CN100545861C - A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights - Google Patents

A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights Download PDF

Info

Publication number
CN100545861C
CN100545861C CNB2007100470721A CN200710047072A CN100545861C CN 100545861 C CN100545861 C CN 100545861C CN B2007100470721 A CNB2007100470721 A CN B2007100470721A CN 200710047072 A CN200710047072 A CN 200710047072A CN 100545861 C CN100545861 C CN 100545861C
Authority
CN
China
Prior art keywords
radio
frequency
tag
key
security module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2007100470721A
Other languages
Chinese (zh)
Other versions
CN101159032A (en
Inventor
王洁民
陈坚
王伟
顾震
康健
陈渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Huashen Smart IC Card Application System Co Ltd
Original Assignee
Shanghai Huashen Smart IC Card Application System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huashen Smart IC Card Application System Co Ltd filed Critical Shanghai Huashen Smart IC Card Application System Co Ltd
Priority to CNB2007100470721A priority Critical patent/CN100545861C/en
Publication of CN101159032A publication Critical patent/CN101159032A/en
Application granted granted Critical
Publication of CN100545861C publication Critical patent/CN100545861C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A kind of with the radio-frequency (RF) tag storage organization that transmission is encrypted and access rights are controlled, this radio-frequency (RF) tag storage organization comprises control of authority district, key district, storage block; The control authority of corresponding all storage blocks in control of authority district; The key district is provided with n key, is respectively KEY 0~KEY n, corresponding memory address is from 0~n; Each storage block is divided into two of data block and blocks of values, by control of authority area definition type.The advantage of CPU contact card that the present invention is integrated and radio frequency stream encryption card based on the stream encryption certified transmission of key, is supported the rights management of key during access tag, supports close use-patterns of using more.

Description

A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights
Technical field
The present invention relates to a kind of radio-frequency (RF) tag storage organization, particularly a kind of is the radio-frequency (RF) tag storage organization that the band transmission is encrypted and access rights are controlled of transmission medium with the radio communication.
Background technology
The high-frequency electronic label is present most popular radio-frequency (RF) tag product, and traditional radio-frequency (RF) tag does not have the control of encryption and authority when visit, easily cause losing of data.
Summary of the invention
Technical matters of the present invention is that a kind of radio-frequency (RF) tag storage organization that the band transmission is encrypted and access rights are controlled that radio-frequency (RF) tag is provided with encryption and control of authority of visiting will be provided.
In order to solve above technical matters, the invention provides a kind of radio-frequency (RF) tag storage organization with transmission encryption and access rights control, this radio-frequency (RF) tag storage organization comprises control of authority district, key district, storage block; The control authority of corresponding all storage blocks in control of authority district; The key district is provided with n key, is respectively KEY 0~KEY n, corresponding memory address is from 0~n; Each storage block is divided into two of data block and blocks of values, by control of authority area definition type.
The authority setting of corresponding each storage block in described control of authority district comprises: data type, read operation access key address, read/write operation access key address and check bit.
Described read operation access key address or depreciation operational access cipher key address.
Described read/write operation access key address or add/depreciation operational access cipher key address.
Described data block is a data storage, and it is effectively ordered and is reading and writing.
Outside the existing data storage of described blocks of values, the reading and writing effective order, add in addition, subtract, recovery and transfer command.
A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
It is with the interior essential information of label that described key is dispersed, and passes through the key that specific algorithm produces as unique identification sign indicating number, sequence number.
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
Superior effect of the present invention is: the advantage of CPU contact card that the present invention is integrated and radio frequency stream encryption card, based on the stream encryption certified transmission of key, support the rights management of key during access tag, and support close use-patterns of using more.
Description of drawings
Fig. 1 is the structural representation of radio-frequency (RF) tag storage organization of the present invention;
The process flow diagram of Fig. 2 for visiting between radio-frequency (RF) tag of the present invention and the read write line;
Fig. 3 is the process flow diagram that the transmission encrypting and authenticating adopts the stream encryption method among Fig. 2;
The number in the figure explanation
1-control of authority district; 2-key district;
The 3-storage block; 4-manufacturer piece.
Embodiment
See also shown in the accompanying drawing, the invention will be further described.
As shown in Figure 1, the invention provides a kind of radio-frequency (RF) tag storage organization with transmission encryption and access rights control, this radio-frequency (RF) tag storage organization comprises control of authority district 1, key district 2, storage block 3; The control authority of control of authority district 1 corresponding all storage blocks 3; Key district 2 is provided with n key, is respectively KEY 0~KEY n, default value is KEY 0, corresponding memory address is from 0~n; Each storage block 3 is divided into two of data block and blocks of values, and by control of authority district 1 define styles, data block is a data storage, its effectively order be reading and writing; Outside the existing data storage of blocks of values, the reading and writing effective order, add in addition, subtract, recovery and transfer command.
The authority setting of control of authority district 1 corresponding each storage block 3 comprises: data type, read operation access key address, read/write operation access key address and check bit; Read operation access key address or depreciation operational access cipher key address; Read/write operation access key address or add/depreciation operational access cipher key address.
Also comprise manufacturer's piece 4, establish IC manufacturer information, sequence number in it, for the needs of safety and system, after IC manufacturer programmed sintering in process of production, this manufacturer's piece 4 was write-protected, in can't permit modification.
As shown in Figure 2, the invention provides a kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
It is with the interior essential information of label that described key is dispersed, and passes through the key that specific algorithm produces as unique identification sign indicating number, sequence number.
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
As shown in Figure 3, the transmission encrypting and authenticating adopts the method step of stream encryption to be:
1) read write line is by the selected label that will visit of ' selection ' instruction;
2) send ' random number request ' instruction then, comprise the sector number that will visit in ' random number request ' instruction, it has determined the key that label will adopt when deciphering;
3) after label is received ' random number request ' instruction, return the random number of generation; If the key of memory block is not set up, label will not return random number;
4) after read write line is received the random number that comes from selected label, generate the encrypted data chunk 1 of access instruction and send to label by the internal security module;
5) label is received encrypted data chunk 1 back by specifying key to be decrypted, and data block is effective if random number is identical, echo reply encrypted data chunk 2, otherwise do not return any data;
6) read write line receive label reply encrypted data chunk 2 after be decrypted, if effectively then receive data, otherwise then abandon data.
IV is an initial vector among Fig. 3, and Token1 is an encrypted data chunk 1, and Token2 is an encrypted data chunk 2.

Claims (2)

1, a kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag with this random number request instruction coding back by the radio frequency transmission module;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
It is with the essential information in the label that described key is dispersed instruction, by the key of specific algorithm generation;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
2, by the described a kind of transmission method of claim 1, it is characterized in that with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights:
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
CNB2007100470721A 2007-10-16 2007-10-16 A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights Active CN100545861C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100470721A CN100545861C (en) 2007-10-16 2007-10-16 A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100470721A CN100545861C (en) 2007-10-16 2007-10-16 A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights

Publications (2)

Publication Number Publication Date
CN101159032A CN101159032A (en) 2008-04-09
CN100545861C true CN100545861C (en) 2009-09-30

Family

ID=39307119

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100470721A Active CN100545861C (en) 2007-10-16 2007-10-16 A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights

Country Status (1)

Country Link
CN (1) CN100545861C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308546B (en) * 2008-05-20 2011-04-20 上海华申智能卡应用系统有限公司 Radio frequency label data protection method of safe storage structure having multi-stage protection
CN101937586A (en) * 2010-09-10 2011-01-05 上海贝岭股份有限公司 Access control system of residential community
CN101976362B (en) * 2010-09-30 2013-07-03 中兴通讯股份有限公司 Radio frequency identification tag access method based on bitmap and device
CN102122365A (en) * 2011-02-28 2011-07-13 中国电子技术标准化研究所 Method for accessing label storage area in radio frequency identification system and label
CN102291241B (en) * 2011-09-15 2014-01-22 重庆市城投金卡信息产业股份有限公司 Encryption and decryption method and device for multi-data security module
CN103595784A (en) * 2013-11-11 2014-02-19 北京京东尚科信息技术有限公司 File sharing method and system
CN110490276A (en) * 2018-05-14 2019-11-22 北京中金国衡收藏钱币鉴定评级有限公司 Authentication box and authentication method

Also Published As

Publication number Publication date
CN101159032A (en) 2008-04-09

Similar Documents

Publication Publication Date Title
CN100545861C (en) A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
EP2297667B1 (en) System of providing a fixed identification of a transponder while keeping privacy and avoiding tracking
JP4974613B2 (en) IC memory, access device for IC memory, and validity verification method
CN103902402B (en) RF tag safety chip equipment and its data processing method
CN101561751A (en) USB encryption and decryption bridging chip
CN101976362B (en) Radio frequency identification tag access method based on bitmap and device
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN102289688B (en) Method and device for label processing and access
CN101004797A (en) Method for safely storing data in smart card with large capacity
CN102662874B (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN101593286B (en) Radio-frequency identification label and identification method
CN101883357A (en) Method, device and system for mutual authentication between terminal and intelligent card
CN201387612Y (en) Agricultural and animal product circulation supervising device
CN113988103B (en) RFID identification method based on multiple tags
CN100362528C (en) Contactless CPU card compatible to logic encryption card
CN104951823A (en) Composite card management method and system
CN102945384A (en) Method for enhancing high-frequency RFID (radio frequency identification) safety
CN101470873A (en) Method for implementing interaction with intelligent memory card in multi-file read-write mode
CN103136552B (en) A kind of method and system protecting RFID tag data
CN102110038B (en) Hardware test circuit structure applied in security chip
CN103905199B (en) Digital certificate storage method applied to RFID card
KR20040092670A (en) A method for certifying a rfid tag with security function
CN103106421B (en) Electronic tag encryption method and charging administration system based on 18000-6C standard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant