CN103106421A - Electronic tag encryption method and charge management system based on 18000-6C standard - Google Patents

Electronic tag encryption method and charge management system based on 18000-6C standard Download PDF

Info

Publication number
CN103106421A
CN103106421A CN2013100206419A CN201310020641A CN103106421A CN 103106421 A CN103106421 A CN 103106421A CN 2013100206419 A CN2013100206419 A CN 2013100206419A CN 201310020641 A CN201310020641 A CN 201310020641A CN 103106421 A CN103106421 A CN 103106421A
Authority
CN
China
Prior art keywords
label
module
data
key
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100206419A
Other languages
Chinese (zh)
Other versions
CN103106421B (en
Inventor
于征
于用真
刘鹏
魏聪
林剑锋
余光泽
吴福森
王利红
孙彬坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Road & Bridge Information Engineering Co Ltd
Original Assignee
Xiamen Road & Bridge Information Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Road & Bridge Information Engineering Co Ltd filed Critical Xiamen Road & Bridge Information Engineering Co Ltd
Priority to CN201310020641.9A priority Critical patent/CN103106421B/en
Publication of CN103106421A publication Critical patent/CN103106421A/en
Application granted granted Critical
Publication of CN103106421B publication Critical patent/CN103106421B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an electronic tag encryption method and a charge management system based on an 18000-6C standard. The method comprises that an electronic tag storage space is divided into a public data area and a private data area, a group of data is randomly generated by a supervisory computer and is read in the public data area, the data in the electronic tag public data area is read, a tag secret key is generated by a secret key calculation module and is used as a switching secret key of an electronic tag public mode and an electronic tag private mode, then the tag secret key and user data are written in the private data area, and a storage area where the tag secret key is in is arranged to be in a permanent locking state so that the fact that an access secret key can not be read is guaranteed. Due to the fact that the secret key calculation module does not exist in an unauthorized reader and the data and the tag secret key have irreversible and non-learning performance of a function, and therefore the unauthorized reader can not learn the user data in the private data area, and an effect of protecting rights and interests of a tag publisher is achieved.

Description

Electronic tag encryption method and charging administration system based on the 18000-6C standard
Technical field
The present invention relates to the field of encryption of vehicle carried electronic label, relate in particular a kind of electronic tag encryption method and charging administration system based on the 18000-6C standard, it is applied to city vehicle carried electronic label read operation and information security encipherment protection.
Background technology
At present, domesticly all issued as cities such as Chongqing, Nanjing, Shantou the charge that the passive ultra-high frequency vehicle carried electronic label is used for main thoroughfare, city and bayonet socket, due to reader and the general protocol and standard of label employing of present passive ultrahigh frequency electronic tag radio-frequency recognition system, can access therefore follow identical standard reader the label of following identical standard.
Simultaneously, power supply due to passive ultrahigh frequency electronic tag, all to be realized at the distance transmission uhf electromagnetic wave by reader, its output power is low, therefore can not use complicated identifying procedure and algorithm on electronic tag, what the data on therefore existing electronic tag all can't the outer reader of shielding harness reads.
Such as Nanjing and Shantou; the electronic tag that is respectively 18000-6C and 6B standard that it adopts; its unique ID to electronic tag is not encrypted protection; although and Chongqing is by the data of the front 96bit of TID of customization 18000-6C standard A LIEN-H3 chip; but the readable data of actual H3 chip TID is 192bit altogether, and then the data of 96bit unique ID of can be used as label identifies.
Therefore, the passive ultra-high frequency vehicle carried electronic label of domestic city distribution at present all can be by unique ID of unauthorized reader reading tag, thereby the application of binding by unique ID and the vehicle of label aspects such as realizing gate inhibition, charge, security protection again causes certain infringement to label publisher's rights and interests.
Summary of the invention
The object of the present invention is to provide a kind of electronic tag encryption method based on the 18000-6C standard, to avoid unauthorized reader that unique ID of electronic tag is read and damage the problem of label publisher rights and interests.
In order to reach above-mentioned purpose, solution of the present invention is:
Based on the encryption method of 18000-6C standard electronic label, wherein, comprising:
1. the electronic tag storage space is divided into open source information district and privately owned information data area, generates one group of data and write the open source information district by supervisory computer is random;
2. above-mentioned data in reading electronic labels open source information district, and by cipher key calculation module generating labels key and with the handover key of this key as electronic tag open mode and privately owned pattern, then label key and user data are write privately owned information data area;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
Supervisory computer is random in 1. generates one group of data refer to one group of data randomly drawing in the data acquisition of some for described step, and the resulting label key of this data acquisition and cipher key calculation module has many-to-one relation.
Described step 2. middle cipher key calculation module generating labels key is to calculate acquisition by the PSAM card.
The switching of described electronic tag between open module and privately owned pattern is that the label module for reading and writing is realized based on the QT technology.
Another object of the present invention is to provide a kind of charging administration system, wherein, comprise electronic tag, supervisory computer and PSAM card issuing module, electronic tag issuing module and the reader of all communicating by letter and being connected with supervisory computer; The storage space of this electronic tag is divided into open source information district and privately owned information data area; This PSAM card issuing module is reader mandate distribution PSAM card based on PSAM card key administrative skill, is provided with label read module and cipher key calculation module in this reader; This electronic tag issuing module unifies to generate random data by supervisory computer, and calculate label key according to these data by the PSAM calorimeter by the cipher key calculation module, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag by the card sender of each hair fastener point; This label read module be used for to electronic tag read and with cipher key calculation module generation data communication; The label information that this cipher key calculation module reads by the label read module is calculated the label key and result is returned to the label read module in conjunction with the PSAM calorimeter, and this label read module reads the data in privately owned information data area based on the label key.
Also be provided with message processing module and database access module in described read write line, this message processing module calculates by the label information that the label read module reads in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module.
Described PSAM card issuing module is that reader mandate distribution is used the PSAM card and controls the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
After adopting said structure, the present invention relates to a kind of electronic tag encryption method, it generates one group of data and writes the open source information district by supervisory computer is random, so the label read module in reader can obtain the data in the open source information district, utilize the cipher key calculation module to calculate the label key according to these group data again, thereby electronic tag is switched to privately owned module by open mode, then allow reader can have access to user data in privately owned information data area.
There is not the cipher key calculation module in it due to unauthorized reader; and have the irreversible of function and can not the property known by data to label key; therefore unauthorized reader can't be known the user data in privately owned information data area, thereby played the effect of protecting label publisher rights and interests.
Description of drawings
Fig. 1 is the formation block diagram that the present invention relates to charging administration system;
Fig. 2 is the data area structure schematic diagram that the present invention relates to electronic tag preferred embodiment in charging administration system;
Fig. 3 is the hair fastener process flow diagram that the present invention relates to electronic tag in the charging administration system preferred embodiment;
Fig. 4 is the process flow diagram that reads that the present invention relates to electronic tag in the charging administration system preferred embodiment.
In figure:
Charging administration system-100; Supervisory computer-1; PSAM card issuing module-2;
Electronic tag issuing module-3; Reader-4; Label read module-41;
Cipher key calculation module-42; Message processing module-43; Database access module-44;
Electronic tag-5.
Embodiment
In order further to explain technical scheme of the present invention, the present invention will be described in detail below by specific embodiment.
as shown in Figures 1 to 4, it relates to the charging administration system 100 of main thoroughfare, a kind of city and bayonet socket, specifically please refer to shown in Figure 1, this charging administration system 100 mainly comprises supervisory computer 1, PSAM card issuing module 2, electronic tag issuing module 3, reader 4 and electronic tag 5, this reader 4 comprises again label read module 41, cipher key calculation module 42, message processing module 43 and database access module 44, this PSAM card issuing module 2, electronic tag issuing module 3, label read module 41, cipher key calculation module 42, message processing module 43 all is connected with supervisory computer 1 communication with database access module 44.
The storage space of this electronic tag 5 is divided into open source information district and privately owned information data area; As shown in Figure 2, based on the 18000-6C standard, so have 4 bank based on electronic tag 5 of the present invention, wherein: bank00 is used for storage kill password and access password; Bank01 is used for storage EPC, and Bank10 is used for storage TID, and bank11 is used for the storage user data; In the present embodiment, this bank00 and bank11 are privately owned information data area, and this bank01 and bank11 are the open source information district.According to international consensus standard, the TID storage area data has been cured in before chip dispatches from the factory in chip, for read-only zones cannot be forged and distort; Issue by publishing system the EPC that the rule formulated by the user defines in addition and also can have uniqueness, both are in conjunction with to realize the uniqueness of electronic tag ID.Therefore can realize the uniqueness of electronic tag.
This PSAM card issuing module 2 is that reader 4 is authorized distribution PSAM card based on PSAM card key administrative skill; Particularly, described PSAM card issuing module 2 is that reader 4 authorizes distribution use the PSAM card and control the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
This electronic tag issuing module 3 is by the unified random data that generates of supervisory computer 1, and calculate label key according to these data by the PSAM calorimeter by cipher key calculation module 42, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag 5 by the card sender of each hair fastener point; This label read module 41 is used for electronic tag 5 is read and with cipher key calculation module 42, data communication occurs; The label information that this cipher key calculation module 42 reads by label read module 41 is calculated the label key and result is returned to label read module 41 in conjunction with the PSAM calorimeter, and this label read module 41 reads the data in privately owned information data area based on the label key.Then, also be provided with message processing module 43 and database access module 44 in described read write line, this message processing module 43 calculates by the label information that label read module 41 is read in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module 44.
So, utilize the QT technology, the label owner can come the memory machine ciphertext data with privately owned information data area, and the open source information district is used for the lower information of storage susceptibility.Only comprise TID and EPC in the open label information data area, TID only has 32, and the information of record is producer's sign and chip model, as long as the chip of the label that adopts is the same, its corresponding TID is consistent.EPC has 96, and the present invention adopts and get arbitrarily wherein one group of open EPC data of conduct in random 20 groups of data that generate in system.
Reader is the built-in PSAM card of storage system key before dispatching from the factory, and utilizes the EPC code in the open label information data area and the system key that is stored in the PSAM card realizes that many cards one are close.Due to the nonreversibility of function, the security of password is the security of system key.Because system key only is kept in the PSAM card, not can read or derive, so just guaranteed the safety of system key.
Needed to use built-in the special-purpose card sender of PSAM security module equally in the hair fastener process, the workflow of hair fastener as shown in Figure 3:
S100: label read module 41 is checked label: judge specifically whether card is effectively normal, and access key is not set, and can normally read and write;
S110: electronic tag issuing module 3 is randomly drawed one group of data and is write label: specifically generate at random the data of 1 group 64, and write the EPC district in the open label information data area;
S111: cipher key calculation module 42 is by reorganization random data computation key;
S120: electronic tag issuing module 3 registered vehicle information datas;
S121: message processing module 43 is with the information of vehicles data encryption;
S122: database access module 44 deposits enciphered data and id information in database;
S130: electronic tag issuing module 3 writes key, information of vehicles, EPC in electronic tag 5;
S140: label read module 41 reads the checking data writing;
S150: electronic tag issuing module 3 is set authority and label is converted to open mode: the access limit that regional specifically is set, with the password area permanent locking, guarantee that access key can not be read and write, other zones arrange reversible locking or permanent locking according to concrete application demand.
Vehicle carried electronic label 5 reads flow process as shown in Figure 4:
S200: label read module 41 counting electronic label EPC;
S210: cipher key calculation module 42 is calculated the label key by EPC;
S220: label read module 41 switches to privately owned pattern by the label key with electronic tag 5;
S230: label read module 41 reading tag data;
S240: message processing module 43 calculates the unique ID of label;
S250: database access module 44 is according to information of vehicles corresponding to ID inquiry;
S260: electronic tag 5 leaves microwave region and automatically returns to open mode.
In addition, the present invention also provides the encryption method based on 18000-6C standard electronic label 5, wherein, comprising:
1. electronic tag 5 storage spaces are divided into open source information district and privately owned information data area, generate one group of data and write the open source information district by supervisory computer 1 is random; Refer to that specifically one group of data randomly drawing in the data acquisition of some, the present embodiment are to extract one group from 20 groups, the resulting label key of this data acquisition and cipher key calculation module 42 has many-to-one relation;
2. above-mentioned data in reading electronic labels 5 open source information districts, and by cipher key calculation module 42 generating labels keys and with the handover key of this key as electronic tag 5 open modes and privately owned pattern, then label key and user data are write privately owned information data area; Specifically realize the generation of label key by the PSAM card;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
So, the present invention relates to a kind of electronic tag 5 encryption methods, it generates one group of data and writes the open source information district by supervisory computer 1 is random, so the label read module 41 in reader 4 can obtain the data in the open source information district, utilize cipher key calculation module 42 to calculate the label key according to these group data again, thereby electronic tag 5 is switched to privately owned module by open mode, then allow reader 4 can have access to user data in privately owned information data area.There is not cipher key calculation module 42 in it due to unauthorized reader; and have the irreversible of function and can not the property known by data to label key; therefore unauthorized reader can't be known the user data in privately owned information data area, thereby played the effect of protecting label publisher rights and interests.
Above-described embodiment and graphic and non-limiting product form of the present invention and style, any person of an ordinary skill in the technical field all should be considered as not breaking away from patent category of the present invention to its suitable variation or modification of doing.

Claims (7)

1. based on the encryption method of 18000-6C standard electronic label, it is characterized in that, comprising:
1. the electronic tag storage space is divided into open source information district and privately owned information data area, generates one group of data and write the open source information district by supervisory computer is random;
2. above-mentioned data in reading electronic labels open source information district, and by cipher key calculation module generating labels key and with the handover key of this key as electronic tag open mode and privately owned pattern, then label key and user data are write privately owned information data area;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
2. encryption method as claimed in claim 1, it is characterized in that, supervisory computer is random in 1. generates one group of data refer to one group of data randomly drawing in the data acquisition of some for described step, and the resulting label key of this data acquisition and cipher key calculation module has many-to-one relation.
3. encryption method as claimed in claim 1, is characterized in that, described step 2. middle cipher key calculation module generating labels key is to calculate acquisition by the PSAM card.
4. encryption method as claimed in claim 1, is characterized in that, the switching of described electronic tag between open module and privately owned pattern is that the label module for reading and writing is realized based on the QT technology.
5. charging administration system, is characterized in that, comprises electronic tag, supervisory computer and PSAM card issuing module, electronic tag issuing module and the reader of all communicating by letter and being connected with supervisory computer; The storage space of this electronic tag is divided into open source information district and privately owned information data area; This PSAM card issuing module is reader mandate distribution PSAM card based on PSAM card key administrative skill, is provided with label read module and cipher key calculation module in this reader; This electronic tag issuing module unifies to generate random data by supervisory computer, and calculate label key according to these data by the PSAM calorimeter by the cipher key calculation module, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag by the card sender of each hair fastener point; This label read module be used for to electronic tag read and with cipher key calculation module generation data communication; The label information that this cipher key calculation module reads by the label read module is calculated the label key and result is returned to the label read module in conjunction with the PSAM calorimeter, and this label read module reads the data in privately owned information data area based on the label key.
6. charging administration system as claimed in claim 5, it is characterized in that, also be provided with message processing module and database access module in described read write line, this message processing module calculates by the label information that the label read module reads in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module.
7. charging administration system as claimed in claim 5, it is characterized in that, described PSAM card issuing module is that reader mandate distribution is used the PSAM card and controls the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
CN201310020641.9A 2013-01-21 2013-01-21 Electronic tag encryption method and charging administration system based on 18000-6C standard Active CN103106421B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310020641.9A CN103106421B (en) 2013-01-21 2013-01-21 Electronic tag encryption method and charging administration system based on 18000-6C standard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310020641.9A CN103106421B (en) 2013-01-21 2013-01-21 Electronic tag encryption method and charging administration system based on 18000-6C standard

Publications (2)

Publication Number Publication Date
CN103106421A true CN103106421A (en) 2013-05-15
CN103106421B CN103106421B (en) 2016-06-22

Family

ID=48314267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310020641.9A Active CN103106421B (en) 2013-01-21 2013-01-21 Electronic tag encryption method and charging administration system based on 18000-6C standard

Country Status (1)

Country Link
CN (1) CN103106421B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665430A (en) * 2017-09-14 2018-02-06 中交北斗技术有限责任公司 A kind of implementation method of the stored value card based on UHF RFIDs

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090024482A (en) * 2007-09-04 2009-03-09 경원대학교 산학협력단 Key management system for using content and method thereof
CN101625727A (en) * 2008-07-08 2010-01-13 晨星软件研发(深圳)有限公司 Radio frequency identification tag and operating method thereof
CN101739538A (en) * 2008-11-25 2010-06-16 公安部第三研究所 Method for encrypting and verifying ISO18000-6C electronic tag
CN102289688A (en) * 2010-06-18 2011-12-21 中兴通讯股份有限公司 Method and device for label processing and access
CN102326355A (en) * 2009-06-01 2012-01-18 株式会社日立制作所 Method of generating id with guaranteed validity, and validity legitimacy guarantying rfid tag
CN102833072A (en) * 2012-08-29 2012-12-19 天津广行科技有限公司 Dynamic generation method for access key of automobile electronic information card

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090024482A (en) * 2007-09-04 2009-03-09 경원대학교 산학협력단 Key management system for using content and method thereof
CN101625727A (en) * 2008-07-08 2010-01-13 晨星软件研发(深圳)有限公司 Radio frequency identification tag and operating method thereof
CN101739538A (en) * 2008-11-25 2010-06-16 公安部第三研究所 Method for encrypting and verifying ISO18000-6C electronic tag
CN102326355A (en) * 2009-06-01 2012-01-18 株式会社日立制作所 Method of generating id with guaranteed validity, and validity legitimacy guarantying rfid tag
CN102289688A (en) * 2010-06-18 2011-12-21 中兴通讯股份有限公司 Method and device for label processing and access
CN102833072A (en) * 2012-08-29 2012-12-19 天津广行科技有限公司 Dynamic generation method for access key of automobile electronic information card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴学慧,牛志华,王潮: "基于椭圆曲线密码的RFID安全协议", 《计算机工程与技术》 *
柯其然: "高速公路联网收费PSAM卡的安全防范", 《中国交通信息化》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665430A (en) * 2017-09-14 2018-02-06 中交北斗技术有限责任公司 A kind of implementation method of the stored value card based on UHF RFIDs

Also Published As

Publication number Publication date
CN103106421B (en) 2016-06-22

Similar Documents

Publication Publication Date Title
CN101847199B (en) Security authentication method for radio frequency recognition system
WO2016029721A1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
CN105975877B (en) A kind of sensitive document secure storage method
CN101882197B (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN104966111A (en) Low-voltage transformer security system and method based on radio frequency encryption technology
CN103326864B (en) A kind of electronic tag anti-fake authentication method
CN102932140A (en) Key backup method for enhancing safety of cipher machine
CN102081744A (en) Path identification system and secure interaction method thereof
CN102855504A (en) Method and device for ownership transfer of radio frequency identification (RFID) tag
CN103496350A (en) Electronic license plate and method for reading information in electronic license plate
CN104182786B (en) The safety control of partition management is realized to ultrahigh frequency electronic tag storage region
JP2005295408A (en) Enciphering device, decoding device, enciphering and decoding system, and key information updating system
CN103218633A (en) Radio frequency identification (RFID) safety authentication method
CN102651079A (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN101739593A (en) Safety certification method of medium access control codes of integrated circuit cards
CN103106421A (en) Electronic tag encryption method and charge management system based on 18000-6C standard
CN109447653A (en) A kind of IC card encryption method, device, terminal and storage medium
CN103136552B (en) A kind of method and system protecting RFID tag data
CN105406971B (en) RFID (radio frequency identification) safety authentication method for intelligent power consumption information acquisition system terminal
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
CN108121903B (en) Password management method and data encryption representation method based on logic encryption card
CN208488752U (en) A kind of cryptography electronic label
CN102291241A (en) Encryption and decryption method and device for multi-data security module
CN101840526B (en) Intelligent card and intelligent card encrypting system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 361000 Fujian City, Xiamen Software Park, the three phase of the city of Victoria Avenue, No. 1801, unit 1802, unit 1803, unit 370, unit 1804

Applicant after: Xiamen Luqiao information limited liability company

Address before: 361000, 5F-A, software park, torch hi tech Zone, Fujian, Xiamen province 3

Applicant before: Xiamen Road & Bridge Information Engineering Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant