Sichuan Kailuwei anti-counterfeiting authenticity verification system system plan
[ad_1]
1 Introduction
For a long time, in the field of product authentication, authentication technology has been a problem that industry professionals are devoted to researching. In order to protect the interests of enterprises and consumers and ensure the healthy development of the socialist market economy, the country and enterprises spend a lot of manpower and financial resources each year on authenticating and combating fakes. However, most authentic authentication technologies used in authentic authentication products on the domestic market are still on paper materials. Common traditional authentication technologies include holographic patterns, color-changing inks, hidden marks on products and packaging. However, these technologies or products are quickly copied as soon as they appear. At present, the international authenticity authentication field has gradually emerged a trend of authenticity authentication using electronic technology, especially the use of radio frequency identification technology (RFID), whose advantages have attracted widespread attention. There are currently several methods for RFID authentication: one is to rely on a unique code to complete, and some algorithms are used to achieve security management; the other is a hardware method to design a damaged label, once the label is damaged, it cannot be copied or imitated;
The electronic tag is embedded with a chip and contains a globally unique code or product code information, which can only be recognized by an authorized reader. At the same time, the information in the tag and the unique code of the reader are sent to the authenticity database server for authentication through the communication network. In addition, when the tag is damaged, the information cannot be read, which will protect the content of the tag from being stolen to achieve the purpose of authenticity authentication. There are several typical directions for RFID authentication applications. At present, international and domestic applications have made some breakthroughs in the use of RFID technology for authentication applications. Such as certificate authentication, ticket authentication and packaging authentication. At present, there are relatively mature research results and applications in passport authentication and electronic wallets in the world. For example, an RFID tag can be embedded in the cover of a standard passport or certificate, and its chip also provides security functions and supports hardware encryption.
In response to the above problems, our company designed and developed the “X-RFID+CPK+SM7 national secret algorithm” anti-counterfeiting authentication technology, through the adoption of a new generation of identification-based authentication technology to build a socialized, standardized, and integrated authentication security system, which can greatly increase the threshold for fraud, and the public can directly verify the authenticity , To trace the origin of the product.
2 Introduction of Kailuwei anti-counterfeiting technology
2.1 Features of Kailuwei anti-counterfeiting technology
Kailuwei’s anti-counterfeiting and authenticity technology technology has broken through the ideas of previous anti-counterfeiting technologies and adopted a revolutionary new measure, using NFC, Internet of Things technology, CPK encryption system, digital signature, national secret SM7 algorithm and other technologies to make it difficult Features such as forgery, easy identification, information feedback, password uniqueness, password confidentiality, and one-time use. Use CPK technology to write a unique digital signature in each RFID electronic tag, and write product information (manufacturer name, brand, production date, product batch number, product serial number, shelf life, net content, type specification, sales location number in the tag user area) ). At the same time, the product is attached with a globally unique UID number, and each electronic label is bound to the product. The anti-counterfeiting platform operator only needs to call a simple interface to realize the combination with its own anti-counterfeiting application, and easily use the KLV Anti-counterfeiting and authenticity technology.
Compared with other anti-counterfeiting technologies, the advantages are:
Each tag has a unique ID number, this unique ID is placed in the ROM when the chip is made, it cannot be modified and is difficult to imitate;
No mechanical wear, anti-fouling;
The reader has a physical interface that is not directly open to the end user to ensure its own security;
In terms of data security, in addition to the protection of electronic tags, CPK technology is used to make different digital signatures for each tag.
There is a mutual authentication process between the reader and the electronic tag, and the communication layer is encrypted.
useNFCThe solution cannot be copied because each tag has an encrypted tamper-proof digital signature built into it. “The entire communication process is encrypted, and it is guaranteed that it cannot be copied.” The encryption anti-counterfeiting verification is at the discretion of the manufacturer.
2.2 Grid structure
3Technical characteristics of Kailuwei anti-counterfeiting chip
3.1 Adopt high-security XLPM memory to ensure data security
The anti-counterfeiting authenticity label uses our company’s new generation of XLPM memory to make anti-counterfeiting electronic tags (X-RFID). The X-RFID chip is resistant to detection and tampering in physical mechanisms, and there is no potential difference and visual difference, so it cannot be detected. Can effectively prevent clones from duplicating tags. X-RFID chips have data retention capabilities for more than 100 years, especially for special products and products with high data retention requirements, such as collectibles, artworks, famous wines, etc. Our tag data retention capabilities can reach more than 100 years.
3.1.1 XLPM memory realizes physical anti-detection capability
In addition to preventing the key data from being read through the reader, it is also necessary to consider preventing the key data from being directly obtained from the chip by physical means. The memory used in traditional RFID is EEPROM, and the key is stored in the EEPROM. If the EEPROM can be obtained by low-cost physical means, the security of the key is a problem. There is a chemical substance, lithium niobate (English name Lithium niobate, molecular formula: LiNbO3), whose crystal refractive index changes with the applied electric field. When ultraviolet rays irradiate the crystal, the lower potential can be determined. Because the cell potential of the EEPROM memory is determined by the data 0 or 1 stored in it, as long as the lithium niobate is smeared on the chip surface and treated appropriately, the data in the memory can be read under the ultraviolet microscopy device.
XLPM memory has physical anti-detection capabilities. The data storage mechanism of XLPM determines that there is no potential difference between stored data 0 and 1, and the above method of lithium niobate cannot be effective. Furthermore, the following picture is an enlarged longitudinal section of two BIT XLPM memories. It can be seen that the written data and the unwritten data have no fixed physical characteristics, so even if the most advanced microanalysis methods are used, the data inside cannot be detected. .
3.1.2 XLPM memory perfectly solves the problem of data tampering
Traditional RFID chips mostly use EEPROM as memory. The UID of the chip, common data and even internal configuration information are all stored in EEPROM, and these contents may be rewritten. For example, baking at a high temperature of 250 degrees for 48 hours can clear the data in most EEPROM products. Once the EEPROM data is cleared, you can re-initialize the chip including writing UID through a specific method. Common data that has been written and locked can also be changed in this way. Even chips that have been self-destructed by the KILL instruction may be resurrected in this way. This vulnerability may be exploited by counterfeiters to launch various attacks. Assuming that the counterfeiter has obtained the key data of some of the chips, they can purchase or recycle the chips of the same model, erase the data into “white pieces” and then falsify them.
In order to ensure that the key data is not illegally rewritten, the Caroway chip uses a one-time programmable memory, that is, XLPM. The memory can only be written once physically, and cannot be rewritten afterwards, so the possibility of fraudsters by recovering legal chips is completely cut off. An additional benefit of using XLPM is that data storage is very reliable, resistant to high temperatures, ultraviolet rays and even radiation, and data retention time can reach 100 years. In contrast, the data retention time of EEPROM is generally 10 years, and this length of time will quickly decay when exposed to high temperature, ultraviolet rays, and radiation.
3.2 SM7 encryption algorithm prevents information duplication
As a well-known fact, only relying on the so-called “uniqueness of UID” is not anti-counterfeiting, because both UID and data can be read and forged. Kaluwe chip has built-in hardware SM7 encryption algorithm circuit, and stores a 128-bit unique key, which can feed back encrypted cipher text according to external input data. The outside world can infer whether the key is correct or not based on the ciphertext, but the key itself cannot be read, cannot be calculated, and even more cannot be copied, so it is ensured that the chip cannot be copied.
3.3 The CPK verification system guarantees the security and openness of the key
Integrating the CPK verification system, the CPK key management algorithm is a new generation of cryptographic system independently innovated by my country and with the world’s leading level. It has many features such as large certification capacity, no need for a CA center, high-speed chip-based offline certification, ultra-low cost, support for complex authorization management and support for process certification.
3.4 The key closure design prevents key leakage
With the use of encryption algorithms, the security of the chip will mainly depend on the security of the key. Once the key is leaked, the chip may be copied. Kailuwei chip is currently the only chip in China that is designed to close all key reading channels, which means that no matter in any mode or state, it is impossible to read key data from the chip. This eliminates the possibility of the key being stolen due to unknown logic loopholes from the root cause.
Kellywood chips have fully considered the scalability of future security functions during the design. A notable feature is the use of 2K BIT memory, which is larger than the 1K BIT capacity of similar chips. Since CPK needs about 1.6K BIT storage space, the capacity of the Kellyway chip is obviously appropriate.
3.5 One-time damage to the label to avoid repeated use
Kailuwei’s anti-counterfeiting authentication technology all adopts fragile labels, which are damaged at one time. After being pasted, it cannot be completely peeled off and cannot be reused. It cannot be removed and reused, and the label will be broken after being attached to the seal of the package or the container is opened. This prevents the package from being used by counterfeiters.
3.6 Open development interface, quick access to the system
Provides a variety of development interfaces: including SDK and Android development kits, which are convenient for enterprises to quickly use the Kailuwei anti-counterfeiting and authenticating technology system without investing in research and development.
3.7 Automatic identification, fast and convenient anti-counterfeiting verification
The most important advantage of the radio frequency identification system is non-contact identification. It can read labels through harsh environments where snow, fog, ice, paint, dust, and barcodes cannot be used, and the reading speed is extremely fast, less than 100 milliseconds. And can read and write in batches.
4The anti-counterfeiting authentication process is simple and easy to use
4.1 Initial labeling system
1. The customer provides information in the form of a table
2. According to the form data, issue the CPK signature encrypted Ukey, a total of 4 Ukeys (including 2 spares), the anti-counterfeiting platform reserves 2 (including 1 spare), and the customer holds 2 (including 1 spare);
3. Initialize the anti-counterfeiting label according to the information provided in the form. When the label is initialized, the server and the client must plug in the Ukey at the same time to perform normal initialization operations on the label, ensuring that the anti-counterfeiting label cannot be made separately, and improving the security of the anti-counterfeiting system.
4.2 Anti-counterfeiting and authenticity verification process
1. The customer puts the anti-counterfeiting label on a specific position of the product (such as the seal) to ensure that the label will be destroyed when the product is opened, and the label is prevented from being recycled
2. Guide consumers to download and install the corresponding App on a mobile phone with NFC function;
3. Put the mobile phone close to the anti-counterfeiting label to read the label information, and perform offline and online authentication
4. APP prompts the verification result
4.3 Authentication device
1. Mobile phone with NFC function
2. Tablet PC with NFC function
3. Dedicated authentication equipment
4.4 Convenient authentication
Kailuwei anti-counterfeiting authentication technology uses 13.56 high-frequency electronic tags, and the authentication is convenient. The smart phone has a read-write function, and the user only needs to use the anti-counterfeiting authentication APP to realize the authentication. It can also use inquiry machines, handhelds, and dedicated readers.
5Various types of labels to meet the needs of a variety of products
5.1.1 Bottled category
Option one (the outer surface of the bottle cap):
RFID anti-counterfeiting electronic label (coated paper + knife edge tamper-evident), the RFID anti-counterfeiting label is directly attached to the outer surface of the bottle cap. The label is a fragile label, which is destroyed when the bottle is opened, and is difficult to reuse.
Option 2 (the inside of the opening line on the bottle packaging box)
Attach the RFID electronic label to the inside of the opening line on the bottle packaging box. The RFID tag is stuck on the inside of the packaging box, which is not easy to be found, which provides good concealment; the RFID anti-counterfeiting tag is damaged when the product is opened for drinking, so as to avoid the possibility of RFID tag being reused for fraud.
Solution Three (Built-in RFID tag in the bottle cap, it will be destroyed after opening)
The label is destroyed when the bottle is opened, and the label cannot be reused. Consumers cannot see the electronic label from the surface, which is highly concealed. Special design is needed for bottle caps, and conventional bottle caps cannot be used.
5.1.2 Boxed category
The label is attached to the opening of the box. When the box is opened, the anti-counterfeiting label is damaged.
5.1.3 Various other label forms
[ad_2]