Design and Realization of Anti-counterfeit System Based on RFID
|School||Sun Yat-sen University|
|Keywords||Anti-counterfeiting RFID encryption and decryption digital signature|
The main research content of this paper is to design a security system based on thescience and technology projects in Zhuhai "non-contact IC card anti-counterfeitingplatform application system",RFID and public-key cryptosystemon on the pc.Theanti-counterfeiting system is using electronic tags to host commodity securityinformation.we design the software on a PC to read、write and verify the informationin the electronic tags,so as to achieve the purpose of anti-counterfeiting. The systemconsists of two parts,the monitor subsystem and manufacturers subsystem. Themonitor subsystem is responsible for writing into the monitoring information into theElectronic tags and managing it.The manufacturers subsystem is responsible forwriting into the manufacturers information into the Electronic tags and managing it.The monitor and manufacturers both manage the security information.so it is toodifficult to crack or break.The main work includes the following aspects:1.The deployment architecture of the whole system has been adjusted, use theMySQL database to store data, so that the system can be networked to run, monitorsubsystem and manufacturers subsystem can be deployed in different places of thenetwork, Upgrading the original stand-alone model to a distributed system.2.Offline verification program is designed based on previously onlineverification,in the case of offline user can also use the offline verification function toverify the authenticity of products provided by the system.3.A simplified key management scheme is proposed and designed, the program isinspired by CPK public-key cryptosystem. CPK public-key cryptosystem use key factor to generate a key. So if We use the monitor instead of CA, key factor insteadof digital certificate then the monitor only needs to mamage the key factor of themanufacturer unifiedly,then we can not only manage the keys unifiedly but also canreduce the cost of key management.