EP0982687A1 - Method for preventing or detecting fraud in an identification system - Google Patents
Method for preventing or detecting fraud in an identification system Download PDFInfo
- Publication number
- EP0982687A1 EP0982687A1 EP98810845A EP98810845A EP0982687A1 EP 0982687 A1 EP0982687 A1 EP 0982687A1 EP 98810845 A EP98810845 A EP 98810845A EP 98810845 A EP98810845 A EP 98810845A EP 0982687 A1 EP0982687 A1 EP 0982687A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- serial number
- checksum
- transponder
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Definitions
- This invention relates to a method according to the preamble of claim 1.
- Identification systems of this type are well known, for instance from US-patent 2 293 399.
- the objects to be identified by such systems may be of any kind, but they often are animals, for instance as described in US-patent 5 211 129. No specific means are disclosed in the patent specifications mentioned above for preventing or at least detecting fraud by copying transponders wherein the identification code of some valuable object such as an animal is stored.
- the transponders usually make use of integrated circuits (chips) as active elements.
- chips integrated circuits
- Fraud by copying the code of a specific transponder into an OTP transponder in order to obtain two identical transponders can occur and needs to be made impossible.
- One well known approach is to use a secret key and some cryptographic algorithm (symmetric or asymmetric) to generate a cyphrate out of a random number sent to the transponder as challenge. The cryphrate is sent back from the transponders to the reader.. Often the code of the transponder is also used as input to the cryptographic algorithm. Knowing algorithm and secret key (or public key in asymmetric systems) the reader can authenticate the transponder at any time. This method, however needs to make use of at least one secret key and therefore requires sophisticated key handling.
- This invention aims in providing security against copying without reaching the level of cryptography.
- This security is obtained by the characterising features of claim 1.
- the advantage of this method is that it is not requiring complicated and error prone key handling and requires almost no computing power. The latter in contrast to cryptographic methods.
- the method makes use of a chip serial number that makes the combination of the code and the chip serial number almost unique as long as the respective chip manufacturer never produces two identical serial numbers.
- a database can be used either at identification set-up time when the code/serial number pair is stored into the database or at code read time. At both moments the databasecan be searched for double serial numbers and/or codes.
- a checksum (e.g. CRC) can be generated from the serial number and used for the above mechanism instead of the serial number. This however may reduce security.
- a chip manufacturer identification may also be associated to the chip and made part of the serial number using the above method.
- This identification of the manufacturer or the user of the chip may be a trademark such as the registered trademark RID of applicant.
- a geographic information etc. can be stored into the database to facilitate plausibility checks.
- Other and additional information may be stored in the memory of the transponder. A possible method is described below, whereby additional information mentioned therein may be omitted or replaced by other specific information.
- the code, the die serial number, and the die manufacturer-ID are combined into a consistency check number using a standardised method, e.g. a CRC scheme.
- the resulting number is programmed into the trailer bits and needs to be stored in the respective database, marked down in the animals passport, etc. for subsequent consistency check.
- the code, the die serial number, the die manufacturer-ID, and the trailer bits are read and the same method is applied to check consistency of all four numbers.
- the tag transponder
- This method can prevent from copying transponders as long as no OTP dies are available that allow the programming of die serial number and die manufacturer-ID at code programming time.
Abstract
In an identification system comprising a transponder
attached or associated to an object such as an animal and
means for reading the identifying code memorised in this
transponder, additional information such as a serial number
of the chip used in the transponder is memorised and
transmitted with the code during reading of the transponder.
In this way, fraudulent copying of transponders is prevented
and/or detection of such copies improved.
Description
- This invention relates to a method according to the preamble of claim 1. Identification systems of this type are well known, for instance from US-patent 2 293 399. The objects to be identified by such systems may be of any kind, but they often are animals, for instance as described in US-patent 5 211 129. No specific means are disclosed in the patent specifications mentioned above for preventing or at least detecting fraud by copying transponders wherein the identification code of some valuable object such as an animal is stored.
- The transponders usually make use of integrated circuits (chips) as active elements. Of these chips mainly three versions exist:
- the laser programmed on wafer level. These chips can be looked at as invariant.
- the OTP versions (one time programmable). These chips are programmed sometimes before being put into the object to be identified.
- the read/write versions. These chips can, at least partially, be reprogrammed at any time.
- Fraud by copying the code of a specific transponder into an OTP transponder in order to obtain two identical transponders can occur and needs to be made impossible. One well known approach is to use a secret key and some cryptographic algorithm (symmetric or asymmetric) to generate a cyphrate out of a random number sent to the transponder as challenge. The cryphrate is sent back from the transponders to the reader.. Often the code of the transponder is also used as input to the cryptographic algorithm. Knowing algorithm and secret key (or public key in asymmetric systems) the reader can authenticate the transponder at any time. This method, however needs to make use of at least one secret key and therefore requires sophisticated key handling.
- This invention aims in providing security against copying without reaching the level of cryptography. This security is obtained by the characterising features of claim 1.
The advantage of this method is that it is not requiring complicated and error prone key handling and requires almost no computing power. The latter in contrast to cryptographic methods. Preferably, the method makes use of a chip serial number that makes the combination of the code and the chip serial number almost unique as long as the respective chip manufacturer never produces two identical serial numbers. By registering code and serial number on a certificate that holds the data of the object to be identified and is kept separate from the object a simple copy operation into readily available OTP transponders becomes impossible. - However, to make sure that attempting fraud using chips with programmable serial numbers is recognised, a database can be used either at identification set-up time when the code/serial number pair is stored into the database or at code read time. At both moments the databasecan be searched for double serial numbers and/or codes.
- To avoid the need for reading long serial numbers a checksum (e.g. CRC) can be generated from the serial number and used for the above mechanism instead of the serial number. This however may reduce security.
- To make the serial number even more specific, a chip manufacturer identification (ID) may also be associated to the chip and made part of the serial number using the above method.
- This identification of the manufacturer or the user of the chip may be a trademark such as the registered trademark RID of applicant.
- With every code read the respective time information, a geographic information etc. can be stored into the database to facilitate plausibility checks. Other and additional information may be stored in the memory of the transponder. A possible method is described below, whereby additional information mentioned therein may be omitted or replaced by other specific information.
- At die production time a unique die serial number and a die manufacturer identification (ID) are attributed to every die.
- At code programming time the code, the die serial number, and the die manufacturer-ID are combined into a consistency check number using a standardised method, e.g. a CRC scheme. The resulting number is programmed into the trailer bits and needs to be stored in the respective database, marked down in the animals passport, etc. for subsequent consistency check.
- At code read time the code, the die serial number, the die manufacturer-ID, and the trailer bits are read and the same method is applied to check consistency of all four numbers.
- Then comparing the trailer bits (i.e. the number stored therein) with the respective number in the database in the animals passport etc. the tag (transponder) can be authenticated.
- This method can prevent from copying transponders as long as no OTP dies are available that allow the programming of die serial number and die manufacturer-ID at code programming time.
- By storing of the respective information into a database with access limited to authorised personnel the copying of serial numbers can be detected.
Claims (13)
- A method for preventing or detecting fraud in an identification system wherein a transponder having a memory comprising an identifying code is associated with an object to be identified, such as a valuable animal, this transponder being activated by an interrogating signal for transmission of said code, the so received code being used through registration of the code along with object informations for identification of said object, characterised in that at least one additional information is memorized in said memory and registered, authentication of identification of said object being based onto the combination of said code and said additional information by comparison with said registered code and registered additional information.
- The method of claim 1, wherein said additional information is a representation of the manufacturers name or trademark.
- The method of claim 1 or 2, wherein said additional information is memorised during manufacture of the transponder chip as a unique chip serial number which cannot be altered by the programmer of the transponder code.
- The method of claim 3, comparing the registration at identification set-up time where the code and serial number are registeredfor double serial numbers to discover fraud by using chips which allow or enable programmable serial numbers.
- A method according to any one of claims 1-4, comprising integrating a die manufacturer ID into the serial number to avoid double serial numbers from different manufacturers.
- A method according to claim 3, comparing using a checksum-type number made out of the serial number to gain time in reading the shorter checksum instead of the serial number.
- A method according to claim 6, comprising using a checksum-type number made out of the serial number and a manufacturer identification (ID) to gain time in reading the shorter checksum instead of the serial number and manufacturer ID.
- A method according to claim 6 or 7, comprising storing the checksum-type number also into the transponder so that four different information are obtained: code, serial number, manufacturers ID, and checksum, reading all four information at authentication time allowing to check consistency.
- A method according to claim 7, wherein the checksum-type number is made out of the serial number, the manufacturer identification (ID), and the code in order to permit a consistency check over code, serial number, ID, and checksum-type number.
- A method according to claim 8 or 9, comprising additionally storing code and serial number in a database not accessible by fraudulent personnel.
- A method according to claim 10, comprising additionally storing manufacturer ID in a database not accessible by fraudulent personnel for checking for double serial numbers and double manufacturers ID in the database to detect copied die serial numbers and copied manufacturers ID.
- A method according to any one of claims 1-11, wherein said code and said additional information are registered in a database or in a certificate not accessible to non-authorised persons or in a computer database with write access only to authorized persons.
- A method according to claim 12, making use of time information, geographical information, information on the code-reading person or organisation and so on, gathered during code-read time and making plausibility checks possible in order to detect copies of transponders.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98810845A EP0982687A1 (en) | 1998-08-26 | 1998-08-26 | Method for preventing or detecting fraud in an identification system |
ES99810764T ES2175917T3 (en) | 1998-08-26 | 1999-08-25 | PROCEDURE TO AVOID OR DETECT FRAUDS IN AN IDENTIFICATION SYSTEM. |
DK99810764T DK0982688T3 (en) | 1998-08-26 | 1999-08-25 | Method of preventing or detecting fraud in an identification system |
AT99810764T ATE218231T1 (en) | 1998-08-26 | 1999-08-25 | METHOD FOR PREVENTING OR DETECTING FRAUD IN AN IDENTIFICATION SYSTEM |
EP99810764A EP0982688B1 (en) | 1998-08-26 | 1999-08-25 | Method for preventing or detecting fraud in an identification system |
DE69901589T DE69901589T2 (en) | 1998-08-26 | 1999-08-25 | Procedure for preventing or detecting fraud in an identification system |
HK00105382A HK1026287A1 (en) | 1998-08-26 | 2000-08-29 | Method for preventing or detecting fraud in an identification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98810845A EP0982687A1 (en) | 1998-08-26 | 1998-08-26 | Method for preventing or detecting fraud in an identification system |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0982687A1 true EP0982687A1 (en) | 2000-03-01 |
Family
ID=8236283
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP98810845A Withdrawn EP0982687A1 (en) | 1998-08-26 | 1998-08-26 | Method for preventing or detecting fraud in an identification system |
EP99810764A Expired - Lifetime EP0982688B1 (en) | 1998-08-26 | 1999-08-25 | Method for preventing or detecting fraud in an identification system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99810764A Expired - Lifetime EP0982688B1 (en) | 1998-08-26 | 1999-08-25 | Method for preventing or detecting fraud in an identification system |
Country Status (6)
Country | Link |
---|---|
EP (2) | EP0982687A1 (en) |
AT (1) | ATE218231T1 (en) |
DE (1) | DE69901589T2 (en) |
DK (1) | DK0982688T3 (en) |
ES (1) | ES2175917T3 (en) |
HK (1) | HK1026287A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115546949A (en) * | 2022-11-25 | 2022-12-30 | 深圳市亲邻科技有限公司 | Remote control access control method and system based on smart watch |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003524242A (en) * | 2000-02-04 | 2003-08-12 | スリーエム イノベイティブ プロパティズ カンパニー | How to authenticate tags |
US7383864B2 (en) | 2002-04-03 | 2008-06-10 | 3M Innovative Properties Company | Radio-frequency identification tag and tape applicator, radio-frequency identification tag applicator, and methods of applying radio-frequency identification tags |
ES2330935T3 (en) | 2003-11-19 | 2009-12-17 | Authentidate International Ag | PROCEDURE TO AUTHENTICATE AN OBJECT. |
FR2884945B1 (en) * | 2005-04-21 | 2007-09-07 | Agronomique Inst Nat Rech | DEVICE AND METHOD FOR SPATIAL AND TEMPORAL CENSUSING OF ANIMALS |
US20070205864A1 (en) | 2006-02-17 | 2007-09-06 | Datamars S.A. | Secure radio frequency identification system |
EP1901468B1 (en) | 2006-09-13 | 2012-10-17 | Siemens Aktiengesellschaft | Coding method for a contactless switching system |
JP6426160B2 (en) | 2013-06-05 | 2018-11-21 | エスエヌピーショット トラスティ— リミテッド | Improvements in tissue sampling and improvements related to tissue sampling |
US10842471B2 (en) | 2013-10-18 | 2020-11-24 | Snpshot Trustee Limited | Biopsy collector with identifier |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2293399A (en) | 1940-02-09 | 1942-08-18 | American Stove Co | Fastening device for walls of stove structures |
GB2164825A (en) * | 1984-09-19 | 1986-03-26 | Satellite Video Systems Ltd | Coded transponder for identification system |
US5028918A (en) * | 1989-12-18 | 1991-07-02 | Dairy Equipment Company | Identification transponder circuit |
US5166676A (en) * | 1984-02-15 | 1992-11-24 | Destron/Idi, Inc. | Identification system |
US5211129A (en) | 1986-02-25 | 1993-05-18 | Destron/Idi, Inc. | Syringe-implantable identification transponder |
EP0600556A1 (en) * | 1992-11-30 | 1994-06-08 | N.V. Nederlandsche Apparatenfabriek NEDAP | Identification system with improved identification algorithm |
EP0689150A2 (en) * | 1994-06-23 | 1995-12-27 | Alcatel Austria Aktiengesellschaft | Method and device for the identification of moving objects |
DE19703999A1 (en) * | 1997-02-04 | 1998-08-06 | Bosch Gmbh Robert | Method and device for assigning an authorization device to a base station |
-
1998
- 1998-08-26 EP EP98810845A patent/EP0982687A1/en not_active Withdrawn
-
1999
- 1999-08-25 DK DK99810764T patent/DK0982688T3/en active
- 1999-08-25 EP EP99810764A patent/EP0982688B1/en not_active Expired - Lifetime
- 1999-08-25 DE DE69901589T patent/DE69901589T2/en not_active Expired - Lifetime
- 1999-08-25 ES ES99810764T patent/ES2175917T3/en not_active Expired - Lifetime
- 1999-08-25 AT AT99810764T patent/ATE218231T1/en not_active IP Right Cessation
-
2000
- 2000-08-29 HK HK00105382A patent/HK1026287A1/en not_active IP Right Cessation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2293399A (en) | 1940-02-09 | 1942-08-18 | American Stove Co | Fastening device for walls of stove structures |
US5166676A (en) * | 1984-02-15 | 1992-11-24 | Destron/Idi, Inc. | Identification system |
GB2164825A (en) * | 1984-09-19 | 1986-03-26 | Satellite Video Systems Ltd | Coded transponder for identification system |
US5211129A (en) | 1986-02-25 | 1993-05-18 | Destron/Idi, Inc. | Syringe-implantable identification transponder |
US5028918A (en) * | 1989-12-18 | 1991-07-02 | Dairy Equipment Company | Identification transponder circuit |
EP0600556A1 (en) * | 1992-11-30 | 1994-06-08 | N.V. Nederlandsche Apparatenfabriek NEDAP | Identification system with improved identification algorithm |
EP0689150A2 (en) * | 1994-06-23 | 1995-12-27 | Alcatel Austria Aktiengesellschaft | Method and device for the identification of moving objects |
DE19703999A1 (en) * | 1997-02-04 | 1998-08-06 | Bosch Gmbh Robert | Method and device for assigning an authorization device to a base station |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115546949A (en) * | 2022-11-25 | 2022-12-30 | 深圳市亲邻科技有限公司 | Remote control access control method and system based on smart watch |
CN115546949B (en) * | 2022-11-25 | 2023-02-10 | 深圳市亲邻科技有限公司 | Remote control access control method and system based on smart watch |
Also Published As
Publication number | Publication date |
---|---|
ES2175917T3 (en) | 2002-11-16 |
HK1026287A1 (en) | 2000-12-08 |
EP0982688B1 (en) | 2002-05-29 |
DE69901589D1 (en) | 2002-07-04 |
ATE218231T1 (en) | 2002-06-15 |
DK0982688T3 (en) | 2002-07-15 |
DE69901589T2 (en) | 2002-12-19 |
EP0982688A1 (en) | 2000-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2006203515B2 (en) | Protection of Non-Promiscuous Data in an RFID Transponder | |
AU2006203517B2 (en) | Using Promiscuous and Non-Promiscuous Data to Verify Card and Reader Identity | |
RU2224288C2 (en) | Intercept-protected memory device | |
US6933848B1 (en) | System and method for disabling data on radio frequency identification tags | |
US20080246583A1 (en) | Access Control System | |
CN102375941B (en) | Method and system for validating chip validity by utilizing graphical chip | |
WO1991017612A1 (en) | Method and means to limit access to computer systems | |
US20090040023A1 (en) | RF Transponder for Off-Line Authentication of a Source of a Product Carrying the Transponder | |
AU2003285786A1 (en) | System and method for automatic verification of the holder of an authorisation document | |
EP0982688B1 (en) | Method for preventing or detecting fraud in an identification system | |
KR19980042759A (en) | IC card and personal data identification system that works with it | |
US20150022314A1 (en) | Method for authenticating an rfid tag | |
US20060218648A1 (en) | Apparatus and method for ownership verification | |
GB2446912A (en) | Access control having antipassback | |
JP2008233975A (en) | Information communicating device, information collectively managing device, and information processing system | |
WO2004086290A1 (en) | Authentication of radio frequency transponders | |
JPS62251945A (en) | System for preventing illegal access of ic card | |
US20120223809A1 (en) | Transponder, method and reader for monitoring access to application data in the transponder | |
JP2003263615A (en) | Ic card | |
KR100537388B1 (en) | Method for certificating multi-proximity card of door-lock | |
AU2022314153A1 (en) | Method for authenticating and/or validating the identity of an object | |
KR100436234B1 (en) | The prevention method of program's illegal reproduction and the apparatus for thereof | |
JPH02213972A (en) | Illegal use preventing method for computer | |
JPH02105285A (en) | Non-touch type ic card system | |
JPH06243301A (en) | Information processor using data carrier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
AKX | Designation fees paid | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20000902 |