CN106921488A - A kind of label data encryption method and label data decryption method - Google Patents
A kind of label data encryption method and label data decryption method Download PDFInfo
- Publication number
- CN106921488A CN106921488A CN201510994479.XA CN201510994479A CN106921488A CN 106921488 A CN106921488 A CN 106921488A CN 201510994479 A CN201510994479 A CN 201510994479A CN 106921488 A CN106921488 A CN 106921488A
- Authority
- CN
- China
- Prior art keywords
- data
- mapping
- mapping table
- label
- data field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to data security arts, a kind of label data encryption method and label data decryption method are disclosed, the label data encryption method includes:Data are divided at least one data field according to predetermined length;The data of the data field are encrypted by protecting key K1;And the data of encrypted data field are mapped according to mapping table to form data ciphertext, the complexity and cost for so reducing label in turn ensure that the security of label.
Description
Technical field
The present invention relates to data security arts, in particular it relates to a kind of label data encryption method and label
Data decryption method.
Background technology
Radio frequency identification (RFID) technology is a kind of wireless communication technology, can be recognized by radio signals special
Set the goal and read and write related data, and without set up between identifying system and specific objective Mechanical Contact or
Optical contact.The most important advantage of RFID technique is contactless identification, it can penetrate snow, mist, ice,
The adverse circumstances label reading that coating, dust and dirt and bar code cannot be used, and reading rate is exceedingly fast, greatly
In most cases less than 100 milliseconds.In addition, it also has that data capacity is big, long service life, mark
The advantages of label data can be changed dynamically.Therefore electronic tag be widely used in gate inhibition identification, electronics trace to the source,
The fields such as foodstuff traceability, product false proof.
While being widely used, the potential safety hazard related to label is also produced therewith.At present, safety
Problem has turned into one of principal element of restriction RFID technique popularization and application, wherein, private data guard
It is the significant challenge faced in RFID evolutions to topic.
Increasing businessman and user worry the safety problem and Privacy Protection of rfid system, i.e.,
Its security and privacy how are ensured during using rfid system, and is unlikely to cause personal letter
The loss of breath, business information and property etc. is usurped by other people.It is contemplated that if label is under attack,
Cause private leaking data, it is more likely that produce immeasurable loss.But during label is rfid system
In being easily exposed to by attack context, so being one of RFID security to the protection of label data
Important directions.
RFID label tag framework is generally divided into two kinds.A kind of RFID label tag framework uses special label core
Piece, it has been internally integrated special labeling algorithm, and storage region is divided into some, including
Key zone, control of authority area and general memory area, sensitizing range therein use hardware protection, thus cannot
Key data is directly read, key only carries out computing and calls inside processor, it is ensured that data safety.
This RFID label tag framework is commonly used in the field higher to information security requirement.Another RFID
Tag architecture is not having only with a general processor and a storage chip (abbreviation CPU+Flash)
There is the data protection measure of hardware, only tag ID is write in the way of One Time Programmable (OTP)
Can not change, be commonly used in the less sensitive field of data message.
Although the framework security of the first RFID label tag is higher, however it is necessary that special label chip and
Hardware security module, thus increased the complexity and cost of label;Although second RFID label tag knot
Structure is simple, but security is relatively low.
The content of the invention
It is an object of the invention to provide a kind of label data encryption method and label data decryption method, the mark
It is that the complexity and cost for reducing label ensure again to sign data ciphering method and label data decryption method
The security of label.
To achieve these goals, the present invention provides a kind of label data encryption method, the label data
Encryption method includes:Data are divided at least one data field according to predetermined length;By protecting key
K1 is encrypted to the data of the data field;And according to mapping table to the number of encrypted data field
Data ciphertext is formed according to being mapped.
Preferably, it is described the data of encrypted data field to be mapped according to mapping table form data
Ciphertext includes:The data of encrypted data field are mapped according to mapping table M2;And according to reflecting
The data of data fields of the firing table M1 to being mapped by the mapping table M2 map.
Preferably, it is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include:
The data of the encrypted data field are mapped according to predetermined bit mapping;And/or the basis is reflected
The data of data fields of the firing table M1 to being mapped by the mapping table M2 carry out mapping to be included:According to pre-
Determine area's mapping to map the data of the data field mapped by the mapping table M2.
Preferably, the label data encryption method also include it is following at least one:According to first it is random because
Sub- R1 generates the mapping table M1;And the mapping table M2 is generated according to the second random factor R2.
Preferably, the factor generates the first random factor R1 and described based on the ID of the label
Second random factor R2.
Preferably, the predetermined length is 16 bytes.
Correspondingly, a kind of label data decryption method, the label data decryption method includes:According to pre-
Data are divided at least one data field by measured length;According to the mapping table for encrypting to the data field
Data carry out inverse mapping;And by protecting key K1 to the number of the data field by inverse mapping
According to being decrypted.
Preferably, the mapping table that the basis is used to encrypt carries out inverse mapping bag to the data of the data field
Include:Inverse mapping is carried out to the data of the data field according to the mapping table M1 for encrypting;And according to
Mapping table M2 for encrypting enters to the data of the data field according to the mapping table M1 inverse mappings
Row inverse mapping.
Preferably, the mapping table M1 that the basis is used to encrypt carries out inverse reflecting to the data of the data field
Penetrate including:Inverse mapping is carried out to the data of the data field according to the fate mapping for encrypting.
Preferably, the basis is used for the mapping table M2 for encrypting to according to the mapping table M1 inverse mappings
The data of the data field carry out inverse mapping and include:Mapped to basis according to the predetermined bit for encrypting
The data of the data field of the mapping table M1 inverse mappings carry out inverse mapping.
By above-mentioned technical proposal, it is encrypted by protecting the data of data fields of the key K1 to dividing,
Then the data of encrypted data field are mapped according to mapping table to form data ciphertext, so i.e.
The complexity and cost for reducing label in turn ensure that the security of label.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with
Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention.
In accompanying drawing:
Fig. 1 is the flow chart of the label data encryption method provided according to the present invention;
Fig. 2 gives the signal mapped according to predetermined bit provided according to one embodiment of the present invention
Figure;
Fig. 3 gives the schematic diagram mapped according to fate provided according to one embodiment of the present invention;
Fig. 4 is the flow chart of the label data encryption method provided according to one embodiment of the present invention;
Fig. 5 is the flow chart of the label data decryption method provided according to the present invention;And
Fig. 6 is the flow chart of the label data decryption method provided according to one embodiment of the present invention.
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that
Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair
It is bright.
Fig. 1 is the flow chart of the label data encryption method provided according to the present invention.As shown in figure 1,
Data are divided at least one data field by step 10 place according to predetermined length (for example, 16 bytes);
At step 11, the data of the data field are encrypted by protecting key K1;And in step
At 12, the data of encrypted data field are mapped according to mapping table form data ciphertext.So
The complexity and cost for reducing label in turn ensure that the security of label.
Wherein, it is described that according to mapping table the data of encrypted data field are mapped with close to form data
Text includes:The data of encrypted data field are mapped according to mapping table M2;And according to mapping
The data of data fields of the table M1 to being mapped by the mapping table M2 map.By mapping table
M1 and the dual of mapping table M2 are obscured, and significantly reduce the successful possibility of Brute Force.
It is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include:According to predetermined
Bit map is mapped the data of the encrypted data field, for example, reflect the data of the first bit
The 8th bit is incident upon, the data of the second bit map to the 3rd bit ..., and certain present invention is not intended to limit
In this, those skilled in the art can arbitrarily set mapping relations.Fig. 2 is given according to of the invention a kind of
The schematic diagram mapped according to predetermined bit that implementation method is provided, as shown in Fig. 2 being reflected according to predetermined bit
The data for penetrating bit before mapping are mapped to after corresponding mapping in bit, it should be understood that this area
Technical staff can complete the present invention according to the bit map of any setting.And/or it is described according to mapping table
The data of data fields of the M1 to being mapped by the mapping table M2 carry out mapping to be included:According to fate
Map and the data of the data field mapped by the mapping table M2 are mapped, such as by address
Data in 1 map to address 4, and the data in address 2 are mapped in address 11 ..., certainly originally
Invention is not restricted to this, and those skilled in the art can arbitrarily set mapping relations.Fig. 3 gives root
The schematic diagram mapped according to fate provided according to one embodiment of the present invention, as shown in figure 3, according to
Fate mapping maps to the data for mapping preceding data field in the data in corresponding mapped data area, should
It should be appreciated that, those skilled in the art can complete the present invention according to the bit map of any setting.
Wherein, the label data encryption method also include it is following at least one:According to the first random factor
R1 generates the mapping table M1;And the mapping table M2 is generated according to the second random factor R2.
The factor the first random factor R1 and described second random can be generated based on the ID of the label
Factor R 2.
The tag encryption method that the present invention is provided can be used with processor (CPU) and memory
(Flash) in label, it is thus possible to keeping that versatility is good, range of choice big, using flexibly, deposit
On the basis of reserves are big, it is ensured that the security of label data.In the framework of this RFID label tag,
CPU is responsible for implementing and enciphering and deciphering algorithm for label function, and stores all of number in Flash parts
According to the data such as including sensitive key.In logic level, storage region can be divided into key zone, power
Limit control zone, general memory area, wherein what key zone was stored is key and the communication of regional encryption and decryption
The key wanted needed for flow, and control of authority area is the encryption storage that could enter with corresponding authority
Area.The position in key zone and control of authority area is relatively fixed, if not using physical protection, it is likely that quilt
Violence reads all initial data, is eventually cracked and obtains sensitive information.However, being carried using the present invention
The encryption method and decryption method of confession can then be greatly enhanced the difficulty of Brute Force completely.
Below through describing the present invention in detail by specific embodiment, it is noted that this hair
It is bright to be not restricted to this.
When label dispatches from the factory can not built-in key, when initial distribution, data are generated at random
Protection key K1;And based on tag ID the factor (tag ID is not repeated uniquely), generation first with
The random factor R2 of machine factor R 1 and second, and data mapping tables are generated according to the first random factor R1
M1, data mapping tables M2 is generated according to the second random factor R2.Mapping table M1 is by mixed preceding data
Area A (n) (the preceding data field of mapping) and mixed rear data field A ' (n) (mapped data area) composition, with every
Individual address storage 1K data are defined, the length representative of n ciphertext limiting value.
Mapping table M1 is known as one-level mapping table, and mapping table M2 is known as two grades of mapping tables.
Whole memory block carries out subregion according to memory characteristics, and in general every 16 byte is divided into an area
(sector), n sector constitutes whole memory block.Mapping table M1 is virtual area reflecting to physical areas
Penetrate.M2 tables are the mappings of virtual bit to physics bit in 1 sector.Mapping table is given birth to based on random number
Into.Of course, it is possible to above-mentioned divided area is set as into corresponding address, Ji Yige areas one ground of correspondence
Location.
Label data encryption flow of the invention is described in detail below with reference to Fig. 4.
As shown in figure 4, at step 41, random generation protection key K1, based on tag ID
The factor generates the first random factor R1 and the second random factor R2, then generates mapping table according to R1
M1 simultaneously generates mapping table M2 according to R2;
At step 42, label data is divided into multiple data field d1, d1 to dn according to 16 bytes;
At step 43, the data of each data field d1, d1 to dn are added using key is protected
It is close, obtain e1=K1 (d1), e2=K1 (d2), en=K1 (dn), and the total data after being encrypted
E=e1+e2+ ...+en;
At step 44, judge whether the data encryption success of all data fields, gone to if success
Step 45;
At step 45, e1 to en is mapped according to mapping table M2, in this embodiment,
Each data field is 16 bytes, 128, is obscured this 128 data according to mapping table M2,
Data e1', e2' ... en' after being mapped, if mapped successfully, goes to step 46 place;
At step 46, according to mapping table M1 to e1', e2' ..., en' maps, by each data field
Obscured;
At step 47, the final data for obtaining are write into physical layer, complete label data encryption.
In this way, then label data is mapped twice by encryption by privately owned mapping table, thus cruelly
It is very low that power cracks that successful possibility can drop.If in addition, it is to be noted that label data
Length is not the integral multiple of predetermined length, in ciphering process, by its polishing, and can be arranged to be supplemented
Data be invalid data, so that the data that will can be supplemented after decrypting are abandoned.
Correspondingly, corresponding with above-mentioned label data encryption method, the present invention also provides a kind of label data
Decryption method, Fig. 5 is the flow chart of the label data decryption method provided according to the present invention.Such as Fig. 5 institutes
Show, at step 50, data are divided at least one data field according to predetermined length;In step 51
The data of the data field are carried out inverse mapping by place according to the mapping table for encrypting;And in step 52
The data of the data field by inverse mapping are decrypted by place by protecting key K1.
The present invention is described in detail by specific embodiment below with reference to Fig. 6, it should be noted that
It is that the present invention is not restricted to this.
Fig. 6 is the flow chart of the label data decryption method provided according to one embodiment of the present invention.
As shown in fig. 6, at step 61, the label data of reading is divided into multiple according to 16 bytes
Data field;
At step 62, mapping table M1, mapping table M2, protection key K1 are obtained;
At step 63, the data of the data field are carried out according to the mapping table M1 for encrypting inverse
Mapping, for example, carry out inverse mapping according to the fate mapping for encrypting to the data of the data field;
At step 64, according to the mapping table M2 for encrypting to reflecting according to the mapping table M1 is inverse
The data of the data field penetrated carry out inverse mapping, for example, right according to the predetermined bit mapping for encrypting
The data of the data field according to the mapping table M1 inverse mappings carry out inverse mapping, if all data
The data inverse in area maps successfully, then go to step 65 place;
At step 65, the data of the data field by inverse mapping are carried out by protecting key K1
Decryption, after the data deciphering success of all data fields, completes the reduction of data.
In order to ensure the security of data to a greater extent, the term of validity of protection key K1 can be set, faced
New protection key K2 can be generated when closely expiring, while pointing out to change protection key, at this moment will can be made
The data encrypted with protection key K1 are backed up and change protection key again.Change the cycle of protection key
Can be modified according to the sensitiveness of data.
The label data encipher-decipher method that the present invention is provided can be taken using ordinary processor and memory
In the case of the label built, data are carried out with encryption and decryption using privately owned algorithm, and using many in terms of storage
The method for remapping, is broken up and has been obscured to ciphertext using privately owned mapping table table, is effectively reduced
The success rate of brute force attack.When label is initially issued, using random factor, can effectively prevent
Attack so that label has the advantage that coupling is low, ease for use is good, safe.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited
Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention
Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special
Levy, in the case of reconcilable, can be combined by any suitable means, in order to avoid need not
The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its
Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.
Claims (10)
1. a kind of label data encryption method, it is characterised in that the label data encryption method includes:
Data are divided at least one data field according to predetermined length;
The data of the data field are encrypted by protecting key K1;And
The data of encrypted data field are mapped according to mapping table form data ciphertext.
2. label data encryption method according to claim 1, it is characterised in that the basis
Mapping table is mapped the data of encrypted data field to be included with forming data ciphertext:
The data of encrypted data field are mapped according to mapping table M2;And
The data of the data field according to mapping table M1 to being mapped by the mapping table M2 map.
3. label data encryption method according to claim 2, it is characterised in that
It is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include:According to predetermined
Bit map is mapped the data of the encrypted data field;And/or
The data of the data field according to mapping table M1 to being mapped by the mapping table M2 are reflected
Penetrate including:The data of the data field mapped by the mapping table M2 are entered according to fate mapping
Row mapping.
4. label data encryption method according to claim 2, it is characterised in that the label
Data ciphering method also include it is following at least one:
The mapping table M1 is generated according to the first random factor R1;And
The mapping table M2 is generated according to the second random factor R2.
5. label data encryption method according to claim 4, it is characterised in that with the mark
The factor generates the first random factor R1 and the second random factor R2 based on the ID of label.
6. label data encryption method according to any one of claim 1 to 5, its feature exists
In the predetermined length is 16 bytes.
7. a kind of label data decryption method, it is characterised in that the label data decryption method includes:
Data are divided at least one data field according to predetermined length;
Inverse mapping is carried out to the data of the data field according to the mapping table for encrypting;And
The data of the data field by inverse mapping are decrypted by protecting key K1.
8. label data decryption method according to claim 7, it is characterised in that the basis
Mapping table for encrypting carries out inverse mapping to the data of the data field to be included:
Inverse mapping is carried out to the data of the data field according to the mapping table M1 for encrypting;And
According to the mapping table M2 for encrypting to the data field according to the mapping table M1 inverse mappings
Data carry out inverse mapping.
9. label data decryption method according to claim 8, it is characterised in that the basis
Mapping table M1 for encrypting carries out inverse mapping to the data of the data field to be included:According to for encrypting
Fate mapping inverse mapping is carried out to the data of the data field.
10. label data decryption method according to claim 8 or claim 9, it is characterised in that described
According to the mapping table M2 for encrypting to the number of the data field according to the mapping table M1 inverse mappings
Include according to inverse mapping is carried out:Mapped to inverse according to the mapping table M1 according to the predetermined bit for encrypting
The data of the data field of mapping carry out inverse mapping.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510994479.XA CN106921488B (en) | 2015-12-25 | 2015-12-25 | Label data encryption method and label data decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510994479.XA CN106921488B (en) | 2015-12-25 | 2015-12-25 | Label data encryption method and label data decryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106921488A true CN106921488A (en) | 2017-07-04 |
CN106921488B CN106921488B (en) | 2020-07-28 |
Family
ID=59455204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510994479.XA Active CN106921488B (en) | 2015-12-25 | 2015-12-25 | Label data encryption method and label data decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106921488B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995433A (en) * | 2019-10-28 | 2020-04-10 | 北京三快在线科技有限公司 | Data encryption method and device, electronic equipment and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080285747A1 (en) * | 2007-05-14 | 2008-11-20 | Samsung Electronics Co., Ltd. | Encryption-based security protection method for processor and apparatus thereof |
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
CN103199995A (en) * | 2013-04-26 | 2013-07-10 | 福建伊时代信息科技股份有限公司 | File encryption method and device |
CN104462994A (en) * | 2014-11-25 | 2015-03-25 | 厦门市美亚柏科信息股份有限公司 | Data encryption and decryption operation method |
CN104680474A (en) * | 2015-02-04 | 2015-06-03 | 四川长虹电器股份有限公司 | Digital image encryption and decryption method |
-
2015
- 2015-12-25 CN CN201510994479.XA patent/CN106921488B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080285747A1 (en) * | 2007-05-14 | 2008-11-20 | Samsung Electronics Co., Ltd. | Encryption-based security protection method for processor and apparatus thereof |
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
CN103199995A (en) * | 2013-04-26 | 2013-07-10 | 福建伊时代信息科技股份有限公司 | File encryption method and device |
CN104462994A (en) * | 2014-11-25 | 2015-03-25 | 厦门市美亚柏科信息股份有限公司 | Data encryption and decryption operation method |
CN104680474A (en) * | 2015-02-04 | 2015-06-03 | 四川长虹电器股份有限公司 | Digital image encryption and decryption method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995433A (en) * | 2019-10-28 | 2020-04-10 | 北京三快在线科技有限公司 | Data encryption method and device, electronic equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106921488B (en) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3917075B1 (en) | Method and apparatus for encrypting and decrypting product information | |
JP5924851B2 (en) | Multi-issuer secure element partition architecture for NFC-enabled devices | |
US9811478B2 (en) | Self-encrypting flash drive | |
CN104217327B (en) | A kind of financial IC card internet terminal and its method of commerce | |
CN1740991B (en) | System and method for using address bits to signal security attributes of data in the address space | |
KR100961737B1 (en) | Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer | |
US11269786B2 (en) | Memory data protection based on authenticated encryption | |
US20080297326A1 (en) | Low Cost RFID Tag Security And Privacy System And Method | |
EP1894148B1 (en) | Transponder system for transmitting key-encrypted information and associated keys | |
CN103326864B (en) | A kind of electronic tag anti-fake authentication method | |
CN103281299B (en) | A kind of ciphering and deciphering device and information processing method and system | |
CN103338110B (en) | RFID safety authentication based on dynamic I D band search key | |
RU2010105691A (en) | METHOD FOR ENCRYPTING A MEMORY CARD AND ASSEMBLY FOR ITS IMPLEMENTATION | |
CN102662874B (en) | Double-interface encryption memory card and management method and system of data in double-interface encryption memory card | |
CN105205416A (en) | Mobile hard disk password module | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
CN103455768B (en) | A kind of USB method for secure storing and system | |
CN106921488A (en) | A kind of label data encryption method and label data decryption method | |
US8320570B2 (en) | Apparatus and method for generating secret key | |
CN101795194B (en) | Method for protecting multi-digital certificate of intelligent card | |
CN207475576U (en) | A kind of safety mobile terminal system based on safety chip | |
CN106778939A (en) | Electronic tag sensor-based system | |
CN102456119A (en) | One-time key scheme used for RFID digital certificate | |
KR20170053056A (en) | Security server using case based reasoning engine and storage medium for installing security function | |
KR20040092669A (en) | A rfid terminal and a tag with security function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |