Method for a secure data transmission
First Claim
1. A method for secure data transmission between a first subscriber and second subscribers, the first subscriber being a tachograph in a commercial vehicle and the second subscriber being memory cards having at least one respective data store, wherein the first subscriber has a memory which stores a particular number of entries each comprising identifiers and associated security certificates from second subscribers with a detection time for the security certificate, the method comprising the steps of:
- fetching an identifier by the first subscriber from the second subscribers, comparing by first subscriber the identifier with the identifiers stored in the memory, if a matching identifier is present, prompting the security certificate associated with the identifier to be a basis for a subsequent data transmission and updating the detection time for the security certificate to a current system time, and if no matching identifier is stored in the memory, prompting the first subscriber to perform security certificate verification with the second subscriber and, in the event of verification, storing an entry corresponding to the verified security certificate with a current detection time in the memory, with the entry with the oldest detection date being replaced by the new entry if a particular number of entries has already been reached.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method for secure data transmission, particularly between a tachograph (51) in a commercial vehicle and memory cards (50), where a first subscriber (T1) has a memory (6, 22) with entries (31-35) comprising identifiers (4) and security certificates (Cert) from second subscribers (T2). Methods for secure data transmission are becoming increasingly important and are frequently associated with a high level of computation complexity. For this reason, the object of the invention is to reduce the computation time for this without security losses. It is proposed that the first subscriber (T1) fetch an identifier (4) from the second subscriber (T2) and compare it with stored identifiers (4). If the identifier (4) matches, a security certificate (Cert) associated with this identifier (4) is the basis for a subsequent data transmission, and if the identifier (4) does not match then security certificate verification is performed.
-
Citations
5 Claims
-
1. A method for secure data transmission between a first subscriber and second subscribers, the first subscriber being a tachograph in a commercial vehicle and the second subscriber being memory cards having at least one respective data store, wherein the first subscriber has a memory which stores a particular number of entries each comprising identifiers and associated security certificates from second subscribers with a detection time for the security certificate, the method comprising the steps of:
-
fetching an identifier by the first subscriber from the second subscribers, comparing by first subscriber the identifier with the identifiers stored in the memory, if a matching identifier is present, prompting the security certificate associated with the identifier to be a basis for a subsequent data transmission and updating the detection time for the security certificate to a current system time, and if no matching identifier is stored in the memory, prompting the first subscriber to perform security certificate verification with the second subscriber and, in the event of verification, storing an entry corresponding to the verified security certificate with a current detection time in the memory, with the entry with the oldest detection date being replaced by the new entry if a particular number of entries has already been reached. - View Dependent Claims (2, 3, 4, 5)
-
Specification