EP2652662A1 - Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données - Google Patents
Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de donnéesInfo
- Publication number
- EP2652662A1 EP2652662A1 EP11764106.8A EP11764106A EP2652662A1 EP 2652662 A1 EP2652662 A1 EP 2652662A1 EP 11764106 A EP11764106 A EP 11764106A EP 2652662 A1 EP2652662 A1 EP 2652662A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- stationary device
- adapter
- mobile
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R31/00—Coupling parts supported only by co-operation with counterpart
- H01R31/005—Intermediate parts for distributing signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R27/00—Coupling parts adapted for co-operation with two or more dissimilar counterparts
- H01R27/02—Coupling parts adapted for co-operation with two or more dissimilar counterparts for simultaneous co-operation with two or more dissimilar counterparts
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R31/00—Coupling parts supported only by co-operation with counterpart
- H01R31/06—Intermediate parts for linking two coupling parts, e.g. adapter
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present invention relates to a method for the encrypted transmission of data from a mobile, first data carrier to a stationary device according to claim 1. It further relates to a data encryption adapter according to claim 6 or 7.
- An object of the present invention is to provide a method for (re)
- the method according to the invention serves for the encrypted transmission of data from a mobile, first data carrier to a stationary device or the preparation of an encrypted transmission between the mobile, first data carrier and the stationary device.
- the stationary device may be stationary such as screwed and always provided for use in the same place. In other embodiments of the invention, however, it is mobile or non-stationary, differing from its name.
- the method of the invention includes connecting a data encryption adapter to the stationary device to establish a communication link between the data encryption adapter and the stationary device.
- the data encryption adapter according to the invention is suitable and / or provided and / or configured for use in a method according to the invention.
- the data encryption adapter according to the invention is suitable and / or provided for connection to a stationary device.
- Advantageous developments of the present invention are the subject of subclaims and embodiments.
- Embodiments of the invention may include one or more of the features mentioned below.
- the method according to the invention serves to transmit encrypted data from a mobile, first data carrier to the data encryption adapter by means of a second encryption algorithm, then to encrypt this data with a first encryption algorithm from the data encryption adapter to the stationary device or a second data carrier or a second data carrier Data evaluation unit of the stationary device to transfer.
- the - in some embodiments according to the invention electrically or electronically configured - data encryption adapter has in certain embodiments a first interface, which is configured to encrypted data encrypted by means of a first encryption algorithm, encrypted with the second volume or a second data evaluation unit of the stationary device or to be transmitted to this.
- the data encryption adapter is provided in certain embodiments and / or configured and / or configured to receive the mobile, first
- the data encryption adapter is provided and / or configured and / or configured for data transmission with the mobile, first volume.
- the recording of the mobile, first data carrier is in certain embodiments, a signal transmission-effective recording, for example, suitable and / or provided for data exchange via infrared, Bluetooth, WLAN, by means of electronically routed signals or the like.
- the data encryption adapter has a second interface that is provided to exchange data with the mobile first volume that has been encrypted using a second encryption algorithm.
- Data encryption adapter with the stationary device to establish or generate a, preferably permanent, data exchange connection between the data encryption adapter and the second data carrier or the second
- Data evaluation unit of the stationary device for exchanging or transmitting data which has been encrypted by means of a first encryption algorithm.
- the mobile, first volume is a rechargeable, mobile volume of a customer.
- the mobile, first volume is a rechargeable, mobile volume of a customer.
- data carrier is intended and / or configured to receive data, possibly in a suitably converted form.
- data possibly in a suitably converted form.
- These are, for example, data that contain or reflect a credit amount for consumption by the customer, eg for electricity, telephone, mobile radio or the like.
- the first, mobile data carrier can be configured as a USB stick, SIM card, SD card, chip card, magnetic stripe card and the like.
- the second volume of the stationary device is a chip, microchip, etc.
- the second data evaluation unit of the stationary device is in certain
- Embodiments an electronic counter.
- the second data carrier or the second data evaluation unit serve, in certain embodiments of the present invention, to store data, i. H. Information, eg. B. on a credit amount to record.
- the stationary one is
- a wall-mounted meter eg. B. in a household or operation of the customer, for example, an electricity meter, a gas meter, a water meter or the like.
- the first encryption algorithm may be a publicly known or known - e.g. For example, be misleading - encryption algorithm.
- the first encryption algorithm in certain embodiments, is an algorithm formerly known as the stationary device and communicates the mobile first data carrier without a data encryption adapter before it became known, and by which it still communicates - now using a data encryption adapter according to the invention.
- the first encryption algorithm can be stored on the second data carrier and / or in the second data evaluation unit of the stationary device.
- the first encryption algorithm is deposited on the data encryption adapter, such as on a memory unit or chip, memory chip, microchip, and the like of the data encryption adapter.
- the chip or storage unit of the data encryption adapter has an up-to-date security standard.
- encryption algorithm as used herein in relation to the first and second encryption algorithms, in certain embodiments, is to be understood as an algorithm to be used for both encryption and corresponding decryption.
- Encryption algorithm can be used.
- the first and second encryption algorithms are specific
- Embodiments of mutually different encryption algorithms This is particularly desirable and advantageous in cases where a
- Encryption algorithm - generally the first encryption algorithm - made known and, for example, was or could be the target of fraud attempts.
- the second encryption algorithm is freely selectable among already known standard algorithms or is a future developed encryption algorithm.
- the second encryption algorithm may be a new encryption algorithm, at least one encryption algorithm not yet known to the public (or recognized by it) or made accessible.
- the second encryption algorithm in certain embodiments, is deposited on the data encryption adapter (on the same or a different chip, memory chip, etc. of the data encryption adapter).
- the second encryption algorithm is preferably likewise stored on the mobile, first data carrier.
- data exchange refers to a process in which a first, in particular electrical or electronic, component transmits, transmits, transmits or the like data, and in which a second, in particular electrical or electronic, component takes this data, stores, converts if necessary, etc.
- data transmission refers to a data transmission, in particular a predominantly unilateral data exchange, between a first and a second electrical or electronic component, eg a data transmission from the mobile, first data carrier to the data encryption adapter or the data encryption adapter to the stationary device or the second data carrier or the second data evaluation unit of the stationary device
- the transmission of the encrypted data itself can be encrypted or unencrypted If an encrypted transmission of data is mentioned in connection with this invention, then the transmission as such is encrypted, and / or encrypted data can be encrypted or transmitted unencrypted or exchanged.
- a data exchange or transfer may, in certain embodiments, include encrypting and / or decrypting and / or converting the data, and the like.
- the achieved connection of the electronic data encryption adapter to the stationary device is permanent.
- Embodiments a positive and / or non-positive and / or
- a connection achieved is "permanent" if it is not transient and / or not (by normal means and / or with the application of little effort) is solvable.
- a connection is permanent if it can only be solved by destruction.
- a connection achieved is "permanent" if it is designed to last, for example, for the remaining use time or remaining life of the components used or all components involved in the connection.
- Establishment takes place in certain embodiments of the method according to the invention including an intended for a mobile disk insertion (or insertion opening) of the stationary device.
- connection of the data encryption adapter to the stationary device is solely via the insertion opening provided on the stationary device.
- the insertion opening is, in some embodiments of the present invention, the opening that was previously or provided by the manufacturer for receiving the first, mobile data carrier. According to the invention, the insertion opening is now provided in certain embodiments, to receive the data encryption adapter instead of the mobile, first data carrier.
- the method of the invention includes writing the mobile, first volume to data encrypted using the second encryption algorithm.
- the second - stationary or non-stationary - device is a device provided at a location other than the first stationary device. This can, for. A charging unit or station or device in a shop.
- the second stationary or non-stationary device (charging station) describes the mobile, first data carrier with data using a second data encryption adapter.
- the second data encryption adapter z. B. also be used on the charger.
- the second data carrier or the second data evaluation unit of the first stationary device is an electronic electricity meter. In certain embodiments, the second data carrier or the second data evaluation unit is provided in or on an electronic electricity meter.
- the data encryption adapter according to the invention has, in certain embodiments, a first interface and a second interface.
- the first interface is provided and / or configured to encrypted or encrypted data encrypted by a first encryption algorithm with the second volume or a second data evaluation unit of the stationary device.
- the data encryption adapter according to the invention is provided and / or configured and / or configured in certain embodiments for receiving the mobile, first data carrier and / or for data transmission with the mobile, first data carrier by means of a second encryption algorithm.
- the second interface is provided to receive data from the mobile, first volume.
- the data is encrypted in certain embodiments with a second encryption algorithm.
- the data encryption adapter of the invention comprises means provided and / or configured to convert the data encrypted by the first encryption algorithm into data encrypted by the second encryption algorithm and / or vice versa.
- the data encryption adapter of the invention includes means for permanently locking and / or otherwise connecting it to the - preferably only - stationary device.
- the locking of the data encryption adapter to the stationary device is in certain embodiments an irreversible, non-detachable, and / or only destructive, i. H. with the application of raw force or force, locking to be released, in any case a lock which is not solvable with simple manual actions and / or with little mechanical effort (eg not by simply pushing in and pulling out or by clipping using one of his Snap easily releasable clips and the like).
- the data encryption adapter in certain embodiments, includes means for its exclusive or assistive permanent locking and / or otherwise connecting in a stationary device insertion port provided for a mobile data carrier.
- the lock or connection is irreversible or only destructively releasable in certain embodiments.
- the means for joining or interlocking with or with the stationary means is or includes at least one clamping means, latch means, snap-in means, hooking means, clamping means or the like.
- the device is a mechanical clamp that locks in place as soon as the data encryption adapter is inserted into the stationary device.
- the data encryption adapter may be a molded, welded, glued, and / or the like configured unit that is or will not be releasably anchored in or on the stationary device.
- the data encryption adapter is sealed or sealed to the stationary device.
- the means for connecting or locking after properly connecting or locking the data encryption adapter in or on the stationary device is only destructively, at least demonstrably (e.g., at the break of the seal or seal), detachable from the stationary device.
- the first interface is provided and / or configured to exchange data which is encrypted by means of a first encryption algorithm with the second data carrier or a second data evaluation unit of the stationary device.
- the data exchange can be encrypted or unencrypted.
- the second interface is provided and / or configured to receive data from a different volume than the second volume or a second stationary unit data evaluation unit encoded by the second encryption algorithm.
- the data encryption adapter is provided and / or designed for data transmission with a mobile, first data carrier designed as a SIM card or SD card.
- the originally used second stätionäre or non-stationary device which z. B. may be a charging station, kept unchanged. In other embodiments of the invention it is exchanged for another or another second stätionäre or non-stationary device used.
- the present invention advantageously provides a method for transmitting encrypted, substantially access-safe data and a data encryption adapter that can be used in this method.
- the data encryption adapter according to the invention can advantageously be used in cases in which, in an existing data transmission system, a first encryption algorithm used is already publicly known and thus made unusable.
- a first encryption algorithm used is already publicly known and thus made unusable.
- Certain embodiments is an advantageous little complicated and easy to use and implement with little effort complement.
- the inventive data encryption adapter is not detachably locked in the stationary device in certain embodiments, it is advantageously possible to prevent access to, for example, a credit booking system by fraudsters or to prove their unauthorized access on the basis of the destroyed data encryption adapter. Since an electronic access to the connection points between the data encryption adapter and the stationary device only by violent removal, for. B. Breaking out of the data encryption adapter from the stationary device is possible, it can be advantageously ensured protection of the system from misuse.
- the data encryption adapter both at a first stationary device in the household and at a second stationary or non-stationary device in the shop. Since the data encryption adapter can each be designed the same, the design effort can be advantageously kept low, which in turn contributes to the advantageous cost savings.
- Fig. 1 shows schematically a perspective side view of a
- Fig. 2 shows in perspective a horizontal longitudinal section through an arranged on a stationary device according to the invention
- FIG. 3 shows in perspective an arrangement of a mobile, first data carrier on a data encryption adapter according to the invention, which is arranged on the stationary device as in Fig. 2;
- Fig. 4 shows in perspective a stationary device which a
- Fig. 5 illustrates schematically a simplified principle of the
- FIG. 6 schematically illustrates a method of data transmission by means of the data encryption adapter according to the invention.
- Fig. 7 illustrates a method of data transfer between a first stationary device and a second stationary device using data encryption adapters according to the invention.
- the data encryption adapter 100 has a first area 101 which is provided and / or configured and / or configured to accommodate a mobile, first data carrier (not shown in FIG. 1).
- the data encryption adapter 100 has a second area 103 which is suitable and provided and / or configured for connection to a stationary device (also not shown in FIG. 1).
- the data encryption adapter 100 has a first device 1, which is suitable and provided for locking the data encryption adapter 100 in the stationary device.
- the second device 3 is configured as a tilting device and is suitable and provided for locking the data encryption adapter 100 in an insertion opening provided for the mobile, first data carrier (not shown in FIG. 1) of the stationary device.
- the second device 3 can be tilted about a tilt axis 31, which is mounted in the stationary device during use.
- the second device 3 as well as a tilting axis 31 for connecting the data encryption adapter 100 in the stationary device is not required. Any other connection that does not rely on the second device 3 is also included in the invention. It can turn in certain
- Fig. 2 shows in perspective a horizontal longitudinal section through an arranged on a stationary device 200 according to the invention
- Data encryption adapter 100 It can be seen a U-profile-like illustrated
- the receptacle 5 serves to receive a mobile, not shown in Fig. 2, first
- the stationary device 200 is only partially shown in the area provided for receiving the data encryption adapter 100 portion. It is also shown in section.
- the stationary device 200 has a receiving region 201, which, as shown in FIG. 2, for receiving the second region 103 of FIG.
- Data encryption adapter 100 is provided.
- the data encryption adapter 100 is indissolubly arranged after its latching in the stationary device 200:
- the data encryption adapter 100 is so inserted in the region of its second region 103 in the stationary device 200, etc., that the First means 1 for locking, for example - as shown in Fig. 2 by way of example - in the form of a latching device, not detachable behind, based on the direction of insertion, insertion, etc. of the data encryption adapter 100, a blocking device 203 of the stationary device 200 is arranged.
- the non-destructible detachable assembly of the data encryption adapter 100 in or on the stationary device 200 is constructed purely mechanically by a male / female connection.
- FIG. 3 shows a perspective view of an arrangement of a mobile, first data carrier 300 on the data encryption adapter 100 according to the invention.
- the data carrier 300 is inserted into the receptacle 5.
- the data encryption adapter 100 is arranged on a stationary device 200 or latched in the stationary device 200.
- the mobile, first data carrier 300 is designed as a USB stick.
- the mobile, first data carrier can be designed as a SIM card or SD card or have such a card.
- Fig. 4 shows in perspective a stationary device 200, which a
- Data encryption adapter 100 inserted mobile, first volume 300 has.
- Data carrier 300 provided insertion 205 of the stationary device 200 arranged or undetachably locked or latched in this.
- the stationary device 200 can, as shown by way of example in FIG. 4,
- FIG. 5 schematically illustrates a principle of data transmission by means of the data encryption adapter 100 according to the invention with reference to a vertical section through a device arranged on a stationary device 200
- FIGS. 6 and 7 - indicate a data transmission between the relevant components or the possibility of such a data transmission. They can be understood as the representation of an interface in each case.
- the data encryption adapter 100 is permanently and permanently attached to or plugged into the stationary device 200: first one
- Means 1 for locking are - in the direction of insertion of the
- Unrecognized unlawful removal of the data encryption adapter 100 from the stationary device 200, such that the use of the insertion opening and or lying in their depth electronic connections should be possible again, can thus advantageously safe depending on the specific embodiment
- the flash shown on the left in FIG. 5 indicates the data transmission between the mobile first data carrier 300 and the data encryption adapter 100 or a contact with the second interface of the data encryption adapter 100.
- the flash shown on the right in FIG. 5 indicates the data transmission between the stationary device 200 and the data encryption adapter 100 or a contact with the first interface of the data encryption adapter 100.
- FIG. 6 schematically illustrates a method of data transmission by means of the data encryption adapter 100 according to the invention.
- the upper portion of FIG. 6 schematically shows a data encryption adapter 100 having a first interface 105 and a second interface 107.
- the first interface 105 is for data transmission between the inventive data encryption adapter 100 and the stationary device 200 (not shown in FIG. 6).
- the second interface 107 serves to transfer data between the data encryption adapter 100 according to the invention and the mobile, first data carrier 300 (not shown in FIG. 6).
- Data encryption adapter 100 is done using a second one
- the second encryption algorithm is preferably a new encryption algorithm, in particular one for securing the
- the second encryption algorithm differs from the first encryption algorithm.
- Discrimination in some embodiments of the invention is such that data encrypted using the first encryption algorithm can not be decrypted with the second encryption algorithm or its decryption counterpart, and / or vice versa.
- the data encrypted with the second encryption algorithm is stored on the mobile, first data carrier 300.
- the data encrypted with the second encryption algorithm is transferred to the
- the data encryption adapter 100 receives the data transmitted from the mobile, first data carrier 300 (step S1). In a step S2, the data encryption adapter 100 decrypts the data encrypted with the second encryption algorithm and evaluates the information stored in the data, e.g. B. a sum of money for a particular
- the data encryption adapter 100 encrypts the data in step S2 with a first encryption algorithm.
- the first encryption algorithm may be an already known or unauthorized decrypted
- step S3 the data encryption adapter 100 according to the invention transmits the data encrypted with the first encryption algorithm to the stationary device 200 via the first interface 105.
- the method according to the invention serves the encrypted
- FIG. 7 illustrates a method of data transfer between a first stationary device 200a and a second stationary device 200b using the data encryption adapter 100 of the present invention or multiple copies thereof.
- the second stationary device 200b is, for example, a charging station for charging the first mobile data carrier 300 in a shop.
- the charging station is used for encrypted writing the first, mobile data carrier 300 with data which z. B. a balance (power consumption, mobile phone use, etc.) correspond.
- the encryption takes place by means of the second encryption algorithm.
- the first stationary device 200a is, for example, an electricity meter in one
- Charging / increasing a power quota limited may be used for any conceivable purpose of increasing a credit on a first stationary device 200a disposed by the second (stationary or non-stationary) device 200b.
- a charging process of an electricity meter with a credit amount for the power consumption of a household will be described.
- a first data encryption adapter 100a is provided on a first stationary device 200a and in particular non-detachably locked therein.
- the first one is
- Data encryption adapter 100a arranged in common with a first stationary device 200a in a private household.
- a second data encryption adapter 100b is at a second stationary adapter
- Data encryption adapter 100b and second stationary device 200b are located in a retail store.
- the mobile first volume 300 is mobile between the first stationary device 200a and the second stationary device 200b, e.g. B. carried by a customer for charging purposes. To charge the mobile, first data carrier 300, this is taken by the customer to the second stationary device 200b.
- the mobile first volume 300 is inserted into the second data encryption adapter 100b located at the second stationary device 200b.
- the data associated with a particular credit (desired by the customer) (eg, entered manually into the second stationary device 200b via a keyboard) is stored in the second stationary device 200b with a first one
- the data encrypted with the first encryption algorithm is transmitted to the second data encryption adapter 100b via a first interface 105b of the second data encryption adapter 100b.
- Data encryption adapter 100b receives the data of second stationary device 200b in step S3b.
- step S2b the second data encryption adapter 100b decrypts the data encrypted with the first encryption algorithm and encrypts the data with a second (not publicly known) encryption algorithm.
- step S1 b the data encrypted with the second encryption algorithm is transmitted to the mobile first data carrier 300 via the second interface 107b of the second data encryption adapter 100b.
- the first data carrier 300 is plugged into the second data encryption adapter 200b for data transmission or otherwise connected to the data transmission (infrared, Bluetooth, etc.) to the second data encryption adapter 200b.
- the mobile first data carrier 300 described with the desired data can be taken from the location of the second stationary device 200b to the location of the first stationary device 200a.
- the mobile first data carrier 300 is there for data transmission with the first
- Data encryption adapter 100a connected (plugged into this, but in any case functionally coupled).
- step S1a the data transfer takes place with the second one
- step S2a Encryption algorithm encrypted data via the second interface 107a of the first data encryption adapter 100a to the first data encryption adapter 100a.
- step S2a the first data encryption adapter 100a decrypts the data encrypted with the second encryption algorithm and encrypts it with the (first known) encryption algorithm.
- step S3a the first data encryption adapter 100a transmits the data encrypted with the first encryption algorithm to the first stationary device 200a via the first interface 05a of the first data encryption adapter 100a.
- the data which are available, for example, for a specific balance of electricity contingent of a household, can now be stored on the electricity meter (corresponding to the first stationary device 200a).
- the method described there can also be executed by means of only one data encryption adapter 100.
- the data at the charging station 200b could already be encrypted by means of the second (publicly not disclosed) encryption algorithm.
- a Umver finallylung, as shown in the left half of Fig. 7, can be advantageously eliminated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102010046229A DE102010046229A1 (de) | 2010-09-23 | 2010-09-23 | Verfahren zum verschlüsselten Übertragen von Daten aus einem mobilen Datenträger auf eine stationäre Einrichtung sowie Datenverschlüsselungsadapter |
US38703210P | 2010-09-28 | 2010-09-28 | |
PCT/EP2011/004766 WO2012038088A1 (fr) | 2010-09-23 | 2011-09-23 | Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2652662A1 true EP2652662A1 (fr) | 2013-10-23 |
Family
ID=44735875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11764106.8A Withdrawn EP2652662A1 (fr) | 2010-09-23 | 2011-09-23 | Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données |
Country Status (4)
Country | Link |
---|---|
US (1) | US20120076299A1 (fr) |
EP (1) | EP2652662A1 (fr) |
DE (1) | DE102010046229A1 (fr) |
WO (1) | WO2012038088A1 (fr) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577761B (zh) * | 2013-10-25 | 2017-04-05 | 北京奇虎科技有限公司 | 一种在移动设备中处理隐私数据的方法和装置 |
CN105760789A (zh) * | 2016-02-19 | 2016-07-13 | 山东超越数控电子有限公司 | 一种加密移动固态硬盘加密密钥的保护方法 |
CN105939192A (zh) * | 2016-02-29 | 2016-09-14 | 杭州迪普科技有限公司 | 数据加密的方法及装置 |
DK3491772T1 (da) * | 2016-07-29 | 2019-09-16 | Permanent Privacy Ltd | Applikationer i forbindelse med sikker kryptering |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1056034B8 (fr) * | 1993-11-09 | 2003-10-08 | Fujitsu Limited | Adapteur de communication de données |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
ES2283095T3 (es) * | 1999-11-22 | 2007-10-16 | A-Data Technology Co., Ltd. | Tarjeta de memoria de interfaz doble y modulo de adaptacion para la misma. |
US20020076962A1 (en) * | 2000-12-18 | 2002-06-20 | Williams John W. | Secure USB port and connector for wearable and portable computers |
GB2378539B (en) * | 2001-09-05 | 2003-07-02 | Data Encryption Systems Ltd | Apparatus for and method of controlling propagation of decryption keys |
US7412553B2 (en) * | 2002-01-10 | 2008-08-12 | O2Micro International Limited | Enhanced protocol conversion system capable of providing offloaded protocol instruction processing |
US7216108B2 (en) * | 2002-08-14 | 2007-05-08 | Itron, Inc. | Transferable meter licenses using smartcard technology |
US7409563B2 (en) * | 2003-07-22 | 2008-08-05 | Lockheed Martin Corporation | Method and apparatus for preventing un-authorized attachment of computer peripherals |
US20070033320A1 (en) * | 2005-08-05 | 2007-02-08 | Wu Victor C | Crypto pass-through dangle |
US7452244B2 (en) * | 2005-09-15 | 2008-11-18 | Apple Inc. | Connector system facilitating connection between connectors designed for different protocols |
US8761402B2 (en) * | 2007-09-28 | 2014-06-24 | Sandisk Technologies Inc. | System and methods for digital content distribution |
-
2010
- 2010-09-23 DE DE102010046229A patent/DE102010046229A1/de not_active Withdrawn
-
2011
- 2011-09-23 US US13/242,750 patent/US20120076299A1/en not_active Abandoned
- 2011-09-23 WO PCT/EP2011/004766 patent/WO2012038088A1/fr unknown
- 2011-09-23 EP EP11764106.8A patent/EP2652662A1/fr not_active Withdrawn
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2012038088A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20120076299A1 (en) | 2012-03-29 |
WO2012038088A1 (fr) | 2012-03-29 |
DE102010046229A1 (de) | 2012-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102009030092A1 (de) | Ladekabelstecker für Elektrofahrzeuge | |
EP2416978A1 (fr) | Dispositif de verrouillage de câble de charge et procédé pour verrouiller un câble | |
EP2201535B1 (fr) | Dispositif de verrouillage | |
WO2012038088A1 (fr) | Procédé de transmission chiffrée de données d'un support de données mobile à une installation stationnaire ainsi qu'adaptateur de chiffrement de données | |
WO2010034741A1 (fr) | Adaptateur et procédé de raccordement d'un récepteur électrique à une station de charge d'un réseau électrique | |
DE212010000037U1 (de) | Mechatronische schliessvorrichtung | |
DE102007005638A1 (de) | Verfahren zur Autorisierung des Zugriffs auf mindestens eine Automatisierungskompente einer technischen Anlage | |
EP3700774A1 (fr) | Colonne de charge pour fournir de l'énergie électrique | |
EP2649592A1 (fr) | Cassette pour argent avec cachet électronique | |
WO2020239795A1 (fr) | Système de déverrouillage et ensemble serrure comprenant un système de déverrouillage de ce type | |
DE102007008652A1 (de) | Chipkarte mit einer Erstnutzerfunktion, Verfahren zur Wahl einer Kennung und Computersystem | |
DE102011081207A1 (de) | Verschliessvorrichtung | |
DE102020112966B3 (de) | Betätigungsvorrichtung für einen Hydranten, Hydrantensystem und Wasserentnahmearmatur | |
EP2850860B1 (fr) | Système de sécurité d'un compteur d'énergie servant à lutter contre un accès non autorisé | |
EP3465850A1 (fr) | Armoire de distribution de chantier mobile et serveur pour commander un dispositif de commande d'une armoire de chantier mobile | |
WO2014037070A1 (fr) | Procede de creation d'une instance derivee d'un support de donnees d'origine | |
EP2816777B1 (fr) | Réseau informatique, noeuds de réseau et procédé de mise à disposition d'informations de certification | |
DE102021101257A1 (de) | Satz von Vorrichtungen für eine elektronische Zigarette, Verpackung zur Aufnahme von mehreren Vorrichtungen für eine elektronische Zigarette, Basiselement für eine elektronische Zigarette und elektronische-Zigarette-System | |
EP3093072B1 (fr) | Procede de securisation de documents deposes dans des cassettes de dechiqueteuses verrouillables contre l'acces non autorise et systeme d'execution du procede | |
DE10259270A1 (de) | Personalisierung von Sicherheitsmoduln | |
DE202015102219U1 (de) | Aktenvernichter mit einer Anordnung zum Sichern von in einer Kassette abgelegten Dokumenten gegen unberechtigten Zugriff | |
EP1533937A1 (fr) | Procédé d'authentification d'un objet | |
EP2823598B1 (fr) | Procédé d'établissement d'une instance dérivée | |
EP3806383A1 (fr) | Procédé d'association d'un compteur à un module de communication | |
DE102009045818B4 (de) | Aufnahmeeinrichtung zur Aufnahme eines Datenspeichers, Datenspeichersystem sowie Verfahren zur Entnahme eines Datenspeichers aus der Aufnahmeeinrichtung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130812 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: KOEMMERLING, OLIVER |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: KOEMMERLING, OLIVER |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20170629 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20171110 |