EP1486028B1 - Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente - Google Patents
Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente Download PDFInfo
- Publication number
- EP1486028B1 EP1486028B1 EP03722214A EP03722214A EP1486028B1 EP 1486028 B1 EP1486028 B1 EP 1486028B1 EP 03722214 A EP03722214 A EP 03722214A EP 03722214 A EP03722214 A EP 03722214A EP 1486028 B1 EP1486028 B1 EP 1486028B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- information
- document
- cryptographic module
- encrypted
- station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00741—Cryptography or similar special procedures in a franking system using specific cryptographic algorithms or functions
- G07B2017/00758—Asymmetric, public-key algorithms, e.g. RSA, Elgamal
- G07B2017/00766—Digital signature, e.g. DSA, DSS, ECDSA, ESIGN
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00959—Cryptographic modules, e.g. a PC encryption board
Definitions
- the invention relates to a method for creating forgery-proof Documents or records, with a key information generated and an encrypted check information from the key information and a transaction indicator is formed.
- the invention further relates to a value transfer center with an interface for loading value amounts.
- cryptographic module is distinguished by having electronic data inside involve or process data that does not go unnoticed from the outside can be viewed or manipulated.
- a cryptographic module can act as a secure, sealed entity be considered in the security-related processes that are not manipulated from the outside can.
- a globally recognized standard for such cryptographic Modules is that of the US National Authority for standardization NIST published standard for cryptographic modules called FIPS Pub 140th
- modules are usually one or more asymmetric Keypairs deposited, which are characterized by that encryption with the so-called private Keys are generated only with the associated public Keys can be reversed and that Encryptions generated with the public key are undone, only with the associated private key can be made. According to their designation are public Key to the publication and any Distribution, whereas private keys are not issued may be used and when used together with cryptographic modules do not leave these modules at any time allowed to.
- Algorithms such as for checksum formation or, in the example of digital signature, for creating a so-called digital Fingerprint or "hash value" that distinguishes that he has any data content to one usually quantitatively represents significantly shortened information in such a way that the result is irreversible and unique and that for different data contents with which the algorithm fed will result in different results.
- the examination of such a digital signature is usually done as follows: The recipient receives the document and the encrypted check value. The receiver still needs and this is what the later described invention aims at, the public Key of the document manufacturer and used to decrypt the test value given by the document manufacturer with his private key inside the encrypted cryptographic module. After decryption the receiver thus has the unencrypted Test value. Furthermore, the receiver turns in the next step the same algorithm for creating a check value the received document. Finally, in the third step the receiver compares the self-generated test value with the decrypted test value of the document manufacturer. Both agree Check values, the document was not falsified and the authenticity of the document is proven beyond doubt. Usually, in known digital signatures also checked the authenticity of the document manufacturer.
- CA certification authority
- the recipient of the document takes the public key in this case
- the document manufacturer is not just given as a given, but also checks this for affiliation with the document manufacturer, by giving the digital signature of the public Key in the manner described above.
- this problem can be illustrated by an example describe in such a way that it is necessary to test the authenticity of a usual digitally signed document is required the public key or the key certificate of the Document manufacturer or his cryptographic module to have the exam available. If at a test center, As usual, documents from various document manufacturers are checked so it is necessary there all public Keys or all key certificates of all document manufacturers to have available.
- Attaching the key or the key certificate is then detrimental if the scope of the document minimized must be held and an attached key to printing, to be transferred or processed record would increase excessively.
- a deposit of a public key at the test center is particularly disadvantageous if access to Keys deposited at the test center from practical or time considerations is not possible, for example a very high number of reserved keys to which would need to be accessed in a very short time.
- German Patent DE 100 20 563 C2 of the applicant known in a generic method in a security module a mystery to generate the secret along with information, provide information about the identity of the security module, encrypted to a certification office to pass that To decipher the secret in the certification center, thereby identify the identity of the backup module, then the secret along with identity information to encrypt the document manufacturer in such a way that only a verifier can do a decryption in order to then submit the secret to a document maker.
- the document manufacturer gives his own data in the security module, the security module the even data provided by the document manufacturer with the Secret irreversibly linked and where no conclusions to the mystery are possible.
- This known method is characterized in that the Result of the irreversible linkage of the document manufacturer introduced data with the secret of the Document manufacturer self-added data as well as the encrypted Information of the certifying body the document submitted to the Examination Office.
- stamps are made by customers of a postal company using a personal cryptographic Module generated and as a machine-readable barcode on the Broadcast applied.
- the machine-readable barcode has only one very limited scope of data and thus does not allow to contribute the public key of the customer.
- digital Stamps can be read and checked in no time, resulting in the ability to split-second on a database of potentially many millions of public keys also not applicable.
- a method of providing postage with postage indicia goes from the German publication DE 100 20 402 A1 of the Applicant.
- Information needed to create a franking mark encrypted from a loading point to a crypto module a customer system that is used to generate digital Franking marks are used.
- the franking mark contains a hash value that is derived from the shipment data and the transferred and information cached in the crypto module is formed as well as one contained in this information encrypted "crypto-string" that is only available in a letter center, be decrypted during the inspection of the franking can, is provided with a digital signature.
- German patent application DE 100 20 566 A1 of the applicant describes a method of the same kind in which customers Can load amounts from a value transfer center, consumed for printing digital indicia can be. Of a customer system is doing in particular transmit a random number to the value transfer center, that of this with a symmetric key encrypted and sent back to the customer system.
- the invention is based, a creation of to enable counterfeit-proof documents that are independent from an immediate communication between the cryptographically trusted contact point and the document manufacturer can be carried out.
- this object is also achieved by a value transfer center solved according to claim 23.
- the invention provides in particular that the preparation of the random key information and the formation of the encrypted Check information from the key information and the Transaction indicator in a cryptographically trusted Contact point that the cryptographically trusted Contact point encrypts the key information, and that the encrypted check information and the encrypted Key information from the cryptographically trusted Contact point to an intermediate body be that the intermediate the encrypted Key information and the encrypted check information cached and at a later time from the transfer between the cryptographically trusted Contact point and the intermediate point decoupled to a cryptographic Module submitted by a document manufacturer.
- the invention thus provides that the cryptographic module even with a feed via an intermediate point, for example over untrustworthy in the cryptographic sense Communication partner is supplied with two types of data, on the one hand remain in the cryptographic module and the to others are attached to the document, with the ones in the cryptographic Module remaining information can be used to secure the document information via a check value and wherein the information incorporated into the document thereto serve as part of an examination of the authenticity of the document in a test center the security of the document to prove the cryptographic module.
- the invention includes a number of advantages. It allows a generation of forgery-proof documents in one Variety of applications, especially in such cases, where no direct connection between the document maker and the trusted contact point. For example, this makes it possible forgery-proof Documents without the use of computers and / or a data connection to the trusted contact point to create.
- the key information is created by chance, though the invention with a predetermined set of key information can be carried out.
- the respective random Generation of the key information is therefore special advantageous, since such a storage of a variety of Key information is avoided.
- a decryption of the key information by the Cryptographic module includes several advantages. hereby is it possible for a user of the cryptographic module to especially a document manufacturer, a confirmation receives information from the trusted contact point, especially created by the trusted contact point Received monetary value information. Furthermore this makes it possible that the cryptographic module the contained key information for subsequent encryption starts.
- a preferred use of the key information serves to an encryption of own data of the document manufacturer.
- the document manufacturer transfers his own Data in a possibly automated procedure the cryptographic Module.
- a particularly preferred embodiment of the invention is characterized by the fact that the cryptographic module the Data provided by the document manufacturer with the key information linked irreversibly.
- the result of the irreversible Linking the introduced by the document manufacturer Data with the decrypted key information form a document and / or a dataset attached to a Test center is transmitted.
- the remaining in the cryptographic module Information is encrypted in such a way that it is in the cryptographic module can be decrypted and that it is the information remaining in the cryptographic module is a value that is difficult or impossible is predictable.
- Also of particular advantage is that the supply of Cryptographic module over cryptographically untrusted Communication partner is made such that the handover the information to the cryptographic module is temporally decoupled.
- the method is carried out such that the created forgery-proof documents or datasets contain monetary information.
- the monetary information cryptographically connected to the document or record in such a way is that by comparing the monetary information and the document or record a check value can be formed.
- Another advantage is that the one payment of a postage amount showing monetary information with identification information of the document manufacturer are linked.
- a very important field of application of the invention is the production of postage stamps.
- Different intermediate points can be used become.
- a value transfer center of a Franking machine manufacturer can be used as an intermediate point.
- Another object of the invention is a value transfer center with an interface for loading value amounts.
- the value transfer center advantageously functions as an interface for receiving encrypted information a cryptographically trusted contact point and for caching the received encrypted ones Information.
- a cryptographic module for generating Tamper-proof documents with means for output encrypted check information and a check value.
- An advantageous embodiment provides that the cryptographic Module at least one means for receiving and for Decryption of key information and at least one Means for receiving a document or a record contains, and that the cryptographic module over at least a means of creating a check value for the document or the record has.
- Fig. 1 is in the cryptographic module of the document manufacturer a random number is generated and stored (1) together with the identity or identification number of the document manufacturer or the cryptographic module is encrypted (2) is sent to a trusted authority (3).
- This trusted site decrypts the random number and the identification number (4), checks the Legality of the request (5) and then encrypted the random number and a newly formed transaction indicator in such a way that only the test center is able to to undo this encryption (6).
- the like encrypted random number and the transaction indicator. will be returned to the document manufacturer (7).
- the document manufacturer now the document to be backed up in the cryptographic Module (8). There is using the document plaintext and the still stored random number a test value is formed (9).
- a method for generating digital Documents and records created without a direct Contact between a cryptographically trusted contact point and the cryptographic module, respectively a document manufacturer using the cryptographic module can be done.
- key information m key for use in the machine and, on the other hand so-called test information VS.
- the key information m key is encrypted by the Postage Point of the postal company, which serves as a trusted communication point, so that a decryption is possible only in the tamper-proof area of the Digital franking machine (cryptographic module).
- the already encrypted check information VS can be transmitted to the franking machine or the cryptographic module without further transport encryption. By encrypting the key information m key decryption is possible only in the cryptographic module of the franking machine, but not on the untrusted communication path.
- the invention is suitable for the generation of any documents. However, it is particularly advantageous for the invention a generation of digital documents of a relatively small Amount of data in the order of a few bits up to Documents with a total size including inspection information to use about 60 bytes.
- Particularly preferred documents within the meaning of the invention are Validity marks for a variety of applications. It is particularly advantageous the invention for a review to use digital postage indicia for postal items, because they are a particularly fast and easy generation the franking marks. A bet for others Territories as proof of payment of funds - digital tokens - or as other carrier A monetary value information is also possible.
- the invention is particularly suitable for all applications, in which except the document creator at least one Auditor an interest in the authenticity of the document to have.
- the invention is thus suitable for a wide Areas of application, in particular for the creation of digital Tokens for a variety of applications, such as as airline tickets, train tickets, theater or movie tickets.
- Such documents can be obtained by means of the invention be printed by the document manufacturer itself, where it is possible that the document manufacturer exists for this Credit - or loan amounts - exploits and in this way Receives a reliable proof of payment.
- the generation of these documents can, for example, via a conventional personal computer or a cryptographic unsecured printer.
- a special advantage The invention is that the creation of documents without a connection between the generation of documents without direct Connection between the document maker, he and the trusted Contact can be made.
- the document production is thus also at interposition of one or several intermediate points, or in a communication cryptographically difficult or impossible to secure Data paths possible.
- the cryptographically trusted contact point and / or the verifier will receive funds to ensure that no unauthorized documents were generated, or that no documents were falsified. This is it on one particularly simple and reliable way possible, testable generate secure digital documents and these documents reliable check.
- Such an examination can be carried out in various ways, the said cryptographic method steps being simple and can be reliably applied.
- This is a use of the invention outside the most preferred Checking the authenticity of digital postage paid mail, for example, by checking the authenticity digital tickets, air tickets ect. by a controller, or at an admission control, possible.
- compositions and method steps according to the invention can also be applied to documents before or during the creation of the counterfeit security in the sense
- This invention also be encrypted.
- the method is preferably not unencrypted Plain text but applied an encrypted text, however, the methods of this invention do not differ.
- the encryption is also in the cryptographic Module takes place and thus as shown in FIG. 3 an intermediate step of encryption between here described steps ten and eleven would take place.
Description
- Fig. 1
- das Grundprinzip eines bekannten kryptografischen Verfahrens,
- Fig. 2
- eine Prinzipskizze für eine Prinzipdarstellung einer erfindungsgemäßen Erzeugung digitaler Freimachungen und
- Fig. 3
- eine Prinzipdarstellung besonders bevorzugter Verfahrensschritte für die Erzeugung fälschungssicherer Dokumente.
Als zweiter Bestandteil des Gesamtdokuments sind an den Dokumententext die verschlüsselten Prüfinformationen aus Schritt 2 angehängt, die in Schritt 9 im kryptografischen Modul oder außerhalb des Moduls gespeichert wurden und fortan jedem zu sichernden Dokument beigefügt werden. Als dritter Bestandteil des Gesamtdokuments ist der in Schritt 11 gebildete Prüfwert angehängt.
Ein in missbräuchlicher Absicht agierender Dokumenthersteller, der ein gesichertes Dokument eines Kunden vortäuschen will, jedoch nicht Zugriff auf dessen kryptografisches Modul hat, wird nicht in der Lage sein, die Schlüsselinformation aus Schritt 1 zu erhalten und zu entschlüsseln. Diese ist jedoch unabdingbar, um einen Prüfwert herzustellen, der mit dem in der Prüfstelle hergestellten übereinstimmt. Erfindet ein in missbräuchlicher Absicht agierender Dokumenthersteller hingegen eine geeignete Schlüsselinformation, die er auch sinngemäß korrekt zur Bildung eines Prüfwerts anwenden kann, so gelingt es ihm nicht, eine hierzu passende verschlüsselte Prüfinformation herzustellen. Diese verschlüsselte Prüfinformation müsste derart verschlüsselt sein, dass nur die Prüfstelle in der Lage ist, eine Entschlüsselung vorzunehmen. Ohne Kenntnis der verwendeten Schlüssel ist dies nicht möglich. Folglich ist das System sicher und nicht überwindbar.
Claims (24)
- Verfahren zur Erstellung fälschungssicherer Dokumente oder Datensätze, wobei eine Schlüsselinformation erzeugt wird und wobei eine verschlüsselte Prüfinformation aus der Schlüsselinformation und einem Transaktionsindikator gebildet wird,
dadurch gekennzeichnet, dass die Erstellung der zufälligen Schlüsselinformation und die Bildung der verschlüsselten Prüfinformation aus der Schlüsselinformation und dem Transaktionsindikator in einer kryptografisch vertrauenswürdigen Kontaktstelle erfolgen, dass die kryptografisch vertrauenswürdige Kontaktstelle die Schlüsselinformation verschlüsselt, und dass die verschlüsselte Prüfinformation und die verschlüsselte Schlüssel information von der kryptografisch vertrauenswürdigen Kontaktstelle an eine Zwischenstelle übermittelt werden, dass die Zwischenstelle die verschlüsselte Schlüsselinformation und die verschlüsselte Prüfinformation zwischenspeichert und zu einem späteren Zeitpunkt zeitlich von der Übertragung zwischen der kryptografisch vertrauenswürdigen Kontaktstelle und der Zwischenstelle entkoppelt an ein kryptografisches Modul eines Dokumentherstellers übermittelt. - Verfahren nach Anspruch 1,
dadurch gekennzeichnet, dass die Schlüsselinformation so erstellt wird, dass die Schlüsselinformation zufällig gebildet wird. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass die verschlüsselte Schlüsselinformation und/oder die verschlüsselte Prüfinformation so beschaffen sind, dass sie in der Zwischenstelle nicht entschlüsselt werden können. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass das kryptografische Modul vorzugsweise mit einem in dem kryptografischen Modul enthaltenen Schlüssel eine Entschlüsselung der Schlüsselinformation vornimmt. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass der Dokumenthersteller eigene Daten dem kryptografischen Modul übergibt. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass das kryptografische Modul die vom Dokumenthersteller eingebrachten Daten mit der Schlüsselinformation irreversibel verknüpft. - Verfahren nach Anspruch 6,
dadurch gekennzeichnet, dass die irreversible Verknüpfung zwischen den von dem Dokumenthersteller eingebrachten Daten und der entschlüsselten Schlüsselinformation dadurch erfolgt, dass unter Verwendung der Schlüsselinformation ein Prüfwert für das Dokument gebildet wird. - Verfahren nach einem oder beiden der Ansprüche 6 oder 7,
dadurch gekennzeichnet, dass das Ergebnis der irreversiblen Verknüpfung der von dem Dokumenthersteller eingebrachten Daten mit der entschlüsselten Schlüsselinformation ein Dokument und/oder einen Datensatz bilden, der an eine Prüfstelle übermittelt wird. - Verfahren nach Anspruch 8,
dadurch gekennzeichnet, dass das an die Prüfstelle übermittelte Dokument die von dem Dokumenthersteller eingebrachten eigenen Daten wenigstens teilweise im Klartext enthält. - Verfahren nach einem oder beiden der Ansprüche 8 oder 9,
dadurch gekennzeichnet, dass in das an die Prüfstelle übermittelte Dokument die verschlüsselte Prüfinformation eingebracht wird. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass in dem kryptografischen Modul Informationen verbleiben, die derart verschlüsselt sind, dass sie im kryptografischen Modul entschlüsselt werden können. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass die Versorgung des kryptografischen Moduls mit den Informationen auch bei einer Speisung über im kryptografischen Sinne nicht vertrauenswürdige Kommunikationspartner durch eine kryptografisch vertrauenswürdige Stelle erfolgt, auf deren Information sich die Prüfstelle verlassen kann. - Verfahren nach Anspruch 12,
dadurch gekennzeichnet, dass zur Bereitstellung vertrauenswürdiger Informationen für das kryptografische Modul durch eine vertrauenswürdige Stelle kryptografische Verschlüsselungen angewendet werden, die die Prüfstelle rückgängig machen kann. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass die Versorgung des kryptografischen Moduls über kryptografisch nicht vertrauenswürdige Kommunikationspartner derart erfolgt, dass die Weiterreichung der Informationen an das kryptografische Modul zeitlich entkoppelt ist. - Verfahren nach einem oder mehreren der Ansprüche 1 bis 14,
dadurch gekennzeichnet, dass die Versorgung des kryptografischen Moduls über kryptografisch nicht vertrauenswürdige Kommunikationspartner derart erfolgt, dass ein Austausch von Informationen innerhalb eines Dialogs nicht erforderlich ist. - Verfahren nach einem oder mehreren der Ansprüche 1 bis 14,
dadurch gekennzeichnet, dass die beiden Arten von Daten kryptografisch miteinander verknüpft sind, jedoch nicht auf dem Wege der Kryptoanalyse aufgedeckt werden. - Verfahren nach Anspruch 16,
dadurch gekennzeichnet, dass die kryptografische Verknüpfung der beiden Arten von Daten dergestalt ist, dass nicht lineare Anteile, die nur der vertrauenswürdigen Kontaktstelle und der Prüfstelle bekannt sind, hinzugefügt werden. - Verfahren nach einem oder mehreren der vorangegangenen Ansprüche,
dadurch gekennzeichnet, dass die erstellten fälschungssicheren Dokumente oder Datensätze Geldwerteinformationen enthalten. - Verfahren nach 18,
dadurch gekennzeichnet, dass die Geldwerteinformation kryptografisch mit dem Dokument oder dem Datensatz derart verbunden ist, dass durch einen Vergleich zwischen den Geldwerteinformationen und dem Dokument oder den Datensatz ein Prüfwert gebildet werden kann. - Verfahren nach einem oder beiden der Ansprüche 18 oder 19,
dadurch gekennzeichnet, dass die Geldwerteinformationen einen Nachweis über die Entrichtung von Portobeträgen enthalten. - Verfahren nach Anspruch 20,
dadurch gekennzeichnet, dass die den Entrichtung des Portobetrages nachweisenden geldwerter Informationen mit Identifikationsangaben des Dokumentherstellers verknüpft sind. - Verfahren nach einem oder beiden der Ansprüche 20 oder 21,
dadurch gekennzeichnet, dass die geltwerten Informationen mit einer Adressangabe verknüpft werden. - Wertübertragungszentrum mit einer Schnittstelle zum Laden von Wertbeträgen,
dadurch gekennzeichnet, dass das Wertübertragungszentrum eine Schnittstelle zum Empfang von verschlüsselten Informationen einer kryptografisch vertrauenswürdigen Kontaktstelle und zur Zwischenspeicherung der empfangenen verschlüsselten Informationen sowie Mittel für einen Empfang von Wertübertragungsaufforderungen durch wenigstens ein kryptografisches Modul und zur zeitlich entkoppelten Weitergabe der erhaltenen verschlüsselten Information an das kryptografische Modul enthält. - Wertübertragungszentrum nach Anspruch 23,
dadurch gekennzeichnet, dass die Informationen so verschlüsselt sind, dass sie in dem Wertübertragungszentrum nicht entschlüsselt werden können.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SI200330135T SI1486028T1 (sl) | 2002-03-13 | 2003-03-10 | Postopek in priprava za tvorjenje preverljivo pred ponaredbo varnih dokumentov |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10211265A DE10211265A1 (de) | 2002-03-13 | 2002-03-13 | Verfahren und Vorrichtung zur Erstellung prüfbar fälschungssicherer Dokumente |
DE10211265 | 2002-03-13 | ||
PCT/DE2003/000760 WO2003079609A1 (de) | 2002-03-13 | 2003-03-10 | Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1486028A1 EP1486028A1 (de) | 2004-12-15 |
EP1486028B1 true EP1486028B1 (de) | 2005-09-28 |
Family
ID=27815639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03722214A Expired - Lifetime EP1486028B1 (de) | 2002-03-13 | 2003-03-10 | Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente |
Country Status (17)
Country | Link |
---|---|
US (2) | US7409062B2 (de) |
EP (1) | EP1486028B1 (de) |
JP (1) | JP4286150B2 (de) |
CN (1) | CN100473004C (de) |
AT (1) | ATE305684T1 (de) |
AU (1) | AU2003229491B8 (de) |
CA (1) | CA2479144A1 (de) |
DE (2) | DE10211265A1 (de) |
DK (1) | DK1486028T3 (de) |
ES (1) | ES2250889T3 (de) |
HK (1) | HK1071488A1 (de) |
NO (1) | NO20044277L (de) |
NZ (1) | NZ535247A (de) |
PL (1) | PL373765A1 (de) |
RU (1) | RU2323531C2 (de) |
WO (1) | WO2003079609A1 (de) |
ZA (1) | ZA200407274B (de) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007011309B4 (de) * | 2007-03-06 | 2008-11-20 | Francotyp-Postalia Gmbh | Verfahren zur authentisierten Übermittlung eines personalisierten Datensatzes oder Programms an ein Hardware-Sicherheitsmodul, insbesondere einer Frankiermaschine |
US8572695B2 (en) * | 2009-09-08 | 2013-10-29 | Ricoh Co., Ltd | Method for applying a physical seal authorization to documents in electronic workflows |
US11132685B1 (en) | 2020-04-15 | 2021-09-28 | Capital One Services, Llc | Systems and methods for automated identity verification |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5142577A (en) * | 1990-12-17 | 1992-08-25 | Jose Pastor | Method and apparatus for authenticating messages |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5812666A (en) * | 1995-03-31 | 1998-09-22 | Pitney Bowes Inc. | Cryptographic key management and validation system |
US5987140A (en) * | 1996-04-26 | 1999-11-16 | Verifone, Inc. | System, method and article of manufacture for secure network electronic payment and credit collection |
US5982506A (en) * | 1996-09-10 | 1999-11-09 | E-Stamp Corporation | Method and system for electronic document certification |
US5872848A (en) * | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
AU6759998A (en) * | 1997-03-06 | 1998-09-22 | Skylight Software, Inc. | Cryptographic digital identity method |
JP4447668B2 (ja) | 1997-03-26 | 2010-04-07 | ソニー株式会社 | データ送受信方法及び装置 |
US6023296A (en) * | 1997-07-10 | 2000-02-08 | Sarnoff Corporation | Apparatus and method for object based rate control in a coding system |
JPH11175607A (ja) | 1997-12-05 | 1999-07-02 | Hitachi Ltd | 書類送付システムおよび方法 |
GB9906293D0 (en) | 1999-03-18 | 1999-05-12 | Post Office | Improvements relating to postal services |
US20020023057A1 (en) * | 1999-06-01 | 2002-02-21 | Goodwin Johnathan David | Web-enabled value bearing item printing |
DE19948319A1 (de) | 1999-10-07 | 2000-05-11 | Juergen K Lang | Verfahren und System zur Erstellung fälschungssicherer Dokumente |
CA2425184A1 (en) | 1999-10-07 | 2003-04-07 | Deutsche Post Ag | Method for producing and checking forge-proof documents |
US7251632B1 (en) * | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
US6724894B1 (en) * | 1999-11-05 | 2004-04-20 | Pitney Bowes Inc. | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same |
US6438530B1 (en) * | 1999-12-29 | 2002-08-20 | Pitney Bowes Inc. | Software based stamp dispenser |
DE10020566C2 (de) | 2000-04-27 | 2002-11-14 | Deutsche Post Ag | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken |
DE10020402C2 (de) * | 2000-04-27 | 2002-03-14 | Deutsche Post Ag | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken |
US7251728B2 (en) * | 2000-07-07 | 2007-07-31 | Message Secure Corporation | Secure and reliable document delivery using routing lists |
DE10056599C2 (de) * | 2000-11-15 | 2002-12-12 | Deutsche Post Ag | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken |
-
2002
- 2002-03-13 DE DE10211265A patent/DE10211265A1/de not_active Withdrawn
-
2003
- 2003-03-10 PL PL03373765A patent/PL373765A1/xx not_active Application Discontinuation
- 2003-03-10 JP JP2003577477A patent/JP4286150B2/ja not_active Expired - Fee Related
- 2003-03-10 RU RU2004126947/09A patent/RU2323531C2/ru not_active IP Right Cessation
- 2003-03-10 DE DE50301269T patent/DE50301269D1/de not_active Expired - Lifetime
- 2003-03-10 ES ES03722214T patent/ES2250889T3/es not_active Expired - Lifetime
- 2003-03-10 AU AU2003229491A patent/AU2003229491B8/en not_active Ceased
- 2003-03-10 DK DK03722214T patent/DK1486028T3/da active
- 2003-03-10 AT AT03722214T patent/ATE305684T1/de not_active IP Right Cessation
- 2003-03-10 WO PCT/DE2003/000760 patent/WO2003079609A1/de active IP Right Grant
- 2003-03-10 CN CNB038082381A patent/CN100473004C/zh not_active Expired - Fee Related
- 2003-03-10 EP EP03722214A patent/EP1486028B1/de not_active Expired - Lifetime
- 2003-03-10 CA CA002479144A patent/CA2479144A1/en not_active Abandoned
- 2003-03-10 US US10/506,908 patent/US7409062B2/en not_active Expired - Fee Related
- 2003-03-10 NZ NZ535247A patent/NZ535247A/en unknown
-
2004
- 2004-09-10 ZA ZA200407274A patent/ZA200407274B/en unknown
- 2004-10-08 NO NO20044277A patent/NO20044277L/no not_active Application Discontinuation
-
2005
- 2005-05-18 HK HK05104169A patent/HK1071488A1/xx not_active IP Right Cessation
-
2008
- 2008-01-03 US US11/968,919 patent/US20080109359A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
EP1486028A1 (de) | 2004-12-15 |
AU2003229491A1 (en) | 2003-09-29 |
AU2003229491B8 (en) | 2008-08-28 |
US20050226422A1 (en) | 2005-10-13 |
DE50301269D1 (de) | 2006-02-09 |
DE10211265A1 (de) | 2003-10-09 |
JP2005528015A (ja) | 2005-09-15 |
DK1486028T3 (da) | 2006-02-06 |
ZA200407274B (en) | 2006-02-22 |
CN1647447A (zh) | 2005-07-27 |
NZ535247A (en) | 2006-02-24 |
US20080109359A1 (en) | 2008-05-08 |
ES2250889T3 (es) | 2006-04-16 |
CA2479144A1 (en) | 2003-09-25 |
ATE305684T1 (de) | 2005-10-15 |
NO20044277L (no) | 2004-10-08 |
WO2003079609A1 (de) | 2003-09-25 |
HK1071488A1 (en) | 2005-07-15 |
JP4286150B2 (ja) | 2009-06-24 |
US7409062B2 (en) | 2008-08-05 |
CN100473004C (zh) | 2009-03-25 |
PL373765A1 (en) | 2005-09-19 |
RU2004126947A (ru) | 2005-06-27 |
RU2323531C2 (ru) | 2008-04-27 |
AU2003229491B2 (en) | 2008-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE3841393C2 (de) | Zuverlässiges System zur Feststellung der Dokumentenechtheit | |
DE3841389C2 (de) | Informationsübermittlungssystem zur zuverlässigen Bestimmung der Echtheit einer Vielzahl von Dokumenten | |
DE69932028T2 (de) | System und Verfahren zum Unterdrücken von übertragenen Aussendungen einer kryptographischen Vorrichtung | |
DE69434621T2 (de) | Postgebührensystem mit nachprüfbarer Unversehrtheit | |
EP0944027B1 (de) | Frankiereinrichtung und ein Verfahren zur Erzeugung gültiger Daten für Frankierabdrucke | |
DE69533611T2 (de) | Frankiermaschinenvorrichtung, System und Verfahren zum Kommunizieren mit Frankiermaschinen | |
EP1405274B1 (de) | Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken | |
DE60023705T2 (de) | Sichere verteilung und schutz einer schlüsselinformation | |
DE3613007A1 (de) | System zur ermittlung von nicht-abgerechneten drucken | |
DE10056599C2 (de) | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken | |
EP1107190B1 (de) | Frankierverfahren und -vorrichtung | |
DE10305730B4 (de) | Verfahren zum Überprüfen der Gültigkeit von digitalen Freimachungsvermerken | |
DE19816344A1 (de) | Verfahren zur sicheren Schlüsselverteilung | |
EP1486028B1 (de) | Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente | |
EP1279147B1 (de) | Verfahren zum versehen von postsendungen mit freimachungsvermerken | |
DE19830055A1 (de) | Verfahren zur sicheren Übertragung von Dienstdaten an ein Endgerät und Anordnung zur Durchführung des Verfahrens | |
DE10020561C2 (de) | Sicherungsmodul und Verfahren zur Erstellung fälschungssicherer Dokumente | |
EP1807808B1 (de) | Verfahren und vorrichtung zum frankieren von postsendungen | |
EP1150256A1 (de) | Verfahren zur sicheren Distribution von Sicherheitsmodulen | |
EP1222512B1 (de) | Sicherungsmodul und verfahren zur erstellung fälschungssicherer dokumente | |
EP2140429A1 (de) | Verfahren und vorrichtungen zur frankierung einer postsendung mit speicherung der kennungsinformation der postsendung in einer positivliste | |
WO2009083102A1 (de) | Vorrichtung und verfahren zur verarbeitung von messwerten, verwendung eines speichermediums zur sicherung von signierten softwarekomponenten | |
DE10051818A1 (de) | Verfahren zur Überprüfung von auf Postsendungen aufgebrachten Frankiervermerken |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20041013 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1071488 Country of ref document: HK |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: R. A. EGLI & CO. PATENTANWAELTE |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20060109 |
|
REG | Reference to a national code |
Ref country code: DK Ref legal event code: T3 |
|
REF | Corresponds to: |
Ref document number: 50301269 Country of ref document: DE Date of ref document: 20060209 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: GR Ref legal event code: EP Ref document number: 20050403907 Country of ref document: GR |
|
REG | Reference to a national code |
Ref country code: HU Ref legal event code: AG4A Ref document number: E000168 Country of ref document: HU |
|
REG | Reference to a national code |
Ref country code: RO Ref legal event code: EPE |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2250889 Country of ref document: ES Kind code of ref document: T3 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1071488 Country of ref document: HK |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20060629 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: RO Payment date: 20070302 Year of fee payment: 5 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20070313 Year of fee payment: 5 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: HU Payment date: 20070314 Year of fee payment: 5 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20080314 Year of fee payment: 6 Ref country code: DK Payment date: 20080313 Year of fee payment: 6 Ref country code: ES Payment date: 20080328 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BG Payment date: 20080317 Year of fee payment: 6 Ref country code: CZ Payment date: 20080305 Year of fee payment: 6 Ref country code: EE Payment date: 20080311 Year of fee payment: 6 Ref country code: FI Payment date: 20080314 Year of fee payment: 6 Ref country code: GB Payment date: 20080320 Year of fee payment: 6 Ref country code: IE Payment date: 20080321 Year of fee payment: 6 Ref country code: IT Payment date: 20080322 Year of fee payment: 6 Ref country code: LU Payment date: 20080314 Year of fee payment: 6 Ref country code: MC Payment date: 20080313 Year of fee payment: 6 Ref country code: PT Payment date: 20080226 Year of fee payment: 6 Ref country code: SE Payment date: 20080313 Year of fee payment: 6 Ref country code: SI Payment date: 20080304 Year of fee payment: 6 Ref country code: SK Payment date: 20080304 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20080314 Year of fee payment: 6 Ref country code: CY Payment date: 20080304 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20080314 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20080430 Year of fee payment: 6 Ref country code: TR Payment date: 20080227 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20081001 |
|
NLV4 | Nl: lapsed or anulled due to non-payment of the annual fee |
Effective date: 20081001 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20080311 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GR Payment date: 20080326 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20080310 |
|
REG | Reference to a national code |
Ref country code: PT Ref legal event code: MM4A Free format text: LAPSE DUE TO NON-PAYMENT OF FEES Effective date: 20090910 |
|
BERE | Be: lapsed |
Owner name: DEUTSCHE *POST A.G. Effective date: 20090331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: CZ Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: FI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: PT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090910 Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: DK Ref legal event code: EBP |
|
EUG | Se: european patent has lapsed | ||
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20090310 |
|
REG | Reference to a national code |
Ref country code: EE Ref legal event code: MM4A Ref document number: E000231 Country of ref document: EE Effective date: 20090331 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20091130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 |
|
REG | Reference to a national code |
Ref country code: SI Ref legal event code: KO00 Effective date: 20091023 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: EE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 Ref country code: SK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: SI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090311 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20091123 Ref country code: DK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090331 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20090311 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20091002 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090311 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20090331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090311 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20090310 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 50301269 Country of ref document: DE Representative=s name: JOSTARNDT PATENTANWALTS-AG, DE Ref country code: DE Ref legal event code: R082 Ref document number: 50301269 Country of ref document: DE Representative=s name: DOMPATENT VON KREISLER SELTING WERNER - PARTNE, DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 50301269 Country of ref document: DE Representative=s name: DOMPATENT VON KREISLER SELTING WERNER - PARTNE, DE |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20220331 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 50301269 Country of ref document: DE |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230523 |