An anti-counterfeiting method based on RFID and physical unclonable function

A technology of RFID tags and functions, which is applied in the field of anti-counterfeiting based on RFID and physical unclonable functions, can solve the problems of high server calculation and high server storage complexity, and achieve the effects of high query efficiency, reduced calculation complexity, and low price

Inactive Publication Date: 2019-12-24
SUN YAT SEN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this type of scheme, the storage complexity of the server is high, and the query of the server also requires a high amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-counterfeiting method based on RFID and physical unclonable function
  • An anti-counterfeiting method based on RFID and physical unclonable function
  • An anti-counterfeiting method based on RFID and physical unclonable function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The invention adopts physical unclonable function (PUF) technology to fight against cloning attacks of RFID tags, uses message verification code technology to complete product legality authentication, and uses Bloom filter technology to reduce storage complexity of RFID tag end. Each RFID tag contains at least two parts: a storage unit and a PUF module, wherein the storage unit mainly stores product information, a set of output information of the PUF and a message authentication code. The PUF module is an anti-cloning module, which is embedded in the RFID tag and cannot be separated.

[0045] The anti-counterfeiting method of the present invention includes three participants: an RFID tag embedded with a PUF module, a card reader and a server. The server only stores the key and the product information and query times that have been queried as genuine products. Product information, a set of output information of the PUF embedded therein and a message authentication code ...

Embodiment 2

[0064] The above anti-counterfeiting method can be described more clearly by the symbols defined below.

[0065] ID i : The product information in the RFID tag i, which can include information such as the unique code of the product;

[0066] PUFs i (z): When the input is z, PUF i The output of the module, where the PUF i The module is embedded in the RFID tag i;

[0067] m: safety parameters;

[0068] sk 1 and sk 2 : The key generated and stored by the server, which belongs to the set of m-length 0 and 1 bit strings {0,1} m ;

[0069] n: the maximum number of times each product can be queried;

[0070] x i : The number of times that the product identified by the RFID tag i is verified to be genuine during the query;

[0071] k: Bloom filter length parameter;

[0072] t: the number of hash functions that need to be used in the Bloom filter;

[0073] H(): hash function, mapped to the interval {0,1} l , the value of l can be 160;

[0074] h 1 ( ),…,H t ( ): T has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the production anti-fake field, in particular to a anti-fake method based on an RFID and a physical unclonable function. Through a anti-fake system which is composed of an RFID label, a card reader and a server, product information, a set of output information of the physical unclonable function and message verification codes are stored in the RFID label, and a secret key is stored in the server. The method includes the steps of enabling the server to obtain information stored in the RFID label through the card reader, enabling the server to generate server side message verification codes according to the obtained information, enabling the server to compare the server side message verification codes with the message verification codes in the RFID label, returning a specific challenge value to the card reader if the server side message verification codes are consistent with the message verification codes in the RFID label, otherwise, returning a fake verification result to the card reader, enabling the server to obtain a response of the physical unclonable function in the RFID label to the specific challenge value through the card reader, completing final verification and returning the final verification result to the card reader. According to the anti-fake method, the product anti-fake check efficiency is high, and the calculation complexity is low.

Description

technical field [0001] The invention relates to the field of product anti-counterfeiting, more specifically, to an anti-counterfeiting method based on RFID and physical unclonable functions. Background technique [0002] Anti-counterfeiting technology is a measure taken to achieve the purpose of anti-counterfeiting. It can accurately identify the authenticity within a certain range, and it is not easy to be imitated and copied. Such measures can effectively verify the authenticity of products, and at the same time, it is difficult for unauthorized attackers to forge or copy, thereby realizing the protection of legitimate products. More traditional anti-counterfeiting technologies include: watermarking technology, barcode technology, invisible image anti-counterfeiting technology and so on. Such techniques focus on using high-tech tools to generate markings that are difficult to replicate or counterfeit. It is difficult to forge without reaching the same technology. Howeve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 张方国田海博张博
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products