More stable power grids and quicker accident care: When used properly, digital data may be of high benefit.
However, electronic processing also facilitates data abuse. For this reason, Karlsruhe Institute of Technology (KIT) and the FZI Research Center for Information Technology develop holistic approaches to enhancing intrinsic security. Latest concepts will be presented at the CeBIT next week (hall 9, booth D13): Cameras Compliant with Data Protection Legislation/ Privacy-respecting Smart Meters/ Simultaneous Translator/ Safe without Emergency Button/ Software Protection for Industry 4.0/ Model-based Security Engineering
NurseEye: Digital Fall Detection in Compliance with Data Protection Legislation
It happens quickly: A patient at the hospital or nursing home falls on the corridor, no help is in sight. In such cases, the “NurseEye” video monitoring system might help. The system makes recordings of outdoor areas, corridors, or staircases and evaluates the images. If a fall is detected, NurseEye automatically issues an alarm to the nearest medical staff member, who then looks at the situation on the smartphone, communicates with the patient via the video system, and takes the correct measures. During normal operation, data protection is ensured: Only those images are stored, on which the software detects a fall. All other video data are deleted immediately. NurseEye was developed at the Competence Center for Applied Security Technology (KASTEL) by the Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation (IOSB) and KIT. The prototype will be presented at CeBIT.
Privacy-respecting Smart Meters
Smart meters supply information about electricity consumption in a quick and detailed manner. These data are required to secure electricity supply in decentralized power grids. However, they might also disclose the everyday life of the electricity consumer. By means of special communication protocols designed by KIT, the advantages of smart metering can be used while maintaining privacy. Before they are sent, the measured data are cooperatively concealed in a self-organized manner using randomly generated masking data, and they are summarized over several households. The grid operator can no longer draw any conclusions with respect to the original household data. But the total consumption of the group of consumers needed for grid control can be derived. The new communication concept can be implemented in a simple peer-to-peer mechanism with a small computation and cost expenditure only. No additional infrastructure is needed. At the CeBIT, privacy-respecting smart metering will be illustrated by a large-format demonstrator.
Automatic Simultaneous Translation
Language barriers often prevent free exchange of information. Spoken contents in particular, such as lectures, speeches, or internet videos, require a minimum knowledge of the respective foreign language. At KIT, the first automatic computer-based simultaneous translation service worldwide has been applied in selected lectures for two years now. The lecture translator automatically records the words spoken by the lecturer, transcribes the text into a written version, and translates it into English in real time. Students can follow the lecture via their PC or mobile phone. Due to its grammar, German has been considered a big challenge for a long time. The prototype system developed by KIT masters this challenge reliably now and can be operated regularly during the lecture. At the KIT booth (hall 9, booth D13), the lecture translator will be presented live during the whole CeBIT week. In addition, other new technologies for oral and text translations will be presented by the KIT-coordinated EU project EU-BRIDGE on March 17, 2015, at the Convention Center (rooms 108 – 110). (Demo sessions at 11, 13, and 15 hrs).
KASTEL: Research and Higher Education Relating to IT Security
The Competence Center for Applied Security Technology (KASTEL) at KIT pools activities in the areas of computer science, economics, and law for the joint development of secure IT applications. KASTEL cooperates with industry for the joint development of IT products with reliable and reproducible security guarantees. An example is the software security method Blurry Box. It was recently granted the German IT Security Prize. KASTEL and the KIT Department of Informatics offer students the opportunity to pass a comprehensive studies program and to specialize in IT security. This qualification is comparable to a specialized master’s degree and opens up interesting perspectives on the labor market. At the CeBIT, contact partners will be available to answer questions of industry partners and students.
easierLife: Safe at Home without Emergency Button
An assistance system that is not only easy to install and to operate, but also brings certainty that older relatives and friends are doing well. With this objective, four young scientists developed the easierLife system. The sensors replacing the conventional emergency button have already been tested successfully at about 100 households by the FZI Research Center for Information Technology and its partners in the healthcare sector. With easierLife, the four researchers involved started their own business.
The wireless sensors of the easierLife system detect movements and habits at home. If something is wrong, they automatically issue a message or an emergency call. With this information, relatives and nursing staff can prevent critical situations. The persons receiving the information and the type of information authorized persons are to see can be adjusted in detail. The data are protected against unauthorized read-out by encoding using the SSL standard applied in online banking and access protection.
Software Security for Industry Automation: Measures against Counterfeiting of Merchandise and Sabotage
Industry 4.0 among others means the combination of robotics and software control of production systems. For this, additional security measures are required. Enhanced use of IT and the higher degree of networking make systems more susceptible to manipulation. In addition, the intellectual property contained in the systems has to be protected.
The CeBIT demonstrator will illustrate security of a robot control system. A manipulation-proof USB dongle supplies the cryptographic mechanisms needed for the security method. The protected control only works together with the dongle. If the dongle is lacking, the software is useless and the complete system as well as all components involved in the process are deactivated. Attackers cannot copy the software or analyze its internal functioning. Manipulations and sabotage are made more difficult.
Model-based Security Engineering
Security-critical systems and infrastructures are increasingly operated in open, worldwide networks and in connection with the internet. However, methodological security development support has not yet been established for the early concept phases in particular. At the CeBIT, a scientific prototype for support relating to structured security development will be presented. By means of the model-based approach, various requirements and framework conditions, standards, system architectures, and attack scenarios can be considered. This makes the development process transparent and reproducible. Solution alternatives can be analyzed and evaluated from various perspectives. Graphics and the required documentations are supported directly by the model. The model-based approach is aimed at enhancing efficiency and quality, managing complexity, identifying weaknesses and difficulties at an early stage, and ensuring a high level of security.
Johanna Häs, FZI Corporate Communications and Media
Phone: +49 721 9654-904
Fax: +49 721 9654-905
Nils Ehrenberg, Public Relations and Marketing, Karlsruhe Institute of Technology
Phone: +49 721 608-48122
Fax: +49 721 608-45681
The FZI Research Center for Information Technology at the Karlsruhe Institute of Technology is a non-profit institution for applied research into information technology and technology transfer. Its task is to provide businesses and public institutions with the latest research findings in information technology. It also qualifies young scientists for their career in academics or business as well as self-employment. Led by professors from various departments, research teams at FZI interdisciplinarily develop and prototype concepts, software, hardware, and systems solutions for their clients.
Karlsruhe Institute of Technology (KIT) is a public corporation pursuing the tasks of a state university of Baden-Wuerttemberg and of a national research center of the Helmholtz Association. The KIT mission combines the three strategic lines of activity of research, higher education, and innovation. With about 9,400 employees and 24,500 students, KIT is one of the big institutions of research and higher education in natural sciences and engineering in Europe.
The photo of printing quality may be downloaded under http://www.kit.edu or requested by mail to email@example.com or phone +49 721 608-4 7414. The photo may be used in the context given above exclusively.
Johanna Häs | idw - Informationsdienst Wissenschaft
AchemAsia 2019 will take place in Shanghai
15.06.2018 | DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V.
Insects supply chitin as a raw material for the textile industry
05.06.2018 | Fraunhofer-Institut für Grenzflächen- und Bioverfahrenstechnik IGB
A new manufacturing technique uses a process similar to newspaper printing to form smoother and more flexible metals for making ultrafast electronic devices.
The low-cost process, developed by Purdue University researchers, combines tools already used in industry for manufacturing metals on a large scale, but uses...
For the first time ever, scientists have determined the cosmic origin of highest-energy neutrinos. A research group led by IceCube scientist Elisa Resconi, spokesperson of the Collaborative Research Center SFB1258 at the Technical University of Munich (TUM), provides an important piece of evidence that the particles detected by the IceCube neutrino telescope at the South Pole originate from a galaxy four billion light-years away from Earth.
To rule out other origins with certainty, the team led by neutrino physicist Elisa Resconi from the Technical University of Munich and multi-wavelength...
For the first time a team of researchers have discovered two different phases of magnetic skyrmions in a single material. Physicists of the Technical Universities of Munich and Dresden and the University of Cologne can now better study and understand the properties of these magnetic structures, which are important for both basic research and applications.
Whirlpools are an everyday experience in a bath tub: When the water is drained a circular vortex is formed. Typically, such whirls are rather stable. Similar...
Physicists working with Roland Wester at the University of Innsbruck have investigated if and how chemical reactions can be influenced by targeted vibrational excitation of the reactants. They were able to demonstrate that excitation with a laser beam does not affect the efficiency of a chemical exchange reaction and that the excited molecular group acts only as a spectator in the reaction.
A frequently used reaction in organic chemistry is nucleophilic substitution. It plays, for example, an important role in in the synthesis of new chemical...
Optical spectroscopy allows investigating the energy structure and dynamic properties of complex quantum systems. Researchers from the University of Würzburg present two new approaches of coherent two-dimensional spectroscopy.
"Put an excitation into the system and observe how it evolves." According to physicist Professor Tobias Brixner, this is the credo of optical spectroscopy....
13.07.2018 | Event News
12.07.2018 | Event News
03.07.2018 | Event News
20.07.2018 | Power and Electrical Engineering
20.07.2018 | Information Technology
20.07.2018 | Materials Sciences