BR112022014785A2 - Método para autenticar um item - Google Patents

Método para autenticar um item

Info

Publication number
BR112022014785A2
BR112022014785A2 BR112022014785A BR112022014785A BR112022014785A2 BR 112022014785 A2 BR112022014785 A2 BR 112022014785A2 BR 112022014785 A BR112022014785 A BR 112022014785A BR 112022014785 A BR112022014785 A BR 112022014785A BR 112022014785 A2 BR112022014785 A2 BR 112022014785A2
Authority
BR
Brazil
Prior art keywords
intropy
challenge
response
physical
item
Prior art date
Application number
BR112022014785A
Other languages
English (en)
Inventor
S Iyer Pradeep
Wiegers Ronald
Original Assignee
Avery Dennison Retail Information Services Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avery Dennison Retail Information Services Llc filed Critical Avery Dennison Retail Information Services Llc
Publication of BR112022014785A2 publication Critical patent/BR112022014785A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

MÉTODO PARA AUTENTICAR UM ITEM. Métodos e sistemas que incluem uma ou mais características físicas distintas configuradas entropicamente (uma "identropia") que servem como identificadores únicos para um artigo físico, tal como um produto ou dispositivo, particularmente produtos e/ou dispositivos em comércio, documentos, embalagens, etc, aqui descritos. A identropia torna possível distinguir singularmente um item do outro. Em uma forma de realização, a identropia precisa ser convertida em uma entidade digital que pode ser feita através de uma interação desafio-resposta, na qual um desafio físico atua sobre a identropia, e em que a identropia como uma reação para o desafio proverá uma resposta física. Em algumas modalidades, a resposta (s) descrita acima é criptografada. Em algumas modalidades, o código descriptografado e opcionalmente descomprimido resultante pode ser comparado com a resposta digital que foi recuperada mediante desafio pelo dispositivo de autenticação para estimar uma pontuação de confiança, tal como um quociente de confiança.
BR112022014785A 2020-01-27 2021-01-27 Método para autenticar um item BR112022014785A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202062966147P 2020-01-27 2020-01-27
PCT/US2021/015176 WO2021154777A1 (en) 2020-01-27 2021-01-27 Methods for authenticating an item

Publications (1)

Publication Number Publication Date
BR112022014785A2 true BR112022014785A2 (pt) 2022-09-20

Family

ID=74669547

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112022014785A BR112022014785A2 (pt) 2020-01-27 2021-01-27 Método para autenticar um item

Country Status (7)

Country Link
US (1) US20230058883A1 (pt)
EP (1) EP4097642A1 (pt)
JP (1) JP7456009B2 (pt)
CN (1) CN115668214A (pt)
BR (1) BR112022014785A2 (pt)
CA (1) CA3166075A1 (pt)
WO (1) WO2021154777A1 (pt)

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974150A (en) * 1997-09-30 1999-10-26 Tracer Detection Technology Corp. System and method for authentication of goods
US7152047B1 (en) 2000-05-24 2006-12-19 Esecure.Biz, Inc. System and method for production and authentication of original documents
EP1710764A1 (en) * 2005-04-07 2006-10-11 Sap Ag Authentication of products using identification tags
US20070234058A1 (en) * 2005-11-04 2007-10-04 White Charles A System and method for authenticating products
WO2008009826A2 (fr) * 2006-07-19 2008-01-24 Advanced Track & Trace Procedes et dispositifs de securisation et d'authentification de documents
US9256881B2 (en) * 2013-11-08 2016-02-09 Vattaca, LLC Authenticating and managing item ownership and authenticity
US20170032381A1 (en) * 2015-07-28 2017-02-02 Anand Vaidyanathan System and method for detecting counterfeiting product using encryption and decryption methodologies
WO2018204319A1 (en) * 2017-05-01 2018-11-08 I-Property Holding Corp. Authentication system for use with pharmaceuticals
EP3565179B1 (en) 2018-04-30 2022-10-19 Merck Patent GmbH Composite security marking and methods and apparatuses for providing and reading same
US10885415B2 (en) * 2018-09-07 2021-01-05 Transpacks Technologies Private Limited Anti-counterfeiting mark with 3-D features
US11210512B2 (en) * 2019-01-25 2021-12-28 International Business Machines Corporation Fingerprinting of physical objects
US11943293B1 (en) * 2019-12-06 2024-03-26 Pure Storage, Inc. Restoring a storage system from a replication target

Also Published As

Publication number Publication date
EP4097642A1 (en) 2022-12-07
JP2023512600A (ja) 2023-03-27
CN115668214A (zh) 2023-01-31
CA3166075A1 (en) 2021-08-05
WO2021154777A1 (en) 2021-08-05
JP7456009B2 (ja) 2024-03-26
US20230058883A1 (en) 2023-02-23

Similar Documents

Publication Publication Date Title
MX2019007644A (es) Marca de seguridad compuesta.
TN2015000274A1 (en) Method and apparatus for marking manufactured items using physical characteristic
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
NZ746653A (en) Access control for encrypted data in machine-readable identifiers
WO2015157735A3 (en) Content encryption and decryption
BR112018005876A2 (pt) serviço de telemetria e/ou localização com base em privilégio de dispositivo móvel
PH12019550119A1 (en) Addressing a trusted execution environment using signing key
EP2289015A4 (en) SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SUPPORTING MULTIPLE CONTACTLESS APPLICATIONS USING VARIOUS SAFETY KEYS
EP2731044A3 (en) Client computer for querying a database stored on a server via a network
EA200501767A1 (ru) Система аутентификации
PH12017550127A1 (en) Privacy enhanced personal search index
Impagliazzo et al. An entropic proof of Chang's inequality
PH12018500929A1 (en) Method and system for generating ciphertext by pin entry device
BR112022014785A2 (pt) Método para autenticar um item
TW200518552A (en) Challenge-based authentication without requiring knowledge of secret authentication data
GB2604565A (en) Managing physical objects using crypto-anchors
CN109741078B (zh) 一种面向可追溯的物联网存储系统及方法
NZ776714A (en) Verified reviews using a contactless card
TR201711004A2 (tr) Bi̇lgi̇sayar uygulamali yöntem, bi̇lgi̇sayar si̇stemi̇ ve bi̇lgi̇sayar tarafindan okunabi̇len bi̇lgi̇sayar programi ürünü
GB2566855A (en) Relating collections in an item universe
Kumar et al. NFC Secured Offline Password Storage
TW201614534A (en) Method for encrypting one time password, server end and system
Zasedatelev et al. Dataset for: Single-photon nonlinearity at room temperature.
CN105224853A (zh) 基于硬件加密设备的文件加解密技术
BR112016029881A2 (pt) método e sistema para marcar itens fabricados para detectar preenchimento não autorizado