WO2015154482A1 - Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid) - Google Patents

Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid) Download PDF

Info

Publication number
WO2015154482A1
WO2015154482A1 PCT/CN2014/092112 CN2014092112W WO2015154482A1 WO 2015154482 A1 WO2015154482 A1 WO 2015154482A1 CN 2014092112 W CN2014092112 W CN 2014092112W WO 2015154482 A1 WO2015154482 A1 WO 2015154482A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
system server
mobile terminal
commodity
rfid
Prior art date
Application number
PCT/CN2014/092112
Other languages
English (en)
Chinese (zh)
Inventor
江峰
Original Assignee
江峰
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 江峰 filed Critical 江峰
Publication of WO2015154482A1 publication Critical patent/WO2015154482A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Definitions

  • the invention relates to the field of commodity anti-counterfeiting technology.
  • the technical level of counterfeiting is correspondingly improved.
  • the counterfeiters illegally obtain the encrypted authentication data in the electronic tag and illegally copy it through various means such as decryption of the electronic tag, thereby counterfeiting the electronic tag to achieve the purpose of fraud. Therefore, the existing Internet anti-counterfeiting authentication system needs to be improved and improved from the system security.
  • the entire black box system security architecture is built, and the security of the anti-counterfeiting system is ensured from the overall security architecture of the system.
  • the technical solution adopted for achieving the object of the present invention is such a one-time anti-counterfeiting traceability system based on mobile terminal and RFID, comprising a system server, an RFID electronic tag disposed on each commodity, and a read/write RFID electronic device.
  • the function of the tag of the mobile terminal device is such a one-time anti-counterfeiting traceability system based on mobile terminal and RFID, comprising a system server, an RFID electronic tag disposed on each commodity, and a read/write RFID electronic device.
  • the message MB i,j is written in the RFID tag on any item.
  • the message MB i,j is a digital identity certificate for the item.
  • the message CB i, j with the message MB i, j corresponding to, and for the message MB i, j for comparison operation, to verify the authenticity of goods.
  • the message X does not match any one of the elements of the message set S.
  • the message X is not the message MB i,j , and the detected item is false, and the system server
  • the mobile terminal transmits the information that the item is false, and ends the authenticity verification operation.
  • the system server is to the mobile terminal Send the information that the product is suspicious and true, and end the authenticity check operation.
  • the system server sends the information that the commodity is true to the mobile terminal, and enters Next step.
  • Update certificate The system server generates a message MB i, j+1 and sends it to the mobile terminal.
  • the message MB i,j+1 is written by the mobile terminal into the RFID electronic tag on the item to be tested that has been determined to be true in step 2) to replace the original MB i,j .
  • the message MB i,j+1 is a new digital identity certificate representing the commodity, and is used for the next time the user performs authenticity authentication on the commodity.
  • the message CB i,j+1 is used for the next comparison operation with the message MB i,j+1 to verify the authenticity of the commodity.
  • the CB i,j is equal to MB i,j .
  • the CB i,j is an encrypted message of MB i,j .
  • the CB i,j is the hash value after MB i,j has been hashed.
  • the message CB i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the mobile terminal that scans the commodity, and simultaneously invokes and submits the time and geographic location of the mobile terminal scanning the commodity RFID when the system server receives the MB i,k last time.
  • the invention also discloses a combined encryption verification method of one-on-one certificate, that is, a one-word anti-counterfeiting traceability system based on a mobile terminal and an RFID, comprising a system server, an RFID electronic tag disposed on each commodity, and having read and write RFID
  • the electronic terminal functions as a mobile terminal device and a random number generator.
  • the system server includes a system server, an RFID electronic tag disposed on each item, a mobile terminal device having a function of reading and writing an RFID electronic tag, and a random number generator.
  • the combined message T1 i,j is written into the RFID tag on any item.
  • the message T2 i, j with the message T1 i, j corresponds to, and a message for T1 i, j for comparison operation, to verify the authenticity of goods.
  • the system server After receiving the message X sent by the reader, the system server first determines whether the format of X is the same as the combined message T1 i,j . If not, the item to be tested is false, that is, the message X is not the combined message T1 i,j , and the authenticity verification operation is ended.
  • the message X is split into two parts, XA and XB.
  • the format of the XA is the same as that of the CA i
  • the system server randomly generates a new random number MB i, j+1 .
  • the random number MB i,j+1 is used as a new digital signature certificate for the message MA i .
  • the message set S is updated to ⁇ T2 i,1 , T2 i,2 ... T2 i,j , T2 i,j+1 ⁇ .
  • the combined message T2 i, j+1 is used for the next time the user performs authenticity authentication on the item, and performs a comparison operation with the combined message T1 i, j+1 to verify the authenticity of the product.
  • the message T2 i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the mobile terminal that scans the commodity, and simultaneously invokes and submits the time and geographic location of the mobile terminal scanning the commodity RFID when the system server receives the MB i,k last time. Provide counterfeiting time and geographical location for counterfeiters for anti-counterfeiting and counterfeiting.
  • the pre-written combined message T1 i,j in the RFID electronic tag on each item has randomness and uniqueness.
  • the length of the message MA i or MB i,j is 8 to 1024 bits.
  • the merchandise serial number portion MA i includes a merchandise production time and a merchandise serial number.
  • the RFID reader is a mobile phone or mobile terminal with a radio frequency identification function or a short-range wireless communication NFC function.
  • a part of the bytes in MB i,j serves as a key for decrypting CA i .
  • a key for decrypting the CA i is implicitly included according to a certain rule.
  • the present invention can effectively prevent the electronic tag from being decrypted or being copied by the illegal counterfeiter due to the vulnerability of the tag itself.
  • the invention innovatively adopts a one-card dynamic signature authentication system.
  • messages written to an electronic tag are in a one-time certificate. That is, the initial MB i,j is stored in the electronic tag at the factory , and when the user successfully scans the tag to obtain the product information, the server automatically generates a new MB i,j+1 and calculates a new message CB i,j+1 .
  • the new message MB i+1 is rewritten into the electronic tag set on the product by the mobile device such as a mobile phone, and the new message CB i, j+1 is stored in the system server. The next time you scan the same item, the new MB i, j+1 will be read for verification to prevent the label from being cracked and copied.
  • the system employs a fault tolerance mechanism to prevent password replacement failures due to network delays or other causes. And the system will make a complete certification record. Once a certain product certification is illegal, it can accurately locate the illegal starting position and possible geographical area.
  • a one-pass anti-counterfeiting traceability system based on a mobile terminal and an RFID comprising a system server, an RFID electronic tag disposed on each item, and a mobile terminal device having a function of reading and writing an RFID electronic tag.
  • the message MB i,j is written in the RFID tag on any item.
  • the message MB i,j is a digital identity certificate for the item.
  • the message CB i, j with the message MB i, j corresponding to, and for the message MB i, j for comparison operation, to verify the authenticity of goods.
  • a message MB 1,1 is written in an RFID electronic tag, which is the first time the message is written into the RFID tag.
  • the message written in the RFID tag on the commercially available authenticity will be the message set ⁇ MB 1,1 , MB 2,1 ,...,MB n,1 ,...MB 1,2 ,MB 2,2 ,... ..., MB n, 2 , ... MB 1, m , MB 2, m , ... MB n, m ⁇ .
  • the system server stores the message MB i, j corresponding message CB i, j. That is, the system server stores the message set as belonging to or equal to ⁇ CB 1,1 , CB 2,1 , . . . , CB n,1 , . . . CB 1,2 , CB 2,2 , . . . , CB n,2 , ...CB 1,m ,CB 2,m ,...CB n,m ⁇ .
  • the message CB i,j is used for comparison with the message MB i,j to verify the authenticity of the commodity.
  • the relationship between CB i,j and MB i,j is one of the following three cases: a) the CB i,j is equal to MB i,j . b) The CB i,j is an encrypted message of MB i,j . c) The CB i,j is the hash value after MB i,j has been hashed.
  • the RFID electronic tag on the product to be tested After the RFID electronic tag on the product to be tested is scanned by using the mobile terminal device, the RFID electronic tag may also be an electronic tag on the authentic product, or may be an electronic tag on the counterfeit product. Transmitting the message X in the read RFID electronic tag to the system server, and performing a comparison operation with the message stored in the system server to verify that the commodity is authentic (ie, the message X may be a real message) MB i,j may or may not be required by the system server).
  • the message X does not match any one of the elements of the message set S.
  • the message X is not the message MB i,j , and the detected item is false, and the system server
  • the mobile terminal transmits the information that the item is false, and ends the authenticity verification operation.
  • Update certificate The system server generates a message MB i, j+1 and sends it to the mobile terminal.
  • the message MB i,j+1 is written by the mobile terminal into the RFID electronic tag on the item to be tested that has been determined to be true in step 2) to replace the original MB i,j .
  • the message MB i,j+1 is a new digital identity certificate representing the commodity, and is used for the next time the user performs authenticity authentication on the commodity.
  • the message CB i,j+1 is used for the next comparison operation with the message MB i,j+1 to verify the authenticity of the commodity.
  • the message CB i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the mobile terminal that scans the commodity, and simultaneously invokes and submits the time and geographic location of the mobile terminal scanning the commodity RFID when the system server receives the MB i,k last time.
  • the message CB 1,1 is the hash value of the message MB 1,1
  • the message CB 2,1 is the hash value of the message MB 2,1
  • ... the message CB 10,1 is the hash of the message MB 10,1 Value, and so on.
  • the RFID electronic tag may also be an electronic tag on one of the above 10 genuine products, or may be an electronic tag on the counterfeit product.
  • the hash value does not belong to the message set S, that is, it is determined that the item to be tested is not one of the above 10 pieces of genuine products.
  • the system server sends the information that the commodity is false to the mobile terminal, and ends the authenticity verification operation.
  • the system server will increment the hash value "message CB 1,2 " of the message MB 1,2 in the message set S.
  • the system server will increment the hash value "message CB 1,3 " of the message MB 1,3 in the message set S.
  • This embodiment is a preferred mode of Embodiment 1, and further includes a random number generator for implementing combined encryption authentication of the commodity.
  • a one-pass anti-counterfeiting traceability system based on a mobile terminal and an RFID comprising a system server, an RFID electronic tag disposed on each item, a mobile terminal device having a function of reading and writing an RFID electronic tag, and a random number generator.
  • the combined message T1 i,j is written into the RFID tag on any item.
  • the message T2 i, j with the message T1 i, j corresponds to, and a message for T1 i, j for comparison operation, to verify the authenticity of goods.
  • a message T1 1,1 is written in an RFID tag, which is the first time a message is written into the RFID tag.
  • the message written in the RFID tag on the commercially available authenticity will be the message set ⁇ T1 1,1 , T1 2,1 ,...,T1 n,1 ,...T1 1,2 , T1 2,2 ,... ..., T1 n, 2 , ... T1 1, m , T1 2, m , ... T1 n, m ⁇ A value.
  • the system server stores a message T2 i,j corresponding to the message T1 i,j . That is, the system server stores the message set as belonging to or equal to ⁇ T2 1,1 , T2 2,1 , . . . , T2 n,1 , . . . T2 1,2 , T2 2,2 , . . . , T2 n, 2 , ... T2 1,m , T2 2,m ,...T2 n,m ⁇ .
  • the message T2 i,j is used for comparison with the message T1 i,j to verify the authenticity of the commodity.
  • the system server After receiving the message X sent by the reader, the system server first determines whether the format of X is the same as the combined message T1 i,j . If not, the item to be tested is false, that is, the message X is not the combined message T1 i,j , and the authenticity verification operation is ended.
  • the message X is split into two parts, XA and XB.
  • the format of the XA is the same as that of the CA i
  • Decrypting the message XA to obtain a value MXA E -1 (XA)
  • the system server randomly generates a new random number MB i, j+1 .
  • the random number MB i,j+1 is used as a new digital signature certificate for the message MA j .
  • the message set S is updated to ⁇ T2 i,j , T2 i,2 . . . T2 i,j , T2 i,j+1 ⁇ .
  • the combined message T2 i, j+1 is used for the next time the user performs authenticity authentication on the item, and performs a comparison operation with the combined message T1 i, j+1 to verify the authenticity of the product.
  • the message T2 i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the mobile terminal that scans the commodity, and simultaneously invokes and submits the time and geographic location of the mobile terminal scanning the commodity RFID when the system server receives the MB i,k last time. Provide counterfeiting time and geographical location for counterfeiters for anti-counterfeiting and counterfeiting.

Landscapes

  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (RFID), caractérisé en ce que : le système comprend un serveur de système, des étiquettes électroniques RFID agencées sur chaque marchandise et un dispositif de terminal mobile comportant une fonction pour lire et écrire les étiquettes électroniques RFID. Le système met en œuvre des mesures propres à décourager la contrefaçon de marchandise par l'intermédiaire des étapes suivantes : des informations MBi,j sont écrites dans l'étiquette électronique RFID sur une marchandise quelconque; les informations MBi,j sont un certificat d'identité numérique de la marchandise; le serveur de système stocke un ensemble d'informations S={CBi,1, CBi,2 …CBi,j}, les informations CBi,j correspondant aux informations MBi,j; lorsqu'une marchandise quelconque quitte une usine pour la première fois, des informations MBi,1 sont écrites sur l'étiquette électronique RFID agencée sur la marchandise, et le serveur de système stocke l'ensemble d'informations S={CBi,1}, c'est-à-dire j=1; l'authenticité de la marchandise est vérifiée : après que l'étiquette électronique RFID sur la marchandise à tester est balayée à l'aide du dispositif de terminal mobile, des informations X lues au niveau de l'étiquette électronique RFID sont envoyées au serveur de système, et une opération de comparaison avec des éléments dans l'ensemble d'informations S est réalisée, de façon à vérifier l'authenticité de la marchandise.
PCT/CN2014/092112 2014-04-09 2014-11-25 Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid) WO2015154482A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410140584.2 2014-04-09
CN201410140584.2A CN103971250B (zh) 2014-04-09 2014-04-09 一种基于移动终端和rfid的一次一证防伪溯源系统

Publications (1)

Publication Number Publication Date
WO2015154482A1 true WO2015154482A1 (fr) 2015-10-15

Family

ID=51240710

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/CN2014/092112 WO2015154482A1 (fr) 2014-04-09 2014-11-25 Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid)
PCT/CN2015/073591 WO2015154595A1 (fr) 2014-04-09 2015-03-03 Système d'authentification à masque jetable (otp) basé sur une théorie d'authentification en boucle fermée et sur internet
PCT/CN2015/075952 WO2015154647A1 (fr) 2014-04-09 2015-04-07 Système d'authentification de devise ou de valeur basé sur une théorie d'authentification à boucle fermée
PCT/CN2015/075949 WO2015154646A1 (fr) 2014-04-09 2015-04-07 Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique

Family Applications After (3)

Application Number Title Priority Date Filing Date
PCT/CN2015/073591 WO2015154595A1 (fr) 2014-04-09 2015-03-03 Système d'authentification à masque jetable (otp) basé sur une théorie d'authentification en boucle fermée et sur internet
PCT/CN2015/075952 WO2015154647A1 (fr) 2014-04-09 2015-04-07 Système d'authentification de devise ou de valeur basé sur une théorie d'authentification à boucle fermée
PCT/CN2015/075949 WO2015154646A1 (fr) 2014-04-09 2015-04-07 Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique

Country Status (2)

Country Link
CN (1) CN103971250B (fr)
WO (4) WO2015154482A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709562A (zh) * 2015-11-16 2017-05-24 四川谦泰仁投资管理有限公司 一种具有rfid识别的点钞系统
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971250B (zh) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid的一次一证防伪溯源系统
CN105844472A (zh) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 一种同时兼容二维码防伪的rfid商品防伪溯源系统
CN105279470B (zh) * 2015-09-24 2018-01-16 深圳市金溢科技股份有限公司 一种处理款箱交接的方法、系统及手持终端
CN108874890B (zh) * 2017-05-16 2020-10-23 江峰 一种带可公开著录人机制的区块链系统
CN110648143A (zh) * 2018-06-11 2020-01-03 江峰 一种基于Merkle可信树的闭环防伪验证系统
CN109360002A (zh) * 2018-09-21 2019-02-19 蛙力买(浙江)信息科技有限公司 一种产品的防伪方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040000987A1 (en) * 2002-06-27 2004-01-01 Ncr Corporation Check fraud detection process using checks having radio frequency identifier (RFID) tags and a system therefor
CN101556654A (zh) * 2009-05-27 2009-10-14 杨志清 多变量动态数字签名、交互认证式电子标签防伪技术
CN102236861A (zh) * 2011-07-07 2011-11-09 江苏联博计算机信息产业有限公司 基于路径机制的商品防伪方法
CN103971250A (zh) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid的一次一证防伪溯源系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221098A1 (en) * 2002-05-22 2003-11-27 Kun-Huei Chen Method for automatically updating a network ciphering key
WO2007027151A1 (fr) * 2005-09-01 2007-03-08 Stora Enso Oyj Verification d'un identificateur de produits
CN101183439A (zh) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 电子票据处理系统及处理方法
CN102469080B (zh) * 2010-11-11 2015-07-15 中国电信股份有限公司 实现通行证用户安全登录应用客户端的方法和系统
CN102186151B (zh) * 2011-05-13 2016-01-13 中国电信股份有限公司 在线处理涉税业务的方法与系统、中介传输装置
CN203232458U (zh) * 2012-03-31 2013-10-09 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid电子标签的商品防伪系统
CN103544511A (zh) * 2013-10-29 2014-01-29 上海华彩科技有限公司 一种防伪标识

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040000987A1 (en) * 2002-06-27 2004-01-01 Ncr Corporation Check fraud detection process using checks having radio frequency identifier (RFID) tags and a system therefor
CN101556654A (zh) * 2009-05-27 2009-10-14 杨志清 多变量动态数字签名、交互认证式电子标签防伪技术
CN102236861A (zh) * 2011-07-07 2011-11-09 江苏联博计算机信息产业有限公司 基于路径机制的商品防伪方法
CN103971250A (zh) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid的一次一证防伪溯源系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709562A (zh) * 2015-11-16 2017-05-24 四川谦泰仁投资管理有限公司 一种具有rfid识别的点钞系统
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Also Published As

Publication number Publication date
WO2015154647A1 (fr) 2015-10-15
CN103971250A (zh) 2014-08-06
WO2015154595A1 (fr) 2015-10-15
WO2015154646A1 (fr) 2015-10-15
CN103971250B (zh) 2017-04-05

Similar Documents

Publication Publication Date Title
WO2015154482A1 (fr) Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid)
US20180308098A1 (en) Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
US10019530B2 (en) ID tag authentication system and method
TWI683567B (zh) 安全校驗方法、裝置、伺服器及終端
US10237072B2 (en) Signatures for near field communications
CN104156862A (zh) 一种基于微信平台的二维码防伪防窜货查询系统和方法
WO2020056597A1 (fr) Procédé de gestion d'identité d'article, terminal, unité de micro-traitement, dispositif d'identification, et système
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
CN110598433B (zh) 基于区块链的防伪信息处理方法、装置
WO2018227685A1 (fr) Système et procédé destinés à un accès sécurisé d'un dispositif terminal à l'internet des objets
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
CN103971245B (zh) 一种用于商品电子防伪的组合加密系统
CN110969445A (zh) 基于nfc的防伪方法
CN105844472A (zh) 一种同时兼容二维码防伪的rfid商品防伪溯源系统
CN103971246B (zh) 一种基于单向函数双向加密的商品电子防伪系统
Falcone et al. PUF-based smart tags for supply chain management
CN103971247B (zh) 一种用于商品防伪的组合加密系统
CN109145543B (zh) 一种身份认证方法
CN104732400A (zh) 一种基于二维码的商品真伪检测方法及其系统
WO2014053172A1 (fr) Procédé et système conçus pour authentifier avec certitude des entités
CN108768967B (zh) 一种rfid安全中间件
CN110648143A (zh) 一种基于Merkle可信树的闭环防伪验证系统
CN102510334B (zh) 基于wsn无线传感网射频技术的动态防伪保密系统和方法
US20240054494A1 (en) Pufduf methods and systems for authenticating identity
US20240022403A1 (en) Delivering random number keys securely for one-time pad symmetric key encryption

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14888817

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14888817

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 14888817

Country of ref document: EP

Kind code of ref document: A1