POST QR guru

Now, to be fair, some delegates at the 2016 cryptocurrency conference Consensus were sceptical when I shared my preferred strategy for securing my digital dosh, which was to convert the security key into a QR code and have it tattooed onto my scrotum. You could see them questioning my grasp of the relevant risk models and questioning my confidence in the technology. I was not dismayed by their negative reaction. In fact, I had suggested this approach to managing privates keys (sic) before and had toyed with the idea of patenting this breakthrough in cyber defence but sadly never got round to it. Now I am kicking myself about it, because I was delighted to read in the New York Times that numerous people of an innovative bent have indeed had QR code tattoos and… guess what, they work.

Well then… RFID chip implants or QR code tattoos? What is the right choice for the discerning cryptocurrency manager on the go? In truth I am somewhat conservative, so I am still using my Bitbox USB hardware wallet but perhaps I should be more happening and down with the kids on this one. So, let’s look at the pluses and minuses.

Plus and Minus

On the plus side, can be read passively and at a distance, can generate digital signatures and can store a reasonable amount of data. On the minus side, if you are kidnapped by a Mexican drug cartel they will cut it out of you and send it as proof of capture to your nearest and dearest along with a Bitcoin random demand.

On the plus side, everyone uses QR codes. I mean everyone uses QR codes in the UK (and the USA) now, whereas in the old days it was everyone in China. There are two reasons for this: COVID-19 and Apple. A couple of years ago, Apple changed the iPhone software so that you could scan QR codes with your iPhone camera and not have to run a separate app. At a stroke, gazillions of people gained the ability to automagically enagage in contact-free transactions, while shortly afterwards along came the pandemic and the demand for contact-free transactions for everything, not only shopping. It’s not all down to Apple, of course. The cameras in mobile phones have improved across the board so that QR codes can be scanned clearly from a safe distance so that consumers can stand a couple of metres away from the point of sale and buy without using cash. On the minus side, QR codes are insecure and easy to copy. This means that they are a security problem and the pandemic has indeed presaged a variety of scams.

One place where I’ve been very interested to see the emerging dynamics is retail point of sale. A few years ago, I was of the general opinion that QR code for payments would fade away because tapping with cards or phones was quicker and more secure. But one retailer after another began to start using QR instead of NFC, partly because they didn’t want consumers to have to understand how to turn on and use NFC in smartphones and partly because Apple wouldn’t let them access payment interfaces in iPhones anyway. When the biggest retailers decided to go QR instead of contactless, you could see which way the wind was blowing. Walmart, to take the obvious example, introduced QR into Walmart Pay. Instead of selecting Walmart Pay at checkout, customers can now scan a QR code and Walmart Pay is connected so that customers can pay contact-free.

xxx

 

Much of the restaurant industry’s investments in in-store tech have gone toward contactless payment solutions through QR codes or tableside ordering technology to minimize customer contact with restaurant workers

 

From How restaurants are bringing tech to the table in 2021 | Restaurant Dive:

 

xxx

When you’re able to match service levels with demand through self-service technology… we see customer satisfaction going up, we see average order size going up and we see labor costs going down

Check In

In strategic terms, my strawman assumption going back five years was that retailers were going to get rid of payments at POS and shift to payments inside their own apps, apps that they use to deliver better customer services. Or, in the bumper-sticker version, “we’re going from check-out to check-in”. This is where the supermarket chains went in the UK, where Tesco became “the latest grocer to develop its own technology to bypass the costly Android and Apple systems” and Sainsbury’s was trialling its SmartShop app which allows users to create their own shopping lists, navigate stores and make payments at dedicated kiosks. In the UK, Tesco has just announced that their mobile payment app Pay+ has now taken its first billion in payments.

As with other retailers, one of the attractions for customers is that the app combines payments, loyalty and spend tracking in one and a simple quick QR code completes transactions. I’m sure this combination (and, if I remember correctly, prescriptions) is what attracts consumers to using the CVS app, where shoppers will be able to scan a QR code on their phones to pay using stored debit or credit cards, bank accounts, PayPal balance, PayPal Credit, Venmo balance or Venmo Rewards.

On my phone now I have Shell app and a BP app that combine payments with loyalty. My Waitrose app doesn’t, so I don’t use it (my Waitrose loyalty card is in my Apple Pay wallet). How many apps will I end up with! Well, not that many. I remember a Comscore survey that found that 55% of American consumers would be happy to have four or more retailer apps on their phone. Now, I don’t remember the figures exactly, and a quick search on my laptop can’t find them, but I remember something I looked at for a UK client a around that same time where it turned out that something like 90% of household disposable income in the UK goes to five retailers per household. In my house, for example, a Waitrose app, the BP app, a Martins’ newsagent app, a Boots app and my Tesco app pretty much take care of things.

In the in-app vision of the future, consumers wouldn’t have hundreds of apps for every retailer. For the retailers they visit frequently (e.g., Starbucks) they will have the retailer app and use it. In other cases they will just use some third-party payment app (e.g., their bank) or a convenient wearable like a bracelet or key fob. This focus on what I started to call app-and-pay instead was hardly new and was an obvious strategic focus long before Tim Cook stood up on stage to explains “the benefits of Apple Pay in apps” so I was hardly reading the tea leaves by saying that tapping and paying with mobile phones may not, in the great scheme of things, be that important because, online and offline will converge to app-and-pay not tap-and-pay.

But there’s one more change coming that will really impact the retail experience. When I use a retailer app at check out, it is super convenient and quick. But what would be much better is using the app to check in as well. If I scanned my Tesco app at the door on the way in, to instantly pull up my Tesco app, then they could deliver me a much more personalised and focused shopping experience: it doesn’t help me or Tesco that they don’t find out until I leave. There’s a whole range of fintech opportunities coming up to transform the check in, not the check out.

Tesco Pay+ App Surpassed £1 Billion in Payments in 2020 | The Fintech Times

xxx

Tesco has revealed that Pay+, the free mobile payment app operated by Tesco Bank, surpassed a total of £1 billion in payments shortly before Christmas 2020. The contactless payment app aims to make shopping in Tesco stores more convenient and rewarding for customers when paying with their smartphone.

Since it launched nationwide in 2017, the Pay+ app has been enhanced to allow Tesco shoppers to make payments, collect Clubcard points and track spending in any UK Tesco store or petrol station with a single scan of their phone, improving customer checkout experience when shopping at Tesco.

From Tesco Pay+ App Surpassed £1 Billion in Payments in 2020 | The Fintech Times:

xxx

Consensus 2016 Panelists Debate Blockchain’s Business Impact – CoinDesk

xxx

This humorous panel kicked off with talk about the possibility of protecting ones private key for accessing encrypted data by converting it to a QR and and tattooing it on a very private body part.

The moderator, David Birch of Consult Hyperion, was presumably being hyperbolic (though he provided no proof), but his point was well taken: protecting one’s identity can result in some extreme precautions.

From Consensus 2016 Panelists Debate Blockchain’s Business Impact – CoinDesk:

xxx

Fresh Dutch Blockchain Conference | by Henk van Cann | Happy Blockchains | Medium

xxx

After I read his book, I heard Birch speak at Consensus2016, a blockchain conference like #dbc16. He referred to a New York meeting (which took place at the beginning of May 2016) of blockchain experts because ‘within 10 minutes, every blockchain discussion boils down to e-Identity issues’. But I remember him involving his scrotum too:-).

From Fresh Dutch Blockchain Conference | by Henk van Cann | Happy Blockchains | Medium:

xxx

WEF: China says digital yuan doesn’t aim to challenge dollar – Ledger Insights – enterprise blockchain

xxx

Today at the virtual World Economic Forum, leading Chinese economist Zhu Min, Chairman of China’s National Institute of Financial Research at Tsinghua University, former Deputy Managing Director at the IMF and former Deputy Governor at the People’s Bank of China, said he believes that the central bank digital currency (CBDC) will be used across borders, driven by market forces. These include trade flows, cross border payments, and currency exchange.

On the same panel, Singapore Senior Minister Tharman Shanmugaratnam talked about the current risks of dollarization for some emerging economies and digital currencies will exacerbate those risks. He spoke about the need for publicly provided digital identities, like India’s Aadhaar.

From WEF: China says digital yuan doesn’t aim to challenge dollar – Ledger Insights – enterprise blockchain:

xxx

Davos 2021: Silver Lake co-founder dismisses belief about Bitcoin’s use for criminal activity

Speaking at this year’s virtual Davos, Glenn Hutchin (co-founder of global technology investment firm, Silver Lake) said that Bitcoin is not the best choice for criminals and that “a drug dealer, for example, would not want to have to speculate on the price of bitcoin while selling his wares”.

Davos 2021: Silver Lake co-founder dismisses belief about Bitcoin’s use for criminal activity

xxx

Glenn Hutchins, co-founder of global technology investment firm, Silver Lake, dismisses the long-held belief that bitcoin’s primary use is for criminal activity.

Hutchins explains how this assumption ignores the immutable nature of the blockchain technology on which bitcoin is built.

“In the US, 80-90% of $100 dollar bills are used for organised crime and tax evasion and there’s a very good reason for that – they’re untraceable and fungible,”

From Davos 2021: Silver Lake co-founder dismisses belief about Bitcoin’s use for criminal activity.

Well, he’s obviously correct about the cryptocurrency because the primary use of Bitcoin is speculation with criminal activity running a long way behind. But what about the other claim? Is it true that almost all the Benjamins are used for nefarious purposes? It is certainly true that the “cash gap” (the amount of cash in circulation less the amount of cash used in transactions) in the USA is huge, but I can’t find any figures from the Treasury or the Fed to confirm or deny the 90% claim. However… the British Parliament has just asked the Bank of England to explain why three-quarters of the cash in circulation is missing and a couple of years ago the Bundesbank said that nine in ten of their banknotes are never used in retail transactions.

You read that right. Nine in ten banknotes are never used to buy things from shops. Not infrequently, not rarely, but never. It is very clear that the primary use of the cash in modern economies is to subsidise criminal activity.

Frontiers | Blockchain Applications and Institutional Trust | Blockchain

xxx

The possibility of such a trust dynamic shows that the current discourse of Blockchain replacing trust by means of technology, is too simplistic. At best it will replace some forms of trust by other forms of trust

From Frontiers | Blockchain Applications and Institutional Trust | Blockchain.

xxx

POST Luxury and ledgers

xxx

However, blockchain technology offers a solution to this challenge. Blockchain – in combination with technologies like Near-Field Communications (NFC) and Internet of Things (IoT) – provides an indisputable record of the truth that is uniquely capable of showing Millennial consumers that the goods they buy benefit everyone involved in their production.

From Can blockchain help legacy fashion brands win over Millennial and Gen Z consumers? | Luxury Adviser.

xxx

Customers will have access to the lifetime history of a product – including when and where it was designed, from where the raw materials were sourced and whether it has been previously owned – before they make a purchase.

xxx

 

By fitting garments with NFC tags and using blockchain to seamlessly record all activities related to those garments on an immutable ledger, fashion brands will be able to build a secure and permanent record of each clothing item.

 

From Can blockchain help legacy fashion brands win over Millennial and Gen Z consumers? | Luxury Adviser.

 

xxx

 

xxx

 

Some two-thirds of consumers worldwide say they would switch, avoid, or boycott brands based on their stance on controversial issues.

 

From The influence of Gen Z on fashion | McKinsey.

 

xxx

For planning purposes, then, we can assume that a few years from now all items will have EPCs
on them and anyone will be able to read those EPCs. If I see a Gucci handbag on sale in a shop,
I will be able to point my Bluetooth EPC-reading pen at it1 and read the EPC. My mobile phone
can then tell me that the handbag is Gucci product 999, serial number 888. This information is,
by itself, of little use to me. I could go onto the Gucci-lovers web site and find out that product
999 is a particular kind of handbag, but nothing more: yet I need to know more to make a
decision about whether to buy the bag or not. I may know that the tag is “valid”, but that
doesn’t tell much about the bag. For that, I need more data.

The EPC network architecture defines the infrastructure for finding that data. Organisations that
read EPCs (eg, a retail chain) will have networks of servers that collect the tag data and turn it
into meangingful information2. These servers (called “savants”) can then use this information to
query corporate databases: these databases can then query other databases. There’s an XML
schema, known as “physical markup language” (PML) that they can use to talk to each other.

If I wanted to know if the handbag is real or fake, then I need to have access to its provenance
(known by that savant network) as well as its product details. The provenance may be
distributed quite widely across the network. The retailer’s database knows which distributor the
bag came from, the distributor’s database knows which factory the bag came from and Gucci’s

1 These are already on sale.
2 They actually turn it into a pointer to meaningful information but it’s logically the same thing.

mkt.046/50/1
© Hyperion Systems Limited (2004) Page 3 of 5 (28/10/04)
RFID Product and Brand Protection
by Dave Birch

database should know all of this. I need access to this data to get the data I need to decide
whether the bad is real or fake.

All well and good, but why would the retailer, the distributor or Gucci tell me? How do they
know whether I am a retailer, one of their best customers, one of their own “brand police”, a
counterfeiter (who would love to know which tags are in which shops and so on) or a law
enforcement officer with a warrant?

The technology to solve that problem already exists: smart cards and digital signatures. A Gucci
brand policeman might have a Bluetooth pen tag reader connected to a PDA with a smart card
and a GPRS connection. They could then point the pen at a bag and fire off a query: the query
would have a digital signature attached (from the smart card) and the Gucci savant could check
that signature before processing the query. Gucci could then send a digitally-signed and
encrypted query to the distributor’s savant which would then send back a digitally-signed and
encrypted response to be passed back to the brand policeman: “no we’ve never heard of this
bag” or “we shipped this bag to retailer X on this date” or “we’ve just been queried on this bag
in Australia” or something similar.

The central security issue for brand protection is therefore the protection of (and access to) the
provenance data. It is this area that demands industry attention. The foundation of the “privacy
settlement” between government, business and the public must be open: every stakeholder must
understand how, why and when savants will be allowed to answer queries and under what
circumstances they will send a result (and who they will tell they sent the result to, for later
auditing).

Looking Forward

The purpose of this article is not to reiterate the widely-expressed concerns about security and
privacy in the EPC world, but to point out that if the world of product and brand security is to
capitalise on the worldwide deployment of EPC it will have to tackle these issues in an open way
to find a privacy settlement that works. Many of the questions that need to be answered to reach
this settlement are not much to do with technology and almost nothing to do with tags. Should
customers have the right of access to the provenance of their purchases? Should retailers have
access only to the provenance of the finished product they are selling or all of its components?
Should there be one tag or many? This last question is important. Since EPCs are not (in
themselves) secure, the future may see the use of multiple tags. One could envisage high-value
or controlled goods having both a simple EPC tag for tracing (linked to savants) and a
microprocessor tag (perhaps even one that can remember where it’s been, what the temperature
was and so forth) linked to private databases.

Finally, it is important to note that the primary purpose of EPCs is not and has never been brand
protection and they are not the “silver bullet” for brand protection that companies such as
Procter & Gamble are looking for [11]. Having said that, there is no doubt that brand protection
can be significantly enhanced by exploiting EPCs stored in RFID chips in the right way and that
organisations should begin developing their strategy for that exploitation.

 

While flicking through British Vogue magazine for some moisturising tips, I came across a mention of digital identity! I was surprised and delighted that (just as has happened another of my obsessions, Dungeons and Dragons) what was once the province of nerds and outsiders has become fashionable and cool. Hurrah! Vogue says that secure digital identities for luxury goods are crucial, which is great! I could not agree more. Digital identities are not only for people! I have been writing about the need for digital identities for things for many years, and not only for high fashion (a field where, oddly, I have some experience in the use of NFC applications. On mobile phones to scan designer clothes – but that’s another story).

 

 

#IDIoT

Some years ago I asked if “the blockchain” (put to one side what this might mean for a moment) might be a way to tackle the issue of “ID for the Internet of Things” (#IDIoT). I said at the the time that I had a suspicion that despite some of the nonsense going on, there might be something there. My reason for thinking that is that there is a relationship between blockchain technology and IoT technology, because we need a means to ensure that virtual representations of things in the mundane cannot be duplicated in the virtual. As I saw it, there were three ways to do this: a database, tamper-resistant hardware or some form of shared ledger (which would in practice be unlikely to be a public blockchain, but that’s not important to the discussion).

If we look at the database idea first, I explored this more than a decade ago using the example of luxury goods such as watches and asking how would you tell a fake Rolex from a real one. You might say just put a hologram in it, or a chip that can’t be forged or something. And these might be good starting points but it’s a much more complicated problem than it seems at first. For example: why would Rolex care? I can’t afford a Rolex, so if I buy one at a car boot sale or in China, Rolex isn’t losing a sale. But by wearing the fake, I’m presumably advertising the desirability of a Rolex. So surely they should be happy that people want to wear fakes? And if I did have a real Rolex, would I want to wear it in dangerous places where expensive watches get stolen in broad daylight by muggers (eg, London) or where I might just lose it?

Anyway, regardless of the reasons for it, let’s think about how to tell the real thing from the fake thing using new technology. Suppose RFID is used to implement some kinds of Electronic Product Codes (EPCs) for luxury goods. If I see a Gucci handbag on sale in a shop, I will be able to wave my mobile phone over it and read the EPC. My mobile phone can decode the number and then tell me that the handbag is Gucci product 999, serial number 888. This information is, by itself, of little use to me. I could go onto the Gucci-lovers website and find out that product 999 is a particular kind of handbag, but nothing more: I may know that the EPC label is ‘valid’, but that doesn’t tell much about the bag. For all I know, a bunch tags might have been taken off of real products and attached to fake products.

To know if something is real or not, I need more data. If I wanted to know if the handbag were real or fake, then I would need to obtain its provenance as well as its product details. The provenance might be distributed quite widely. The retailer’s database would know from which distributor the bag came; the distributor’s database would know from which factory the bag came and Gucci’s database should know all of this. I would need access to these data to get the data I would need to decide whether the bag is real or fake.

This is a critical point. The key to all of this is not the product itself but the provenance. A database of provenance (for example) is the core of a system to tell real from fake at scale.

Who should control this database, and who should have access to it, is rather complicated. Even if I could read some identifier from the product, why would the retailer, the distributor or Gucci tell me any about the provenance? How would they know whether I were a retailer, one of their best customers, one of their own ‘brand police’, a counterfeiter (who would love to know which tags are in which shops and so on) or a law enforcement officer with a warrant?

This is where the need for a digital identity comes into the picture. A Gucci brand policeman might wave their phone over a bag and fire off a query: the query would have a digital signature attached (from the SIM or SE) and the Gucci savant could check that signature before processing the query. Gucci could then send a digitally signed and encrypted query to the distributor’s savant which would then send back a digitally signed and encrypted response to be passed back to the brand policeman: ‘No we’ve never heard of this bag’ or ‘We shipped this bag to retailer X on this date’ or ‘We’ve just been queried on this bag in Australia’ or something similar.

The central security issue for brand protection is therefore the protection of (and access to) the provenance data, and this needs a digital identity infrastructure to work properly. If it adds £20 to the price of a Rolex to implement this infrastructure, so what? The kind of people who pay £5,000 for a Rolex wouldn’t hesitate to pay £5,020 for a Rolex that can prove that it is real.

A small brand premium might be rather popular with people who like brands. Imagine the horror of being the host of a dinner party when one of the guests glances at their phone and says “you know those jeans aren’t real Gucci, don’t you?”. Wouldn’t you pay £20 for the satisfaction of knowing that your snooping guest’s app is steadfastly attesting to all concerned that your Marlboro, Paracetamol and Police sunglasses are all real? Of course you would.

#Tag

For some goods, we might want to add tamper resistant hardware to the product. If the EPC is stored in a tamper-resistant chip, a tag, then it can be read using the NFC interface in my iPhone or Android device to interrogate the tag through its RFID (ie, contactless) interface.

I have long been interested in the use of low-cost RFID chips in this context. An example I looked at some years ago was the problem in Korea with the production of counterfeit whiskey. The authentic whiskey producers decided to add an RFID chip to the bottle caps. This chip was coded with a URL and an identifier. When a customer, or a shopkeeper, or a policeman, or in fact anyone else wants to check whether the whiskey is real or not, they touch the cap with their phone and the URL launches a web site that knows the provenance of the identifier and can tell you when and where it was bottled as well as some other information. When a customer opens the bottle, the tag is broken and can no longer be read. That seems to be a cost-effective solution, although it again relies on the provenance database to make it work (otherwise the counterfeiters would just find a way steal the chips).

The mass market IoT, however, amplifier that problem of permission. I have always tried to illustrate this for people in a fun way by using the case study of underwear. It’s one thing for dinner guests to scan my wine bottle to see that it is a real Romanée-Conti and another for them to scan my Rolex to check that it is indeed a first-class far-eastern knock-off, but it’s quite another for them to be able scan my underpants and determine that they date from 1983. How do we turn tags on and off? How do we grant and revoke privileges? How do we allow or deny requests for product or provenance? Once again, we must conclude that not simply digital identity but a full digital infrastructure is needed.

The third approach that I thought worth exploring was that of some form of blockchain. It seemed to me that by using the blockchain to maintain uniqueness, we might find a way to make the IoT a transactional environment. Just as you can’t copy the physical object, but you can transfer it from one owner to another, so you can’t copy a token on a shared ledger, only transfer it from one owner to another. Thus, if you can bind a token to a physical object, you can greatly reduce the cost of managing that object. Hence I was rather interested to read in that Vogue article that Luis Vuitton, Microsoft and Consensus have developed a platform called “Aura” to manage provenance to provide proof of origin and prevent counterfeits using a blockchain. The basic idea is to represent luxury goods as ERC-721 tokens on a private permissioned Quorum blockchain.

Obviously, I don’t have any details about how this will actually work, but LVMH seem to imply that at the time of purchase of one of their brands’ product, the customer can use the brand’s application to receive an “AURA certificate” containing all product information. I assume that if you sell your handbag (or whatever) to a charity shop, you can transfer the certificate to the charity shop’s application. Underlying all of this, there is the token on the blockchain moving from the retailer’s wallet, to your wallet, to the charity shop wallet.

If this works, and it’s simple and convenient for consumers, some sort of app presumably, it will generate an amazing amount of valuable data for brand owners. They will know exactly who has their stuff and how much of it they’ve got. If the app records “fails” as well, then they’ll also know who has the knock-offs too.

 

[Dave Birch] How would you tell a fake Rolex from a real one? I have no idea, since it’s not a position I ever expect to be in. It doesn’t really matter to me, but it clearly does matter to some people. One such group might be people buying Rolex’s on eBay. Fortunately, a German court has come to their aid by demanding that eBay tell real Rolex watches from fakes. Now, it’s clearly a problem to luxury brands that people are selling bent copies on eBay (although, frankly, if someone is flogging a Rolex for £50, you’d think the buyer would know what they are getting). The brands try to sue eBay rather than the actual seller because… actually, I don’t know why but I’m not a lawyer. Anyway a German court has agreed with the brands. Lawyers, eh? I agree with Techdirt: I don’t understand why this is a problem of the market. As they point out, you’ve been able to buy fake Rolexes on the streets of New York City, but Rolex doesn’t sue the New York City government for letting this happen. It recognizes that most people know that the Rolex you buy from a street vendor probably isn’t real and has introduced programs to designate legitimate Rolexes on eBay already — so this seems like the type of “problem” that could work itself out without making eBay liable, but apparently it’s too late for that. But I’m not sure why they care: I can’t afford a Rolex, so if I buy one at a car boot sale or in China, Rolex isn’t losing a sale. But by wearing the fake, I’m presumably advertising the desirability of a Rolex.
 

Technorati Tags: identity

 

There’s a problem in Korea with the production of counterfeit whiskey, so the legitimate whiskey producers have an application in the Korea Telecom service. When the whiskey is bottled, the caps have an RFID tag added to them. This is coded with a URL and an identifier. When a customer, or a shopkeeper, or a policeman, or in fact anyone else wants to check whether the whiskey is real or not, they touch the cap with their phone and the URL launches a web site that knows the provenance of the identifier and can tell you when and where it was bottled as well as some other information. When the customer opens the bottle, the tag is broken and can no longer be read. 

Suppose RFID is used to implement Electronic Product Codes (EPCs) for luxury goods. If I see a Gucci handbag on sale in a shop, I will be able to point my Bluetooth EPC-reading pen (these already exist) at it and read the EPC, which is just a number. My mobile phone can decode the number and then tell me that the handbag is Gucci product 999, serial number 888. This information is, by itself, of little use to me. I could go onto the Gucci-lovers website and find out that product 999 is a particular kind of handbag, but nothing more: I may know that the tag is ‘valid’, but that doesn’t tell much about the bag. For that, I need more data. If I wanted to know if the handbag were real or fake, then I would need to obtain its provenance as well as its product details. The provenance might be distributed quite widely. The retailer’s database would know from which distributor the bag came; the distributor’s database would know from which factory the bag came and Gucci’s database should know all of this. I would need access to these data to get the data I would need to decide whether the bag is real or fake.

But why would the retailer, the distributor or Gucci tell me? How would they know whether I were a retailer, one of their best customers, one of their own ‘brand police’, a counterfeiter (who would love to know which tags are in which shops and so on) or a law enforcement officer with a warrant? This is where digital identity comes into the picture. A Gucci brand policeman might have a Bluetooth pen tag reader connected to a mobile. They could then point the pen at a bag and fire off a query: the query would have a digital signature attached (from the SIM) and the Gucci savant could check that signature before processing the query. Gucci could then send a digitally signed and encrypted query to the distributor’s savant which would then send back a digitally signed and encrypted response to be passed back to the brand policeman: ‘No we’ve never heard of this bag’ or ‘We shipped this bag to retailer X on this date’ or ‘We’ve just been queried on this bag in Australia’ or something similar. The central security issue for brand protection is therefore the protection of (and access to) the provenance data, and this needs a digital identity infrastructure to work properly.

If it adds £20 to the price of a Rolex to implement this infrastructure, so what? The kind of people who pay £5,000 for a Rolex wouldn’t hesitate to pay £5,020 for a Rolex that can prove that it is real. Imagine the horror of being the host of a dinner party when one of the guests glances at their phone and says “you know those jeans aren’t real Gucci, don’t you?”. Wouldn’t you pay £20 for the satisfaction of knowing that your snooping guest’s Bluetooth pen is steadfastly attesting to all concerned that your Marlboro, Paracetamol and Police sunglasses are all real.

 

So if you’re at a boring party and you’re wondering whether the hostesses dress is a real Chanel or a knock-off, you can find out from across the room. Or if you want to snoop around a neighbour’s house but can’t actually be bothered to go into other rooms, it’s ideal. But, as I pointed out some time ago,

Suppose RFID is used to implement Electronic Product Codes (EPCs) for luxury goods. If I see a Gucci handbag on sale in a shop, I will be able to point my Bluetooth EPC-reading pen (these already exist) at it and read the EPC, which is just a number. My mobile phone can decode the number and then tell me that the handbag is Gucci product 999, serial number 888. This information is, by itself, of little use to me

[From Digital Identity: The Rolex premium] 
Indeed. There has to be a database to establish provenance, and it is that database that is at the core of the Korea Telecom business model.

consumer, privacy, rfid
 

The counterfeiters will inevitably shift their attention to attacking the database. If I were a counterfeiter, I’d put chips in my whiskey that linked to a URL that displayed something that looks like the official Korea Telecom page but says “Sorry, the service is currently down, please try again later” or perhaps even “Sorry, the service is down, please call this number for more information” followed by the number for a reverse-charge premium-rate call to Surinam at $199 per minute. Just as with smart posters and so on, unless the chip carries a digital signature, you don’t know whether the URL is real or not, so nothing it directs you to can be trusted. There’s no need for a URL here: just have the chip store a digitally-signed identifier and let the “provenance infrastructure” do the rest. Better still, have the chip store a digitally-signed and encrypted identifier so that only the database owner can decrypt it, ensuring that all provenance request have to go through them.

Without an infrastructure that includes end-to-end digital signatures there’s no way round this. The phone needs to know the chip is authentic. The database needs to know who is asking, and the consumer needs to know who is answering.

 

xxx

The possibility of such a trust dynamic shows that the current discourse of Blockchain replacing trust by means of technology, is too simplistic. At best it will replace some forms of trust by other forms of trust

From Frontiers | Blockchain Applications and Institutional Trust | Blockchain.

xxx

Design a site like this with WordPress.com
Get started