Anti Counterfeiting Technologies EE126 Computer Engineering Clifford C Youn.

Slides:



Advertisements
Similar presentations
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
Advertisements

McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
preventing counterfeit …
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Radiofrequency Identification for movable heritage management Central International Archive of Art Objects Member of Albert Canals – General Director AICOA.
Automatic Data Capture Devices & Methods
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
© 2005 LXE All rights reserved. RF-ID in Industrial Logistics Danny Mariën – LXE Belgium.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Applied Cryptography for Network Security
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Lecture Notes #7 Radio Frequency Identification (RFID)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
JDW 09/2007 Primary Data Carrier - RFID or 2D Barcode?
上海交通大学 自动化系 FROZEN FOOD Case : Cool-Chain of RFID.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID Last Update Copyright Kenneth M. Chipps Ph.D.
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
1 Knock It Off! Brands & the Counterfeiting Quandary Tuesday, November 11, 2008 Union League Club, NYC Technology Advancements.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
RFID TECHNOLOGY IN BABARIA INSTITUTE OF TECHNNOLOGY (BIT):an OVERVIEW BY BINAL H JOSHI LIBRARIAN BABARIA INSTITUTE OF TECHNOLOGY VADODARA.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID (RADIO FREQUENCY IDENTIFICATION)
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Aviation RFID Solutions
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 RFID Security Nicholas Alteen Computer Science Program Florida Gulf.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Microwave Communication Project
English for Advance Learners I
Preventative Measures
Global KeyAccess Technologies Ltd.
Information System and Network Security
Designing a Production Plan
Radio Frequency Identification (RFID)
Describe direct data entry and associated devices, e. g
Team 7 Technical Presentation
Radio Frequency Identification
Stallion Systems & Solution Pvt Ltd
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Anti Counterfeiting Technologies EE126 Computer Engineering Clifford C Youn

What’s Counterfeiting? Forged, copied or imitated without the perpetrator having the right to do with the purpose of deceiving or defrauding Potential negative ramifications of counterfeit parts with altered serial numbers being sourced and distributed in the supplier networks Damage from Counterfeiting –About 5-7% of total world trade - $600 billion 1) –Poor product quality, deterioration of the brand, concern for consumer safety, decrease in company’s revenue 1) IAAC (International Anti Counterfeiting Coalition), 2012

Anti Counterfeit Technologies Basic Goal - Should be easily applied but difficult to imitate 1.Difficult to duplicate or forge 2.Easily identifiable visually without the need of special equipment 3.Hard to re-label or reuse 4.Easily noticeable when tampered with Types of Anti Counterfeit Technologies 1.Authentication Verification 2.Tracking & Tracing

Anti Counterfeiting Technologies Authentication VerificationTracking and Tracing TechnologyOvertCovertMachine-Readable DefineVisible to the eyeNot visible to the eye Require special equipment for visualization Need tool/equipment for identification ExamplesHolograms Optically variable devices Color-shifting inks/films Security thread Fluorescent inks Security inks/coatings (reactive/UV/IR/ther mochromic inks) Hidden printed messages Digital watermarks Taggants (biological/chemical /microscopic) RFID (Radio Frequency Identification) EPC (Electronic Product Code) Barcodes Laser marking Optically stored marks

Anti Counterfeiting Technologies Authentication VerificationTracking and Tracing TechnologyOvertCovertMachine-Readable AdvantageUser verification Improved security Low implementation costs Easy upgrading/addition Flexible implementation Convenient bulk tag reading Quick response time Traceability and anti counterfeiting protection integrated into a single label Disadvantag e User training Potential imitation and reuse Possible false assurance Proper disposal procedure Potential imitation Costly for additional security options Different RFID standards (US vs EU vs others) Security (cloning attacks) problem Overhead costs

RFID System – How it works 1.Readers send certain frequency RF signals by antennas, then RFID tags generate induced currents and are activated when they reach the workplace of antennas 2.Tags send their own codes information out through built-in antennas 3.Antennas receive the carrier signals sent by tags and sent to the readers, then readers demodulate and decode the signals and send to the background of the main system 4.Main system judges whether the tags/products are genuine or not Main SystemReaderAntennaRFID Tag

Why RFID? “Authentication Verification” & “Tracking and Tracing” at the same time Advantage of RFID over Barcode 1.No line of sight necessary – can be read through wood, plastic, cardboard, other materials except metal 2.No minimum size requirements 3.Works in harsh and dirty environments – e.g. outdoors, around chemicals, moisture and high temperatures 4.Reads hundreds of labels at a time 5.Enables highly automated processes 6.Offers on-chip data storage 7.Tags reprogrammable on-the-fly

RFID – Challenges (STRIDE model) TypesDescription SpoofingCloning of RFID tags by copying the information of one tag to another or unauthorized inventory scanning Tampering w/ dataDelete/modify/add/reorder data in RFID Replay attacksUnwanted extension of operation range by adding “ghost” between a reader and a tag RepudiationNo evidence to prove that user has actually performed a certain action - denial of receiving certain pallet/case/item Information disclosure (sniffing) Read w/o the knowledge of tag bearer and leaking information to unauthorized users Denial of Service (DoS) Can’t function properly to provide normal services – kill tags, erase tag setting, shield tags from being read, signal jamming Elevation of PrivilegeAdversary gains higher privileges than the authorized level Proper tag authentication is an essential keystone for guaranteeing genuine identification  require tags to have cryptographic capabilities (e.g. public, private key systems)

DNA Marking Scheme Additional anti counterfeiting technology based on DNA –Uncopyable: cannot be reproduced or simulated –Incorporated into the chip production process: ablation, sandblasting, blacktopping, refurbishing will distort or remove DNA marks

Thank you!