Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Effective novel anti-counterfeiting method based on physical unclonable function

A new method and physical technology, applied in the anti-counterfeiting field of products, can solve problems such as insufficient security, difficulty in resisting clone attacks, and difficult implementation, and achieve the effect of ensuring security, low price, and small size

Inactive Publication Date: 2016-02-24
SUN YAT SEN UNIV
View PDF8 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, if only RFID is used to construct an anti-counterfeiting solution, it is fundamentally difficult to resist cloning attacks. If the anti-counterfeiting solution designed with public key technology, RFID and PUF is not high in the storage complexity of the server, the calculation cost of the public key on the database side High and difficult to achieve
In the anti-counterfeiting scheme using simple challenge and response mode, the server needs to store the challenge and response data pairs of each product, which is not only not safe enough, but also the storage complexity of the server in this type of scheme is high, and the query of the server also needs to be relatively complex. high computational load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Effective novel anti-counterfeiting method based on physical unclonable function
  • Effective novel anti-counterfeiting method based on physical unclonable function
  • Effective novel anti-counterfeiting method based on physical unclonable function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, some parts in the drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product;

[0034] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings. The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0035] The present invention uses PUF technology to resist the cloning attack of the label, uses the message verification code technology to complete the certification of product legitimacy, and uses the storage of auxiliary data to reduce the storage complexity of the electronic tag end, and uses the reader to store the master key and instruction C To achieve offline verification, each electronic tag contains at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an effective novel anti-counterfeiting method based on a physical unclonable function. The method comprises: storing a master key MSK, ID and an instruction C sent to an RFID tag in a server-side database; and storing critical auxiliary data W in ROM of the RFID tag, storing the master key MSK and instruction C by a hardware security module in a reader so as to implement off-line authentication and the security of information protection. By determining a response Y (C) generated by stimulating PUF by virtue of the instruction C and a private-key SKID calculated by the auxiliary data W, then by virtue of a message authentication code generated by hashing, the message authentication code is compared with the message authentication code corresponding to the private-key SKID obtained by hashing in a registration phase to verify whether the two are equal or not so as to implement product authentication. The method has the characteristics of being relatively low in storage complexity, relatively high in query efficiency, simple and convenient in authentication process, small in calculation cost, hard to be maliciously cloned and difficult to be stolen in critical information and the like.

Description

technical field [0001] The invention relates to the anti-counterfeiting field of products, in particular to an effective new anti-counterfeiting method based on a physical unclonable function, which utilizes a physical unclonable function (PUF) to realize RFID anti-counterfeiting. Background technique [0002] As we all know, the purpose of anti-counterfeiting technology is to achieve anti-counterfeiting of products, which requires certain countermeasures. If such measures can effectively verify the authenticity of products, and at the same time, it is difficult to be forged or copied by unauthorized attackers, this will be achieved. To achieve the protection of legitimate goods, that is, to achieve the so-called anti-counterfeiting. The more traditional anti-counterfeiting technologies include: watermarking technology, barcode technology, invisible image anti-counterfeiting technology and serial number technology, etc. After years of use of these technologies, there are alr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00G06Q30/00
CPCG06K17/0022G06Q30/018
Inventor 蒋政君张方国
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products