RussianPatents.com
|
Tachograph, toll-on-board unit, indicator device and system. RU patent 2506642. |
|||||||||||||||||||||
IPC classes for russian patent Tachograph, toll-on-board unit, indicator device and system. RU patent 2506642. (RU 2506642):
|
FIELD: physics, computer engineering. SUBSTANCE: invention relates to a tachograph, particularly a digital, toll-on-board unit, an indicator device and a system comprising same, particularly for cars. The system comprises a tachograph (DTCO) and a toll-on-board-unit (OBU) as a communication subscriber, each of which comprises a data interface (DS) for data communication via a vehicle data bus (FDB) by which the communication subscriber can be connected. The tachograph (DTCO) and the toll-on-board unit (OBU) are as transmitters of data designed to determine a cryptographic check value depending on payload data to be transmitted to the communication subscriber, and send the cryptographic check value in addition to the payload data to the communication subscriber. The toll-on-board unit (OBU) and the tachograph (DTCO) as respective receivers of data are configured to receive from the communication subscriber payload data and the cryptographic check value associated with the payload data and for checking the received payload data for distortions depending on the cryptographic check value received. EFFECT: high reliability of data communication. 25 cl, 9 dwg
2420-167218RU/018 The invention relates to tachograph, in particular to the digital tachograph, the on-Board module for the fee for the use of roads (ut-on-Board-Unit), the indicating device and system with them, in particular, for hire. Cars are increasingly equipped with electronic control devices for registration and processing of signals of the sensors and/or to control the functions of the car. Some of these control devices are connected to each other via the data bus of the car, made, for example, as an area controller network Controller Area Network», or in short: CAN. The control is sent over the data bus system of the car messages that can be received and processed by other control devices connected to the bus, the vehicle data. Trucks are equipped with a tachograph and, increasingly, on-Board unit for the fee for the use of roads (Maut-on-Board-Unit). In the future tachograph equipment and unit for the fee for the use of roads (Maut-on-Board-Unit) could be prescribed and passenger cars. The objective of the invention is to create a reliable tachograph. In addition, the objective of the invention is to create a reliable and low-cost on-Board unit for the fee for the use of roads (Maut-on-Board-Unit). The objective of the invention is to create a reliable instrument of control. In addition, the task of the invention consists in creation of secure and inexpensive. The task is solved using the characteristics of independent claims. Preferred improved versions of the execution of the invention described in the dependent claims. Invention differs system containing the tachograph and the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) as a communication subscribers in data interchange. Tachograph and the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) contain the appropriate data interfaces, made in the form of interface data bus car so that data is exchanged over the data bus system of the car, with which are connected by a communication subscribers. Tachograph and/or on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) performed as the transmitters of data to determine the cryptographic control number depending on the payload, which via the data interface must be passed to the appropriate subscriber communication for the transmission to the appropriate subscriber connection cryptographic the control number in addition to useful information. The on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) or tachograph performed as the relevant data receiver for the reception of the corresponding subscriber communications payload and cryptographic the control number, related to useful data, and to control acquisition of useful data for any distortion depending on the obtained a cryptographic check number. Thus, it is envisaged that or only tachograph executed as transmitter data and on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) as receiver of data, or only the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit is made as transmitter data, and tachograph as a data sink. Alternatively provided to tachograph and the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) were performed, respectively, as transmitter and receiver data. Data bus of the car, particularly the data bus of the car is provided not only to exchange data between tachographs and on-Board unit for the fee for the use of roads (Maut-on-Board-Unit), but also for the exchange of data between the other blocks of the device and the vehicle, i.e., for example, devices of the control, referred to also as the ECU (Electronic Control Unit», or in short: ECU. Data bus car is made, for example, as an area controller network Controller Area Network», or in short: CAN, as a local internal communication network («Local Interconnet Network», or in short: LIN, or in the form of transfer systems, oriented on data media (Media Oriented Systems Transport», or in short: MOST. This can for example be used without that provided for in-car total data bus vehicle for communication between tachographs and on-Board unit for the fee for the use of roads (Maut-on-Board-Unit). This is especially simply and economically, since there is no need for a separate communication channel. However, there may be data bus car, separate from the shared bus, car, which tachograph and the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) connect to exchange data among themselves. The definition of a cryptographic check number and are subject to at least one of the cryptographic key. Evaluation of the payload, depending on the cryptographic the control number is, preferably, through the re-definition of a cryptographic check number depending on the payload data received by the relevant receiver, and by comparing certain thus cryptographic the control number from the received cryptographic control number. Distortion are very simply as a discrepancy control numbers. As a result of the availability of cryptographic control number and to control acquisition of useful data, depending on cryptographic control the number of data exchange can be protected from unauthorized manipulation. Due to the fact that the distortion of the relevant data transmitted by receiving depending on cryptographic control number are just, then, if the control has revealed no distortion, these data are reliable. As a result of the exchange of data, protected by using cryptographic the control number, can, in particular, shared data of the sensors and thereby be saved sensors, or may be increased reliability through redundancy. Thus, the system, as well as tachograph and the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) can be particularly reliable or efficient. In a preferred embodiment of the useful data sent by the tachograph in the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) and derived contain data speed, and/or mileage, and/or mileage at the moment, registered or defined by a tachograph or sensors connected with the tachograph, and/or time and/or identity of the driver and/or the enterprise, and/or the vehicle. Identification data are, in particular, the data set tachograph for its operation, for example, by the manufacturer or workshop, or, for example, are known to him on the basis of chip-cards. Chip-card is used, for example, the identity of the driver's or enterprise using the vehicle in which you installed the tachograph. Time data accurately and reliably determined, for example, using real-time clock tachograph. The advantage is that due to this the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) under certain conditions not need any native sensor for registration of the race, if it obtains the data speed and/or mileage, and/or the current mileage, and/or time from the tachograph, and they are due to the protection by means of a cryptographic check number is correct. In particular, the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit doesn't need any sensor, i.e., for example, in any . In addition, the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) may also apply to reliable identification data of the tachograph in such a way that it is of no need, even in the presence of any devices for registration of identity. Thus, the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) can be executed especially economically. However, reliable data tachograph can also be used to improve the reliability, accuracy and/or precision, if the data transmitted by the tachograph, and data registered or certain unit itself for the fee for the use of roads (Maut-on-Board-Unit), or data registered or obtained from United with him sensors are essentially redundant. In another preferred embodiment of the transmitted block for the fee for the use of roads (Maut-on-Board-Unit) tachograph and derived payload contains information about the time and/or information on the situation block positioning. Unit positioning, in particular, is a receiver for reception of the information on the situation and the time from satellite navigation systems, such as from the global positioning system («Global Positioning System», or in short: GPS. In this connection, preferably indicating instrument was executed as transmitter data to determine the cryptographic control number depending on the payload, which via bus interface data must be transmitted to the appropriate subscriber communication for the transmission to the appropriate subscriber connection cryptographic the control number in addition to useful information. Indicating instrument also contains, for example, a block of text input to enter manually. In this case indicating instrument, preferably made to, having entered there the appropriate cryptographic check number, reliably and securely communicate them to the appropriate subscriber. Thanks to this, under certain conditions it is possible to refuse its own block I of that contact, in particular in and/or in the block to the fee for the use of roads (Maut-on-Board-Unit). Thus, the appropriate subscriber, in particular tachograph and/or on-Board unit for the fee for the use of roads (Maut-on-Board-Unit)can be executed especially economically. In another preferred embodiment of the indicating instrument contains at least one protected storage device to record at least one of the cryptographic key, and/or mileage at the moment, and/or identity of the driver and/or the enterprise, and/or the vehicle, and/or the installation settings vehicle components and/or diagnostic data of the car. In another preferred embodiment of the indicating instrument contains at least one case, the protective device that detects the opening of an indicating instrument. This has the advantage that all the components of an indicating instrument installed in the housing, are protected from manipulation. Possible manipulation reliably detected with the help of at least one vessel of a protective device. In this regard, it is preferable that a device of protection by enclosure contained switch chassis. Switch chassis is mounted so that opening the body reliably recognized, preferably, by turning off the current. In addition, the presence of the switch chassis is fixed with the help of electronics and thanks to this countermeasures at detection of opening its case are taken automatically. Countermeasures include, for example, display the warning, stop or limit the work of the indicating instrument or vehicle, or erasing data, recorded, for example, in the protected storage device for data protection from abuse. In another preferred embodiment of the indicating instrument contains at least two interfaces data performed as an interface to the data bus of the car. Indicator unit forms a connecting block for communication between subscribers of communication, joined by at least two different interfaces to data. Indicator unit is made for the further transfer, and/or control, and/or useful data, and/or communication subscribers. Thus, the data exchange between the subscribers of communication can be especially safe and reliable. In this regard, it is preferable that the payload, controlled and using an indicating instrument contain at least part of the implemented software or were implemented software. Thus, the indicating instrument can be used to control and/or software updates, programs, functions or software modules, used, in particular, outside the car. As a result, achieved especially high reliability and authenticity. Thus, in particular, can be recognized by a distorted, i.e., for example, passed with errors or software, and can be prevented by installing or using this software. In this connection, preferably indicating instrument was executed for the implementation of the implemented software. Thanks to this, in particular, the software installed in the indicator device is updatable or functionality already installed before the software can be upgraded through an installation and further implementation of the implemented software. Thus expanded indicator opportunities of the indicating instrument or the services are provided to other blocks of the device. In another preferred embodiment of the indicating instrument is made for the further transfer of the sold software at least one of the subscribers after the successful control and/or . Thus, the implemented software may be installed and implemented by the provided by the subscriber. Thus, in particular, the software update blocks the instrument of the vehicle are possible with the observance of reliability and validity. In another preferred embodiment of the indicating instrument forms the control unit providing comfort, and/or the block interface the diagnosis, and/or block of identification to verify your identity, and/or block access control, and/or anti-theft unit or contains some of it. This has the advantage that the blocks of the device can be saved or executed more economical when their functionality is fully or partially compensated by an indicating instrument. Thus, the system can be particularly economical. In another preferred embodiment of the each subscriber has, accordingly, at least one private protected storage device to record at least one of the cryptographic key. At least one of the subscribers is made for the formation of at least one of the cryptographic key for encrypted transfer of at least one of the generated key exchange, at least one of the relevant communication subscribers. The relevant subscribers of communication are to receive and decrypt at least one encrypted key exchange, and for a reliable record of at least one cryptographic key in the appropriate secure storage device. Besides, subscribers of communication met to determine the cryptographic control number according to at least one of the cryptographic key. At least one cryptographic key, preferably, contains the code provided for use in a symmetric way of coding. Encrypted transfer of at least one of the cryptographic key and a transcript of, preferably, is made through the use of asymmetric coding method. The encoding is performed, in particular, depending on the publicly available code of the corresponding number, and decoding depending on its private key. Thanks to this at least one cryptographic key can be transmitted especially reliably. However, at least one transmitted cryptographic key may also contain the private and/or public code for use in an asymmetrical way of coding. The relevant protected storage device, preferably performed as a mass memory device containing electrical and/or mechanical protection from unauthorized manipulation, for example, in the framework of the «Industrial specifications to ensure the physical security of computers» («Trusted Platform Module», or in short: TPM, or by using a smart card controller («Smart Card Controller»). A cryptographic check number, preferably determined according to at least one of the cryptographic key using the symmetric coding method. In addition, the definition of a cryptographic check number, preferably by using a block cipher or hash function. Thus, a cryptographic check the number of especially determined reliably and at low cost of the calculation. Thanks to this communication subscribers can be met cost-effectively. In addition, you can communicate in real time. Subscriber, made for the formation of at least one of the cryptographic key for encrypted transfer of at least one of the generated a cryptographic key that is, in particular, tachograph. In this regard, it is preferable that the communication subscribers were performed to determine the cryptographic check number as a code messages depending on the cryptographic key. Code messages can also be called «Message Authentication Code», or in short: WT. This code is well protected from unauthorized manipulation and is determined at a negligible cost calculations and thus also with minor total costs. Therefore, the exchange of data using a cryptographic check number can occur in real time. In order alternative or a complement to subscribers of communication are to determine the cryptographic check number as the abbreviated code messages depending on the cryptographic key. Abbreviated code messages can also be called «truncted MAC» or «Retail MAC». The advantage is that the way for a cryptographic check number in addition to useful information has to carry only a small amount of data. Thanks to this, the load on the tire is low, and, accordingly, the requirements for bandwidth communications are also low. Such a reduced code message is well protected from unauthorized manipulation and is determined at a negligible cost calculations and thus also with minor total costs. Therefore, the exchange of data using a cryptographic check number can occur in real time. In another preferred embodiment of the subscribers of communication are appropriate for the transfer of a cryptographic check number in a single message, together with the relevant useful data. As a result, means of communication, in particular data bus of the vehicle is not loaded or downloaded to a small extent. Therefore, the requirements to the bandwidth communication is not increased compared with unprotected transfer of useful data. In another preferred embodiment of the subscribers of communication are to transfer a cryptographic check number and respective useful data separately from each other and, accordingly, at least in one message. This has the advantage that the messages that are transmitted useful data does not have to change their structure to account for the control number. This is especially preferably when the specified message structure, as, for example, the SAE (Society of Automative Engineers society of Automotive engineers) J1939. In another preferred embodiment of the at least one of the relevant communication subscribers with a corresponding provided data exchange is performed for in regard to own at least one corresponding to the subscriber connection. preferably before the transfer is carried out or in connection with the transfer of at least one of the cryptographic key. The advantage consists in the fact that the exchange of information should be limited to reliable communication subscribers. Thanks to this exchange of data can be especially reliable. In another preferred embodiment of the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) and foreseen if necessary indicating instrument are made for relatively tachograph. In addition, the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) and foreseen if necessary indicating instrument are made for the provision of reliable data exchange between the tachograph, from one hand, and the onboard unit for the fee for the use of roads (Maut-on-Board-Unit) or provided if necessary indicative device, on the other, and/or for the provision of reliable data exchange between the onboard unit for the fee for the use of roads (Maut-on-Board-Unit) and provided with the necessary indicative device in a successful , and otherwise to prevent the confidential exchange of data, based on the control of received data in the payload, depending on the corresponding cryptographic check number. Thus, tachograph form a kind of a centre , managing confidential data exchange, or its controller. Thanks to this tachograph can be performed also for generating the cryptographic keys and key distribution between the other blocks of the device, if they successfully authenticated relatively tachograph. In this case, the other blocks of the device under certain conditions to be fulfilled for the formation of at least one of a cryptographic key and, as a result, can be met cost-effectively. Preferably, is carried out prior to the transfer of or in connection with the transfer of at least one of the cryptographic key. The advantage is that the communication can be restricted reliable blocks the instrument as a communication subscribers. Thanks to this, the communication can be very safely. In another preferred embodiment of the at least one subscriber connection is made automatically updated implementation of formation and transfer of at least one of the cryptographic key, as well as provided in case of need , depending on the occurrence of at least one of the specified events. So given event is, for example, system initialization, or at least one of the subscribers, the end of any given interval of time, e.g. a day or calibrated interval, end interaction with the system or with one of the subscribers, for example, in the case of the maintenance or repair, or replacement of at least one of the subscribers, or the ignition switched on, for example, the ignition key. When this is achieved particularly high level of protection. This at least one person communication is, in particular, tachograph. In another preferred embodiment of the at least one of the subscribers of communication provides an interface to the external unit. This at least one subscriber connection is made to determine the cryptographic control number depending on the payload, which with the help of the interface to the external unit must be transmitted to the external power as a subscriber connection, and to transfer to this subscriber connection cryptographic the control number in addition to useful information. At least one subscriber interface for external indicating and complement or alternative is for the reception of the external unit via the interface for external block of useful data relating to useful information cryptographic control number and to control acquisition of useful data for any distortion depending on the obtained a cryptographic check number. Thus, the confidential exchange of data on the internal data bus, the vehicle is also possible with at least one external block. Preferably, and transfer at least one of the cryptographic key are provided for in respect of the exchange of data between the device in a car that has an interface for external unit, and relevant external power. Data exchange with external power in both directions can be provided either wireless or wired. At least one external unit is, for example, an external device for maintenance, and/or measurements, and/or diagnosis, and/or practice for software updates and configuration data. However, the external unit can be implemented as an external transceiver or radio beacon, for example, as an active signs, installed, preferably, near the road, for example, to set the bit rate, such as the indicative rates or warnings, for example, in relation to the maximum permissible weight and maximum permissible height of the vehicle. You can also envisage the transfer of at least one external block, for example, the identification data concerning, for example, a car or driver. In another preferred embodiment of the at least one subscriber connection is made to encrypt the payload, and at least one other of communication subscribers - to decrypt the encrypted payload. Encryption and decryption are subject to at least one of cryptographic keys. The advantage is that in this way it is also possible confidence data exchange. For encryption and decryption can be provided symmetric or asymmetric methods of coding. In another preferred embodiment of the system as a subscriber connection for data exchange contains the block road telematics, and/or engine control unit to control the internal combustion engine, or at least an electric motor, providing traction vehicle, and/or control unit providing comfort, and/or the block interface the diagnosis, and/or block of identification to verify your identity, and/or block access control. They contain, respectively, data interface, designed as an interface data bus car so that data is exchanged over the data bus system of the car, with which are connected by a block of road telematics, the engine control unit, the control unit software usability, interface unit diagnostic unit identification, or block access control. In particular, can also be enshrined in the speed limiter performed preferably together with motor control or containing it, and preferably automatically sets the speed of the vehicle depending on the relevant given values of velocity, transmitted, for example, with at least one outer block, for example, with active traffic sign. Fig. 2B - on-Board unit for the fee for the use of roads (Maut-on-Board-Unit) Fig. 2C - indicator unit, Fig. 3 - scheme of the process flow , Fig. 4A diagram of the sequence of operations of the first version of the data transfer process Fig. 4B diagram of the sequence of operations of the second version of the data transfer process Fig. 5 structure of a message, Fig. 6 - system with an indicative device. Elements with the same configuration or function in all figures marked in the same position. As blocks of the device, interconnected at least one bus FDB vehicle data (Fig. 1), the system contains a digital tachograph DTCO and on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). At least one bus FDB vehicle data (Fig. 1) is made, in particular, as a bus data in accordance with the controller part of the network («Controller Area Network», or in short: CAN, or any other data bus for cars, for example, a local network, intercom («Local Interconnet Network», or in short: LIN, or transmission systems, oriented on data media (Media Oriented Systems Transport», or in short: MOST. At least one bus FDB vehicle data, preferably, is available to all blocks of the device, i.e. bus FDB vehicle data, preferably performed, and is envisaged not specifically and non-exceptionally for data exchange between the tachograph DTCO and onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit). Such a common bus FDB vehicle data provided, in General, in each car, so tachograph DTCO and on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) to ensure the communication between the blocks of the device must only be connected with it. However, in each car can be provided, as well as two or more than two tires FDB vehicle data. In this case, tachograph DTCO and on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit connected, for example, only one of the tires FDB vehicle data. However, they can be connected also with two or more tires FDB vehicle data. In particular, it may be preferable to tachograph DTCO was connected with at least two of the tires FDB vehicle data. On the basis of the rule of the vehicle manufacturer in respect of at least one of the tires FDB vehicle data under certain conditions it is not allowed no blocks of the device from other manufacturers. Under certain conditions on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit cannot be connected with any of the tyres FDB vehicle data under the rule of the vehicle manufacturer. Therefore the blocks of the device of other manufacturers, and, in particular, on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit, if necessary, must connect to additionally stipulated by bus FDB vehicle data. However, in this case, tachograph DTCO should be connected to two or more tires FDB vehicle data to be reported as with units of unit, under the rule of the vehicle manufacturer, for example a block of MST motor control and blocks of the device, not being under the rule of the vehicle manufacturer, for example onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) and/or block DIAG diagnostic interfaces. In addition, the system along with a tachograph DTCO and onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) may also contain indicating instrument INST, and/or block VT road telematics, and/or the PID identification, and/or block KE access control, and/or block MST motor control, and/or block KST collateral management, comfort, and/or anti-theft unit, and/or block DIAG diagnostic interfaces as blocks of the device, and/or other blocks of the device of the vehicle, United with at least one bus FDB vehicle data. Indicator unit INST provided, for example, to display the current speed of the vehicle and/or mileage, and/or mileage at the moment passed to the indicating instrument INST, for example, using the tachograph DTCO according to one of several tires FDB vehicle data. In addition, the indicating instrument can be also provided for the display of data the data recorded by the tachograph DTCO in respect of a relevant driver of the car, and/or diagnostic information, and/or relevant information in terms of vehicle safety. In addition, the indicator unit INST, preferably, is provided for information display on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit), for example, in relation to the number of axles and/or identity of the vehicle and/or driver. Block VT road telematics is provided, for example, for reception of the given values of velocity or other relevant traffic information to the fixed or mobile radio beacons FB, for example, active road signs and/or satellites and/or other vehicles, for example, the system of registration fee for the use of roads (Maut). Radiobeacons FB and external transceivers may be also called «street terminals» («Street-Terminals») and/or able to be executed as such. Provided may be information transfer to other vehicles and/or external transceiver. In addition, it can be provided direction in the corresponding transceiver, in particular, the system of registration fee for the use of roads (Maut), for example, identification of the vehicle and/or driver, and/or current speed, and/or information about the run, recorded and determined by the tachograph DTCO and/or on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). External transceiver is made, for example, as a mobile base station in accordance with the Global system for mobile communications («Global System for Mobile Communications», or in short: GSM. However, the external transceiver can be fulfilled and otherwise. Block VT road telematics can be made as a separate unit of the device or jointly with another block device, preferably together with the onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit). The PID identify and block KE access control, in particular, provided for driver identification and access control in a car and/or to its functions. Identification is carried out, for example, depending on biometric characteristics, so that the mechanical key to provide access under certain conditions is not necessary. Therefore, access control can be called the «entrance key» («Keyless Entry»). However, the PID identify and block KE access control can also be made otherwise, for example, to identify and provide access depending on the smart card, a car key, etc. which may have a wireless connection. The PID identify and block KE access control, for example, are part of a system for car door lock. The PID identify and block KE access control can also be made in the form of a General block device. Block MST engine management, in particular, is intended for the control of the internal combustion engine vehicle and/or for at least the motor vehicle provided for his thrust. Block MST motor control may also be provided to convert received the given values of velocity by throttling the speed of the car, i.e. to perform the function of the speed limiter. However, it may also include a private speed limiter, coupled with at least one bus FDB vehicle data. Block KST collateral management comfort is provided, for example, for collateral management, comfort in the car. For example, can be provided for an automatic adjustment of the installation of seat and other personal settings, e.g. the installation of rear-view mirrors and side view mirrors, air conditioner, radio or other means of communication depending on the identification data to be recorded and transmitted by means of a tachograph DTCO, on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit or block PID identification. Block DIAG diagnostic interfaces can be provided for the connection of external devices EG for diagnostic purposes, and/or maintenance, and/or for testing software updates, and/or to measure, in particular in relation to the exhaust of the vehicle and/or control settings or update configurations block unit or vehicle, for example, on the management of the internal combustion engine. Connection of an external device EG may be provided either wireless or wired. Bus FDB vehicle data may also contain the connecting block VE may be called the «gateway» («Gateway») or «interface» («Interface»). This connector block VE connects with each other two or more constituting at least one bus FDB vehicle data, so that the components of the tires on the exchange of data between the blocks of the device, connected with these components bus, form one shared data bus. Connector block VE can also be made for the compilation of data exchange between the components of the tires if, for example, components of tyres are based on different physical architectures bus or for the components of the tyres used a variety of communication protocols. In addition, the connector block VE can be made to filter data exchange, for example, the valid and invalid message MSG. Connector block VE forms, for example, the interface between the component bus out of several tires FDB vehicle data, which are connected blocks of the device, in principle provided in every car, which should be reported by bus FDB vehicle data, and to the component bus the bus FDB vehicle data, together with additional in-car units of the device that should be reported to the bus FDB vehicle data. Blocks of the device, in principle, stipulated in each car shall be subject, for example, control or rule of the vehicle manufacturer, so that it should provide a valid and reliable data exchange between the blocks of the device. However, the additional blocks of the device in the General case, not subject to control or rule of vehicle manufacturer and can also, for example, manufactured and introduced into the system of other , so that the filtering of data exchange between the components of the tires tires FDB vehicle data can be profitable. Filtering can be, for example, suspended further passing invalid message MSG, which would, for example, to endanger the safety and reliability of the operation of the vehicle. There is a need for transfer of data protection from unauthorized manipulation and, if necessary, and with confidentiality from one of the blocks of the device, United with at least one bus FDB vehicle data, to any other of the blocks of the device, United with at least one bus FDB vehicle data. In other words, between the blocks of the device connected to one of several tires FDB vehicle data, you need a reliable communication channel, which can also be called a «Trusted Channel», so that between the blocks of the device is possible if necessary confidential exchange of data protection from unauthorized manipulation. Tachograph DTCO, for example, in the framework of its intended use in the vehicle determines the data speed, and/or mileage, and/or mileage, and/or time data. The on-Board module BU for the fee for the use of roads (Maut-on-Board-Unit) such data is also needed for defining the collection (Maut)payable. The on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) must define these data itself if it does not receive them from the tachograph DTCO in the form and trustworthy. However, this is time-consuming and expensive affair. Therefore foreseen to transfer the data obtained tachograph DTCO, the on-Board module BU for the fee for the use of roads (Maut-on-Board-Unit) of several buses FDB vehicle data. For detection of unauthorized manipulation of data transmitted via the bus FDB vehicle data-Board module BU for the fee for the use of roads (Maut-on-Board-Unit) with a tachograph DTCO, these data are protected against unauthorized manipulation, i.e. on the secure virtual channel connection. Data obtained onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) with a tachograph DTCO, trust, so that the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit doesn't need any own registration data speeds, mileage, mileage or time. Due to this on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) can be made much more economical. Even more economical, as well as smaller onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) may be made if he uses to display indicating instrument INST and, thus, does not need any own display. In this case the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) is designed for transmission of displayed data indicating instrument INST in a reliable channel via the bus FDB vehicle data. Indicator unit INST made, accordingly, to receive the data from the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) and their control on the subject of unauthorized manipulation. Data received an indicative device INST with an on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit)gives thanks to this trust and can be reliably render an indicative device INST. In addition, tachograph DTCO contains at least one computer unit CPU. At least one computer unit CPU is provided, for example, to control the tachograph DTCO. To control the tachograph DTCO may also provide the additional computational power of the CPU. Function tachograph DTCO also include registration and definition of data and data record with protection from manipulation. Logged information includes, for example, data movement speed of the vehicle, or replacement of a chip card IC, or other data recorded or defined during the operation of the tachograph, such as error messages. Protected storage device SMEM, preferably electrically and/or mechanically protected against manipulation of the data stored in it. Protected storage device SMEM is provided, for example, protective layer or safety grille, controlled, preferably with the help of electricity. If the damage of the protective layer or the safety grille to access information stored in protected storage device SMEM, for example, could be prevented, for example, by erasing the data. However, the drive protected SMEM can also be realized otherwise. Preferably, provided at least two computation blocks CPU. One of at least two computing units CPU forms a secure computing unit SCPU and is intended for execution of cryptographic algorithms, for example for the implementation of the ways of encoding and/or signatures, and for this, preferably connected exclusively with the protected storage device SMEM. This evaluation unit CPU and secure storage device SMEM, preferably performed together as a block or module, for example, in accordance with the «industry specification to ensure the physical security of computers» («Trusted Platform Module», or in short: TPM, or by using a smart card controller («Smart Card Controller»). Due to the presence of such a reliable microcontroller with a protected storage device SMEM tachograph DTCO may be particularly cheap at a high level of protection. Another of at least two computing units CPU is provided, preferably, to manage the overall operation of the tachograph. This evaluation unit CPU, also known as the applied computational engine CPU should not have any protection functions, and for problems that are relevant from the point of view of protection, uses a secure computing unit SCPU, or, on the contrary, secure computing unit SCPU uses for tasks not relevant from the point of view of protection of applied computing unit CPU. Applied computing unit CPU provided, for example, for data processing in real time, ie, for example, in the period of time of about one millisecond. However, it may also be provided to secure computing unit SCPU been made for the registration data for the sensor, e.g. sensor SENS, for the processing of these data and recording or reporting of these data regardless of applied computing unit CPU. Preferably, provide for the secure computing unit SCPU controlled data processed applied computational engine CPU, and/or carried out their program codes for unauthorized manipulation or distortion, for example, through the identification and control of digital signatures. However, at least one computer unit CPU can also be performed otherwise. In particular, applied computing unit CPU and secure computing unit SCPU can also be made in the form of a single, common evaluation unit of the CPU. Protected storage device SMEM, in particular, provides for reliable storage of at least one of the cryptographic key. Preferably, secure storage device SMEM is provided by the secure storage for several cryptographic keys, in particular, at least one private key for use asymmetric ways of encoding and/or signatures, and/or at least one key for the use of symmetric ways of encoding and/or signatures. Tachograph DTCO, preferably, contains at least one protective device SE. At least one protective device SE contains the drive protected SMEM and a cryptographic function block or secure computing unit SCPU. In addition, tachograph DTCO, preferably, contains at least one protective device SE for the control of at least one working parameter protected storage device SMEM and/or at least one evaluation unit CPU, in particular cryptographic function block or secure computing unit SCPU, and/or to control their mechanical integrity. At least one worker parameter represents, for example, the operating voltage, and/or the operating temperature, and/or clock frequency. Preferably at least one protective device SE performed to monitor the passage of at least one engine parameter specified lower and the upper threshold, i.e. going beyond the region of values of the specified lower and upper thresholds, at least one business setting. At the high requirements to safety at least one protective device SE, preferably, contains the protective grille or something similar, executed in the form of top-level metallization on the chip protected storage device SMEM and/or at least one evaluation unit CPU, in particular cryptographic function block or secure computing unit SCPU. In Fig. 2A for secure storage device SMEM it is shown by a frame around this component is indicated by the dotted line. At least one protective device SE performed for detection of damage to the safety grille. Thus recognized damage to the mechanical integrity of the protected storage device SMEM or cryptographic function block, or a secure computer unit SCPU. However, at least one of the protective device SE can be performed differently, and, in particular, to comply with the relevant safety requirements. At least one protective device contains SE preferably also the case protective device GSE, for example, in the form of a frame switch. The case protective device GSE is triggered when opening the case tachograph DTCO. Tachograph DTCO, preferably, is made for the protection against manipulation by limiting or stop their work and, if necessary, by erasing data, relevant from the point of view of protection, such as cryptographic keys stored in the protected storage device SMEM. The case protective device GSE can also be created by sealing or tight sealing of the enclosure or include anything like that so that opening the body is recognized. Storage device DMEM data, preferably performed without protection, i.e., in particular, is not protected from manipulation nor electrically nor mechanical. Due to the General case of the higher cost of secure storage device SMEM compared to a storage device, DMEM secure data storage device SMEM under certain conditions has only a small capacity compared with the storage device DMEM data. The data stored in the device mass memory DMEM data is protected from unauthorized manipulation, for example, using digital signatures. In addition, tachograph DTCO contains at least one interface DS data. With the help of at least one interface DS data tachograph DTCO connects with at least one bus FDB vehicle data. Preferably, tachograph DTCO contains two interfaces DS data. One of both of these interfaces DS data is provided for connection with one of several tires FDB data under the rule of the vehicle manufacturer. Another from both interfaces DS data is provided for connection with one of several tires FDB data, which are not under the rule of the vehicle manufacturer, and, in particular, provided for the bus FDB car, which is connected to the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). In Fig. 2B depicts the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit), containing at least one computer unit CPU, secure storage device SMEM and at least one interface DS data, which is essentially the relevant components of the tachograph DTCO. In addition, respectively, may also be provided storage device DMEM data. The on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit, preferably, also contains protective device SE corresponding to such tachograph DTCO. The on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit is made for registration or determination, and, if necessary, record the required size of the fees payable for the use of roads. The on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) may also contain block POS positioning to determine the vehicle's position at the moment. Block POS positioning is made, for example, for reception and processing of satellite navigation systems, such as «Global positioning system» («Global Positioning System», or in short: GPS. In order alternative or a complement to block POS positioning may also contain, for example, inertial sensor, in particular gyro sensor. From the block POS positioning can be partially or fully waived, if the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) will receive information from the tachograph DTCO in a reliable channel bus communication FDB vehicle data. However, you might also consider increasing the accuracy or reliability of on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) and/or tachograph DTCO due to redundancy of data to be recorded or determined by the tachograph DTCO, and data to be recorded and user-onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) and, in particular, actuator POS positioning. For example, it may be provided to the data defined by the unit POS positioning passed tachograph DTCO, preferably, on the secure virtual channel connection via the bus FDB vehicle data. Tachograph DTCO can be made for the processing and/or record these data. Thus, the divergence between registered or specific data tachograph DTCO and on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) can be easily recognized, and the safety and reliability of the system can be improved. In Fig. 2C shows a indicator unit INST, also containing at least one computer unit CPU, secure storage device SMEM and at least one interface DS data, essentially meet the relevant components of the tachograph DTCO or on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). Indicator unit INST may also contain a protective device SE corresponding to such tachograph DTCO or on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). But in General safety requirements to the indicating instrument INST lower than the tachograph DTCO or the on-Board module BU for the fee for the use of roads (Maut-on-Board-Unit). In addition, respectively, may also be provided storage device DMEM data, for example, for the interim storage of displayed data. In addition, the indicator unit INST contains at least one block ANZ indication for visualization of the information transmitted with the indicating instrument INST bus FDB vehicle data, in particular in a reliable channel with tachograph DTCO and/or with an on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit), and/or with the blocks of the device connected to the same bus FDB vehicle data. Indicator unit INST may also contain at least one block of the input data input and data sampling. Are designed, for example, switches, and/or buttons, and/or keys, and/or other input methods to enter or sample manually. In this case indicating instrument INST, preferably, is made for transmission of typed or selected data in a reliable channel via the bus FDB data accordingly provided for block device, for example in the tachograph DTCO or in the on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit). In this case, the corresponding block device under certain conditions must not have any of its own block I and so can be executed at a lower cost and smaller size. In addition, in this case, the corresponding block device must be installed in an inaccessible place of the car. Thanks to the ability to secure data storage in protected storage device SMEM, and/or reliable, and/or confidential data transfer to other units of the instrument indicating instrument INST with actuator input is suitable for the registration of the access codes and off or anything like that, for example, in the form of encryption or personal identification numbers, or abbreviated to: PIN, and to transmit them with protection from manipulation at least in one of the blocks of the device. Even the PID identification, and/or block KE access control, and/or block VT road telematics, and/or block MST motor control, and/or block KST control comfort, and/or block DIAG diagnostic interfaces, preferably, also contain at least one computer unit CPU, secure storage device SMEM and at least one interface DS data, which is essentially the relevant components of the tachograph DTCO, on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit) or an indicating instrument INST. In addition, these blocks of the device, preferably, also performed for data transfer via a robust virtual channel and/or for receiving and monitoring of the received data for unauthorized manipulation, i.e. for the distortion. Thus, the data exchange between blocks of the device can be especially safe and reliable, and the transferred data in this case is especially reliable. The protection of transmitted data against unauthorized manipulation, in particular, the payload of DAT, and thus reliable virtual channel are based on cryptographic hardware control including PW, determined, respectively, depending on the payload DAT transmitted in addition to useful information DAT. A cryptographic check the number of PW is determined by the corresponding block device, such as digital signatures or code message, which can also be called Message Authentication Code», or in short: WT. A cryptographic check the number of PW, in particular, is defined as an abbreviated code RMAC message, which can also be called truncated MAC» or «Retail-MAC». Code messages and, accordingly, the condensed code RMAC message, preferably, be determined by at least one of the cryptographic key, in particular cryptographic key that is provided for symmetric ways of encoding stored in protected storage device SMEM, preferably using block chaining mode ciphertexts («Cipher Block Chaining Mode», or in short: the CBC, and the algorithm according to the data encryption standard («Data Encryption Standard»), or reduced: DES, or U.S. data encryption standard («Advanced Encryption Standard», or in short: AES. A cryptographic check the number of PW and, in particular, the code message and a reduced code RMAC messages can also be accomplished otherwise. Code message has, for example, the length of eight bytes. Abbreviated code RMAC , preferably, consists of pieces of code messages containing, for example, four or two bytes. However, a reduced code RMAC messages may also have a different length and/or be made otherwise, shorter code RMAC message has still shorter length than code messages. The appropriate recipient of the data can control the payload DAT for distortion depending on the obtained a cryptographic check number relating to useful information DAT, and the corresponding cryptographic key. Relevant cryptographic key is the cryptographic key that the sender of the data used to get a cryptographic check number depending on the payload DAT, if a cryptographic check the number of PW was defined symmetric way, i.e., for example, how the code message or as an abbreviated code RMAC messages. For this recipient must have the same cryptographic key that and sender of data. However, the corresponding cryptographic key can also be available to the public key belonging to the private key of the sender of the data, if a cryptographic check the number of PW was defined in an asymmetric manner, such as digital signatures. In this case, the recipient of the data should only know the public key of the sender of data, and its private key - no. Asymmetrical pattern ensures particularly high reliability, but in General requires more cost calculation than a symmetric way. Therefore, to determine the cryptographic control number PW mainly used in a symmetric way. In Fig. 3 shows the process held, preferably, according to at least one of the specified events. So given event is, for example, start of operation, system initialization, or at least one of the subscribers, the end of the specified time interval, for example, day or a range of real-time, end interaction with the system or at least one of the subscribers, for example, in connection with the maintenance or repair or replacement of at least one of the subscribers, or turning on the ignition, for example, turn the ignition key. Preferably, in the process of to determine the cryptographic control number PW and to control the payload DAT depending on cryptographic control number PW passed at least one cryptographic key. As blocks of the device and subscribers includes the first GE1 and the second unit GE2 device. The first block GE1 device, educated, for example, the onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit), and the second block GE2 instrument - the tachograph DTCO. However, the first block GE1 device can be formed also indicative device INST, and the second block GE2 device - onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) or tachograph DTCO. In addition, these allocations can also be reverse. However, the first block GE1 device and/or the second block GE2 devices can be, respectively, formed at the expense of another unit of the device connected to the same bus FDB vehicle data. Preferably, the first and second units GE1, GE2 device have the public key corresponding to the subscriber connection. If not, then the first and second units GE1, GE2 device should send its corresponding public key corresponding to the subscriber connection. At the stage S1 second block GE2 carries out the control of their internal States, and if necessary - the connected sensor SENS. Stage S1, preferably carried out at the beginning of operation. At the stage of S2 first block GE1 device sends a second device GE2 query about . The first block G1 device sends a request for , preferably, in encrypted form, depending on the public key of the second block GE2 device, so that the second set of GE2 device can decode the request about the using its private key. Query about contains preferably identification information of the first block GE1 instrument, and/or the time of day and/or date, and/or sequence number. At the stage of S3 second unit S2 unit receives a query about and decrypts it, depending on its private key. At the stage of S4 second block GE2 sends the first block GE1 answer about . The second block G2 sends him answer about , preferably, in encrypted form, depending on the public key of the first block GE1, so the answer is relatively your private key can decrypt only the first block GE1 device. The answer regarding contains, preferably, a certificate containing a cryptographic key for a symmetric fashion and identifying information of the second block GE2 device. In addition, the response regarding to discourage unauthorized replacement or interference in the answer concerning , preferably, also contains a sequence number and/or the time of day and/or date, and/or a random number. At the stage S5 first block GE1 device receives a reply regarding and decrypts it, depending on its private key. The first block GE1 writes the cryptographic key in your protected storage device SMEM. May also be provided to the appropriate subscribers of communication, messaging MSG on reliable virtual channel mutually authenticate, for which, preferably, one of the subscribers sent to each subscriber connection request concerning . Such a decentralized blocks the instrument provides more flexibility. However, it may also include a centralized point , educated, preferably, tachograph DTCO. In this case, the units of the instrument are made so that, preferably, authenticate regarding this centralised point in accordance with the process shown in Fig. 3. Central location established for the formation of at least one relevant cryptographic key, and for monitoring and/or control the exchange of data between the blocks of the device for reliable virtual channel. If, for example, centralized point installs the competence of one of the blocks of the device, the other blocks of the device can trust useful data DAT received from a block device, recognised by a competent, together with the corresponding cryptographic check number PW, if the control of the payload DAT, depending on the control number PW does not contain any indication of distortion. In accordance with this centralized point may also establish that one of the blocks of the device is not competent. Other blocks of the device cannot trust useful data DAT this incompetent unit of the device even if the control payload DAT, depending on the control number PW does not contain any indication of distortion. Blocks of the device, for example, through the appropriate request to the Central location can be informed regarding the competence of the block in which they would like to receive and use the data payload DAT. This query in a Central location and his answer, preferably carried out by a reliable virtual channel. In Fig. 4A shows a diagram of the sequence of operations of the first version of the protected data transmission process between the first and the second blocks GE2, GE1 device, i.e. the process of transferring data on a reliable virtual channel. At the stage S10 second block GE2 instrument forms the transmitted message MSG, containing useful data DAT and cryptographic check the number of PW. This message MSG as an example, shown in Fig. 5. Useful data DAT and cryptographic check the number of PW, preferably in the form of reduced code RMAC messages are contained in the message MSG together. So passing a cryptographic check number PW no additional message MSG is not necessary, so that the loading of the bus FDB data of the car due to a cryptographic check number PW is not increased. Useful data DAT, stamp Tons of time or number of SEQ sequence and a cryptographic check the number of PW are useful part ND message MSG, having a length of eight bytes. For the payload DAT are designed, for example, four bytes, for example, for current speed, mileage, mileage at the moment, or the current time. For stamps, T-time or non SEQ sequence and for a cryptographic check number PW is provided by, for example, two bytes. This message MSG transmitted on the bus line FDB vehicle data, performed as part of the network controller CAN ('Controller Area Network). Message MSG, preferably, contains the ID part ID and part of the ASC. However, the message MSG may also have a different structure. The first block GE1 device at the stage S11 accepts the message MSG and controls useful data DAT, and, if necessary, time stamp, and number of SEQ sequence depending on cryptographic control number PW and at least one cryptographic key that is already stored in the protected storage device SMEM. Control includes, for example, re-definition of a cryptographic check number PW depending on the payload DAT, and if necessary from time stamps and non SEQ sequence, and also on at least one of a cryptographic key and compare the newly obtained a cryptographic check number PW adopted a cryptographic check number PW. If they do not match, the message has been tampered with by unauthorized manipulation or erroneous transfer and received messages DAT is unreliable. If the cryptographic control numbers PW match, the payload DAT reliable. It may be provided that the first block GE1 device receiving a message MSG to the stage S12. In Fig. 4B shows a envisaged in order Supplement or alternative option to perform the data transfer process with protection. He on the basic implementation corresponds to the first variant of execution. However, the payload of ND and the corresponding cryptographic check the number of PW sent over the bus FDB car at least in every single message of the second unit GE2 device in the first block of GE1 device. This is especially preferable if the payload ND and cryptographic check the number of PW is too long to be transmitted together in a single message MSG. In addition, preferably, if necessary, desired content and/or structure of the message could be saved, and for reliable transmission of data in the payload ND would have to be transmitted at least only one additional MSG containing a cryptographic check the number of PW. The transfer of at least one message MSG, containing a cryptographic check the number of PW, preferably, occurs within a specified period of time after the transfer of at least one message MSG containing the appropriate payload DAT. In accordance with the secure transmission of data, for example, between the tachograph DTCO and onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit) with the help of at least one bus FDB vehicle data, preferably, are also protected data transmission between at least one block of the device of the vehicle and at least one outside unit. At least one external block IT established, for example, an external power GE device, or an external transceiver, or a radio beacon FB. In Fig. 6 shows another way to run a system. Indicator unit INST contains applied computing unit ACPU, storage device DMEM, indicator ANZ and at least one protective device SE data. At least one protective device contains SE, in particular, preferably, secure computing unit SCPU protected storage device SMEM and housing protective device GSE. In addition, the indicator unit INST contains periphery PER and interfaces IF. Interfaces IF include, in particular, at least one interface DS data. The case protective device GSE, preferably aligned so that it extends to the interfaces IF and periphery PER, for example, in the sense that interfaces IF and peripherals PER installed in the housing, secure housing with protective device GSE so that they, although they are used as provided, may be affected by undetected manipulation. Consequently, the indicator unit INST has stepped protection. The first stage is the protection provided by the chassis and frame protective device GSE, and the second stage protection, for example, with protective grating or a protective layer protected storage device SMEM and/or secure computing unit SCPU. In protected storage device SMEM indicating instrument INST, in particular, reliably recorded at least one cryptographic key and/or mileage at the moment, and/or identification information of the driver and/or the enterprise, and/or the vehicle, and/or indicating instrument, and/or other blocks of the device, and/or the installation settings of the car's components, such blocks of the device, block KST comfort control or block MST motor control and/or data vehicle diagnostics, such as the exhaust. In particular, the record mileage currently protected against manipulation is of great importance and reliably is indicative device INST. Besides, due to the presence of at least one of the protective device SE such data and information indicating instrument INST can take from the other blocks of the device or from an external device EG on reliable virtual channel and monitor them for distortion and/or protected by the relevant control number PW pass them on reliable virtual channel in the other blocks of the device in the external device EG or further. In an embodiment of the system shown in Fig. 6, there are three bus FDB data of the car or the bus FDB vehicle data of three parts. Tachograph DTCO is connected with the first bus FDB1 vehicle data, or the first part of the tire FDB vehicle data. Blocks of the device, in particular, devices of control of the vehicle, such as the MST motor control and/or block KST management comfortable, connected shown embodiment, the second bus FDB2 vehicle data, or the second part of the tire FDB vehicle data. Third tyre FDB3 vehicle data, or the third part of the tyre FDB vehicle data, is provided for connection to external devices EG, for example, through the block DIAG diagnostic interface, or with the onboard unit BU for the fee for the use of roads (Maut-on-Board-Unit). Tachograph DTCO and on-Board unit BU for the fee for the use of roads (Maut-on-Board-Unit), as already described above is also equipped with at least one guard SE. Tachograph DTCO, preferably, contains printer PR. Preferably indicating instrument INST forms a connecting block VE, or indicating instrument INST contains the connecting block VE. Thereby indicating instrument INST serves as a gateway (Gateway). Thus, the indicator unit INST can transfer data submitted through one of the interfaces DS data, continue for at least another interface DS data. Thanks at least one protective device SE indicating instrument INST indicating instrument INST can easily control the receivable and, if necessary, passed further data, for example, using the appropriate applied control number PW or filtering, and/or , in particular, according to at least one a cryptographic key that is recorded in protected storage device SMEM. Thanks to this indicator unit INST can, for example, serve also as a protective barrier between the tyres FDB data of the vehicle or parts bus FDB vehicle data. In addition, the indicator unit INST can be also performed for block unit, United with him, i.e. for admission or block these blocks of the device, in particular for the exchange of data, in particular for the secure exchange of data over secure virtual channel. This applies in particular to external devices EG. Thanks to this system can be protected from possible unauthorized intervention from the outside, for example, through an external device EC, if external device EG will not work. In addition, the presence of at least one of the protective device SE in the indicator device INST provides control and/or software, specifically software updates provided to the indicating instrument INST, or one of the other connected with it blocks the instrument and worked, for example, from the outside through the block DIAG diagnostic interfaces, for example, with the help of the external device (EG. The software is, in particular, software implemented accordingly prescribed by the block device of the car. By controlling and/or software using an indicating instrument INST you can prevent installed and implemented software or software, distorted as a result of erroneous transmission or unauthorized manipulation, and thus violated function, protection and reliability of the respective unit of the device or car. Thanks to the selection of the control number PW software securely and reliably transmitted via a robust virtual channel indicator unit INST, for example, from an external device, EG, if necessary with an indicating instrument INST goes further in that it provided for a block device. In addition, the indicator unit INST, preferably made with the expectation of receiving and storage, for example, in a storage device DMEM data, software, specifically software, implemented in the indicator device INST as separate programs, the functions of the software or the functional modules of the software, and their implementation. Thanks to such software functionality indicating instrument INST can expand without having to upgrade the operating system or proprietary software indicating instrument INST. Preferably, the software is implemented in the conditions of protection or run-time, so that other functions of the indicating instrument INST cannot suffer. Thanks to the additional software can be further scaled-up, such as the ability to display to block unit, optional embedded in the car or disconnected from it, i.e. the possibility indication that prior to the delivery of an indicating instrument INST could not be taken into account. This applies, in particular, also valid for other device manufacturers, that, thus, by debugging corresponding software for indicating instrument INST were also able to use the indicator ANZ and/or block of input indicating instrument INST in their respective block device, for example in the on-Board unit for the fee for the use of roads (Maut-on-Board-Unit). The software may include in particular the processing and/or display, and/or provision of data, and can also include the use of protection functions of the indicating instrument INST, for example, in relation to the encryption, decryption, marking, control or data. Furthermore, thus, for example, and the other units of the instrument opportunity to use a print device PR tachograph DTCO, for which the appropriate software in the indicator device INST organizes the exchange of data with the tachograph DTCO, for example, on a reliable virtual channel, and the other blocks in the device provides printing services. Accordingly may include provision and other services and therefore, if necessary, provided with the possibility of use of the components of blocks of devices for other blocks of the device. In addition, at least one protective device SE and, in particular, secure computing unit SCPU and secure storage device SMEM, preferably, are also used for the proper oversight and/or software, optional in indicating instrument INST in accordance with software updates. Thus, the indicator unit INST is responsible center (the«Trust Center»). The system has an open system architecture, i.e. the system is not limited to certain specified units of the instrument and external blocks. Due to the presence of a cryptographic check number PW and the resulting reliable virtual channel data exchange between blocks of the device inside the car and external blocks outside of the vehicle can occur in the conditions of protection against unauthorized manipulation and thus reliably. In addition, it may additionally be provided to useful data DAT transmitted in encrypted form so that they remain private and can only be decrypted provided by the block device or an external power. In particular, the lack of a cryptographic check number PW as a code messages or short code RMAC messages you can communicate in real-time protection that meets the requirements for data exchange in the car. 1. System containing tachograph (DTCO) and the on-Board unit (OBU) for the fee for the use of roads as a communication subscribers in the exchange of data containing appropriate interfaces (DS) data, made in the form of bus interface vehicle data, so data exchange is performed via the bus (FDB) vehicle data, which can connect subscribers of tachograph (DTCO) and the on-Board unit (OBU) for the fee for the use of roads are made as transmitter data to determine the cryptographic control number (PW) depending on the payload (DAT), that through the interface (DS) data must be transmitted to the appropriate subscriber communication for the transmission to the appropriate subscriber connection cryptographic control number (PW) in addition to useful information (DAT), and the on-Board unit (OBU) for the fee for the use of roads and tachograph, made relevant data receiver for reception via interface (DS) data from the contact communications payload (DAT) and a cryptographic check number (PW)relating to useful information (DAT), and for the control of received data payload (DAT) for the presence of distortions in depending on adopted cryptographic control number (PW), wherein the useful data (DAT), transmitted from the tachograph (DTCO) to the on-Board unit (OBU) for the fee for the use of roads and accepted the last contain data speed, and/or distance traveled, and/or mileage at the moment, registered or defined by a tachograph (DTCO) or sensors (SENS), connected with a tachograph (DTCO), and/or time and/or identity of the driver and/or the enterprise, and/or vehicle, the mentioned subscribers connections with the possibility of transmission of cryptographic control number (PW) in a single message (MSG) together with relevant useful data (DAT). 2. The system of claim 1 in which the data payload (DAT), transferred from the unit (OBU) for the fee for the use of roads to tachograph (DTCO) and taken the last, contain information about the time and/or location information, defined unit (POS) of the positioning. 3. The system of claim 1, comprising indicating instrument (INST) as a subscriber connection for data exchange, contains the interface (DS) data, designed as an interface to the data bus of the car so that the communications is done via the bus (FDB) vehicle data, which connects indicating instrument (INST), indicating instrument (INST) is made with the possibility of reception via interface (DS) data from the contact communications payload (DAT) and a cryptographic check number (PW)relating to useful information (DAT), and control of the accepted useful data (DAT) for the presence of distortion depending on cryptographic control number (PW). 4. The system of claim 3, in which the indicating instrument (INST) is made as transmitter data to determine the cryptographic control number (PW) depending on the payload (DAT), through which interface (DS) data must be transmitted to the appropriate subscriber communication for the transmission to the appropriate subscriber connection cryptographic control number (PW) in addition to useful information (DAT). 5. The system of claim 3 or 4, in which the indicating instrument (INST) contains at least one protected storage device (SMEM) to save at least one of the cryptographic key, and/or mileage at the moment, and/or identity of the driver and/or the enterprise, and/or the vehicle, and/or the installation settings vehicle components and/or diagnostic data of the car. 6. The system of claim 3 or 4, in which the indicating instrument (INST) contains at least one case the protective device (GSE), which discovers opening indicating instrument (INST). 7. The system of claim 6, in which case the protective device (GSE) contains a switch Cabinet. 8. The system of claim 3 or 4, in which the indicating instrument (INST) contains at least two interfaces (DS) data performed as an interface data bus car, forms a connecting unit (VE) for communication between subscribers of communication, joined with a variety of at least two interfaces (DS) data, and executed with the possibility of further transmission, and/or control, and/or authentication accepted useful data (DAT), and/or authentication of subscribers. 9. System on item 8, in which the useful data (DAT), controlled and authenticated using an indicating instrument (INST)contain at least part of the executable software or are executables. 10. The system of claim 9, in which the indicating instrument (INST) is made to execute the executable software. 11. The system of claim 9, or 10, in which the indicating instrument (INST) is made with the possibility of further transmission of executable software to at least one of the subscribers after the successful completion of an audit and/or authentication. 12. The system of claim 9, or 10, in which the indicating instrument (INST) form a block (KST) collateral management, comfort, and/or block (DIAG) interface diagnosis, and/or block (PID) identification of identity and/or block (KE) access control, and/or anti-theft unit or contains some of it. 13. The system of claim 1 in which each of communication subscribers has, accordingly, at least one protected storage device (SMEM) to store at least one of the cryptographic key, at least one of the subscribers connection is made with the possibility of establishing at least one new cryptographic key and the encrypted transfer of at least one of the generated cryptographic key to at least one of the relevant subscribers, subscribers connections with the ability to receive and decrypt at least one the encrypted key exchange, and safe storage of at least one cryptographic key in the appropriate secure storage device (SMEM), and the subscribers of communication are possible to identify a cryptographic check number (PW) depending on at least one of the cryptographic key. 14. System on item 13, in which subscribers connections with the ability to determine the cryptographic control number (PW) as message authentication codes depending on at least one of the cryptographic key. 15. System on item 13, in which subscribers connections with the ability to determine the cryptographic control number (PW) as the abbreviation of the code (RMAC) message authentication depending on at least one of the cryptographic key. 16. The system of claim 1 in which the subscribers connections with the possibility of transmission of cryptographic control number (PW) and related useful data (DAT) separately from each other, accordingly, at least one message (MSG). 17. The system of claim 1 in which the named at least one of the subscribers, respectively, provided data exchange is made with the ability to authenticate themselves in relation to their respective at least one subscriber connection. 18. The system of claim 1 in which the on-Board unit (OBU) for the fee for the use of roads and provided if necessary indicating instrument (INST) met with the ability to authenticate themselves against the tachograph (DTCO) and, if the authentication is successful, for the provision of reliable data exchange between tachograph (DTCO), on the one hand, and on-Board unit (OBU) for the fee for the use of roads or provided if necessary indicative device (INST), on the other hand, and/or for the provision of reliable data exchange between the on-Board unit (OBU) for the fee for the use of roads and provided if necessary indicative device (INST), and otherwise, to prevent confidential exchange of data (DAT), based on control adopted the payload, depending on the respective adopted a cryptographic check number. 19. The system for any of the .13-18, in which at least one subscriber is configured to automatically re-run of formation and transfer of at least one new cryptographic key and the required if authentication is necessary, depending on the occurrence of at least one of the specified events. 20. The system of claim 1 in which at least one of the subscribers of communication provides an interface to the outer block (IT) and executed with the possibility of specifying cryptographic control number (PW) depending on the payload (DAT), which via the interface for the outer block (IT) should be transmitted to the outside unit (ITS) as a subscriber connection and transfer to this subscriber connection cryptographic control number (PW) in addition to useful information (DAT) and/or receive from the external power (HER) via an interface to an external unit (ITS) useful data (DAT) and referred to the useful data (DAT) cryptographic control number (PW) and control of the accepted useful data (DAT) for the presence of distortion depending on cryptographic control number (PW). 21. The system of claim 1 in which at least one of the subscribers is configured to encrypt the payload and at least one other of communication subscribers is configured to decrypt the received encrypted payload. 22. The system of claim 1, containing as a subscriber connection for data exchange unit (VT) road integrated telecommunications and Informatics, and/or block (MST) management engine management engine, internal combustion or at least an electric motor, providing traction vehicle, and/or block (KST) control software comfort, and/or block (DIAG) interface diagnosis, and/or block (PID) identification of identity and/or block (KE) access control, which, respectively, contain interface (DS) data, designed as an interface to the data bus of the car, so data exchange is performed via the bus (FDB) vehicle data, which are connected unit (VT) road integrated telecommunications and Informatics, the block (MST) motor control unit (KST) collateral management, comfort, block (DIAG) diagnostic interface, the block (PID) identify and block (KE) control access. 23. Tachograph, contains the interface (DS) data, designed as an interface to the data bus of the car so that the communications with at least one subscriber connection by bus (FDB) data of the car, with which are connected by a tachograph (DTCO) and the corresponding subscriber, tachograph (DTCO) is made with the possibility of specifying cryptographic control number (PW) depending on the payload (DAT), through which interface (DS) data must be transmitted to the respective at least one subscriber communication, and transmission to the appropriate subscriber connection cryptographic control number (PW) in addition to useful information (DAT) and/or reception via interface (DS ) data on at least one subscriber communication payload (DAT) and the corresponding cryptographic number (PW)relating to useful information (DAT), and control of the accepted useful data (DAT) for the presence of distortion depending on cryptographic control number (PW), tachograph (DTCO) and referred to subscribers connections with the possibility of transmission of cryptographic control number (PW) in a single message (MSG) together with relevant useful data (DAT). 24. The on-Board unit for the fee for the use of roads that contains the interface (DS) data, designed as an interface to the data bus of the car, so that communication with at least one other party, the communication is done via the bus (FDB) vehicle data, which are connected to the on-Board unit (OBU) for the fee for use of expensive and corresponding to the subscriber, the on-Board unit (OBU) for the fee for the use of roads is made with the possibility of specifying cryptographic control number (PW) depending on the payload (DAT), which through interface (DS) data must be transmitted to the respective at least one subscriber communication, and transmission to the appropriate subscriber connection cryptographic control number (PW) in addition to useful information (DAT) and/or reception via interface (DS ) data from at least one subscriber communication payload (DAT) and the corresponding cryptographic number (PW)relating to useful information (DAT), and control of the accepted useful data (DAT) for the presence of distortion depending on cryptographic control number (PW), the on-Board unit (OBU) for the collection of the use of roads and referred to subscribers connections with the possibility of transmission of cryptographic control number (PW) in a single message (MSG) together with relevant useful data (DAT). 25. Indicator unit that contains the interface (DS) data, designed as an interface to the data bus of the car, so that communication with at least one other party, the communication is done via the bus (FDB) vehicle data, which are connected indicating instrument (INST) and the corresponding subscriber, thus indicating instrument (INST) is made with the possibility of reception via interface (DS ) data from at least one subscriber communication payload (DAT) and the corresponding cryptographic number (PW)relating to useful information (DAT), and control of the accepted useful data (DAT) for the presence of distortion depending on cryptographic control number (PW), the mentioned indicator unit (INST) is made with the possibility of reception of a cryptographic check number (PW)transferred in a single message (MSG) together with relevant useful data (DAT).
|
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |