WO2008087435A2 - Authentification de données provenant de dispositifs d'enregistrement de type gps - Google Patents
Authentification de données provenant de dispositifs d'enregistrement de type gps Download PDFInfo
- Publication number
- WO2008087435A2 WO2008087435A2 PCT/GB2008/000181 GB2008000181W WO2008087435A2 WO 2008087435 A2 WO2008087435 A2 WO 2008087435A2 GB 2008000181 W GB2008000181 W GB 2008000181W WO 2008087435 A2 WO2008087435 A2 WO 2008087435A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data array
- logging device
- data
- digital signature
- message digest
- Prior art date
Links
- 238000009826 distribution Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims description 10
- 238000000034 method Methods 0.000 claims description 5
- 238000010295 mobile communication Methods 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims 9
- 230000004044 response Effects 0.000 claims 1
- 238000010200 validation analysis Methods 0.000 abstract 1
- 238000003860 storage Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 239000008186 active pharmaceutical agent Substances 0.000 description 4
- HBBGRARXTFLTSG-UHFFFAOYSA-N Lithium ion Chemical compound [Li+] HBBGRARXTFLTSG-UHFFFAOYSA-N 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 229910001416 lithium ion Inorganic materials 0.000 description 2
- -1 Nickel metal hydride Chemical class 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- OJIJEKBXJYRIBZ-UHFFFAOYSA-N cadmium nickel Chemical compound [Ni].[Cd] OJIJEKBXJYRIBZ-UHFFFAOYSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229910052987 metal hydride Inorganic materials 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 229910052718 tin Inorganic materials 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/123—Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles; Managing passenger vehicles circulating according to a fixed timetable, e.g. buses, trains, trams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the present invention relates to public key/private key authentication of log files from devices designed to record geographical location data over time, such data derived from a global positioning system (GPS) receiver.
- GPS global positioning system
- the devices are commonly called 'GPS Loggers'.
- GPS Loggers have become popular devices for recording the location history of certain people or things; good examples of which are joggers (where the jogger wishes to record his or her performance over, or details of, particular routes) and vehicles (tracking the location history of a delivery vehicle for instance, or a fleet vehicle). Because speed can be calculated using recorded positions and times, runners use them to determine their running speed, and companies with fleet vehicles can determine if, for example, drivers have been speeding.
- a message digest is created for the logged GPS data, with the message digest being derived mainly from the data itself, but can also include such information as the serial number of the device.
- the message digest is encrypted with a private key secure within the logger, and a data file is created.
- the encrypted message digest forms a digital signature which verifies the authenticity of the logged GPS location and time data, and which also verifies the identity of the device that recorded it.
- the invention is verification of the logged GPS location and time data.
- a public key is obtained, for example, from a trusted party, or as a secure part of a manufacturer-supplied software tool.
- the public key is used to decrypt the private- key-encrypted message digest, so as to obtain a message digest for the logged data.
- a trial message digest is calculated, using the same hashing function as was used by the logger to form the original message digest.
- the trial message digest is compared to the decrypted message digest for equality. If the two message digests agree, then the logged location data and the identity of the logging device are authenticated; conversely, if the two message digests do not agree, the logged location data and the identity of the logging device cannot be trusted.
- FIG. 1 is a flow diagram explaining how a digital signature is derived from logged journey data.
- FIG. 2 is a flow diagram explaining how to verify the authenticity of logged journey data.
- FIG. 3 is a block diagram illustrating the systems that make up the device in an embodiment of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
- FIG. 1 is a flow diagram illustrating the process steps carried out by the invention, those steps stored in a non-volatile memory medium such as ROM (Read Only Memory) 10.
- ROM Read Only Memory
- step S101 after being switched on as in step S101, and upon receiving a signal to commence logging in step S102, which for example could be from a button on the outer case, or a signal received via an interface to the logging device 11 , the logging device 11 begins storing data containing GPS Receiver Status (i.e. whether the receiver 2 has achieved a satellite fix or not), current longitude, latitude and absolute time at that position, as given by the GPS Receiver module 2, at regular intervals - as shown in step S104.
- Each data item consists of: GPS Receiver Status s, longitude lo, latitude Ia, altitude a, and time t, is appended to previous recordings and stored as a data array d in a non-volatile electronic memory such as Flash Storage 7. So
- d ⁇ si, loi, la-i, a-i, ti, S n , lo n , Ia n , a n , t n ⁇
- array d contains all of the information needed to reconstruct the journey taken by the logging device since being switched on. Should the GPS satellite fix be lost along the way, and hence an accurate position is unable to be determined for some recordings, this is reflected in the s parameter for those recordings; for instance in this embodiment a value of "1" represents a valid satellite fix, and a value of "0" represents no satellite fix, so invalidating any GPS data for that particular recording.
- Step S104 repeats until such time as a signal has been issued, for example from a button on the outer case, indicating that the device should stop logging (Step S105). This could also be a signal from an attached host computer 12.
- step S106 calculates a message digest MD for the data array d.
- the message digest is calculated using a hashing function, which through prearrangement is the same hashing function as is used to validate the authenticity of the data.
- the purpose of the hashing function is to derive a digest of the data array such that if even a single bit of the original array is changed, a completely different digest would result.
- the Message Digest MD for the journey data is derived from hashing function H as follows:
- i is optional additional information stored within device 11 - this could be data pertaining to the delivery job being carried out, such as the identity of the client, the identity of the individual distributor, or the identity of the distribution company. This information can be held preferably in non-volatile program memory 10, or alternatively in Flash Storage 7.
- message digest MD is encrypted with private key Kpriv
- the device has associated with it a unique private encryption key not known outside of logging device 11.
- the private key K priv has a complementary public key K pUb which operates such that only the public key can decrypt information encrypted by the private key, and only the private key can decrypt information encrypted by the public key.
- This encrypted message digest now represents a digital signature, DS, of the journey data. Because the private encryption key K priv is unique to the device, it also serves as a way of subsequently identifying the device on which the data was recorded. In step S108, the digital signature DS is stored in non-volatile storage memory 7.
- step S109 the device waits for a download request signal from a host computer, for example from a notebook or desktop personal computer.
- This download request signal could come by way of connecting the device to the host computer, by a physical connection 8 such as USB (Universal Serial Bus) interface, or by a wireless connection 9 such as via a Bluetooth interface.
- the journey data array d is uploaded to the host computer.
- additional information i is uploaded.
- the digital signature DS is then uploaded to the host computer. It is preferable keep the journey data array d and the additional information i together as one data file. It is also preferable to link the journey data and the signature in some way for ease of identification, perhaps by storing them as two separate files with similar or obviously linked filenames; "journey_data_1.txt" and
- this medium (such as a Flash Memory Card) could be removed from the logging device and inserted directly into the host computer, whereupon the files could be directly read by the host pc.
- FIG. 2 is a flow diagram illustrating process steps on a memory medium such as a disk in a personal computer (PC), by which the authenticity of journey data and event data (time and location data) are verified.
- a memory medium such as a disk in a personal computer (PC)
- PC personal computer
- a public key is obtained such as from a trusted party, and is used to decrypt the digital signature so as to obtain a decrypted message digest.
- a trial message digest is calculated using a previously agreed-upon hashing function, and based on the journey data, in the journey data file. The trial message digest is compared against the decrypted message digest, and if the two message digests are identical then the journey data is validated as authentic; conversely, if the two message digests are different, then the journey data cannot be trusted.
- step S201 obtains the public key K pUb that complements the private key K pr i V used by logging device 11.
- the public key K pUb is preferably obtained from a trusted source such as the supplier of the logging device.
- Step S202 uses the public key K pUb to decrypt the digital signature DS.
- the decrypted digital signature thus represents a message digest MD.
- Step S203 obtains the journey data array, preferably in a computer-readable file format.
- Step S204 calculates a trial message digest MD'.
- the trial message digest is calculated with the same hashing function as was used by logging device 11 , through pre-arrangement.
- the trial message digest is calculated using the same information used by logging device 11 to create the original message digest.
- the trial message digest is based on the unencrypted journey data, as well as the optional additional data i' containing information such as the identity of the client, the identity of the individual distributor, or the identity of the distribution company:
- primes e.g., " i' ”
- Step S205 compares the trial message digest MD' to the decrypted message digest MD. If the two message digests are the same, then the authenticity of both the journey data, and the additional data, including the identity of the logging device, is validated. Conversely, if the two message digests differ, the journey data cannot be trusted.
- FIG. 3 shows the make-up of the hardware subsystems of the invention.
- Antenna 1 is an integrated GPS-compatible antenna in the preferred embodiment but it is also acceptable to have a detachable external antenna, attached by means of a suitable detachable connector.
- GPS Receiver 2 is an electronic system capable of receiving signals via antenna 1 from the Global Positioning System satellites, and from those signals, outputting the receiver's geographical position, in latitude, longitude, and altitude above the Earth's surface.
- the preferred system is the US-built GPS system; however in another embodiment, a receiver for the Russian equivalent GLONASS (GLObal Navigation Satellite System) is used, and in a future embodiment, a receiver for the European Galileo system is used.
- GLONASS Globalbal Navigation Satellite System
- GPS Data Feed 3 transmits the positional data from the GPS Receiver 2 to the CPU 5. Because of the possibility of fraud by an unscrupulous user intercepting the positional data and masquerading as a GPS unit, it should be protected as much as possible, either by making the link as short as possible (by constructing the GPS receiver circuitry within the same module or integrated circuit as the CPU), or alternatively it should be cryptographically secured, by means of an encryption key in the receiver and a decryption key held in non-volatile program memory 10.
- Processor module 4 this could be a physically independent module consisting of CPU, volatile memory, non-volatile memory and interface connections, capable of carrying out computer instructions. Alternatively it could also contain the GPS Receiver, or the wired interfaces, or the wireless interfaces.
- Central Processing Unit 5 is the electronic circuit capable of executing the instructions held in non-volatile program memory 10. It uses volatile memory 6 for temporary storage during calculations and operations.
- Volatile Memory 6 is read-write memory used by the CPU during computation, especially during the message digest calculation stage, and the encryption stage. It could be dynamic RAM (DRAM) or static RAM (SRAM).
- DRAM dynamic RAM
- SRAM static RAM
- Non-volatile storage memory 7 - This is the device that will store the logged data for later retrieval. In the preferred embodiment this is programmable memory such as Flash ROM, however other non-volatile memory technologies may be used.
- Physical Interface 8 - such as RS232, Universal Serial Bus, Firewire, or any other physical interface that enables the device to communicate with a host computer.
- Wireless Interface 9 is a system that allows communication between the device and a host computer 12 without the use of a physical connection, such as Wi-Fi (IEEE 802.11 Wireless Networking), GSM (Global System for Mobile communications), Bluetooth, or an IrDA (Infrared Data Association) port.
- this interface is Bluetooth, but in an arrangement where GSM is used, via the use of GPRS (General Packet Radio Service) or SMS (Short Message Service) the device can transmit its journey data files and associated digital signature files automatically at regular intervals during the journey, rather than at the end of the journey.
- GPRS General Packet Radio Service
- SMS Short Message Service
- Non-volatile program memory 10 The purpose of this item is to store the program instructions that are executed as described in FIG 1. Although it is envisaged that this will be programmable memory such as Flash ROM, so as to allow the manufacturer to easily change unit-specific data such as the Private Key Kp r iv , other non-volatile memory technologies may be used. Authenticating GPS-Logging Device 11 - for use in the present invention.
- Host computer 12 - This could be a desktop Personal Computer (PC), or a Notebook PC, a Laptop PC, a Personal Digital Assistant, a Smartphone, or any other device capable of communicating with the GPS logging device.
- Power controller 13 The power controller controls voltage regulation, battery charging (if necessary), and power consumption.
- Power source 14 - This could be a rechargeable battery such as a Nickel- Cadmium, Nickel metal hydride, Lithium ion, or Lithium-ion Polymer battery, or could be a disposable battery.
- the power source could be the vehicle's electrical supply, connected via a suitable power connector.
- the power supply could be the host PC, transmitted for example via the USB port.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0914425A GB2459227A (en) | 2007-01-20 | 2008-01-18 | Authenticating data from GPS logging devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0701125.7A GB0701125D0 (en) | 2007-01-20 | 2007-01-20 | Authenticating data from GPS logging devices |
GB0701125.7 | 2007-01-20 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/602,431 A-371-Of-International US20100277561A1 (en) | 2007-05-29 | 2008-05-29 | Laser reactive media and apparatus and method for writing an image onto such media |
US13/932,589 Continuation US9358806B2 (en) | 2007-05-29 | 2013-07-01 | Laser reactive media and apparatus and method for writing an image onto such media |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008087435A2 true WO2008087435A2 (fr) | 2008-07-24 |
WO2008087435A3 WO2008087435A3 (fr) | 2008-12-24 |
Family
ID=37846704
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2008/000181 WO2008087435A2 (fr) | 2007-01-20 | 2008-01-18 | Authentification de données provenant de dispositifs d'enregistrement de type gps |
Country Status (2)
Country | Link |
---|---|
GB (2) | GB0701125D0 (fr) |
WO (1) | WO2008087435A2 (fr) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008142236A2 (fr) * | 2007-04-03 | 2008-11-27 | France Developpement Conseil Sarl | Procede visant a prouver la realisation d'un evenement et/ou l'existence d'un bien, en un lieu et/ou a un temps donne (s) |
GB2462834A (en) * | 2008-08-20 | 2010-02-24 | Edward Carvell Andrew | Secure GPS data logger for storing tamper-proof encrypted GPS data to a removable memory card |
EP2199943A1 (fr) * | 2008-12-17 | 2010-06-23 | Pitney Bowes, Inc. | Procédé et appareil d'attestation de transaction utilisant des informations d'emplacement |
TWI489426B (zh) * | 2010-05-14 | 2015-06-21 | Alibaba Group Holding Ltd | Method and apparatus for multimedia information based on GPS and |
WO2015139026A3 (fr) * | 2014-03-14 | 2016-03-03 | Go Tenna Inc. | Système et procédé de communication numérique entre des dispositifs informatiques |
WO2017204653A1 (fr) * | 2016-05-24 | 2017-11-30 | Polarcus Dmcc | Détection d'hydrocarbures |
CN112102053A (zh) * | 2020-07-31 | 2020-12-18 | 大众金服信息科技有限公司 | 应收账款调查管理方法、装置、计算机设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997013208A1 (fr) * | 1995-10-06 | 1997-04-10 | Scientific-Atlanta, Inc. | Livre de bord electronique pour vehicules |
US6269446B1 (en) * | 1998-06-26 | 2001-07-31 | Canon Kabushiki Kaisha | Authenticating images from digital cameras |
US6490513B1 (en) * | 2001-08-22 | 2002-12-03 | Matsushita Electrical Industrial Co., Ltd. | Automobile data archive system having securely authenticated instrumentation data storage |
US20030159044A1 (en) * | 2001-01-17 | 2003-08-21 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
WO2004066219A1 (fr) * | 2003-01-22 | 2004-08-05 | Francotyp-Postalia Ag & Co. Kg | Procede et dispositif de transmission de donnees mobile |
EP1758366A1 (fr) * | 2005-08-23 | 2007-02-28 | Agere Systems, Inc. | Authentification de données dans un dispositif de communication mobile |
-
2007
- 2007-01-20 GB GBGB0701125.7A patent/GB0701125D0/en not_active Ceased
-
2008
- 2008-01-18 WO PCT/GB2008/000181 patent/WO2008087435A2/fr active Application Filing
- 2008-01-18 GB GB0914425A patent/GB2459227A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997013208A1 (fr) * | 1995-10-06 | 1997-04-10 | Scientific-Atlanta, Inc. | Livre de bord electronique pour vehicules |
US6269446B1 (en) * | 1998-06-26 | 2001-07-31 | Canon Kabushiki Kaisha | Authenticating images from digital cameras |
US20030159044A1 (en) * | 2001-01-17 | 2003-08-21 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
US6490513B1 (en) * | 2001-08-22 | 2002-12-03 | Matsushita Electrical Industrial Co., Ltd. | Automobile data archive system having securely authenticated instrumentation data storage |
WO2004066219A1 (fr) * | 2003-01-22 | 2004-08-05 | Francotyp-Postalia Ag & Co. Kg | Procede et dispositif de transmission de donnees mobile |
EP1758366A1 (fr) * | 2005-08-23 | 2007-02-28 | Agere Systems, Inc. | Authentification de données dans un dispositif de communication mobile |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008142236A2 (fr) * | 2007-04-03 | 2008-11-27 | France Developpement Conseil Sarl | Procede visant a prouver la realisation d'un evenement et/ou l'existence d'un bien, en un lieu et/ou a un temps donne (s) |
WO2008142236A3 (fr) * | 2007-04-03 | 2009-01-29 | France Dev Conseil Sarl | Procede visant a prouver la realisation d'un evenement et/ou l'existence d'un bien, en un lieu et/ou a un temps donne (s) |
GB2462834A (en) * | 2008-08-20 | 2010-02-24 | Edward Carvell Andrew | Secure GPS data logger for storing tamper-proof encrypted GPS data to a removable memory card |
EP2199943A1 (fr) * | 2008-12-17 | 2010-06-23 | Pitney Bowes, Inc. | Procédé et appareil d'attestation de transaction utilisant des informations d'emplacement |
TWI489426B (zh) * | 2010-05-14 | 2015-06-21 | Alibaba Group Holding Ltd | Method and apparatus for multimedia information based on GPS and |
WO2015139026A3 (fr) * | 2014-03-14 | 2016-03-03 | Go Tenna Inc. | Système et procédé de communication numérique entre des dispositifs informatiques |
WO2017204653A1 (fr) * | 2016-05-24 | 2017-11-30 | Polarcus Dmcc | Détection d'hydrocarbures |
RU2720734C1 (ru) * | 2016-05-24 | 2020-05-13 | ПОЛАРКУС ДиЭмСиСи | Обнаружение углеводородов |
CN112102053A (zh) * | 2020-07-31 | 2020-12-18 | 大众金服信息科技有限公司 | 应收账款调查管理方法、装置、计算机设备及存储介质 |
CN112102053B (zh) * | 2020-07-31 | 2023-11-21 | 大众金服信息科技有限公司 | 应收账款调查管理方法、装置、计算机设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
WO2008087435A3 (fr) | 2008-12-24 |
GB2459227A (en) | 2009-10-21 |
GB0914425D0 (en) | 2009-09-30 |
GB0701125D0 (en) | 2007-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008087435A2 (fr) | Authentification de données provenant de dispositifs d'enregistrement de type gps | |
CN101620628B (zh) | 电子设备 | |
US11831710B2 (en) | Tracking and certification of digital media via distributed ledger | |
US8539232B2 (en) | Information terminal apparatus, information processing apparatus and information communication system | |
CN101939947B (zh) | 密钥管理服务器、终端、密钥共享系统、密钥配送方法以及密钥接收方法 | |
JP2005521281A (ja) | 認証可能な位置データ | |
CN109791566B (zh) | 控制加密车载数据访问的系统和方法 | |
US20070250515A1 (en) | Method and system of securing content and destination of digital download via the internet | |
US20130117572A1 (en) | Portable electronic device, system and method for authenticating a document associated with a geographical location | |
JP2013534622A (ja) | 認証可能な時間および場所の指標を提供する方法 | |
CN104025498A (zh) | 用于共享实时用户背景信息的方法和装置 | |
US9473510B2 (en) | System and method for location verification | |
US12034843B2 (en) | Private key creation using location data | |
CN117118754B (zh) | 物联网设备的信息交互管理方法、装置、设备及介质 | |
CN113452526B (zh) | 电子文件存证方法、验证方法及相应装置 | |
US20100031049A1 (en) | Time information distribution system, time distributing station, terminal, time information distribution method, and program | |
CN101833629A (zh) | 软件区域授权加密方法及其实现装置 | |
JP2001100632A (ja) | 情報認証装置及び認証局 | |
US20140245017A1 (en) | Digital Tachograph | |
US7841525B1 (en) | Digital ticketing system and method | |
US20150019871A1 (en) | Certification method and electronic device | |
KR20210069496A (ko) | 자동차의 주행거리 조작을 방지하는 방법 및 이를 사용한 주행거리기록장치 | |
JP6291883B2 (ja) | 測位端末 | |
CN112733168A (zh) | 行驶数据分享方法、系统、存储介质和车载终端 | |
EP4262137A1 (fr) | Module, procédé et système de production d'un bloc de données |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 0914425 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20080118 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08701859 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08701859 Country of ref document: EP Kind code of ref document: A2 |