Method and device for the generation of checkable forgery-proof documents
First Claim
1. A method for the generation of forgery-proof documents or data records, whereby key information is generated and whereby encrypted checking information is formed from the key information and from a transaction indicator,comprising;
- generating key information in a contact station;
forming encrypted checking information from the key information and from the transaction indicator in the contact station,encrypting the key information in the contact station,transmitting the encrypted checking information and the encrypted key information to an intermediate station,storing the encrypted key information and the encrypted checking information in the intermediate station and subsequently transmitting the encrypted key information and the encrypted checking information to a cryptographic module at a different time from the transfer between the contact station and the intermediate station,decrypting the encrypted key information with a key contained in the cryptographic module,irreversibly linking document data to the key information,combining the document data and the key information that is irreversibly linked to the document data to form at least one of a document and a data record, andtransmitting the document or data record to a checking station.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method and a device for the generation of checkable forgery-proof documents with an externally supplied cryptographic module, whereby the checking of authenticity of the document is carried out without using key information belonging to the cryptographic module. According to the invention, the method and the device are characterised in that the cryptographic module is supplied with two types of data, even on supply from a communication partner which is cryptographically not trustworthy, which either remain in the cryptographic module or are attached to the document. The information remaining in the cryptographic module is used to secure the document information by means of a check value and the information transferred into the document serves to verify the securing of the document by the cryptographic module during a check of the authenticity of the document at a checkpoint.
-
Citations
19 Claims
-
1. A method for the generation of forgery-proof documents or data records, whereby key information is generated and whereby encrypted checking information is formed from the key information and from a transaction indicator,
comprising; -
generating key information in a contact station; forming encrypted checking information from the key information and from the transaction indicator in the contact station, encrypting the key information in the contact station, transmitting the encrypted checking information and the encrypted key information to an intermediate station, storing the encrypted key information and the encrypted checking information in the intermediate station and subsequently transmitting the encrypted key information and the encrypted checking information to a cryptographic module at a different time from the transfer between the contact station and the intermediate station, decrypting the encrypted key information with a key contained in the cryptographic module, irreversibly linking document data to the key information, combining the document data and the key information that is irreversibly linked to the document data to form at least one of a document and a data record, and transmitting the document or data record to a checking station. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification