US 11,882,214 B2
Technique for cryptographic document protection and verification
Dhruvin Patel, Aachen (DE); and Thomas Weidenfeller, Aachen (DE)
Assigned to Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
Appl. No. 17/311,554
Filed by Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
PCT Filed Dec. 6, 2018, PCT No. PCT/EP2018/083788
§ 371(c)(1), (2) Date Jun. 7, 2021,
PCT Pub. No. WO2020/114597, PCT Pub. Date Jun. 11, 2020.
Prior Publication US 2022/0029792 A1, Jan. 27, 2022
Int. Cl. H04L 9/08 (2006.01); G06F 21/64 (2013.01); H04L 9/32 (2006.01)
CPC H04L 9/088 (2013.01) [G06F 21/64 (2013.01); H04L 9/3236 (2013.01)] 16 Claims
OG exemplary drawing
1. A device for controlling cryptographic document protection, the device being associated with a device identifier (Device ID) and with a cryptographic key (cK), wherein the device is configured to:
obtain an electronically processable document representation, EPDR, (H2), of content of a document that is to be protected;
apply the cryptographic key (cK) to the EPDR (H2) to obtain a cryptographically processed document representation, CPDR, (S2);
transmit the device identifier (Device ID) and a verification parameter comprising at least one of the EPDR (H2) and the CPDR (S2) towards a transaction server that is configured to log the device identifier (Device ID) and the verification parameter (S2, H2) in a tamper-proof manner;
receive a transaction identifier (TRX ID) associated with the device identifier (Device ID) and the verification parameter (S2, H2); and
trigger printing of the transaction identifier (TRX ID) and the CPDR (S2) on a physical document that corresponds to the EPDR (H2).