EasyManua.ls Logo

janitza GridVis Collector - Secure Data Communication

janitza GridVis Collector
116 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
72
GridVis
®
Collector www.janitza.de www.janitza.de GridVis
®
Collector
6. 6 Secure data communication
Public or private networks require authentication and
encrypted communication. Starting with firmware
version 2.0.0 the GridVis
®
Collector fulfils this require-
ment with an additional security plug-in. The authenti-
cation and the communication itself are 1024-bit RSA
encrypted.
Authentication on the GridVis software
(PC/Server)
An RSA key pair is generated via the security plug-in of
the GridVis software. The GridVis
®
Collector receives
a private RSA key; the matching public RSA key is
contained in the GridVis software. The RSA key has an
encryption strength of 1024 bits. The RSA key pairs
are generated by a function developed by JAVA for this
purpose (java.security.KeyPairGenerator).
Encryption of data transmission
An RSA key pair is also generated here via the secu-
rity plug-in of the GridVis software. In this case, the
GridVis
®
Collector receives the public RSA key and the
GridVis software receives the private RSA key.
Functional description
An RSA key pair must be generated for each GridVis
®
Collector. The respective private RSA key is stored on
the GridVis
®
Collector, the public RSA key is assigned
to the PC/server running the GridVis software.
When logging on to the GridVis software, an individual
string for the GridVis
®
Collector is encrypted with the
private RSA key of the GridVis
®
Collector and is verified
with the public key on the server.
If the decryption is successful and the string is assig-
ned to the respective GridVis
®
Collector, communica-
tion is enabled. The key strength is 1024 bits.
Communication with certain GridVis
®
collectors can be
blocked by the administrator from the PC/server run-
ning the GridVis software. After that, even the administ-
rator can no longer log on with a valid RSA key.

Table of Contents