Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 3:26 am

Results for intellectural property rights

1 results found

Author: ETH Zurich

Title: Anti-counterfeiting Requirements Report

Summary: This deliverable presents the requirements analysis for the anti-counterfeiting system that is under development in this work package. The envisaged system will authenticate products and it can be used to prevent counterfeit products from entering the distribution channel of genuine products. We define authentication of products as the verification of a product’s claimed identity. Because WP5 of the BRIDGE project is a business work package without a specific intended end-user company for the investigated anti-counterfeiting solution, this deliverable focuses on analyzing how potential technical solutions fit the requirements of anti-counterfeiting rather than on describing a list of requirements of a specific system. Interviews with different industries revealed that the end-users of the product authentication system, that is companies affected by product counterfeiting, need a fast and reliable online check that could be used by all business partners and for different kinds of products. Companies would also like to have the RFID-based product authentication system to be closely linked to other services, for instance to support supply chain management activities. Different industries have different requirements regarding the specific use of the RFID-based product authentication system. These requirements mostly relate to how the RFID tags are integrated into the products, what kind of RFID tags should be used, and how the tags are read. The level of security in RFID-based product authentication systems is an important cost factor because a higher level of security is achieved by cryptographic RFID tags that are more expensive than the common RFID tags. Overall, companies desire a secure and inexpensive system but find it hard to precisely specify the required level of security. Interviews with customs revealed that having a standard solution that can be used to authenticate different products is of primary importance for them. According to the interviews, customs officers would most benefit from a system that could be used to authenticate suspicious products with mobile devices. Analysis of functional security requirements of product authentication in general shows that there are three distinct approaches to authenticate products, depending on how the tag cloning attack is mitigated. Tag cloning attack refers to copying a genuine product’s ID number onto another tag that is attached to a counterfeit product. These approaches are: tag authentication (i.e. use of cryptographic tags), location-based authentication (i.e. track and trace based plausibility check), and authentication based on object-specific security features (i.e. product’s physical fingerprint). We have identified several solution concepts to to authenticate RFID-tagged products in the EPC network. Analysis of the current EPC network’s conformance to the identified requirements revealed that the network’s support for the detection of cloned tags is far from optimal and should be improved by an automated analysis of the track and trace data of the product’s locations. Completely automated product authentication check (instead of such that relies on users of the system analyzing the traces of products by themselves) is furthermore required by the industries as well as customs. Therefore in the future steps of this work package we will opt for the development of a track and trace based product authentication system that automatically detects the cloned tags. The goal of this work package is to study how the existing RFID and EPC technologies can be applied to anti-counterfeiting. Hence, the development of completely new technical solutions such as novel cryptographic tag authentication protocols is out of the scope of work package. The technical contribution of this work package will focus on application areas of the existing techniques, such as how to use the RFID track and trace data to detect cloned tags.

Details: Paris(?): BRIDGE (Building Radio frequency IDentification for the Global Environment), 2007. 85p.

Source: Internet Resource: Accessed October 3, 2011 at: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20Anti-Counterfeiting%20Requirements%20Report.pdf

Year: 2007

Country: International

URL: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20Anti-Counterfeiting%20Requirements%20Report.pdf

Shelf Number: 122978

Keywords:
Consumer Fraud
Crime Prevention
Intellectural Property Rights
Product Counterfeiting