ES2530625T3 - Método para detectar infracciones del límite de velocidad de un vehículo - Google Patents
Método para detectar infracciones del límite de velocidad de un vehículo Download PDFInfo
- Publication number
- ES2530625T3 ES2530625T3 ES12455003T ES12455003T ES2530625T3 ES 2530625 T3 ES2530625 T3 ES 2530625T3 ES 12455003 T ES12455003 T ES 12455003T ES 12455003 T ES12455003 T ES 12455003T ES 2530625 T3 ES2530625 T3 ES 2530625T3
- Authority
- ES
- Spain
- Prior art keywords
- key
- evidence data
- ibe
- road system
- session key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/052—Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
- G08G1/054—Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed photographing overspeeding vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
- Storage Device Security (AREA)
Abstract
Un método para detectar una infracción de la velocidad de un vehículo que se desplaza desde un primer sistema de carretera (G1) hasta un segundo sistema de carretera (G2), que comprende: establecer parámetros públicos y privados (g, pG), incluyendo una base de módulo común (pG), de un esquema de cifrado basado en identidad (IBE) en un centro de generación de claves (KGC) y los sistemas de carretera, primero y segundo (G1, G2); capturar al menos un identificador (LPN) del vehículo y una primera marca de tiempo (t) en el primer sistema de carretera (G1) como primeros datos de evidencia (D), utilizar al menos el primer identificador (LPN) y la primera marca de tiempo (t) como una primera identidad para generar una primera clave pública de IBE (PK1,t), cifrar los primeros datos de evidencia (D) con una primera clave de sesión aleatoria (K), cifrar la primera clave de sesión aleatoria (K) con la primera clave pública de IBE (PK1,t), y suprimir los primeros datos de evidencia (D) y la primera clave de sesión aleatoria (K) en el primer sistema de carretera (G1); capturar al menos un identificador (LPN) del vehículo y una segunda marca de tiempo (t) en el segundo sistema de carretera (G2) como segundos datos de evidencia(D), utilizar al menos el segundo identificador (LPN) y la segunda marca de tiempo (t) como una segunda identidad para generar una segunda clave pública de IBE (PK2,t), cifrar los segundos datos de evidencia (D) con una segunda clave de sesión aleatoria (K), cifrar la segunda clave de sesión aleatoria (K) con la segunda clave pública de IBE (PK2,t), y suprimir los segundos datos 20 de evidencia (D) y la segunda clave de sesión aleatoria (K) en el segundo sistema de carretera (G2); calcular una relación (V) de las claves públicas, primera y segunda, (PK1,t, PK2,t), modular la base de módulo común (pG), y buscar la relación (V) en una tabla de relaciones (V) pre-calculadas para un conjunto de diferencias de tiempo entre dichas primera y segunda marcas de tiempo (t), conjunto que representa las infracciones de la velocidad, y, cuando la búsqueda es fructuosa: recuperar al menos una clave privada de IBE (SK1, SK2) para al menos una de dichas claves públicas de IBE (PK1,t, PK2,t) desde el centro de generación de claves (KGC), descifrar al menos una de dichas claves de sesión cifradas (EK) con dicha clave privada (SK1, SK2), y descifrar al menos uno de dichos datos de evidencia cifrados (ED) con dicha clave de sesión descifrada (K).
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12455003.9A EP2648170B1 (en) | 2012-04-06 | 2012-04-06 | A method for detecting a speed violation of a vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
ES2530625T3 true ES2530625T3 (es) | 2015-03-04 |
Family
ID=45929480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES12455003T Active ES2530625T3 (es) | 2012-04-06 | 2012-04-06 | Método para detectar infracciones del límite de velocidad de un vehículo |
Country Status (8)
Country | Link |
---|---|
US (1) | US8964984B2 (es) |
EP (1) | EP2648170B1 (es) |
CA (1) | CA2803840C (es) |
DK (1) | DK2648170T3 (es) |
ES (1) | ES2530625T3 (es) |
PL (1) | PL2648170T3 (es) |
PT (1) | PT2648170E (es) |
SI (1) | SI2648170T1 (es) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8661263B2 (en) * | 2006-09-29 | 2014-02-25 | Protegrity Corporation | Meta-complete data storage |
EP2838075A1 (de) * | 2013-08-15 | 2015-02-18 | VITRONIC Dr.-Ing. Stein Bildverarbeitungssysteme GmbH | Verfahren und Vorrichtung zur Erfassung von Überschreitungen einer zulässigen Höchstgeschwindigkeit auf einem Streckenabschnitt |
US9635054B2 (en) | 2013-10-03 | 2017-04-25 | Landis+Gyr Innovations, Inc. | Securing communication within a network endpoint |
US9412031B2 (en) * | 2013-10-16 | 2016-08-09 | Xerox Corporation | Delayed vehicle identification for privacy enforcement |
US9779284B2 (en) * | 2013-12-17 | 2017-10-03 | Conduent Business Services, Llc | Privacy-preserving evidence in ALPR applications |
ES2571152B1 (es) * | 2014-11-21 | 2017-02-08 | Omnivisión Seguridad, S.L. | Un sistema y procedimiento para la detección automática y gestión de infracciones de tráfico |
US9923719B2 (en) | 2014-12-09 | 2018-03-20 | Cryptography Research, Inc. | Location aware cryptography |
DE102016008267A1 (de) * | 2016-07-07 | 2018-01-11 | Giesecke+Devrient Mobile Security Gmbh | Einrichtung eines sicheren Kommunikationskanals |
KR101861923B1 (ko) * | 2016-08-01 | 2018-05-28 | 동국대학교 경주캠퍼스 산학협력단 | 이동체 정보 보안 시스템 및 이를 이용한 이동체 정보 보안 방법 |
KR101932813B1 (ko) * | 2016-10-14 | 2018-12-26 | 동국대학교 경주캠퍼스 산학협력단 | 이동체 정보 보안 시스템 및 이를 이용한 이동체 정보 보안 방법 |
WO2018212978A1 (en) * | 2017-05-17 | 2018-11-22 | Kwourz Research Llc | Time-based encryption key derivation |
US10396979B2 (en) * | 2017-09-01 | 2019-08-27 | Honda Motor Co., Ltd. | Methods and systems for creating a unique identification number to maintain customer privacy |
GB2580630B (en) * | 2019-01-17 | 2021-03-24 | Siemens Mobility Ltd | Method and system for data collection in a road network |
JP7508483B2 (ja) | 2019-05-06 | 2024-07-01 | ランディス・ギア イノベーションズ インコーポレイテッド | ネットワークセキュリティをローカル接続されたエッジデバイスに拡張する方法 |
CN110166239B (zh) * | 2019-06-04 | 2023-01-06 | 成都卫士通信息产业股份有限公司 | 用户私钥生成方法、系统、可读存储介质及电子设备 |
CN111654591B (zh) * | 2020-04-29 | 2023-08-08 | 中国平安财产保险股份有限公司 | 图片防篡改方法、计算机设备及存储介质 |
CN112673278B (zh) * | 2020-09-10 | 2022-01-11 | 华为技术有限公司 | 基于回波信号的速度探测方法和装置 |
CN113890730B (zh) * | 2021-09-23 | 2024-09-20 | 上海华兴数字科技有限公司 | 数据传输方法及系统 |
CN114120474B (zh) * | 2021-11-29 | 2024-06-07 | 广东九联科技股份有限公司 | 违规车辆自动报警系统 |
US11900801B2 (en) | 2021-11-30 | 2024-02-13 | International Business Machines Corporation | Generating a speeding ticket using a persistently stored character code in a camera for masking information about characters of a number plate of a vehicle |
CN116403408A (zh) * | 2023-06-02 | 2023-07-07 | 浪潮通信信息系统有限公司 | 基于5g网络的交通数据处理方法、算力网关及存储介质 |
CN116824859B (zh) * | 2023-07-21 | 2024-04-05 | 佛山市新基建科技有限公司 | 一种基于物联网的智慧交通大数据分析系统 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2002332671A1 (en) * | 2001-08-13 | 2003-03-03 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
US8531520B2 (en) * | 2002-04-05 | 2013-09-10 | Siemens Industry, Inc. | System and method for traffic monitoring |
KR100571820B1 (ko) * | 2003-10-20 | 2006-04-17 | 삼성전자주식회사 | 신원 정보를 기반으로 하는 암호 시스템에서의 컨퍼런스세션 키 분배 방법 |
US20060215837A1 (en) * | 2004-12-18 | 2006-09-28 | Hewlett-Packard Development Company, L.P. | Method and apparatus for generating an identifier-based public/private key pair |
US8094810B2 (en) * | 2006-02-03 | 2012-01-10 | Massachusetts Institute Of Technology | Unidirectional proxy re-encryption |
DE102007059346B4 (de) | 2007-12-10 | 2009-11-19 | Siemens Ag | Verfahren und Vorrichtung zur Erfassung einer Geschwindigkeitsübertretung eines Fahrzeugs |
ES2561803T3 (es) * | 2009-08-31 | 2016-03-01 | Accenture Global Services Limited | Método implementado por ordenador para asegurar la privacidad de un usuario, producto de programa de ordenador, dispositivo |
ATE557374T1 (de) | 2010-01-21 | 2012-05-15 | Kapsch Trafficcom Ag | Verfahren zur erfassung von durchfahrten von fahrzeugen |
-
2012
- 2012-04-06 DK DK12455003.9T patent/DK2648170T3/en active
- 2012-04-06 PT PT124550039T patent/PT2648170E/pt unknown
- 2012-04-06 SI SI201230143T patent/SI2648170T1/sl unknown
- 2012-04-06 EP EP12455003.9A patent/EP2648170B1/en active Active
- 2012-04-06 PL PL12455003T patent/PL2648170T3/pl unknown
- 2012-04-06 ES ES12455003T patent/ES2530625T3/es active Active
-
2013
- 2013-01-23 CA CA2803840A patent/CA2803840C/en active Active
- 2013-04-05 US US13/857,395 patent/US8964984B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2648170A1 (en) | 2013-10-09 |
US8964984B2 (en) | 2015-02-24 |
PL2648170T3 (pl) | 2015-05-29 |
EP2648170B1 (en) | 2014-11-26 |
PT2648170E (pt) | 2015-02-20 |
CA2803840C (en) | 2019-01-08 |
US20130266139A1 (en) | 2013-10-10 |
CA2803840A1 (en) | 2013-10-06 |
DK2648170T3 (en) | 2015-02-23 |
SI2648170T1 (sl) | 2015-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2530625T3 (es) | Método para detectar infracciones del límite de velocidad de un vehículo | |
CO2018009236A2 (es) | Determinación de un secreto común para el intercambio seguro de información y claves criptográficas deterministas y jerárquicas | |
GB2498039B (en) | Password recovery service | |
BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
TR201907002T4 (tr) | Mamul ürünleri fiziksel karakteristiği kullanarak işaretlemek için yöntem ve tertibat. | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
BR112018011353A2 (pt) | método e sistema para provisão e armazenamento de chave criptografada distribuída via criptografia de curva elíptica | |
BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
BR112018004741A2 (pt) | método, e, dispositivo de acesso | |
EA201301077A1 (ru) | Способ защиты информации в облачных вычислениях с использованием гомоморфного шифрования | |
WO2016057086A8 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
PH12015500102A1 (en) | Method, device and system for encrypting and decrypting image | |
BR112016018486A8 (pt) | sistema e método para proteger chaves de conteúdo entregues em arquivos de manifesto | |
WO2013068843A3 (en) | Multi-key cryptography for encrypting file system acceleration | |
JP2017538353A5 (es) | ||
BR112016024453A2 (pt) | transporte seguro de máquinas virtuais criptografadas com acesso contínuo do proprietário | |
GB2530225A (en) | Processing guest event in a hypervisor-controlled system | |
BR112015026372B8 (pt) | Dispositivo de comunicação que reforça a segurança para um arquivo armazenado em uma unidade virtual | |
MX2014011953A (es) | Deteccion de intrusion de red utilizando clave criptografica de señuelo. | |
NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
BR112017008214A2 (pt) | métodos e sistemas para interoperacionalidade de autenticação | |
MX2018014296A (es) | Mecanismo de distribucion de software encriptado eficiente. | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
IN2014CN04110A (es) | ||
PH12016502362B1 (en) | Systems and methods for controlling media distribution |