CN103106421A - Electronic tag encryption method and charge management system based on 18000-6C standard - Google Patents
Electronic tag encryption method and charge management system based on 18000-6C standard Download PDFInfo
- Publication number
- CN103106421A CN103106421A CN2013100206419A CN201310020641A CN103106421A CN 103106421 A CN103106421 A CN 103106421A CN 2013100206419 A CN2013100206419 A CN 2013100206419A CN 201310020641 A CN201310020641 A CN 201310020641A CN 103106421 A CN103106421 A CN 103106421A
- Authority
- CN
- China
- Prior art keywords
- label
- module
- data
- key
- electronic tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an electronic tag encryption method and a charge management system based on an 18000-6C standard. The method comprises that an electronic tag storage space is divided into a public data area and a private data area, a group of data is randomly generated by a supervisory computer and is read in the public data area, the data in the electronic tag public data area is read, a tag secret key is generated by a secret key calculation module and is used as a switching secret key of an electronic tag public mode and an electronic tag private mode, then the tag secret key and user data are written in the private data area, and a storage area where the tag secret key is in is arranged to be in a permanent locking state so that the fact that an access secret key can not be read is guaranteed. Due to the fact that the secret key calculation module does not exist in an unauthorized reader and the data and the tag secret key have irreversible and non-learning performance of a function, and therefore the unauthorized reader can not learn the user data in the private data area, and an effect of protecting rights and interests of a tag publisher is achieved.
Description
Technical field
The present invention relates to the field of encryption of vehicle carried electronic label, relate in particular a kind of electronic tag encryption method and charging administration system based on the 18000-6C standard, it is applied to city vehicle carried electronic label read operation and information security encipherment protection.
Background technology
At present, domesticly all issued as cities such as Chongqing, Nanjing, Shantou the charge that the passive ultra-high frequency vehicle carried electronic label is used for main thoroughfare, city and bayonet socket, due to reader and the general protocol and standard of label employing of present passive ultrahigh frequency electronic tag radio-frequency recognition system, can access therefore follow identical standard reader the label of following identical standard.
Simultaneously, power supply due to passive ultrahigh frequency electronic tag, all to be realized at the distance transmission uhf electromagnetic wave by reader, its output power is low, therefore can not use complicated identifying procedure and algorithm on electronic tag, what the data on therefore existing electronic tag all can't the outer reader of shielding harness reads.
Such as Nanjing and Shantou; the electronic tag that is respectively 18000-6C and 6B standard that it adopts; its unique ID to electronic tag is not encrypted protection; although and Chongqing is by the data of the front 96bit of TID of customization 18000-6C standard A LIEN-H3 chip; but the readable data of actual H3 chip TID is 192bit altogether, and then the data of 96bit unique ID of can be used as label identifies.
Therefore, the passive ultra-high frequency vehicle carried electronic label of domestic city distribution at present all can be by unique ID of unauthorized reader reading tag, thereby the application of binding by unique ID and the vehicle of label aspects such as realizing gate inhibition, charge, security protection again causes certain infringement to label publisher's rights and interests.
Summary of the invention
The object of the present invention is to provide a kind of electronic tag encryption method based on the 18000-6C standard, to avoid unauthorized reader that unique ID of electronic tag is read and damage the problem of label publisher rights and interests.
In order to reach above-mentioned purpose, solution of the present invention is:
Based on the encryption method of 18000-6C standard electronic label, wherein, comprising:
1. the electronic tag storage space is divided into open source information district and privately owned information data area, generates one group of data and write the open source information district by supervisory computer is random;
2. above-mentioned data in reading electronic labels open source information district, and by cipher key calculation module generating labels key and with the handover key of this key as electronic tag open mode and privately owned pattern, then label key and user data are write privately owned information data area;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
Supervisory computer is random in 1. generates one group of data refer to one group of data randomly drawing in the data acquisition of some for described step, and the resulting label key of this data acquisition and cipher key calculation module has many-to-one relation.
Described step 2. middle cipher key calculation module generating labels key is to calculate acquisition by the PSAM card.
The switching of described electronic tag between open module and privately owned pattern is that the label module for reading and writing is realized based on the QT technology.
Another object of the present invention is to provide a kind of charging administration system, wherein, comprise electronic tag, supervisory computer and PSAM card issuing module, electronic tag issuing module and the reader of all communicating by letter and being connected with supervisory computer; The storage space of this electronic tag is divided into open source information district and privately owned information data area; This PSAM card issuing module is reader mandate distribution PSAM card based on PSAM card key administrative skill, is provided with label read module and cipher key calculation module in this reader; This electronic tag issuing module unifies to generate random data by supervisory computer, and calculate label key according to these data by the PSAM calorimeter by the cipher key calculation module, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag by the card sender of each hair fastener point; This label read module be used for to electronic tag read and with cipher key calculation module generation data communication; The label information that this cipher key calculation module reads by the label read module is calculated the label key and result is returned to the label read module in conjunction with the PSAM calorimeter, and this label read module reads the data in privately owned information data area based on the label key.
Also be provided with message processing module and database access module in described read write line, this message processing module calculates by the label information that the label read module reads in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module.
Described PSAM card issuing module is that reader mandate distribution is used the PSAM card and controls the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
After adopting said structure, the present invention relates to a kind of electronic tag encryption method, it generates one group of data and writes the open source information district by supervisory computer is random, so the label read module in reader can obtain the data in the open source information district, utilize the cipher key calculation module to calculate the label key according to these group data again, thereby electronic tag is switched to privately owned module by open mode, then allow reader can have access to user data in privately owned information data area.
There is not the cipher key calculation module in it due to unauthorized reader; and have the irreversible of function and can not the property known by data to label key; therefore unauthorized reader can't be known the user data in privately owned information data area, thereby played the effect of protecting label publisher rights and interests.
Description of drawings
Fig. 1 is the formation block diagram that the present invention relates to charging administration system;
Fig. 2 is the data area structure schematic diagram that the present invention relates to electronic tag preferred embodiment in charging administration system;
Fig. 3 is the hair fastener process flow diagram that the present invention relates to electronic tag in the charging administration system preferred embodiment;
Fig. 4 is the process flow diagram that reads that the present invention relates to electronic tag in the charging administration system preferred embodiment.
In figure:
Charging administration system-100; Supervisory computer-1; PSAM card issuing module-2;
Electronic tag issuing module-3; Reader-4; Label read module-41;
Cipher key calculation module-42; Message processing module-43; Database access module-44;
Electronic tag-5.
Embodiment
In order further to explain technical scheme of the present invention, the present invention will be described in detail below by specific embodiment.
as shown in Figures 1 to 4, it relates to the charging administration system 100 of main thoroughfare, a kind of city and bayonet socket, specifically please refer to shown in Figure 1, this charging administration system 100 mainly comprises supervisory computer 1, PSAM card issuing module 2, electronic tag issuing module 3, reader 4 and electronic tag 5, this reader 4 comprises again label read module 41, cipher key calculation module 42, message processing module 43 and database access module 44, this PSAM card issuing module 2, electronic tag issuing module 3, label read module 41, cipher key calculation module 42, message processing module 43 all is connected with supervisory computer 1 communication with database access module 44.
The storage space of this electronic tag 5 is divided into open source information district and privately owned information data area; As shown in Figure 2, based on the 18000-6C standard, so have 4 bank based on electronic tag 5 of the present invention, wherein: bank00 is used for storage kill password and access password; Bank01 is used for storage EPC, and Bank10 is used for storage TID, and bank11 is used for the storage user data; In the present embodiment, this bank00 and bank11 are privately owned information data area, and this bank01 and bank11 are the open source information district.According to international consensus standard, the TID storage area data has been cured in before chip dispatches from the factory in chip, for read-only zones cannot be forged and distort; Issue by publishing system the EPC that the rule formulated by the user defines in addition and also can have uniqueness, both are in conjunction with to realize the uniqueness of electronic tag ID.Therefore can realize the uniqueness of electronic tag.
This PSAM card issuing module 2 is that reader 4 is authorized distribution PSAM card based on PSAM card key administrative skill; Particularly, described PSAM card issuing module 2 is that reader 4 authorizes distribution use the PSAM card and control the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
This electronic tag issuing module 3 is by the unified random data that generates of supervisory computer 1, and calculate label key according to these data by the PSAM calorimeter by cipher key calculation module 42, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag 5 by the card sender of each hair fastener point; This label read module 41 is used for electronic tag 5 is read and with cipher key calculation module 42, data communication occurs; The label information that this cipher key calculation module 42 reads by label read module 41 is calculated the label key and result is returned to label read module 41 in conjunction with the PSAM calorimeter, and this label read module 41 reads the data in privately owned information data area based on the label key.Then, also be provided with message processing module 43 and database access module 44 in described read write line, this message processing module 43 calculates by the label information that label read module 41 is read in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module 44.
So, utilize the QT technology, the label owner can come the memory machine ciphertext data with privately owned information data area, and the open source information district is used for the lower information of storage susceptibility.Only comprise TID and EPC in the open label information data area, TID only has 32, and the information of record is producer's sign and chip model, as long as the chip of the label that adopts is the same, its corresponding TID is consistent.EPC has 96, and the present invention adopts and get arbitrarily wherein one group of open EPC data of conduct in random 20 groups of data that generate in system.
Reader is the built-in PSAM card of storage system key before dispatching from the factory, and utilizes the EPC code in the open label information data area and the system key that is stored in the PSAM card realizes that many cards one are close.Due to the nonreversibility of function, the security of password is the security of system key.Because system key only is kept in the PSAM card, not can read or derive, so just guaranteed the safety of system key.
Needed to use built-in the special-purpose card sender of PSAM security module equally in the hair fastener process, the workflow of hair fastener as shown in Figure 3:
S100: label read module 41 is checked label: judge specifically whether card is effectively normal, and access key is not set, and can normally read and write;
S110: electronic tag issuing module 3 is randomly drawed one group of data and is write label: specifically generate at random the data of 1 group 64, and write the EPC district in the open label information data area;
S111: cipher key calculation module 42 is by reorganization random data computation key;
S120: electronic tag issuing module 3 registered vehicle information datas;
S121: message processing module 43 is with the information of vehicles data encryption;
S122: database access module 44 deposits enciphered data and id information in database;
S130: electronic tag issuing module 3 writes key, information of vehicles, EPC in electronic tag 5;
S140: label read module 41 reads the checking data writing;
S150: electronic tag issuing module 3 is set authority and label is converted to open mode: the access limit that regional specifically is set, with the password area permanent locking, guarantee that access key can not be read and write, other zones arrange reversible locking or permanent locking according to concrete application demand.
Vehicle carried electronic label 5 reads flow process as shown in Figure 4:
S200: label read module 41 counting electronic label EPC;
S210: cipher key calculation module 42 is calculated the label key by EPC;
S220: label read module 41 switches to privately owned pattern by the label key with electronic tag 5;
S230: label read module 41 reading tag data;
S240: message processing module 43 calculates the unique ID of label;
S250: database access module 44 is according to information of vehicles corresponding to ID inquiry;
S260: electronic tag 5 leaves microwave region and automatically returns to open mode.
In addition, the present invention also provides the encryption method based on 18000-6C standard electronic label 5, wherein, comprising:
1. electronic tag 5 storage spaces are divided into open source information district and privately owned information data area, generate one group of data and write the open source information district by supervisory computer 1 is random; Refer to that specifically one group of data randomly drawing in the data acquisition of some, the present embodiment are to extract one group from 20 groups, the resulting label key of this data acquisition and cipher key calculation module 42 has many-to-one relation;
2. above-mentioned data in reading electronic labels 5 open source information districts, and by cipher key calculation module 42 generating labels keys and with the handover key of this key as electronic tag 5 open modes and privately owned pattern, then label key and user data are write privately owned information data area; Specifically realize the generation of label key by the PSAM card;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
So, the present invention relates to a kind of electronic tag 5 encryption methods, it generates one group of data and writes the open source information district by supervisory computer 1 is random, so the label read module 41 in reader 4 can obtain the data in the open source information district, utilize cipher key calculation module 42 to calculate the label key according to these group data again, thereby electronic tag 5 is switched to privately owned module by open mode, then allow reader 4 can have access to user data in privately owned information data area.There is not cipher key calculation module 42 in it due to unauthorized reader; and have the irreversible of function and can not the property known by data to label key; therefore unauthorized reader can't be known the user data in privately owned information data area, thereby played the effect of protecting label publisher rights and interests.
Above-described embodiment and graphic and non-limiting product form of the present invention and style, any person of an ordinary skill in the technical field all should be considered as not breaking away from patent category of the present invention to its suitable variation or modification of doing.
Claims (7)
1. based on the encryption method of 18000-6C standard electronic label, it is characterized in that, comprising:
1. the electronic tag storage space is divided into open source information district and privately owned information data area, generates one group of data and write the open source information district by supervisory computer is random;
2. above-mentioned data in reading electronic labels open source information district, and by cipher key calculation module generating labels key and with the handover key of this key as electronic tag open mode and privately owned pattern, then label key and user data are write privately owned information data area;
3. the memory block at label key place is set to permanent locking and can not be read and write to guarantee access key.
2. encryption method as claimed in claim 1, it is characterized in that, supervisory computer is random in 1. generates one group of data refer to one group of data randomly drawing in the data acquisition of some for described step, and the resulting label key of this data acquisition and cipher key calculation module has many-to-one relation.
3. encryption method as claimed in claim 1, is characterized in that, described step 2. middle cipher key calculation module generating labels key is to calculate acquisition by the PSAM card.
4. encryption method as claimed in claim 1, is characterized in that, the switching of described electronic tag between open module and privately owned pattern is that the label module for reading and writing is realized based on the QT technology.
5. charging administration system, is characterized in that, comprises electronic tag, supervisory computer and PSAM card issuing module, electronic tag issuing module and the reader of all communicating by letter and being connected with supervisory computer; The storage space of this electronic tag is divided into open source information district and privately owned information data area; This PSAM card issuing module is reader mandate distribution PSAM card based on PSAM card key administrative skill, is provided with label read module and cipher key calculation module in this reader; This electronic tag issuing module unifies to generate random data by supervisory computer, and calculate label key according to these data by the PSAM calorimeter by the cipher key calculation module, then random data and label key are write respectively open source information district and the privately owned information data area of pre-distribution electronic tag by the card sender of each hair fastener point; This label read module be used for to electronic tag read and with cipher key calculation module generation data communication; The label information that this cipher key calculation module reads by the label read module is calculated the label key and result is returned to the label read module in conjunction with the PSAM calorimeter, and this label read module reads the data in privately owned information data area based on the label key.
6. charging administration system as claimed in claim 5, it is characterized in that, also be provided with message processing module and database access module in described read write line, this message processing module calculates by the label information that the label read module reads in privately owned information data area, parse the ID of label, and obtain the information of vehicles corresponding with the ID of label by database access module.
7. charging administration system as claimed in claim 5, it is characterized in that, described PSAM card issuing module is that reader mandate distribution is used the PSAM card and controls the PSAM card, writes distribution of information and key information in this application PSAM card, and this controls the access claim that the PSAM card control is used the PSAM card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310020641.9A CN103106421B (en) | 2013-01-21 | 2013-01-21 | Electronic tag encryption method and charging administration system based on 18000-6C standard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310020641.9A CN103106421B (en) | 2013-01-21 | 2013-01-21 | Electronic tag encryption method and charging administration system based on 18000-6C standard |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103106421A true CN103106421A (en) | 2013-05-15 |
CN103106421B CN103106421B (en) | 2016-06-22 |
Family
ID=48314267
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310020641.9A Active CN103106421B (en) | 2013-01-21 | 2013-01-21 | Electronic tag encryption method and charging administration system based on 18000-6C standard |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103106421B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665430A (en) * | 2017-09-14 | 2018-02-06 | 中交北斗技术有限责任公司 | A kind of implementation method of the stored value card based on UHF RFIDs |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090024482A (en) * | 2007-09-04 | 2009-03-09 | 경원대학교 산학협력단 | Key management system for using content and method thereof |
CN101625727A (en) * | 2008-07-08 | 2010-01-13 | 晨星软件研发(深圳)有限公司 | Radio frequency identification tag and operating method thereof |
CN101739538A (en) * | 2008-11-25 | 2010-06-16 | 公安部第三研究所 | Method for encrypting and verifying ISO18000-6C electronic tag |
CN102289688A (en) * | 2010-06-18 | 2011-12-21 | 中兴通讯股份有限公司 | Method and device for label processing and access |
CN102326355A (en) * | 2009-06-01 | 2012-01-18 | 株式会社日立制作所 | Method of generating id with guaranteed validity, and validity legitimacy guarantying rfid tag |
CN102833072A (en) * | 2012-08-29 | 2012-12-19 | 天津广行科技有限公司 | Dynamic generation method for access key of automobile electronic information card |
-
2013
- 2013-01-21 CN CN201310020641.9A patent/CN103106421B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090024482A (en) * | 2007-09-04 | 2009-03-09 | 경원대학교 산학협력단 | Key management system for using content and method thereof |
CN101625727A (en) * | 2008-07-08 | 2010-01-13 | 晨星软件研发(深圳)有限公司 | Radio frequency identification tag and operating method thereof |
CN101739538A (en) * | 2008-11-25 | 2010-06-16 | 公安部第三研究所 | Method for encrypting and verifying ISO18000-6C electronic tag |
CN102326355A (en) * | 2009-06-01 | 2012-01-18 | 株式会社日立制作所 | Method of generating id with guaranteed validity, and validity legitimacy guarantying rfid tag |
CN102289688A (en) * | 2010-06-18 | 2011-12-21 | 中兴通讯股份有限公司 | Method and device for label processing and access |
CN102833072A (en) * | 2012-08-29 | 2012-12-19 | 天津广行科技有限公司 | Dynamic generation method for access key of automobile electronic information card |
Non-Patent Citations (2)
Title |
---|
吴学慧,牛志华,王潮: "基于椭圆曲线密码的RFID安全协议", 《计算机工程与技术》 * |
柯其然: "高速公路联网收费PSAM卡的安全防范", 《中国交通信息化》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665430A (en) * | 2017-09-14 | 2018-02-06 | 中交北斗技术有限责任公司 | A kind of implementation method of the stored value card based on UHF RFIDs |
Also Published As
Publication number | Publication date |
---|---|
CN103106421B (en) | 2016-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101847199B (en) | Security authentication method for radio frequency recognition system | |
WO2016029721A1 (en) | Security authentication method for hiding ultra high frequency electronic tag identifier | |
CN105975877B (en) | A kind of sensitive document secure storage method | |
CN101882197B (en) | RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key | |
CN104966111A (en) | Low-voltage transformer security system and method based on radio frequency encryption technology | |
CN103326864B (en) | A kind of electronic tag anti-fake authentication method | |
CN102932140A (en) | Key backup method for enhancing safety of cipher machine | |
CN102081744A (en) | Path identification system and secure interaction method thereof | |
CN102855504A (en) | Method and device for ownership transfer of radio frequency identification (RFID) tag | |
CN103496350A (en) | Electronic license plate and method for reading information in electronic license plate | |
CN104182786B (en) | The safety control of partition management is realized to ultrahigh frequency electronic tag storage region | |
JP2005295408A (en) | Enciphering device, decoding device, enciphering and decoding system, and key information updating system | |
CN103218633A (en) | Radio frequency identification (RFID) safety authentication method | |
CN102651079A (en) | IC (integrated circuit) card management method occupying memory space for a short time and IC card management system | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
CN101739593A (en) | Safety certification method of medium access control codes of integrated circuit cards | |
CN103106421A (en) | Electronic tag encryption method and charge management system based on 18000-6C standard | |
CN109447653A (en) | A kind of IC card encryption method, device, terminal and storage medium | |
CN103136552B (en) | A kind of method and system protecting RFID tag data | |
CN105406971B (en) | RFID (radio frequency identification) safety authentication method for intelligent power consumption information acquisition system terminal | |
CN103793742A (en) | Technology of electronic tag safety authentication and information encryption of traffic electronic license plate | |
CN108121903B (en) | Password management method and data encryption representation method based on logic encryption card | |
CN208488752U (en) | A kind of cryptography electronic label | |
CN102291241A (en) | Encryption and decryption method and device for multi-data security module | |
CN101840526B (en) | Intelligent card and intelligent card encrypting system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 361000 Fujian City, Xiamen Software Park, the three phase of the city of Victoria Avenue, No. 1801, unit 1802, unit 1803, unit 370, unit 1804 Applicant after: Xiamen Luqiao information limited liability company Address before: 361000, 5F-A, software park, torch hi tech Zone, Fujian, Xiamen province 3 Applicant before: Xiamen Road & Bridge Information Engineering Co., Ltd. |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |