Digital Data Protection

The fact that we can order today and tomorrow receive the goods or pay by touching a small display requires complete data protection of the entire basic information processing workflow. Only digital certificates can guarantee that all information remains confidential, and that services are used only by authorized persons.

Moreover, in “smart” cities, “smart homes” or in an industrial environment 4.0 people communicate not only with companies, but also with cars, machines with cars, raw materials from the warehouse, or even with a package with a truck that delivers it to our the doorstep. brings. In the latter case, this ensures, for example, that the cargo area still offers space – and at the same time automatically optimizes the route.

Thus, the protection of digital data, devices and things becomes a critical factor in the continuously digitized value chain. Using secure authentication, you can clearly assign and localize the various stages of the process, for example, in logistics or in production. This includes not only specific things and people, but also all significant objects.

An entity is any object specifically described: a car, engine block, a piece of crude steel, as well as, for example, patents, websites, software or data packets. Each of these things must have an individual identity, so that there is no confusion, theft, espionage or sabotage.

For example, if a fake and therefore mostly subordinate component overcomes identity verification, this could jeopardize all subsequent steps in the process. Creating a structure that creates and uses secure digital identifiers is far from trivial. This has already been demonstrated by the large number of affected sites that require various security measures. In addition, it is important to balance the potential security risk with the cost and usability. After all, the processes themselves should not be slowed down.

Therefore, today various methods of protecting digital data are used. It all starts with a simple barcode sticker or RFID chip. However, the use of authentication chips with support for cryptography, the so-called hardware security modules (HMS), is much more protected from unauthorized access. Now they are accessible even for humans: the Swedish startup Epicenter Routine offers its employees to sow a chip the size of rice grains.

Chips work like identification cards that are already common in many companies – just under the skin. In a big way, you can open the doors, control the printer and pay for espresso in the cafeteria. We can order and receive goods or pay by touching the display. This requires data protection of the entire information processing workflow.

Advantage: never forget a card.

Disadvantage: full control over paths, interruptions and activities. For many horrors, the idea is in the engine block, but only this will be necessary and desirable.

Another reliable way of identification is to use a chain of blocks, a kind of ubiquitous digital land registry for legal entities. Since it is accessible to all parties, and deviations are reported immediately, the blockchain is used today as evidence of a fake. Currently, there are a large number of procedures on the market. They are used not only for specific sectors, but also for specific companies. Usually, even within an operation, there are different methods for different applications.

It is obvious that verification of identification casts doubt on one of the key advantages of the approach: cross-country, corporate and interprocess interaction in the entire work process of a product or service. This can only be successful based on common standards and norms.

Refusal of card systems! A series of data leaks with serious consequences convincingly proved that complete protection of digital data is impossible: “At some point, we always have a server that is inevitably open to a world that becomes a goal. All digitized estimates and results, notes published on the Internet, organize the massive accumulation of digital data on people with different risks.