Loading...
Please wait, while we are loading the content...
Similar Documents
Implementing high-level Counterfeit Security using RFID and PKI
| Content Provider | Semantic Scholar |
|---|---|
| Author | Wallstabe, Andreas Pohl, Hartmut |
| Copyright Year | 2007 |
| Abstract | Radio Frequency Identification (RFID) systems have become popular mostly for automated identification and supply chain applications. To implement counterfeit security, RFID- and Public Key (PK) technology are combined. RFID tags authenticate themselves by responding to a challenge of a reader/writer device. For this an asymmetric encryption algorithm (RSA) is implemented and executed on the tag. Thereby a high level of counterfeit security is reached. Using a private/public key pair makes this method very flexible for validation by the distributor or the customer. The asymmetric encryption algorithm is running on a low cost tag providing security even for products with a low value. For high level security, drugs are used as example products. |
| Starting Page | 1 |
| Ending Page | 5 |
| Page Count | 5 |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.rfid-systech.eu/20070613_3B_1115_Wallstabe_HighLevelCounterfeitSecurity.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |