Unlock instant, AI-driven research and patent intelligence for your innovation.
An anti-counterfeiting method based on RFID and physical unclonable function
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of RFID tags and functions, which is applied in the field of anti-counterfeiting based on RFID and physical unclonable functions, can solve the problems of high server calculation and high server storage complexity, and achieve the effects of high query efficiency, reduced calculation complexity, and low price
Inactive Publication Date: 2019-12-24
SUN YAT SEN UNIV
View PDF7 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
In this type of scheme, the storage complexity of the server is high, and the query of the server also requires a high amount of calculation
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0044] The invention adopts physical unclonable function (PUF) technology to fight against cloning attacks of RFID tags, uses message verification code technology to complete product legality authentication, and uses Bloom filter technology to reduce storage complexity of RFID tag end. Each RFID tag contains at least two parts: a storage unit and a PUF module, wherein the storage unit mainly stores product information, a set of output information of the PUF and a message authentication code. The PUF module is an anti-cloning module, which is embedded in the RFID tag and cannot be separated.
[0045] The anti-counterfeiting method of the present invention includes three participants: an RFID tag embedded with a PUF module, a card reader and a server. The server only stores the key and the product information and query times that have been queried as genuine products. Product information, a set of output information of the PUF embedded therein and a message authentication code ...
Embodiment 2
[0064] The above anti-counterfeiting method can be described more clearly by the symbols defined below.
[0065] ID i : The product information in the RFID tag i, which can include information such as the unique code of the product;
[0066] PUFs i (z): When the input is z, PUF i The output of the module, where the PUF i The module is embedded in the RFID tag i;
[0067] m: safety parameters;
[0068] sk 1 and sk 2 : The key generated and stored by the server, which belongs to the set of m-length 0 and 1 bit strings {0,1} m ;
[0069] n: the maximum number of times each product can be queried;
[0070] x i : The number of times that the product identified by the RFID tag i is verified to be genuine during the query;
[0071] k: Bloom filter length parameter;
[0072] t: the number of hash functions that need to be used in the Bloom filter;
[0073] H(): hash function, mapped to the interval {0,1} l , the value of l can be 160;
[0074] h 1 ( ),…,H t ( ): T has...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to the production anti-fake field, in particular to a anti-fake method based on an RFID and a physical unclonable function. Through a anti-fake system which is composed of an RFID label, a card reader and a server, product information, a set of output information of the physical unclonable function and message verification codes are stored in the RFID label, and a secret key is stored in the server. The method includes the steps of enabling the server to obtain information stored in the RFID label through the card reader, enabling the server to generate server side message verification codes according to the obtained information, enabling the server to compare the server side message verification codes with the message verification codes in the RFID label, returning a specific challenge value to the card reader if the server side message verification codes are consistent with the message verification codes in the RFID label, otherwise, returning a fake verification result to the card reader, enabling the server to obtain a response of the physical unclonable function in the RFID label to the specific challenge value through the card reader, completing final verification and returning the final verification result to the card reader. According to the anti-fake method, the product anti-fake check efficiency is high, and the calculation complexity is low.
Description
technical field [0001] The invention relates to the field of product anti-counterfeiting, more specifically, to an anti-counterfeiting method based on RFID and physical unclonable functions. Background technique [0002] Anti-counterfeiting technology is a measure taken to achieve the purpose of anti-counterfeiting. It can accurately identify the authenticity within a certain range, and it is not easy to be imitated and copied. Such measures can effectively verify the authenticity of products, and at the same time, it is difficult for unauthorized attackers to forge or copy, thereby realizing the protection of legitimate products. More traditional anti-counterfeiting technologies include: watermarking technology, barcode technology, invisible image anti-counterfeiting technology and so on. Such techniques focus on using high-tech tools to generate markings that are difficult to replicate or counterfeit. It is difficult to forge without reaching the same technology. Howeve...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.