CN102122341A - Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag - Google Patents

Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag Download PDF

Info

Publication number
CN102122341A
CN102122341A CN2010106223109A CN201010622310A CN102122341A CN 102122341 A CN102122341 A CN 102122341A CN 2010106223109 A CN2010106223109 A CN 2010106223109A CN 201010622310 A CN201010622310 A CN 201010622310A CN 102122341 A CN102122341 A CN 102122341A
Authority
CN
China
Prior art keywords
label
tag
reader
time
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010106223109A
Other languages
Chinese (zh)
Other versions
CN102122341B (en
Inventor
沈红伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CEC Huada Electronic Design Co Ltd
Original Assignee
Beijing CEC Huada Electronic Design Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CEC Huada Electronic Design Co Ltd filed Critical Beijing CEC Huada Electronic Design Co Ltd
Priority to CN201010622310.9A priority Critical patent/CN102122341B/en
Publication of CN102122341A publication Critical patent/CN102122341A/en
Application granted granted Critical
Publication of CN102122341B publication Critical patent/CN102122341B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a power consumption processing method for encryption and authentication of an ultrahigh-frequency passive electronic tag. The method is mainly used for solving the contradiction problem of chip power consumption and tag identification distance due to the introduction of an ultrahigh-frequency passive electronic tag security algorithm. The invention mainly relates to a tag identification flow. After an authentication command is received, the tag consults the required time of continuous carriers with a reader, and the tag returns the information of a response carrying time parameter Treply. The reader sends a confirmation command, and sends the continuous carriers of the Treply time. If the tag response is not received in the waiting Treply time, the flow is ended or the authentication command is retransmitted. After the confirmation command is received, the tag completes operation in the Treply time and returns data. The reader authenticates whether the tag is a valid tag, if so, the reader encrypts the random number carried by the tag by using an algorithm and sends the encrypted random number to the tag. The tag confirms the authentication result.

Description

A kind of power consumption disposal route that is used for ultra-high-frequency passive electronic tag encrypting and authenticating
Technical field
The invention belongs to the REID field, power consumption disposal route when relating to a kind of ultra-high-frequency passive electronic tag encrypting and authenticating.
Background technology
In field of radio frequency identification, passive electronic label receives energy of electromagnetic field by antenna, gives chip power supply.Fast, remote recognition point is ultra-high-frequency passive electronic tag advantage place, but tag security can not satisfy application requirements far away at present, restricts its large-scale application.In existing RFID agreement, introducing the encrypting and authenticating flow process is a kind of method that remedies security performance, though the part document is mentioned the encrypting and authenticating flow process, does not resolve the contradiction between label cryptographic algorithm and the label power consumption.If the introducing of security algorithm has destroyed this advantage of remote identification, the advantage of that ultrahigh frequency electronic tag will be had a greatly reduced quality.
The present invention is mainly used in the chip power-consumption that the introducing that solves ultra-high-frequency passive electronic tag encrypting and authenticating brings and the contradictory problems of tag recognition distance.。
Summary of the invention
The present invention proposes a kind of method that is used to wipe the ultra-high-frequency passive electronic tag data, the encrypting and authenticating flow process is as follows:
1) read write line sends to the label that is in the discriminating state and differentiates request command, and this order comprises field random number R and1 and handle handle.Rand1 is the random number that read write line produces, and handle is a handle.
2) label receives after the authentication command, and with the time that reader is discussed needed continuous carrier, the label echo reply carries the information of time parameter Treply.
3) reader sends and confirms order, and sends the continuous carrier of Treply time.If reader is waited for the Treply time and do not received the label response, finish or the repeating transmission authentication command.
4) after label is received and confirmed order, finish computing at Treply within the time, and return response.This response comprises the MAC operation values MAC (GND1) to random number R ND1, the new random number R ND2 that label produces
5) after reader receives MAC (RND1), the MAC (RND1) that calculates with oneself relatively, if equate then whether label is legal label, unequal is illegal label.If be legal label, reader sends to label to the random number encryption MAC (RND2) that label carries.
6) after label receives MAC (RND2), the MAC (RND2) that calculates with oneself relatively, if equate then whether label is legal, unequal is illegal.Label return authentication result.
7) label by authentication forwards safe condition to.
Description of drawings
Fig. 1 identifying procedure
The conversion of Fig. 2 tag state
Embodiment
Specifically introduce principle of work of the present invention below in conjunction with accompanying drawing:
The encrypting and authenticating flow process is as follows:
1) read write line sends to the label that is in the discriminating state and differentiates request command, and this order comprises field Rand1, and handle.Rand1 is the random number that read write line produces, and handle is a handle.
2) label receives after the authentication command, and with the time that reader is discussed needed continuous carrier, the label echo reply carries the information of time parameter Treply.
3) reader sends and confirms order, and sends the continuous carrier of Treply time.If reader is waited for the Treply time and do not received the label response, finish or the repeating transmission authentication command.
4) after label is received and confirmed order, finish computing at Treply within the time, and return response.This response comprises the MAC operation values MAC (GND1) to random number R ND1, the new random number R ND2 that label produces
5) after reader receives MAC (RND1), the MAC (RND1) that calculates with oneself relatively, if equate then label is legal label, unequal is illegal label.If be legal label, reader sends to label to the random number encryption MAC (RND2) that label carries.
6) after label receives MAC (RND2), the MAC (RND2) that calculates with oneself relatively, if equate then label is legal, unequal is illegal.Label return authentication result.
7) label by authentication forwards safe condition to.
Should be understood that present embodiment is only for the usefulness that the present invention is described, but not limitation of the present invention.Person skilled in the relevant technique under the situation that does not break away from the spirit and scope of the present invention, can also be made various conversion or variation, so all technical schemes that are equal to also should belong to category of the present invention by each claim.

Claims (2)

1. power consumption disposal route when being used for ultra-high-frequency passive electronic tag encrypting and authenticating, it is characterized in that, label receives after the authentication command of reader, consult to finish the needed time of computing with reader, the label echo reply carries the information of time parameter, and reader carries the time of the information adjustment emission continuous carrier CW of time parameter according to the label echo reply.
2. encryption and authentication method that is used for the ultra-high-frequency passive electronic tag is characterized in that this method step is as follows:
(1) read write line sends to the label that is in the discriminating state and differentiates request command;
(2) label receives and differentiates after the request command, the time of consulting needed continuous carrier with reader, and echo reply carries time parameter information, reader is adjusted the continuous carrier transmitting time according to temporal information;
(3) reader sends and confirms order, and sends continuous carrier; If do not receive the label response in the stand-by period, finish or the repeating transmission authentication command at reader;
(4) after label is received and confirmed order, finish computing, and return response, this response comprises the new random number to the cryptographic check value of random number and label generation;
(5) after reader receives cryptographic check value, the cryptographic check value that calculates with oneself relatively, if equate then label is legal label, unequal is illegal label;
(6) if be legal label, reader is encrypted the random number that label carries, and sends to label;
(7) after label receives random number after the encryption, the random number after encrypting with oneself relatively, if equate then label is legal, unequal is illegal;
(8) label return authentication result forwards safe condition to by the label that authenticates.
CN201010622310.9A 2010-12-27 2010-12-27 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag Active CN102122341B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010622310.9A CN102122341B (en) 2010-12-27 2010-12-27 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010622310.9A CN102122341B (en) 2010-12-27 2010-12-27 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

Publications (2)

Publication Number Publication Date
CN102122341A true CN102122341A (en) 2011-07-13
CN102122341B CN102122341B (en) 2014-01-15

Family

ID=44250896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010622310.9A Active CN102122341B (en) 2010-12-27 2010-12-27 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

Country Status (1)

Country Link
CN (1) CN102122341B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580860A (en) * 2012-07-20 2014-02-12 中国移动通信集团公司 Data transmission method, device and system and communication equipment in near field communication
CN105991283A (en) * 2015-02-10 2016-10-05 中交北斗技术有限责任公司 Encryption method applied to passive ultrahigh frequency RFID technology
CN107111774A (en) * 2014-10-10 2017-08-29 维普公司 Electric power acquisition in passive RFID device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101271534A (en) * 2008-03-25 2008-09-24 华南理工大学 RFID label and reading device thereof, reading system and safety authentication method
CN101299232A (en) * 2008-06-16 2008-11-05 清华大学 Transmitting circuit for super high frequency radio frequency recognition read-write machine to reduce power consumption
CN101499118A (en) * 2008-01-31 2009-08-05 西门子公司 Method and apparatus for providing energy to passive label in radio frequency recognition system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101499118A (en) * 2008-01-31 2009-08-05 西门子公司 Method and apparatus for providing energy to passive label in radio frequency recognition system
CN101271534A (en) * 2008-03-25 2008-09-24 华南理工大学 RFID label and reading device thereof, reading system and safety authentication method
CN101299232A (en) * 2008-06-16 2008-11-05 清华大学 Transmitting circuit for super high frequency radio frequency recognition read-write machine to reduce power consumption

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580860A (en) * 2012-07-20 2014-02-12 中国移动通信集团公司 Data transmission method, device and system and communication equipment in near field communication
CN103580860B (en) * 2012-07-20 2016-12-21 中国移动通信集团公司 Data transmission method, device, system and communication equipment in short-range communication
CN107111774A (en) * 2014-10-10 2017-08-29 维普公司 Electric power acquisition in passive RFID device
CN107111774B (en) * 2014-10-10 2020-07-10 维普公司 Power harvesting in passive RFID devices
CN105991283A (en) * 2015-02-10 2016-10-05 中交北斗技术有限责任公司 Encryption method applied to passive ultrahigh frequency RFID technology

Also Published As

Publication number Publication date
CN102122341B (en) 2014-01-15

Similar Documents

Publication Publication Date Title
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
US8138889B2 (en) Method, transponder, and system for secure data exchange
CN100405386C (en) Safety identification method in radio frequency distinguishing system
EP2533488B1 (en) Nfc communications device for setting up encrypted e-mail communication
JP2009540448A (en) RFID reader, RFID tag, and secure communication method for RFID system
Aigner et al. Secure symmetric authentication for RFID tags
CN105701873B (en) A kind of Non-contact attendance recording method and attendance record system
CN107231231A (en) A kind of method and system of terminal device secure accessing Internet of Things
CN206551993U (en) A kind of PKE automobile encrypted antitheft systems based on quantum key card
WO2012019397A1 (en) Method and system for identifying radio frequency identification tag
EP2922236B1 (en) Authentication by use of symmetric and asymmetric cryptography
CN102289688B (en) Method and device for label processing and access
CN102158863B (en) Based on the mobile terminal authentication system and method for JAVA, server and terminal
CN103227793A (en) RFID equipment layer information security transfer method and device based on random sequence
CN102122341B (en) Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN101739540B (en) Label reader-writer and data communication method and system of radio frequency label
US11533612B2 (en) Transceiver system
EP2838224B1 (en) Air interface security method and device
CN101667260B (en) Anti-copy dual-frequency label
CN201413598Y (en) Electric sign sealing device
Hongthai et al. The development of encrypted near field communication data exchange format transmission in an NFC passive tag for checking the genuine product
WO2012027895A1 (en) Method and device for transmitting data in passive ultra high frequency radio frequency identification (uhf rfid) system
US11272358B2 (en) Near field communication forum data exchange format (NDEF) messages
CN102182361B (en) Control method of man-machine interface-free automobile door control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 102209 Beijing, Beiqijia, the future of science and technology in the south area of China electronic network security and information technology industry base C building,

Patentee after: Beijing CEC Huada Electronic Design Co., Ltd.

Address before: 100102 Beijing City, Chaoyang District Lize two Road No. 2, Wangjing science and Technology Park A block five layer

Patentee before: Beijing CEC Huada Electronic Design Co., Ltd.