Font Size: a A A

Anti-Counterfeiting System Based On Circular Passage Research And Realization

Posted on:2017-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:T RuanFull Text:PDF
GTID:2308330485487975Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
RFID tags have an encrypted data area, a correct key must be provided to get data from cryptographic region while reading, so it is used for anti-counterfeiting generally. In traditional anti-counterfeiting system, we determine the authenticity of the commodity by set up the one-to-one mapping of the product serial number, the tag key and the cipher text. But, no matter how the encryption technology is advanced, it can possibly be cracked and decrypted, the anti-counterfeiting system’s security will be reduced by binding anti-counterfeiting with encryption together. For example, illegal customers can test out the key of some product’s RFID tag and get the cipher text by brute force attack method, then he can duplicate many "legitimate" RFID tags, making it unable to be distinguished by anti-counterfeiting system. This system is based on a one-time certificate core technology, restricts the security of encryption technology to a single-time anti-counterfeiting and authenticating process, the certificate is replaced when it is authenticated any time, and this method increases the degree of difficulty and cost greatly when illegal customer is cracking the system, even if the illegal customers have cracked a tag, and break through layers of tracing gatekeepers, an article of counterfeit goods can be put at most, at the cost of giving up the genuine commodity’s legal identity. The system can also analyze the illegal authentication behavior by the traceability analyses and the authentication process, and make up the security flaw timely. The function realization of the whole system is split into certificate issuing, anti-counterfeiting, and updating process.On the basis of introducing the function, important components and implementation details of this system’s encryption equipment, certificate issuing server, anti-counterfeiting server and cellphone platform server in detail, this paper also expounds this system’s security isolation technology which is based on circular passage emphatically, this technology is designed based on unreliable factors existing in the system’s each servers and each transmission links, because messages stored in each servers is likely to be acquired on account of server attacks, the corresponding relation of relevant message pairs transmiting between each servers are likely to be cracked on account of information intercepting. The security isolation technology which is based on circular passage, divides the system into a few servers, puts emphasis on the physicalisolation and link transmission isolation of relevant message pairs between cellphone platform server, anti-counterfeiting server, certificate issuing server and mobile phone App, it doesn’t store overall data, especially relevant identity,certificate information pairs in the same place, and doesn’t transmit relevant identity,certificate information pairs on the same channel, even if any spot or transmission link on the system is broken through, the overall situation can’t be mastered, the corresponding relation of relevant identity certificate information pairs can’t be decoded, implementing isolation, guaranteeing the system security.
Keywords/Search Tags:RFID, Server, Circular passage, Security isolation tank, Anti-counterfeiting
PDF Full Text Request
Related items