CN101739538A - Method for encrypting and verifying ISO18000-6C electronic tag - Google Patents

Method for encrypting and verifying ISO18000-6C electronic tag Download PDF

Info

Publication number
CN101739538A
CN101739538A CN200810203327A CN200810203327A CN101739538A CN 101739538 A CN101739538 A CN 101739538A CN 200810203327 A CN200810203327 A CN 200810203327A CN 200810203327 A CN200810203327 A CN 200810203327A CN 101739538 A CN101739538 A CN 101739538A
Authority
CN
China
Prior art keywords
rfid
read
electronic tag
write
iso18000
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810203327A
Other languages
Chinese (zh)
Inventor
黄银龙
朱彤
赵一鉴
邱瑾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN200810203327A priority Critical patent/CN101739538A/en
Publication of CN101739538A publication Critical patent/CN101739538A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method used for encrypting and verifying the data of an RFID electronic tag conforming to an ISO18000-6C standard, which comprises an RFID electronic tag of a passive UHF frequency band conforming to the ISO18000-6C standard, an elliptic algorithm (ECC algorithm), an RFID read-write device used for carrying out information communication with the RFID tag, an RFID read-write device processing information or an upper-layer program controlling the read-write of the RFID read-write device, and a method for encrypting, decrypting, signing and attesting the data of the RFID electronic tag. By two processes of data write-in and data read, the safety problem of the internal memory information of the tag, which is possibly caused in such a way that any compatible reader-writer carries out read-write operation on the data of the electronic tag because of conforming to the ISO18000-6C standard, is solved, and the aim used for encrypting and verifying the data of the RFID electronic tag is realized.

Description

The encryption of ISO18000-6C electronic tag and verification method
Technical field
Patent of the present invention relates to a kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking, particularly meets passive uhf band RFID electronic tag data encryption and decryption and the signature and the checking of ISO18000-6C standard.
Background technology
The Chinese of Radio Frequency Identification (RFID) is the radio frequency automatic identification technology.Radio frequency automatic identification is mainly by read write line be arranged on mutual information transmission between the label that is identified on the object, transferring to communication base station by the read write line great deal of related information that label is entrained handles, and set up database on the control backstage with the form of Network Transmission, realize article " information resources socialization " management function.Relatively with traditional recognition method such as bar code recognition, image recognition, bio-identification, voice recognitions, radio-frequency (RF) identification has little, noncontact affected by environment, contain much information and variable, anti-counterfeiting is functional, adaptation is handled on a large scale and be convenient to advantage such as unified management.Simultaneously, radio-frequency (RF) identification can and improve its production efficiency for the new production and operation mode of providing of relevant industries, as an emerging technology, its application and application are constantly expanded and are deepened, and construction plays dual impetus to national economy and social IT application.
In recent years, because constantly perfect, the decline of application cost of radio frequency automatic identification standard and wideling popularize of national governments and each large enterprises, the application of RFID presented the situation of quick growth.Mechanism's prediction is arranged, the coming years, huge business opportunity will be brought for RFID in open market, the whole world, by 2009, whole world RFID market scale will be increased sharply to 10,000,000,000 dollars, be widely used in fields such as gate inhibition's control, asset management, supply chain management, communications and transportation, motion and health care.
At present, at " mass transit card " that use in the numerous cities of China, much all built-in RFID chip, also implanted RFID chip in the hundreds of millions of resident identification card of China, it is false proof that Beijing Olympic Games admission ticket in 2008 has also adopted the RFID technology to carry out.In logistics field, be that the container automatic recognition system of core has become main flow gradually with RFID, logistics links such as RFID storage abroad, dispensing have obtained successful Application especially.At field of traffic, China railways department relies on the RFID technology to be implemented in national uniform dispatching vehicle, has reduced management hierarchy, has improved the efficiency of management.And at aspects such as China's fire control equipment management, safe coal management, urban public utilities management, medical control, agricultural product managements, RFID also begins to attempt application.
But the RFID electronic tag of passive uhf band is because of following the ISO18000-6C standard, may cause any compatible read write line to carry out read-write operation to electronic tag data and produces the safety problem of label memory information.Therefore the data security problem of the RFID electronic tag of passive uhf band is to limit the one of the main reasons of its development and application.
The patent of invention content
Patent of the present invention technical matters to be solved is to solve because of following the ISO18000-6C standard, may cause any compatible read write line to carry out read-write operation and the safety problem of the label memory information that produces to electronic tag data.Can be applied to the field that the RFID electronic tag of passive uhf band is had relatively high expectations to security performance to special article monitoring, automobile burglar and gate inhibition's passage etc.
Patent of the present invention technical matters to be solved can following technical scheme realize:
A kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking, by passive uhf band RFID electronic tag data is utilized ISO18000-6C standard label identification number (Tag-identification, TID), adopt oval algorithm (ECC algorithm) to encrypt and verify, it is characterized in that it comprises: the passive uhf band RFID electronic tag of following the ISO18000-6C standard; Oval algorithm (ECC algorithm); In order to carry out the reading device of information communication with described RFID label; The RFID electronic tag data is carried out the method for encryption and decryption and signature and checking.
In the patent of the present invention, between RFID label and the RFID read-write equipment with the communication of RFID communication modes.The upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment is carried out encryption and decryption and signature and checking with oval algorithm (ECC algorithm) to the RFID electronic tag data, and its process is write with two relatively independent processes of data read by data to be formed.
Data write: the RFID read-write equipment read ISO18000-6C standard label identification number (Tag-identification, TID).The upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment is encrypted the data that write according to ISO18000-6C standard label identification number and needs and is carried out encryption with oval cryptographic algorithm (ECC cryptographic algorithm) and PKI, the formation encrypted packets; The data (comprising clear data package informatin, enciphered data package informatin) that the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment writes according to ISO18000-6C standard label identification number and needs are with the processing of signing of oval signature algorithm (ECC signature algorithm) and private key, formation signature packet.The RFID read-write equipment writes electronic tag with clear data bag, encrypted packets and signature packet.
Data read: the RFID read-write equipment read ISO18000-6C standard label identification number (Tag-identification, TID) and electronic tag data.The upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment is according to ISO18000-6C standard label identification number (Tag-identification, TID) and encrypted packets be decrypted processing, restoring data information with oval decipherment algorithm (ECC decipherment algorithm) and private key; The upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment according to ISO18000-6C standard label identification number (Tag-identification, TID) and signature packet test with ellipse and sign algorithm (ECC tests and signs algorithm) and PKI and the data (comprising clear data package informatin, enciphered data package informatin) that read are tested to sign handle.
Patent of the present invention design is a kind of to be used to meet the data encryption of RFID electronic tag of ISO18000-6C standard and the method for checking, write and two processes of data read by data, solve because of following the ISO18000-6C standard, may cause any compatible read write line to carry out read-write operation and the safety problem of the label memory information that produces, realize being used for that the RFID electronic tag data is encrypted and the purpose of checking electronic tag data.
Description of drawings
Fig. 1 is the process flow diagram of RFID electronic tag data ablation process;
Fig. 2 reads the process flow diagram of process for the RFID electronic tag data.
Embodiment
For technological means, creation characteristic that patent of the present invention is realized, reach purpose and effect is easy to understand, below in conjunction with concrete diagram, further set forth patent of the present invention.
As shown in Figure 1, the flow process of RFID electronic tag data ablation process is:
1, the RFID read-write equipment read ISO18000-6C standard label identification number (Tag-identification, TID).
2, the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment is encrypted the data that write according to ISO18000-6C standard label identification number and needs and is carried out encryption with oval cryptographic algorithm (ECC cryptographic algorithm) and PKI, the formation encrypted packets.
3, the data (comprising clear data package informatin, enciphered data package informatin) that write according to ISO18000-6C standard label identification number and needs of the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment are with the processing of signing of oval signature algorithm (ECC signature algorithm) and private key, formation signature packet.
4, the RFID read-write equipment writes electronic tag with clear data bag, encrypted packets and signature packet.
As shown in Figure 2, the RFID electronic tag data reads the flow process of process and is:
1, the RFID read-write equipment read ISO18000-6C standard label identification number (Tag-identification, TID) and electronic tag data.
2, the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment is according to ISO18000-6C standard label identification number (Tag-identification, TID) and encrypted packets be decrypted processing, restoring data information with oval decipherment algorithm (ECC decipherment algorithm) and private key.
3, the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment according to ISO18000-6C standard label identification number (Tag-identification, TID) and signature packet test with ellipse and sign algorithm (ECC tests and signs algorithm) and PKI and the data (comprising clear data package informatin, enciphered data package informatin) that read are tested to sign handle.
Patent of the present invention " a kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking " can be applied in large-scale collective activity that security performance is had relatively high expectations and the momentous conference information encryption in the RFID certificate and checking.
Domestic and international in recent years great politics and social activities are of a great variety, various international summit forums, national political meeting, provincial, and municipal level political meeting and megaevent, fair, exhibition or the like occasion exists different separately working routines in the meeting affairs arrangement aspect active organization, particularly great political activity and great social activities difference in this respect.Add condition differences such as area, environment, place, thereby also just be not quite similar that these all propose new requirement to security in the demand of registering, checking, report for work and link such as demonstration having produced certificate management function, service item and technical indicator etc.In large-scale collective activity and momentous conference, each participant all is required to use one and the corresponding RFID label of own personal identification, adopt " a kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking ", can realize information encryption in the RFID certificate and checking, improve the security of certificate internal information content.
Patent of the present invention " a kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking " can also be used for using information encryption and the checking in the RFID electronic tag on vehicle.
Widespread use RFID technology on automobile, the RFID electronic tag of equipped various types, realize management of vehicles by the RFID electronic tag, adopt " a kind of data encryption of the RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking ", can realize using information encryption and the checking in the RFID electronic tag on vehicle, the security that improves the RFID electronic tag internal information content on the vehicle.
More than show and described ultimate principle and the principal character and the advantage thereof of patent of the present invention.The technician of the industry should understand; patent of the present invention is not restricted to the described embodiments; the principle of describing in the foregoing description and the instructions that patent of the present invention just is described; under the prerequisite that does not break away from patent spirit and scope of the present invention; patent of the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed claim of the present invention.The claimed scope of patent of the present invention is defined by appending claims and equivalent thereof.

Claims (5)

1. the data encryption of a RFID electronic tag that is used to meet the ISO18000-6C standard and the method for checking is characterized in that it comprises: the passive uhf band RFID electronic tag of following the ISO18000-6C standard; Oval algorithm (ECC algorithm); In order to carry out the reading device of information communication with described RFID label; The RFID electronic tag data is carried out the method for encryption and decryption and signature and checking.
2. the method for RFID electronic tag enciphered data according to claim 1, it is characterized in that: the ISO18000-6C standard label identification number that the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment reads according to the RFID read-write equipment, adopt oval cryptographic algorithm (ECC cryptographic algorithm) to encrypt to the cleartext information of required encryption.
3. the method for RFID electronic tag enciphered data according to claim 1, it is characterized in that: the ISO18000-6C standard label identification number that the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment reads according to the RFID read-write equipment, adopt oval signature algorithm (ECC signature algorithm) to sign to the information of required signature.
4. the method for RFID electronic tag data decryption according to claim 1, it is characterized in that: the ISO18000-6C standard label identification number that the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment reads according to the RFID read-write equipment, adopt oval decipherment algorithm (ECC decipherment algorithm) to be decrypted to the electronic labeling information that reads.
5. the method for RFID electronic tag verification msg according to claim 1, it is characterized in that: the ISO18000-6C standard label identification number that the upper procedure of RFID read-write equipment or the read-write of control RFID read-write equipment reads according to the RFID read-write equipment, adopt ellipse to test label algorithm (ECC tests and signs algorithm) to the electronic labeling information that reads and carry out data verification.
CN200810203327A 2008-11-25 2008-11-25 Method for encrypting and verifying ISO18000-6C electronic tag Pending CN101739538A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810203327A CN101739538A (en) 2008-11-25 2008-11-25 Method for encrypting and verifying ISO18000-6C electronic tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810203327A CN101739538A (en) 2008-11-25 2008-11-25 Method for encrypting and verifying ISO18000-6C electronic tag

Publications (1)

Publication Number Publication Date
CN101739538A true CN101739538A (en) 2010-06-16

Family

ID=42463011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810203327A Pending CN101739538A (en) 2008-11-25 2008-11-25 Method for encrypting and verifying ISO18000-6C electronic tag

Country Status (1)

Country Link
CN (1) CN101739538A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012027895A1 (en) * 2010-09-02 2012-03-08 北京智捷通科技发展有限公司 Method and device for transmitting data in passive ultra high frequency radio frequency identification (uhf rfid) system
CN103106421A (en) * 2013-01-21 2013-05-15 厦门市路桥信息工程有限公司 Electronic tag encryption method and charge management system based on 18000-6C standard
CN103632174A (en) * 2012-08-27 2014-03-12 中兴通讯股份有限公司 Operation method and apparatus for public-private state tag
CN103714357A (en) * 2012-09-29 2014-04-09 北京计算机技术及应用研究所 Radio frequency tag data coding method and radio frequency tag data coding system for vehicle identification

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012027895A1 (en) * 2010-09-02 2012-03-08 北京智捷通科技发展有限公司 Method and device for transmitting data in passive ultra high frequency radio frequency identification (uhf rfid) system
CN103098081A (en) * 2010-09-02 2013-05-08 北京智捷通科技发展有限公司 Method and device for transmitting data in passive ultra high frequency radio frequency identification (UHF RFID) system
CN103098081B (en) * 2010-09-02 2016-08-03 北京智捷通科技发展有限公司 Data transmission method in a kind of passive ultrahigh frequency radio frequency identification and device
CN103632174A (en) * 2012-08-27 2014-03-12 中兴通讯股份有限公司 Operation method and apparatus for public-private state tag
CN103632174B (en) * 2012-08-27 2017-10-03 天津中兴智联科技有限公司 The operating method and device of public and private stateful label
CN103714357A (en) * 2012-09-29 2014-04-09 北京计算机技术及应用研究所 Radio frequency tag data coding method and radio frequency tag data coding system for vehicle identification
CN103714357B (en) * 2012-09-29 2016-08-03 北京计算机技术及应用研究所 A kind of radio-frequency (RF) tag data-encoding scheme being applied to vehicle identification and system thereof
CN103106421A (en) * 2013-01-21 2013-05-15 厦门市路桥信息工程有限公司 Electronic tag encryption method and charge management system based on 18000-6C standard
CN103106421B (en) * 2013-01-21 2016-06-22 厦门路桥信息股份有限公司 Electronic tag encryption method and charging administration system based on 18000-6C standard

Similar Documents

Publication Publication Date Title
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
CN100375111C (en) Method for anti false verification based on identification technique in radio frequency, and anti false system
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN108985790A (en) Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN113574913A (en) Method and system for preparing and performing object authentication
CN101593265A (en) Antiforge system based on radio-frequency (RF) identification
CN101369306A (en) Electronic label security system
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN109146024A (en) Art work Anti-fake electronic label System and method for based on block chain
CN101593264A (en) Method for anti-counterfeit based on radio-frequency (RF) identification
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN102222389A (en) Realization method and device of fingerprint comparison in financial IC (integrated circuit) card
CN107231231A (en) A kind of method and system of terminal device secure accessing Internet of Things
CN104184733A (en) RFID lightweight-class bidirectional authentication method based on CRC coding
CN106845304A (en) A kind of method and system for realizing reader and smart-tag authentication in rfid system
CN102855577A (en) Multiple merchandise anti-counterfeiting verification method based on cloud computing
CN102081744A (en) Path identification system and secure interaction method thereof
CN102955958A (en) Anti-counterfeiting method and system based on radio frequency identification technology
CN106327215A (en) Wine industry anti-counterfeiting authentication method based on NFC chip
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104182786B (en) The safety control of partition management is realized to ultrahigh frequency electronic tag storage region
CN101923654A (en) Ultrahigh frequency reader-writer suitable for remote security control by different users
CN106971311A (en) A kind of false proof traceability system of logistics Means of Agricultural Production and method
CN101599829B (en) Authentication method, reader and label

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100616