CN100545861C - A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights - Google Patents
A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights Download PDFInfo
- Publication number
- CN100545861C CN100545861C CNB2007100470721A CN200710047072A CN100545861C CN 100545861 C CN100545861 C CN 100545861C CN B2007100470721 A CNB2007100470721 A CN B2007100470721A CN 200710047072 A CN200710047072 A CN 200710047072A CN 100545861 C CN100545861 C CN 100545861C
- Authority
- CN
- China
- Prior art keywords
- radio
- frequency
- tag
- key
- security module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
A kind of with the radio-frequency (RF) tag storage organization that transmission is encrypted and access rights are controlled, this radio-frequency (RF) tag storage organization comprises control of authority district, key district, storage block; The control authority of corresponding all storage blocks in control of authority district; The key district is provided with n key, is respectively KEY
0~KEY
n, corresponding memory address is from 0~n; Each storage block is divided into two of data block and blocks of values, by control of authority area definition type.The advantage of CPU contact card that the present invention is integrated and radio frequency stream encryption card based on the stream encryption certified transmission of key, is supported the rights management of key during access tag, supports close use-patterns of using more.
Description
Technical field
The present invention relates to a kind of radio-frequency (RF) tag storage organization, particularly a kind of is the radio-frequency (RF) tag storage organization that the band transmission is encrypted and access rights are controlled of transmission medium with the radio communication.
Background technology
The high-frequency electronic label is present most popular radio-frequency (RF) tag product, and traditional radio-frequency (RF) tag does not have the control of encryption and authority when visit, easily cause losing of data.
Summary of the invention
Technical matters of the present invention is that a kind of radio-frequency (RF) tag storage organization that the band transmission is encrypted and access rights are controlled that radio-frequency (RF) tag is provided with encryption and control of authority of visiting will be provided.
In order to solve above technical matters, the invention provides a kind of radio-frequency (RF) tag storage organization with transmission encryption and access rights control, this radio-frequency (RF) tag storage organization comprises control of authority district, key district, storage block; The control authority of corresponding all storage blocks in control of authority district; The key district is provided with n key, is respectively KEY
0~KEY
n, corresponding memory address is from 0~n; Each storage block is divided into two of data block and blocks of values, by control of authority area definition type.
The authority setting of corresponding each storage block in described control of authority district comprises: data type, read operation access key address, read/write operation access key address and check bit.
Described read operation access key address or depreciation operational access cipher key address.
Described read/write operation access key address or add/depreciation operational access cipher key address.
Described data block is a data storage, and it is effectively ordered and is reading and writing.
Outside the existing data storage of described blocks of values, the reading and writing effective order, add in addition, subtract, recovery and transfer command.
A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
It is with the interior essential information of label that described key is dispersed, and passes through the key that specific algorithm produces as unique identification sign indicating number, sequence number.
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
Superior effect of the present invention is: the advantage of CPU contact card that the present invention is integrated and radio frequency stream encryption card, based on the stream encryption certified transmission of key, support the rights management of key during access tag, and support close use-patterns of using more.
Description of drawings
Fig. 1 is the structural representation of radio-frequency (RF) tag storage organization of the present invention;
The process flow diagram of Fig. 2 for visiting between radio-frequency (RF) tag of the present invention and the read write line;
Fig. 3 is the process flow diagram that the transmission encrypting and authenticating adopts the stream encryption method among Fig. 2;
The number in the figure explanation
1-control of authority district; 2-key district;
The 3-storage block; 4-manufacturer piece.
Embodiment
See also shown in the accompanying drawing, the invention will be further described.
As shown in Figure 1, the invention provides a kind of radio-frequency (RF) tag storage organization with transmission encryption and access rights control, this radio-frequency (RF) tag storage organization comprises control of authority district 1, key district 2, storage block 3; The control authority of control of authority district 1 corresponding all storage blocks 3; Key district 2 is provided with n key, is respectively KEY
0~KEY
n, default value is KEY
0, corresponding memory address is from 0~n; Each storage block 3 is divided into two of data block and blocks of values, and by control of authority district 1 define styles, data block is a data storage, its effectively order be reading and writing; Outside the existing data storage of blocks of values, the reading and writing effective order, add in addition, subtract, recovery and transfer command.
The authority setting of control of authority district 1 corresponding each storage block 3 comprises: data type, read operation access key address, read/write operation access key address and check bit; Read operation access key address or depreciation operational access cipher key address; Read/write operation access key address or add/depreciation operational access cipher key address.
Also comprise manufacturer's piece 4, establish IC manufacturer information, sequence number in it, for the needs of safety and system, after IC manufacturer programmed sintering in process of production, this manufacturer's piece 4 was write-protected, in can't permit modification.
As shown in Figure 2, the invention provides a kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
It is with the interior essential information of label that described key is dispersed, and passes through the key that specific algorithm produces as unique identification sign indicating number, sequence number.
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
As shown in Figure 3, the transmission encrypting and authenticating adopts the method step of stream encryption to be:
1) read write line is by the selected label that will visit of ' selection ' instruction;
2) send ' random number request ' instruction then, comprise the sector number that will visit in ' random number request ' instruction, it has determined the key that label will adopt when deciphering;
3) after label is received ' random number request ' instruction, return the random number of generation; If the key of memory block is not set up, label will not return random number;
4) after read write line is received the random number that comes from selected label, generate the encrypted data chunk 1 of access instruction and send to label by the internal security module;
5) label is received encrypted data chunk 1 back by specifying key to be decrypted, and data block is effective if random number is identical, echo reply encrypted data chunk 2, otherwise do not return any data;
6) read write line receive label reply encrypted data chunk 2 after be decrypted, if effectively then receive data, otherwise then abandon data.
IV is an initial vector among Fig. 3, and Token1 is an encrypted data chunk 1, and Token2 is an encrypted data chunk 2.
Claims (2)
1, a kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights, read write line is provided with security module, radio frequency transmission module and CPU microprocessor, and the step of this transmission method is:
1) beginning;
2) the CPU microprocessor sends anti-a collision and inquires instruction;
3) security module sends to radio-frequency (RF) tag by the radio frequency transmission module after with this order number;
4) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
5) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
6) the CPU microprocessor sends select command;
7) security module sends to radio-frequency (RF) tag with this select command coding back by the radio frequency transmission module;
8) judge whether echo reply of radio-frequency (RF) tag; , do not change the 2nd) step;
9) be that security module is delivered to the CPU microprocessor after radio-frequency (RF) tag is replied decoding;
10) the CPU microprocessor sends the random number request instruction;
11) security module sends to radio-frequency (RF) tag with this random number request instruction coding back by the radio frequency transmission module;
12) judge whether echo reply random number R 1 of radio-frequency (RF) tag; , do not change the 6th) step;
13) be that security module is replied decoding and storage R1 with radio-frequency (RF) tag;
14) the CPU microprocessor sends key and disperses instruction;
It is with the essential information in the label that described key is dispersed instruction, by the key of specific algorithm generation;
15) security module generates access key and random number R 2, set stream encryption;
16) the CPU microprocessor sends access instruction;
17) security module carries out this visit instruction to send to radio-frequency (RF) tag by the radio frequency transmission module behind stream encryption computing and the coding;
18) judge whether echo reply of radio-frequency (RF) tag; , do not change the 22nd) step;
19) be that security module is replied radio-frequency (RF) tag and is decrypted computing;
20) judge R2 '=R2; , do not change the 22nd) step;
21) be that replying that security module will be deciphered sends to the CPU microprocessor;
22) security module is removed link encryption, clear R1, R2;
23) finish.
2, by the described a kind of transmission method of claim 1, it is characterized in that with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights:
Described random number request instruction contains the sector number of visit, the key that this sector number has adopted when having determined the radio-frequency (RF) tag deciphering.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007100470721A CN100545861C (en) | 2007-10-16 | 2007-10-16 | A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007100470721A CN100545861C (en) | 2007-10-16 | 2007-10-16 | A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101159032A CN101159032A (en) | 2008-04-09 |
CN100545861C true CN100545861C (en) | 2009-09-30 |
Family
ID=39307119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2007100470721A Active CN100545861C (en) | 2007-10-16 | 2007-10-16 | A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100545861C (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101308546B (en) * | 2008-05-20 | 2011-04-20 | 上海华申智能卡应用系统有限公司 | Radio frequency label data protection method of safe storage structure having multi-stage protection |
CN101937586A (en) * | 2010-09-10 | 2011-01-05 | 上海贝岭股份有限公司 | Access control system of residential community |
CN101976362B (en) * | 2010-09-30 | 2013-07-03 | 中兴通讯股份有限公司 | Radio frequency identification tag access method based on bitmap and device |
CN102122365A (en) * | 2011-02-28 | 2011-07-13 | 中国电子技术标准化研究所 | Method for accessing label storage area in radio frequency identification system and label |
CN102291241B (en) * | 2011-09-15 | 2014-01-22 | 重庆市城投金卡信息产业股份有限公司 | Encryption and decryption method and device for multi-data security module |
CN103595784A (en) * | 2013-11-11 | 2014-02-19 | 北京京东尚科信息技术有限公司 | File sharing method and system |
CN110490276A (en) * | 2018-05-14 | 2019-11-22 | 北京中金国衡收藏钱币鉴定评级有限公司 | Authentication box and authentication method |
-
2007
- 2007-10-16 CN CNB2007100470721A patent/CN100545861C/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN101159032A (en) | 2008-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100545861C (en) | A kind of transmission method with the radio-frequency (RF) tag storage organization that transmits the control of encryption and access rights | |
CN101923660B (en) | Dynamic password identity authorization system and method based on RFID | |
EP2297667B1 (en) | System of providing a fixed identification of a transponder while keeping privacy and avoiding tracking | |
JP4974613B2 (en) | IC memory, access device for IC memory, and validity verification method | |
CN103902402B (en) | RF tag safety chip equipment and its data processing method | |
CN101561751A (en) | USB encryption and decryption bridging chip | |
CN101976362B (en) | Radio frequency identification tag access method based on bitmap and device | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN102289688B (en) | Method and device for label processing and access | |
CN101004797A (en) | Method for safely storing data in smart card with large capacity | |
CN102662874B (en) | Double-interface encryption memory card and management method and system of data in double-interface encryption memory card | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
CN101593286B (en) | Radio-frequency identification label and identification method | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card | |
CN201387612Y (en) | Agricultural and animal product circulation supervising device | |
CN113988103B (en) | RFID identification method based on multiple tags | |
CN100362528C (en) | Contactless CPU card compatible to logic encryption card | |
CN104951823A (en) | Composite card management method and system | |
CN102945384A (en) | Method for enhancing high-frequency RFID (radio frequency identification) safety | |
CN101470873A (en) | Method for implementing interaction with intelligent memory card in multi-file read-write mode | |
CN103136552B (en) | A kind of method and system protecting RFID tag data | |
CN102110038B (en) | Hardware test circuit structure applied in security chip | |
CN103905199B (en) | Digital certificate storage method applied to RFID card | |
KR20040092670A (en) | A method for certifying a rfid tag with security function | |
CN103106421B (en) | Electronic tag encryption method and charging administration system based on 18000-6C standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |