Secure Protocols for Serverless Remote Product Authentication
Abstract
Industrial companies lose large sums of money because of coun- terfeits and they need to eciently protect their trademarks. Most of them implement their own anti-counterfeiting policy to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and au- thenticate genuine products. Instead of using markers and additional identication means, one of the recent methods use a PUF-like au- thentication method based on image processing. However, in order to authenticate the object (e.g. a trademark product), the method needs direct access to the database system containing the object's \nger- print" . The paper presents a new secure method to remotely authen- ticate the object without communication with the database server. In this method, an autonomous and secure embedded system called authentier authenticates the product by extracting its morphomet- ric ngerprint and comparing it with a signed original morphometric ngerprint printed on the object. However, we show that in order to secure the protocol, the authentication hardware needs to be au- thenticated, too. For this reason, we propose security protocols that allow to authenticate the verier and to remotely check its integrity. The proposed security protocols are shown to be sure using formal methods of security protocol evaluation.