摘要 |
#CMT# #/CMT# The method involves generating a random number, by using a quantum generator. A timestamping and one secret key are generated. A message authentication code is truncated using the secret key. A cryptographic message authenticator is generated using the secret key, during the truncating step. The random number, the timestamping and truncation are symmetrically encrypted, using another secret key to produce an authentication code (145). A message digest (140) is additionally produced, during the step of symmetrical encryption using the latter secret key. #CMT# : #/CMT# An independent claim is also included for an authentication device. #CMT#USE : #/CMT# Used for authenticating a product e.g. molded part, to provide protection against counterfeiting of trademark, distinct signs and the product having them. #CMT#ADVANTAGE : #/CMT# The method allows to encrypt several information comprising code creation date, random number and the truncation and to determine the encrypted information by using one of the secret keys. The other secret key can be utilized for retrieving authentication information, so that each production site can implement the secret keys. The origin of the code and its creation date can be determined by testing different secret keys possible on the code. The method eliminates the need for maintaining a database at the production level, thus simplifying the operation of a production tool. The utilization of the message authentication code and the authentication code permits to detect a falsification in an immediate manner. The truncation permits to maintain a reasonable size of a printed code, thus providing compactness and aesthetics. #CMT#DESCRIPTION OF DRAWINGS : #/CMT# The drawing shows a representation of functions and stages implemented in a method for authenticating a product. `(Drawing includes non-English language text)` 140 : Message digest 145 : Authentication code. |