You are on page 1of 10

US 20050289060A1

( 12) Patent Application Publication ( 10) Pub. N o. : US 2005/ 0289060 A1


( 19) United States
Abumehdi et al. ( 4 3 ) Pub. D ate: D ec. 29, 2005
( 54 ) SECURE METHOD OF CON SULTIN G ( 52) US. Cl. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705/ 50
ARTICLE D ELIVERY RECEIPTS
( 76) Inv entor s : Cy r us Abumehdi, Har low ( GB ) ; ( 57) AB STRACT
Patr ick B lanluet, Par is ( FR) ; Ax el
Glaes er , Tauf f elen ( CH)
Cor r es pondence Addr es s :
PERMAN & GREEN
4 25 POST ROAD
FAIRFIELD , CT 06824 ( US)
( 21) Appl. N o. : 11/ 082, 224
( 22) Filed: Mar . 16, 2005
( 3 0) For eig n Application Pr ior ity D ata
Mar . 16, 2004 ( FR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FR 04 02682
Publication Clas s i? cation
( 51) Int. Cl? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H04 L 9/ 00
In a s ecur e method of cons ulting ar ticle deliv er y r eceipts
f r om a r emote computer ter minal connected to a manag e
ment computer center v ia a telecommunications netw or k , a
dig ital imag e of each r eceipt is initially input to a por table
ter minal that includes a r adio inter f ace f or tr ans mitting s aid
imag e to the manag ement computer center . In or der to
cons ult the dig ital imag e in s ecur e manner f r om the r emote
computer ter minal, pr ov is ion is made in s aid r emote com
puter ter minal to us e a uniq ue k ey k SESSION that is dif f er ent
on each cons ultation in or der to decr y pt ? r s t data E1
g ener ated in the por table ter minal f r om the dig ital imag e,
s aid uniq ue k ey k SESSION its elf being the r es ult of the
manag ement computer center us ing one of its oWn pr iv ate
k ey s k PRWN LS to decr y pt s econd data E2 g ener ated in the
por table ter minal f r om the uniq ue k ey k SESSION .
| | 3 2 3 6 r 3 8 |
S1 \ E1
| M Sk FEillM] I EM, " ls k r attlmn E1 4 : 9
| K 3 o pg < 3 1. k . P | 10
I k IV s s s s lan I
k lb Ek ? h? k mm ) E2
LLE _______________J
FM M I
I I
| E1 E1
I E2 uk ' r l' hiv lnl W" Eas tman) E3 I
m__k ii' s v _____k h _______J
5k m; [ M] : S1
Patent Application Publication D ec. 29, 2005 Sheet 1 0f 5 US 2005/ 0289060 A1
llllllllllll
lllllllHlll
Patent Application Publication D ec. 29, 2005 Sheet 2 0f 5 US 2005/ 0289060 A1
FIG. 2
I I | I
1
| _| I I I Ill I I I I I L
Patent Application Publication D ec. 29, 2005 Sheet 3 0f 5 US 2005/ 0289060 A1
m- l' __ I
I z 4
LL- Fl
I I
| iw
I 3
|
M
lE1
E k s as s ion K 3 8
F \
M E1
S2
k s es s |
M
___. . ________. . _________|
l
M = l= { > 10
k s es s lon I
I
Z I J
_|
l
4 k ' k iv 4 M4
k s es s ion k \ I l
70 on I
= : A
56 k Ff iJ
s w [ M] = 5 IL
( D D ) k PRw 1 O5
62
L2 E
l 2 E2
( 4 2 S
H ( k m l 2
60
S
D k s es s ion
IV
N L PU
l
M
K 3 o
M
E1 E2
M
E1 S' 2
Patent Application Publication D ec. 29, 2005 Sheet 5 0f 5 US 2005/ 0289060 A1
FIGS
F102
k
100
k m
P0:
In.
| _ " Q ' JL ___2u| ill
SM . 5 5M
US 2005/ 0289060 A1
SECURE METHOD OF CON SULTIN G ARTICLE
D ELIVERY RECEIPTS
TECHN ICAL FIELD
[ 0001] The pr es ent inv ention r elates to the ? eld of log is
tics as applied to s hipping g oods , par cels , and pack ets , or
any other ar ticle, and it r elates mor e par ticular ly to a s ecur e
method of cons ulting g oods deliv er y r eceipts .
PRIOR ART
[ 0002] The log is tics s y s tems f or tr ack ing ar ticles that ar e
pr es ently in us e by car r ier s ar e Well k noWn. B y Way of
ex ample, US. Pat. N o. 5, 3 13 , 051 des cr ibes an ar ticle tr ack
ing s y s tem compr is ing a por table ter minal held in the hand
of a deliv er y per s on and pr ov ided With a bar code r eader and
a touch-s ens itiv e s cr een and als o With r adio communications
means f or tr ans f er r ing inf or mation to a centr al car r ier , Which
claim, in par ticular the identity and the s ig natur e of the
addr es s ee, is input v ia the s cr een by the deliv er y per s on.
Such a s y s tem enables the car r ier to hav e, in r eal time,
inf or mation r elating to g oods that hav e been deliv er ed.
N ev er theles s , that inf or mation s y s tem cannot be cons ulted
dir ectly by the car r ier s clients , nor can thos e clients cons ult
the inf or mation r elating to the deliv er y r eceipt that cons ti
tutes pr oof of deliv er y . That can only be cons ulted by the
client af ter the deliv er y r ound has been completed and all of
the r eceipts hav e been handed ov er to a s canner center
Wher e, af ter they hav e been pr oces s ed, they can be cons ulted
us ing a telecommunications netWor k .
OB JECT AN D D EFIN ITION OF THE
IN VEN TION
[ 0003 ] An obj ect of the pr es ent inv ention is thus to miti
g ate the abov e-mentioned dr aWback s by means of a method
and a s y s tem f or s ecur ely cons ulting ar ticle deliv er y r eceipts
enabling the client of a car r ier to cons ult in s ecur e manner
and in r eal time the v ar ious r eceipts r elating to g oods being
deliv er ed to their addr es s ees . Another obj ect of the inv ention
is to enable the r eceipts to be cons ulted in a manner that is
s imple, but not s ecur e, and Without any g uar antee as to
content. Another obj ect of the inv ention is to pr ov ide a
method that is s imple and that limits the amount of inf or
mation that needs to be eX chang ed in or der to implement the
s y s tem.
[ 0004 ] Thes e obj ects ar e achiev ed With a s ecur e method of
cons ulting ar ticle deliv er y r eceipts f r om a r emote computer
ter minal connected to a manag ement computer center v ia a
telecommunications netWor k , a dig ital imag e of each r eceipt
being initially input to a por table ter minal including a r adio
inter f ace f or tr ans mitting the imag e to the manag ement
computer center , Wher ein in or der to cons ult s aid dig ital
imag e in s ecur e manner f r om the r emote computer ter minal,
it is neces s ar y in s aid r emote computer ter minal to us e a k ey
k SESSION that is uniq ue and dif f er ent f or each cons ultation,
to decr y pt ? r s t data E1 g ener ated in the por table ter minal
f r om s aid dig ital imag e, s aid uniq ue k ey k SESSION its elf
being the r es ult of the manag ement computer center us ing a
pr iv ate k ey k PRWN LS of the manag ement computer center to
decr y pt s econd data E2 g ener ated in the por table ter minal
f r om the uniq ue k ey k SESSION .
[ 0005] Thus , the data input into the por table ter minal by
the deliv er y per s on can be cons ulted in s ecur e manner on
D ec. 29, 2005
line, e. g . immediately af ter the data has been input, but only
by a us er client in pos s es s ion of means f or decr y pting the
uniq ue s es s ion k ey that has pr ev ious ly been encr y pted in the
manag ement computer center .
[ 0006]
k PUB MMT
In the intended implementation, a ? r s t public k ey
may be us ed to v er if y a s ig natur e S1 as s ociated With
the dig ital imag e, this s ig natur e being obtained in the r emote
computer ter minal by us ing the uniq ue k ey k SESSION that is
dif f er ent on each cons ultation to decr y pt the ? r s t data E1
g ener ated in the por table ter minal and tr ans mitted to the
manag ement computer center , the uniq ue k ey k SESSION
being obtained in the computer ter minal by us ing a s econd
public k ey k PUB N LS to decr y pt thir d data E3 g ener ated in the
manag ement computer center by us ing the pr iv ate k ey
k PRIVN LS of the manag ement computer center to encr y pt the
uniq ue k ey k SESSION as obtained pr ev ious ly by us ing s aid
pr iv ate k ey k PRWN LS to decr y pt the s econd data E2 g ener
ated in the por table ter minal and tr ans mitted to the manag e
ment computer center .
[ 0007] It is als o pos s ible f or a ? r s t public k ey k PUB to
be us ed to v er if y a s ig natur e S1 as s ociated With the dig ital
imag e, s aid s ig natur e S1 being obtained in the r emote
computer ter minal by us ing the uniq ue k ey k SESSION that is
dif f er ent on each cons ultation to decr y pt the ? r s t data E1
g ener ated in the por table ter minal and tr ans mitted to the
manag ement computer center , this uniq ue k ey k SESSION
being tr ans mitted by the manag ement computer center
tog ether With a s ig natur e S2 as s ociated With s aid uniq ue k ey
k SESSION and being v er i? ed in the r emote computer ter minal
by means of a s econd public k ey k PUB N LS, the s ig natur e S2
being obtained by us ing the pr iv ate k ey k PRIVN LS of the
manag ement computer center to encr y pt the uniq ue k ey
k SESSION as obtained pr ev ious ly by us ing s aid pr iv ate k PRWN LS
to decr y pt the s econd data E2 g ener ated in the por table
ter minal and tr ans mitted to the manag ement computer cen
ter .
[ 0008] Pr ef er ably , the ? r s t data E1 is obtained by us ing the
uniq ue k ey k SESSION to encr y pt the s ig natur e S1, and the
s econd data E2 is obtained by us ing the uniq ue k ey k SESSION
to encr y pt the s econd public k ey k PUB N LS, the s ig natur e S1
its elf being the r es ult of the dig ital imag e of the r eceipt being
s ig ned With a pr iv ate k ey k PRWMMT of the por table ter minal.
[ 0009] In the intended implementation, the ? r s t public k ey
k PUB MMT may be encr y pted by means of the s econd public
k ey k PUB N LS to obtain ? r s t k ey data Ek 1 Which is tr ans mitted
to the manag ement computer center Wher e s aid ? r s t k ey data
Ek 1 is decr y pted us ing the pr iv ate k ey k PRIVN LS of the
manag ement computer center in or der to r ecov er the ? r s t
public k ey k PUB MMT, Which k ey is then encr y pted ag ain
us ing the pr iv ate k ey k PRWN LS of the manag ement computer
center in or der to obtain s econd k ey data Ek 2 f r om Which the
client can r ecov er the ? r s t public k ey k PUB MMT by decr y pt
ing the s econd data k ey With the s econd public k ey k PUB N LS
Adv antag eous ly , the ? r s t k ey data Ek 1 is tr ans mitted to the
manag ement computer center tog ether With the dig ital imag e
of the r eceipt and the ? r s t and s econd data E1 and E2.
[ 0010] It is als o pos s ible f or the ? r s t public k ey k PUB MM
to be s ig ned by means of the pr iv ate k ey k PRIVN LS in or der
to obtain a k ey s ig natur e Sk 1 Which is tr ans mitted tog ether
With the ? r s t public k ey k PUB MMT to the manag ement
computer center Wher e s aid k ey s ig natur e Sk 1 is v er i? ed by
means of the s econd public k ey k PUB N LS pr ior to being
MMT
T
US 2005/ 0289060 A1
r etr ans mitted tog ether With the ? r s t public k ey k PUB MMT to
the client ter minal Wher e s aid k ey s ig natur e Sk 1 is ag ain
v er i? ed by means of the s econd public k ey k PUB N LS, the
r es ult of this v er i? cation cons tituting acceptance or r ef us al
of the ? r s t public k ey k PUB MMT. Adv antag eous ly , the k ey
s ig natur e Sk 1 is tr ans mitted to the manag ement computer
center tog ether With the dig ital imag e of the r eceipt and the
? r s t and s econd data E1 and E2.
[ 0011] Pr ef er ably , the telecommunications netWor k is the
Inter net, the encr y pting / decr y pting pr oces s is of the D ES,
tr iple D ES, or AES ty pe, and the dig ital imag e of the r eceipt
is tr ans mitted tog ether With identity data and other inf or ma
tion r elating to the deliv er y as input to the por table ter minal.
B RIEF D ESCRIPTION OF THE D RAWIN GS
[ 0012] The inv ention Will be better under s tood on s ig ht of
the f olloWing detailed des cr iption accompanied by illus tr a
tiv e and non-limiting eX amples With r ef er ence to the f ol
loWing ? g ur es , in Which:
[ 0013 ] FIG. 1 is a g ener al v ieW of a computer netWor k
ar chitectur e enabling s ecur e cons ultation of the deliv er y of
ar ticles in accor dance With the inv ention;
[ 0014 ] FIGS. 2 and 3 s hoW the v ar ious s teps in tWo
implementations of a pr oces s f or v er if y ing mes s ag es s ent by
a por table ter minal of the FIG. 1 netWor k ; and
[ 0015] FIGS. 4 and 5 s hoW dif f er ent s teps in tWo imple
mentations of a pr oces s f or tr ans f er r ing k ey s that is imple
mented in the netWor k of FIG. 1.
D ETAILED D ESCRIPTION OF
IMPLEMEN TATION S
[ 0016] FIG. 1 s hoWs the ar chitectur e of a computer net
Wor k of a car r ier of g oods , par cels , or pack ets , or indeed any
other ar ticle of the s ame k ind, in Which it is neces s ar y to
implement s ecur e cons ultation of deliv er y r eceipts in accor
dance With the inv ention. N ev er theles s , it s hould be
obs er v ed that it is not es s ential f or the netWor k to belong to
the car r ier , and that it could eq ually Well belong to a thir d
par ty acting as the r epr es entativ e of the car r ier f or r eceiv ing
r eceipts and inf or mation concer ning deliv er ies .
[ 0017] This netWor k ar chitectur e is or g aniZ ed ar ound a
manag ement computer center 10 connected to a ? r s t tele
communications netWor k 12 of the Inter net ty pe. The man
ag ement computer center compr is es one or mor e computer
s er v er s , eg a s er v er 20, hav ing databas es 22, 24 connected
ther eto including an imag e databas e 22 that is acces s ible v ia
the Inter net f r om r emote computer ter minals , eg a per s onal
computer 14 . The s er v er is als o pr ov ided With a r adio
modem 26 to r eceiv e data f r om a multif unction por table
ter minal 16 v ia a s econd telecommunications netWor k 18 of
the g ener al pack et r adio s er v ice ( GPRS) or univ er s al mobile
telephone s y s tem ( UMTS) ty pe.
[ 0018] With this ar chitectur e, it is pos s ible f or the client of
a car r ier to cons ult in r eal time the r eceipts f or deliv er ies of
that client s g oods to their des tinations tog ether With any
other inf or mation r elating to s uch deliv er ies and enter ed into
the multif unction por table ter minal by an employ ee of the
car r ier , g ener ally a dr iv er and deliv er y per s on. The cons ul
tation can be per f or med r emotely in v er y s imple manner v ia
the Inter net 12 f r om any us er s tation of the client, eg a
D ec. 29, 2005
per s onal computer 14 or any other computer eq uipment
g iv ing acces s to the Inter net ( s uch as a per s onal dig ital
as s is tant ( PD A) ) . N atur ally , the r eceipts and the other inf or
mation r elating to deliv er y as input at the addr es s ee of the
g oods v ia the multif unction por table ter minal 16 held by the
car r ier s employ ee, ar e pr ev ious ly tr ans mitted v ia the tele
communications netWor k 18 in r eal time to the computer
center 10 f or manag ing s aid inf or mation.
[ 0019] The detail of the inf or mation that is tr ans mitted is
g iv en in the patent application ? led on the s ame day by the
s ame Applicant and entitled An optimiZ ed s y s tem f or
tr ack ing the deliv er y of ar ticles . That inf or mation, in addi
tion to the dig ital imag e of the deliv er y r eceipt bear ing the
s tamp of the addr es s ee, als o includes all us ef ul inf or mation
r elating to r eceipt of the g oods by the addr es s ee, s uch as the
name of the addr es s ee, the date and time of deliv er y , the
number of par cels deliv er ed, pos s ibly the number of par cels
r ef us ed, the s ig natur e and the name of the per s on s ig ning the
deliv er y r eceipt, and pos s ibly any r es er v ations about the
deliv er y . In addition, a photog r aph ( a dig ital imag e) of a
r ef us ed par cel and/ or of the addr es s ee, or indeed a v oice
comment made by the dr iv er or by the addr es s ee may
adv antag eous ly be as s ociated With the abov e inf or mation, as
can the number of eq uipments on depos it s or ted by ty pe of
eq uipment or pay ment of tr ans por t cos ts or pay ment f or
cas h-on-deliv er y ( COD ) .
[ 0020] Accor ding to the inv ention, all of this inf or mation
is tr ans mitted ov er the netWor k , and is s ubs eq uently con
s ulted, in s ecur e manner in or der to g uar antee to the client
that the inf or mation has not been tamper ed With. The s ecur e
cons ultation method that pr ov ides this g uar antee of tr ans
mis s ion is des cr ibed beloW With r ef er ence to FIGS. 2 to 5.
It r elies on encr y ption pr otocols and on pr otocols f or cr e
ating s ig natur es des cr ibed With r ef er ence to FIGS. 2 and 3 .
[ 0021] Implementation of the method as s umes pr ior cr e
ation of f our k ey s Which ar e s tor ed in the multif unction
por table ter minal bef or e any us e ther eof , pr ef er ably When it
is manuf actur ed or When the ter minal is put into oper ation in
the pr emis es of the car r ier or its r epr es entativ e. The ? r s t tWo
k ey s ar e s peci? c to the ter minal and compr is e a ter minal
pr iv ate k ey k PRWMMT and a ? r s t public k ey k PUB MMT. The
other tWo k ey s ar e s peci? c to the car r ier and lik eWis e
compr is e a pr iv ate k ey , this time f or the manag ement
computer center k PRWN LS and a s econd public k ey k PUB N LS
B y their natur e, the tWo pr iv ate k ey s ar e unk noWn to the
client or to any per s on other than the car r ier or the car r ier s
r epr es entativ e, While the tWo public k ey s ar e f r eely av ailable
to the client. They may nev er theles s thems elv es cons titute
the s ubj ect matter of the k ey eX chang e pr oces s des cr ibed
With r ef er ence to FIGS. 4 and 5.
[ 0022] FIG. 2 s hoWs a ? r s t eX ample of the s ecur e con
s ultation method of the inv ention. The mes s ag e 3 0 tr ans
mitted by the multif unction por table ter minal is initially
s ig ned 3 2 by means of the pr iv ate k ey k PRIVMMT of the
por table ter minal in or der to obtain a s ig natur e S1. Then, by
means of a uniq ue k ey g ener ated in the ter minal and r ef er r ed
to as k SESSION , this s ig natur e 3 4 is encr y pted 3 6 to deliv er
3 8 ? r s t encr y pted data E1. In par allel, this uniq ue k ey is
encr y pted 4 0 us ing the s econd public k ey k PUB N LS to deliv er
4 2 s econd encr y pted data E2. Once the ? r s t and s econd
encr y pted data items hav e been deliv er ed, they ar e s ent 4 4
US 2005/ 0289060 A1
to the manag ement computer center tog ether With the mes
s ag e M ( Which is thus tr ans mitted in the clear ) that Was us ed
f or cr eating them.
[ 0023 ] When the manag ement computer center r eceiv es
the data items E1 and E2 tog ether With the mes s ag e M, it
beg ins by r ecov er ing the uniq ue k ey k SESSION by decr y pting
4 6 the data E2 us ing the manag ement computer center s
pr iv ate k ey k PRIVN LS, and then it encr y pts 4 8 this k ey 50
ag ain by means of the pr iv ate k ey k PRWN LS to obtain 52
thir d encr y pted data E3 .
[ 0024 ] Then, pr ov iding the client can es tablis h a connec
tion to the manag ement computer center , pos s ibly tog ether
With an account number and a pas s Wor d f or ex ample, the
client can us e the Inter net to acces s the mes s ag e M and thus
f r eely cons ult the data tr ans mitted by the ter minal, ther eby
g aining acces s almos t at the time of deliv er y to all of the data
r elating to the deliv er y , and in par ticular to the data cons ti
tuting pr oof of deliv er y , ie the imag e of the deliv er y r eceipt
car r y ing the s tamp of the addr es s ee, the identity and the
s ig natur e of the per s on Who r eceiv ed the g oods , and the date
and time of deliv er y . N ev er theles s , at this s tag e, the data is
s till r aW data and has not been s ubj ected to any v er i? cation
pr oces s that could g uar antee its v alidity . In or der to acces s
s uch a pr oces s , the client needs to mak e a r eq ues t to the
manag ement computer center Which then als o g iv es the
client acces s to the data items E1 and E3 .
[ 0025] Star ting f r om E3 , the client can us e a per s onal
computer to r ecov er the k ey k SESSION by decr y pting 54 s aid
data us ing the s econd public k ey k PUB N LS. Then, by decr y pt
ing 56 the data item E1 us ing the k ey 58 as obtained in this
Way , it is pos s ible to obtain 60 the s ig natur e S1 as s ociated
With the mes s ag e M, Which s ig natur e S1 can then be us ed to
v er if y 62 v alidity by means of the ? r s t public k ey k PUB MMT
The r es ult of this v er i? cation cons is ts in the content of the
mes s ag e M being accepted or r ef us ed 64 .
[ 0026] FIG. 3 s hoWs a s econd ex ample of the s ecur e
cons ultation method of the inv ention. As in the pr eceding
ex ample, the pr oces s of tr ans f er r ing the mes s ag e to the
manag ement computer center is unchang ed. Thus , the mes
s ag e 3 0 tr ans mitted by the multif unction por table ter minal is
initially s ig ned 3 2 by means of the por table ter minal s
pr iv ate k ey k PRIVMMT in or der to obtain a s ig natur e S1.
Then, the uniq ue k ey k SESSION g ener ated by the ter minal is
us ed to encr y pt 3 6 the s ig natur e S1 in or der to deliv er 3 8 ? r s t
encr y pted data E1. In par allel, the uniq ue k ey is encr y pted
4 0 by means of the s econd public k ey k PUB N LS in or der to
deliv er 4 2 s econd encr y pted k ey E2. Once the ? r s t and
s econd encr y pted data items hav e been deliv er ed, they ar e
s ent 4 4 to the manag ement computer center tog ether With
the mes s ag e M ( Which is thus tr ans mitted in the clear ) that
Was us ed f or cr eating them. HoWev er , the pr oces s ing in the
manag ement computer center is s lig htly dif f er ent.
[ 0027] When the manag ement computer center r eceiv es
the data E1 and E2 tog ether With the mes s ag e M, it beg ins
by r ecov er ing the uniq ue k ey k SESSION by decr y pting 4 6 the
data E2 us ing the pr iv ate k ey k PRIVN LS of the manag ement
computer center , but ins tead of encr y pting the uniq ue k ey
ag ain, it s ig ns 70 it us ing the pr iv ate k ey k PRIVN LS in or der
to obtain a s econd s ig natur e S2. At this s tag e, as bef or e, the
client can cons ult the mes s ag e M but Without g uar antee.
HoWev er , if the client des ir es the mes s ag e to be v alidated,
the client needs to mak e a r eq ues t to the computer center ,
D ec. 29, 2005
Which Will then g iv e the client acces s als o to the ? r s t data
E1, to the s econd s ig natur e S2, and to the uniq ue k ey
k SESSION
[ 0028] The client can then us e the per s onal computer to
v er if y the v alidity of the k ey k SESSION by v er if y ing 74 the
s ig natur e S2 by means of the s econd public k ey k PUB N LS, the
r es ult of this v er i? cation cons is ting in the r eceiv ed k ey being
accepted or r ef us ed 76. If this tes t is pos itiv e, the client can
then decr y pt 56 the data E1 on the bas is of the v alidated
uniq ue k ey k SESSION , ther eby obtaining 60 the s ig natur e S1
as s ociated With the mes s ag e M, Which s ig natur e S1 can then
be us ed to v er if y 62 v alidity by means of the ? r s t public k ey
k PUB MMT. The r es ult of this v er i? cation cons titutes accep
tance or r ef us al 64 of the content of the mes s ag e M.
[ 0029] In the tWo abov e ex amples , it is as s umed that the
client has av ailable the ? r s t public k ey k PUB MMT enabling
the s ig natur e of the mes s ag e M to be v er i? ed. HoWev er , it is
als o pos s ible to env is ag e that this k ey is tr ans f er r ed to the
client s computer f r om the multif unction per s onal ter minal
v ia the manag ement computer center , as s hoWn in FIGS. 4
and 5.
[ 003 0] In FIG. 4 , the tr ans f er r elies on an encr y ption
pr oces s . The ? r s t public k ey k PUB MMT is initially encr y pted
80 by means of the s econd public k ey k PUB N LS in or der to
obtain ? r s t k ey data Ek 1 Which is tr ans mitted to the man
ag ement computer center tog ether With the mes s ag e M and
the data E1 and E2. In the manag ement computer center , the
k ey data Ek 1 is decr y pted 84 by means of the pr iv ate k ey
k PRIVN LS in or der to obtain 86 the initial k ey k PUB MMT Which
is ag ain encr y pted 88, but this time us ing the pr iv ate k ey
k PRIVN LS in or der to deliv er 90 s econd k ey data Ek z. It is f r om
this s econd k ey data Ek 2 that the client can then r ecov er 92
the ? r s t public k ey k PUB MMT by decr y pting With the s econd
public k ey k PUB N LS
[ 003 1] In FIG. 5, the abov e tr ans f er r elies on a pr oces s f or
cr eating a s ig natur e. The ? r s t public k ey k PUB MMT is initially
s ig ned 100 us ing the pr iv ate k ey k PRWN LS of the manag e
ment computer center in or der to obtain 102 a k ey s ig natur e
Sk l. This k ey s ig natur e Sk 1 is then tr ans mitted tog ether With
the ? r s t public k ey k PUB MMT to the manag ement computer
center tog ether With the mes s ag e M and the data E1 and E2.
At the manag ement computer center , the k ey s ig natur e Sk 1
is v er i? ed 104 by means of the s econd public k ey k PUB N LS,
With the r es ult of the v er i? cation 106 cons tituting accep
tance or r ef us al of the r eceiv ed ? r s t public k ey k PUB MMT
The client can then us e a ter minal to acces s the k ey s ig natur e
Sk 1 and can in tur n v er if y 108 this s ig natur e by means of the
s econd public k ey k PUB N LS, the r es ult of this v er i? cation 110
cons tituting acceptance or r ef us al of the ? r s t public k ey
MMT
k PUB
[ 003 2] In all of the abov e ex chang es , the encr y ption/
decr y ption pr oces s r elies on us ing a conv entional alg or ithm
of the D ES, tr iple D ES, or AES ty pe Well k noWn to the
per s on s k illed in the ar t and to Which r ef er ence can be made
if neces s ar y .
[ 003 3 ] Thus , With the method of the inv ention, the client
can cons ult all of the inf or mation concer ning the deliv er y
( including eq uipment on depos it, s ums r eceiv ed, f or
ex ample) , on line and f r om any location, becaus e acces s is
made v ia the Inter net. In addition, the as s ociated v er i? cation
pr oces s r ely ing on encr y ption or on a tr ans mitted data
US 2005/ 0289060 A1
s ig natur e enables the client to es tablis h ev idence of deliv er y
of the g oods of a k ind that is s uitable f or cons tituting
leg ally -enf or ceable pr oof .
What is claimed is :
1. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
f r om a r emote computer ter minal connected to a manag e
ment computer center v ia a telecommunications netWor k , a
dig ital imag e of each r eceipt being initially input to a
por table ter minal including a r adio inter f ace f or tr ans mitting
the imag e to the manag ement computer center , Wher ein in
or der to cons ult s aid dig ital imag e in s ecur e manner f r om the
r emote computer ter minal, it is neces s ar y in s aid r emote
computer ter minal to us e a k ey k SESSION that is uniq ue and
dif f er ent f or each cons ultation, to decr y pt a ? r s t data E1
g ener ated in the por table ter minal f r om s aid dig ital imag e,
s aid uniq ue k ey k SESSION its elf being the r es ult of the
manag ement computer center us ing a pr iv ate k ey k PRWN LS
of the manag ement computer center to decr y pt, s econd data
E2 g ener ated in the por table ter minal f r om the uniq ue k ey
k SESSION '
2. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 1, Wher ein a ? r s t public k ey k PUB MMT is
us ed to v er if y a s ig natur e S1 as s ociated With the dig ital
imag e, this s ig natur e being obtained in the r emote computer
ter minal by us ing the uniq ue k ey k SESSION that is dif f er ent
on each cons ultation to decr y pt the ? r s t data E1 g ener ated in
the por table ter minal and tr ans mitted to the manag ement
computer center , the uniq ue k ey k SESSION being obtained in
the computer ter minal by us ing a s econd public k ey k PUB N LS
to decr y pt thir d data E3 g ener ated in the manag ement
computer center by us ing the pr iv ate k ey k PRWN LS of the
manag ement computer center to encr y pt the uniq ue k ey
SE55 as obtained pr ev ious ly by us ing s aid pr iv ate k ey
lQ iLs -
k PRIV to decr y pt the s econd data E2 g ener ated in the
por table ter minal and tr ans mitted to the manag ement com
puter center .
3 . A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 1, Wher ein a ? r s t public k ey k PUB MMT is
us ed to v er if y a s ig natur e S1 as s ociated With the dig ital
imag e, s aid s ig natur e S1 being obtained in the r emote
computer ter minal by us ing the uniq ue k ey k SESSION that is
dif f er ent on each cons ultation to decr y pt the ? r s t data E1
g ener ated in the por table ter minal and tr ans mitted to the
manag ement computer center , this uniq ue k ey k SESSION
being tr ans mitted by the manag ement computer center
tog ether With a s ig natur e S2 as s ociated With s aid uniq ue k ey
k SESSION and being v er i? ed in the r emote computer ter minal
by means of a s econd public k ey k PUB N LS, the s ig natur e S2
being obtained by us ing the pr iv ate k ey k PRWN LS of the
manag ement computer center to encr y pt the uniq ue k ey
k SESSION as obtained pr ev ious ly by us ing s aid pr iv ate k PRWN LS
to decr y pt the s econd data E2 g ener ated in the por table
ter minal and tr ans mitted to the manag ement computer cen
ter .
D ec. 29, 2005
4 . A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 2, Wher ein the ? r s t data E1 is obtained by
us ing the uniq ue k ey k SESSION to encr y pt the s ig natur e S1,
and the s econd data E2 is obtained by us ing the uniq ue k ey
k SESSION to encr y pt the s econd public k ey k PUB N LS, the
s ig natur e S1 its elf being the r es ult of the dig ital imag e of the
r eceipt being s ig ned With a pr iv ate k ey k PRIVMMT of the
por table ter minal.
5. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 2, Wher ein the ? r s t public k ey k PUB MMT
is encr y pted by means of the s econd public k ey k PUB N LS to
obtain ? r s t k ey data Ek 1 Which is tr ans mitted to the man
ag ement computer center Wher e s aid ? r s t k ey data Ek 1 is
decr y pted us ing the pr iv ate k ey k PRWN LS of the manag e
ment computer center in or der to r ecov er the ? r s t public k ey
k PUB MMT, Which k ey is then encr y pted ag ain us ing the
pr iv ate k ey k PRWN LS of the manag ement computer center in
or der to obtain s econd k ey data Ek 2 f r om Which the client
can r ecov er the ? r s t public k ey k PUB MMT by decr y pting the
s econd data k ey With the s econd public k ey k PUB N LS
6. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 5, Wher ein the ? r s t k ey data Ek 1 is
tr ans mitted to the manag ement computer center tog ether
With the dig ital imag e of the r eceipt and the ? r s t and s econd
data E1 and E2.
7. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 2, Wher ein the ? r s t public k ey k PUB MMT
is s ig ned by means of the pr iv ate k ey k PRIVN LS in or der to
obtain a k ey s ig natur e Sk 1 Which is tr ans mitted tog ether With
the ? r s t public k ey k PUB MMT to the manag ement computer
center Wher e s aid k ey s ig natur e Sk 1 is v er i? ed by means of
the s econd public k ey k PUB N LS pr ior to being r etr ans mitted
tog ether With the ? r s t public k ey k PUB MMT to the client
ter minal Wher e s aid k ey s ig natur e Sk 1 is ag ain v er i? ed by
means of the s econd public k ey k PUB N LS, the r es ult of this
v er i? cation cons tituting acceptance or r ef us al of the ? r s t
public k ey k PUB MMT
8. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 7, Wher ein the k ey s ig natur e Sk 1 is
tr ans mitted to the manag ement computer center tog ether
With the dig ital imag e of the r eceipt and the ? r s t and s econd
data E1 and E2.
9. A s ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 1, Wher ein the telecommunications net
Wor k is the Inter net.
10. As ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 1, Wher ein the encr y pting / decr y pting
pr oces s is of the D ES, tr iple D ES, or AES ty pe.
11. As ecur e method of cons ulting ar ticle deliv er y r eceipts
accor ding to claim 1, Wher ein the dig ital imag e of the r eceipt
is tr ans mitted tog ether With identity data and other inf or ma
tion r elating to the deliv er y as input to the por table ter minal.

You might also like