Abstract
We propose a new hardware and software solution for anti-counterfeiting that puts product authentication directly into the hands of end-users, enabling them to be confident of the authenticity of a product regardless of the integrity of the distribution chain. This is made possible by a new type of tamper-resistant hardware chip, called “memory spot”, which has a unique combination of small size, very fast on-air data rate, relatively large memory, and integrated security features, in conjunction with a novel authentication protocol. In addition, the low cost of these new chips makes our proposed solution even more compelling than possible alternatives. Example applications include pharmaceutical anti-counterfeiting, asset tracking, secure-ID, brand protection and warranty fraud prevention. We will take pharmaceutical anti-counterfeiting as an example to explain our solution. A prototype system has been built to demonstrate the feasibility of the proposed system.
Chapter PDF
References
US, Food and Drug Administration (FDA): Combating Counterfeit Drugs, A Report of the Food and Drug Administration (February 18, 2004)
US, Food and Drug Administration (FDA): Combating Counterfeit Drugs: A Report of the Food and Drug Administration, Annual Update (May 18, 2005)
Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)
Staake, T., Thiesse, F., Fleisch, E.: The Potential of RFID in Anti-Counterfeiting. In: The 20th Annual ACM Symposium on Applied Computing, Santa Fe, New Mexico, March 13 -17 (2005)
Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From Identification to Authentication - A Review of RFID Product Authentication Techniques. In: Workshop on RFID Security – RFIDSec 2006 (July 2006)
Staake, T., Michahelles, F., Fleisch, E., Williams, J.R., Min, H., Cole, P.H., Lee, S.G., McFarlane, D., Murai, J.: Anti-Counterfeiting and Supply Chain Security. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography - Raising Barriers to Product Counterfeiting. Springer, Heidelberg (2007)
US, Food and Drug Administration (FDA): Questions and Answers about Counterfeit Drugs (June 2, 2008)
Johnston, R.: An Anti-Counterfeiting Strategy Using Numeric Tokens Los Alamos National Laboratory. Int. J. of Pharmaceutical Medicine 19, 163 (2005)
White Paper by Philips Semiconductors: Item-level visibility in the pharmaceutical supply chain: a comparison of HF and UHF RFID technologies. TAGSYS, Texas Instruments (2004), http://www.tagsysrfid.com/knowledge-center/upload/TAGSYS-TI-Philips-White-Paper.pdf (June 2009)
Pan-European Summit for Pharmaceutical Manufacturers in the Enlarged EU, Le Méridien Piccadilly, London (February 2005)
Ramos, L., Holmes, B., Overby, C., McAulay, S., McEnroe, W.: Authentication, Not RFID, Will Make Drugs Safer. Forrester (July 2005), http://www.forrester.com/Research/Document/Excerpt/0,7211,36832,00.html (June 2009)
Hewlett-Packard News Release: HP Unveils Revolutionary Wireless Chip that Links the Digital and Physical Worlds. Palo Alto (July 2006), http://www.hp.com/hpinfo/newsroom/press/2006/060717a.html (June 2009)
Eban, K.: Dangerous Doses, How Counterfeiters Are Contaminating America’s Drug Supply. Harcourt, Inc., Orlando (2005)
Balinsky, H., McDonnell, E.: Anti-counterfeit packaging. International patent application PCT/EP2007 /057519 (July 2007)
Microtaggant: Paper Solutions, Microtaggant® Security Ink, http://www.microtaggant.com/anticounterfeiting-security-ink.htm (June 2009)
de Heij, H.A.M.: Feedback from the public for better banknote design. De Nederlandsche Bank (Netherlands). In: IS&T/SPIE 18th Annual Symposium (January 2006) (presentation)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Balinsky, H., McDonnell, E., Chen, L., Harrison, K. (2009). Anti-counterfeiting Using Memory Spots. In: Markowitch, O., Bilas, A., Hoepman, JH., Mitchell, C.J., Quisquater, JJ. (eds) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. WISTP 2009. Lecture Notes in Computer Science, vol 5746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03944-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-03944-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03943-0
Online ISBN: 978-3-642-03944-7
eBook Packages: Computer ScienceComputer Science (R0)