The method of determining the authenticity of an object

 

(57) Abstract:

The invention relates to methods of identifying various objects in order to establish their authenticity. Its use allows to obtain a technical result in the creation of a way to identify the authenticity of the object while protecting against intentional modification or substitution of the object. The technical result is achieved due to the fact that the object is assigned a unique number, together with the address of the storage of private key information and encoded using her information about the object is converted to a barcode, which is applied to the object. At the same time at the specified address is stored private key information and the individual number of the object. When converting the barcode information is highlighted address and personal number of the object. When referring to this address and enter the private rooms of the object is given private key information, which may decode information about the object. Since the number of distributions of individual key information on this individual object number limited copy the barcode and the application is relates to a method of determining the authenticity of an object and can be used to uniquely identify different objects.

Known "way to identify the authenticity of the controlled object (RU 2132569, 13.11.98, G 06 K 9/00), which is that information about the object shape in digital form, including information about the object type, manufacturer, date of manufacture, the individual number of the object, textual information in the form of supporting documents to the object, sign this information with a digital signature (EDS) the marker transform in the bar code and put it on the object or on a label attached to the object. When reading data produce the inverse transform of the bar code into a digital form, separated from his digital signature, after which authenticate EDS. If the EDS identified as genuine, you are checking the authenticity of the object by comparing the read information about the object from the database about the real objects. If this information matches, then the object is identified as authentic.

However, the use of this method in practice is tricky. The fact that each region has its own markers, which are authorized to label goods produced in the region. If goods are delivered in a video to check the authenticity of the goods, marked in other regions, it is necessary to have information about the public keys of all of the markers for authentication of their EDS, as well as having all the database on authentic objects from all regions. If the Supervisory authority does not have all the information about all the markers, it shall in writing request the information from a particular marker in a different region, which greatly complicates and lengthens the time of identification of authenticity of the object.

In addition, this method allows to determine the authenticity of the data carrier printed with the bar code, and does not allow to uniquely identify the object, which is fixed to the media. In this regard, the possible substitution of the object, while on the inauthentic object may be caused to the true label with a bar code and the scan will be mistakenly installed the inauthentic authenticity of the object.

Known "Method of authentication information" (EN 2165643, 19.04.2000, G 06 K 9/00), in which the protected object using the text or part of text information printed on the paper. Text information is converted into digital Pho is swagat convert them to the bar code, which put on paper with text information. For authentication of the text information to produce the inverse transform of the bar code verify the authenticity of the digital signature of the marker by using the public key stored in this same bar code. If the digital signature is authentic, you make a conclusion about the authenticity of the information.

The inventors claim that the location of the public key of the marker in the bar code simplifies the verification process, as it eliminates the need for a database of public keys of the markers located in different regions. In addition, the authors believe that the increased reliability of the authentication of the text information.

However, placing the public key of the marker in the bar code leads to the fact that the attacker can spoof the digital signature and the public key of the marker, as well as to modify the text information. The checking of such a substitution may not be detected and text information will be identified as genuine because the EDS of the marker will be mistakenly identified as genuine. Thus, the location of the public key of the marker and digital signature of the marker in the bar code will lead to modified by an attacker, will always be identified as genuine.

Known invention, the same authors described in EN 2172015 ("way to identify the authenticity of the controlled object 01.03.2000, G 06 K 9/00), which is the closest analogue to the claimed technical solution.

The method according to the patent 2172015 is that as securable objects are excisable goods. At the same time as information about the protected object use information about consumer properties of the goods, the parameters of the manufacturer and production characteristics. As parameters manufacturer use area code, manufacturer code, application number, the serial production of the consignment. As a consumer properties of the object using the parameters monitored visually, by feel, the weight, the color and smell. As production characteristics using a code marking of the organization, vendor ID, product code, object type, date of manufacture of the goods.

The above types of information about the object is converted into digital form, sign the digital signature of the marker, add the public key of the marker for authentication, digital signature, and then produce and, ukreplyaem on the object.

For authentication of the object produce the inverse transform of the bar code, checking the authenticity of the digital signature of the marker by using the public key contained in the bar code. If the digital signature is authentic, you conclude authentication information, the authentication information is judged on the authenticity of the protected object, thus producing a comparison of organoleptic (taste, colour, odour, appearance) performance object with read information from a bar code. And the information about the marker, manufacturer and production characteristics of the object read from the bar code is compared with the information stored in the database about the real objects.

This method has all the disadvantages that have been described above in the analysis of the way EN 2165643. The main problem with the implementation of the method according to EN 2172015 is the fact that the inclusion of a bar code public key of the marker to authenticate his signature really leads to the fact that regulatory bodies do not need a database of public keys of all of the markers from other regions. This, however, leads to the fact that any digital signature included in the bar code will be identified as genuine and, accordingly, zamislili spoofed.

In addition, the method prototype inherent disadvantages inherent described in analogs of the method according to EN 2132569. In fact, in the bar code as the object information includes information that has no clear connection with the controlled object and, therefore, not possible with 100% accuracy to judge the authenticity of the object and allows to judge the authenticity on circumstantial evidence (the parameters of the manufacturer, the object type, batch number, production date or sensory characteristics of the product), which are characterized not only by a specific controlled product, but can have any other homogeneous goods. Thus, this method does not allow to individualize the test object and, therefore, clearly to judge its authenticity.

The technical result is to create a way to identify the authenticity of the object information on the object while protecting information about the object from the intentional modification or substitution of the object.

The problem is solved in that in the method of determining the authenticity of an object, namely, that form the information about the protected object in a digital tool for subsequent authentication of the electronic digital signature of the marker, form the individual number of the object in digital form and address requests for key information in digital form, and then perform encoding by using individual key information about the protected object, the electronic digital signature of the marker and means for subsequent authentication of the digital signature of the marker, after which individual object number and address requests for key information, as well as all of the coded information are converting from a digital form in the bar code, apply the barcode directly on the object itself or on any material carrier mounted on the object or attached thereto, and at the specified address requests for key information to remember individual object number and private key information, and the authentication object reads the barcode, convert it into digital form, highlight the address information request for key information and the individual number of the object, shall appeal to the specified address and transmit the individual number of the object, receiving a response to individual key information, which decode the information about the protected object, electronic digital signatures is ectroni digital signature of the marker, according to the result obtained is judged on the authenticity of the information about the protected object, after which the authentication information is judged on the authenticity of the protected object, the number of individual transmission key information on this individual object number limit. In addition, the number of requests for private key information for that individual number of the object is considered to obtain information about the possible number of counterfeit products (objects).

The method is illustrated by the following example.

The company has released the object of sale, such as a refrigerator.

When applied to him barcode according to the known methods the attacker, buying one refrigerator, makes copies of barcodes and causes them to their products - refrigerators. They are identified as genuine.

According to the invention each refrigerator is assigned a number, which, together with the key information is stored at the address of the manufacturer (or in Supervisory bodies) in a computer, a network address which is known. Information about the object (the refrigerator), the electronic signature of the marker and the method of its verification encoded individual code for geovany this information and the individual number of the object, which is not encoded. All information is translated into a bar code and is applied to the object.

Upon identification of the goods when reading and converting the barcode is allocated unencrypted information about the address and the individual number of the object.

Turning to this address, the owner of the object or the Supervisory authority transmits the individual number of the object on which it is issued private key information, which may decode the encoded information.

If the attacker makes copies of barcode and causes them to his product, he cannot obtain private key information, as the number of distributions is limited.

That is, buying a fridge and once by checking its authenticity (if there is one admission to the issuing key information), applying again for this individual address, it will not receive key information and the object information will remain encrypted, which suggests that the object is not authentic.

The number of hits on this individual number allows you to determine how many fake objects are made, as this number may be only one object. So kekta also impossible.

1. The method of determining the authenticity of an object, namely, that form the information about the protected object in digital form, sign this information with a digital signature of the marker, form into a digital form, means for subsequent authentication of the electronic digital signature of the marker, form the individual number of the object in digital form and address requests for key information in digital form, and then perform the encoding using the individual key data information about the protected object, the electronic digital signature of the marker and means for subsequent authentication of the digital signature of the marker, then the individual number of the object, address requests for key information and all of the coded information are converting from a digital form in the bar code, apply the barcode directly on the object itself or on any material carrier mounted on the object or attached thereto, and at the specified address requests for key information to remember individual object number and private key information, and the authentication object reads the barcode convert it into digital form, to the address on the address and transmit the individual number of the object, receiving a response to individual key information, which decode the information about the protected object, the digital signature of the marker and a means for verifying the digital signature of the marker, check the authenticity of the digital signature of the marker, the obtained result is judged on the authenticity of the information about the protected object, after which the authentication information is judged on the authenticity of the protected object, the number of individual transmission key information on this individual object number limit.

2. The method according to p. 1, characterized in that the number of requests for private key information for that individual number of the object read to obtain information about the possible number of counterfeit objects.

 

Same patents:

The invention relates to a device for detecting properties of a sheet material, such as banknotes or securities, using reflected light

The invention relates to a device for detecting properties of a sheet material, such as banknotes or securities, using reflected light
The invention relates to methods for protecting documents of great value, made in paper, from forgery or substitution
The invention relates to the recognition of the authenticity of documents, including financial and securities for which there is a danger of forgery

The invention relates to protective devices, in particular to a protective device or element having a large number of security features for use with valuable goods or items

The invention relates to valuable documents, in particular to the formation and securities documents, and can be used for transactions with securities or instruments, in particular for the acquisition of valuable documents by means of telecommunication connections

The invention relates to a method of detection of counterfeit products

The invention relates to a method of detecting particles in the base, the electromagnetic properties of which differ from the electromagnetic properties of the particles, as well as to the basics and counterfeit documents containing such particles

The invention relates to a protective element for protection against forgery of various documents

The invention relates to the identification and control of access to protected objects and relates to a method of monitoring the integrity of the optical seals, which consists in the illumination optical radiation through the transparent areas of the seal information element of the seal of registration of the image information item of a seal in the form of the distribution of illumination on the surface of the photodetector device, the formation of the reference optical image information item fillings and compare it with that obtained in the control process of the control optical image of an information item fillings

Optical correlator // 2212054
The invention relates to optical information processing, in particular for intelligent vision systems

The invention relates to the identification, namely the readers and fingerprint recognition

The invention relates to the field of computer engineering and can be used for automatic image analysis
The invention relates to a personal identification

The invention relates to methods of pattern recognition

The invention relates to a method of determining the authenticity of an object according to the information about this object and can be used to uniquely identify a variety of objects, including excisable goods, audio, video, works of art

The invention relates to the technical Cybernetics, namely, devices of the character recognition of text documents

The invention relates to the field of television technology and can be used for television photography

The invention relates to a method of entering information, including numbers, text, punctuation marks, commands in electronic computing machines, in particular in small-sized terminal, and can be used to input information into the mobile communication device, remote controls and other similar found in the hand of the user of the device without using the keyboard

FIELD: experimental astrophysics.

SUBSTANCE: method includes producing set of images serial in time and analysis thereof. On basis of this set a dispersion map is built, vale in each point of which equals dispersion of brightness values in respective point of whole images et, on dispersion map points are found, dispersion values of which surpass average dispersion on map for given value, and on basis of these points changing objects are identified.

EFFECT: higher effectiveness.

Up!