Anti-Counterfeiting Methods

作者: Masud Bolouri-Saransar , Ronald A. Nordin

DOI:

关键词: Product (mathematics)AuthenticationComputer securityField (computer science)Supply chainEnd userComputer sciencePublic-key cryptographyEncryption

摘要: The present invention relates to the field of product authentication and anti-counterfeiting techniques, more specifically, techniques employing RFID tags encryption technologies. Embodiments illustrate use having encrypted information stored therein which upon decryption by a down-stream entity or an end user can help determine authenticity product. Furthermore, embodiments disclosed herein various examples supply chains private key management.

参考文章(35)
Hiromichi Fujisawa, Shojiro Asai, Minoru Ashizawa, Method and system for identifying and managing RF-ID attached objects ,(2003)
Michael Kulakowski, Secure RFID authentication system ,(2005)
Alejandro Gabriel Schrott, Charles P. Tresser, Paul Andrew Moskowitz, Arnold Halperin, Robert Jacob von Gutfeld, Method and system for preventing counterfeiting of high price wholesale and retail items ,(1998)
Gerard Marmigere, Pierre Secondo, Frederic J. Bauchot, Joaquin Picon, Closure with passive electronic sensor for tamper detection and related method ,(2008)
Helen Balinsky, James Thomas Edward McDonnell, Liqun Chen, Keith Alexander Harrison, Pharmaceutical product packaging ,(2006)