摘要:
The invention relates to a method and a device for the generation of checkable forgery-proof documents with an externally supplied cryptographic module, whereby the checking of authenticity of the document is carried out without using key information belonging to the cryptographic module. According to the invention, the method and the device are characterised in that the cryptographic module is supplied with two types of data, even on supply from a communication partner which is cryptographically not trustworthy, which either remain in the cryptographic module or are attached to the document. The information remaining in the cryptographic module is used to secure the document information by means of a check value and the information transferred into the document serves to verify the securing of the document by the cryptographic module during a check of the authenticity of the document at a checkpoint.
摘要:
The invention relates to a method for providing postal deliveries with franking stamps, whereby a customer system controls the printing of franking stamps on postal deliveries. The inventive method enables information concerning the franking stamps that have been created by a print command, for which no postal delivery is to take place, to be recorded in a file.
摘要:
The invention relates to a method for checking postage stamps on letters and parcels, at a checkpoint . Said checkpoint deciphers the identity and authenticity of a customer system having generated the production of the stamp by decoding cryptographic security elements originating from a trusted certification point. According to the invention, this method is carried out in such a way that means contained in the checking unit determine a key for which the probability of having been used to encode the data at the certification point is particularly high.
摘要:
The invention relates to a security module characterized in that said module contains a data input port via which information can be inputted into the security modul. The security module has at least two data output ports whereby data can be outputted via a first data output port and transferred to an authentication unit and whereby data can be outputted via a second data output port. Said data can be transferred to a document to be exported. Said security module has at least two combination machines. A first combination machine generates a first result value for a first data output and a second combination machine generates a result value for the second data output. The invention relates to the use of a security module for generating forge-proof documents.
摘要:
The invention is characterized in that a random number (X) and a payment identification number (PID) which contain information about the customer are generated in the charging point.
摘要:
The invention relates to a method for providing postal deliveries with postage-paid stamps. The inventive method is characterised as follows: designs for letters are created in a computer; the anticipated delivery data for the finished letters is determined, based on the information contained in the designs; the delivery data is registered and forwarded to a module via an interface and the module processes the delivery data and assigns a unique delivery number to each delivery.
摘要:
The invention relates to a method for producing forge-proof documents using a security module which generates a temporary secret which is unknown to the document producer. The temporary secret, in conjunction with information revealed about the identity of the security module, is transferred in encrypted form to an authentication unit. Said authentication unit recognizes the identity of the security module and decodes the temporary secret together with other information which is encoded in such a way that only one checking station can implement decoding. The authentication unit transfers data to the document producer who transfers producer data, which is integrated into the document, to the security module. The security module irreversibly links the data inputted by the document producer to the temporary secret in such a way that only repeated linking of the same data in the same manner yields an identical result. It is not possible to draw conclusions about the temporary secret. The result of said irreversible linkage of data to the temporary secret is integrated into the document.