CN101504712A - Decryption system using wireless radio frequency recognition system and its correlated method - Google Patents

Decryption system using wireless radio frequency recognition system and its correlated method Download PDF

Info

Publication number
CN101504712A
CN101504712A CNA2008100048734A CN200810004873A CN101504712A CN 101504712 A CN101504712 A CN 101504712A CN A2008100048734 A CNA2008100048734 A CN A2008100048734A CN 200810004873 A CN200810004873 A CN 200810004873A CN 101504712 A CN101504712 A CN 101504712A
Authority
CN
China
Prior art keywords
password
radio frequency
frequency identification
decryption
coded data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100048734A
Other languages
Chinese (zh)
Other versions
CN101504712B (en
Inventor
周峰键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MStar Semiconductor Inc Taiwan
Original Assignee
MStar Semiconductor Inc Taiwan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MStar Semiconductor Inc Taiwan filed Critical MStar Semiconductor Inc Taiwan
Priority to CN2008100048734A priority Critical patent/CN101504712B/en
Publication of CN101504712A publication Critical patent/CN101504712A/en
Application granted granted Critical
Publication of CN101504712B publication Critical patent/CN101504712B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a decryption system utilizing a wireless radiofrequency identification system, which comprises a first RFID tag, a decryption module and a second cipher providing device. The first RFID tag is used for storing coded data, wherein the coded data is formed by encoding original data according to a first cipher. The decryption module comprises a RFID reader and a calculation unit, the RFID reader is used for reading the coded data from the first RFID tag, and the calculation unit receives a second cipher under the condition of not using a network and encodes the coded data to acquire the original data according to the second cipher. The second cipher providing device is used for providing the second cipher.

Description

Utilize the decryption system and the correlation technique thereof of radio frequency identification system
Technical field
The invention relates to decryption system and correlation technique thereof, be particularly to utilize the decryption system and the correlation technique thereof of radio frequency identification system.
Background technology
In cryptographic field, it is to utilize private key (private key) Pri that raw data M is encrypted that a kind of method is arranged, be expressed as the coded data of Pri (M) with formation, then with corresponding public key (public key) Pub coded data Pri (M) is encoded again, just can obtain raw data M.And when applying in the manufacturing of product, raw data M can be the authentication information of product, and private key can be provided by manufacturer, and invests on the product when manufacturing a product coded data Pri (M).The user can obtain disclosed public key Pub voluntarily to obtain raw data M then.
Fig. 1 has illustrated and has obtained private key and public key in the known technology to obtain the system schematic of product certification information.As shown in Figure 1, device 101 (being above-mentioned product) are camera, store coded data Pri (M) in it.And the user can utilize mobile electronic device 103 (as mobile phone) to install 101 received code data Pri (M) certainly, and receive public key Pub from server 107 by network, with public key Pub coded data Pri (M) is encoded then, just can obtain raw data M.As mentioned above, raw data M is an authentication information, is correct as if process public key data encrypted therefore, then indication device 101 authentication successs.
Yet because the expenses of surfing Internet of mobile phone is quite expensive, and the function of surfing the Net of mobile phone usually need be with dealer's application and by loaded down with trivial details affirmation process, and the inconvenience that therefore can cause the user is with burden.
Summary of the invention
Therefore, one of purpose of the present invention is for providing a kind of decryption system that utilizes radio frequency identification (RFID) system, and palpus password and deciphering are to obtain raw data to obtain.
One embodiment of the invention have disclosed a kind of decryption system that utilizes radio frequency identification system, comprise a RFID label, deciphering module and the second password generator.The one RFID label is in order to store coded data, and wherein this coded data is that raw data is formed according to first cryptography.Deciphering module comprises RFID reader and computing unit, the RFID reader is in order to reading coded data from a RFID label, computing unit under the situation of not using network, receive second password and according to the aforementioned coded data of second cryptography to obtain raw data.The second password generator is in order to provide second password.
Another embodiment of the present invention has disclosed a kind of decryption method of utilizing radio frequency identification system, comprises: (a) utilize the RFID label to store coded data, wherein coded data is that raw data is formed according to first cryptography; (b) utilize the RFID reader to read coded data from a RFID label; And (c) under the situation of not using network from the second password generator receive second password and according to the aforementioned coded data of second cryptography to obtain raw data.
According to the above embodiments, can avoid the mobile phone use network reception shortcoming that password produced in the known technology.
Description of drawings
Fig. 1 has illustrated and has obtained private key and public key in the known technology to obtain the system schematic of product certification information.
Fig. 2 has illustrated the decryption system that utilizes radio frequency identification system according to one embodiment of the invention.
Fig. 3 has illustrated decryption system shown in Figure 2 and has been applied in and obtains private key and public key to obtain the system schematic of product certification information.
[main element label declaration]
101 devices
103 mobile electronic devices
105 the Internets
107 servers
200 decryption systems
201 RFID labels
203 deciphering modules
205 second password generators
207 RFID readers
209 computing units
301 devices
303 mobile electronic devices
305 gold medal key search devices
307 the Internets
309 label gathering-devices
Embodiment
In the middle of instructions and described claim, used some vocabulary to censure specific element.The person with usual knowledge in their respective areas should understand, and hardware manufacturer may be called same element with different nouns.This instructions and described claim are not used as distinguishing the mode of element with the difference of title, but the criterion that is used as distinguishing with the difference of element on function.Be open term mentioned " comprising " in the middle of instructions and the described request item in the whole text, so should be construed to " comprise but be not limited to ".In addition, " coupling " speech is to comprise any indirect means that are electrically connected that directly reach at this.Therefore, be coupled to second device, then represent this first device can directly be electrically connected in this second device, or be electrically connected to this second device indirectly by other device or connection means if describe first device in the literary composition.
Fig. 2 has illustrated the decryption system that utilizes rfid system 200 according to one embodiment of the invention.As shown in Figure 2, decryption system 200 comprises RFID label 201, deciphering module 203 and the second password generator 205, and deciphering module 203 comprises RFID reader 207 and computing unit 209.RFID label 201 is in order to store coded data, and wherein coded data is that raw data M is formed according to first cryptography.The second password generator is in order to provide second password.RFID reader 207 is in order to read coded data from RFID label 201.Computing unit 209 under the situation of not using network from the second password generator 205 receive second passwords and according to the aforementioned coded data of second cryptography to obtain raw data M.
In this embodiment, first password is private key Pri, second password is public key Pub, therefore RFID reader 207 is to read the coded data Pri (M) that encoded through private key Pri from RFID label 201, and the second password generator 205 provides public key Pub to deciphering module 203.It is noted that first password and second password are not to be limited to private key Pri and public key Pub, paired password all can be applicable to the present invention.That is to say, need only raw data through cryptography, and then just can obtain raw data with another cryptography, such password combination all can be applicable in the present invention.
Fig. 3 has illustrated decryption system shown in Figure 2 and has been applied in and obtains private key and public key to obtain the system schematic of product certification information.In this example, aforesaid RFID label 201 is to be arranged in the device 301, and device 301 is products of desiring to authenticate, is camera in this example.Deciphering module 203 is to be arranged in the mobile electronic device 303.Mobile electronic device 303 is a mobile phone in this example, and deciphering module 203 can share computing unit 209 with mobile electronic device 303, so can not must extra cost.
The second password generator 205 can be golden key search device 305, and it can utilize the Internet 307 to obtain public key Pub by server etc.And the deciphering module 203 in the mobile electronic device 303 can utilize wireless telecommunication system such as bluetooth, infrared ray etc. to receive public key Pub from golden key search device 305.In addition, store from the Internet 307 obtained public key Pub if golden key search device 305 has the RFID label, then deciphering module 203 can utilize RFID reader 207 to receive public key Pub from golden key search device 305.And then encode aforementioned coded data Pri (M) to obtain raw data M with this public key Pub.
In addition, the second password generator 205 also can be label gathering-device 309.Label gathering-device 309 comprises a plurality of RFID labels (not illustrating), and these RFID labels store a plurality of candidate's public keys respectively.Deciphering module 203 utilizes RFID reader 207 to read one with as public key Pub in candidate's public key.Know as is known to the person skilled in the art, must link up through communications protocol between RFID reader and the RFID label, therefore RFID reader 207 can read corresponding RFID label from a plurality of RFID labels that label gathering-device 309 is comprised according to the RFID label in the device 301, to obtain correct public key Pub.And then encode aforementioned coded data Pri (M) to obtain raw data M with this public key Pub.
Aforesaid golden key search device 305 and label gathering-device 309 can be arranged in the sales field that sells product 301, so the user can finish authentication easily when buying product.
According to above-mentioned content, can push away easily corresponding decryption method, so do not repeat them here.
According to the above embodiments, can avoid the mobile phone use network reception shortcoming that password produced in the known technology, and can increase the convenience that the user authenticates.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to claim scope of the present invention change and modify, and all should belong to covering scope of the present invention.

Claims (16)

1. decryption system that utilizes radio frequency identification system comprises:
First wireless radio frequency identification mark, in order to store coded data, wherein this coded data is that raw data is formed according to first cryptography;
Deciphering module comprises:
RFID reader reads this coded data in order to this first wireless radio frequency identification mark certainly; And
Computing unit is coupled to this RFID reader, under the situation of not using network, receive second password and according to this this coded data of second cryptography to obtain this raw data; And
The second password generator is in order to provide this second password.
2. decryption system according to claim 1, wherein this first password is a private key, and this second password is a public key.
3. decryption system according to claim 1, wherein this first wireless radio frequency identification mark is to be arranged in specific device, and this raw data comprises the authentication information of this specific device.
4. decryption system according to claim 1, wherein this deciphering module is to be positioned at the packaged type electronic installation.
5. decryption system according to claim 4, wherein this packaged type electronic installation is a mobile phone, and this deciphering module and shared this computing unit of this mobile phone.
6. decryption system according to claim 1, wherein this second password generator utilizes network to obtain this second password.
7. decryption system according to claim 6, wherein this deciphering module also comprises wireless telecommunication system and receives this second password with this second password generator certainly.
8. decryption system according to claim 6, wherein this deciphering module utilizes this RFID reader to receive this second password from this second password generator.
9. decryption system according to claim 1, wherein this second password generator comprises a plurality of second wireless radio frequency identification marks, and those second wireless radio frequency identification marks store a plurality of candidate's second passwords respectively, and this deciphering module utilizes this RFID reader to read one with as this second password in those candidate's second passwords.
10. decryption method of utilizing radio frequency identification system comprises:
(a) utilize wireless radio frequency identification mark to store coded data, wherein this coded data is that raw data is formed according to first cryptography;
(b) utilize RFID reader to read this coded data from this first wireless radio frequency identification mark; And
(c) under the situation of not using network from the second password generator receive second password and according to this this coded data of second cryptography to obtain this raw data.
11. decryption method according to claim 10, wherein this first password is a private key, and this second password is a public key.
12. decryption method according to claim 10, wherein this first wireless radio frequency identification mark is to be arranged in specific device, and this raw data comprises the authentication information of this specific device.
13. decryption method according to claim 10, wherein this second password generator utilizes network to obtain this second password.
14. decryption method according to claim 13, wherein this step (c) also comprises and utilizes wireless telecommunication system to receive this second password from this second password generator.
15. decryption method according to claim 13, wherein this step (c) also comprises and utilizes this RFID reader to receive this second password from this second password generator.
16. decryption method according to claim 10, wherein this second password generator comprises a plurality of second wireless radio frequency identification marks, and those second wireless radio frequency identification marks store a plurality of candidate's second passwords respectively, and this step (b) utilizes this RFID reader to read one with as this second password in those candidate's second passwords.
CN2008100048734A 2008-02-05 2008-02-05 Decryption system using wireless radio frequency recognition system and its correlated method Expired - Fee Related CN101504712B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100048734A CN101504712B (en) 2008-02-05 2008-02-05 Decryption system using wireless radio frequency recognition system and its correlated method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100048734A CN101504712B (en) 2008-02-05 2008-02-05 Decryption system using wireless radio frequency recognition system and its correlated method

Publications (2)

Publication Number Publication Date
CN101504712A true CN101504712A (en) 2009-08-12
CN101504712B CN101504712B (en) 2011-01-12

Family

ID=40976953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100048734A Expired - Fee Related CN101504712B (en) 2008-02-05 2008-02-05 Decryption system using wireless radio frequency recognition system and its correlated method

Country Status (1)

Country Link
CN (1) CN101504712B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509127A (en) * 2011-09-26 2012-06-20 上海中科高等研究院 Passive radio frequency identification safety certification system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2678018Y (en) * 2004-01-08 2005-02-09 上海华申智能卡应用系统有限公司 Double-frequency hand electronic label read-write apparatus
CN100409252C (en) * 2005-11-29 2008-08-06 彭枫 General anticounterfeiting method and system
CN1949250A (en) * 2006-07-10 2007-04-18 王耀 System and method of identifying electronic tag using mobile communication equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509127A (en) * 2011-09-26 2012-06-20 上海中科高等研究院 Passive radio frequency identification safety certification system and method
CN102509127B (en) * 2011-09-26 2014-08-27 中国科学院上海高等研究院 Passive radio frequency identification safety certification system and method

Also Published As

Publication number Publication date
CN101504712B (en) 2011-01-12

Similar Documents

Publication Publication Date Title
US8412638B2 (en) Method and system for validating a device that uses a dynamic identifier
ES2254131T3 (en) PROTECTION OF BIOMETRIC DATA VIA KEY DEPENDENT SAMPLING.
US8478990B2 (en) Mobile transaction methods and devices with three-dimensional colorgram tokens
US8868902B1 (en) Characteristically shaped colorgram tokens in mobile transactions
US8171531B2 (en) Universal authentication token
US20150089241A1 (en) Image Sensor and Payment Authentication Method
US8874910B2 (en) Method for implementing encryption and device thereof
KR101296137B1 (en) A mobile phone id card security methods and system by the using of qr code
CN104885404B (en) Method for mutual authentication between radio tag and reader
KR20150110515A (en) Method for authentication a user with respect to a machine
CN101765996A (en) Remote Authentication And Transaction Signatures
CN101551840A (en) Camera module and authentication system
CN101340283A (en) Multisystem biometric token
US8205088B2 (en) Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine
US20090235074A1 (en) System and method for performing a transaction
US20070136604A1 (en) Method and system for managing secure access to data in a network
KR100728629B1 (en) System and Method for Preventing Forgery of RFID Tag
US8188840B2 (en) Authenticating method and identification system
KR101240231B1 (en) A mobile phone id card security system
CN108885656A (en) account access
US10748053B2 (en) Ticket authentication method and ticket authentication device
US20040230812A1 (en) Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method
CN101504712B (en) Decryption system using wireless radio frequency recognition system and its correlated method
US10700868B2 (en) Security systems and methods for electronic devices
CN103475623A (en) Dynamic barcode certification system and its certification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110112

Termination date: 20190205