Anti-Counterfeit Labeling Method

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and Hash Functions. Digital Signatures.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Cryptographic Technologies
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
 COMPUTER & INDUSTRY LANGUAGE For Commercial Art.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Computer main parts. Hardware  It refers to all physical parts of a computer system.
MiniCheck OCR Enhancement CSCI 6838 Capstone Project Team # 3 Fall 2007
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Cryptography, Authentication and Digital Signatures
ECE Lecture 1 Security Services.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Mr. Stasa © You should be able to:  Identify the different parts of a personal check  Complete a personal check  Endorse.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Each time the scanner scans an item, it performs a calculation by counting the ‘check digit’. Eg: add every odd---( = 22) If the check.
Next VVSG Training Security: Testing Requirements October 15-17, 2007 Nelson Hastings Alicia Clay Jones National Institute of Standards and Technology.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Web Security.
Key management issues in PGP
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Digital Signature By: Jermel Lee.
Cryptographic Hash Function
SECURITY FEATURES OF ATM
e-Health Platform End 2 End encryption
Chapter 5: The Art of Ensuring Integrity
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
SOLUTION LAND TITLES.
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
How a Computer Works.
Message Digest Cryptographic checksum One-way function Relevance
PART VII Security.
SOLUTION DOCUMENTS.
Operating Systems Security
Introduction to Symmetric-key and Public-key Cryptography
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Digital Certificates and X.509
SOLUTION ID CARDS AND DRIVER’S LICENSES
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Instructor Materials Chapter 5: Ensuring Integrity
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Cryptography Lecture 23.
Digital Signatures Network Security.
Presentation transcript:

Anti-Counterfeit Labeling Method Çetin Kaya Koç koc@koc1.com javanvec@aol.com SecureLabels Inc, Corvallis, Oregon

General Method A label consists of two distinct parts: Unique Random Image: M Unique Product Signature: S M 10101011101011001010110001001100111101010 S

About Unique Random Image Created using a controlled or random process Should be impossible to re-create the same image by scanning or copying Example 1: The way the silk threads are randomly distributed in US paper money creates a unique, unintentional, and irreproducible image Example 2: Dispersion of colored sand in plastic will also create an irreproducible image

About Unique Random Image After the image created on the label, it is scanned and encoded Encoding produces a number M which represents the image Size of the image does not need to be larger than a square centimeter; size of the number M is 20-100 bytes There are very efficient codes for robustly encoding such images (chain codes) Error-correcting codes can be used to add more resiliency

About Unique Label Signature A number S which is placed on the label or product Barcode Magnetic number Printed number Placed inside an RFID chip 0101101001 78593783937

S = SignatureFunction(M,privatekey) Relationship of M and S M is the binary number representing the unique random image S is obtained from M using cryptographic techniques S = SignatureFunction(M,privatekey)

Digital Signature Function SignatureFunction is a mathematical function taking M and another number, privatekey privatekey is known only to the owner, and is kept secure Only the owner can produce S given M since only the owner knows privatekey

VerificationFunction(M,S,publickey) Verification Process To verify, S is an authentic (true) signature of M, we need another function VerificationFunction(M,S,publickey) VerificationFunction is a mathematical function which takes 3 parameters M, S, and publickey are numbers The result is either YES or NO

VerificationFunction(M,S,publickey) Verification Process VerificationFunction(M,S,publickey) YES means, M and S are authentic, S is produced by privatekey privatekey and publickey are mathematically related: privatekey produces S for M, and publickey verifies that S is authentic publickey is given to anyone who wishes to participate

Label Factory Makes the label Creates the Unique Random Image Encodes the image to obtain M Communicates M to Producer Receives S from the Producer Prints S on the label or on the product

Producer Makes the product Receives M from Label Factory Executes the SignatureFunction using the secret entity privatekey and M Obtains S Communicates S to Label Factory

Any Third Party Previously establishes the relationship with the Producer and obtains publickey Scans the Unique Random Image and obtains the encoding M Scans the Unique Product Signature and obtains S Executes VerificationFunction with M, S, and publickey: Result is YES or NO

Equipment Needs – Label Factory Manufacturing equipment to create the unique random images Optical scanner with encoding software to obtain M Internet connection to send M and receive S from Producer A 56kbit Internet connection can send and receive 28 signatures per second Printing or other methods place S on the label or on the product The cost of optical scanner with encoding software is about $100

Equipment Needs – Producer Internet connection to receive M and send S to Label Factory An ordinary PC with cryptographic software to execute SignatureFunction to obtain S The cost of such equipment and software is about $2000.

Equipment Needs – Third Party An optical scanner to obtain M and S from the product and label Cryptographic software inside the scanner to execute VerificationFunction with parameters M, S, and publickey Same scanner can hold thousands of different publickey values belonging to different vendors The total cost per scanner is probably around $200