EP2360647B1 - Method for recording vehicles passing through - Google Patents

Method for recording vehicles passing through Download PDF

Info

Publication number
EP2360647B1
EP2360647B1 EP10450005A EP10450005A EP2360647B1 EP 2360647 B1 EP2360647 B1 EP 2360647B1 EP 10450005 A EP10450005 A EP 10450005A EP 10450005 A EP10450005 A EP 10450005A EP 2360647 B1 EP2360647 B1 EP 2360647B1
Authority
EP
European Patent Office
Prior art keywords
entry
identifier
data
exit
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP10450005A
Other languages
German (de)
French (fr)
Other versions
EP2360647A1 (en
Inventor
Oliver Nagy
Alexander Abl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kapsch TrafficCom AG
Original Assignee
Kapsch TrafficCom AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to SI201030047T priority Critical patent/SI2360647T1/en
Priority to DK10450005.3T priority patent/DK2360647T3/en
Priority to EP10450005A priority patent/EP2360647B1/en
Priority to ES10450005T priority patent/ES2387753T3/en
Priority to PL10450005T priority patent/PL2360647T3/en
Application filed by Kapsch TrafficCom AG filed Critical Kapsch TrafficCom AG
Priority to PT10450005T priority patent/PT2360647E/en
Priority to AT10450005T priority patent/ATE557374T1/en
Publication of EP2360647A1 publication Critical patent/EP2360647A1/en
Application granted granted Critical
Publication of EP2360647B1 publication Critical patent/EP2360647B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/02Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/052Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
    • G08G1/054Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed photographing overspeeding vehicles

Definitions

  • the present invention relates to a method for detecting transits of vehicles with unique identifiers from an entrance to an exit according to the preamble of claim 1.
  • Certain traffic surveillance tasks require two-time detection of one and the same vehicle at two different points, generally referred to herein as "entry” and “exit” of the section of road traveled by the vehicle.
  • entities and “exit” of the section of road traveled by the vehicle.
  • detection Control in which the entry and exit times of the vehicle are measured and used to determine the speed
  • video toll in which the vehicle is identified at the entrance and exit in order to charge the route section as a function of the route
  • City toll in which the entrance and exit at city limits is controlled, e.g. the length of stay in the city center to be time-dependent.
  • the traffic monitoring systems used for this purpose must meet strict data protection requirements in order to rule out as far as possible the impermissible creation of movement profiles of road users.
  • the statutory regulations in Austria and Germany for the implementation of Section Control require that a permanent identification of a vehicle and its passage data may only be made in the event of a speeding violation.
  • This key can be destroyed immediately after encryption in the entry station, because it is physically "transported” from the entrance to the exit, in the form of the vehicle itself, and thus available for decryption there or in downstream evaluation stations.
  • the known systems can not always eliminate the danger of data misuse and data protection concerns with certainty.
  • the invention has for its object to provide a method for detecting the passage of vehicles between an entrance and an exit, which offers the highest possible data protection for the sensitive passage data.
  • the entry data are provided with the entry time of the vehicle and deleted from the amount of entry data provided as soon as the current time exceeds a time window beginning with the entry time.
  • the invention has the decisive advantage that decryption of the entry data always takes place only in the event of an offense: the time window is selected such that it corresponds to the minimum permissible travel time for the route section, ie when a vehicle is traveling at the maximum permissible speed.
  • the time window is selected such that it corresponds to the minimum permissible travel time for the route section, ie when a vehicle is traveling at the maximum permissible speed.
  • a detected exit identifier is also preferably rejected if no entry data that can be decrypted thereby can be determined in the amount of provided entry data, so that no "unapproachable" exit identifications accumulate at the exit.
  • the data encrypted to the entry data may be of the predetermined type in the simplest case, i. a requirement that is also known at the exit and thus allows the recognition of a successful decryption.
  • the default may be any known value or preferably includes an identification of the entrance, so that it can be determined at the exit from which entrance the vehicle comes.
  • the data mentioned can be related to the vehicle identification, because it is also known - in the form of exit detection - at the exit.
  • the data mentioned include the entry recognition itself and / or an entry image of the vehicle from which the entry identification can be derived.
  • Such an entry image can also be retrieved when decrypting the entry data and archived together with an exit image and the identification of the vehicle for evidence purposes.
  • the detected exit identifiers may be "tried" on all existing encrypted entry data "until the key matches".
  • the encrypted entry data is provided under a hash value calculated from the entry identifier, and a hash value is calculated from the exit identifier in the same manner. by means of which the encrypted entry data provided under this hash value are determined. In this way, the encrypted entry data are respectively identified by said hash value, so that during decryption the exit identification no longer needs to be tried on all entry data, but the entry data identified by the hash value can be accessed immediately.
  • a "hash value” is understood to mean a virtually irreversible n: 1 mapping function, ie a function that is only (extremely) ambiguously reversible, so that it is virtually impossible to deduce the initial value from the knowledge of the hash value.
  • hashing functions are the checksum function, the modulo function, etc.
  • the latter variant of the invention also allows an alternative embodiment of the section control: For each hash value, the entry and exit times of the vehicle are also recorded and the encrypted entry data are only decrypted if the exit time associated with the hash value is within a time beginning with the associated entry time Time window is located.
  • This embodiment is also suitable for a time-delayed or offline evaluation of the entry data objects, because instead of the current time, the exit time that can be assigned by means of the hash value can be taken into account.
  • its speed can also be determined from the entry and exit times of a vehicle and the route length between entry and exit.
  • identifier of the vehicle any feature of the vehicle suitable for identification may be used, e.g. a remote-readable chassis number, a radio identifier of a carried RFID transponder chip, etc.
  • the identifier is simply the vehicle identifier and is detected by optical character recognition (OCR) in entry and exit images of the vehicle.
  • OCR optical character recognition
  • the same entry and exit images can be used for this purpose, which are also archived for evidence, so that at the entrance and exit only a single image acquisition is required.
  • the said encrypting and providing the entry data takes place in an access station, said detecting the exit detection in an exit station, and said decrypting the entry data and validating the decrypted data in a separate evaluation station.
  • both the entry and the exit station can be sealed in the manner of black boxes, for example, and can be privacy-certified; because they process only partial information, they are inadmissible with regard to the risk Creation of movement profiles harmless.
  • the evaluation station can also be constructed so that it is completely self-sufficient and can therefore be certified separately.
  • the functions of the evaluation station can also be completely or partially integrated into the exit station.
  • the entry identifier used as the key is supplemented with further keys, which are provided separately for decryption.
  • Such other keys may e.g. be a timestamp, a temporary key, an identification of the entry station or a public key of the exit station, whereby the data security on the transmission paths can be further increased.
  • Fig. 1a shows a vehicle 1, which passes through a section 2 of length L from an entrance 3 to an exit 4.
  • the vehicle 1 has a unique identifier 5, for example in the form of its license plate number (LPN), in the example shown "(A) W-123".
  • LPN license plate number
  • the identifier 5 could alternatively also be formed by other features of the vehicle 1, eg a machine-readable chassis number, a remote-readable radio identifier, eg RFID identifier, etc.
  • the identifier 5 of the vehicle 1 is first detected as a so-called. Entrance identifier 6 ("License Plate Number Start", LPS).
  • the detection can be done, for example, by remote reading or preferably by optical character recognition (OCR) of the identifier 5 take place in an image recording PIC of the vehicle 1 at the entrance 3 ("entrance picture").
  • OCR optical character recognition
  • data 7 for encrypted entry data 8 (also referred to below as the "entry data object” or “encrypted section control object") are now encrypted.
  • the data 7 can be of various types: In the simplest case, a specification of any known value DAT is sufficient for this purpose, which can be retrieved during the subsequent decryption and thus indicates the success of the decryption ("the key fits"). However, the default can also be or include an identification GID of the entrance 3 ("gate ID"). Alternatively or additionally, the data 7 can be related to the identification 5 of the vehicle 1. In the latter case, the data 7 may be e.g. the entrance recognition 6 itself or the entrance image PIC, from which e.g. can be determined by means of OCR the entry identifier 6 from the vehicle registration number LPN.
  • the entry identifier 6, i. the identifier 5 of the vehicle 1 detected at the entrance 3 is thus used itself as the key 9 for the encryption.
  • any encryption method known in the art may be used.
  • the entry identifier 6 or the key 9 formed therefrom can be destroyed.
  • the Fig. 1b - 1d show variants for the generation of the key 9 from the entry identifier 6.
  • the key 9 is formed from modifications, repetitions or functions of the entry detection 6 in order to increase the key length.
  • the key 9 is formed from the entry identifier 6 supplemented with further keys, in order to increase respectively the length of the key 9 and the data security.
  • These other keys can be eg a timestamp TS ("Timestamp_StartGate”), an (arbitrary) temporary one Key 11 of the entry (“StartGate_tempID”), an entry ID 3 (“StartGate_ID”), or a public key 13 of exit 4 ("PublicKey_EndGate").
  • the encrypted entry data 8 can optionally be provided with a hash value h1 or be provided below it for the further method steps.
  • the hash value h1 is formed in a - as discussed in the beginning - practically irreversible way from the entrance ID 6 and facilitates the identification of the encrypted entry data 8 in the subsequent decryption and evaluation, as will be explained later.
  • the license plate 5 of the vehicle 1 is detected as so-called. Ausfahrtskennung 15.
  • the detection can be done again in any manner, e.g. by remote reading or preferably by optical character recognition of the vehicle registration number 5 in an image recording of the vehicle 1 at the exit 4 ("exit image").
  • the exit identifier 15 can be used to decrypt the encrypted entry data 8.
  • the exit ID 15 can be added in a corresponding manner to the key 9, either by appropriate function mapping ( Fig. 1b ), Supplementing with a time stamp TS obtained from the entry data 8, a temporary key 11 received from the entrance 3 on a separate transmission path 16, an identification of the entrance 3, a private key ("PrivateKey_EndGate”) of the exit 4 , etc.
  • the mentioned hash values h1 are used, under which the encrypted entry data 8 are provided.
  • a hash value h2 is formed from the exit identifier 15-in the same way as the hash value h1 from the entry identifiers 6.
  • the encrypted entry data 8 provided under the same hash value h1 can be determined immediately without any attempt.
  • the data 7 By validating the data 7 e.g. if they contain a specification DAT or GID compared to the known value DAT or a valid gate ID or if they contain the entry identifier 6 (directly derivable from the entry image PIC) vis-a-vis the exit identification 15, upon successful validation for a passage of a vehicle 1 closed with the identifier 5 from the entrance 3 to exit 4.
  • the dwell time of the vehicle 1 on the section 2 and - knowing the length L of the section 2 - also the speed of the vehicle 1 in Section 2 are determined ("Section Control").
  • the entry and exit times TS, TE are also used for the control of the procedure, in the following manner.
  • the entry data 8, ie each entry data object 8, is / are respectively provided with the entry time TS of the vehicle 1. Once an entry data object 8 exceeds a predetermined age, ie the current time greater is as a beginning with the entry time TS time window .DELTA.T, the relevant entry data object 8 is deleted from the set of all provided entry data objects 8.
  • An entry data object 8 which is too old, that is to say the time window ⁇ T, is therefore entry data of a vehicle 1 which complies with the regulations and does not exceed the permissible maximum speed, so that decryption is not required no identifiable traces in the system.
  • Exit identifiers 15, to which no entry data 8 that can be decrypted thereby can be found in the set of all provided entry data (objects) 8, can also be discarded.
  • the hash values can also be utilized for this time comparison.
  • the entry data 8 In the assignment and determination of the entry data 8 on the basis of the comparison of the hash values h1 and h2, only those entry data 8 are considered and subsequently decoded whose entry and exit times TS, TE lie within the time window ⁇ T.
  • the age of the entry data objects 8 can also be changed at a later time, e.g. offline or in a separate evaluation station.
  • the actual exit time TE is after the allowable minimum arrival time TEC, ie outside the time window ⁇ T, then it is a compliant vehicle not exceeding the maximum permissible speed TEC and the encrypted entry data 8 and exit detection 15 are immediately cleared.
  • Detecting the entry identifier 6, encrypting the data 7 to the encrypted entry data 8 and forming the hash value h1 is preferably performed in a station at the entrance 3 ("entry station”). Detecting the exit identifier 15 and forming the hash value h2 is preferably performed in a station at exit 4 ("exit station").
  • Determining the encrypted entry data 8 suitable for an exit identifier 15 by means of a trial or by using the hash values h1 h2, decrypting the entry data 8 and evaluating the data 7, eg validating against the specification DAT / GID or the exit identifier 15, becomes preferably in a separate from both the entry station 3 and the exit station 4 evaluation station 20 ( Fig. 2 ) carried out.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Traffic Control Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Recording Measured Values (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The method involves detecting an identifier (5) of a vehicle (1) at a gateway (3) as gateway identifier (6). The specified or vehicle identification data (7) is encoded with the help of the gateway identifier to encrypted data (8). The identifier of a vehicle is detected at an exit (4) as exit identifier (15).

Description

Die vorliegende Erfindung betrifft ein Verfahren zur Erfassung von Durchfahrten von Fahrzeugen mit eindeutigen Kennungen von einer Einfahrt zu einer Ausfahrt gemäß dem Oberbegriff des Anspruchs 1.The present invention relates to a method for detecting transits of vehicles with unique identifiers from an entrance to an exit according to the preamble of claim 1.

Ein derartiges Verfahren ist aus der DE 10 2007 059 346 A1 bekannt.Such a method is known from DE 10 2007 059 346 A1 known.

Bestimmte Verkehrsüberwachungsaufgaben erfordern eine zweimalige Erfassung ein und desselben Fahrzeugs an zwei verschiedenen Punkten, hier allgemein als "Einfahrt" und "Ausfahrt" des vom Fahrzeug durchfahrenen Streckenabschnitts bezeichnet. Beispiele hiefür sind die sog. "Section Control", bei welcher die Ein- und Ausfahrtszeiten des Fahrzeugs gemessen und zur Geschwindigkeitsbestimmung herangezogen werden; die sog. "Video-Maut", bei der das Fahrzeug an der Ein- und Ausfahrt identifiziert wird, um den Streckenabschnitt wegabhängig zu vergebühren; oder die sog. "City-Maut", bei welcher die Ein- und Ausfahrt an Stadtgrenzen kontrolliert wird, um z.B. die Verweildauer in der Innenstadt zeitabhängig zu vergebühren.Certain traffic surveillance tasks require two-time detection of one and the same vehicle at two different points, generally referred to herein as "entry" and "exit" of the section of road traveled by the vehicle. Examples of this are the so-called "Section Control", in which the entry and exit times of the vehicle are measured and used to determine the speed; the so-called "video toll", in which the vehicle is identified at the entrance and exit in order to charge the route section as a function of the route; or the so-called "City toll", in which the entrance and exit at city limits is controlled, e.g. the length of stay in the city center to be time-dependent.

Die dazu eingesetzten Verkehrsüberwachungssysteme müssen strengen Datenschutzauflagen genügen, um eine unzulässige Erstellung von Bewegungsprofilen der Verkehrsteilnehmer möglichst auszuschließen. Beispielsweise erfordern die gesetzlichen Regelungen in Österreich und Deutschland für die Durchführung der Section Control, daß eine dauerhafte Identifizierung eines Fahrzeugs und seiner Durchfahrtsdaten nur im Falle einer Geschwindigkeitsübertretung erfolgen darf.The traffic monitoring systems used for this purpose must meet strict data protection requirements in order to rule out as far as possible the impermissible creation of movement profiles of road users. For example, the statutory regulations in Austria and Germany for the implementation of Section Control require that a permanent identification of a vehicle and its passage data may only be made in the event of a speeding violation.

Bislang bekannte Systeme versuchen diese Datenschutzanforderungen zu erfüllen, indem nach einer Identifizierung des Fahrzeugs an der Ein- und Ausfahrt und einer darauf basierenden Geschwindigkeitsmessung dann, wenn kein Geschwindigkeitsdelikt vorliegt, alle aufgezeichneten Daten innerhalb einer garantierten Zeit, z.B. 8 Minuten, spurlos gelöscht werden (siehe F. Albrecht, "Section Control in Deutschland", Straßenverkehrsrecht, Zeitschrift für die Praxis des Verkehrsjuristen, 2009). Diese Vorgehensweise ist weiterhin mit Unsicherheiten verbunden, weil alle Durchfahrtsdaten zu einem bestimmten Zeitpunkt in den Einfahrts- und Ausfahrtstationen in unverschlüsselter Form vorliegen, unabhängig davon, ob es sich um einen Delikatfall handelt oder nicht. Bei dem aus der DE 10 2007 059 436 A1 bekannten Verfahren wird die bei der Einfahrt des Fahrzeugs erfaßte Fahrzeugkennung, in der Regel das Fahrzeugkennzeichen, selbst als Schlüssel zur Verschlüsselung der Einfahrtsdaten verwendet. Dieser Schlüssel kann sofort nach der Verschlüsselung in der Einfahrtsstation vernichtet werden, weil er physisch, in Form des Fahrzeugs selbst, von der Einfahrt zur Ausfahrt "transportiert" und damit dort oder in nachgeordneten Auswertestationen zur Entschlüsselung zur Verfügung steht. Die bekannten Systeme können die Gefahr eines Datenmißbrauchs und Datenschutzbedenken allerdings nicht in jedem Fall mit Sicherheit ausräumen.Previously known systems attempt to meet these data protection requirements by, after identification of the vehicle at the entrance and exit and speed measurement based thereon, if there is no speed penalty, all recorded data within a guaranteed time, eg 8 minutes, be deleted without a trace (see F. Albrecht, "Section Control in Germany", Road Traffic Law, Journal for the practice of traffic lawyer, 2009). This procedure is still associated with uncertainties because all transit data at a certain time in the entry and exit stations are available in unencrypted form, regardless of whether it is a Delikatfall or not. In the from the DE 10 2007 059 436 A1 known method, the detected at the entrance of the vehicle vehicle identification, usually the vehicle license plate, itself used as a key to encrypt the entry data. This key can be destroyed immediately after encryption in the entry station, because it is physically "transported" from the entrance to the exit, in the form of the vehicle itself, and thus available for decryption there or in downstream evaluation stations. The known systems, however, can not always eliminate the danger of data misuse and data protection concerns with certainty.

Die Erfindung setzt sich zum Ziel, ein Verfahren zur Erfassung der Durchfahrten von Fahrzeugen zwischen einer Einfahrt und einer Ausfahrt zu schaffen, welches höchstmöglichen Datenschutz für die sensiblen Durchfahrtsdaten bietet.The invention has for its object to provide a method for detecting the passage of vehicles between an entrance and an exit, which offers the highest possible data protection for the sensitive passage data.

Dieses Ziel wird mit einem Verfahren der einleitend genannten Art erreicht, das sich dadurch auszeichnet, daß die Einfahrtsdaten mit der Einfahrtszeit des Fahrzeugs versehen und aus der Menge der bereitgestellten Einfahrtsdaten gelöscht werden, sobald die aktuelle Zeit ein mit der Einfahrtszeit beginnendes Zeitfenster überschreitet. Die Erfindung hat den entscheidenden Vorteil, daß eine Entschlüsselung der Einfahrtsdaten stets nur im Deliktfall erfolgt: Das Zeitfenster wird so gewählt, daß es der minimalen zulässigen Fahrzeit für den Streckenabschnitt entspricht, d.h. wenn ein Fahrzeug mit der höchstzulässigen Geschwindigkeit fährt. Wenn somit das "Alter" eines Objekts verschlüsselter Einfahrtsdaten größer ist als das Zeitfenster, dann kann es sich nicht um eine Geschwindigkeitsüberschreitung (Delikt) handeln, und diese Einfahrtsdaten werden gelöscht (verworfen) und damit auch niemals entschlüsselt. Ein regelkonformes Fahrzeug hinterläßt somit keine identifizierbaren Spuren im System, was höchste Datensicherheit gewährleistet.This object is achieved by a method of the type mentioned in the introduction, which is characterized in that the entry data are provided with the entry time of the vehicle and deleted from the amount of entry data provided as soon as the current time exceeds a time window beginning with the entry time. The invention has the decisive advantage that decryption of the entry data always takes place only in the event of an offense: the time window is selected such that it corresponds to the minimum permissible travel time for the route section, ie when a vehicle is traveling at the maximum permissible speed. Thus, if the "age" of an encrypted entry data object is greater than the time window, then it can not be an overspeed, and that entry data is deleted (discarded) and thus never decrypted. A compliant vehicle thus leaves no identifiable traces in the system, which ensures the highest data security.

Bevorzugt wird bei der Erfindung auch eine erfaßte Ausfahrtskennung verworfen, wenn sich dazu keine damit entschlüsselbaren Einfahrtsdaten in der Menge von bereitgestellten Einfahrtsdaten ermitteln lassen, so daß sich an der Ausfahrt keine "unzuordenbaren" Ausfahrtskennungen anhäufen.In the invention, a detected exit identifier is also preferably rejected if no entry data that can be decrypted thereby can be determined in the amount of provided entry data, so that no "unapproachable" exit identifications accumulate at the exit.

Die Daten, welche zu den Einfahrtsdaten verschlüsselt werden, können im einfachsten Fall vorgegebener Art sein, d.h. eine Vorgabe, die auch bei der Ausfahrt bekannt ist und damit das Erkennen einer erfolgreichen Entschlüsselung gestattet. Die Vorgabe kann ein beliebiger bekannter Wert sein oder umfaßt bevorzugt eine Identifikation der Einfahrt, so daß an der Ausfahrt auch festgestellt werden kann, von welcher Einfahrt das Fahrzeug kommt.The data encrypted to the entry data may be of the predetermined type in the simplest case, i. a requirement that is also known at the exit and thus allows the recognition of a successful decryption. The default may be any known value or preferably includes an identification of the entrance, so that it can be determined at the exit from which entrance the vehicle comes.

Alternativ oder zusätzlich können die genannten Daten auf die Fahrzeugkennung bezogen sein, weil diese ebenso - in Form der Ausfahrtskennung - an der Ausfahrt bekannt ist. In einer weiteren Ausführungsform der Erfindung umfassen daher die genannten Daten die Einfahrtskennung selbst und/oder ein Einfahrtsbild des Fahrzeugs, aus dem die Einfahrtskennung ableitbar ist.Alternatively or additionally, the data mentioned can be related to the vehicle identification, because it is also known - in the form of exit detection - at the exit. In a further embodiment of the invention, therefore, the data mentioned include the entry recognition itself and / or an entry image of the vehicle from which the entry identification can be derived.

Ein solches Einfahrtsbild kann auch beim Entschlüsseln der Einfahrtsdaten wiedergewonnen und zusammen mit einem Ausfahrtsbild und der Kennung des Fahrzeugs zu Beweiszwecken archiviert werden.Such an entry image can also be retrieved when decrypting the entry data and archived together with an exit image and the identification of the vehicle for evidence purposes.

In einer einfachen Ausführungsform der Erfindung können die erfaßten Ausfahrtskennungen an allen vorhandenen verschlüsselten Einfahrtsdaten "ausprobiert" werden, "bis der Schlüssel paßt".In a simple embodiment of the invention, the detected exit identifiers may be "tried" on all existing encrypted entry data "until the key matches".

In einer bevorzugten Ausführungsform der Erfindung werden die verschlüsselten Einfahrtsdaten unter einem aus der Einfahrtskennung berechneten Hashwert bereitgestellt und es wird aus der Ausfahrtskennung auf dieselbe Weise ein Hashwert berechnet, anhand dessen die unter diesem Hashwert bereitgestellten verschlüsselten Einfahrtsdaten ermittelt werden. Auf diese Weise sind die verschlüsselten Einfahrtsdaten jeweils durch den genannten Hashwert identifiziert, sodaß bei der Entschlüsselung die Ausfahrtskennung nicht mehr an allen Einfahrtsdaten durchprobiert werden muß, sondern sofort auf die durch den Hashwert identifizierten Einfahrtsdaten zugegriffen werden kann.In a preferred embodiment of the invention, the encrypted entry data is provided under a hash value calculated from the entry identifier, and a hash value is calculated from the exit identifier in the same manner. by means of which the encrypted entry data provided under this hash value are determined. In this way, the encrypted entry data are respectively identified by said hash value, so that during decryption the exit identification no longer needs to be tried on all entry data, but the entry data identified by the hash value can be accessed immediately.

Unter einem "Hashwert" wird in der vorliegenden Beschreibung eine praktisch unumkehrbare n:1-Abbildungsfunktion verstanden, d.h. eine Funktion, die nur (extrem) vieldeutig umkehrbar ist, sodaß aus der Kenntnis des Hashwerts praktisch nicht mehr auf den Ausgangswert geschlossen werden kann. Beispiele solcher Hashfunktionen sind die Quersummenfunktion, die Modulofunktion usw.In the present description, a "hash value" is understood to mean a virtually irreversible n: 1 mapping function, ie a function that is only (extremely) ambiguously reversible, so that it is virtually impossible to deduce the initial value from the knowledge of the hash value. Examples of such hashing functions are the checksum function, the modulo function, etc.

Letztgenannte Variante der Erfindung ermöglicht auch eine alternative Ausführung der Section Control: Dazu werden zu jedem Hashwert auch die Ein- bzw. Ausfahrtszeit des Fahrzeugs aufgezeichnet und die verschlüsselten Einfahrtsdaten werden nur dann entschlüsselt, wenn die zum Hashwert gehörige Ausfahrtszeit innerhalb eines mit der zugehörigen Einfahrtszeit beginnenden Zeitfensters liegt. Diese Ausführungsform eignet sich auch für eine zeitverzögerte bzw. Offline-Auswertung der Einfahrtsdaten-Objekte, weil anstelle der aktuellen Zeit die mittels des Hashwerts zuordenbare Ausfahrtszeit berücksichtigt werden kann.The latter variant of the invention also allows an alternative embodiment of the section control: For each hash value, the entry and exit times of the vehicle are also recorded and the encrypted entry data are only decrypted if the exit time associated with the hash value is within a time beginning with the associated entry time Time window is located. This embodiment is also suitable for a time-delayed or offline evaluation of the entry data objects, because instead of the current time, the exit time that can be assigned by means of the hash value can be taken into account.

Bevorzugt kann dabei aus der Einfahrts- und Ausfahrtszeit eines Fahrzeugs und der Streckenlänge zwischen Ein- und Ausfahrt auch gleich seine Geschwindigkeit ermittelt werden.Preferably, its speed can also be determined from the entry and exit times of a vehicle and the route length between entry and exit.

Als Kennung des Fahrzeugs kann jedes für eine Identifizierung geeignete Merkmal des Fahrzeugs verwendet werden, z.B. eine fernauslesbare Fahrgestellnummer, eine Funk-Kennung eines mitgeführten RFID-Transponderchips usw. Bevorzugt ist die Kennung einfach das Fahrzeugkennzeichen und wird durch optische Zeichenerkennung (optical character recognition, OCR) in Einfahrts- und Ausfahrtsbildern des Fahrzeugs erfaßt. Zweckmäßigerweise können dazu dieselben Einfahrts- und Ausfahrtsbilder verwendet werden, welche auch zu Beweiszwecken archiviert werden, sodaß an der Ein- und Ausfahrt jeweils nur eine einzige Bildaufnahme erforderlich ist.As identifier of the vehicle, any feature of the vehicle suitable for identification may be used, e.g. a remote-readable chassis number, a radio identifier of a carried RFID transponder chip, etc. Preferably, the identifier is simply the vehicle identifier and is detected by optical character recognition (OCR) in entry and exit images of the vehicle. Appropriately, the same entry and exit images can be used for this purpose, which are also archived for evidence, so that at the entrance and exit only a single image acquisition is required.

Gemäß einer weiteren bevorzugten Ausführungsform der Erfindung erfolgt das genannte Verschlüsseln und Bereitstellen der Einfahrtsdaten in einer Einfahrtsstation, das genannte Erfassen der Ausfahrtskennung in einer Ausfahrtsstation, und das genannte Entschlüsseln der Einfahrtsdaten und Validieren der entschlüsselten Daten in einer gesonderten Auswertestation. Dadurch können sowohl die Einfahrts- als auch die Ausfahrtsstation z.B. in der Art von Black Boxes versiegelt und datenschutzzertifiziert werden; da sie jeweils nur Teilinformationen verarbeiten, sind sie hinsichtlich der Gefahr einer unzulässigen Erstellung von Bewegungsprofilen unbedenklich. Die Auswertestation kann überdies so aufgebaut werden, daß sie völlig autark ist und damit gesondert zertifiziert werden kann.According to a further preferred embodiment of the invention, the said encrypting and providing the entry data takes place in an access station, said detecting the exit detection in an exit station, and said decrypting the entry data and validating the decrypted data in a separate evaluation station. As a result, both the entry and the exit station can be sealed in the manner of black boxes, for example, and can be privacy-certified; because they process only partial information, they are inadmissible with regard to the risk Creation of movement profiles harmless. The evaluation station can also be constructed so that it is completely self-sufficient and can therefore be certified separately.

Die Funktionen der Auswertestation können alternativ auch ganz oder teilweise in die Ausfahrtsstation integriert sein.Alternatively, the functions of the evaluation station can also be completely or partially integrated into the exit station.

In jedem Fall ist es besonders günstig, wenn beim Verschlüsseln der Einfahrtsdaten die als Schlüssel verwendete Einfahrtskennung mit weiteren Schlüsseln ergänzt wird, welche für das Entschlüsseln gesondert bereitgestellt werden. Solche weiteren Schlüssel können z.B. ein Zeitstempel, ein temporärer Schlüssel, eine Kennung der Einfahrtsstation oder ein öffentlicher Schlüssel der Ausfahrtsstation sein, wodurch die Datensicherheit auf den Übertragungswegen noch weiter erhöht werden kann.In any case, it is particularly advantageous if, when encrypting the entry data, the entry identifier used as the key is supplemented with further keys, which are provided separately for decryption. Such other keys may e.g. be a timestamp, a temporary key, an identification of the entry station or a public key of the exit station, whereby the data security on the transmission paths can be further increased.

Die Erfindung wird nachstehend anhand von in den beigeschlossenen Zeichnungen dargestellten Ausführungsbeispielen näher erläutert. In den Zeichnungen zeigen

  • die Fig. 1a - 1d verschiedene Ausführungsformen der am Verfahren der Erfindung beteiligten Komponenten in Blockdiagrammform; und
  • Fig. 2 eine Ausführungsform des Verfahrens der Erfindung in Flußdiagrammform.
The invention will be explained in more detail with reference to embodiments illustrated in the accompanying drawings. In the drawings show
  • the Fig. 1a - 1d various embodiments of the components involved in the method of the invention in block diagram form; and
  • Fig. 2 an embodiment of the method of the invention in flow chart form.

Fig. 1a zeigt ein Fahrzeug 1, das einen Streckenabschnitt 2 der Länge L von einer Einfahrt 3 bis zu einer Ausfahrt 4 durchfährt. Das Fahrzeug 1 besitzt eine eindeutige Kennung 5, beispielsweise in Form seines Fahrzeugkennzeichens ("License Plate Number", LPN), im gezeigten Beispiel "(A) W-123". Die Kennung 5 könnte alternativ auch durch andere Merkmale des Fahrzeugs 1 gebildet sein, z.B. eine maschinenlesbare Fahrgestellnummer, eine fernauslesbare Funkkennung, z.B. RFID-Kennung, usw. Fig. 1a shows a vehicle 1, which passes through a section 2 of length L from an entrance 3 to an exit 4. The vehicle 1 has a unique identifier 5, for example in the form of its license plate number (LPN), in the example shown "(A) W-123". The identifier 5 could alternatively also be formed by other features of the vehicle 1, eg a machine-readable chassis number, a remote-readable radio identifier, eg RFID identifier, etc.

An der Einfahrt 3 wird die Kennung 5 des Fahrzeugs 1 zunächst als sog. Einfahrtskennung 6 ("License Plate Number Start", LPS) erfaßt. Die Erfassung kann beispielsweise durch Fernauslesen oder bevorzugt durch optische Zeichenerkennung (OCR) der Kennung 5 in einer Bildaufnahme PIC des Fahrzeugs 1 bei der Einfahrt 3 ("Einfahrtsbild") erfolgen.At the entrance 3, the identifier 5 of the vehicle 1 is first detected as a so-called. Entrance identifier 6 ("License Plate Number Start", LPS). The detection can be done, for example, by remote reading or preferably by optical character recognition (OCR) of the identifier 5 take place in an image recording PIC of the vehicle 1 at the entrance 3 ("entrance picture").

Mit Hilfe ebendieser Einfahrtskennung 6 werden nun Daten 7 zu verschlüsselten Einfahrtsdaten 8 (im weiteren auch "Einfahrtsdaten-Objekt" bzw. "encrypted section control object" genannt) verschlüsselt. Die Daten 7 können dabei verschiedener Art sein: Im einfachsten Fall genügt hiefür eine Vorgabe beliebigen bekannten Werts DAT, welche bei der späteren Entschlüsselung wiedergewonnen werden kann und damit den Erfolg der Entschlüsselung ("der Schlüssel paßt") anzeigt. Die Vorgabe kann aber auch eine Identifikation GID der Einfahrt 3 ("Gate-ID") sein oder umfassen. Alternativ oder zusätzlich können die Daten 7 auf die Kennung 5 der Fahrzeugs 1 bezogen (zurückzuführen) sein. In letzterem Fall können die Daten 7 z.B. die Einfahrtskennung 6 selbst oder das Einfahrtsbild PIC enthalten, aus dem sich z.B. mittels OCR die Einfahrtskennung 6 aus dem Fahrzeugkennzeichen LPN ermitteln läßt.With the aid of this entry-detection code 6, data 7 for encrypted entry data 8 (also referred to below as the "entry data object" or "encrypted section control object") are now encrypted. The data 7 can be of various types: In the simplest case, a specification of any known value DAT is sufficient for this purpose, which can be retrieved during the subsequent decryption and thus indicates the success of the decryption ("the key fits"). However, the default can also be or include an identification GID of the entrance 3 ("gate ID"). Alternatively or additionally, the data 7 can be related to the identification 5 of the vehicle 1. In the latter case, the data 7 may be e.g. the entrance recognition 6 itself or the entrance image PIC, from which e.g. can be determined by means of OCR the entry identifier 6 from the vehicle registration number LPN.

Die Einfahrtskennung 6, d.h. die bei der Einfahrt 3 erfaßte Kennung 5 des Fahrzeugs 1, wird somit selbst als Schlüssel 9 für die Verschlüsselung verwendet. Für die Verschlüsselung kann jedes in der Technik bekannte Verschlüsselungsverfahren verwendet werden.The entry identifier 6, i. the identifier 5 of the vehicle 1 detected at the entrance 3 is thus used itself as the key 9 for the encryption. For encryption, any encryption method known in the art may be used.

Nach dem Verschlüsseln der Einfahrtsdaten 8 kann die Einfahrtskennung 6 bzw. der daraus gebildete Schlüssel 9 vernichtet werden.After encrypting the entry data 8, the entry identifier 6 or the key 9 formed therefrom can be destroyed.

Die Fig. 1b - 1d zeigen Varianten für die Generierung des Schlüssels 9 aus der Einfahrtskennung 6. Im Fall von Fig. 1b wird der Schlüssel 9 z.B. aus Abwandlungen, Wiederholungen oder Funktionen der Einfahrtskennung 6 gebildet, um die Schlüssellänge zu erhöhen.The Fig. 1b - 1d show variants for the generation of the key 9 from the entry identifier 6. In the case of Fig. 1b For example, the key 9 is formed from modifications, repetitions or functions of the entry detection 6 in order to increase the key length.

Bei den Varianten der Fig. 1c und 1d wird der Schlüssel 9 aus der mit weiteren Schlüsseln ergänzten Einfahrtskennung 6 gebildet, um jeweils die Länge des Schlüssels 9 und die Datensicherheit zu erhöhen. Diese weiteren Schlüssel können z.B. ein Zeitstempel TS ("Timestamp_StartGate"), ein (beliebiger) temporärer Schlüssel 11 der Einfahrt ("StartGate_tempID"), eine Kennung der Einfahrt 3 ("StartGate_ID"), oder ein öffentlicher Schlüssel 13 der Ausfahrt 4 ("PublicKey_EndGate") sein.In the variants of Fig. 1c and 1d the key 9 is formed from the entry identifier 6 supplemented with further keys, in order to increase respectively the length of the key 9 and the data security. These other keys can be eg a timestamp TS ("Timestamp_StartGate"), an (arbitrary) temporary one Key 11 of the entry ("StartGate_tempID"), an entry ID 3 ("StartGate_ID"), or a public key 13 of exit 4 ("PublicKey_EndGate").

Wie aus Fig. 1a ersichtlich, können die verschlüsselten Einfahrtsdaten 8 optional mit einem Hashwert h1 versehen bzw. unter diesem für die weiteren Verfahrensschritte bereitgestellt werden. Der Hashwert h1 wird in einer - wie eingangs erörtert - praktisch unumkehrbaren Weise aus der Einfahrtskennung 6 gebildet und erleichtert die Identifizierung der verschlüsselten Einfahrtsdaten 8 bei der späteren Entschlüsselung und Auswertung, wie später noch erläutert wird.How out Fig. 1a As can be seen, the encrypted entry data 8 can optionally be provided with a hash value h1 or be provided below it for the further method steps. The hash value h1 is formed in a - as discussed in the beginning - practically irreversible way from the entrance ID 6 and facilitates the identification of the encrypted entry data 8 in the subsequent decryption and evaluation, as will be explained later.

Nachdem das Fahrzeug 1 den Streckenabschnitt 2 durchfahren hat, wird an der Ausfahrt 4 erneut das Kennzeichen 5 des Fahrzeugs 1 als sog. Ausfahrtskennung 15 erfaßt. Die Erfassung kann wieder auf jede beliebige Art und Weise erfolgen, z.B. durch Fernauslesen oder bevorzugt durch optische Zeichenerkennung des Fahrzeugkennzeichens 5 in einer Bildaufnahme des Fahrzeugs 1 bei der Ausfahrt 4 ("Ausfahrtsbild").After the vehicle 1 has passed through the section 2, at the exit 4 again the license plate 5 of the vehicle 1 is detected as so-called. Ausfahrtskennung 15. The detection can be done again in any manner, e.g. by remote reading or preferably by optical character recognition of the vehicle registration number 5 in an image recording of the vehicle 1 at the exit 4 ("exit image").

Da das Fahrzeug 1 auf seinem Weg von der Einfahrt 3 zur Ausfahrt 4 seine Kennung 5 nicht verändert und damit die Einfahrtskennung 6 gleich der Ausfahrtskennung 15 ist, kann die Ausfahrtskennung 15 zur Entschlüsselung der verschlüsselten Einfahrtsdaten 8 verwendet werden. Je nach Variante der Fig. 1a, 1b, 1c und 1d ist dazu die Ausfahrtskennung 15 in entsprechender Weise zum Schlüssel 9 zu ergänzen, sei es durch entsprechende Funktionsabbildung (Fig. 1b), Ergänzung mit einem zu den Einfahrtsdaten 8 erhaltenen Zeitstempel TS, einem von der Einfahrt 3 auf einem gesonderten Übertragungsweg 16 erhaltenen temporären Schlüssel 11, einer Kennung der Einfahrt 3, einem zum öffentlichen Schlüssel 13 passenden privaten Schlüssel ("PrivateKey_EndGate") der Ausfahrt 4, usw.Since the vehicle 1 does not change its identifier 5 on its way from the entrance 3 to the exit 4, and thus the entry identifier 6 is equal to the exit identifier 15, the exit identifier 15 can be used to decrypt the encrypted entry data 8. Depending on the variant of Fig. 1a, 1b, 1c and 1d is to add the exit ID 15 in a corresponding manner to the key 9, either by appropriate function mapping ( Fig. 1b ), Supplementing with a time stamp TS obtained from the entry data 8, a temporary key 11 received from the entrance 3 on a separate transmission path 16, an identification of the entrance 3, a private key ("PrivateKey_EndGate") of the exit 4 , etc.

Im praktischen Betrieb, wenn eine Vielzahl von Fahrzeugen 1 von der Einfahrt 3 zur Ausfahrt 4 fährt, fällt auch eine Vielzahl von verschlüsselten Einfahrtsdaten(-Objekten) 8 an. Im einfachsten Fall kann zur Entschlüsselung die Ausfahrtskennung 15 bzw. der daraus gebildete Schlüssel 9 an jedem vorhandenen Objekt von verschlüsselten Einfahrtsdaten 8 "ausprobiert" werden, "bis der Schlüssel paßt".In practical operation, when a plurality of vehicles 1 travel from the entrance 3 to the exit 4, a plurality of encrypted entry data (objects) 8 also arrive. In the simplest case, the exit code can be decrypted 15 or the key 9 formed therefrom on each existing object will be "tried out" by encrypted entry data 8 "until the key fits".

Bevorzugt werden jedoch die genannten Hashwert h1 verwendet, unter denen die verschlüsselten Einfahrtsdaten 8 bereitgestellt werden. Dazu wird aus der Ausfahrtskennung 15 - und zwar in derselben Weise wie der Hashwert h1 aus der Einfahrtskennungen 6 - ein Hashwert h2 gebildet. Mit Hilfe des Hashwerts h2 können die unter dem gleichen Hashwert h1 bereitgestellten verschlüsselten Einfahrtsdaten 8 sofort, ohne Probieren, ermittelt werden.Preferably, however, the mentioned hash values h1 are used, under which the encrypted entry data 8 are provided. For this purpose, a hash value h2 is formed from the exit identifier 15-in the same way as the hash value h1 from the entry identifiers 6. With the aid of the hash value h2, the encrypted entry data 8 provided under the same hash value h1 can be determined immediately without any attempt.

Mit Hilfe der Ausfahrtskennung 15 bzw. des daraus gebildeten Schlüssels 9 werden die als passend bzw. zugehörig (h1=h2) ermittelten Einfahrtsdaten 8 nun entschlüsselt und daraus auch die Daten 7 wiedergewonnen. Durch Validieren der Daten 7 z.B. wenn sie eine Vorgabe DAT bzw. GID enthalten gegenüber dem bekannten Wert DAT bzw. einer gültigen Gate-ID oder wenn sie die Einfahrtskennung 6 (direkt oder aus dem Einfahrtsbild PIC ableitbar) enthalten gegenüber der Ausfahrtskennung 15 kann bei erfolgreicher Validierung auf eine Durchfahrt eines Fahrzeugs 1 mit der Kennung 5 von der Einfahrt 3 zur Ausfahrt 4 geschlossen werden.With the aid of the exit identifier 15 or the key 9 formed therefrom, the entry data 8 ascertained as appropriate or belonging (h1 = h2) are now decrypted and from this also the data 7 are retrieved. By validating the data 7 e.g. if they contain a specification DAT or GID compared to the known value DAT or a valid gate ID or if they contain the entry identifier 6 (directly derivable from the entry image PIC) vis-a-vis the exit identification 15, upon successful validation for a passage of a vehicle 1 closed with the identifier 5 from the entrance 3 to exit 4.

Wenn bei der Ein- und Ausfahrt 3, 4 jeweils auch die Einfahrtszeit TS und die Ausfahrtszeit TE miterfaßt wird, kann die Verweildauer das Fahrzeugs 1 auf dem Streckenabschnitt 2 und - in Kenntnis der Länge L des Streckenabschnitts 2 - auch die Geschwindigkeit des Fahrzeugs 1 im Streckenabschnitt 2 ermittelt werden ("Section Control").If in the entrance and exit 3, 4 respectively the entry time TS and the exit time TE is included, the dwell time of the vehicle 1 on the section 2 and - knowing the length L of the section 2 - also the speed of the vehicle 1 in Section 2 are determined ("Section Control").

Bevorzugt werden die Ein- und Ausfahrtszeiten TS, TE auch für die Steuerung des Verfahrensablaufs herangezogen, und zwar in der folgenden Art und Weise.Preferably, the entry and exit times TS, TE are also used for the control of the procedure, in the following manner.

Die Einfahrtsdaten 8, d.h. jedes Einfahrtsdaten-Objekt 8, werden bzw. wird jeweils auch mit der Einfahrtszeit TS des Fahrzeugs 1 versehen. Sobald ein Einfahrtsdaten-Objekt 8 ein vorgegebenes Alter überschreitet, d.h. die aktuelle Zeit größer ist als ein mit der Einfahrtszeit TS beginnendes Zeitfenster ΔT, wird das betreffende Einfahrtsdaten-Objekt 8 aus der Menge der aller bereitgestellten Einfahrtsdaten-Objekte 8 gelöscht. Das Zeitfenster ΔT wird durch die zulässige Höchstgeschwindigkeit Vmax auf dem Streckenabschnitt 2 definiert, d.h. ΔT = L/Vmax. Bei einem "zu alten, d.h. das Zeitfenster ΔT überschreitenden Einfahrtsdaten-Objekt 8 handelt es sich daher um Einfahrtsdaten eines regelkonformen, die zulässige Höchstgeschwindigkeit nicht überschreitenden Fahrzeugs 1, so daß eine Entschlüsselung nicht erforderlich ist. Ein Fahrzeug, das kein Geschwindigkeitsdelikt begeht, hinterläßt somit keine identifizierbaren Spuren im System.The entry data 8, ie each entry data object 8, is / are respectively provided with the entry time TS of the vehicle 1. Once an entry data object 8 exceeds a predetermined age, ie the current time greater is as a beginning with the entry time TS time window .DELTA.T, the relevant entry data object 8 is deleted from the set of all provided entry data objects 8. The time window ΔT is defined by the permissible maximum speed V max on the section 2, ie ΔT = L / V max . An entry data object 8 which is too old, that is to say the time window ΔT, is therefore entry data of a vehicle 1 which complies with the regulations and does not exceed the permissible maximum speed, so that decryption is not required no identifiable traces in the system.

Ausfahrtskennungen 15, zu denen sich keine damit entschlüsselbaren Einfahrtsdaten 8 in der Menge aller bereitgestellten Einfahrtsdaten(-Objekte) 8 finden lassen, können ebenfalls verworfen werden.Exit identifiers 15, to which no entry data 8 that can be decrypted thereby can be found in the set of all provided entry data (objects) 8, can also be discarded.

Gemäß einer alternativen (oder zusätzlichen) Variante des Verfahrens können für diesen Zeitvergleich auch die Hashwerte ausgenützt werden. Bei der Zuordnung und Ermittlung der Einfahrtsdaten 8 anhand des Vergleichs der Hashwerte h1 und h2 werden nur jene Einfahrtsdaten 8 in Betracht gezogen und in weiterer Folge entschlüsselt, deren Ein- und Ausfahrtszeiten TS, TE innerhalb des Zeitfensters ΔT liegen. Dadurch kann das Alter der Einfahrtsdaten-Objekte 8 auch zu einem späteren Zeitpunkt, z.B. offline oder in einer gesonderten Auswertestation, berechnet werden.According to an alternative (or additional) variant of the method, the hash values can also be utilized for this time comparison. In the assignment and determination of the entry data 8 on the basis of the comparison of the hash values h1 and h2, only those entry data 8 are considered and subsequently decoded whose entry and exit times TS, TE lie within the time window ΔT. As a result, the age of the entry data objects 8 can also be changed at a later time, e.g. offline or in a separate evaluation station.

In einer praktischen Ausführungsform wird in der Einfahrtsstation aus der Einfahrtszeit TS und dem Zeitfenster ΔT eine zulässige Mindest-Ankunftszeit TEC (Time-stamp_End_Calculated) berechnet und (gleich anstelle der Einfahrtszeit TS) mit dem Hashwert h1 und den verschlüsselten Einfahrtsdaten 8 bereitgestellt. Wenn die zu einem Hashwert h2 (=h1) zugehörige Ausfahrtszeit TE nun vor der Mindest-Ankunftszeit TEC ist, liegt offensichtlich eine Geschwindigkeitsüberschreitung vor und die Einfahrtsdaten 8 werden entschlüsselt. In diesem Fall werden auch die Ausfahrtskennung 15 = Einfahrtskennung 6 = Kennung 5 des Fahrzeugs 1 zusammen mit dem Einfahrtsbild PIC und dem Ausfahrtsbild zu Beweiszwecken archiviert, z.B. um eine Strafe wegen Geschwindigkeitsüberschreitung verhängen zu können. Wenn anderseits die tatsächliche Ausfahrtszeit TE nach der zulässigen Mindest-Ankunftszeit TEC liegt, d.h. außerhalb des Zeitfensters ΔT, dann handelt es sich um ein regelkonformes, die zulässige Höchstgeschwindigkeit nicht überschreitendes Fahrzeug 1 und die verschlüsselten Einfahrtsdaten 8 und die Ausfahrtskennung 15 werden sofort gelöscht.In a practical embodiment, an allowable minimum arrival time TEC (Time-stamp_End_Calculated) is calculated in the entry station from the entry time TS and the time window ΔT and provided (equal to the entry time TS) with the hash value h1 and the encrypted entry data 8. If the exit time TE associated with a hash value h2 (= h1) is now before the minimum arrival time TEC, then there is obviously a speed overrun and the entry data 8 is decrypted. In this case, also the exit detection 15 = entrance identification 6 = identification 5 of the vehicle 1 together with the entrance image PIC and the exit image are archived for evidential purposes, eg in order to be able to impose a penalty for exceeding the speed limit. On the other hand, if the actual exit time TE is after the allowable minimum arrival time TEC, ie outside the time window ΔT, then it is a compliant vehicle not exceeding the maximum permissible speed TEC and the encrypted entry data 8 and exit detection 15 are immediately cleared.

Die genannten Schritte des Verfahrens werden bevorzugt in unterschiedlichen Entitäten ausgeführt. Das Erfassen der Einfahrtskennung 6, Verschlüsseln der Daten 7 zu den verschlüsselten Einfahrtsdaten 8 und Bilden des Hashwerts h1 wird bevorzugt in einer Station an der Einfahrt 3 ("Einfahrtsstation") durchgeführt. Das Erfassen der Ausfahrtskennung 15 und Bilden des Hashwerts h2 wird bevorzugt in einer Station an der Ausfahrt 4 ("Ausfahrtsstation") durchgeführt. Das Ermitteln der zu einer Ausfahrtskennung 15 passenden verschlüsselten Einfahrtsdaten 8 durch Probieren bzw. durch Verwenden der Hashwerte h1=h2, das Entschlüsseln der Einfahrtsdaten 8 und das Auswerten der Daten 7, z.B. Validieren gegenüber der Vorgabe DAT/GID bzw. der Ausfahrtskennung 15, wird bevorzugt in einer sowohl von der Einfahrtsstation 3 als auch von der Ausfahrtsstation 4 gesonderten Auswertestation 20 (Fig. 2) durchgeführt.The said steps of the method are preferably carried out in different entities. Detecting the entry identifier 6, encrypting the data 7 to the encrypted entry data 8 and forming the hash value h1 is preferably performed in a station at the entrance 3 ("entry station"). Detecting the exit identifier 15 and forming the hash value h2 is preferably performed in a station at exit 4 ("exit station"). Determining the encrypted entry data 8 suitable for an exit identifier 15 by means of a trial or by using the hash values h1 = h2, decrypting the entry data 8 and evaluating the data 7, eg validating against the specification DAT / GID or the exit identifier 15, becomes preferably in a separate from both the entry station 3 and the exit station 4 evaluation station 20 ( Fig. 2 ) carried out.

Fig. 2 zeigt eine praktische Ausführungsform des Verfahrens anhand eines Flußdiagramms unter Verwendung der folgenden Abkürzungen:

TS
Timestamp_Start
TEC
Timestamp_End_Calculated
LPS
Einfahrtskennung 6
LPE
Ausfahrtskennung 15
m1
Daten 7 (unverschlüsselt)
m2
Ausfahrtsdaten 15 (unverschlüsselt)
c1
Einfahrtsdaten 8 (verschlüsselt)
E
Verschlüsselungsfunktion
D
Entschlüsselungsfunktion
H
Hashfunktion
h1
Hashwert von 6
h2
Hashwert von 15
21
Temporärer Prozeßspeicher
22
Archivspeicher für Beweisdaten
Fig. 2 shows a practical embodiment of the method with reference to a flow chart using the following abbreviations:
TS
Timestamp_Start
TEC
Timestamp_End_Calculated
LPS
Entry detection 6
LPE
Exit detection 15
m1
Data 7 (unencrypted)
m2
Exit data 15 (unencrypted)
c1
Entry data 8 (encrypted)
e
encryption function
D
decryption function
H
hash function
h1
Hash value of 6
h2
Hash value of 15
21
Temporary process memory
22
Archive storage for evidence data

Die Erfindung ist nicht auf die dargestellten Ausführungsbeispiele beschränkt, sondern umfaßt alle Varianten und Modifikationen, die in den Rahmen der angeschlossenen Ansprüche fallen. The invention is not limited to the illustrated embodiments, but includes all variants and modifications that fall within the scope of the appended claims.

Claims (13)

  1. Method for detecting passages of vehicles (1) with unique identifiers (5) from an entry (3) to an exit (4), with the steps:
    detecting the identifier (5) of a vehicle (1) at the entry (3) as an entry identifier (6),
    encrypting predefined and/or vehicle identifier-related data (7) to encrypted entry data (8) by means of the entry identifier (6), providing the encrypted entry data (8) and destroying the entry identifier (6);
    detecting the identifier (5) of a vehicle (1) at the exit (4) as an exit identifier (15),
    determining the provided encrypted entry data (8) and decrypting the encrypted entry data (8) by means of the exit identifier (15) in order to obtain the said data (7); and
    validating the said data (7) in relation to their given setting (DAT, GID) and/or the exit identifier (15), wherein a successful validation indicates the passage of the vehicle (1)
    characterised in that the entry data (8) are provided with the entry time (TS) of the vehicle (1) and are deleted from the volume of provided entry data (8) as soon as the current time exceeds a time window (ΔT), which starts with the entry time (TS) and which is equal to the quotient of the length (L) of the section covered (2) between the entry and the exit (3, 4) and the permissible maximum speed (vmax) on this section (2).
  2. Method according to claim 1, characterised in that a detected exit identifier (15) is discarded when no entry data (8) that can be decrypted with this can be determined for this in the volume of provided entry data (8).
  3. Method according to claim 1 or 2 using predefined data, characterised in that these data (7) comprise an identifier (GID) of the entry (3).
  4. Method according to one of claims 1 to 3 using vehicle identifier-related data, characterised in that these data (7) comprise the entry identifier (6).
  5. Method according to one of claims 1 to 4 using vehicle identifier-related data, characterised in that these data (7) comprise an entry image (PIC) of the vehicle (1), from which the entry identifier (6) can be derived.
  6. Method according to claim 5, characterised in that the entry image (PIC) obtained during decryption from entry data (8) is archived together with an exit image and the identifier (5) of the vehicle (1) for evidence purposes (22).
  7. Method according to one of claims 1 to 6, characterised in that the encrypted entry data (8) are provided under a hash value (h1) calculated from the entry identifier (6) and a hash value (h2), on the basis of which the encrypted entry data (8) provided under this hash value (h2, h1) are determined, is calculated from the exit identifier (15) in the same way.
  8. Method according to claim 7, characterised in that the respective entry and/or exit time (TS, TE) of the vehicle (1) is also recorded to each hash value (h1, h2) and the encrypted entry data (8) are only decrypted when the exit time (TE) belonging to the hash value (h1, h2) lies within a time window (ΔT) starting with the associated entry time (TS).
  9. Method according to claim 8, characterised in that the speed of a vehicle (1) is determined from the entry and exit time (TS, TE) thereof and the distance covered between the entry and exit (3, 4).
  10. Method according to one of claims 1 to 9, characterised in that the identifier (5) is the vehicle registration number (LPN) and is detected by optical character recognition in entry (PIC) and exit images of the vehicle (1).
  11. Method according to one of claims 1 to 10, characterised in that the said encryption and provision of the entry data (8) occurs in an entry station (3), the said detection of the exit identifier (15) occurs in an exit station (4) and the said decryption of the entry data (8) and validation of the decrypted data (7) occurs in a separate evaluation station (20).
  12. Method according to one of claims 1 to 11, characterised in that during encryption of the entry data (8) the entry identifier (6) used as key (9) is supplemented by further keys (TS, 11, 13), which are provided separately for the decryption.
  13. Method according to claim 12, characterised in that the further keys comprise a time stamp (TS), a temporary key (11), an identifier of the entry station (3) or a public key (13) of the exit station (4).
EP10450005A 2010-01-21 2010-01-21 Method for recording vehicles passing through Not-in-force EP2360647B1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
DK10450005.3T DK2360647T3 (en) 2010-01-21 2010-01-21 Procedure for recording vehicle pass-through
EP10450005A EP2360647B1 (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through
ES10450005T ES2387753T3 (en) 2010-01-21 2010-01-21 Procedure to detect the passage of vehicles
PL10450005T PL2360647T3 (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through
SI201030047T SI2360647T1 (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through
PT10450005T PT2360647E (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through
AT10450005T ATE557374T1 (en) 2010-01-21 2010-01-21 METHOD FOR RECORDING VEHICLE PASSAGES

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP10450005A EP2360647B1 (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through

Publications (2)

Publication Number Publication Date
EP2360647A1 EP2360647A1 (en) 2011-08-24
EP2360647B1 true EP2360647B1 (en) 2012-05-09

Family

ID=42040288

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10450005A Not-in-force EP2360647B1 (en) 2010-01-21 2010-01-21 Method for recording vehicles passing through

Country Status (7)

Country Link
EP (1) EP2360647B1 (en)
AT (1) ATE557374T1 (en)
DK (1) DK2360647T3 (en)
ES (1) ES2387753T3 (en)
PL (1) PL2360647T3 (en)
PT (1) PT2360647E (en)
SI (1) SI2360647T1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PT2648170E (en) 2012-04-06 2015-02-20 Kapsch Trafficcom Ag A method for detecting a speed violation of a vehicle
DE102012219220A1 (en) * 2012-10-22 2014-04-24 Bayerische Motoren Werke Aktiengesellschaft Method for determining mean speed of vehicle, involves determining successfully decryption of encrypted first image on second key that is determined based on result of analysis method applied to second camera recording
EP2838075A1 (en) * 2013-08-15 2015-02-18 VITRONIC Dr.-Ing. Stein Bildverarbeitungssysteme GmbH Method and device for detecting instances in which the maximum speed on a route section is exceeded
US9779284B2 (en) * 2013-12-17 2017-10-03 Conduent Business Services, Llc Privacy-preserving evidence in ALPR applications
EP3869396A1 (en) 2020-02-24 2021-08-25 Toll Collect GmbH Method and system for adjusting a label

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2199999A1 (en) * 1997-03-14 1998-09-14 Peter Johann Kielland Parking regulation enforcement system
EP0978811A3 (en) * 1998-08-07 2000-08-16 Siemens Aktiengesellschaft Method and device to obtain travel times of vehicles
DE102005036562B4 (en) * 2005-08-03 2007-05-10 Siemens Ag Method and arrangement for anonymized recording and evaluation of vehicle travel data
AT8939U1 (en) * 2005-09-29 2007-02-15 Siemens Ag Oesterreich METHOD AND DEVICE FOR MONITORING THE SPEED OF VEHICLES
DE102007059346B4 (en) * 2007-12-10 2009-11-19 Siemens Ag Method and device for detecting a speeding violation of a vehicle

Also Published As

Publication number Publication date
ES2387753T3 (en) 2012-10-01
DK2360647T3 (en) 2012-08-20
SI2360647T1 (en) 2012-08-31
EP2360647A1 (en) 2011-08-24
PL2360647T3 (en) 2012-09-28
PT2360647E (en) 2012-07-13
ATE557374T1 (en) 2012-05-15

Similar Documents

Publication Publication Date Title
EP2469497B1 (en) Method for recording vehicles
EP2360647B1 (en) Method for recording vehicles passing through
EP2220634B1 (en) Method and device for detecting whether a vehicle has exceeded a speed limit
EP2701133B1 (en) Method and devices for taking a picture of a vehicle exceeding a certain speed
EP3782132B1 (en) Method for the anonymized transmission of sensor data of a vehicle to a vehicle-external receiving unit as well as an anonymisation system and a motor vehicle
DE4338556A1 (en) Device for recording route information
EP0978811A2 (en) Method and device to obtain travel times of vehicles
DE102011018571A1 (en) Method for checking communication messages in the vehicle-to-environment communication and suitable receivers
DE4402612C2 (en) Procedure for monitoring authorized use of traffic routes and / or traffic areas
EP2994890B1 (en) Method and device for providing data for toll charging and toll system
EP1586079A1 (en) Mobile data transmission method and system
EP2376871B1 (en) Method for operating a sensor apparatus and sensor apparatus
EP2503518B1 (en) Method for validating a toll transaction
EP2429182A2 (en) Method for masking personal information from a camera
DE10112153A1 (en) Mobile control unit for private or public devices supplied with coded movement protocol from external source
WO2021078465A1 (en) Method for paying a fee for allowing a vehicle to use a road network that is subject to toll charges, and toll system for performing the method
EP2584539A1 (en) Method for configuring an electromechanical lock
DE102018205917A1 (en) Apparatus for duplicating and securing data of a rail registration system in rail transport
WO2017167568A1 (en) Method and system for recognising presence and/or ascertaining fare for a passenger in a vehicle
EP2838075A1 (en) Method and device for detecting instances in which the maximum speed on a route section is exceeded
EP1262923A2 (en) Autoradio with an integrated device for saving the evolution of vehicle parameters
DE202015102311U1 (en) Device for billing tolls
EP1732051A1 (en) Method and device for traffic surveillance
DE102013221504A1 (en) Control of data access in a means of transport, in particular a vehicle
DE102018209163A1 (en) Motion sensor and method for operating a motion sensor

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20110203

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

AX Request for extension of the european patent

Extension state: AL BA RS

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 557374

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120515

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502010000723

Country of ref document: DE

Effective date: 20120712

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20120706

Ref country code: CH

Ref legal event code: NV

Representative=s name: BUECHEL, VON REVY & PARTNER

REG Reference to a national code

Ref country code: DK

Ref legal event code: T3

REG Reference to a national code

Ref country code: NL

Ref legal event code: T3

REG Reference to a national code

Ref country code: SK

Ref legal event code: T3

Ref document number: E 11929

Country of ref document: SK

REG Reference to a national code

Ref country code: NO

Ref legal event code: T2

Effective date: 20120509

REG Reference to a national code

Ref country code: PL

Ref legal event code: T3

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2387753

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20121001

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120909

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20130212

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: PATWIL AG, CH

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502010000723

Country of ref document: DE

Effective date: 20130212

REG Reference to a national code

Ref country code: HU

Ref legal event code: AG4A

Ref document number: E016065

Country of ref document: HU

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120809

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130131

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120509

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130121

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 7

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 9

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: KAMINSKI HARMANN PATENTANWAELTE AG, CH

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20191219

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PL

Payment date: 20191230

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20200131

Year of fee payment: 11

Ref country code: NL

Payment date: 20200121

Year of fee payment: 11

Ref country code: HU

Payment date: 20200123

Year of fee payment: 11

Ref country code: DK

Payment date: 20200123

Year of fee payment: 11

Ref country code: NO

Payment date: 20200123

Year of fee payment: 11

Ref country code: GB

Payment date: 20200124

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SK

Payment date: 20200120

Year of fee payment: 11

Ref country code: SI

Payment date: 20191219

Year of fee payment: 11

Ref country code: CZ

Payment date: 20200115

Year of fee payment: 11

Ref country code: CH

Payment date: 20200121

Year of fee payment: 11

Ref country code: BE

Payment date: 20200121

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20210122

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20210120

Year of fee payment: 12

Ref country code: ES

Payment date: 20210326

Year of fee payment: 12

Ref country code: AT

Payment date: 20210121

Year of fee payment: 12

Ref country code: SE

Payment date: 20210120

Year of fee payment: 12

REG Reference to a national code

Ref country code: DK

Ref legal event code: EBP

Effective date: 20210131

REG Reference to a national code

Ref country code: NO

Ref legal event code: MMEP

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20210201

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20210121

REG Reference to a national code

Ref country code: SK

Ref legal event code: MM4A

Ref document number: E 11929

Country of ref document: SK

Effective date: 20210121

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210122

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210201

Ref country code: CZ

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210721

Ref country code: NO

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

Ref country code: SK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210121

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210121

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

REG Reference to a national code

Ref country code: SI

Ref legal event code: KO00

Effective date: 20211129

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210131

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 502010000723

Country of ref document: DE

REG Reference to a national code

Ref country code: SE

Ref legal event code: EUG

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 557374

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220122

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220802

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210121

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20230404

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220122