WO2024012664A1 - Cryptographically secure derived quality data of a metallic product - Google Patents
Cryptographically secure derived quality data of a metallic product Download PDFInfo
- Publication number
- WO2024012664A1 WO2024012664A1 PCT/EP2022/069486 EP2022069486W WO2024012664A1 WO 2024012664 A1 WO2024012664 A1 WO 2024012664A1 EP 2022069486 W EP2022069486 W EP 2022069486W WO 2024012664 A1 WO2024012664 A1 WO 2024012664A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sensor
- attested
- processor
- measurement outcome
- measurement
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06395—Quality analysis or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the present invention concerns a method for generating a cryptographically secure derived quality data of a metallic product , a use of such a method for generating a quality certi ficate for a metallic product , as well as a system comprising a production facility and configured for applying such a method .
- quality data of a metallic product includes data related to the origin, measured, or calculated physical and virtual properties and/or processing of the metallic product .
- the metallic product can be in particular a metal , metal ore or alloy .
- Quality properties of important industrial raw materials such as metal vary depending on the batch .
- National and international standards speci fy the various types of quality certi ficates to be provided to the purchaser in accordance with the agreements made when the relevant products are ordered . These contain technical data on the product and the measurement results of the tests prescribed for the product in question . In all subsequent stages of further processing, these quality certi ficates are a central component of quality assurance . In many applications , especially safety-critical ones , there is an obligation to always keep the products and assemblies created traceable to the material batches used . Batch-related quality certi ficates are issued by an authori zed body, usually an accredited testing laboratory ( today via destructive testing) at the manufacturer ' s premises and enclosed with the physical delivery as an accompanying document . These quality certificates are part of the performance ful filment : steel without a quality certi ficate would be like a motor vehicle without registration papers .
- quality data such as physical and mechanical properties can increasingly be derived from process data via calculation models , provided that the integrity of the data and the identity of the data source can be reliably confirmed .
- virtual quality data such as C02 footprint and other sustainability attributes have to be computed based on process data collected during production and/or processing .
- the field and purpose of the present disclosure is to allow the required document properties to be generated for data obj ects as well , thus enabling the change from the exchange of documents to the exchange of veri fiable data for quality certi ficates .
- raw and derived process data have been treated confidential . All or some information about a production and/or processing of a metallic product or a metallic article is generally inaccessible even to the owner of the product or article . Under these circumstances , trust in the properties and quality of the product or article had to be conveyed by testing . For example , quality certi ficates by trusted quality assurance authorities or test reports by trusted test facilities had to be taken into account and relied upon . This required a trusted exchange of material samples and material loss due to usually required destructive testing .
- ledger databases such as blockchain-backed systems provide exceptional traceability and for this reason are a natural fit for quality control purposes .
- Such a system is described in US 2021 / 0278826 Al .
- the disclosed method for generating a cryptographically secure derived quality data of a metallic product comprises : performing a measurement of a process parameter during production or processing of the metallic product using a sensor ; cryptographically attesting the measurement outcome using a digital identity associated with the sensor ; submitting the attested measurement outcome to a ledger database ; receiving the attested measurement outcome by a processor ; computing a computation result from the attested measurement outcome and at least one computation instruction; digitally signing the computation result using a digital identity associated with the processor ; and submitting the signed computation result to the ledger database .
- the measurement can be, e . g . , pressure , temperature , weight , duration, flow rate , speed, power, voltage , position or distance , angle , force or generally any parameter related to the quality or performance of a metallic product or of a process for producing or processing a metallic product .
- Cryptographical attestation can be achieved by a digital signature of the measurement outcome and/or by encryption of the measurement outcome with a private signing and/or encryption key, respectively .
- submission to the ledger database includes uploading the actual data, such as the attested measurement outcome or the signed computation result , to the ledger database or uploading the actual data to a storage service separate from the ledger database and uploading to the ledger database a cryptographic hash referencing the data uploaded to the storage service .
- the processor can be a processing entity or processing service provided separate from the sensor and/or the ledger database . Trust in the computation result is conveyed not through a structural relationship between the processor and the ledger database , but through the digital identity of the processor
- the signed computation result may be submitted to the ledger database together with references to the attested measurement outcome in the ledger database .
- the at least one computation instruction may comprise a sensor reference to the digital identity associated with the sensor, wherein receiving the measurement outcome includes querying the ledger database for the most recent signed measurement outcome submitted by the sensor referenced by the sensor reference .
- the computation might be triggered by the sensor .
- the sensor may be configured to send a push noti fication to the processor .
- the processor may be polling the ledger database for new data from the sensor .
- the processor may veri fy the validity of the attestation of the attested measurement outcome . This may include veri fying a digital signature with a corresponding public key . Or decrypting an encrypted measurement outcome with an expected decryption key and checking for validity of the decrypted result .
- the sensor may be a gauge calibrated and attested by a sensor certi fication authority, wherein the cryptographical attestation of the measurement outcome comprises a digital signature of the measurement outcome by the digital identity associated with the sensor, and wherein the digital identity associated with the sensor is certi fied by the sensor certi fication authority .
- the processor may store a whitelist of sensor certi fication authorities , wherein the processor veri fying the validity of the signature of the measurement outcome includes veri fying that the digital identity of the sensor is certi fied by a valid certi ficate issued by one of the certi fication authorities on the whitelist .
- the attested measurement outcome may be an encrypted version of the measurement outcome provided by the sensor, wherein the encryption key is cryptographically associated with the digital identity associated with the sensor .
- the attested measurement outcome may be obtained using a homomorphic encryption scheme , and wherein the at least one computation instruction is a homomorphic operation .
- the homomorphic encryption scheme may be a Paillier cryptosystem .
- the processor may perform a filtering and selecting of the attested measurement outcome , wherein the filtering and selecting comprises decrypting the attested measurement outcome , and applying one or more predefined filtering criteria to the decrypted measurement outcome , wherein submitting the signed computation result computed from the attested measurement outcome is in response to the corresponding measurement outcome passing the one or more filtering criteria .
- the filtering may include selecting or rej ecting a measurement outcome or computation result according to certain predefined criteria . When the criteria are not met , the instance can be rej ected and the processing aborted, such that nothing is submitted to the ledger database .
- the method may comprise retrieving the signed computation result from the ledger database , receiving an unblinding key which corresponds to the encryption key cryptographically associated with the digital identity associated with the sensor, and decrypting the computation result using the unblinding key to obtain an unblinded computation result .
- the at least one computation instruction may comprise a type constraint defining an acceptable measurement type of the measurement outcome , wherein the certi ficate of the digital identity associated with the sensor defines the measurement type for which the gauge is calibrated and attested, wherein before computing the computation result the processor veri fies that the type constraint is respected .
- the processor may be implemented in a trusted execution environment .
- the trusted execution environment ( TEE ) protects the executed instructions (program or code ) and the processed data with respect to confidentiality and integrity . It prevents unauthori zed alteration of the processed data before , during and after processing by any entity outside the TEE .
- the at least one computation instruction may be locked inside the trusted execution environment .
- the TEE ensures that the instructions in the TEE cannot be replaced or modi fied by unauthori zed entities .
- the processor may receive the at least one computation instruction, wherein the at least one computation instruction is digitally signed, and the processor veri fies the validity of the signature of the at least one computation instruction .
- the processor may veri fy the validity of the signature of the at least one computation instruction includes veri fying that the digital identity associated with the signature is certi fied by a valid certi ficate issued by a certi fication authority on a whitelist of instruction certi fication authorities stored by the processor .
- the attested measurement outcome may be submitted to the ledger database together with one or more measurement parameters selected from a group comprising : timestamp, geographic location, ambient temperature , ambient pressure , error message of the sensor, warning message of the sensor .
- the method disclosed above may be used for generating a quality certi ficate for a metallic product , in particular in the production of steel . This use has the advantage that otherwise necessary destructive testing can be avoided .
- the signed computation result may be submitted to the ledger database together with a product identi bomb .
- the submission of the signed computation result and the product identi bomb may have the form of a transaction to a digital identity of a producer of the product .
- the disclosure also concerns a method for initiali zing a system, for example a process for the setup of the data generating entities , such as the sensors and processors , including their attestation .
- the disclosure concerns a system comprising a production facility having at least one sensor and at least one processor, wherein the production facility is configured for producing or processing a metallic product , wherein the sensor is configured for performing a measurement of a process parameter of the production process of the metallic product or of the processing of the metallic product and cryptographically attesting the measurement outcome using a digital identity associated with the sensor and submitting the attested measurement outcome to a ledger database , wherein the processor is configured for receiving the attested measurement outcome and computing a computation result from the attested measurement outcome and at least one computation instruction and digitally signing the computation result using a digital identity associated with the processor and submitting the signed computation result to the ledger database .
- Fig . 1 schematically shows a first embodiment of the present disclosure , wherein a computation result is computed from a single measurement outcome and submitted to a ledger database ;
- Fig . 2 schematically shows a second embodiment of the present disclosure , wherein a computation result is computed from two measurement outcomes and using computation instructions retrieved from the ledger database ;
- Fig . 3 schematically illustrates the identities and references within the ledger database according to Fig . 2 ;
- Fig . 4 and 5 schematically illustrate the registration of identities on the blockchain of a sensor and of an instruction certi fication authority
- Fig . 6 schematically shows a third embodiment of the present disclosure , wherein the measurement outcome is encrypted and the computation operates on the encrypted measurement outcome .
- Fig . 1 shows a system 1 comprising a production facility 2 for producing or processing a metallic product , a ledger database 3 and a processor 4 .
- the production facility 2 has at least one sensor 5 .
- the production facility 2 is schematically shown with only a single sensor 5 for the sake of simplicity .
- the production facility 2 performs a production process .
- the sensor 5 measures a process parameter during the production process . From the measurement the sensor obtains a measurement outcome 6 indicated by a sheet with a scale .
- the sensor 5 cryptographically attests the measurement outcome 6 using a digital identity 7 .
- the digital identity 7 is indicated by a key .
- the key is a private key stored in a secure element 8 integrated with or securely attached to the sensor 5 .
- the secure element 8 comprises a cryptoprocessor 9 for securely accessing and using the digital identity 8 .
- the digital identity 7 used by the sensor 5 is physically and logically associated with the sensor 5 .
- the sensor 5 submits the attested measurement outcome 10 to the ledger database 3 .
- the attested measurement outcome 10 is indicated by a sheet with the scale and a seal 11 .
- the seal 11 represents a digital signature of the measurement outcome 6 .
- the measurement outcome 6 is stored in the ledger database 3 in a publicly readable format . This is useful for attesting process data where the value for third parties lies in the metallic product and not in the process data itsel f .
- the process data serves as a quality assurance for the metallic product .
- the processor 4 uses an embedded program 12 .
- the embedded program 12 comprises a collection of computation instructions , for example a particular sequence of computation instructions to be performed in order to obtain a computation result .
- At least one of the computation instructions comprises a sensor reference .
- the sensor reference is to the digital identity 7 associated with the sensor 5 .
- the processor 4 Before performing the computation instruction using the measurement outcome 6 , the processor 4 receives the attested measurement outcome 10 . For that purpose , the processor 4 queries the ledger database 3 for the most recent attested measurement outcome 10 submitted by the sensor 5 referenced by the sensor reference . The ledger database 3 responds to the processor 4 by providing and transmitting the most recent suitable ( signed and attested) measurement outcome 10 . The processor 4 then computes a computation result 13 from the attested measurement outcome 10 by applying and carrying out the one or more instructions of the program 12 to the measurement outcome 6 . The obtained computation result 13 is indicated by a sheet with a formula sign " fx" .
- the computation instructions for example contain information for trans forming the measurement outcome 6 into derived quality data provided as the computation result 13 .
- Such a trans formation may employ know-how about the process of the production facility 2 , which can be embedded in the computation instructions . For example , there might be known ( static or constant ) properties of that process , which permit to trans form the measurement outcome 6 into a more meaningful computation result 13 .
- the processor 4 digitally signs the computation result 13 using a digital identity 14 . Again, the digital identity 14 is indicated by a key, which is now a dif ferent key than that of the sensor 5 . This digital identity 14 is associated with the processor 4 ( or, optionally with the program 12 ) .
- the processor 4 submits the signed computation result 15 to the ledger database 3 .
- the measurement outcome 6 and the computation result 13 are submitted to the same ledger database 3 .
- This is not necessary, but advantageous in order to provide a traceable history of computation results and of the measurement outcomes they are based on within the same ledger database .
- a single cohesive ledger database guarantees meaningful and reproducible relationships and sequences between measurement outcomes and derived computation results , i . e . , the derived quality data of the metallic product .
- Fig . 1 thus illustrates a simple embodiment of the disclosed method for generating a cryptographically secure derived quality data .
- the derived quality data is the computation result 13 . It is cryptographically secure because it is obtained from a cryptographically verified input , the attested measurement outcome 10 , and represented by a cryptographically attested output , the digitally signed computation result 15 .
- the sensor 5 and the processor 4 are both associated with their own digital identity 7 , 14 indicated by two di f ferent keys . Both of their keys are managed in a secure element 8 , 16 embedded with the sensor 5 and the processor 4 respectively .
- the following steps are carried out :
- the sensor 5 performs a measurement of a process parameter during production or processing of the metallic product .
- the process parameter can be any physical parameter related to the supervised process . In the case of a production process , it can for example be a pressure value of a pressured fluid connection or of a pressure tank . This is indicated schematically by a pressure gauge .
- the sensor 5 employs its secure element 8 to cryptographically attest the measurement outcome 6 using the digital identity 7 .
- the sensor 5 then submits the attested measurement outcome 10 to the ledger database 3 .
- the attested measurement outcome 10 is submitted to the ledger database 3 together with one or more measurement parameters .
- the measurement parameters submitted together with the attested measurement outcome 10 are selected from a group comprising : timestamp, geographic location, ambient temperature , ambient pressure , error message of the sensor, warning message of the sensor .
- the pressure value forming the measurement outcome 6 is submitted together with a timestamp of the measurement and any available error message of warning message of the sensor 5 .
- These measurement parameters are attested together with the measurement outcome 6 . That is , the secure element 8 generates a digital signature over a measurement record comprising the measurement outcome 6 and the measurement parameters . The complete record and digital signature are then submitted to the ledger database 3 .
- the processor 4 runs the embedded program 12 .
- the program 12 asks for an input in the form of a measurement outcome 6 of an identi fied sensor .
- the processor 4 therefore queries the ledger database 3 and fetches the attested measurement outcome 10 previously submitted by the identi fied sensor 5 .
- the processor 4 veri fies the validity of the attestation of the attested measurement outcome 10 .
- the processor 4 computes the computation result 13 .
- the processor 4 is implemented in a trusted execution environment ( TEE ) .
- TEE is a speciali zed hardware component within a general-purpose central processing unit ( CPU) .
- the at least one computation instruction is locked inside the trusted execution environment .
- the trusted execution environment guarantees the content ( authenticity and integrity) of the computation instructions carried out by the processor 4 . I f the computation within the trusted execution environment is success ful and the validity of the attestation of the attested measurement outcome 10 provided as an input to the trusted execution environment has been positively veri fied, the processor 4 then employs its secure element 16 to digitally sign the computation result 13 using its digital identity 14 . Finally, the processor 4 submits the signed computation 15 result back to the ledger database 3 .
- FIG. 2 A second, more extensive example is illustrated in Fig . 2 .
- the fourth participant is the instruction provider 17 .
- the instruction provider 17 is schematically indicated by a microscope .
- a person such as a researcher 18 comes up with a program 19 comprising the one or more instructions for trans forming a measurement outcome into derived process data .
- the program 19 is indicated by a sheet with a gear wheel .
- the instruction provider 17 has its own digital identity 20 indicated by yet another key managed in a secure element 21 .
- the instruction provider 17 digitally signs their newly developed program 19 with their digital identity 20 . Then they submit the digitally signed program 22 to the ledger database 3 for anyone to veri fy and use .
- the production facility 2 in this example has not only one , but two sensors 5 , 23 .
- Each sensor 5 , 23 has its own associated digital identity 7 , 24 . They both submit measurement outcomes 10 , 25 attested by the respective digital identity 7 , 24 to the ledger database 3 .
- the ledger database 3 stores measurement outcomes from di f ferent times of the production process .
- Previous attested measurement outcomes 26 , 27 are maintained in the history of the ledger database 3 .
- the processor 4 when running the program 19 accesses only the most recent of each type of measurement outcome .
- the processor 4 does not rely purely on an embedded program, but before computing the computation result 28 the processor 4 queries the ledger database 3 for an updated program and receives the most recent program 22 with the at least one computation instruction .
- the at least one computation instruction is digitally signed by the instruction provider 17 .
- the processor 4 veri fies the validity of the signature of the at least one computation instruction .
- the processor determines the digital identity 20 associated with the signature , i . e . , of the instruction provider 17 having generated the digital signature of the computation instructions .
- the processor veri fies whether that digital identity 20 of the instruction provider is certi fied by a valid certi ficate 29 ( see Fig . 5 ) .
- a certi ficate 29 is valid for this purpose when it is issued by a certi fication authority, wherein the digital identity 30 of the certi fication authority is on a whitelist of instruction certi fication authorities .
- the processor 4 stores such a whitelist in an embedded secure memory for the purpose of performing these kinds of veri fications . That way, the authenticity of the computation instructions employed by the processor 4 can be relied upon . In other words , the content of the computation instruction is attested by the instruction provider 17 , whose identity 20 in turn is attested by an accepted (by way of whitelisting) instruction certi fication authority .
- the processor 4 is merely required to attest to the accurate execution of those computation instructions , which is achieved by the TEE .
- the program 19 of the example shown in fig . 2 uses two measurement outcomes of di f ferent types . In other words , they concern di f ferent process parameters .
- the first required measurement outcome is a pressure value , similar to the example in fig . 1 , provided by a pressure gauge acting as a first sensor 5 .
- the second required measurement outcome is a weight value provided by a scale acting as a second sensor 23 .
- the at least one computation instruction comprises type constraints defining acceptable measurement types of the measurement outcomes to be used together with the program 19 .
- the program 19 may define that a first input parameter 31 must be a pressure value and a second input parameter 32 must be a weight value .
- the certi ficate of the digital identity associated with each of the sensors 5 , 23 defines the measurement type for which the gauge or scale are calibrated and attested respectively .
- the digital identity 7 of the pressure gauge can only be validly used to attest pressure measurement outcomes and the digital identity 24 of the scale can only be validly used to attest weight measurement outcomes .
- the processor 4 veri fies that the type constraints are respected, i . e .
- the computation uses only values attested from a digital identity valid for providing pressure measurements for the first required measurement outcome and only values attested from a digital identity valid for providing weight measurements for the second required measurement outcome .
- the signed computation result 33 is submitted to the ledger database 3 together with references to the attested measurement outcomes 10 , 25 in the ledger database 3 .
- Fig . 3 illustrates the identities and attestations and references within the ledger database 3 more in detail .
- the ledger database 3 is illustrated as a chronological list of entries 34 , starting at the top 35 and adding new entries in the vertical direction 36 at the bottom 37 .
- the most recent entry 38 stored in the ledger database 3 shown at the very bottom is the signed computation result 33 .
- the signature of the signed computation result 33 refers to the digital identity 39 of the processor 4 .
- the entry of the computation result comprises a reference 40 to another entry 41 containing the program 22 .
- the program 22 defines the at least one instruction that have been performed in order to obtain the computation result 33 .
- the program entry 41 in the ledger database 3 is shown at the very top .
- the signature 42 of the program 22 refers to the digital identity 20 of the instruction provider 17 .
- the program 22 itsel f defines the type of two input parameters 31 , 32 . Based on these type references , the most recent attested measurement outcomes 10 , 25 stored in the ledger database 3 and having a suitable type are referenced from the program 22 .
- the type references can be directly mapped to sensor references 43 , 44 , because there is only one suitable sensor for each type of measurement outcome .
- the processor 4 may include direct references with the signed computation result 33 that point to the particular measurement outcomes that have been used in obtaining it .
- the signature 45 of the first measurement outcome 10 refers to the digital identity 7 of the first sensor 5 .
- the signature 46 of the second measurement outcome 25 refers to the digital identity 24 of the second sensor 23 .
- Fig . 4 and 5 further illustrate the certi fication path and registration of sensors and processes , which can also be documented in a traceable manner in the ledger database 3 .
- the ledger database 3 is indicated with di fferent entries 34 in Fig . 2 , 3 , 4 and 5 , all those entries 34 can be part of the same ledger database 3 .
- Each drawing indicates only a selection of entries necessary for describing di fferent aspects of the present disclosure .
- These lists of entries 34 are non-exclusive .
- the first sensor 5 is a gauge calibrated and attested by a sensor certi fication authority .
- the cryptographical attestation of the measurement outcome 10 comprises a digital signature 45 of the measurement outcome by the digital identity 7 associated with the sensor 5 .
- the digital identity 7 associated with the first sensor 5 is certi fied by the sensor certi fication authority . This is accomplished by including a registration record 47 in the ledger database 3 , which comprises a reference 48 to the digital identity 7 of the sensor 5 .
- the registration record 47 is digitally signed with the digital identity 49 of the sensor certi fication authority .
- the processor 4 stores a whitelist of sensor certi fication authorities .
- the processor 4 veri fying the validity of the signature 45 of the measurement outcome 10 includes veri fying that the digital identity 7 of the sensor is certi fied by a valid certi ficate issued by one of the certi fication authorities on the whitelist .
- the digital identity 20 of the instruction provider 17 can be attested by a registration record 50 stored in the ledger database 3 , wherein this registration record 50 comprises a reference 51 to the digital identity 20 of the instruction provider 17 and is digitally signed with the digital identity 30 of an instruction provider certi fication authority .
- the preferred use-case of the present disclosure is for generating a quality certi ficate for a metallic product .
- the signed computation result 33 can be submitted to the ledger database 3 together with a product identi bomb .
- the product identi bomb can be used to link the information stored in the ledger database 3 to the actual physical metallic product or metallic article .
- the product identi bomb may be attached to the metallic product or metallic article itsel f when it leaves the production or processing process .
- the product identi bomb may be linked to a batch of metallic products and/or to a particular time stamp when a metallic product has been completed or delivered .
- the product identi bomb may also be associated with the metallic product via intrinsic physical properties of the metallic product , for example unique or suf ficiently random properties that can be determined relatively easily, preferably non-destructively, from the metallic product .
- the signed computation result 33 and the product identi bomb can be submitted to the ledger database 3 as a transaction .
- the recipient of the transaction is a producer or processor of the metallic product . This recipient is identi fied by their digital identity .
- the third embodiment which is illustrated in Fig . 6 , is a variation of the first embodiment shown in Fig . 1 .
- the attested measurement outcome 52 is an encrypted version of the measurement outcome 6 provided by the sensor 5 .
- the encryption key can be cryptographically associated with the digital identity 7 associated with the sensor 5 .
- the encryption key can be a separate key, for example , a shared secret 53 embedded in the secure element of the sensor 5 and unknown to the processor 4 .
- the attested measurement outcome 10 is obtained using a homomorphic encryption scheme . Homomorphic encryption is a known technique and there are several cryptosystems available , depending on the type of operations that need to be performed .
- FHE fully homomorphic encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Educational Administration (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Game Theory and Decision Science (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2022/069486 WO2024012664A1 (en) | 2022-07-12 | 2022-07-12 | Cryptographically secure derived quality data of a metallic product |
EP22751042.7A EP4555435A1 (en) | 2022-07-12 | 2022-07-12 | Cryptographically secure derived quality data of a metallic product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2022/069486 WO2024012664A1 (en) | 2022-07-12 | 2022-07-12 | Cryptographically secure derived quality data of a metallic product |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024012664A1 true WO2024012664A1 (en) | 2024-01-18 |
Family
ID=82799799
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2022/069486 WO2024012664A1 (en) | 2022-07-12 | 2022-07-12 | Cryptographically secure derived quality data of a metallic product |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP4555435A1 (en) |
WO (1) | WO2024012664A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190349426A1 (en) * | 2016-12-30 | 2019-11-14 | Intel Corporation | The internet of things |
US20200084026A1 (en) * | 2018-09-12 | 2020-03-12 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for verifying calibration information using a distributed ledger |
US20200364817A1 (en) * | 2019-05-17 | 2020-11-19 | UCOT Holdings Pty Ltd | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network |
US20200374700A1 (en) * | 2018-02-09 | 2020-11-26 | Intel Corporation | Trusted iot device configuration and onboarding |
US20210278826A1 (en) | 2020-03-04 | 2021-09-09 | International Business Machines Corporation | Quality control based on measurements from verified sensors |
-
2022
- 2022-07-12 WO PCT/EP2022/069486 patent/WO2024012664A1/en active Application Filing
- 2022-07-12 EP EP22751042.7A patent/EP4555435A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190349426A1 (en) * | 2016-12-30 | 2019-11-14 | Intel Corporation | The internet of things |
US20200374700A1 (en) * | 2018-02-09 | 2020-11-26 | Intel Corporation | Trusted iot device configuration and onboarding |
US20200084026A1 (en) * | 2018-09-12 | 2020-03-12 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for verifying calibration information using a distributed ledger |
US20200364817A1 (en) * | 2019-05-17 | 2020-11-19 | UCOT Holdings Pty Ltd | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network |
US20210278826A1 (en) | 2020-03-04 | 2021-09-09 | International Business Machines Corporation | Quality control based on measurements from verified sensors |
Also Published As
Publication number | Publication date |
---|---|
EP4555435A1 (en) | 2025-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111435240B (en) | Method and system for recording quality control, production or regulatory data in a process control system | |
CN111435239B (en) | Distributed Ledgers in Process Control Systems | |
US10797873B2 (en) | Methods, systems, and computer readable media for verifying calibration information using a distributed ledger | |
KR102502247B1 (en) | Safe and Traceable Manufacturing Parts | |
US20200184465A1 (en) | A system for virtual currency based on blockchain architecture and physical marking | |
KR20180046930A (en) | A FTA Origin Management System based on Blockchain distributed ledger | |
JP6861327B1 (en) | Management equipment, management system, management method, management program and recording medium | |
CN107506661A (en) | A kind of method of the generation house historical record based on block chain | |
JP7320682B2 (en) | Authentication method, authentication system and program | |
CN109815732A (en) | A system, method and device for storing and accessing workshop data based on alliance chain | |
WO2024012664A1 (en) | Cryptographically secure derived quality data of a metallic product | |
Mustapää et al. | Secure Exchange of Digital Metrological Data in a Smart Overhead Crane | |
US20200213131A1 (en) | Multiple authorization modules for secure production and verification | |
EP4307604A1 (en) | Cryptographically secure derived process data | |
WO2024199470A1 (en) | Metrological instrument digital verification method and system | |
Halder et al. | A blockchain-based decentralized public key infrastructure using the web of trust | |
Softic et al. | BLOCKCHAIN-BASED METROLOGICAL TRACEABILITY. | |
Chesnokov et al. | Software development of electronic digital signature generation at institution electronic document circulation | |
EA034129B1 (en) | Secure product identification and verification | |
US20180374102A1 (en) | Container and content serialization for secure product identifiers | |
CN118586681A (en) | A project procurement management method and system based on big data | |
Jimenez et al. | IoT based Blockchain for manufacturing process monitoring and logistics within an organisation | |
US20240257156A1 (en) | Method And System For Determining Authenticity Of A Manufactured Diamond | |
Lankford | NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes. | |
CN118820238A (en) | A method and system for digitizing a standard electric energy meter calibration certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22751042 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022751042 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022751042 Country of ref document: EP Effective date: 20250212 |
|
WWP | Wipo information: published in national office |
Ref document number: 2022751042 Country of ref document: EP |