[go: up one dir, main page]

Toyoda et al., 2016 - Google Patents

Illegal interrogation detectable products distribution scheme in RFID-enabled supply chains

Toyoda et al., 2016

Document ID
14321599546676986113
Author
Toyoda K
Sasase I
Publication year
Publication venue
IEICE Transactions on Communications

External Links

Snippet

In RFID-enabled supply chains, it is necessary to protect the contents of EPCs (Electronic Product Code) since an EPC contains sensitive information such as the product code and serial number and could be used for counterfeits. Although many protection schemes have …
Continue reading at search.ieice.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/0046Security markings invisible to the naked eye, e.g. "digital watermarks"
    • G07D7/0066Security markings invisible to the naked eye, e.g. "digital watermarks" involving markings the properties of which are altered from original properties
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
    • G06K2017/0035Aspects not covered by other subgroups
    • G06K2017/0064Aspects not covered by other subgroups for fraud control purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/20Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/0006Security markings visible to the naked eye
    • G07D7/0033Checkcodes, e.g. coded number derived from serial number and value

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Chien et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
US7920050B2 (en) Proxy device for enhanced privacy in an RFID system
Yang et al. Protecting endpoint devices in IoT supply chain
Ranasinghe et al. Security and privacy: Modest proposals for low-cost RFID systems
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
Gharooni et al. A confidential RFID model to prevent unauthorized access
Garcia-Alfaro et al. Security and privacy concerns about the RFID layer of EPC Gen2 networks
Abawajy Enhancing RFID tag resistance against cloning attack
Rong et al. RFID security
Kim et al. MARP: Mobile agent for RFID privacy protection
Ranasinghe et al. Security and privacy solutions for low-cost rfid systems
Toyoda et al. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains
Moradi et al. Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs
Tu et al. Security of lightweight mutual authentication protocols.
Wang et al. RF-chain: Decentralized, credible, and counterfeit-proof supply chain management with commodity RFIDs
Mahinderjit-Singh et al. Trust in RFID-enabled supply-chain management
Bilal et al. A hierarchical anti-counterfeit mechanism: securing the supply chain using RFIDs
Maleki et al. SoK: RFID-based clone detection mechanisms for supply chains
Yang et al. ReSC: RFID-enabled supply chain management and traceability for network devices
Toyoda et al. Illegal interrogation detectable products distribution scheme in RFID-enabled supply chains
Bilal Addressing security and privacy issues in low-cost RFID systems
Chen et al. Construction of the enterprise-level RFID security and privacy management using role-based key management
Wang et al. PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards
Wu RFID System Security