Key management system and method for a train protection system

A security system and key technology, applied in the field of key management, can solve problems such as troublesome, error-prone, inefficiency, etc., and achieve the effect of simplifying definition, less error-prone, and accelerating generation and distribution.

Inactive Publication Date: 2013-12-18
SIEMENS MOBILITY GMBH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] This key distribution is cumbersome, error-prone and inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management system and method for a train protection system
  • Key management system and method for a train protection system
  • Key management system and method for a train protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In the sense explained below, a communication key includes all encrypted information and data units, which are suitable for encrypting data in plaintext format and thereby generating data in eavesdropping and / or reading-proof ciphertext format, or which are suitable for It is suitable for protecting the integrity of data in plaintext format and implementing encrypted checksums (Prüfsumme), and it is also suitable for recovering data in plaintext format from data in ciphertext format in the identification of encrypted information or verifying that said data is transmitted period has not been processed. A communication key in the sense of the invention can include, for example, a symmetric key pair, an asymmetric key pair or similar encryption methods. For example, communication keys can be used via methods such as AES, DES, KDF, IPsec, SSL / TLS, MACsec, L2TP, PPTP, PGP, S / MIME or via associated key management such as IKE, EAP or other method uses a similar technique.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for distributing communication keys (6) for the encryption of traffic control messages of a rail vehicle protection system, having the steps of generating a communication key (6) at a first key allocation point (1a) of a first track operator as a function of a planned route of a rail vehicle (4), making available the communication key (6) to a second key allocation point (1b) of a second track operator, making available the communication key (6) to the rail vehicle (4) by means of the first key allocation point, and encrypting traffic control messages of the rail vehicle (4) with the communication key (6) in order to permit tamper-proof communication of the rail vehicle (4) with operation control centres (3) of the first track operator and with operational control centres (3) of the second track operator.

Description

technical field [0001] The invention relates to a system and method for key management of a train security system. Background technique [0002] The safety system used for train safety in rail traffic is the so-called European Train Control System (“ETCS”, European Train Control System). Such traffic guidance systems usually use radio data transfer, for example via GSM-R, between the rail vehicle or its train safety computer, for example the European main computer, and the static link centers, Radio Block Centers (“RBC”, Radio Block Centres) Exchange boot and security messages. In order to protect the data during transmission against inadvertent operation and transmission errors, the data are protected with an encrypted checksum, the calculation and / or verification of which requires an encrypted key. [0003] Symmetrical encryption methods are usually used, so that both the rail vehicle and the route center must have at least one encryption key. Since the rail vehicle mov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B61L15/00B61L27/00
CPCB61L15/0027G06F21/335G06F21/629G06F21/72H04L9/0827H04L63/0435H04L63/064H04L2209/84B61L2027/202B61L27/70
Inventor R.法尔克S.弗里斯
Owner SIEMENS MOBILITY GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products