ES2530625T3 - Método para detectar infracciones del límite de velocidad de un vehículo - Google Patents

Método para detectar infracciones del límite de velocidad de un vehículo Download PDF

Info

Publication number
ES2530625T3
ES2530625T3 ES12455003T ES12455003T ES2530625T3 ES 2530625 T3 ES2530625 T3 ES 2530625T3 ES 12455003 T ES12455003 T ES 12455003T ES 12455003 T ES12455003 T ES 12455003T ES 2530625 T3 ES2530625 T3 ES 2530625T3
Authority
ES
Spain
Prior art keywords
key
evidence data
ibe
road system
session key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES12455003T
Other languages
English (en)
Inventor
Alexander Abl
Stefan Rass
Peter Schartner
Patrick Horster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kapsch TrafficCom AG
Original Assignee
Kapsch TrafficCom AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kapsch TrafficCom AG filed Critical Kapsch TrafficCom AG
Application granted granted Critical
Publication of ES2530625T3 publication Critical patent/ES2530625T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/052Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
    • G08G1/054Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed photographing overspeeding vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Un método para detectar una infracción de la velocidad de un vehículo que se desplaza desde un primer sistema de carretera (G1) hasta un segundo sistema de carretera (G2), que comprende: establecer parámetros públicos y privados (g, pG), incluyendo una base de módulo común (pG), de un esquema de cifrado basado en identidad (IBE) en un centro de generación de claves (KGC) y los sistemas de carretera, primero y segundo (G1, G2); capturar al menos un identificador (LPN) del vehículo y una primera marca de tiempo (t) en el primer sistema de carretera (G1) como primeros datos de evidencia (D), utilizar al menos el primer identificador (LPN) y la primera marca de tiempo (t) como una primera identidad para generar una primera clave pública de IBE (PK1,t), cifrar los primeros datos de evidencia (D) con una primera clave de sesión aleatoria (K), cifrar la primera clave de sesión aleatoria (K) con la primera clave pública de IBE (PK1,t), y suprimir los primeros datos de evidencia (D) y la primera clave de sesión aleatoria (K) en el primer sistema de carretera (G1); capturar al menos un identificador (LPN) del vehículo y una segunda marca de tiempo (t) en el segundo sistema de carretera (G2) como segundos datos de evidencia(D), utilizar al menos el segundo identificador (LPN) y la segunda marca de tiempo (t) como una segunda identidad para generar una segunda clave pública de IBE (PK2,t), cifrar los segundos datos de evidencia (D) con una segunda clave de sesión aleatoria (K), cifrar la segunda clave de sesión aleatoria (K) con la segunda clave pública de IBE (PK2,t), y suprimir los segundos datos 20 de evidencia (D) y la segunda clave de sesión aleatoria (K) en el segundo sistema de carretera (G2); calcular una relación (V) de las claves públicas, primera y segunda, (PK1,t, PK2,t), modular la base de módulo común (pG), y buscar la relación (V) en una tabla de relaciones (V) pre-calculadas para un conjunto de diferencias de tiempo entre dichas primera y segunda marcas de tiempo (t), conjunto que representa las infracciones de la velocidad, y, cuando la búsqueda es fructuosa: recuperar al menos una clave privada de IBE (SK1, SK2) para al menos una de dichas claves públicas de IBE (PK1,t, PK2,t) desde el centro de generación de claves (KGC), descifrar al menos una de dichas claves de sesión cifradas (EK) con dicha clave privada (SK1, SK2), y descifrar al menos uno de dichos datos de evidencia cifrados (ED) con dicha clave de sesión descifrada (K).
ES12455003T 2012-04-06 2012-04-06 Método para detectar infracciones del límite de velocidad de un vehículo Active ES2530625T3 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP12455003.9A EP2648170B1 (en) 2012-04-06 2012-04-06 A method for detecting a speed violation of a vehicle

Publications (1)

Publication Number Publication Date
ES2530625T3 true ES2530625T3 (es) 2015-03-04

Family

ID=45929480

Family Applications (1)

Application Number Title Priority Date Filing Date
ES12455003T Active ES2530625T3 (es) 2012-04-06 2012-04-06 Método para detectar infracciones del límite de velocidad de un vehículo

Country Status (8)

Country Link
US (1) US8964984B2 (es)
EP (1) EP2648170B1 (es)
CA (1) CA2803840C (es)
DK (1) DK2648170T3 (es)
ES (1) ES2530625T3 (es)
PL (1) PL2648170T3 (es)
PT (1) PT2648170E (es)
SI (1) SI2648170T1 (es)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8661263B2 (en) * 2006-09-29 2014-02-25 Protegrity Corporation Meta-complete data storage
EP2838075A1 (de) * 2013-08-15 2015-02-18 VITRONIC Dr.-Ing. Stein Bildverarbeitungssysteme GmbH Verfahren und Vorrichtung zur Erfassung von Überschreitungen einer zulässigen Höchstgeschwindigkeit auf einem Streckenabschnitt
US9635054B2 (en) 2013-10-03 2017-04-25 Landis+Gyr Innovations, Inc. Securing communication within a network endpoint
US9412031B2 (en) * 2013-10-16 2016-08-09 Xerox Corporation Delayed vehicle identification for privacy enforcement
US9779284B2 (en) * 2013-12-17 2017-10-03 Conduent Business Services, Llc Privacy-preserving evidence in ALPR applications
ES2571152B1 (es) * 2014-11-21 2017-02-08 Omnivisión Seguridad, S.L. Un sistema y procedimiento para la detección automática y gestión de infracciones de tráfico
US9923719B2 (en) 2014-12-09 2018-03-20 Cryptography Research, Inc. Location aware cryptography
DE102016008267A1 (de) * 2016-07-07 2018-01-11 Giesecke+Devrient Mobile Security Gmbh Einrichtung eines sicheren Kommunikationskanals
KR101861923B1 (ko) * 2016-08-01 2018-05-28 동국대학교 경주캠퍼스 산학협력단 이동체 정보 보안 시스템 및 이를 이용한 이동체 정보 보안 방법
KR101932813B1 (ko) * 2016-10-14 2018-12-26 동국대학교 경주캠퍼스 산학협력단 이동체 정보 보안 시스템 및 이를 이용한 이동체 정보 보안 방법
WO2018212978A1 (en) * 2017-05-17 2018-11-22 Kwourz Research Llc Time-based encryption key derivation
US10396979B2 (en) * 2017-09-01 2019-08-27 Honda Motor Co., Ltd. Methods and systems for creating a unique identification number to maintain customer privacy
GB2580630B (en) * 2019-01-17 2021-03-24 Siemens Mobility Ltd Method and system for data collection in a road network
JP7508483B2 (ja) 2019-05-06 2024-07-01 ランディス・ギア イノベーションズ インコーポレイテッド ネットワークセキュリティをローカル接続されたエッジデバイスに拡張する方法
CN110166239B (zh) * 2019-06-04 2023-01-06 成都卫士通信息产业股份有限公司 用户私钥生成方法、系统、可读存储介质及电子设备
CN111654591B (zh) * 2020-04-29 2023-08-08 中国平安财产保险股份有限公司 图片防篡改方法、计算机设备及存储介质
CN112673278B (zh) * 2020-09-10 2022-01-11 华为技术有限公司 基于回波信号的速度探测方法和装置
CN113890730B (zh) * 2021-09-23 2024-09-20 上海华兴数字科技有限公司 数据传输方法及系统
CN114120474B (zh) * 2021-11-29 2024-06-07 广东九联科技股份有限公司 违规车辆自动报警系统
US11900801B2 (en) 2021-11-30 2024-02-13 International Business Machines Corporation Generating a speeding ticket using a persistently stored character code in a camera for masking information about characters of a number plate of a vehicle
CN116403408A (zh) * 2023-06-02 2023-07-07 浪潮通信信息系统有限公司 基于5g网络的交通数据处理方法、算力网关及存储介质
CN116824859B (zh) * 2023-07-21 2024-04-05 佛山市新基建科技有限公司 一种基于物联网的智慧交通大数据分析系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002332671A1 (en) * 2001-08-13 2003-03-03 Board Of Trustees Of The Leland Stanford Junior University Systems and methods for identity-based encryption and related cryptographic techniques
US8531520B2 (en) * 2002-04-05 2013-09-10 Siemens Industry, Inc. System and method for traffic monitoring
KR100571820B1 (ko) * 2003-10-20 2006-04-17 삼성전자주식회사 신원 정보를 기반으로 하는 암호 시스템에서의 컨퍼런스세션 키 분배 방법
US20060215837A1 (en) * 2004-12-18 2006-09-28 Hewlett-Packard Development Company, L.P. Method and apparatus for generating an identifier-based public/private key pair
US8094810B2 (en) * 2006-02-03 2012-01-10 Massachusetts Institute Of Technology Unidirectional proxy re-encryption
DE102007059346B4 (de) 2007-12-10 2009-11-19 Siemens Ag Verfahren und Vorrichtung zur Erfassung einer Geschwindigkeitsübertretung eines Fahrzeugs
ES2561803T3 (es) * 2009-08-31 2016-03-01 Accenture Global Services Limited Método implementado por ordenador para asegurar la privacidad de un usuario, producto de programa de ordenador, dispositivo
ATE557374T1 (de) 2010-01-21 2012-05-15 Kapsch Trafficcom Ag Verfahren zur erfassung von durchfahrten von fahrzeugen

Also Published As

Publication number Publication date
EP2648170A1 (en) 2013-10-09
US8964984B2 (en) 2015-02-24
PL2648170T3 (pl) 2015-05-29
EP2648170B1 (en) 2014-11-26
PT2648170E (pt) 2015-02-20
CA2803840C (en) 2019-01-08
US20130266139A1 (en) 2013-10-10
CA2803840A1 (en) 2013-10-06
DK2648170T3 (en) 2015-02-23
SI2648170T1 (sl) 2015-03-31

Similar Documents

Publication Publication Date Title
ES2530625T3 (es) Método para detectar infracciones del límite de velocidad de un vehículo
CO2018009236A2 (es) Determinación de un secreto común para el intercambio seguro de información y claves criptográficas deterministas y jerárquicas
GB2498039B (en) Password recovery service
BR112017017425A2 (pt) meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador
TR201907002T4 (tr) Mamul ürünleri fiziksel karakteristiği kullanarak işaretlemek için yöntem ve tertibat.
GB2528226A (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end
BR112018011353A2 (pt) método e sistema para provisão e armazenamento de chave criptografada distribuída via criptografia de curva elíptica
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
BR112018004741A2 (pt) método, e, dispositivo de acesso
EA201301077A1 (ru) Способ защиты информации в облачных вычислениях с использованием гомоморфного шифрования
WO2016057086A8 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
PH12015500102A1 (en) Method, device and system for encrypting and decrypting image
BR112016018486A8 (pt) sistema e método para proteger chaves de conteúdo entregues em arquivos de manifesto
WO2013068843A3 (en) Multi-key cryptography for encrypting file system acceleration
JP2017538353A5 (es)
BR112016024453A2 (pt) transporte seguro de máquinas virtuais criptografadas com acesso contínuo do proprietário
GB2530225A (en) Processing guest event in a hypervisor-controlled system
BR112015026372B8 (pt) Dispositivo de comunicação que reforça a segurança para um arquivo armazenado em uma unidade virtual
MX2014011953A (es) Deteccion de intrusion de red utilizando clave criptografica de señuelo.
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
BR112017008214A2 (pt) métodos e sistemas para interoperacionalidade de autenticação
MX2018014296A (es) Mecanismo de distribucion de software encriptado eficiente.
BR112018000325A2 (pt) separação de módulos de software por gerenciamento de chave de criptografia controlado
IN2014CN04110A (es)
PH12016502362B1 (en) Systems and methods for controlling media distribution