CN102122341A - Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag - Google Patents
Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag Download PDFInfo
- Publication number
- CN102122341A CN102122341A CN2010106223109A CN201010622310A CN102122341A CN 102122341 A CN102122341 A CN 102122341A CN 2010106223109 A CN2010106223109 A CN 2010106223109A CN 201010622310 A CN201010622310 A CN 201010622310A CN 102122341 A CN102122341 A CN 102122341A
- Authority
- CN
- China
- Prior art keywords
- label
- tag
- reader
- time
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a power consumption processing method for encryption and authentication of an ultrahigh-frequency passive electronic tag. The method is mainly used for solving the contradiction problem of chip power consumption and tag identification distance due to the introduction of an ultrahigh-frequency passive electronic tag security algorithm. The invention mainly relates to a tag identification flow. After an authentication command is received, the tag consults the required time of continuous carriers with a reader, and the tag returns the information of a response carrying time parameter Treply. The reader sends a confirmation command, and sends the continuous carriers of the Treply time. If the tag response is not received in the waiting Treply time, the flow is ended or the authentication command is retransmitted. After the confirmation command is received, the tag completes operation in the Treply time and returns data. The reader authenticates whether the tag is a valid tag, if so, the reader encrypts the random number carried by the tag by using an algorithm and sends the encrypted random number to the tag. The tag confirms the authentication result.
Description
Technical field
The invention belongs to the REID field, power consumption disposal route when relating to a kind of ultra-high-frequency passive electronic tag encrypting and authenticating.
Background technology
In field of radio frequency identification, passive electronic label receives energy of electromagnetic field by antenna, gives chip power supply.Fast, remote recognition point is ultra-high-frequency passive electronic tag advantage place, but tag security can not satisfy application requirements far away at present, restricts its large-scale application.In existing RFID agreement, introducing the encrypting and authenticating flow process is a kind of method that remedies security performance, though the part document is mentioned the encrypting and authenticating flow process, does not resolve the contradiction between label cryptographic algorithm and the label power consumption.If the introducing of security algorithm has destroyed this advantage of remote identification, the advantage of that ultrahigh frequency electronic tag will be had a greatly reduced quality.
The present invention is mainly used in the chip power-consumption that the introducing that solves ultra-high-frequency passive electronic tag encrypting and authenticating brings and the contradictory problems of tag recognition distance.。
Summary of the invention
The present invention proposes a kind of method that is used to wipe the ultra-high-frequency passive electronic tag data, the encrypting and authenticating flow process is as follows:
1) read write line sends to the label that is in the discriminating state and differentiates request command, and this order comprises field random number R and1 and handle handle.Rand1 is the random number that read write line produces, and handle is a handle.
2) label receives after the authentication command, and with the time that reader is discussed needed continuous carrier, the label echo reply carries the information of time parameter Treply.
3) reader sends and confirms order, and sends the continuous carrier of Treply time.If reader is waited for the Treply time and do not received the label response, finish or the repeating transmission authentication command.
4) after label is received and confirmed order, finish computing at Treply within the time, and return response.This response comprises the MAC operation values MAC (GND1) to random number R ND1, the new random number R ND2 that label produces
5) after reader receives MAC (RND1), the MAC (RND1) that calculates with oneself relatively, if equate then whether label is legal label, unequal is illegal label.If be legal label, reader sends to label to the random number encryption MAC (RND2) that label carries.
6) after label receives MAC (RND2), the MAC (RND2) that calculates with oneself relatively, if equate then whether label is legal, unequal is illegal.Label return authentication result.
7) label by authentication forwards safe condition to.
Description of drawings
Fig. 1 identifying procedure
The conversion of Fig. 2 tag state
Embodiment
Specifically introduce principle of work of the present invention below in conjunction with accompanying drawing:
The encrypting and authenticating flow process is as follows:
1) read write line sends to the label that is in the discriminating state and differentiates request command, and this order comprises field Rand1, and handle.Rand1 is the random number that read write line produces, and handle is a handle.
2) label receives after the authentication command, and with the time that reader is discussed needed continuous carrier, the label echo reply carries the information of time parameter Treply.
3) reader sends and confirms order, and sends the continuous carrier of Treply time.If reader is waited for the Treply time and do not received the label response, finish or the repeating transmission authentication command.
4) after label is received and confirmed order, finish computing at Treply within the time, and return response.This response comprises the MAC operation values MAC (GND1) to random number R ND1, the new random number R ND2 that label produces
5) after reader receives MAC (RND1), the MAC (RND1) that calculates with oneself relatively, if equate then label is legal label, unequal is illegal label.If be legal label, reader sends to label to the random number encryption MAC (RND2) that label carries.
6) after label receives MAC (RND2), the MAC (RND2) that calculates with oneself relatively, if equate then label is legal, unequal is illegal.Label return authentication result.
7) label by authentication forwards safe condition to.
Should be understood that present embodiment is only for the usefulness that the present invention is described, but not limitation of the present invention.Person skilled in the relevant technique under the situation that does not break away from the spirit and scope of the present invention, can also be made various conversion or variation, so all technical schemes that are equal to also should belong to category of the present invention by each claim.
Claims (2)
1. power consumption disposal route when being used for ultra-high-frequency passive electronic tag encrypting and authenticating, it is characterized in that, label receives after the authentication command of reader, consult to finish the needed time of computing with reader, the label echo reply carries the information of time parameter, and reader carries the time of the information adjustment emission continuous carrier CW of time parameter according to the label echo reply.
2. encryption and authentication method that is used for the ultra-high-frequency passive electronic tag is characterized in that this method step is as follows:
(1) read write line sends to the label that is in the discriminating state and differentiates request command;
(2) label receives and differentiates after the request command, the time of consulting needed continuous carrier with reader, and echo reply carries time parameter information, reader is adjusted the continuous carrier transmitting time according to temporal information;
(3) reader sends and confirms order, and sends continuous carrier; If do not receive the label response in the stand-by period, finish or the repeating transmission authentication command at reader;
(4) after label is received and confirmed order, finish computing, and return response, this response comprises the new random number to the cryptographic check value of random number and label generation;
(5) after reader receives cryptographic check value, the cryptographic check value that calculates with oneself relatively, if equate then label is legal label, unequal is illegal label;
(6) if be legal label, reader is encrypted the random number that label carries, and sends to label;
(7) after label receives random number after the encryption, the random number after encrypting with oneself relatively, if equate then label is legal, unequal is illegal;
(8) label return authentication result forwards safe condition to by the label that authenticates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010622310.9A CN102122341B (en) | 2010-12-27 | 2010-12-27 | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010622310.9A CN102122341B (en) | 2010-12-27 | 2010-12-27 | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102122341A true CN102122341A (en) | 2011-07-13 |
CN102122341B CN102122341B (en) | 2014-01-15 |
Family
ID=44250896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010622310.9A Active CN102122341B (en) | 2010-12-27 | 2010-12-27 | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102122341B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580860A (en) * | 2012-07-20 | 2014-02-12 | 中国移动通信集团公司 | Data transmission method, device and system and communication equipment in near field communication |
CN105991283A (en) * | 2015-02-10 | 2016-10-05 | 中交北斗技术有限责任公司 | Encryption method applied to passive ultrahigh frequency RFID technology |
CN107111774A (en) * | 2014-10-10 | 2017-08-29 | 维普公司 | Electric power acquisition in passive RFID device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN101114901A (en) * | 2006-07-26 | 2008-01-30 | 联想(北京)有限公司 | Safety authentication system, apparatus and method for non-contact type wireless data transmission |
CN101271534A (en) * | 2008-03-25 | 2008-09-24 | 华南理工大学 | RFID label and reading device thereof, reading system and safety authentication method |
CN101299232A (en) * | 2008-06-16 | 2008-11-05 | 清华大学 | Transmitting circuit for super high frequency radio frequency recognition read-write machine to reduce power consumption |
CN101499118A (en) * | 2008-01-31 | 2009-08-05 | 西门子公司 | Method and apparatus for providing energy to passive label in radio frequency recognition system |
-
2010
- 2010-12-27 CN CN201010622310.9A patent/CN102122341B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN101114901A (en) * | 2006-07-26 | 2008-01-30 | 联想(北京)有限公司 | Safety authentication system, apparatus and method for non-contact type wireless data transmission |
CN101499118A (en) * | 2008-01-31 | 2009-08-05 | 西门子公司 | Method and apparatus for providing energy to passive label in radio frequency recognition system |
CN101271534A (en) * | 2008-03-25 | 2008-09-24 | 华南理工大学 | RFID label and reading device thereof, reading system and safety authentication method |
CN101299232A (en) * | 2008-06-16 | 2008-11-05 | 清华大学 | Transmitting circuit for super high frequency radio frequency recognition read-write machine to reduce power consumption |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580860A (en) * | 2012-07-20 | 2014-02-12 | 中国移动通信集团公司 | Data transmission method, device and system and communication equipment in near field communication |
CN103580860B (en) * | 2012-07-20 | 2016-12-21 | 中国移动通信集团公司 | Data transmission method, device, system and communication equipment in short-range communication |
CN107111774A (en) * | 2014-10-10 | 2017-08-29 | 维普公司 | Electric power acquisition in passive RFID device |
CN107111774B (en) * | 2014-10-10 | 2020-07-10 | 维普公司 | Power harvesting in passive RFID devices |
CN105991283A (en) * | 2015-02-10 | 2016-10-05 | 中交北斗技术有限责任公司 | Encryption method applied to passive ultrahigh frequency RFID technology |
Also Published As
Publication number | Publication date |
---|---|
CN102122341B (en) | 2014-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3118776B1 (en) | Security authentication method for hiding ultra high frequency electronic tag identifier | |
US8138889B2 (en) | Method, transponder, and system for secure data exchange | |
CN100405386C (en) | Safety identification method in radio frequency distinguishing system | |
EP2533488B1 (en) | Nfc communications device for setting up encrypted e-mail communication | |
JP2009540448A (en) | RFID reader, RFID tag, and secure communication method for RFID system | |
Aigner et al. | Secure symmetric authentication for RFID tags | |
CN105701873B (en) | A kind of Non-contact attendance recording method and attendance record system | |
CN107231231A (en) | A kind of method and system of terminal device secure accessing Internet of Things | |
CN206551993U (en) | A kind of PKE automobile encrypted antitheft systems based on quantum key card | |
WO2012019397A1 (en) | Method and system for identifying radio frequency identification tag | |
EP2922236B1 (en) | Authentication by use of symmetric and asymmetric cryptography | |
CN102289688B (en) | Method and device for label processing and access | |
CN102158863B (en) | Based on the mobile terminal authentication system and method for JAVA, server and terminal | |
CN103227793A (en) | RFID equipment layer information security transfer method and device based on random sequence | |
CN102122341B (en) | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
CN101739540B (en) | Label reader-writer and data communication method and system of radio frequency label | |
US11533612B2 (en) | Transceiver system | |
EP2838224B1 (en) | Air interface security method and device | |
CN101667260B (en) | Anti-copy dual-frequency label | |
CN201413598Y (en) | Electric sign sealing device | |
Hongthai et al. | The development of encrypted near field communication data exchange format transmission in an NFC passive tag for checking the genuine product | |
WO2012027895A1 (en) | Method and device for transmitting data in passive ultra high frequency radio frequency identification (uhf rfid) system | |
US11272358B2 (en) | Near field communication forum data exchange format (NDEF) messages | |
CN102182361B (en) | Control method of man-machine interface-free automobile door control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee | ||
CP02 | Change in the address of a patent holder |
Address after: 102209 Beijing, Beiqijia, the future of science and technology in the south area of China electronic network security and information technology industry base C building, Patentee after: Beijing CEC Huada Electronic Design Co., Ltd. Address before: 100102 Beijing City, Chaoyang District Lize two Road No. 2, Wangjing science and Technology Park A block five layer Patentee before: Beijing CEC Huada Electronic Design Co., Ltd. |