CN102314585A - Method suitable for testing secure communication of radio frequency identification tag - Google Patents
Method suitable for testing secure communication of radio frequency identification tag Download PDFInfo
- Publication number
- CN102314585A CN102314585A CN201110205943A CN201110205943A CN102314585A CN 102314585 A CN102314585 A CN 102314585A CN 201110205943 A CN201110205943 A CN 201110205943A CN 201110205943 A CN201110205943 A CN 201110205943A CN 102314585 A CN102314585 A CN 102314585A
- Authority
- CN
- China
- Prior art keywords
- instruction
- label
- tag
- transmission
- send
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method suitable for testing secure communication of a radio frequency identification tag, which specifically comprises: firstly finishing an identification operation for the tag, then finishing a mutual authentication operation for a reader and the tag, and finally finishing operations of reading, writing, locking and destructing for the tag. The method comprises the following steps: sending instructions for reading, writing, locking and destructing, wherein the protocol state of the tag does not skip when the tag has no response; sending an access instruction to enable the tag to skip to a secure state from an open state and obtaining reading rights, sending a reading instruction and obtaining a successful reading response, and sending instructions of writing, locking and destructing and obtaining an unauthorized failed operation response; sending an access instruction and obtaining writing rights, locking rights and destructing rights, and sending a destructing instruction and obtaining a successful destructing response, wherein the tag skips to a destructing state from the secure state; and sending a instruction for starting to query and verifying whether the destruction operation is successful or not. According to the method provided by the invention, the testing steps are refined and most simplified, the least time is used for verifying whether the state machine of the tag is correct or not, and the time for testing is saved and the efficiency for testing is increased under the premise of ensuring the working reliability of the tag.
Description
Technical field
The invention belongs to the RF identification communication technical field, be specifically related to a kind of method of testing that is applicable to the RFID tag secure communication.
Background technology
Continuous development along with the RF identification communication technology; Recently all added secure communication mechanism in the RF identification communication protocol of formulating; Compared to existing RF identification communication protocol, New Deal has been strengthened the link of authentication and encryption in order to ensure safety of data transmission; Increased the authentication state of reader and label, strengthened rights management simultaneously the data read-write.The increase of protocol complexities means that test is also complicated more; The quantity of test item increases along with the increase of communication process and label protocol state becomes how much multiples, traversal the communication process and the label protocol state redirect more test duration of needs that might occur.
In order to improve testing efficiency, the protocol status redirect mechanism to the RFID tag secure communication needs a kind of new method of testing, with the minimum time be minimum test item, come the redirect of test label protocol status whether consistent with protocol definition.We find that the communication between reader and the label can be summarized workflow commonly used in the application process of RF identification communication system, guarantee that this flow process operate as normal just can guarantee that label can operate as normal under common application demand.
Summary of the invention
The object of the present invention is to provide a kind of method of testing that is applicable to the RFID tag secure communication; From the RFID tag secure communication test of complicacy, extract a succinct method of testing; Whether come protocol status redirect and rights management in the testing radio frequency identification label secure communication flow process consistent with protocol definition, the label through this test can guarantee that normal and reader communicates under common application demand.
The method of testing that is applicable to the RFID tag secure communication that the present invention proposes, concrete steps are following:
(1) accomplishes the tag recognition operation: send sort instructions, send the inquiry dependent instruction and make label accomplish arbitration and identifying operation, obtain label coding, make label be in status recognition;
(2) accomplish reader and label two-way authentication operation: send the authentication dependent instruction and make reader and label accomplish the two-way authentication operation, make label be in open state;
(3) label is accomplished and is read, writes, locks and destroy operation:
The first step is sent and is read, writes, locks and destroy instruction, and label is response not, the not redirect of label protocol state;
Second step, send access instruction and make label jump to safe condition, and obtain to read authority from open state, to send reading command and obtain reading success response, transmission writes, locks and destroy instruction and obtains the unauthorized operation failure response;
The 3rd step, to send access instruction and obtain to write authority, transmission writes instruction and obtains writing success response, sends locking and destroy to instruct to obtain the unauthorized operation failure response;
The 4th step, send access instruction and obtain locked authority, to send lock instruction and obtain locking success response, transmission is destroyed instruction and is obtained the unauthorized operation failure response;
The 5th step, to send access instruction and obtain to destroy authority, transmission is destroyed instruction and is obtained destroying success response, and label jumps to destroy state from safe condition;
(4) sending startup query statement checking destruction operates successfully.
Among the present invention, the inquiry of transmission described in the step (1) dependent instruction refers to send the startup query statement and obtains instruction with the transmission coding.
Among the present invention, the authentication of transmission described in the step (2) dependent instruction refers to send security parameter and obtains instruction, sends the encrypted authentication request instruction and send bidirectional encipher authentication instruction.
Among the present invention, all can send random number between the first step of step (3), second step, the 3rd step, the 4th step and the 5th step and obtain instruction.
Among the present invention; The said label of being destroyed is meant the label that the executed destroy command can not be worked again; This type of label can't be tested; So long as label that can operate as normal all belongs to the label of not destroyed,, there are not other states so label is destroyed and do not destroyed by whether working to have only.
The present invention is through above testing process; Make label accomplish all the protocol status redirects in the normal workflow; The simultaneous verification label is not before having acquisition to read, write, lock and destroying authority; Can't accomplish accordingly and read, write, lock and destroy operation, and return corresponding error code prompting operation unauthorized.
Whether beneficial effect of the present invention: it is correct with minimum time verifying tag state machine to have refined the testing procedure of simplifying most if being, under the prerequisite of the functional reliability that guarantees label, practice thrift the test duration and improve testing efficiency.
Embodiment
Further specify the present invention through embodiment below.
Embodiment 1: the RFID tag of the support secure communication that this method of testing is used for do not destroyed.
The first step, transmission sort instructions, label is response not, and label is in SBR.
Second step, transmission start query statement, and label sends RN11 and CRC5, and label jumps to state to be identified.
The 3rd step, transmission coding obtain instruction, and label sends coding, and label jumps to status recognition.
The 4th step, transmission security parameter obtain instruction, and label sends security parameter, and label jumps to state to be certified.
The 5th step, the instruction of transmission encrypted authentication request, label sends random number R Nt, and label is in state to be certified.
The 6th step, transmission bidirectional encipher authentication instruction, authentication is passed through, and label sends RNr ', and label jumps to open state.
The 7th step, transmission reading command, label does not have response, and label is in open state.
The 8th step, transmission write instruction, and label does not have response, and label is in open state.
The 9th step, transmission lock instruction, label does not have response, and label is in open state.
Instruction is destroyed in the tenth step, transmission, and label does not have response, and label is in open state.
The 11 step, transmission random number are obtained instruction, and label sends random number, and label is in open state.
The 12 step, transmission access instruction comprise low 16 of read password, and label sends response, and label is in open state.
The 13 step, transmission random number are obtained instruction, and label sends random number, and label is in open state.
The 14 step, transmission access instruction, it is high 16 to comprise read password, and label sends response, and label jumps to safe condition.
The 15 step, transmission reading command, label sends response, shows to read success, and label is in a safe condition.
The 16 step, transmission write instruction, and label sends response, show not have to write authority, and label is in a safe condition.
The 17 step, transmission lock instruction, label sends response, shows the latch-up-free authority, and label is in a safe condition.
Instruction is destroyed in the 18 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 19 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 20 step, send access instruction, comprise and write low 16 of password, label sends response, and label is in a safe condition.
The 21 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 22 step, send access instruction, comprise that to write password high 16, label sends response, and label is in a safe condition.
The 23 step, transmission write instruction, and label sends response, show to write success, and label is in a safe condition.
The 24 step, transmission lock instruction, label sends response, shows the latch-up-free authority, and label is in a safe condition.
Instruction is destroyed in the 25 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 26 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 27 step, transmission access instruction comprise low 16 of locking password, and label sends response, and label is in a safe condition.
The 28 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 29 step, transmission access instruction,, it is high 16 to comprise the locking password, and label sends response, and label is in a safe condition.
The 30 step, transmission lock instruction, label sends response, shows to lock successfully, and label is in a safe condition.
Instruction is destroyed in the 31 step, transmission, and label sends response, and demonstration does not have the authority of destruction, and label is in a safe condition.
The 32 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 33 step, transmission access instruction comprise and destroy low 16 of password, and label sends response, and label is in a safe condition.
The 34 step, transmission random number are obtained instruction, and label sends random number, and label is in a safe condition.
The 35 step, transmission access instruction, it is high 16 to comprise the destruction password, and label sends response, and label is in a safe condition.
Instruction is destroyed in the 36 step, transmission, and label sends response, and demonstration is destroyed successfully, and label jumps to destroy state.
The 37 step, transmission start query statement, and label does not have response, and label is in destroy state.
After above 37 steps operation, the label groundwork flow process in use of promptly walking to be over has traveled through all reader that will carry out instructions; Confirmed label match state machine redirect mechanism; Various functions can be reliably accomplished in ability and reader proper communication, and this label can drop into application.
Claims (4)
1. method of testing that is applicable to the RFID tag secure communication is characterized in that concrete steps are following:
(1) accomplishes the tag recognition operation: send sort instructions, send the inquiry dependent instruction and make label accomplish arbitration and identifying operation, obtain label coding, make label be in status recognition;
(2) accomplish reader and label two-way authentication operation: send the authentication dependent instruction and make reader and label accomplish the two-way authentication operation, make label be in open state;
(3) label is accomplished and is read, writes, locks and destroy operation:
The first step is sent and is read, writes, locks and destroy instruction, and label is response not, the not redirect of label protocol state;
Second step, send access instruction and make label jump to safe condition, and obtain to read authority from open state, to send reading command and obtain reading success response, transmission writes, locks and destroy instruction and obtains the unauthorized operation failure response;
The 3rd step, to send access instruction and obtain to write authority, transmission writes instruction and obtains writing success response, sends locking and destroy to instruct to obtain the unauthorized operation failure response;
The 4th step, send access instruction and obtain locked authority, to send lock instruction and obtain locking success response, transmission is destroyed instruction and is obtained the unauthorized operation failure response;
The 5th step, to send access instruction and obtain to destroy authority, transmission is destroyed instruction and is obtained destroying success response, and label jumps to destroy state from safe condition;
(4) sending startup query statement checking destruction operates successfully.
2. method of testing according to claim 1 is characterized in that the inquiry of transmission described in the step (1) dependent instruction refers to send the startup query statement and obtains instruction with the transmission coding.
3. method of testing according to claim 1 is characterized in that the authentication of transmission described in the step (2) dependent instruction refers to send security parameter and obtains instruction, sends the encrypted authentication request instruction and send bidirectional encipher authentication instruction.
4. method of testing according to claim 1 is characterized in that the first step, second of step (3) goes on foot, the 3rd step, the 4th goes on foot and all has the random number of transmission to obtain instruction between the 5th step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110205943A CN102314585A (en) | 2011-07-22 | 2011-07-22 | Method suitable for testing secure communication of radio frequency identification tag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110205943A CN102314585A (en) | 2011-07-22 | 2011-07-22 | Method suitable for testing secure communication of radio frequency identification tag |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102314585A true CN102314585A (en) | 2012-01-11 |
Family
ID=45427742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110205943A Pending CN102314585A (en) | 2011-07-22 | 2011-07-22 | Method suitable for testing secure communication of radio frequency identification tag |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102314585A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112613330A (en) * | 2020-12-04 | 2021-04-06 | 中国电子科技集团公司第五十四研究所 | Ultrahigh frequency RFID verification system based on GJB protocol |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070057768A1 (en) * | 2005-09-13 | 2007-03-15 | Nec (China) Co., Ltd. | Radio frequency identification system and method |
CN101089872A (en) * | 2006-06-13 | 2007-12-19 | 中兴通讯股份有限公司 | Communication method for reader and tag in RFID system |
CN101685494A (en) * | 2008-09-25 | 2010-03-31 | 晨星软件研发(深圳)有限公司 | Control method of radio frequency identification tag and radio frequency identification system using same |
CN101814991A (en) * | 2010-03-12 | 2010-08-25 | 西安西电捷通无线网络通信股份有限公司 | Mutual authentication method and system based on identity |
CN102043934A (en) * | 2009-10-12 | 2011-05-04 | 中兴通讯股份有限公司 | Radio frequency identification system and operating method thereof |
-
2011
- 2011-07-22 CN CN201110205943A patent/CN102314585A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070057768A1 (en) * | 2005-09-13 | 2007-03-15 | Nec (China) Co., Ltd. | Radio frequency identification system and method |
CN101089872A (en) * | 2006-06-13 | 2007-12-19 | 中兴通讯股份有限公司 | Communication method for reader and tag in RFID system |
CN101685494A (en) * | 2008-09-25 | 2010-03-31 | 晨星软件研发(深圳)有限公司 | Control method of radio frequency identification tag and radio frequency identification system using same |
CN102043934A (en) * | 2009-10-12 | 2011-05-04 | 中兴通讯股份有限公司 | Radio frequency identification system and operating method thereof |
CN101814991A (en) * | 2010-03-12 | 2010-08-25 | 西安西电捷通无线网络通信股份有限公司 | Mutual authentication method and system based on identity |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112613330A (en) * | 2020-12-04 | 2021-04-06 | 中国电子科技集团公司第五十四研究所 | Ultrahigh frequency RFID verification system based on GJB protocol |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2006203517B2 (en) | Using Promiscuous and Non-Promiscuous Data to Verify Card and Reader Identity | |
EP1755061B1 (en) | Protection of non-promiscuous data in an RFID transponder | |
US20080120726A1 (en) | External storage device | |
KR20140019800A (en) | Method for upgrading rfid readers in situ | |
CN103854042B (en) | RFID label reader-writer authentication and label anti-cloning method | |
CN111130602B (en) | Near field communication card data writing system, method, device and medium | |
CN103136485B (en) | A kind of method realizing computer security and computer | |
CN106021117B (en) | Smart card system man-in-the-middle attack verification platform and test method | |
CN101298817A (en) | Lock body control device and method thereof | |
CN101667255B (en) | Security authentication method, device and system for radio frequency identification | |
CN104680054A (en) | RFID (radio frequency identification devices) data processing method | |
CN109309916A (en) | A kind of transmission of RFID data and Verification System and method | |
WO2012083632A1 (en) | Method and system for controlling access to radio frequency identification tag | |
CN102314585A (en) | Method suitable for testing secure communication of radio frequency identification tag | |
CN103236093A (en) | Identity recognition technology based escorting box management method | |
CN103793742A (en) | Technology of electronic tag safety authentication and information encryption of traffic electronic license plate | |
JP2009129413A (en) | Shared management method of portable storage device, and portable storage device | |
CN103295039B (en) | Radio frequency card read-write operation method | |
CN109584421A (en) | A kind of intelligent door lock authentication administrative system based on domestic safety chip | |
CN102122332B (en) | Method and system for managing password of electronic signing tool | |
CN104867199A (en) | Anti-cheating fingerprint patrolling device | |
JP5347417B2 (en) | IC card system, its host device, program | |
CN102945384A (en) | Method for enhancing high-frequency RFID (radio frequency identification) safety | |
EP2495690B1 (en) | Transponder and method for monitoring access to application data in the transponder | |
CN107743306B (en) | Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120111 |