EP2652662A1 - Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données - Google Patents

Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données

Info

Publication number
EP2652662A1
EP2652662A1 EP11764106.8A EP11764106A EP2652662A1 EP 2652662 A1 EP2652662 A1 EP 2652662A1 EP 11764106 A EP11764106 A EP 11764106A EP 2652662 A1 EP2652662 A1 EP 2652662A1
Authority
EP
European Patent Office
Prior art keywords
data
stationary device
adapter
mobile
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP11764106.8A
Other languages
German (de)
English (en)
Inventor
Oliver Koemmerling
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KOEMMERLING, OLIVER
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP2652662A1 publication Critical patent/EP2652662A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R31/00Coupling parts supported only by co-operation with counterpart
    • H01R31/005Intermediate parts for distributing signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R27/00Coupling parts adapted for co-operation with two or more dissimilar counterparts
    • H01R27/02Coupling parts adapted for co-operation with two or more dissimilar counterparts for simultaneous co-operation with two or more dissimilar counterparts
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R31/00Coupling parts supported only by co-operation with counterpart
    • H01R31/06Intermediate parts for linking two coupling parts, e.g. adapter
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the present invention relates to a method for the encrypted transmission of data from a mobile, first data carrier to a stationary device according to claim 1. It further relates to a data encryption adapter according to claim 6 or 7.
  • An object of the present invention is to provide a method for (re)
  • the method according to the invention serves for the encrypted transmission of data from a mobile, first data carrier to a stationary device or the preparation of an encrypted transmission between the mobile, first data carrier and the stationary device.
  • the stationary device may be stationary such as screwed and always provided for use in the same place. In other embodiments of the invention, however, it is mobile or non-stationary, differing from its name.
  • the method of the invention includes connecting a data encryption adapter to the stationary device to establish a communication link between the data encryption adapter and the stationary device.
  • the data encryption adapter according to the invention is suitable and / or provided and / or configured for use in a method according to the invention.
  • the data encryption adapter according to the invention is suitable and / or provided for connection to a stationary device.
  • Advantageous developments of the present invention are the subject of subclaims and embodiments.
  • Embodiments of the invention may include one or more of the features mentioned below.
  • the method according to the invention serves to transmit encrypted data from a mobile, first data carrier to the data encryption adapter by means of a second encryption algorithm, then to encrypt this data with a first encryption algorithm from the data encryption adapter to the stationary device or a second data carrier or a second data carrier Data evaluation unit of the stationary device to transfer.
  • the - in some embodiments according to the invention electrically or electronically configured - data encryption adapter has in certain embodiments a first interface, which is configured to encrypted data encrypted by means of a first encryption algorithm, encrypted with the second volume or a second data evaluation unit of the stationary device or to be transmitted to this.
  • the data encryption adapter is provided in certain embodiments and / or configured and / or configured to receive the mobile, first
  • the data encryption adapter is provided and / or configured and / or configured for data transmission with the mobile, first volume.
  • the recording of the mobile, first data carrier is in certain embodiments, a signal transmission-effective recording, for example, suitable and / or provided for data exchange via infrared, Bluetooth, WLAN, by means of electronically routed signals or the like.
  • the data encryption adapter has a second interface that is provided to exchange data with the mobile first volume that has been encrypted using a second encryption algorithm.
  • Data encryption adapter with the stationary device to establish or generate a, preferably permanent, data exchange connection between the data encryption adapter and the second data carrier or the second
  • Data evaluation unit of the stationary device for exchanging or transmitting data which has been encrypted by means of a first encryption algorithm.
  • the mobile, first volume is a rechargeable, mobile volume of a customer.
  • the mobile, first volume is a rechargeable, mobile volume of a customer.
  • data carrier is intended and / or configured to receive data, possibly in a suitably converted form.
  • data possibly in a suitably converted form.
  • These are, for example, data that contain or reflect a credit amount for consumption by the customer, eg for electricity, telephone, mobile radio or the like.
  • the first, mobile data carrier can be configured as a USB stick, SIM card, SD card, chip card, magnetic stripe card and the like.
  • the second volume of the stationary device is a chip, microchip, etc.
  • the second data evaluation unit of the stationary device is in certain
  • Embodiments an electronic counter.
  • the second data carrier or the second data evaluation unit serve, in certain embodiments of the present invention, to store data, i. H. Information, eg. B. on a credit amount to record.
  • the stationary one is
  • a wall-mounted meter eg. B. in a household or operation of the customer, for example, an electricity meter, a gas meter, a water meter or the like.
  • the first encryption algorithm may be a publicly known or known - e.g. For example, be misleading - encryption algorithm.
  • the first encryption algorithm in certain embodiments, is an algorithm formerly known as the stationary device and communicates the mobile first data carrier without a data encryption adapter before it became known, and by which it still communicates - now using a data encryption adapter according to the invention.
  • the first encryption algorithm can be stored on the second data carrier and / or in the second data evaluation unit of the stationary device.
  • the first encryption algorithm is deposited on the data encryption adapter, such as on a memory unit or chip, memory chip, microchip, and the like of the data encryption adapter.
  • the chip or storage unit of the data encryption adapter has an up-to-date security standard.
  • encryption algorithm as used herein in relation to the first and second encryption algorithms, in certain embodiments, is to be understood as an algorithm to be used for both encryption and corresponding decryption.
  • Encryption algorithm can be used.
  • the first and second encryption algorithms are specific
  • Embodiments of mutually different encryption algorithms This is particularly desirable and advantageous in cases where a
  • Encryption algorithm - generally the first encryption algorithm - made known and, for example, was or could be the target of fraud attempts.
  • the second encryption algorithm is freely selectable among already known standard algorithms or is a future developed encryption algorithm.
  • the second encryption algorithm may be a new encryption algorithm, at least one encryption algorithm not yet known to the public (or recognized by it) or made accessible.
  • the second encryption algorithm in certain embodiments, is deposited on the data encryption adapter (on the same or a different chip, memory chip, etc. of the data encryption adapter).
  • the second encryption algorithm is preferably likewise stored on the mobile, first data carrier.
  • data exchange refers to a process in which a first, in particular electrical or electronic, component transmits, transmits, transmits or the like data, and in which a second, in particular electrical or electronic, component takes this data, stores, converts if necessary, etc.
  • data transmission refers to a data transmission, in particular a predominantly unilateral data exchange, between a first and a second electrical or electronic component, eg a data transmission from the mobile, first data carrier to the data encryption adapter or the data encryption adapter to the stationary device or the second data carrier or the second data evaluation unit of the stationary device
  • the transmission of the encrypted data itself can be encrypted or unencrypted If an encrypted transmission of data is mentioned in connection with this invention, then the transmission as such is encrypted, and / or encrypted data can be encrypted or transmitted unencrypted or exchanged.
  • a data exchange or transfer may, in certain embodiments, include encrypting and / or decrypting and / or converting the data, and the like.
  • the achieved connection of the electronic data encryption adapter to the stationary device is permanent.
  • Embodiments a positive and / or non-positive and / or
  • a connection achieved is "permanent" if it is not transient and / or not (by normal means and / or with the application of little effort) is solvable.
  • a connection is permanent if it can only be solved by destruction.
  • a connection achieved is "permanent" if it is designed to last, for example, for the remaining use time or remaining life of the components used or all components involved in the connection.
  • Establishment takes place in certain embodiments of the method according to the invention including an intended for a mobile disk insertion (or insertion opening) of the stationary device.
  • connection of the data encryption adapter to the stationary device is solely via the insertion opening provided on the stationary device.
  • the insertion opening is, in some embodiments of the present invention, the opening that was previously or provided by the manufacturer for receiving the first, mobile data carrier. According to the invention, the insertion opening is now provided in certain embodiments, to receive the data encryption adapter instead of the mobile, first data carrier.
  • the method of the invention includes writing the mobile, first volume to data encrypted using the second encryption algorithm.
  • the second - stationary or non-stationary - device is a device provided at a location other than the first stationary device. This can, for. A charging unit or station or device in a shop.
  • the second stationary or non-stationary device (charging station) describes the mobile, first data carrier with data using a second data encryption adapter.
  • the second data encryption adapter z. B. also be used on the charger.
  • the second data carrier or the second data evaluation unit of the first stationary device is an electronic electricity meter. In certain embodiments, the second data carrier or the second data evaluation unit is provided in or on an electronic electricity meter.
  • the data encryption adapter according to the invention has, in certain embodiments, a first interface and a second interface.
  • the first interface is provided and / or configured to encrypted or encrypted data encrypted by a first encryption algorithm with the second volume or a second data evaluation unit of the stationary device.
  • the data encryption adapter according to the invention is provided and / or configured and / or configured in certain embodiments for receiving the mobile, first data carrier and / or for data transmission with the mobile, first data carrier by means of a second encryption algorithm.
  • the second interface is provided to receive data from the mobile, first volume.
  • the data is encrypted in certain embodiments with a second encryption algorithm.
  • the data encryption adapter of the invention comprises means provided and / or configured to convert the data encrypted by the first encryption algorithm into data encrypted by the second encryption algorithm and / or vice versa.
  • the data encryption adapter of the invention includes means for permanently locking and / or otherwise connecting it to the - preferably only - stationary device.
  • the locking of the data encryption adapter to the stationary device is in certain embodiments an irreversible, non-detachable, and / or only destructive, i. H. with the application of raw force or force, locking to be released, in any case a lock which is not solvable with simple manual actions and / or with little mechanical effort (eg not by simply pushing in and pulling out or by clipping using one of his Snap easily releasable clips and the like).
  • the data encryption adapter in certain embodiments, includes means for its exclusive or assistive permanent locking and / or otherwise connecting in a stationary device insertion port provided for a mobile data carrier.
  • the lock or connection is irreversible or only destructively releasable in certain embodiments.
  • the means for joining or interlocking with or with the stationary means is or includes at least one clamping means, latch means, snap-in means, hooking means, clamping means or the like.
  • the device is a mechanical clamp that locks in place as soon as the data encryption adapter is inserted into the stationary device.
  • the data encryption adapter may be a molded, welded, glued, and / or the like configured unit that is or will not be releasably anchored in or on the stationary device.
  • the data encryption adapter is sealed or sealed to the stationary device.
  • the means for connecting or locking after properly connecting or locking the data encryption adapter in or on the stationary device is only destructively, at least demonstrably (e.g., at the break of the seal or seal), detachable from the stationary device.
  • the first interface is provided and / or configured to exchange data which is encrypted by means of a first encryption algorithm with the second data carrier or a second data evaluation unit of the stationary device.
  • the data exchange can be encrypted or unencrypted.
  • the second interface is provided and / or configured to receive data from a different volume than the second volume or a second stationary unit data evaluation unit encoded by the second encryption algorithm.
  • the data encryption adapter is provided and / or designed for data transmission with a mobile, first data carrier designed as a SIM card or SD card.
  • the originally used second stätionäre or non-stationary device which z. B. may be a charging station, kept unchanged. In other embodiments of the invention it is exchanged for another or another second stätionäre or non-stationary device used.
  • the present invention advantageously provides a method for transmitting encrypted, substantially access-safe data and a data encryption adapter that can be used in this method.
  • the data encryption adapter according to the invention can advantageously be used in cases in which, in an existing data transmission system, a first encryption algorithm used is already publicly known and thus made unusable.
  • a first encryption algorithm used is already publicly known and thus made unusable.
  • Certain embodiments is an advantageous little complicated and easy to use and implement with little effort complement.
  • the inventive data encryption adapter is not detachably locked in the stationary device in certain embodiments, it is advantageously possible to prevent access to, for example, a credit booking system by fraudsters or to prove their unauthorized access on the basis of the destroyed data encryption adapter. Since an electronic access to the connection points between the data encryption adapter and the stationary device only by violent removal, for. B. Breaking out of the data encryption adapter from the stationary device is possible, it can be advantageously ensured protection of the system from misuse.
  • the data encryption adapter both at a first stationary device in the household and at a second stationary or non-stationary device in the shop. Since the data encryption adapter can each be designed the same, the design effort can be advantageously kept low, which in turn contributes to the advantageous cost savings.
  • Fig. 1 shows schematically a perspective side view of a
  • Fig. 2 shows in perspective a horizontal longitudinal section through an arranged on a stationary device according to the invention
  • FIG. 3 shows in perspective an arrangement of a mobile, first data carrier on a data encryption adapter according to the invention, which is arranged on the stationary device as in Fig. 2;
  • Fig. 4 shows in perspective a stationary device which a
  • Fig. 5 illustrates schematically a simplified principle of the
  • FIG. 6 schematically illustrates a method of data transmission by means of the data encryption adapter according to the invention.
  • Fig. 7 illustrates a method of data transfer between a first stationary device and a second stationary device using data encryption adapters according to the invention.
  • the data encryption adapter 100 has a first area 101 which is provided and / or configured and / or configured to accommodate a mobile, first data carrier (not shown in FIG. 1).
  • the data encryption adapter 100 has a second area 103 which is suitable and provided and / or configured for connection to a stationary device (also not shown in FIG. 1).
  • the data encryption adapter 100 has a first device 1, which is suitable and provided for locking the data encryption adapter 100 in the stationary device.
  • the second device 3 is configured as a tilting device and is suitable and provided for locking the data encryption adapter 100 in an insertion opening provided for the mobile, first data carrier (not shown in FIG. 1) of the stationary device.
  • the second device 3 can be tilted about a tilt axis 31, which is mounted in the stationary device during use.
  • the second device 3 as well as a tilting axis 31 for connecting the data encryption adapter 100 in the stationary device is not required. Any other connection that does not rely on the second device 3 is also included in the invention. It can turn in certain
  • Fig. 2 shows in perspective a horizontal longitudinal section through an arranged on a stationary device 200 according to the invention
  • Data encryption adapter 100 It can be seen a U-profile-like illustrated
  • the receptacle 5 serves to receive a mobile, not shown in Fig. 2, first
  • the stationary device 200 is only partially shown in the area provided for receiving the data encryption adapter 100 portion. It is also shown in section.
  • the stationary device 200 has a receiving region 201, which, as shown in FIG. 2, for receiving the second region 103 of FIG.
  • Data encryption adapter 100 is provided.
  • the data encryption adapter 100 is indissolubly arranged after its latching in the stationary device 200:
  • the data encryption adapter 100 is so inserted in the region of its second region 103 in the stationary device 200, etc., that the First means 1 for locking, for example - as shown in Fig. 2 by way of example - in the form of a latching device, not detachable behind, based on the direction of insertion, insertion, etc. of the data encryption adapter 100, a blocking device 203 of the stationary device 200 is arranged.
  • the non-destructible detachable assembly of the data encryption adapter 100 in or on the stationary device 200 is constructed purely mechanically by a male / female connection.
  • FIG. 3 shows a perspective view of an arrangement of a mobile, first data carrier 300 on the data encryption adapter 100 according to the invention.
  • the data carrier 300 is inserted into the receptacle 5.
  • the data encryption adapter 100 is arranged on a stationary device 200 or latched in the stationary device 200.
  • the mobile, first data carrier 300 is designed as a USB stick.
  • the mobile, first data carrier can be designed as a SIM card or SD card or have such a card.
  • Fig. 4 shows in perspective a stationary device 200, which a
  • Data encryption adapter 100 inserted mobile, first volume 300 has.
  • Data carrier 300 provided insertion 205 of the stationary device 200 arranged or undetachably locked or latched in this.
  • the stationary device 200 can, as shown by way of example in FIG. 4,
  • FIG. 5 schematically illustrates a principle of data transmission by means of the data encryption adapter 100 according to the invention with reference to a vertical section through a device arranged on a stationary device 200
  • FIGS. 6 and 7 - indicate a data transmission between the relevant components or the possibility of such a data transmission. They can be understood as the representation of an interface in each case.
  • the data encryption adapter 100 is permanently and permanently attached to or plugged into the stationary device 200: first one
  • Means 1 for locking are - in the direction of insertion of the
  • Unrecognized unlawful removal of the data encryption adapter 100 from the stationary device 200, such that the use of the insertion opening and or lying in their depth electronic connections should be possible again, can thus advantageously safe depending on the specific embodiment
  • the flash shown on the left in FIG. 5 indicates the data transmission between the mobile first data carrier 300 and the data encryption adapter 100 or a contact with the second interface of the data encryption adapter 100.
  • the flash shown on the right in FIG. 5 indicates the data transmission between the stationary device 200 and the data encryption adapter 100 or a contact with the first interface of the data encryption adapter 100.
  • FIG. 6 schematically illustrates a method of data transmission by means of the data encryption adapter 100 according to the invention.
  • the upper portion of FIG. 6 schematically shows a data encryption adapter 100 having a first interface 105 and a second interface 107.
  • the first interface 105 is for data transmission between the inventive data encryption adapter 100 and the stationary device 200 (not shown in FIG. 6).
  • the second interface 107 serves to transfer data between the data encryption adapter 100 according to the invention and the mobile, first data carrier 300 (not shown in FIG. 6).
  • Data encryption adapter 100 is done using a second one
  • the second encryption algorithm is preferably a new encryption algorithm, in particular one for securing the
  • the second encryption algorithm differs from the first encryption algorithm.
  • Discrimination in some embodiments of the invention is such that data encrypted using the first encryption algorithm can not be decrypted with the second encryption algorithm or its decryption counterpart, and / or vice versa.
  • the data encrypted with the second encryption algorithm is stored on the mobile, first data carrier 300.
  • the data encrypted with the second encryption algorithm is transferred to the
  • the data encryption adapter 100 receives the data transmitted from the mobile, first data carrier 300 (step S1). In a step S2, the data encryption adapter 100 decrypts the data encrypted with the second encryption algorithm and evaluates the information stored in the data, e.g. B. a sum of money for a particular
  • the data encryption adapter 100 encrypts the data in step S2 with a first encryption algorithm.
  • the first encryption algorithm may be an already known or unauthorized decrypted
  • step S3 the data encryption adapter 100 according to the invention transmits the data encrypted with the first encryption algorithm to the stationary device 200 via the first interface 105.
  • the method according to the invention serves the encrypted
  • FIG. 7 illustrates a method of data transfer between a first stationary device 200a and a second stationary device 200b using the data encryption adapter 100 of the present invention or multiple copies thereof.
  • the second stationary device 200b is, for example, a charging station for charging the first mobile data carrier 300 in a shop.
  • the charging station is used for encrypted writing the first, mobile data carrier 300 with data which z. B. a balance (power consumption, mobile phone use, etc.) correspond.
  • the encryption takes place by means of the second encryption algorithm.
  • the first stationary device 200a is, for example, an electricity meter in one
  • Charging / increasing a power quota limited may be used for any conceivable purpose of increasing a credit on a first stationary device 200a disposed by the second (stationary or non-stationary) device 200b.
  • a charging process of an electricity meter with a credit amount for the power consumption of a household will be described.
  • a first data encryption adapter 100a is provided on a first stationary device 200a and in particular non-detachably locked therein.
  • the first one is
  • Data encryption adapter 100a arranged in common with a first stationary device 200a in a private household.
  • a second data encryption adapter 100b is at a second stationary adapter
  • Data encryption adapter 100b and second stationary device 200b are located in a retail store.
  • the mobile first volume 300 is mobile between the first stationary device 200a and the second stationary device 200b, e.g. B. carried by a customer for charging purposes. To charge the mobile, first data carrier 300, this is taken by the customer to the second stationary device 200b.
  • the mobile first volume 300 is inserted into the second data encryption adapter 100b located at the second stationary device 200b.
  • the data associated with a particular credit (desired by the customer) (eg, entered manually into the second stationary device 200b via a keyboard) is stored in the second stationary device 200b with a first one
  • the data encrypted with the first encryption algorithm is transmitted to the second data encryption adapter 100b via a first interface 105b of the second data encryption adapter 100b.
  • Data encryption adapter 100b receives the data of second stationary device 200b in step S3b.
  • step S2b the second data encryption adapter 100b decrypts the data encrypted with the first encryption algorithm and encrypts the data with a second (not publicly known) encryption algorithm.
  • step S1 b the data encrypted with the second encryption algorithm is transmitted to the mobile first data carrier 300 via the second interface 107b of the second data encryption adapter 100b.
  • the first data carrier 300 is plugged into the second data encryption adapter 200b for data transmission or otherwise connected to the data transmission (infrared, Bluetooth, etc.) to the second data encryption adapter 200b.
  • the mobile first data carrier 300 described with the desired data can be taken from the location of the second stationary device 200b to the location of the first stationary device 200a.
  • the mobile first data carrier 300 is there for data transmission with the first
  • Data encryption adapter 100a connected (plugged into this, but in any case functionally coupled).
  • step S1a the data transfer takes place with the second one
  • step S2a Encryption algorithm encrypted data via the second interface 107a of the first data encryption adapter 100a to the first data encryption adapter 100a.
  • step S2a the first data encryption adapter 100a decrypts the data encrypted with the second encryption algorithm and encrypts it with the (first known) encryption algorithm.
  • step S3a the first data encryption adapter 100a transmits the data encrypted with the first encryption algorithm to the first stationary device 200a via the first interface 05a of the first data encryption adapter 100a.
  • the data which are available, for example, for a specific balance of electricity contingent of a household, can now be stored on the electricity meter (corresponding to the first stationary device 200a).
  • the method described there can also be executed by means of only one data encryption adapter 100.
  • the data at the charging station 200b could already be encrypted by means of the second (publicly not disclosed) encryption algorithm.
  • a Umver finallylung, as shown in the left half of Fig. 7, can be advantageously eliminated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un procédé de transmission chiffrée de données d'un premier support de données mobile (300) à une installation stationnaire (200, 200a, 200b) qui comporte un deuxième support de données ou une deuxième unité d'évaluation de données. La présente invention concerne également la préparation d'une transmission chiffrée entre le premier support de données mobile (300) et le deuxième support de données. Le procédé comprend au moins l'étape suivante consistant à : relier un adaptateur de chiffrement de données électrique ou électronique (100) à l'installation stationnaire (200), l'adaptateur de chiffrement de données (100) comportant une première interface (105) qui est configurée pour échanger de manière chiffrée des données, qui sont chiffrées au moyen d'un algorithme de chiffrement, avec le deuxième support de données ou avec une deuxième unité d'évaluation de données de l'installation stationnaire (200). L'adaptateur de chiffrement de données (100) est prévu et/ou configuré et/ou agencé pour loger le premier support de données mobile (300) ou pour transmettre des données avec le premier support de données mobile (300). L'adaptateur de chiffrement de données (100) comporte une deuxième interface (107) qui sert à échanger avec le premier support de données mobile (300) des données qui ont été chiffrées au moyen d'un deuxième algorithme de chiffrement. La liaison de l'adaptateur de chiffrement de données (100) avec l'installation stationnaire (200) consiste à établir une liaison d'échange de données entre l'adaptateur de chiffrement de données (100) et le deuxième support de données ou la deuxième unité d'évaluation de données de l'installation stationnaire (200) pour des données qui ont été chiffrées au moyen d'un premier algorithme de chiffrement. La présente invention concerne en outre un adaptateur de chiffrement de données (100).
EP11764106.8A 2010-09-23 2011-09-23 Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données Withdrawn EP2652662A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102010046229A DE102010046229A1 (de) 2010-09-23 2010-09-23 Verfahren zum verschlüsselten Übertragen von Daten aus einem mobilen Datenträger auf eine stationäre Einrichtung sowie Datenverschlüsselungsadapter
US38703210P 2010-09-28 2010-09-28
PCT/EP2011/004766 WO2012038088A1 (fr) 2010-09-23 2011-09-23 Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données

Publications (1)

Publication Number Publication Date
EP2652662A1 true EP2652662A1 (fr) 2013-10-23

Family

ID=44735875

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11764106.8A Withdrawn EP2652662A1 (fr) 2010-09-23 2011-09-23 Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données

Country Status (4)

Country Link
US (1) US20120076299A1 (fr)
EP (1) EP2652662A1 (fr)
DE (1) DE102010046229A1 (fr)
WO (1) WO2012038088A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577761B (zh) * 2013-10-25 2017-04-05 北京奇虎科技有限公司 一种在移动设备中处理隐私数据的方法和装置
CN105760789A (zh) * 2016-02-19 2016-07-13 山东超越数控电子有限公司 一种加密移动固态硬盘加密密钥的保护方法
CN105939192A (zh) * 2016-02-29 2016-09-14 杭州迪普科技有限公司 数据加密的方法及装置
DK3491772T1 (da) * 2016-07-29 2019-09-16 Permanent Privacy Ltd Applikationer i forbindelse med sikker kryptering

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1056034B8 (fr) * 1993-11-09 2003-10-08 Fujitsu Limited Adapteur de communication de données
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
ES2283095T3 (es) * 1999-11-22 2007-10-16 A-Data Technology Co., Ltd. Tarjeta de memoria de interfaz doble y modulo de adaptacion para la misma.
US20020076962A1 (en) * 2000-12-18 2002-06-20 Williams John W. Secure USB port and connector for wearable and portable computers
GB2378539B (en) * 2001-09-05 2003-07-02 Data Encryption Systems Ltd Apparatus for and method of controlling propagation of decryption keys
US7412553B2 (en) * 2002-01-10 2008-08-12 O2Micro International Limited Enhanced protocol conversion system capable of providing offloaded protocol instruction processing
US7216108B2 (en) * 2002-08-14 2007-05-08 Itron, Inc. Transferable meter licenses using smartcard technology
US7409563B2 (en) * 2003-07-22 2008-08-05 Lockheed Martin Corporation Method and apparatus for preventing un-authorized attachment of computer peripherals
US20070033320A1 (en) * 2005-08-05 2007-02-08 Wu Victor C Crypto pass-through dangle
US7452244B2 (en) * 2005-09-15 2008-11-18 Apple Inc. Connector system facilitating connection between connectors designed for different protocols
US8761402B2 (en) * 2007-09-28 2014-06-24 Sandisk Technologies Inc. System and methods for digital content distribution

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None *
See also references of WO2012038088A1 *

Also Published As

Publication number Publication date
US20120076299A1 (en) 2012-03-29
WO2012038088A1 (fr) 2012-03-29
DE102010046229A1 (de) 2012-03-29

Similar Documents

Publication Publication Date Title
DE102009030092A1 (de) Ladekabelstecker für Elektrofahrzeuge
EP2416978A1 (fr) Dispositif de verrouillage de câble de charge et procédé pour verrouiller un câble
EP2201535B1 (fr) Dispositif de verrouillage
WO2012038088A1 (fr) Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données
WO2010034741A1 (fr) Adaptateur et procédé de raccordement d'un récepteur électrique à une station de charge d'un réseau électrique
DE212010000037U1 (de) Mechatronische schliessvorrichtung
DE102007005638A1 (de) Verfahren zur Autorisierung des Zugriffs auf mindestens eine Automatisierungskompente einer technischen Anlage
EP3700774A1 (fr) Colonne de charge pour fournir de l'énergie électrique
EP2649592A1 (fr) Cassette pour argent avec cachet électronique
WO2020239795A1 (fr) Système de déverrouillage et ensemble serrure comprenant un système de déverrouillage de ce type
DE102007008652A1 (de) Chipkarte mit einer Erstnutzerfunktion, Verfahren zur Wahl einer Kennung und Computersystem
DE102011081207A1 (de) Verschliessvorrichtung
DE102020112966B3 (de) Betätigungsvorrichtung für einen Hydranten, Hydrantensystem und Wasserentnahmearmatur
EP2850860B1 (fr) Système de sécurité d'un compteur d'énergie servant à lutter contre un accès non autorisé
EP3465850A1 (fr) Armoire de distribution de chantier mobile et serveur pour commander un dispositif de commande d'une armoire de chantier mobile
WO2014037070A1 (fr) Procede de creation d'une instance derivee d'un support de donnees d'origine
EP2816777B1 (fr) Réseau informatique, noeuds de réseau et procédé de mise à disposition d'informations de certification
DE102021101257A1 (de) Satz von Vorrichtungen für eine elektronische Zigarette, Verpackung zur Aufnahme von mehreren Vorrichtungen für eine elektronische Zigarette, Basiselement für eine elektronische Zigarette und elektronische-Zigarette-System
EP3093072B1 (fr) Procede de securisation de documents deposes dans des cassettes de dechiqueteuses verrouillables contre l'acces non autorise et systeme d'execution du procede
DE10259270A1 (de) Personalisierung von Sicherheitsmoduln
DE202015102219U1 (de) Aktenvernichter mit einer Anordnung zum Sichern von in einer Kassette abgelegten Dokumenten gegen unberechtigten Zugriff
EP1533937A1 (fr) Procédé d'authentification d'un objet
EP2823598B1 (fr) Procédé d'établissement d'une instance dérivée
EP3806383A1 (fr) Procédé d'association d'un compteur à un module de communication
DE102009045818B4 (de) Aufnahmeeinrichtung zur Aufnahme eines Datenspeichers, Datenspeichersystem sowie Verfahren zur Entnahme eines Datenspeichers aus der Aufnahmeeinrichtung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20130812

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: KOEMMERLING, OLIVER

RIN1 Information on inventor provided before grant (corrected)

Inventor name: KOEMMERLING, OLIVER

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20170629

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20171110