![]() Method and system for assurance of message integrity
专利摘要:
The present disclosure relates to a computer-implemented method for assurance of message integrity for a message transmitted within a network environment. The disclosure also relates to a corresponding communication system and to a computer program product.Fig. 1 公开号:SE1650355A1 申请号:SE1650355 申请日:2016-03-16 公开日:2017-09-17 发明作者:Abidin Aysajan;Amiri Ryan;Andersson Erika;Wallden Petros 申请人:Itsecured Europe Ab; IPC主号:
专利说明:
METHOD AND SYSTEM FOR ASSURANCE OF MESSAGE INTEGRITY TECHNICAL FIELD The present disclosure relates to a computer-implemented method forassurance of message integrity for a message transmitted within a networkenvironment. The disclosure also relates to a corresponding communication system and to a computer program product. BACKGROUND OF THE INVENTION Adigital signature is a cryptographic primitive that provides a meansfor a user or an entity to bind its identity to a piece of information. A digitalsignature of a message is a sequence of bytes dependent on some secretknown only to the signer, and, additionally, on the content of the messagebeing signed. Such signatures must be verifiable, if a dispute arises as towhether a party signed the message. The process of signing entailstransforming the message and a key unique to a particular user into a tagcalled a digital signature. Adigital signature may be used to prove the identityof the sender and the integrity of data. To verify the digital signature, arecipient of a digitally signed message can use a verification rule associatedwith the digital signature scheme. Any attempt to modify the contents of themessage or forge a signature will be detected when the signature is verified. ln some instances it may be desirable to allow a signed message to beread by a first recipient and then relayed to a second recipient, where thesecond recipient should be able to trust that the message was originatingfrom a specific sender. That is, it will be desirable for the second recipient tobe able to trust that the first recipient has not changed the message before itsrelay. Known implementations of such a strategy may be useful e.g. inhierarchal environments, such as for example in a military application.WO2010070459 provides an example within this area, specifically adapted forrelaying messages between two or more radio transceivers in a radio network. Even though WO2010070459 provides a promising approach, the implementation is complicated and not specifically useful in whentransmitting/receiving messages in a general network environment. Accordingly, it would be desirable to provide further improvements asto trusted communication within a network environment, allowing assuranceof message integrity while at the same time keeping the computational complexity to a minimum. SUMMARY OF THE INVENTION According to a first aspect of the disclosure, the above is at least partlymet by a computer-implemented method for assurance of message integrityfor a message transmitted within a network environment, the networkenvironment comprising a first, a second and a third electronic deviceconnected by a network connection, the method comprising the steps offorming, at the first electronic device, the message, forming, at the firstelectronic device, a signature based on the message, a key shared betweenthe first and the second electronic device and a key shared between the firstand the third electronic device, transmitting the message and the signaturefrom the first electronic device to the second electronic device, verifying, atthe second electronic device, the signature, transmitting the message and thesignature from the second electronic device to the third electronic device,verifying, at the third electronic device, the signature, wherein a successfulverification at the third electronic device assures message integrity. The present inventors have identified that it should be possible to in atrustful manner distribute and relay messages within a network environmentcomprising a plurality of electronic devices, without the absolute necessity ofusing a trusted third party as is commonly applied by prior-art solutions.Rather, secrets may in some embodiments of the invention be shared directlybetween the electronic devices. ln accordance to the invention, the keys applied for forming thesignature may typically need fewer secret shared bits for achieving the samelevel of security as compared to prior-art solutions. This will accordingly resultin shorter signatures and thus improves the computational efficiency of thedisclosed method. ln the above discussion, only a first, a second and a third electronicdevice is comprised within the network environment. However, it should beunderstood that further electronic devices may be included. Keys must insuch a case be shared between each of the electronic devices as will befurther elaborated below. ln an implementation of the invention, the first electronic device alsoacts as entity of forming the keys to be shared between the electronicdevices. This will accordingly result in that only the first electronic device maytransmit a message to the second/third electronic device. lt should howeverbe understood that each of the second and the third electronic device may beconfigured in a similar manner and form keys to be shared between theremaining electronic devices. This will thus allow also the second/thirdelectronic device to send messages to the remaining electronic devices. Preferably, the keys shared between the electronic devices areunconditionally secure keys. Communication using unconditional security willalso for protection against all known attacks, as will be further elaboratedbelow. According to a second aspect of the disclosure there is provided acommunication system comprising a first, a second and a third electronicdevice connected by a network connection, wherein the communicationsystem is configured for assurance of message integrity for a messagetransmitted between the electronic devices by forming, at the first electronicdevice, the message, forming, at the first electronic device, a signature basedon the message, a key shared between the first and the second electronicdevice and a key shared between the first and the third electronic device,transmitting the message and the signature from the first electronic device tothe second electronic device, verifying, at the second electronic device, thesignature, transmitting the message and the signature from the secondelectronic device to the third electronic device, and verifying, at the thirdelectronic device, the signature, wherein a successful verification at the thirdelectronic device assures message integrity. This aspect of the inventionprovides similar advantages as discussed above in relation to the first aspect of the disclosure. According to a third aspect of the disclosure there is provided acomputer program product comprising a computer program productcomprising a computer readable medium having stored thereon computerprogram means for a communication system comprising a first, a second anda third electronic device connected by a network connection, wherein thecommunication system is configured for assurance of message integrity for amessage transmitted between the electronic devices, wherein the computerprogram product comprises code for forming, at the first electronic device, themessage, code for forming, at the first electronic device, a signature based onthe message, a key shared between the first and the second electronic deviceand a key shared between the first and the third electronic device, code fortransmitting the message and the signature from the first electronic device tothe second electronic device, code for verifying, at the second electronicdevice, the signature, code for transmitting the message and the signaturefrom the second electronic device to the third electronic device, and code forverifying, at the third electronic device, the signature, wherein a successfulverification at the third electronic device assures message integrity. Also thisaspect of the invention provides similar advantages as discussed above inrelation to the first and second aspects of the disclosure. A software executed by the server for operation in accordance to theinvention may be stored on a computer readable medium, being any type ofmemory device, including one of a removable nonvolatile random accessmemory, a hard disk drive, a floppy disk, a CD-ROM, a DVD-ROM, a USBmemory, an SD memory card, or a similar computer readable medium knownin the art. Further features of, and advantages with, the present disclosure willbecome apparent when studying the appended claims and the followingdescription. The skilled addressee realize that different features of the presentdisclosure may be combined to create embodiments other than thosedescribed in the following, without departing from the scope of the presentdisclosure. Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations. These algorithmic descriptions and representations are the means used by thoseskilled in the data processing arts to most effectively convey the substance oftheir work to others skilled in the art. An algorithm is here, and generally,conceived to be a self-consistent sequence of steps leading to a desiredresult. The steps are those requiring physical manipulations of physicalquantities. Usually, though not necessarily, these quantities take the form ofelectrical or magnetic signals capable of being stored, transferred, combined,compared, and otherwise manipulated. lt has proven convenient at times,principally for reasons of common usage, to refer to these signals as bits,values, elements, symbols, characters, terms, numbers, or the like. lt should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and are merelyconvenient labels applied to these quantities. Unless specifically statedotherwise as apparent from the following discussion, it is appreciated thatthroughout the description, discussions utilizing terms such as “processing” or“computing” or “calculating” or “determining” or “displaying” or the like, refer tothe action and processes of a computer system, or similar electroniccomputing device, that manipulates and transforms data represented asphysical (electronic) quantities within the computer system's registers andmemories into other data similarly represented as physical quantities withinthe computer system memories or registers or other such information storage,transmission or display devices. The algorithms and displays presented herein are not inherentlyrelated to any particular computer or other apparatus. Various generalpurpose systems may be used with programs in accordance with theteachings herein, or it may prove convenient to construct more specializedapparatus to perform the required method steps. The required structure for avariety of these systems will appear from the description below. ln addition,the present invention is not described with reference to any particularprogramming language. lt will be appreciated that a variety of programminglanguages may be used to implement the teachings of the invention as described herein. BRIEF DESCRIPTION OF THE DRAWINGS The various aspects of the disclosure, including its particular featuresand advantages, will be readily understood from the following detaileddescription and the accompanying drawings, in which: Fig. 1 conceptually illustrates a network environment comprising aplurality of electronic devices, where the present concept may be applied; Fig. 2 illustrates an exemplary secret key sharing scheme according toan embodiment of the invention; and Fig. 3 illustrates an exemplary messaging phase in line with a currently preferred embodiment of the invention. DETAILED DESCRIPTION The present disclosure will now be described more fully hereinafterwith reference to the accompanying drawings, in which exampleembodiments of the disclosure are shown. This disclosure may, however, beembodied in many different forms and should not be construed as limited tothe embodiments set forth herein; rather, these embodiments are provided forthoroughness and completeness, and fully convey the scope of the disclosureto the skilled addressee. Like reference characters refer to like elementsthroughout. A “receiver” is a party to an integral communication transaction thatoperates to receive a message, perhaps encrypted, from a sender. A “sender” is a party to an integral communication transaction thatoperates to send a message to the receiver. The message that is sent may insome embodiments of the invention be encrypted. A “signature” means an electronic signature, which may comprise adigital electronic signature. Thus, an example of an electronic signature is thetransformation of a message using a cryptosystem (e.g., an asymmetriccryptosystem) such that a machine having the initial message and thesigner's public key can accurately determine whether the transformation wascreated using the private key that corresponds to the signer's public key, andwhether the initial message has been altered since the transformation was made. A “trusted third party” or TTP is an entity that facilitates interactionsbetween two parties (e.g., a sender and a receiver) that both trust the thirdparty. The parties that trust the TTP use this trust to secure their owninteractions. Embodiments of the invention can be implemented in a variety ofarchitectural platforms, operating and server systems, devices, systems,nodes, and applications. Any particular architectural layout or implementationpresented herein is thus provided for purposes of illustration andcomprehension only, and is not intended to limit the various embodiments. With further reference to the drawings and to Fig. 1 in particular, thefollowing description is given with the idea of transmitting a message from afirst electronic device 102 to a second electronic device 104. The messagewill then be further relayed to a third electronic device 106. lt should of coursebe understood that further electronic devices may be included. The electronicdevices 102, 104, 106 may for example include mobile phones, desktopcomputers, laptops, tablets, servers, etc. The electronic devices 102, 104,106 are connected to each other using a network communication (wired orwireless), such as using a WAN, LAN or an lnternet connection. Possibly, the electronic devices 102, 104, 106 may be components of awireless ad hoc network (WANET), being a decentralized type of wirelessnetwork. ln such an implementation the message may be sensor datacollected (measured and/or received) e.g. by the first electronic 102. Thesensor data/message is then to be provided to an end node in a safe manner,where it is desirable to provide assurance of message integrity for the sensordata once received at the end node. Exemplary implementations may forexample include industry automation, military, agriculture, etc. ln each of suchimplementations appropriate sensors may be connected to e.g. the firstelectronic device 102 and relayed by the second electronic device 104 to thethird electronic device 106 (to a fourth electronic device, etc.). ln anagriculture implementation e.g. a humidity level may be measured andrelayed to the end node. Atypical implementation of the invention includes a setup phase and amessaging phase. ln the setup phase, with further reference to Fig. 2, secret keys are shared between the electronic devices 102, 104, 106. Specifically, afirst set of secret keys are shared between the first 102 and the second 104electron device. A second set of secret keys are also shared between the first102 and the third 106 electronic device, as well as a third set of secret keysshared between the second 104 and the third 106 electronic device. ln accordance to the invention, a plurality of functions (f1, f2, f4k) arechosen from a set of universal hash functions for forming the sets of secretkeys. ln the described implementation the first electronic device 102 isconfigured to generate the sets of secret keys. Afirst portion of the secretkeys (f1, f2, fgk) are provided from the first electronic device 102 to thesecond electronic device 104, and a second portion of the secret keys (fgkfl,f2k+2, f4k) are provided from the first electronic device 102 to the thirdelectronic device 106. ln addition, the second electronic device 104 providesa subset of the first portion of secret keys to the third electronic device 106,and the third electronic device 106 provides a subset of the second portion ofsecret of keys to the second electronic device 104. Preferably, the subsets of keys provided/received from the respectivesecond 104 and third 106 electronic devices are selected in a predeterminedmanner, for example based on a predetermined selection scheme, randomly,semi-randomly, or in any similar way. The portion/sets/subsets of secret keys are preferably shared betweenthe electronic devices 102, 104, 106 in a secret manner, for example using asecure channel connecting the electronic devices 102, 104, 106. The securechannel must not necessarily be the same communication channel (network)as used for communicating the message between the electronic devices 102,104, 106. ln a possible embodiment of the invention, the secret keys aregenerated “off line” in a manufacturing phase for the electronic devices 102,104, 106. Such an implementation could for example be useful in relation tothe above mentioned ad hoc implementation of the invention. Accordingly, insuch an implementation the electronic devices 102, 104, 106 will be pre-programmed with a plurality of secrets shared between each of the electronicdevices 102, 104, 106. lt should be understood that such an implementation would make it possible to allocate any of the electronic devices 102, 104, 106as the electronic device arranged to collect/receive sensor data and relayonwards to any of the remaining electronic devices. ln Fig. 2 (and Fig. 3), the term “key 1” will correspond to the first portionof the secret keys shared between the first electronic device 102 and thesecond electronic device 104. Similarly, the term “key 2” will correspond to thesecond portion of the secret keys shared between the first electronic device102 and the third electronic device 106. Finally, the term “key 3” willcorrespond to the subsets of keys shared between the second electronicdevice 104 and the third electronic device 106. With further reference to Fig. 3, there is provided an example of themessaging phase implemented in line with the inventive concept. ln theillustration provided in line with Fig. 3, the first electronic device 102 (denotedas the “sender”) wants to send a message, m. The message, m, is to beprovided to the second electronic device 104 (denoted as “receiver 1”) andthen provided onwards to the third electronic device 106 (denoted as“receiver 2”, e.g. being the end node for receiving the message). The message, m, is together with key 1 and key 2 provided to asignature generator for forming a digital signature as has been discussedabove. The message, m, is then transmitted by the first electronic device 102together with the digital signature to the second electronic device 104. The second electronic device 104 receives the message-signature pairand verifies the signature using the secret keys “kept” by the secondelectronic device 104. As is understood, the second electronic device 104 willhave both key 1 and key 3 available. The second electronic device 104 is tovalidate “all” of the keys included with key 1 and key 3. ln case the digital signature is determined not to be valid, the processstops and the message is rejected. However, in case the digital signature isdetermined to be valid, the message-signature pair is forvvarded from thesecond electronic device 104 to the third electronic device 106. The third electronic device 106 will in a similar manner validate thedigital signature. As understood from the above, the third electronic device106 will have key 2 and key 3 available. The third electronic device 106 will as in regards to the second electronic device 104 validate “a|” of the keysincluded with key 2 and key 3. ln case the validation turns out positively, theintegrity of the message is kept. However, if the validation fails the messagehas been compromised and is thus rejected.As was explained above, more than three electronic devices 102, 104,106 may be included for performing the inventive method. The key distribution(setup phase) must in such a case be scaled accordingly and keys is to bedistributed between the plurality of electronic devices. For example, in casefour electronic devices are included (the first electronic device again being thedevice forming the keys), keys are to be shared between the first and thesecond electronic device, the first and the third electronic device, the first andthe fourth electronic device, and so on between the second, third and fourthelectronic device. The same concept may be applied if further electronicdevices are introduced “along the line”, e.g. where in an initial stage onlythree electronic devices are included and then increased to four electronicdevices.ln summary, there is provided a computer-implemented method forassurance of message integrity for a message transmitted within a networkenvironment, the network environment comprising a first, a second and a thirdelectronic device connected by a network connection, the method comprisingthe steps of forming, at the first electronic device, the message, forming, atthe first electronic device, a signature based on the message, a key sharedbetween the first and the second electronic device and a key shared betweenthe first and the third electronic device, transmitting the message and thesignature from the first electronic device to the second electronic device,verifying, at the second electronic device, the signature, transmitting themessage and the signature from the second electronic device to the thirdelectronic device, verifying, at the third electronic device, the signature,wherein a successful verification at the third electronic device assuresmessage integrity.Advantages with the invention includes the possibility of trustful communication within a network environment, where a message is to be 11 relayed between a plurality of electronic devices with high necessity ofassuring message integrity. The present disclosure contemplates methods and program productson any machine-readable media for accomplishing various operations. Theembodiments of the present disclosure may be implemented using existingcomputer processors, or by a special purpose computer processor for anappropriate system, incorporated for this or another purpose, or by ahardwired system. Embodiments within the scope of the present disclosureinclude program products comprising machine-readable media for carrying orhaving machine-executable instructions or data structures stored thereon.Such machine-readable media can be any available media that can beaccessed by a general purpose or special purpose computer or othermachine with a processor. By way of example, such machine-readable mediacan comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical diskstorage, magnetic disk storage or other magnetic storage devices, or anyother medium which can be used to carry or store desired program code inthe form of machine-executable instructions or data structures and which canbe accessed by a general purpose or special purpose computer or othermachine with a processor. When information is transferred or provided over anetwork or another communications connection (either hardwired, wireless, ora combination of hardwired or wireless) to a machine, the machine properlyviews the connection as a machine-readable medium. Thus, any suchconnection is properly termed a machine-readable medium. Combinations ofthe above are also included within the scope of machine-readable media.Machine-executable instructions include, for example, instructions and datawhich cause a general purpose computer, special purpose computer, orspecial purpose processing machines to perform a certain function or groupof functions. Although the figures may show a specific order of method steps, theorder of the steps may differ from what is depicted. Also two or more stepsmay be performed concurrently or with partial concurrence. Such variation willdepend on the software and hardware systems chosen and on designerchoice. All such variations are within the scope of the disclosure. Likewise, 12 software implementations could be accomplished with standard programmingtechniques with rule based logic and other logic to accomplish the variousconnection steps, processing steps, comparison steps and decision steps.Additionally, even though the invention has been described with reference tospecific exemplifying embodiments thereof, many different alterations,modifications and the like will become apparent for those skilled in the art.Variations to the disclosed embodiments can be understood and effected bythe skilled addressee in practicing the claimed invention, from a study of thedrawings, the disclosure, and the appended claims. Furthermore, in theclaims, the word "comprising" does not exclude other elements or steps, andthe indefinite article "a" or "an" does not exclude a plurality.
权利要求:
Claims (14) [1] 1. A computer-implemented method for assurance of messageintegrity for a message transmitted within a network environment, the networkenvironment comprising a first, a second and a third electronic deviceconnected by a network connection, the method comprising the steps of: - forming, at the first electronic device, the message; - forming, at the first electronic device, a signature based on themessage, a key shared between the first and the second electronic deviceand a key shared between the first and the third electronic device; - transmitting the message and the signature from the first electronicdevice to the second electronic device; - verifying, at the second electronic device, the signature; - transmitting the message and the signature from the secondelectronic device to the third electronic device; and - verifying, at the third electronic device, the signature,wherein a successful verification at the third electronic device assures message integrity. [2] 2. The method according to claim 1, wherein the second electronicdevice is arranged to have access to the key shared between the first and thesecond electronic device, and the third electronic device is arranged to haveaccess to the key shared between the first and the third electronic device. [3] 3. The method according to any one of claims 1 and 2, furthercomprising the steps of: - forming, at first electronic device, a plurality of functions (f1, f2, f4k)from a set of universal hash functions; - providing a portion (f1, f2, fgk) of the plurality of functions to thesecond electronic device; and - providing a portion (fgkfl, f2k+2, f4k) of the plurality of functions to the third electronic device, 14 wherein the plurality of functions represents the key shared between the firstand the second electronic device, and the third electronic device is arrangedto have access to the key shared between the first and the third electronic device, respectively. [4] 4. The method according to claim 3, wherein step of forming thesignature is further based on the plurality of functions representing the keysshared between the first, second and third electronic device. [5] 5. The method according to claim 4, wherein the step of verifyingthe signature at the second electronic device comprises verifying all of theportion of the plurality of functions representing the key shared between thefirst and the second electronic device. [6] 6. The method according to any one of claims 3 - 5, wherein theplurality of functions representing the keys are provided to the second and thethird electronic device, respectively, over a secure channel. [7] 7. The method according to any one of claims 3 - 6, furthercomprising the steps of: - selecting a subset of the portion (f1, f2, fzk) of the plurality offunctions provided to the second electronic device; - providing the set of functions to the third electronic device. [8] 8. The method according to claim 7, wherein the set of functions israndomly selected. [9] 9. The method according to claim 1, wherein the key sharedbetween the first and the second electronic device, and the key sharedbetween the first and the third electronic device are provided by a furtherparty comprised within the network environment. [10] 10. The method according to claim 9, wherein the further party is atrusted third party. [11] 11. The method according to any one of the preceding claims,wherein the first, second and third electronic device represent a predefinedgroup of electronic device. [12] 12. The method according to any one of the preceding claims,wherein the keys shared between first, second and third electronic device are unconditionally secured keys. [13] 13. A communication system comprising a first, a second and a thirdelectronic device connected by a network connection, wherein thecommunication system is configured for assurance of message integrity for amessage transmitted between the electronic devices by: - forming, at the first electronic device, the message; - forming, at the first electronic device, a signature based on themessage, a key shared between the first and the second electronic deviceand a key shared between the first and the third electronic device; - transmitting the message and the signature from the first electronicdevice to the second electronic device; - verifying, at the second electronic device, the signature; - transmitting the message and the signature from the secondelectronic device to the third electronic device; and - verifying, at the third electronic device, the signature,wherein a successful verification at the third electronic device assuresmessage integrity. [14] 14. The communication system according to claim 14, wherein atleast one of the first, the second and the third electronic device is a client device. 16 15 A computer program product comprising a computer readablemedium having stored thereon computer program means for acommunication system comprising a first, a second and a third electronicdevice connected by a network connection, wherein the communicationsystem is configured for assurance of message integrity for a messagetransmitted between the electronic devices, wherein the computer programproduct comprises: - code for forming, at the first electronic device, the message; - code for forming, at the first electronic device, a signature based onthe message, a key shared between the first and the second electronic deviceand a key shared between the first and the third electronic device; - code for transmitting the message and the signature from the firstelectronic device to the second electronic device; - code for verifying, at the second electronic device, the signature; - code for transmitting the message and the signature from the secondelectronic device to the third electronic device; and - code for verifying, at the third electronic device, the signature,wherein a successful verification at the third electronic device assures message integrity.
类似技术:
公开号 | 公开日 | 专利标题 US9800411B1|2017-10-24|Using a secret generator in an elliptic curve cryptography | digital signature scheme EP3414880B1|2020-09-16|Certificate pinning using a directory service EP3491600A1|2019-06-05|Blockchain-implemented method and system CA2838675C|2017-10-10|Implicitly certified digital signatures TW201618492A|2016-05-16|Improved installation of a terminal in a secure system TW201626752A|2016-07-16|Generating a symmetric encryption key CN109714168A|2019-05-03|Trusted remote method of proof, device and system CN108900479A|2018-11-27|Short message verification code acquisition methods and device CN103944715A|2014-07-23|Data processing method based on agreement key TW201626775A|2016-07-16|Mutual authentication US20190356496A1|2019-11-21|Public Key Infrastructure & Method of Distribution TW201626776A|2016-07-16|Improved system for establishing a secure communication channel TW201633206A|2016-09-16|Improved security through authentication tokens US20160149708A1|2016-05-26|Electronic signature system CN103813333A|2014-05-21|Data processing method based on negotiation keys WO2018047120A1|2018-03-15|A system and method for data block modification detection and authentication codes CN103813321A|2014-05-21|Agreement key based data processing method and mobile phone CN107026729B|2021-08-17|Method and device for transmitting software US20090285388A1|2009-11-19|Cryptographic Method with Elliptical Curves CN107919953A|2018-04-17|Data notarization method, apparatus, equipment, medium and server US11190345B2|2021-11-30|Email verification CN112734423A|2021-04-30|Transaction method based on block chain and terminal equipment WO2017135866A1|2017-08-10|Method and system for assurance of message integrity SE1650355A1|2017-09-17|Method and system for assurance of message integrity Ragab et al.2019|Hybrid cryptosystems for protecting IoT smart devices with comparative analysis and evaluation
同族专利:
公开号 | 公开日 SE542333C2|2020-04-14|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 SE1650355A|SE542333C2|2016-03-16|2016-03-16|Method and system for assurance of message integrity|SE1650355A| SE542333C2|2016-03-16|2016-03-16|Method and system for assurance of message integrity| PCT/SE2017/050040| WO2017135866A1|2016-02-01|2017-01-17|Method and system for assurance of message integrity| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|