[go: up one dir, main page]

Boehm et al., 2017 - Google Patents

Holistic tracking of products on the blockchain using NFC and verified users

Boehm et al., 2017

Document ID
4692237172710529593
Author
Boehm V
Kim J
Hong J
Publication year
Publication venue
International workshop on information security applications

External Links

Snippet

Tracking the history of products and its parts has become a common way to detect many incidents of counterfeit. However, once a product leaves the manufacturing process, reliably capturing changes that a product undergoes becomes even more challenging. Anti …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Islam et al. Enabling IC traceability via blockchain pegged to embedded PUF
Boehm et al. Holistic tracking of products on the blockchain using NFC and verified users
US20230004970A1 (en) Distributed Ledgers with Ledger Entries Containing Redactable Payloads
US10412071B2 (en) Secure transaction systems and methods
US20230186281A1 (en) Automatic access/restriction of nfts
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US20160098723A1 (en) System and method for block-chain verification of goods
CN112041849A (en) Method and system for automatic object recognition and authentication
US20230177489A1 (en) Utilization of biometrics in creation of secure key or digital signature
Lehtonen et al. Trust and security in RFID-based product authentication systems
JP2007534042A (en) Method and system for establishing communication using privacy enhancement technology
Murdoch et al. Security protocols and evidence: Where many payment systems fail
Islam et al. IoT security, privacy and trust in home-sharing economy via blockchain
Anita et al. Blockchain-based anonymous anti-counterfeit supply chain framework
Falcone et al. PUF-based smart tags for supply chain management
Geetha et al. An Experimental Evaluation of an Effective QR Code Based Duplicate Product Detection Using Blockchain Technology
Kiran et al. Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things
JP2024163024A (en) Appraisal and certification system and appraisal and certification method
Zocca et al. Combining NFC Authenticated Tags with NFTs to Spot Counterfeit Luxury Products Using Solana Blockchain
US20250317305A1 (en) System and method for encrypted nfc communication
US20250316152A1 (en) Tamper-resistant container
US20240371246A1 (en) Authenticating ownership and transfer of assets using tokens
Mnasri et al. Current Advances on the Application of Blockchain Solutions in Digital Marketing: Opportunities and Threats
Nehete et al. Cosmetic Product Provenance Identification Technique Utilizing Blockchain Technology
Nagarajan et al. Product verification using blockchain technology