EP3219133A1 - Procédé d'authentification, système d'authentification et dispositifs d'authentification pour l'authentification d'un objet - Google Patents
Procédé d'authentification, système d'authentification et dispositifs d'authentification pour l'authentification d'un objetInfo
- Publication number
- EP3219133A1 EP3219133A1 EP15788409.9A EP15788409A EP3219133A1 EP 3219133 A1 EP3219133 A1 EP 3219133A1 EP 15788409 A EP15788409 A EP 15788409A EP 3219133 A1 EP3219133 A1 EP 3219133A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- comparison
- read
- authentication data
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
Definitions
- the invention relates to an authentication method, an authentication system and authentication devices for authenticating an object that is equipped with an identification drawing, in particular an RFID tag.
- Counterfeiting is the business of illicit counterfeit goods that are manufactured with the aim of being confusingly similar to an original product, often violating trademark or competition laws
- Revenues and their reputation are damaged by inferior product quality, even the end customer of a counterfeit product is financially fraud and jeopardizes, for example, counterfeit medicines, his health, and in the worst case even his life.
- RFID tags attached to the products to be protected.
- the tag is read with a suitable RFI D reader.
- toner cartridges from all major printer manufacturers for commercial printers are often equipped with this technology, ie with an RFID tag.
- An RFID reader installed in the printer always reads the RFID tag whenever a new toner cartridge is inserted. If it is detected that a toner cartridge does not have an RFID tag, the printer is shut down.
- the copy protection is usually limited to reading the RFID tag's own identification number. That is, it is concluded from the presence of an RFID tag alone that the product is authentic.
- the obvious weakness of this method is the ease of copying the RFID tags. If a product pirate uses the same RFID tags that are available for purchase on the counterfeit products, this protection will be bypassed. Consequently, this procedure is no longer safe today.
- Additional security may be a method whereby only known identification numbers are known to be authentic. However, even with such a method, it is sufficient to store an identification number on the RFID tag which is known to be authentic by the system in order to be able to use a counterfeit product.
- One aspect of the invention relates to a method for authenticating an object, comprising the steps of: reading out first authentication data from a tag data memory of a tag, in particular an RFID tag, which is attached to the object, by a read / write device which is designed Read data from the tag data store and write data to the tag data store, provide comparison data in a comparison data store of a compare device, authenticate the tag, comparing the first authentication data with the comparison data, generate second authentication data, and store the second authentication data as new comparison data the comparison data store and as new first authentication data in the tag data store when the first authentication data matches the comparison data.
- a system for authenticating an object with a read-write device configured to read first authentication data from a tag data store of a tag, in particular an RFID tag, and second authentication data into the tag data tag of the tag to write a comparison device that a comparison data memory, wherein the system is configured to compare first authentication data with comparison data stored in the comparison data memory, to provide second authentication data, and to store as new comparison data on the comparison data memory if the first authentication data matches the comparison data.
- Another aspect of the invention relates to a local read-write apparatus for a system for authenticating an object having a transmitting unit for transmitting data, a receiving unit for receiving data, a reading apparatus configured to store first authentication data from a tag data memory of a tag, in particular, read an RFID tag attached to an object to be authenticated, a decryption device for decrypting authentication data with a read key, a memory device for storing a read key, a writing device for writing the second authentication data as first authentication data to the tag memory of the tag.
- Another aspect of the invention relates to an alternative local read-write device for a system for authenticating an object
- a transmitting unit for transmitting data
- a receiving unit for receiving data
- a key generating device for generating a read-key-write-key pair
- the write-key only the read-write device is known and the read key is sent from the transmitting device to a comparison device and stored in a key storage device of the comparison device
- a reading device that is configured to read first authentication data from a tag memory of a tag, in particular an RFID tag attached to an object to be authenticated
- an encryption device for encrypting the second authentication data with the write key when the first authentication data matches the comparison data
- a writing device for writing the second authentication data as the first authentication data to the flag memory of the tag.
- Another aspect of the invention relates to a comparison apparatus for a system for authenticating an object for comparing first authentication data from a tag data memory of a tag, in particular an RFID tag attached to an object to be authenticated, with the comparison data with a transmitting unit for transmitting data a receiving unit for receiving data, a key generation device for generating a read key / write key pair, wherein the write key is known only to the comparison device and the read key is sent from the comparison device to a read / write device and stored in a key storage device of the read / write device
- Comparison data memory for storing the second authentication data as comparison data when the first authentication data with the comparison data from a match the comparison data store.
- the RFID tag and an external system have a "secret", that is, information known to both devices, for example, but in contrast to the prior art method this information does not remain the same in the inventive method, but becomes This means that when a RFID tag is read as authentic based on its current information, information is generated that is stored both on the RFID tag and in the external device The RFID tag is then read out from this information and again a new identification is generated.
- RFID tags for cost reasons, which are also equipped only with an identification number and a memory (IS015693). If these RFID tags are used without the method according to the invention described above, the disadvantage is that these tags can be copied relatively easily. So today is often not only the product copied, but also the RFID tag with the same. Alternatively, there are RFID tags that provide security features (IS014443) to prevent copying. This technology is used, for example, with payment labels or Passports used. The disadvantage, however, is that these RFID tags are significantly more expensive. In addition, there is also the possibility of copies as soon as the security algorithms implemented on the RFID tag are cracked.
- a modification of the above-described embodiment of the invention relates to a method for authenticating an object, wherein the result of the comparison of the read-write device is provided and the second authentication data is generated by a local read-write device and provided to the comparison device.
- This modification allows, for example, that if the connection between the read-write device and the comparison device is broken during authentication, the necessary new authentication data can be stored on the tag.
- This has advantages, since it is generally so that there is no possibility, in case of disconnection, the new data also to one later on the label, whereas it is easy to send the new comparison data to the comparator even at a later time when the connection is reestablished. Therefore, this modification makes the method less susceptible to interference in the connection between the read-write device and the comparison device.
- An embodiment of the above-described embodiment relates to a method of authenticating an object, wherein the local read-write device generates the second authentication data prior to authenticating the first authentication data, and the method after generating comprises the steps of storing the second authentication data as new first authentication data in the identification data memory by the read-write device, sending the second authentication data to the comparison device, storing the second authentication data as new comparison data on the comparison data memory when the first authentication data matches the comparison data.
- An advantage of this embodiment is that in this case, even if a connection between the read-write device and the comparison device terminates before a result of the comparison has been sent to the read-write device, the generated new data is stored on the tag are. The data is thus always re-stored in the tag regardless of the result of the authentication, and only in the case of a successful authentication is the data in the comparison data memory also updated. This also makes the authentication of the tag less susceptible to interference of the communication link between the read-write device and the comparison device, while at the same time ensuring the security of the authentication.
- Another embodiment of the above-described embodiment relates to a method of authenticating an object, wherein the local read-write device generates the second authentication data after authenticating the first authentication data, and the method further comprises the steps of providing the signal by the comparison device when the first Authentication data with the comparison data, sending the signal to the read-write device, generating the second authentication data and storing the second authentication data as new first authentication data when the signal is received by the read-write device, and storing the second one Authentication data as new comparison data in the comparison data memory of the comparison device.
- the comparison device only transmits a signal after authentication, which notifies the result of the authentication of the read-write device, and the read-write device only generates and stores new data on the identification, unnecessary writing to the identification is possible while avoiding the susceptibility of authentication to communication link interference between the read-write device and the comparator. Thus, a secure authentication of the label is guaranteed.
- a further modification relates to a method for authentication as described above, wherein the second authentication data is generated by the comparison device and the method further comprises the step of sending the second authentication data to the local read-write device when the first authentication data with the Comparison data match.
- Another modification relates to a method for authentication as described above, wherein the authentication data and the comparison data are encrypted.
- Encryption of the data makes it possible to ensure that unauthorized use of the stored and generated data is not possible without the key required for reading or writing. Thus, secure authentication of the identification mark is ensured also in this embodiment.
- An embodiment relates to a method for authentication as described above, wherein the authentication data is encrypted and the method further comprises the steps of: decrypting the first authentication data in the comparison device with a first key, comparing the decrypted first authentication data with the comparison data and generating second authentication data if the first authentication data matches the comparison data, encrypted the second authentication data with a second key, which is known only to the comparison device, providing the encrypted second authentication data by the comparison device and storing the encrypted second authentication data as new first authentication data in the identification data memory of the identifier.
- Another possibility relates to a method of authentication as described above, wherein the first key corresponds to the second key or wherein the first and second keys form a write-key read-only pair.
- the encryption system is kept as simple as possible to reduce the cost of the system.
- Using different keys for reading, that is decrypting, and writing, that is encrypting, guarantees a high level of authentication security.
- Another modification relates to a method of authentication as described above, wherein the authentication data is encrypted and the method further comprises the steps of: generating a write-key read-key pair by the comparison device, sending the read-key to the read-write device, decrypting the first authentication data in the read-write device with the read key, sending the unencrypted first authentication data from the read-write device to the comparison device, comparing the decrypted first authentication data with the comparison data and generating second authentication data in the comparison device when the first Authentication data with the comparison data match, encrypt the second authentication data in the comparison device with the write key, sending the encrypted second authentication data to the Le
- the second write authentication device stores the encrypted second authentication data as new first authentication data on the tag data storage.
- This modification allows the read-write device to read the data stored on the tag and send the plain-text data to the compare device, but only the compare device has the ability to encrypt the new data, thus ensuring that only Data generated with the write key read key pair known to the comparison device can be read.
- This has the advantage that the read / write device can be enabled to read the encrypted data and thus obtain information from the encrypted data, such as the last access date or the like, while still providing a high level of security for the correct authentication can be guaranteed.
- One embodiment relates to a method for authentication as described above, wherein the read key is provided in the read-write device.
- Providing the read key in the read / write device without the need to send the read key ensures that only authorized read / write devices gain access to the encrypted data, and thus also improves the security of the authentication method.
- Another modification relates to a method of authentication as described above, wherein the authentication data is encrypted and the method further comprises the steps of: generating a read-write key pair by the read-write device, sending the read key to the comparison device, decrypting the first one Authentication data in the comparison device with the read key stored in a read key memory of the comparison device, comparing the decrypted first authentication data with the comparison data, and generating second authentication data if the first authentication data matches the comparison data, sending the unshift second authentication data to the local one Read-write device, encrypting the second authentication data with the write key known only to the read-write device, and storing the versc encrypted second authentication data as new first authentication data on the tag data store.
- the generation of the read-write key pair by the read-write device further increases the security of the authentication method, since only data, which were generated with the corresponding key pair can also be decrypted correctly by the comparison device.
- Another modification relates to a method of authenticating an object as described above, wherein the authentication data comprises identity data allowing unique identification of the identifier and probe data compared to the comparison data of the identifier, wherein new probe data is provided when the probe Identity data and the test data with the comparison data match.
- This modification makes it possible to uniquely identify a tag by the identity data because the identity data is unalterably associated with the tag. At the same time, however, the test data are always recreated and stored according to the method described above. This makes it possible to recognize a label that has not been authenticated, for example.
- One embodiment relates to a method for authenticating an object as described above, wherein the check data is encrypted according to one of the above-mentioned methods and the identity data is unencrypted.
- This embodiment simplifies the reading of the identification and the authentication of a tag, the identification data of which is stored, for example, on a list of known forged tags, can be aborted immediately without further encryption or decryption steps being performed. This secures the system and the encryption algorithm against unauthorized access and queries. This also makes the authentication process more secure.
- a further refinement relates to a method for authenticating an object as described above, wherein the check data comprises at least one of the following data: date, position, random numbers, Unique Identification Number (UID) of the identification data memory, in particular of the RFID tag.
- UID Unique Identification Number
- Another modification relates to a method of authentication of an object as described above, wherein the comparing device compares the first authentication data and the comparison data in the local read-write device and the comparison data is stored on an external storage device, further the steps of requesting the comparison data of the external storage device by the read-write device, sending the comparison data by the external storage device to the read-write device, comparing the first authentication data with the transmitted comparison data by the comparison device in the local read-write device, providing second authentication data by the read device Write device, when the first authentication data matches the transmitted comparison data, sending the provided second authentication data to the external storage device, storing the second authentication data as new comparison data in the comparison data memory of the external storage device.
- Fig. 1 shows schematically an embodiment of a system capable of carrying out the method according to the invention.
- Fig. 2 shows schematically a preferred composition of the authentication data.
- FIG. 3 shows a schematic flow diagram of an exemplary embodiment of a method according to the invention.
- FIG. 4 shows a schematic flow diagram of a further embodiment of a method according to the invention.
- FIG. 5 shows a schematic flow diagram of a further embodiment of a method according to the invention.
- FIG. 6 shows a schematic flow diagram of a further embodiment of a method according to the invention.
- FIG. 7 shows a schematic flow diagram of a further embodiment of a method according to the invention.
- FIG. 8 shows a schematic flow diagram of a further embodiment of a method according to the invention.
- Fig. 1 shows schematically an embodiment of a system capable of carrying out a method according to the present invention.
- a marking 10 which in this embodiment is an RFID tag, but can also be realized in a suitable other way, comprises a tag data memory 1 1.
- the tag is mounted on an object 12 so that a read / write device 20 the Identification data memory 1 1 can read well.
- the object 12 is in practical implementation, for example, a DVD, a piece of clothing or any other product to be protected against counterfeiting.
- the read-write device 20 in this embodiment comprises a reading unit 21 for reading data from the tag data memory 1 1 of the tag 10 and a writing unit 22 for writing data on the tag data memory 1 1 of the tag 10.
- the read-write device may be conveniently mounted in a printer for reading an inserted printer cartridge.
- the reader / writer could also be, for example, a smart phone, a store scanner, or the like.
- the system of this embodiment further comprises a comparison device 30 including a comparison device reception unit 32 for receiving data and a comparison device transmission unit 31 for transmitting data.
- the comparison device 30 includes a comparison data memory 34 for storing comparison data.
- the comparison device 30 further comprises a comparison device authentication unit 33 and additionally a comparison device authentication data generation unit 35 for generating authentication data, a comparison device decryption unit 36 for decrypting encrypted data, an encryption unit 37 for encrypting data, a comparison device key pair generation unit 38 for generating a write key reading key pair and a key storage unit 39.
- the comparison device 30 in this embodiment is a cloud computer system.
- the comparator authentication unit 33, the comparator authentication data generation unit 35, the comparator decryption unit 36, the encryption unit 37, and the comparator key pair generation unit 38 are realized in this embodiment as units of a computer program executed on a suitable computer chip.
- authentication data are read from the read-write device 20 by means of the reading unit 21 from the identification data memory 11 of the tag 10.
- data can also be written to the identification data memory 11 of the identification 10. This is because the tag 10 is an RFID tag with a known RFID reading and writing technique.
- the authentication data is sent from the read-write device sending unit 23 to the comparing device receiving unit 32 of the comparing device 30 via a connection.
- the comparing device sending device 31 of the comparing device 30 sends the authentication data to the read-write device receiving unit 24 of the read-write device 20.
- the connection between the devices in this embodiment is an Internet connection, but in other embodiments could also be, for example, a (different) cable connection or also a W-LAN connection, a Bluetooth connection or another wireless connection.
- a further embodiment of the read-write device is also described below with reference to FIG. 1.
- the read-write device 20 further includes a read-write device decryption unit 25 for decrypting encrypted data.
- the read-write device further includes a read-write device authentication data generation unit 26 for generating authentication data, a display 27 for displaying an authentication result, and a read-write device key pair generation unit 28 for generating a new read-key write-key pair.
- the read-write device can also generate authentication data and decrypt data.
- the read / write device 20 additionally has a read / write device.
- the authentication of the tag is performed by the reader-writer 20.
- a simple, external memory is used, which is not shown here.
- the additional units employed in these alternative embodiments of the read-write device 20, such as the read-write device decryption unit 25, the read-write device authentication data generation unit 26, the read-write device key pair generation unit 28, and the read-write device authentication unit 29 are executed in this embodiment by a computer chip on which a corresponding computer program is running.
- FIG. 2 schematically shows a preferred composition of the authentication data 40.
- the authentication data 40 is composed of test data 41 and identity data 42 in a preferred embodiment.
- the test data 41 are exchanged again and again, while the identity data 42 are uniquely assigned to a specific identifier 10 and are always maintained.
- the identity data 42 can be, for example, identity numbers belonging to a particular RFID tag.
- the test data 41 could include, for example, a date, a position, random numbers or additionally the Unique Identification Number (UID).
- UID Unique Identification Number
- This process may also be described in a preferred embodiment as a comparison between authentication data 40 composed of identity data 42 and check data 41 and comparison data composed of identity data and comparison check data, wherein when new authentication data 40 is provided, only the check data 41 and theincomesprüfarian be changed.
- step 105 the first authentication data is read out from the tag data memory 11 of the tag 10 from the read-write device 20. Then, in step 1 10, the first authentication data is sent from the read-write device to the comparison device 30. In step 1 15, second authentication data is generated in the read-write device 20 by means of the read-write device authentication data generation unit 26 before the comparison device verifies the authenticity of the first authentication data. Then, the second authentication data is written to the tag data memory 11 of the tag 10 in step 120 by the reader-writer 20 as new first authentication data. It is not yet known at this time whether the marking is actually authentic.
- the tag 10 may not release the first authentication data for reading until the tag 10 receives new authentication data from the read-write device 20.
- step 1 15 and step 120 would be carried out first, followed by step 1 10.
- this alternative method presupposes a corresponding logic in the marking 10 and accordingly additional costs, it has the advantage that copying of the data is also possible Data of the label 10 is only possible when new data is stored on the label 10. Thus, attempting to forge the tag 10 would render the original, original tag 10 unusable, since it would not be possible for a counterfeiter to store the correct new data on both the tag 10 and the comparison device 20. Thus, the simple copying of the label 20 becomes meaningless.
- the second authentication data generated by the read-write device 20 are sent to the comparison device 30.
- the comparison device 30 compares, in the comparison device authentication unit 33, the first authentication data with the comparison data read from the comparison data memory 34. If the first authentication data do not match, the process continues in step 135.
- the comparison device 30 sends a signal to the read-write device 20 that contains the information that the authentication has failed and thus the identification is not authentic.
- the read / write device 20 then recognizes the tag 10 as unauthenticated and, if appropriate, refuses to use the product 12 bearing the tag 10.
- the reader-writer 20 outputs the result of the authentication on the display 27.
- step 145 the identity data 42 of the tag in the comparison data memory 34 of the comparison device 30 is marked as forged.
- the marked data could be read out in order to obtain, for example, information about circulating, counterfeit markings and, for example, if relevant.
- To inform fene customers or to evaluate data from the marking to obtain information, for example about the place where a counterfeit product with the wrong marking was used.
- the comparison device 30 stores the previously received second authentication data as new comparison data on the comparison data memory 34.
- the authentication data stored on the identification data memory 11 of the tag 10 now coincides with the comparison data.
- step 155 the comparison device 30 sends a signal to the read-write device 20 containing the information that the authentication was successful and the tag is thus authentic.
- the read-write device 20 then releases the use of the object 12 carrying the tag 10, if necessary, in step 160, and displays the result on the display 27 when a display 27 is present.
- This method according to the invention has the advantage that, if the connection between the read-write device 20 located, for example, in a department store in which a user wishes to purchase the object, with the comparison device 30, the server of a manufacturer While the authentication is aborting, the tag can still store the new authentication data.
- the object could possibly not be used at the time of the connection abort, but since the sending of the new authentication data from the read-write device 20 to the comparator 30 can be easily made up as soon as there is a connection again, the object can be authentic , be used again at any time.
- FIG. 4 shows a schematic flow diagram of an alternative embodiment of a method 200 according to the invention for authenticating an object.
- the read-write device 20 reads out the first authentication data from the tag data memory 11 of the tag 10. Then send the read-write device 20 in step 210, the first authentication data to the comparison device 30th
- the comparing device authentication unit 33 compares the first authentication data with the comparison data read from the comparison data memory 34. If the first authentication data does not match the comparison data, in step 220 a signal is sent to the read-write device 20 containing the information that the authentication failed. Upon receipt of this signal, the read-write device 20 disables the use of the object carrying the tag and outputs the result of the authentication on the display 27 when a display 27 is present. The comparison device 30 then marks the identity data 42 in the comparison data memory 34 in order to immediately recognize the identification 10 as counterfeit, for example in the case of later retrievals.
- step 215 If the authentication succeeds in step 215, that is, if the first authentication data matches the comparison data, in step 235 the comparison device 30 sends a corresponding signal to the read / write device 20.
- the read / write device 20 then generates in step 240 in the read-write device authentication data generation unit 26, second authentication data, and in step 245, sends the second authentication data to the comparison device.
- step 250 the second authentication data are then stored by the comparison device 30 in the comparison data memory 34 as new comparison data.
- step 255 which may also be performed concurrently with step 250, the second authentication data is then written from the read-write device 20 to the tag data memory 11 of the tag 10.
- This embodiment has the same advantages as the previously described embodiment, but could additionally prevent the read-write device 20 from unnecessarily expending energy to generate new authentication data if the tag 10 is not authentic.
- the second authentication data is generated in the comparison device 30.
- the first authentication data is read from the read / write device 20 from the tag data memory 12 of the tag 10 and sent to the comparison device 30 in step 305.
- the comparison device authentication unit 33 reads the comparison data associated with the tag from the comparison data memory 34 and compares it with the first authentication data in step 315. If it is determined during the comparison that the data do not match, the identity data 42 of the tag 10 is marked in the comparison data memory 34 in step 320.
- the comparator 30 sends to the read-write device 20 a signal containing the information that the authentication failed.
- the read / write device then optionally refuses, in step 330, the use of the object 12 carrying the tag 10 and displays the result of the authentication on the display 27 when a display 27 is present.
- the comparison device 30 If it is determined in step 310 that the identification is authentic, since the first authentication data matches the comparison data, the comparison device 30 generates second authentication data in a comparison device authentication data generation unit 35 in step 335.
- the second authentication data is stored in the comparison data memory 34 of the comparison device 30 in step 340 and sent to the read-write device 20 in step 345.
- the read-write device 20 then writes the second authentication data to the tag data memory 11 of the tag 10 as the new first authentication data in step 350, and optionally releases the use of the object 12 carrying the tag 10. If a display 27 is present, the read-write device 20 displays the result of the authentication on the display 27.
- This embodiment has the advantage that the read / write device can be kept very simple and only the reading unit 21 and the writing unit 22 for reading and writing data from the tag 10 and the read / write device sending unit 23 and the read / write Device receiving unit 24 for forwarding or receiving the data must include. This reduces the cost of the read / write device.
- the authentication data 40 could be encrypted.
- both the identity data 42 and the test data 41 could be encrypted, or only the test data 41 are encrypted and the identity data 42 remain unencrypted.
- FIG. 6 schematically shows such an embodiment according to the invention in which the data is encrypted.
- the encrypted first au- authentication data is read from the tag data memory 1 1 of the tag 10 in step 400 from the read-write device 20 and sent to the comparison device 30 in step 405.
- the first authentication data is decrypted by the comparison device decryption unit 36 of the comparison device with a first key.
- the first key in one embodiment, could be a read key suitable only for decrypting, ie, reading the data. Such a key would be, for example, a well-known "public key" of an asymmetric encryption method
- the decrypted first authentication data is compared with the comparison data from the comparison data memory 34 in the comparator authentication unit 33. If the authentication fails, the procedure is continues with steps 420 to 430 corresponding to steps 320 to 330 from the process illustrated in FIG. 5.
- the comparison device 30 If the authentication succeeds in step 410, the comparison device 30 generates second authentication data in the comparison device authentication data generation unit 35 in step 435 and stores the second authentication data on the comparison data memory 34 as new comparison data in step 440. Thereafter, the comparison device encrypts the second authentication data in an encryption unit 37 with a second key.
- the second key could correspond to the first key, so that a symmetric encryption method is used, wherein the key may only be known to the comparison device in order to ensure the security of the encryption. This method has the advantage that it is very easy to implement. However, higher security for the encrypted data is given when using an asymmetric encryption method.
- the second key is a write key suitable only for encrypting, that is, writing the data, and forming with a read key a unique read-write key pair.
- the write key in this case could be, for example, a "private key" known only to the comparing device 30.
- the comparing device 30 sends the encrypted second authentication data to the read-write device 20 which encodes the encrypted second authentication data in step 450 as the first authentication data on the Drawing data memory 1 1 of the label 10 stores.
- the read-write device 20 releases the use of the object 12 carrying the tag 10 and / or displays the result of the authentication on the display 27.
- This embodiment has the advantage that only a device that knows the write key is able to write meaningful data on the tag, so that there is an additional safeguard against counterfeiting of the tag.
- the write key is a well-known key and the read key is known only to the comparison device 30.
- This has the advantage that even sensitive data, such as location coordinates or user data, can be used as authentication data, without the misuse of data by third parties must be feared. Even if the connection between the read-write device 20, which is in a shop, for example, and the comparison device 30, which may be a server of a manufacturer, is uncertain, the data can be transmitted securely, since only the comparison device 30, the can decrypt encrypted data.
- Another embodiment of the present invention is shown schematically in FIG.
- step 500 a write key read key pair is generated by the compare device 30 in the compare device key pair generation unit 38.
- step 505 the encrypted first authentication data from the tag data storage area 11 of the tag 10 is read by the read-write device 20 and a signal is sent to the comparison device 30.
- the comparison device 30 then sends the read key to the read-write device 20 in step 510.
- the read-write device 20 decrypts the first authentication data in step 520 with the received read key in the read-write device decryption unit 25, and sends the decrypted first authentication data to the comparison device 30 in step 525.
- the comparing device compares, at step 530 in the authentication unit, the unencrypted first authentication data with the comparison data stored on the comparison data memory 34. If the authentication fails the process continues with steps 535-545, which correspond to steps 320-330 from the process illustrated in FIG.
- the second authentication data is generated by the comparison device authentication data generation unit 33 of the comparison device 30 in step 550 and stored in the comparison data storage unit 34 as new comparison data in step 555. Thereafter, the second authentication data is encrypted in step 560 by the encryption unit 37 of the comparison device 30 with the new write key, and the encrypted second authentication data is sent to the read-write device 20 in step 565.
- the read-write device 20 writes the encrypted second authentication data to the tag data memory 11 of the tag 10 and, if appropriate, releases the use of the object 12 to which the tag 10 is attached and / or displays the result of the authentication a display 27.
- This embodiment has the advantage that the read / write device 20 can also decrypt the authentication data and thus use the information possibly stored therein, for example to learn about customer behavior.
- the read key of the read key / write key pair could already be stored on the read / write device 20 as well. In this case, the same read key would always be used and the read key would not have to be sent in step 505. This enhances security when it is known that a connection between the read-write device 20 and the comparator 30 may be insecure.
- the read key write key pair could be regenerated each time the tag 10 is read. Since the read key could be read by unauthorized third parties after being sent over a potentially unsafe connection, a new read / write key pair is then generated in this embodiment, so that the unauthorized third party could read only a single piece of information, but not later new information that were created with a new key pair. Thus, the security of the data is maintained while at the same time enabling evaluation of the authentication data by the read-write device 20.
- the read / write key pair could also be generated by the read / write device 20 in a read / write device key pair generation unit 28. The read-write device 20 could then send the read key to the comparator 30.
- the comparison device 30 can decrypt the authentication data with the read key and store the read key in the compare device key storage unit 39.
- This embodiment has the advantage that the first authentication data can be sent in encrypted form, and only if the authentication is correct, the second authentication data is sent unencrypted. This ensures that a third party can not simply request the first authentication data unencrypted.
- Fig. 8 shows diagrammatically and by way of example a flow chart of a further embodiment in which the read-write device 20 carries out the comparison of the first authentication data with the comparison data.
- the read-write device requests the comparison data from an external storage device.
- the external storage device sends the comparison data to the read-write device 20 in step 605.
- the read-write device 20 reads out the first authentication data from the tag data memory 11 of the tag 10 in step 610.
- the read-write device authentication unit 29 of the read-write device 20 compares the first authentication data with the comparison data.
- the read-write device If the comparison data does not match the first authentication data, the read-write device outputs the result of the authentication on a display 27, if necessary, in step 620 and optionally blocks the object 12 carrying the identifier 10 for further use.
- the read-write device 20 If the authentication succeeds in step 615, the read-write device 20 generates second authentication data in a read-write device authentication data generation unit 26 in step 625.
- the second authentication data is transferred from the read-write device 20 to the external ones in step 630 Storage device and stored in step 635 in the external storage device.
- the second authentication data is written from the read-write device 20 to the tag data memory 11 of the tag 10.
- This embodiment has the advantage that the external storage device can be kept very simple, for example it could be a simple external hard drive, since the comparison takes place in the read / write device. This keeps costs low for a user, since only the purchase of a suitably equipped device is necessary, and the method can also be carried out locally without access to an external server, for example by means of an external hard disk.
- the embodiments described above could be implemented by means of proven technologies in which the products to be protected are provided with RFID tags.
- the RFID tag is read out with a suitable reading device, for example a smartphone, and the read data are transmitted by radio link to a server, for example a cloud computer.
- the server software checks in this embodiment based on data in a database, the transmitted data and communicates a positive or negative result back to the reader. The reader finally displays the result to the user.
- this embodiment of the invention is based on the fact that the RFID tag in addition to its own unique information includes additional data that will be updated at each reading.
- These data are programmed on the RFID tag before the RFID tag is applied. They include, for example, data such as an identification number, a date, a time, a time zone, URLs, a location, etc. These data are updated at each reading.
- the reader With a positive authentication, the reader not only receives the result of the authentication, but also new data which the reader programs into the memory of the RFID tag. In the case of a negative authentication, this does not happen and, for example, in one embodiment the RFID tag is marked as invalid in the database.
- these data are encrypted on the RFID tag.
- the original data are analyzed using an asymmetric cryptography algorithm. and a secret cryptographic key, for example, a "private key" encrypted by the cloud computer software.
- This encrypted data is then transmitted and programmed on the RFID tag. So you can not read this data in this embodiment, unless you are in possession of the cryptographic key. However, even if someone owns the cryptographic key to decrypt the data, for example a "public key”, this does not compromise security in this preferred embodiment In this preferred embodiment, someone is prevented from being able to generate this data since only the Cloud computer knows the algorithm and the cryptography key, for example the "private key”. This makes the copying of RFID tags for bypassing the protection mechanism meaningless. This means that the security is not implemented on the RFID tag, but only in the cloud. By definition, cryptographic attacks on the RFID tag are no longer useful.
- One advantage of the preferred embodiment is thus that, despite a very simple, inexpensive RFID tag based on ISO 15693, copying the RFID tags is meaningless. You lose copies of an original tag
- the security of the solution is thus in a preferred embodiment, thus completely in the cloud and is thus not attacking the RFID tag is centrally controlled at any time and whenever necessary, can be updated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé d'authentification, un système d'authentification et des dispositifs d'authentification permettant l'authentification d'un objet qui est muni d'un support d'identification, en particulier d'une étiquette RFID. L'invention vise à permettre de protéger des produits contre la piraterie commerciale de façon peu onéreuse ou au moins à permettre de détecter l'existence d'un objet interdit issu de la contrefaçon. À cet effet, l'invention concerne un procédé d'authentification d'un objet comprenant les étapes suivantes : lecture de premières données d'authentification dans une mémoire de données d'identification d'un support d'identification, en particulier d'une étiquette RFID, placé(e) sur l'objet, par un dispositif de lecture/écriture qui est conçu pour lire et écrire des données dans la mémoire de données d'identification; fourniture de données de comparaison dans une mémoire de données de comparaison d'un dispositif de comparaison; authentification du support d'identification, les premières données d'authentification étant comparées aux données de comparaison; production de secondes données d'authentification et mémorisation des secondes données d'authentification en tant que nouvelles données de comparaison dans la mémoire de données de comparaison et en tant que nouvelles premières données d'authentification dans la mémoire de données d'identification, si les premières données d'authentification coïncident avec les données de comparaison.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102014222937.5A DE102014222937A1 (de) | 2014-11-11 | 2014-11-11 | Authentifizierungsverfahren, Authentifizierungssystem und Authentifizierungsvorrichtungen zum Authentifizieren eines Objektes |
PCT/EP2015/075478 WO2016074973A1 (fr) | 2014-11-11 | 2015-11-02 | Procédé d'authentification, système d'authentification et dispositifs d'authentification pour l'authentification d'un objet |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3219133A1 true EP3219133A1 (fr) | 2017-09-20 |
Family
ID=54366228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15788409.9A Withdrawn EP3219133A1 (fr) | 2014-11-11 | 2015-11-02 | Procédé d'authentification, système d'authentification et dispositifs d'authentification pour l'authentification d'un objet |
Country Status (4)
Country | Link |
---|---|
US (1) | US20180288613A1 (fr) |
EP (1) | EP3219133A1 (fr) |
DE (1) | DE102014222937A1 (fr) |
WO (1) | WO2016074973A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096700B (zh) * | 2016-06-16 | 2019-04-02 | 重庆易联数码科技股份有限公司 | 电子标签加密方法及其数据读取方法 |
CN113469677B (zh) * | 2021-06-11 | 2024-04-19 | 深圳市雪球科技有限公司 | DESFire卡数据的安全读写方法和装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003050757A1 (fr) * | 2001-12-11 | 2003-06-19 | Tagsys Australia Pty Ltd | Systemes d'etiquetage de donnees securises |
CN102609846B (zh) * | 2011-03-18 | 2014-02-05 | 诺美网讯应用技术有限公司 | 基于通信网络的防伪验证方法及系统 |
-
2014
- 2014-11-11 DE DE102014222937.5A patent/DE102014222937A1/de not_active Withdrawn
-
2015
- 2015-11-02 US US15/525,260 patent/US20180288613A1/en not_active Abandoned
- 2015-11-02 WO PCT/EP2015/075478 patent/WO2016074973A1/fr active Application Filing
- 2015-11-02 EP EP15788409.9A patent/EP3219133A1/fr not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2016074973A1 (fr) | 2016-05-19 |
DE102014222937A1 (de) | 2016-05-25 |
US20180288613A1 (en) | 2018-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3731119B1 (fr) | Procédé mis en uvre par ordinateur destiné au contrôle d'accès | |
EP1891607B1 (fr) | Procede d'acces d'une station de donnees a un appareil electronique | |
EP3318999B1 (fr) | Procédé de délivrance d'une version virtuelle d'un document | |
EP3319006B1 (fr) | Procédé de contrôle d'authenticité hors ligne d'un document virtuel | |
DE102007026836A1 (de) | Verfahren und System zur Prüfung der Echtheit eines Produkts und Lesegerät | |
DE102008043830A1 (de) | Kraftfahrzeug-Anzeigevorrichtung, Kraftfahrzeug-Elektroniksystem, Kraftfahrzeug, Verfahren zur Anzeige von Daten und Computerprogrammprodukt | |
DE112018006031B4 (de) | Authentifizieren einer zahlungskarte | |
WO2013056783A1 (fr) | Terminal mobile, terminal de transactions et procédé de réalisation d'une transaction à partir d'un terminal de transactions en utilisant un terminal mobile | |
EP2689401B1 (fr) | Procédé de commande d'une cassette de billets au moyen de clés spécifiques de clients | |
WO2015180867A1 (fr) | Génération d'une clé cryptographique | |
EP3219133A1 (fr) | Procédé d'authentification, système d'authentification et dispositifs d'authentification pour l'authentification d'un objet | |
DE102009000404B4 (de) | Verfahren zur Freischaltung einer Chipkartenfunktion, Lesegerät für eine Chipkarte und Chipkarte | |
DE102007034527B4 (de) | Verfahren und System zur Kennzeichnung einer Ware als Originalware eines Warenherstellers | |
WO2016041843A1 (fr) | Procédé et agencement permettant d'autoriser une action au niveau d'un système en libre-service | |
WO2000067421A2 (fr) | Procede permettant de garantir l'authenticite de produits | |
EP2774074B1 (fr) | Document, procédé d'authentification d'un utilisateur, en particulier pour valider une fonction d'une carte à puce, et système informatique | |
EP3125464A1 (fr) | Service de revocation pour un certificat genere par un jeton d'id | |
EP2061000A2 (fr) | Sécurisation de produit basée sur l'identité | |
EP1533937B1 (fr) | Procédé d'authentification d'un objet | |
DE102009008184B4 (de) | Prüfen einer Authentisierung eines Besitzers eines portablen Datenträgers | |
EP3312753B1 (fr) | Élément de sécurité physique pour réinitialiser un mot de passe | |
DE102017202953A1 (de) | Zugangskontrollvorrichtung und Verfahren zur Authentisierung einer Zugangsberechtigung | |
DE102020129263A1 (de) | Verfahren zur Überprüfung der Authentizität von Gegenständen | |
EP3441899A1 (fr) | Procédé, système et produit- programme informatique permettant d'accéder à un dispositif protégé pourvu d'un dispositif d'accès ainsi que dispositif protégé | |
DE102020202594A1 (de) | Verfahren zur Authentifizierung für eine Zustellung einer Ware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20170612 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20180125 |