device on the basis of device metadata and service metadata.
摘要:
A telecommunication network, an authentication node, and a method for commissioning an electronically controllable vehicle component of a telecommunication network. For commissioning, the vehicle component requires a verification of authentication data that are to be acquired. For this purpose, the following is carried out: positioning a mobile data carrier in the authentication node of the traffic network, in particular in a vehicle; reading in authentication data of the mobile data carrier within the authentication node; verifying the read-in authentication data and, if verification is successful: producing a verification signal; triggering a verified commissioning of the component if the verification signal is acquired at the vehicle component or at a control device of the node at which the component is situated.
摘要:
Method for activating a configuration mode in a device which has a communications unit and a sensor unit, a configuration mode of the device being activated when the device detects a measured value outside a predefined measuring range via the sensor unit, and a configuration of the device by a second device via the communications unit being allowed only in the configuration mode.
摘要:
A method for processing user information detected by at least one detection device of a device, in which information concerning at least one user detected by the at least one detection device is transmitted to a number of databases, and in which the information detected by the at least one detection device is at least partially associated with a user profile, and in which all information stored on the number of databases which has been detected by the at least one detection device and associated with the user profile is retrieved from the number of databases, and as a function of a result of an authentication of the user is output to the user on at least one output unit for processing.
摘要:
For communication of a first participant with at least one additional participant in a communication system via multiple protocols, the protocols using at least two different certificate formats, the first participant uses different certificates with the respective certificate formats for the communication via the different protocols, the different certificates being based on a shared public key. The first participant holds a shared associated private key for the different certificates. Provision of the certificates for the first participant includes generating the public key and the associated private key, signing the public key for provision of the first certificate, and signing the public key for provision of the second certificate.
摘要:
A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants among each other, a withdrawal request being received by one participant of the group, the withdrawal request making an identification of the participant to be excluded possible by the participant to be excluded itself, and the authorized communication being terminated by the participant when it is identifiable as the participant to be excluded based on the withdrawal request, as well as a communication system for carrying it out.
摘要:
A method for safeguarding a network made up of at least one first device and one second device. The first device derives a first challenge from physical properties of a first communication channel between the first device and the third device. In addition, the first device transmits the first challenge to the second device via a second communication channel between the first device and the second device. The first device receives a first response, corresponding to the first challenge, from the third device via the first communication channel and receives a second response, corresponding to the first challenge, from the second device via the second communication channel. The first device compares the first response and the second response to one another to verify that the second device is communicating with the third device.
摘要:
A method for updating a software component. The method includes providing a first electronic device and a second electronic device that are connected in a first network, receiving update information for the second electronic device via the first electronic device, the update information being provided with a signature that is generated with the aid of a post-quantum algorithm (PQA) signature, checking the update information by validating the signature by the first electronic device, relaying the update information to the second electronic device if the update information is deemed to be valid, and updating a software component of the second electronic device using the update information.
摘要:
A method for managing personal data stored in a distributed system, in which the personal data are transmitted from a terminal device to at least one network node; and in which there is furnished to the user, by the distributed system, a user interface by way of which the personal data are to be managed in respective network nodes of the distributed system which manage the personal data; and in which management instructions furnished via the user interface, for managing the personal data within the distributed system, are transmitted via a predefined interface that is configured at least on the respective network nodes of the distributed system which manage the personal data.