Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020114597 - TECHNIQUE FOR CRYPTOGRAPHIC DOCUMENT PROTECTION AND VERIFICATION

Publication Number WO/2020/114597
Publication Date 11.06.2020
International Application No. PCT/EP2018/083788
International Filing Date 06.12.2018
IPC
G06F 21/64 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
CPC
G06F 21/64
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 2209/38
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
38Chaining, e.g. hash chain or certificate chain
H04W 12/04
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
H04W 12/0609
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
06Authentication
0609using certificates or pre-shared keys
Applicants
  • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) [SE]/[SE]
Inventors
  • PATEL, Dhruvin
  • WEIDENFELLER, Thomas
Agents
  • RÖTHINGER, Rainer
Priority Data
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) TECHNIQUE FOR CRYPTOGRAPHIC DOCUMENT PROTECTION AND VERIFICATION
(FR) TECHNIQUE DE PROTECTION ET DE VÉRIFICATION DE DOCUMENTS CRYPTOGRAPHIQUES
Abstract
(EN)
A technique for controlling cryptographic document protection and verification is presented. In one implementation, a device is associated with a device identifier and with a cryptographic key is configured to obtain an electronically processable document representation (EPDR) of content of a document that is to be protected and to apply the cryptographic key to the EPDR to obtain a cryptographically processed document representation (CPDR). The device is further configured to transmit the device identifier and a verification parameter comprising at least one of the EPDR and the CPDR towards a transaction server that is configured to log the device identifier and the verification parameter in a tamper-proof manner. The device is also configured to receive a transaction identifier associated with the device identifier and the verification parameter from the transaction server, and to trigger printing of the transaction identifier and the CPDR on a physical document that corresponds to the EPDR.
(FR)
L'invention concerne une technique de commande de la protection et de la vérification de documents cryptographiques. Selon un mode de réalisation, un dispositif est associé à un identifiant de dispositif et une clé cryptographique est configurée pour obtenir une représentation de document pouvant être traitée électroniquement (EPDR) du contenu d'un document à protéger et appliquer la clé cryptographique à l'EPDR pour obtenir une représentation de document traitée par cryptographie (CPDR). Le dispositif est en outre configuré pour transmettre l'identifiant de dispositif et un paramètre de vérification comprenant l'EPDR et/ou la CPDR vers un serveur de transaction qui est configuré pour enregistrer l'identifiant de dispositif et le paramètre de vérification de manière inviolable. Le dispositif est également configuré pour recevoir un identifiant de transaction associé à l'identifiant de dispositif et au paramètre de vérification à partir du serveur de transaction, et pour déclencher l'impression de l'identifiant de transaction et de la CPDR sur un document physique qui correspond à l'EPDR.
Latest bibliographic data on file with the International Bureau