Boehm et al., 2017 - Google Patents
Holistic tracking of products on the blockchain using NFC and verified usersBoehm et al., 2017
- Document ID
- 4692237172710529593
- Author
- Boehm V
- Kim J
- Hong J
- Publication year
- Publication venue
- International workshop on information security applications
External Links
Snippet
Tracking the history of products and its parts has become a common way to detect many incidents of counterfeit. However, once a product leaves the manufacturing process, reliably capturing changes that a product undergoes becomes even more challenging. Anti …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Islam et al. | Enabling IC traceability via blockchain pegged to embedded PUF | |
Boehm et al. | Holistic tracking of products on the blockchain using NFC and verified users | |
US20230004970A1 (en) | Distributed Ledgers with Ledger Entries Containing Redactable Payloads | |
US10412071B2 (en) | Secure transaction systems and methods | |
US20230186281A1 (en) | Automatic access/restriction of nfts | |
US10387695B2 (en) | Authenticating and managing item ownership and authenticity | |
US20160098723A1 (en) | System and method for block-chain verification of goods | |
CN112041849A (en) | Method and system for automatic object recognition and authentication | |
US20230177489A1 (en) | Utilization of biometrics in creation of secure key or digital signature | |
Lehtonen et al. | Trust and security in RFID-based product authentication systems | |
JP2007534042A (en) | Method and system for establishing communication using privacy enhancement technology | |
Murdoch et al. | Security protocols and evidence: Where many payment systems fail | |
Islam et al. | IoT security, privacy and trust in home-sharing economy via blockchain | |
Anita et al. | Blockchain-based anonymous anti-counterfeit supply chain framework | |
Falcone et al. | PUF-based smart tags for supply chain management | |
Geetha et al. | An Experimental Evaluation of an Effective QR Code Based Duplicate Product Detection Using Blockchain Technology | |
Kiran et al. | Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things | |
JP2024163024A (en) | Appraisal and certification system and appraisal and certification method | |
Zocca et al. | Combining NFC Authenticated Tags with NFTs to Spot Counterfeit Luxury Products Using Solana Blockchain | |
US20250317305A1 (en) | System and method for encrypted nfc communication | |
US20250316152A1 (en) | Tamper-resistant container | |
US20240371246A1 (en) | Authenticating ownership and transfer of assets using tokens | |
Mnasri et al. | Current Advances on the Application of Blockchain Solutions in Digital Marketing: Opportunities and Threats | |
Nehete et al. | Cosmetic Product Provenance Identification Technique Utilizing Blockchain Technology | |
Nagarajan et al. | Product verification using blockchain technology |