Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020201510 - SECURE TRANSMISSION

Publication Number WO/2020/201510
Publication Date 08.10.2020
International Application No. PCT/EP2020/059568
International Filing Date 03.04.2020
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
G06F 21/64 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
CPC
G06F 21/64
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 63/0876
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0876based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
H04L 63/123
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
123received data contents, e.g. message integrity
H04L 63/126
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
126the source of the received data
H04L 9/0863
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
0863involving passwords or one-time passwords
H04L 9/3242
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3242involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Applicants
  • Y R FREE LABS LIMITED [GB]/[GB]
Inventors
  • DAVIES, Phil
Agents
  • MARKS & CLERK LLP
Priority Data
16/375,22004.04.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURE TRANSMISSION
(FR) TRANSMISSION SÉCURISÉE
Abstract
(EN)
A method for providing evidential data is disclosed. The method comprises establishing one or more first secret tokens with a server; obtaining one or more data items from one or more sensors; modifying the one or more data items with at least one of the one or more first secret tokens to provide one or more modified data items; generating a respective first hash value for each of the one or more modified data items; generating a second hash value for a data set comprising each of the first hash values but excluding the one or more data items; transmitting a first message comprising the one or more data items, the one or more first hash values and the second hash value to the server; obtaining one or more transaction identifiers which comprise one or more static identifiers; transmitting an indication of the static identifiers to the server, comprising generating a respective third hash value for each of the one or more static identifiers, and the indication includes the third hash values; and establishing one or more second secret tokens with the server after transmission of the first message, the one or more second secret tokens for combining with one or more second data items obtained from the one or more sensors for generating a second message.
(FR)
La présente invention concerne un procédé de fourniture de données probantes. Le procédé comprend les étapes consistant à : établir un ou plusieurs premiers jetons secrets avec un serveur ; obtenir un ou plusieurs éléments de données à partir d'un ou plusieurs capteurs ; modifier le ou les éléments de données avec au moins l'un du ou des premiers jetons secrets pour fournir un ou plusieurs éléments de données modifiés ; générer une première valeur de hachage respective pour chacun du ou des éléments de données modifiés ; générer une seconde valeur de hachage pour un ensemble de données comprenant chacune des premières valeurs de hachage mais excluant le ou les éléments de données ; transmettre un premier message comprenant le ou les éléments de données, la ou les premières valeurs de hachage et la seconde valeur de hachage au serveur ; obtenir un ou plusieurs identifiants de transaction qui comprennent un ou plusieurs identifiants statiques ; transmettre une indication des identifiants statiques au serveur, comprenant la génération d'une troisième valeur de hachage respective pour chacun du ou des identifiants statiques, et l'indication comprenant les troisièmes valeurs de hachage ; et établir un ou plusieurs seconds jetons secrets avec le serveur après transmission du premier message, le ou les seconds jetons secrets pour la combinaison avec un ou plusieurs seconds éléments de données obtenus à partir du ou des capteurs pour générer un second message.
Latest bibliographic data on file with the International Bureau