EP2661841A1 - Dispositif et procede de tracage - Google Patents
Dispositif et procede de tracageInfo
- Publication number
- EP2661841A1 EP2661841A1 EP11811104.6A EP11811104A EP2661841A1 EP 2661841 A1 EP2661841 A1 EP 2661841A1 EP 11811104 A EP11811104 A EP 11811104A EP 2661841 A1 EP2661841 A1 EP 2661841A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- signature
- validation
- marking
- message
- traceability
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 85
- 238000010200 validation analysis Methods 0.000 claims abstract description 113
- 230000008569 process Effects 0.000 claims abstract description 50
- 238000004590 computer program Methods 0.000 claims description 14
- 238000012795 verification Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 29
- 238000004364 calculation method Methods 0.000 description 20
- 238000004891 communication Methods 0.000 description 13
- 230000007246 mechanism Effects 0.000 description 7
- 230000003993 interaction Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the present invention relates to the general field of traceability of any objects such as for example materials, products or devices.
- a step experienced by an object may designate in particular a treatment applied to this object or a state or change of state of a physical parameter of this object (such as for example its temperature, its pressure, etc. .).
- the document FR 2 933 216 describes a method and a system for validating a succession of events experienced by a device.
- the device to follow integrates or carries a traceability device constituted for example by an RFID chip.
- an initial imprint E 0 is calculated in particular according to a secret, called proprietary code K in this document.
- a fingerprint E n is calculated and stored in the RFID chip, according to the previous fingerprint E n- i.
- the last fingerprint E n stored in the RFID chip is transmitted to a validation device which calculates a theoretical footprint and compares it with the received fingerprint.
- the theoretical footprint is iteratively calculated by calculating the succession of footprints that would normally be calculated by the RFID chip, from the initial footprint.
- the present invention aims to overcome these disadvantages.
- the invention relates to a tracing method implemented by a traceability device for validating a process composed of a plurality of steps, the tracing method comprising:
- a step of sending a validation message including the last new determined fingerprint to a validation device a step of sending a validation message including the last new determined fingerprint to a validation device.
- This tracing method is remarkable in that it comprises, during said at least one step of the process, a step of determining an object signature as a function of the marking message, by using an asymmetric signature function and a private key of the traceability device associated with a public key of the traceability device, the step of determining a new imprint comprising the determination of the new imprint according to the object signature.
- the invention proposes a traceability device for validating a process composed of a plurality of steps, the traceability device comprising:
- means for receiving a marking message transmitted by a marking device during at least one step of the process means for determining a new fingerprint as a function of the marking message and of a previous fingerprint, by using a hash function, during at least one step of the process, and
- This traceability device is remarkable in that it comprises means for determining an object signature according to the marking message during at least one step of the process, using an asymmetric signature function and a private key the traceability device associated with a public key of the traceability device, the means for determining a new imprint being configured to determine the new imprint according to said object signature.
- the invention proposes a validation method implemented by a validation device, intended to validate a process composed of a plurality of steps, the validation method comprising:
- the validation message comprises, for at least one step of the process, an object signature, the validation method comprising a step of verifying the authenticity of the object signature, in function of a public key of the traceability device, the step of determining a theoretical footprint comprising, when the object signature is authentic, the determination of a new current theoretical footprint according to a previous theoretical footprint and of said object signature.
- the invention proposes a validation device, intended to validate a process composed of a plurality of steps, the validation device comprising: means for receiving a validation message issued by a traceability device, including a fingerprint determined by the traceability device,
- the validation message comprises, for at least one step of the process, an object signature
- the validation device comprising means for verifying the authenticity of the object signature, in a function of a public key of the traceability device, the means for determining a theoretical footprint being configured to determine, when said object signature is authentic, a new current theoretical footprint as a function of a previous theoretical footprint and said object signature.
- the invention makes it possible, thanks to the calculation of successive imprints by the traceability device and the calculation of a theoretical imprint by the validation device, to perform a cryptographic chaining guaranteeing, in case of correspondence between the last imprint of the device. traceability and the theoretical footprint, the integrity of the sequence of process steps by an object that carries or integrates the traceability system.
- the traceability device stores all the information necessary for any validation device capable of authenticating the object signature by an asymmetrical key mechanism for locally checking the sequence of the steps of the process.
- the validation device must not know a private key of the tracing device.
- the invention also proposes a marking method implemented by a marking device associated with a step of a process composed of a plurality of steps, the marking method comprising a step of sending a marking message.
- a traceability device characterized in that it comprises a step of determining a step signature using an asymmetric signature function and a private key of the marking device associated with a public key of the marking device, the marking message including the step signature.
- the invention proposes a marking device associated with a step of a process composed of a plurality of steps, comprising means for sending a marking message to a traceability device, characterized in that it comprises means for determining a step signature using an asymmetric signature function and a private key of the marking device associated with a public key of the marking device, the marking message including the step signature.
- the validation message includes a step public key associated with a marking device and a step public key signature, the validation method including a verification step of the authenticity of said public step key.
- the marking message comprises a public step key and a signature of said public key step by a trusted entity, the method including a step of storing said step public key and said signature of said public step key, the validation message including said public step key and said signature of said stored public key.
- the validation message includes, for at least one step of the process, a step signature, the validation method comprising a step of verifying the authenticity of said signature. step, based at least on said public step key, the step of verifying the authenticity of said object signature being performed according to said step signature.
- the identity of the marking device can be authenticated.
- verifying the authenticity of the step signature confirms that the traceability device actually interacts with the marking device, and therefore that the object has actually experienced the step of corresponding process.
- the traceability device stores all the information necessary for these verifications.
- the marking message comprises step data, said step signature being determined according to the step data.
- the validation message includes, for at least one step of the process, step data, the step of verifying the authenticity of said step signature being performed according to said step data.
- the tracing method may comprise, during at least one step of the process, a step of sending an information message including at least a part of the last new determined fingerprint to the marking device,
- the marking device being able to determine a step signature according to said part by using an asymmetrical signature function and a private key of the marking device associated with a public key of the marking device,
- said object signature being determined according to said step signature.
- the step of verifying the authenticity of the step signature of the validation process can be performed according to at least a part of the last new current theoretical footprint.
- the tracing method may comprise an initialization step including the determination of an initial fingerprint independently of the private key of the traceability device.
- the validation method may comprise an initialization step including the determination of an initial fingerprint independently of a private key of the traceability device.
- the initial print may for example be received in an initialization message or be determined according to other data received in an initialization message.
- the transmission of the message initialization does not require the constraints associated with the distribution of a symmetric private key.
- the validation message includes the public key of the traceability device and a signature of the public key of the traceability device by a trusted authority, the validation method including a verification step of the traceability device. authenticity of the public key of the traceability system.
- the various steps of the tracing, marking and / or validation methods are determined by instructions from computer programs.
- the invention also relates to a computer program on an information medium, this program being capable of being implemented in a computer or the equivalent, this program comprising instructions adapted to the implementation of the steps of FIG. a tracing, marking and / or validation method as described above.
- This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any other form desirable shape.
- the invention also relates to a computer-readable information medium, comprising instructions of a computer program as mentioned above.
- the information carrier may be any entity or device capable of storing the program.
- the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a magnetic recording medium, for example a floppy disk or a disk. hard.
- the information medium may be a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means.
- the program according to the invention can be in particular, downloaded on an Internet type network.
- the information carrier may be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question (for example an ASIC circuit).
- FIG. 1 is an illustrative schematic view of a system in which the invention is implemented according to an embodiment
- FIG. 2 is a schematic view of the traceability device of FIG. 1,
- FIG. 3 is a schematic view of one of the marking devices of FIG. 1,
- FIG. 4 illustrates the interaction between the traceability device of FIG. 2 and the marking device of FIG. 3,
- FIG. 5 is a schematic view of the validation device of FIG. 1, and
- FIG. 6 represents the main steps of a validation method implemented by the validation device of FIG. 5.
- Figure 1 illustrates a system 1 in which the invention can be implemented.
- This system 1 comprises an object 2, a plurality of steps E 1 , E 2 ,... E j , a trusted authority 3, called authority A, and a validation device 4.
- the object 2 carries or integrates a traceability device 6.
- the object 2 follows a process composed of a succession of steps among the steps E 1 , E 2 , ... E j, as shown by the arrows 5 in the figure 1.
- the traceability device 6 interacts with a device of 1
- the validation device 4 can interact with the traceability device 6 to validate or not the process followed by the object 2 as a function of the stored imprint.
- FIG. 1 represents a single object 2.
- the system 1 may comprise a plurality of objects 2 each equipped with a traceability device 6.
- the traceability device 6 comprises a communication unit 61, a calculation module 62 of a hash function H, a calculation module 63 of a signature function S, and a non-volatile memory 64.
- the traceability device 6 can present the hardware architecture of a computer and include a microprocessor 66 and a volatile memory 67. The overall operation of the traceability device 6 is then determined by a computer program stored in the non-volatile memory 64 and executed by the microprocessor 66 using the volatile memory 67.
- the communication unit 61 enables the traceability device 6 to communicate in particular with a marking device 7 and with the validation device 4.
- the communication is for example a short-distance wireless radio communication.
- the traceability device 6 can take the form of an RFID chip.
- the calculation module 62 implements a cryptographic hash function H.
- This function H is for example one of the functions known cryptographic hashes: SHA-1 (Secure Hash Algorithm 1), SHA-2 (Secure Hash Algorithm 2) or MD5 (Message Digest 5).
- the calculation module 63 implements a signature function S which is an asymmetric digital signature algorithm of the DSA type, ECDSA ... operating with key pairs: public key / private key, and generating using a key private digital signature of fixed size of any size data.
- a signature function S which is an asymmetric digital signature algorithm of the DSA type, ECDSA ... operating with key pairs: public key / private key, and generating using a key private digital signature of fixed size of any size data.
- Signature (Identity, Data) is the signature calculated by the entity “Identity” using its private key to sign the data "Data”.
- the calculation modules 62 and 63 can correspond to computer programs stored in the non-volatile memory 64 and can be executed by the microprocessor 66. As a variant, the calculation modules 62 and 63 correspond to specially designed electronic circuits or configured for the hash function H and the signature function S.
- the non-volatile memory 64 makes it possible to store data, in particular data obtained by the communication unit 61 and data calculated by the calculation modules 62 and 63.
- the following data are stored in the non-volatile memory 64:
- Imprint 0 is a known and predetermined value.
- the value Empreinteo can be identical for all the objects 2 of the system 1.
- the imprint Empreinteo can for example be received in an initialization message or be determined according to other data received in an initialization message.
- the Public_Object and Private_Object keys form an asymmetric key pair that can be used in an asymmetric key cryptographic mechanism.
- Figure 3 shows a marking device 7 in more detail.
- the index i is used to designate a specific element of the marking device 7, of a step E ,.
- the marking device 7 comprises a communication unit
- the marking device 7 can present the hardware architecture of a computer and include a microprocessor 76 and a volatile memory 77. The overall operation of the marking device 7 is then determined by a computer program stored in the non-volatile memory 74 and executed by the microprocessor 76 using the volatile memory 77.
- the communication unit 71 allows the marking device 7 to communicate with the traceability device 6.
- the traceability device 6 may be an RFID chip.
- the communication unit 71 comprises an RFID reader.
- the calculation module 73 implements the signature function S mentioned above.
- the data determination module 75 makes it possible to determine DATA data in relation with the step E 1.
- the DATA data are, for example, predetermined data or data which depend on the progress of the step E 1, for example which indicates the value of a parameter.
- the calculation module 73 and the data determination module 75 can correspond to computer programs stored in the non-volatile memory 74 and can be executed by the microprocessor 76.
- the calculation module 73 and / or the data determination module 75 may correspond to specially designed or configured electronic circuits.
- the non-volatile memory 74 makes it possible to store data. It can be local or remote and accessible.
- the following data are stored in the non-volatile memory 74:
- the Public_Ei and Private_Ei keys form an asymmetric key pair that can be used in an asymmetric key cryptographic mechanism.
- PKI Public Key Infrastructures
- the traceability device 6 interacts with the corresponding marking device 7.
- Figure 4 shows this interaction in more detail.
- the index n is used, which means that the step E, is the nth step lived by the object 2.
- the fingerprint memorized by the traceability device is the fingerprint Footprint ⁇ .
- the traceability device 6 detects the marking device 7 ,, for example because the step E, involves placing the object 2 near the marking device 7, which makes a detection mutual communication units 61 and 71 possible.
- the traceability device 6 detects the marking device 7 "it extracts from its fingerprint imprint n- i the part T n -i, and transmits it to the marking device 7, in an information message M1 (step S1).
- the marking device 7 In response to the receipt of T n- i, the marking device 7, signs the data T n-1
- Signature_E n Signature (3 ⁇ 4, T n- i
- the marking device 7 transmits, in an M2 marking message, the data DATA n , its public key Publique_Ej, the signature of its public key Signature (A, Publique_Ej) and the step signature Signature_E n to the traceability device 6 (step S3).
- the traceability device 6 In response to the receipt of the M2 marking message, the traceability device 6 creates, in its non-volatile memory 64, a record n in which it stores DATAn, Publique_Ej, Signature (A, Publique_Ej) and Signature_E n .
- the traceability device 6 signs the step signature Signature_E n (step S4).
- the traceability device 6 determines, by using the calculation module 63 and its private key Private_Object, a signature of object Signature_O n :
- Signature_O n S 'IGNATURE (Object, Signature_E n)
- Signature of Object Signature_O n is also stored in record n.
- the traceability device 6 determines, using the calculation module 62, a new Footprint imprint n as a function of Previous thumbprint Footprint n -i and signature Signature_O object n :
- Footprint n H (Footprint n -i, Signature_O n )
- the non-volatile memory 64 of the traceability device 6 contains:
- a record m for m going from 1 to n, containing: DATA m , Public_Ei, Signature (A, Publique_E i ) / Signature_E m and Signature_O m .
- This information is used by the validation device 4 to validate or not the succession of steps experienced by the object 2.
- the sending of T n -i (step S1), the reception and the storage of DATA n , Public_Ei, Signature (A, Publique_Ei) and Signature_E n (step S3), the determination and the storage of Signature_O n (step S4) and the determination and storage of Footprint n (step S5) correspond to the main steps of a tracing method implemented the traceability device 6.
- This tracing method can correspond to instructions of a stored computer program in nonvolatile memory 64.
- the reception of T n-1 (step S1), the determination of Signature_E n (step S2) and the sending DATA n , Publique_Ei, Signature (A, Publique_Ei) and Signature_E n (step S3) correspond to the main steps of a marking method implemented the marking device 7.
- This marking method can correspond to instructions of a computer program stored in the non-volatile memory 74.
- FIG. 5 shows a validation device 4 in more detail.
- the validation device 4 comprises a communication unit 41, a calculation module 42 of a hash function H, a calculation module 43 of a signature function S and a memory Nonvolatile 44.
- the validation device 4 for example presents the hardware architecture of a computer and also comprises a microprocessor 46 and a volatile memory 47.
- the communication unit 41 allows the validation device 4 to communicate with the traceability device 6.
- the validation device 4 has access to or has had access to the trusted authority 3, which enables it to verify signatures produced by the trusted authority 3 by using the public key Publique_A of the trusted entity 3.
- the validation device 4 knows the predetermined value Imprint 0 .
- the imprint imprint 0 may for example be received in an initialization message or be determined according to other data received in an initialization message.
- the validation device 4 forms only one with a marking device 7.
- the validation and marking device may comprise, in its non-volatile memory, a computer program comprising instructions for carrying out a marking method as described above with reference to FIG. 4, and a computer program comprising instructions for executing a validation method as hereinafter described with reference in Figure 6.
- FIG. 6 represents the main steps of a validation process implemented by the validation device 4.
- the steps of FIG. 6 can correspond to the execution of a computer program stored in the non-volatile memory 44 by the microprocessor 46, using the volatile memory 47.
- the validation process begins when the traceability device 6 transmits, in a validation message M3, the data contained in its non-volatile memory 64 to the validation device 4 (with the exception, of course, of its private key Private_Object). This transmission can take place automatically in case of mutual detection of the communication units 61 and 41 or in response to a command from an operator.
- step S10 the validation device 4 receives the following data: - The Public_Object key,
- step SU the validation device 4 verifies the authenticity of Publique_Objet using Signature (A, Public_Object).
- the validation device 4 can check according to the public key Publique_A and Publique_Objet that Signature (A, Public_Object) has been signed by the trusted authority 3.
- the validation device 4 initializes a counter m to 1 (step S12) for performing the following steps S13 to S16 iteratively.
- step S13 the validation device 4 verifies the authenticity of Publique_Ei using Signature (A, Publique_Ei).
- the validation device 4 can check according to Publique_A and Publique_Ei that Signature (A, Publique_Ei) has been signed by the trusted authority 3.
- step S14 the validation device 4 verifies the authenticity of Signature_E m by means of T m- i (a predetermined size extract of the theoretical imprint M-1 th imprint described later), DATA m and Public_Ej. More precisely, the validation device 4 verifies, as a function of Publique_Ej, T m- i and DATA m that Signature_E m has been signed by the marking device 7,.
- step S15 the validation device 4 verifies the authenticity of Signature_O m using Signature_E m and Publique_Objet.
- the validation device 4 therefore verifies, according to Signature_E m and Publique_Objet, that Signature_O m has been signed by the traceability device 6.
- step S16 the validation device 4 determines the theoretical footprint M th footprint:
- Footprint m th H (Footprint m- th , Signature_O m ) If one of the tests of steps SU and S13 to S15 is not verified, it means that the data is not authentic and has been corrupted. The value of the counter m indicates at what stage the data has been corrupted. The validation process ends with the issuance of a data invalidity message, which can specify the value of m (step S21).
- the validation device 4 compares, in step S17, the counter m to n.
- n is not equal to n, it means that steps S13 to S16 have not yet been executed for all the steps lived by object 2. In this case, counter m is incremented by one unit (step S18) and steps S13 to S16 are repeated.
- step S19 the validation device 4 compares the last theoretical fingerprint imprint n th determined in step S16 when m was equal to n, and compares it to the imprint fingerprint n received in step S10.
- step S20 the validation process ends, in step S20, by issuing a data validity message.
- Footprint n th is not equal to Footprint n , it means that Object 2 did not follow the specified process and / or that the data was corrupted. In this case, the validation process ends with the issuance of a data invalidity message (step S21).
- an authentication of the object 2 with respect to the holding of the private key Private_Object associated with the public key Publique_Object is performed by the device of validation 4.
- the validation device 4 requests the traceability device 6 to sign a random number called Challenge, and verifies the authenticity of the signature.
- the invention makes it possible to avoid the difficulties associated with the distribution of symmetrical private keys.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1150121A FR2970357B1 (fr) | 2011-01-07 | 2011-01-07 | Dispositif et procede de tracage |
PCT/FR2011/052968 WO2012093215A1 (fr) | 2011-01-07 | 2011-12-13 | Dispositif et procede de tracage |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2661841A1 true EP2661841A1 (fr) | 2013-11-13 |
Family
ID=45509536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11811104.6A Withdrawn EP2661841A1 (fr) | 2011-01-07 | 2011-12-13 | Dispositif et procede de tracage |
Country Status (5)
Country | Link |
---|---|
US (1) | US20130311770A1 (ja) |
EP (1) | EP2661841A1 (ja) |
JP (1) | JP5872588B2 (ja) |
FR (1) | FR2970357B1 (ja) |
WO (1) | WO2012093215A1 (ja) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10305874B2 (en) * | 2017-06-16 | 2019-05-28 | Microsoft Technology Licensing, Llc | Multi-factor execution gateway |
FR3091107A1 (fr) * | 2018-12-24 | 2020-06-26 | Orange | Procédé et système de génération de clés pour un schéma de signatures anonymes |
CN109787746A (zh) * | 2018-12-28 | 2019-05-21 | 深圳竹云科技有限公司 | 一种基于硬件特征的设备指纹生成方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2790844B1 (fr) * | 1999-03-09 | 2001-05-25 | Gemplus Card Int | Procede et dispositif de surveillance du deroulement d'un programme, dispositif programme permettant la surveillance de son programme |
JP2005242530A (ja) * | 2004-02-25 | 2005-09-08 | Hitachi Ltd | 履歴記録システム、履歴記録方法、履歴記録プログラム、及び受領譲渡者用端末 |
WO2006115491A1 (en) * | 2005-04-25 | 2006-11-02 | Tecsec, Incorporated | Process of encryption and operational control of tagged data elements |
US7677438B2 (en) * | 2005-06-29 | 2010-03-16 | Microsoft Corporation | Radio frequency certificates of authenticity |
JP4111529B2 (ja) * | 2005-07-01 | 2008-07-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | トレーサビリティ署名システム、署名方法、プログラム |
CA2662675C (en) * | 2006-09-08 | 2016-05-24 | Certicom Corp. | Authenticated radio frequency identification and key distribution system therefor |
GB0704900D0 (en) * | 2007-03-14 | 2007-04-18 | British Telecomm | Verification of movement of items |
FR2933216B1 (fr) | 2008-06-27 | 2012-12-21 | Nicolas Reffe | Procede et systeme de validation d'une succession d'evenements vecus par un dispositif |
-
2011
- 2011-01-07 FR FR1150121A patent/FR2970357B1/fr not_active Expired - Fee Related
- 2011-12-13 EP EP11811104.6A patent/EP2661841A1/fr not_active Withdrawn
- 2011-12-13 US US13/978,212 patent/US20130311770A1/en not_active Abandoned
- 2011-12-13 WO PCT/FR2011/052968 patent/WO2012093215A1/fr active Application Filing
- 2011-12-13 JP JP2013547885A patent/JP5872588B2/ja not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
WO2012093215A1 (fr) | 2012-07-12 |
FR2970357A1 (fr) | 2012-07-13 |
US20130311770A1 (en) | 2013-11-21 |
JP5872588B2 (ja) | 2016-03-01 |
JP2014505419A (ja) | 2014-02-27 |
FR2970357B1 (fr) | 2013-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3547270B1 (fr) | Procédé de vérification d'une authentification biométrique | |
EP3665609B1 (fr) | Procédé et serveur de certification d'un document électronique | |
EP1570648B1 (fr) | Méthode de sécurisation des mises à jour de logiciels | |
EP3280089B1 (fr) | Procédé de génération de clé et procédé de contrôle d'accès | |
FR2922396A1 (fr) | Procede d'authentification biometrique, programme d'ordinateur, serveur d'authentification, terminal et objet portatif correspondants | |
EP2149221B1 (fr) | Procede d'authentification d'une entite par une entite verificatrice | |
FR2933216A1 (fr) | Procede et systeme de validation d'une succession d'evenements vecus par un dispositif | |
EP3623975A1 (fr) | Procédé et système de vote électronique à identification biométrique | |
WO2007045745A1 (fr) | Procede et dispositif de creation d'une signature de groupe et procede et dispositif de verification d'une signature de groupe associes | |
EP2909963B1 (fr) | Procédé de signature électronique à signature ephémère | |
EP1911194A1 (fr) | Procede de controle de transactions securisees mettant en oeuvre un dispositif physique unique, dispositif physique, systeme, et programme d'ordinateur correspondants | |
EP3238200A1 (fr) | Entité électronique sécurisée, appareil électronique et procédé de vérification de l'intégrité de données mémorisées dans une telle entité électronique sécurisée | |
EP3742699A1 (fr) | Procédé d'authentification forte d'un individu | |
WO2012093215A1 (fr) | Dispositif et procede de tracage | |
EP3316549B1 (fr) | Procédé de contrôle d'identité d'un utilisateur au moyen d'une base de données publique | |
EP3965361A1 (fr) | Echange de données entre un client et un dispositif distant, par exemple un module sécurisé | |
EP3262553B1 (fr) | Procede de transaction sans support physique d'un identifiant de securite et sans jeton, securise par le decouplage structurel des identifiants personnels et de services | |
WO2017220899A1 (fr) | Procédé d'authentification avec un mot de passe comprenant un sel | |
WO2009083528A1 (fr) | Procédé et système pour générer des données biométriques stables | |
WO2009083527A1 (fr) | Procede et systeme pour authentifier des individus a partir de donnees biometriques | |
FR2898423A1 (fr) | Procede securise de configuration d'un dispositif de generation de signature electronique. | |
WO2017005644A1 (fr) | Procédé et système de contrôle d'accès à un service via un média mobile sans intermediaire de confiance | |
EP3503500B1 (fr) | Procédé pour créer une signature électronique à distance au moyen du protocole fido | |
EP4099614A1 (fr) | Procédés d'enrolement de données pour vérifier l'authenticité d'une donnée de sécurité ou de verification de l'authenticité d'une donnée de securité | |
WO2012172245A1 (fr) | Transfert securise entre memoire non-volatile et memoire volatile |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130627 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20161118 |
|
19U | Interruption of proceedings before grant |
Effective date: 20161014 |
|
19W | Proceedings resumed before grant after interruption of proceedings |
Effective date: 20180201 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: HAON, WILFRIED |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20180802 |