M2MComms

M2M-Communication: From one Machine to Another
But what exactly are the machines doing to each other?
They’re not talking since such communication has to be non-verbal by default.
They’re not having a conversation since they will hardly be chatting about films or music.
Making contact fits better and seems to hit the target dead-centre.
Systems of machines working together have been around for a while now. In these – let’s call them „classic systems“ – an integrator has determined which components work together, and how they are supposed to accomplish this.
In M2M communication, this previously determined order will not exist anymore. In a way, the machines themselves will decide when to make contact with another machine to exchange information.
Actually, „machine“ is not the right term – or at least not if you go with the commonly accepted definition. The „machines“ concerned here, are computers, either individual ones or ones that have already been connected into clusters. Each of them consists of software and hardware to execute that.
The challenge lies in connecting an unpredictable number of computers of different and unknown decent in such a way that they can exchange meaningful information in order to fulfil the overall purpose of the entire system. To ensure the security of the entire system, each individual computer within it must be secure. The computers available on the market today are not up to this challenge! Put simply, they cannot tell, whether a communication request from another computer is a meaningful instruction or a hacking attack loaded with malware.
The weakness in these systems exists in the hardware of the computers. Practically all commonly available specimen of these hardware components are based on an architecture that has existed for about eight decades.
A new hardware architecture, which cannot execute planted malware, could remedy these issues. The technology advertised here achieves this. It doesn’t just prevent malware from being executed but also contains further safety measures such as the clean separation of networks with different access criteria – this will also be required for M2M communication.
This hardware architecture is patented and succeeded in the hardware category of competition „INNOVATION PRIZE – IT 2015“. IT security „Made in Germany“.
August 2015