M2M-Communication –

From one Machine to Another

But what exactly are the machines doing?

They're not talking since such communication has to be non-verbal by default.

They're not having a conversation since they will hardly be chatting about films or music.

Making contact fits better and seems to hit the target dead-centre.

Systems of machines working together have been around for a while now. In these – let's call them "classic systems" – an integrator has determined which components work together and how.

In M2M communication, this previously determined order will not exist anymore. In a way, the machines themselves will decide when to make contact with another machine to exchange information.

Actually, "machine" is not the right term – or at least not if you go with the commonly accepted definition. The "machines" here concerned, are computers, either individual ones or ones that have already been connected into clusters. Each of them consists of software-running hardware.

The challenge lies in connecting an unpredictable number of computers of different and unknown makes in such a way that they can exchange meaningful information in order to fulfil the overall purpose of the entire system. To ensure the security of the entire system, each individual computer within it must be secure. The computers available on the market today are not up to this challenge! Put simply, they cannot tell whether a communication from another computer is a meaningful instruction or a hacking attack loaded with malware.

The weakness in these systems exists in the hardware of the processors. Practically all standard makes of these hardware components are based on an architecture that has existed for around eighty years.

A new hardware architecture, which cannot execute planted malware, could remedy these issues. The technology advertised here achieves this. It doesn't just prevent malware from being executed but also contains further safety measures such as the clean (without overlap) separation of networks with different access criteria – this will also be required for M2M communication.

 This hardware architecture is patented and won first prize in the "Hardware" category at the competition "INNOVATION PRIZE – IT 2015".

IT security "Made in Germany" - further information available from friedhelm.becker2@t-online.de.