Processing

Please wait...

Settings

Settings

Goto Application

1. WO2012136525 - KEY MANAGEMENT SYSTEM AND METHOD FOR A TRAIN PROTECTION SYSTEM

Publication Number WO/2012/136525
Publication Date 11.10.2012
International Application No. PCT/EP2012/055460
International Filing Date 28.03.2012
IPC
B61L 15/00 2006.01
BPERFORMING OPERATIONS; TRANSPORTING
61RAILWAYS
LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
15Indicators provided on the vehicle or vehicle train for signalling purposes
B61L 27/00 2006.01
BPERFORMING OPERATIONS; TRANSPORTING
61RAILWAYS
LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
27Central traffic control systems
CPC
B61L 15/0027
BPERFORMING OPERATIONS; TRANSPORTING
61RAILWAYS
LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
15Indicators provided on the vehicle or vehicle train for signalling purposes ; ; On-board control or communication systems
0018Communication with or on the vehicle or vehicle train
0027Radio-based, e.g. using GSM-R
B61L 2027/0044
BPERFORMING OPERATIONS; TRANSPORTING
61RAILWAYS
LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
27Central traffic control systems ; ; Track-side control or specific communication systems
0038Track-side control of safe travel of vehicle or vehicle train, e.g. braking curve calculation
0044using European Train Control System [ETCS]
B61L 27/0005
BPERFORMING OPERATIONS; TRANSPORTING
61RAILWAYS
LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
27Central traffic control systems ; ; Track-side control or specific communication systems
0005Details of track-side communication
G06F 21/335
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
33using certificates
335for accessing specific resources, e.g. using Kerberos tickets
G06F 21/629
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
629to features or functions of an application
G06F 21/72
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
71to assure secure computing or processing of information
72in cryptographic circuits
Applicants
  • SIEMENS AKTIENGESELLSCHAFT [DE]/[DE] (AllExceptUS)
  • FALK, Rainer [DE]/[DE] (UsOnly)
  • FRIES, Steffen [DE]/[DE] (UsOnly)
Inventors
  • FALK, Rainer
  • FRIES, Steffen
Common Representative
  • SIEMENS AKTIENGESELLSCHAFT
Priority Data
10 2011 006 772.805.04.2011DE
Publication Language German (DE)
Filing Language German (DE)
Designated States
Title
(DE) SYSTEM UND VERFAHREN FÜR EIN SCHLÜSSELMANAGEMENT EINES ZUGSICHERUNGSSYSTEMS
(EN) KEY MANAGEMENT SYSTEM AND METHOD FOR A TRAIN PROTECTION SYSTEM
(FR) SYSTÈME ET PROCÉDÉ DE GESTION DE CLÉS D'UN SYSTÈME DE PROTECTION DES TRAINS
Abstract
(DE)
Die Erfindung betrifft ein Verfahren zum Verteilen von Kommunikationsschlüsseln (6) für die Verschlüsselung von Verkehrsleitnachrichten eines Schienenfahrzeugsicherungssystems, mit den Schritten des Erzeugens eines Kommunikationsschlüssels (6) in einer ersten Schlüsselvergabestelle (1a) eines ersten Streckenbetreibers in Abhängigkeit von einer geplanten Fahrtroute eines Schienenfahrzeugs (4), des Bereitstellens des Kommunikationsschlüssels (6) an eine zweite Schlüsselvergabestelle (1b) eines zweiten Streckenbetreibers, des Bereitstellens des Kommunikationsschlüssels (6) an das Schienenfahrzeug (4) durch die erste Schlüsselvergabestelle, und des Verschlüsselns von Verkehrsleitnachrichten des Schienenfahrzeugs (4) mit dem Kommunikationsschlüssel (6) zum manipulationssicheren Kommunizieren des Schienenfahrzeugs (4) mit Streckenzentralen (3) des ersten Streckenbetreibers und mit Streckenzentralen (3) des zweiten Streckenbetreibers.
(EN)
The invention relates to a method for distributing communication keys (6) for the encryption of traffic control messages of a rail vehicle protection system, having the steps of generating a communication key (6) at a first key allocation point (1a) of a first track operator as a function of a planned route of a rail vehicle (4), making available the communication key (6) to a second key allocation point (1b) of a second track operator, making available the communication key (6) to the rail vehicle (4) by means of the first key allocation point, and encrypting traffic control messages of the rail vehicle (4) with the communication key (6) in order to permit tamper-proof communication of the rail vehicle (4) with operation control centres (3) of the first track operator and with operational control centres (3) of the second track operator.
(FR)
L'invention concerne un procédé de distribution de clés de communication (6) pour chiffrer des messages de contrôle du trafic d'un système de protection de véhicules ferroviaires, ce procédé comprenant les étapes suivantes : génération d'une clé de communication (6) à un premier point d'attribution de clé (1a) d'un premier exploitant de ligne en fonction d'un itinéraire prévu d'un véhicule ferroviaire (4), mise à disposition de la clé de communication (6) à un deuxième point d'attribution de clé (1b) d'un deuxième exploitant de ligne, mise à disposition de la clé de communication (6) au véhicule ferroviaire (4) par le premier point d'attribution de clé et chiffrement de messages de contrôle du trafic du véhicule ferroviaire (4) au moyen de la clé de communication (6) pour permettre l'établissement d'une communication protégée contre les manipulations entre le véhicule ferroviaire (4) et des postes de commande centraux (3) du premier exploitant de ligne et du deuxième exploitant de ligne.
Latest bibliographic data on file with the International Bureau