CN102314585A - Method suitable for testing secure communication of radio frequency identification tag - Google Patents

Method suitable for testing secure communication of radio frequency identification tag Download PDF

Info

Publication number
CN102314585A
CN102314585A CN201110205943A CN201110205943A CN102314585A CN 102314585 A CN102314585 A CN 102314585A CN 201110205943 A CN201110205943 A CN 201110205943A CN 201110205943 A CN201110205943 A CN 201110205943A CN 102314585 A CN102314585 A CN 102314585A
Authority
CN
China
Prior art keywords
instruction
label
tag
transmission
send
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110205943A
Other languages
Chinese (zh)
Inventor
何婷婷
陈柯
邵晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai VI Service Network Co Ltd
Original Assignee
Shanghai VI Service Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai VI Service Network Co Ltd filed Critical Shanghai VI Service Network Co Ltd
Priority to CN201110205943A priority Critical patent/CN102314585A/en
Publication of CN102314585A publication Critical patent/CN102314585A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method suitable for testing secure communication of a radio frequency identification tag, which specifically comprises: firstly finishing an identification operation for the tag, then finishing a mutual authentication operation for a reader and the tag, and finally finishing operations of reading, writing, locking and destructing for the tag. The method comprises the following steps: sending instructions for reading, writing, locking and destructing, wherein the protocol state of the tag does not skip when the tag has no response; sending an access instruction to enable the tag to skip to a secure state from an open state and obtaining reading rights, sending a reading instruction and obtaining a successful reading response, and sending instructions of writing, locking and destructing and obtaining an unauthorized failed operation response; sending an access instruction and obtaining writing rights, locking rights and destructing rights, and sending a destructing instruction and obtaining a successful destructing response, wherein the tag skips to a destructing state from the secure state; and sending a instruction for starting to query and verifying whether the destruction operation is successful or not. According to the method provided by the invention, the testing steps are refined and most simplified, the least time is used for verifying whether the state machine of the tag is correct or not, and the time for testing is saved and the efficiency for testing is increased under the premise of ensuring the working reliability of the tag.

Description

A kind of method of testing that is applicable to the RFID tag secure communication
Technical field
The invention belongs to the RF identification communication technical field, be specifically related to a kind of method of testing that is applicable to the RFID tag secure communication.
Background technology
Continuous development along with the RF identification communication technology; Recently all added secure communication mechanism in the RF identification communication protocol of formulating; Compared to existing RF identification communication protocol, New Deal has been strengthened the link of authentication and encryption in order to ensure safety of data transmission; Increased the authentication state of reader and label, strengthened rights management simultaneously the data read-write.The increase of protocol complexities means that test is also complicated more; The quantity of test item increases along with the increase of communication process and label protocol state becomes how much multiples, traversal the communication process and the label protocol state redirect more test duration of needs that might occur.
In order to improve testing efficiency, the protocol status redirect mechanism to the RFID tag secure communication needs a kind of new method of testing, with the minimum time be minimum test item, come the redirect of test label protocol status whether consistent with protocol definition.We find that the communication between reader and the label can be summarized workflow commonly used in the application process of RF identification communication system, guarantee that this flow process operate as normal just can guarantee that label can operate as normal under common application demand.
Summary of the invention
The object of the present invention is to provide a kind of method of testing that is applicable to the RFID tag secure communication; From the RFID tag secure communication test of complicacy, extract a succinct method of testing; Whether come protocol status redirect and rights management in the testing radio frequency identification label secure communication flow process consistent with protocol definition, the label through this test can guarantee that normal and reader communicates under common application demand.
The method of testing that is applicable to the RFID tag secure communication that the present invention proposes, concrete steps are following:
(1) accomplishes the tag recognition operation: send sort instructions, send the inquiry dependent instruction and make label accomplish arbitration and identifying operation, obtain label coding, make label be in status recognition;
(2) accomplish reader and label two-way authentication operation: send the authentication dependent instruction and make reader and label accomplish the two-way authentication operation, make label be in open state;
(3) label is accomplished and is read, writes, locks and destroy operation:
The first step is sent and is read, writes, locks and destroy instruction, and label is response not, the not redirect of label protocol state;
Second step, send access instruction and make label jump to safe condition, and obtain to read authority from open state, to send reading command and obtain reading success response, transmission writes, locks and destroy instruction and obtains the unauthorized operation failure response;
The 3rd step, to send access instruction and obtain to write authority, transmission writes instruction and obtains writing success response, sends locking and destroy to instruct to obtain the unauthorized operation failure response;
The 4th step, send access instruction and obtain locked authority, to send lock instruction and obtain locking success response, transmission is destroyed instruction and is obtained the unauthorized operation failure response;
The 5th step, to send access instruction and obtain to destroy authority, transmission is destroyed instruction and is obtained destroying success response, and label jumps to destroy state from safe condition;
(4) sending startup query statement checking destruction operates successfully.
Among the present invention, the inquiry of transmission described in the step (1) dependent instruction refers to send the startup query statement and obtains instruction with the transmission coding.
Among the present invention, the authentication of transmission described in the step (2) dependent instruction refers to send security parameter and obtains instruction, sends the encrypted authentication request instruction and send bidirectional encipher authentication instruction.
Among the present invention, all can send random number between the first step of step (3), second step, the 3rd step, the 4th step and the 5th step and obtain instruction.
Among the present invention; The said label of being destroyed is meant the label that the executed destroy command can not be worked again; This type of label can't be tested; So long as label that can operate as normal all belongs to the label of not destroyed,, there are not other states so label is destroyed and do not destroyed by whether working to have only.
The present invention is through above testing process; Make label accomplish all the protocol status redirects in the normal workflow; The simultaneous verification label is not before having acquisition to read, write, lock and destroying authority; Can't accomplish accordingly and read, write, lock and destroy operation, and return corresponding error code prompting operation unauthorized.
Whether beneficial effect of the present invention: it is correct with minimum time verifying tag state machine to have refined the testing procedure of simplifying most if being, under the prerequisite of the functional reliability that guarantees label, practice thrift the test duration and improve testing efficiency.
Embodiment
Further specify the present invention through embodiment below.
Embodiment 1: the RFID tag of the support secure communication that this method of testing is used for do not destroyed.
The first step, transmission sort instructions, label is response not, and label is in SBR.
Second step, transmission start query statement, and label sends RN11 and CRC5, and label jumps to state to be identified.
The 3rd step, transmission coding obtain instruction, and label sends coding, and label jumps to status recognition.
The 4th step, transmission security parameter obtain instruction, and label sends security parameter, and label jumps to state to be certified.
The 5th step, the instruction of transmission encrypted authentication request, label sends random number R Nt, and label is in state to be certified.
The 6th step, transmission bidirectional encipher authentication instruction, authentication is passed through, and label sends RNr ', and label jumps to open state.
The 7th step, transmission reading command, label does not have response, and label is in open state.
The 8th step, transmission write instruction, and label does not have response, and label is in open state.
The 9th step, transmission lock instruction, label does not have response, and label is in open state.
Instruction is destroyed in the tenth step, transmission, and label does not have response, and label is in open state.
The 11 step, transmission random number are obtained instruction, and label sends random number, and label is in open state.
The 12 step, transmission access instruction comprise low 16 of read password, and label sends response, and label is in open state.
The 13 step, transmission random number are obtained instruction, and label sends random number, and label is in open state.
The 14 step, transmission access instruction, it is high 16 to comprise read password, and label sends response, and label jumps to safe condition.
The 15 step, transmission reading command, label sends response, shows to read success, and label is in a safe condition.
The 16 step, transmission write instruction, and label sends response, show not have to write authority, and label is in a safe condition.
The 17 step, transmission lock instruction, label sends response, shows the latch-up-free authority, and label is in a safe condition.
Instruction is destroyed in the 18 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 19 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 20 step, send access instruction, comprise and write low 16 of password, label sends response, and label is in a safe condition.
The 21 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 22 step, send access instruction, comprise that to write password high 16, label sends response, and label is in a safe condition.
The 23 step, transmission write instruction, and label sends response, show to write success, and label is in a safe condition.
The 24 step, transmission lock instruction, label sends response, shows the latch-up-free authority, and label is in a safe condition.
Instruction is destroyed in the 25 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 26 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 27 step, transmission access instruction comprise low 16 of locking password, and label sends response, and label is in a safe condition.
The 28 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 29 step, transmission access instruction,, it is high 16 to comprise the locking password, and label sends response, and label is in a safe condition.
The 30 step, transmission lock instruction, label sends response, shows to lock successfully, and label is in a safe condition.
Instruction is destroyed in the 31 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 32 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 33 step, transmission access instruction comprise and destroy low 16 of password, and label sends response, and label is in a safe condition.
The 34 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 35 step, transmission access instruction, it is high 16 to comprise the destruction password, and label sends response, and label is in a safe condition.
Instruction is destroyed in the 36 step, transmission, and label sends response, and demonstration is destroyed successfully, and label jumps to destroy state.
The 37 step, transmission start query statement, and label does not have response, and label is in destroy state.
After above 37 steps operation, the label groundwork flow process in use of promptly walking to be over has traveled through all reader that will carry out instructions; Confirmed label match state machine redirect mechanism; Various functions can be reliably accomplished in ability and reader proper communication, and this label can drop into application.

Claims (4)

1. method of testing that is applicable to the RFID tag secure communication is characterized in that concrete steps are following:
(1) accomplishes the tag recognition operation: send sort instructions, send the inquiry dependent instruction and make label accomplish arbitration and identifying operation, obtain label coding, make label be in status recognition;
(2) accomplish reader and label two-way authentication operation: send the authentication dependent instruction and make reader and label accomplish the two-way authentication operation, make label be in open state;
(3) label is accomplished and is read, writes, locks and destroy operation:
The first step is sent and is read, writes, locks and destroy instruction, and label is response not, the not redirect of label protocol state;
Second step, send access instruction and make label jump to safe condition, and obtain to read authority from open state, to send reading command and obtain reading success response, transmission writes, locks and destroy instruction and obtains the unauthorized operation failure response;
The 3rd step, to send access instruction and obtain to write authority, transmission writes instruction and obtains writing success response, sends locking and destroy to instruct to obtain the unauthorized operation failure response;
The 4th step, send access instruction and obtain locked authority, to send lock instruction and obtain locking success response, transmission is destroyed instruction and is obtained the unauthorized operation failure response;
The 5th step, to send access instruction and obtain to destroy authority, transmission is destroyed instruction and is obtained destroying success response, and label jumps to destroy state from safe condition;
(4) sending startup query statement checking destruction operates successfully.
2. method of testing according to claim 1 is characterized in that the inquiry of transmission described in the step (1) dependent instruction refers to send the startup query statement and obtains instruction with the transmission coding.
3. method of testing according to claim 1 is characterized in that the authentication of transmission described in the step (2) dependent instruction refers to send security parameter and obtains instruction, sends the encrypted authentication request instruction and send bidirectional encipher authentication instruction.
4. method of testing according to claim 1 is characterized in that the first step, second of step (3) goes on foot, the 3rd step, the 4th goes on foot and all has the random number of transmission to obtain instruction between the 5th step.
CN201110205943A 2011-07-22 2011-07-22 Method suitable for testing secure communication of radio frequency identification tag Pending CN102314585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110205943A CN102314585A (en) 2011-07-22 2011-07-22 Method suitable for testing secure communication of radio frequency identification tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110205943A CN102314585A (en) 2011-07-22 2011-07-22 Method suitable for testing secure communication of radio frequency identification tag

Publications (1)

Publication Number Publication Date
CN102314585A true CN102314585A (en) 2012-01-11

Family

ID=45427742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110205943A Pending CN102314585A (en) 2011-07-22 2011-07-22 Method suitable for testing secure communication of radio frequency identification tag

Country Status (1)

Country Link
CN (1) CN102314585A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613330A (en) * 2020-12-04 2021-04-06 中国电子科技集团公司第五十四研究所 Ultrahigh frequency RFID verification system based on GJB protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070057768A1 (en) * 2005-09-13 2007-03-15 Nec (China) Co., Ltd. Radio frequency identification system and method
CN101089872A (en) * 2006-06-13 2007-12-19 中兴通讯股份有限公司 Communication method for reader and tag in RFID system
CN101685494A (en) * 2008-09-25 2010-03-31 晨星软件研发(深圳)有限公司 Control method of radio frequency identification tag and radio frequency identification system using same
CN101814991A (en) * 2010-03-12 2010-08-25 西安西电捷通无线网络通信股份有限公司 Mutual authentication method and system based on identity
CN102043934A (en) * 2009-10-12 2011-05-04 中兴通讯股份有限公司 Radio frequency identification system and operating method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070057768A1 (en) * 2005-09-13 2007-03-15 Nec (China) Co., Ltd. Radio frequency identification system and method
CN101089872A (en) * 2006-06-13 2007-12-19 中兴通讯股份有限公司 Communication method for reader and tag in RFID system
CN101685494A (en) * 2008-09-25 2010-03-31 晨星软件研发(深圳)有限公司 Control method of radio frequency identification tag and radio frequency identification system using same
CN102043934A (en) * 2009-10-12 2011-05-04 中兴通讯股份有限公司 Radio frequency identification system and operating method thereof
CN101814991A (en) * 2010-03-12 2010-08-25 西安西电捷通无线网络通信股份有限公司 Mutual authentication method and system based on identity

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613330A (en) * 2020-12-04 2021-04-06 中国电子科技集团公司第五十四研究所 Ultrahigh frequency RFID verification system based on GJB protocol

Similar Documents

Publication Publication Date Title
AU2006203517B2 (en) Using Promiscuous and Non-Promiscuous Data to Verify Card and Reader Identity
EP1755061B1 (en) Protection of non-promiscuous data in an RFID transponder
US20080120726A1 (en) External storage device
KR20140019800A (en) Method for upgrading rfid readers in situ
CN103854042B (en) RFID label reader-writer authentication and label anti-cloning method
CN111130602B (en) Near field communication card data writing system, method, device and medium
CN103136485B (en) A kind of method realizing computer security and computer
CN106021117B (en) Smart card system man-in-the-middle attack verification platform and test method
CN101298817A (en) Lock body control device and method thereof
CN101667255B (en) Security authentication method, device and system for radio frequency identification
CN104680054A (en) RFID (radio frequency identification devices) data processing method
CN109309916A (en) A kind of transmission of RFID data and Verification System and method
WO2012083632A1 (en) Method and system for controlling access to radio frequency identification tag
CN102314585A (en) Method suitable for testing secure communication of radio frequency identification tag
CN103236093A (en) Identity recognition technology based escorting box management method
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
JP2009129413A (en) Shared management method of portable storage device, and portable storage device
CN103295039B (en) Radio frequency card read-write operation method
CN109584421A (en) A kind of intelligent door lock authentication administrative system based on domestic safety chip
CN102122332B (en) Method and system for managing password of electronic signing tool
CN104867199A (en) Anti-cheating fingerprint patrolling device
JP5347417B2 (en) IC card system, its host device, program
CN102945384A (en) Method for enhancing high-frequency RFID (radio frequency identification) safety
EP2495690B1 (en) Transponder and method for monitoring access to application data in the transponder
CN107743306B (en) Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120111