CN102510334A - Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology - Google Patents

Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology Download PDF

Info

Publication number
CN102510334A
CN102510334A CN2011103496452A CN201110349645A CN102510334A CN 102510334 A CN102510334 A CN 102510334A CN 2011103496452 A CN2011103496452 A CN 2011103496452A CN 201110349645 A CN201110349645 A CN 201110349645A CN 102510334 A CN102510334 A CN 102510334A
Authority
CN
China
Prior art keywords
less radio
frequency
frequency device
pins
radio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103496452A
Other languages
Chinese (zh)
Other versions
CN102510334B (en
Inventor
王煜
廖原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gti Iot Technology Co ltd
Original Assignee
BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd filed Critical BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd
Priority to CN201110349645.2A priority Critical patent/CN102510334B/en
Publication of CN102510334A publication Critical patent/CN102510334A/en
Application granted granted Critical
Publication of CN102510334B publication Critical patent/CN102510334B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a dynamic anti-counterfeiting security system and method based on a WSN wireless sensing net radio-frequency technology. The system comprises a first wireless radio-frequency device in a WSN wireless sensing net and a second wireless radio-frequency device, wherein the first wireless radio-frequency device comprises a first setting module, a first storing module, a first identifying and processing module, a first random number generating module and a first comparing and determining module; the second wireless radio-frequency device comprises a second setting module, a second storing module, a second identifying and processing module, a second random number generating module and a second comparing and determining module. The wireless radio-frequency devices mutually authenticated or mutually send secrete information using double-layer random ciphers. The authenticity of the wireless device in the WSN wireless sensing net is powerful guaranteed.

Description

Dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique
Technical field
The present invention relates to the radio frequency processing technology, particularly relate to a kind of system and method that mutual dynamic anti-fake is maintained secrecy between the less radio-frequency equipment in WSN (Wireless Sensor Network) wireless sense network.
Background technology
Fake and inferior commodities flood market; Consumer's interests have seriously been damaged; Brought enormous economic loss also for simultaneously commodity production enterprise; Have very big social harm,, have very high profit margin owing to copy best brand of product (wrist-watch, case and bag, clothes, name cigarette, famous brand of wine, household electrical appliances, furniture) although enterprise and country are all taking various false proof measures that fake and inferior commodities are taken precautions against; Fraud enterprise also is that level is not poor on anti-anti-counterfeiting technology; False proof modes such as traditional anti-counterfeiting technology such as bar code, laser anti-counterfeit label, two-dimension code, the tamper of famous brand of wine machinery can be duplicated etc. because technology is simple, are difficult to play anti-fake effect truly.
Along with wireless sense network; The particularly development of RF tag and technology of Internet of things; A lot of enterprises adopt the less radio-frequency equipment of wireless sense network to carry out commodity counterfeit prevention; As it is false proof to adopt passive electronic label or limited electronic tag to carry out, and adopts the electronic tag biggest advantage to be that the coding (label signature and read write line signature) of commodity worked out by enterprise oneself, and the whole world that is coded in of every commodity has unique encoding; Can inquire about the information of commodity through network technology and to tell truth from falsehood, have very high antifalse effect.
As shown in Figure 1, comprise commodity number and label signature in the existing electronic tag identifier.The commodity number is a code name of representing commodity, and read write line can be found the information of commodity through this number.Include only the commodity number in most existing label identifier, have in the identifier of minority to comprise a label signature.
The false proof method of existing goods is on commodity, to paste antifalsification label, and antifalsification label contains the identifier of representing commodity, and read write line label reading identifier is also identified its true and false.
Prior art problems is if the fake producer has obtained the content of less radio-frequency equipment mark symbol in the wireless transmission process; As obtain the content of label identifier; And make false label with this content, because identifier contents is genuine, false label might be through the authentication of read write line; And, steal printed label or the passive RFID tags identifier is fairly simple, therefore make false label ratio and be easier to; Though steal active RFID tag identifier difficulty relatively, any radiofrequency signal all can be stolen through wireless capture technique.In case an identifier is stolen, the fake producer can use this identifier to make a plurality of false labels, and when false label came to light, false label might cause damage to commodity reputation and client's interests.
And likewise, in existing tag system, label cannot be identified the true and false of read write line.
That is to say that in the false proof authentication process of existing WSN wireless sense network, the fake producer can steal the less radio-frequency device subscription in the wireless transmission process, then sign and make false less radio-frequency equipment with this.Because signature is genuine, this type of false less radio-frequency equipment might be through the evaluation of other less radio-frequency equipment.
Summary of the invention
The object of the present invention is to provide a kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique, but the authenticity between the less radio-frequency equipment in its strong guarantee WSN wireless sense network.
A kind of dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique for realizing that the object of the invention provides carries out false proof evaluation between two less radio-frequency equipment of WSN wireless sense network, comprise the steps:
Steps A; After the first less radio-frequency equipment and the connection of the second less radio-frequency equipment and starting false proof discriminating; The first less radio-frequency equipment produces one first pins at random; And first PKI in first key list of the corresponding second less radio-frequency equipment of this first pins utilization encrypted through asymmetric enciphering and deciphering algorithm; First pins after will encrypting then joins the said first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
Step B; The second less radio-frequency equipment obtains first private key in first key list of the corresponding first less radio-frequency device identification of the first pins utilization after the encryption of receiving first pins of correspondence through the asymmetric enciphering and deciphering algorithm deciphering of correspondence after receiving first less radio-frequency device identification instruction and resolving first pins after obtaining encrypting;
Utilize first pins that second less radio-frequency device subscription utilization symmetry enciphering and deciphering algorithm is encrypted then, the second less radio-frequency device subscription after encrypting is added the second less radio-frequency device identifier;
The second less radio-frequency device identifier that adds the second less radio-frequency device subscription after encrypting is sent to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Step C, the first less radio-frequency equipment resolve the second less radio-frequency device subscription after obtaining encrypting after receiving the second less radio-frequency device identification instruction of returning;
Utilize first pins to obtain the second less radio-frequency device subscription then through the symmetrical enciphering and deciphering algorithm of correspondence;
The second less radio-frequency device subscription of storage in advance of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent, then the second less radio-frequency device subscription is confirmed correctly to identify then that successfully the second less radio-frequency equipment is true; Otherwise the second less radio-frequency device subscription mistake is identified and is got nowhere, and the second less radio-frequency equipment is false, finishes to return.
More excellent ground, said step B also comprises the steps:
The second less radio-frequency equipment produces one second pins at random, utilizes second PKI in second key list of the corresponding first less radio-frequency equipment through asymmetric enciphering and deciphering algorithm it to be encrypted, and also adds the second less radio-frequency device identifier;
The second less radio-frequency device identifier that adds second pins after encrypting is sent to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Said step C also comprises the steps:
The first less radio-frequency equipment is resolved second pins after obtaining encrypting after receiving the second less radio-frequency device identification instruction of returning;
Utilize second private key in second key list of the corresponding second less radio-frequency equipment will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins then;
Read the first less radio-frequency device subscription; Utilize second pins that obtains after the deciphering the first less radio-frequency device subscription to be encrypted then through symmetry algorithm; The first less radio-frequency device subscription after will encrypting then adds in the first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
After the said step C, also comprise the steps:
After the second less radio-frequency equipment receives first less radio-frequency device identification instruction and resolves the first less radio-frequency device subscription after obtaining encrypting, utilize the first less radio-frequency device subscription deciphering after the encryption that second pins will receive through the symmetry algorithm of correspondence;
The first less radio-frequency device subscription of storage is relatively in advance in the first less radio-frequency device subscription that then deciphering is obtained and the second less radio-frequency equipment; If both are consistent, then the first less radio-frequency device subscription is confirmed correctly to identify successfully; Otherwise the first less radio-frequency device subscription is incorrect, identifies failure, finishes to return.
More excellent ground also comprises the steps: before the said steps A
Steps A '; Be stored in the first less radio-frequency equipment and the second less radio-frequency equipment first key list and second key list are preset; The asymmetric encipher-decipher method of correspondence and the corresponding symmetrical encipher-decipher method of pins are separately positioned in the first less radio-frequency equipment and the second less radio-frequency equipment, and with the first less radio-frequency device subscription with the second less radio-frequency device subscription is preset stores in the first less radio-frequency equipment and the second less radio-frequency equipment.
More excellent ground, the said first less radio-frequency equipment is the active RFID read write line of WSN wireless sense network; The said second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
Perhaps, the said first less radio-frequency equipment is the base station of WSN wireless sense network; The said second less radio-frequency equipment is the node of WSN wireless sense network.
For realizing that the object of the invention also provides a kind of dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique, be included in the first less radio-frequency equipment and the second less radio-frequency equipment between the WSN wireless sense network, wherein:
The said first less radio-frequency equipment comprises that first differentiates processing module, the first random number generation module, and first relatively confirms module;
Wherein:
Said first differentiates processing module; Be used for after the first less radio-frequency equipment and the connection of the second less radio-frequency equipment and starting false proof discriminating; The first less radio-frequency equipment produces one first pins at random; And after request obtains first pins that the first random number generation module generates; This first pins utilized first PKI corresponding to the second less radio-frequency equipment carries out first pins is encrypted through asymmetric enciphering and deciphering algorithm in first key list, first pins after will encrypting then joins in the first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
The said first random number generation module is used for the request of differentiating processing module according to first, generates one first random number sequence at random as first pins, and first pins is sent to first differentiates that processing module and first relatively confirms module;
Said first relatively confirms module, is used for after the first less radio-frequency equipment is received the second less radio-frequency device identification instruction of returning, resolving the second less radio-frequency device subscription after obtaining encrypting; Utilize first pins second less radio-frequency device subscription deciphering after encrypting to be obtained the second less radio-frequency device subscription then through the symmetrical enciphering and deciphering algorithm of correspondence; And the second less radio-frequency device subscription of storage in advance of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent; Then the second less radio-frequency device subscription is confirmed correct; The second less radio-frequency equipment identifies that successfully the second less radio-frequency equipment is true; Otherwise, the second less radio-frequency device subscription mistake, the second less radio-frequency equipment is identified unsuccessful, the second less radio-frequency equipment is false, finishes to return;
The said second less radio-frequency equipment comprises that second differentiates processing module;
Said second differentiates processing module; Be used for after receiving first less radio-frequency device identification instruction and resolving first pins after obtaining encrypting, first pins after the encryption of receiving utilized in first key list corresponding to the asymmetric enciphering and deciphering algorithm deciphering through correspondence of first private key of the first less radio-frequency equipment obtain the first corresponding pins; Utilize first pins that second less radio-frequency device subscription utilization symmetry enciphering and deciphering algorithm is encrypted then, the second less radio-frequency device subscription after encrypting is added the second less radio-frequency device identifier; The second less radio-frequency device identifier that will add the second less radio-frequency device subscription after encrypting then sends to the first less radio-frequency equipment through second less radio-frequency device identification instruction.
More excellent ground, the said second less radio-frequency equipment also comprises the second random number generation module, second relatively confirms module;
The said second random number generation module is used for the request of differentiating processing module according to second, generates one second random number sequence at random as second pins, and second pins is sent to second differentiates that processing module and second relatively confirms module;
Said second of the said second less radio-frequency equipment is differentiated processing module; Also be used in request after the second random number module generates second pins, utilize and through asymmetric enciphering and deciphering algorithm second pins is encrypted the back corresponding to second PKI of the first less radio-frequency equipment in second key list and add the second less radio-frequency device identifier; The second less radio-frequency device identifier that will add second pins after encrypting then sends to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Said first of the said first less radio-frequency equipment is relatively confirmed module, also is used for after the first less radio-frequency equipment is received the second less radio-frequency device identification instruction of returning, resolving second pins after obtaining encrypting; Second private key corresponding to the second less radio-frequency equipment will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins in second key list then; Read the first less radio-frequency device subscription; Utilize second pins that obtains after the deciphering the first less radio-frequency device subscription to be encrypted then through symmetry algorithm; The first less radio-frequency device subscription after will encrypting then joins the first less radio-frequency device identifier, issues the second less radio-frequency equipment through first less radio-frequency device identification instruction;
Said second relatively confirms module; Be used for after receiving first less radio-frequency device identification instruction and resolving the first less radio-frequency device subscription after obtaining encrypting, utilize the first less radio-frequency device subscription deciphering after the second random number generation module generates the encryption that second pins will receive through the symmetry algorithm of correspondence; The first less radio-frequency device subscription of storage is relatively in advance in the first less radio-frequency device subscription that then deciphering is obtained and the second less radio-frequency equipment; If both are consistent; Then the first less radio-frequency device subscription confirms that correctly the first less radio-frequency equipment is identified successfully, finishes to return; Otherwise the first less radio-frequency device subscription is incorrect, and the first less radio-frequency equipment is identified failure, finishes to return.
More excellent ground, the said first less radio-frequency equipment comprises that also first is provided with module, first memory module, wherein:
Said first is provided with module; Be used for to be used in preset being stored in first memory module of the first less radio-frequency equipment of first close and second key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment, and the first less radio-frequency device subscription and the second less radio-frequency device subscription are provided with in first memory module that is stored in the first less radio-frequency equipment in advance; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the first less radio-frequency equipment;
Said first memory module is used for storing and will be used in first close and second key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment and store the first less radio-frequency device subscription and the second less radio-frequency device subscription;
The said second less radio-frequency equipment comprises that second is provided with module, second memory module,
Said second is provided with module; Be used for to be used in first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and second key list is preset is stored in second memory module of the second less radio-frequency equipment, simultaneously the second less radio-frequency device subscription and the first less radio-frequency device subscription be provided with in second memory module that is stored in the second less radio-frequency equipment in advance; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the second less radio-frequency equipment;
Said second memory module is used for storing first key list and second key list that are used in asymmetric enciphering and deciphering algorithm encryption and decryption, and stores the second less radio-frequency device subscription and the second less radio-frequency device subscription.
More excellent ground, said symmetrical enciphering and deciphering algorithm is the DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, a kind of in the IDEA algorithm;
Said asymmetric enciphering and deciphering algorithm is a kind of in RSA Algorithm, ECC algorithm, the Diffie-Hellman algorithm.
The invention has the beneficial effects as follows: dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique of the present invention; Between the first less radio-frequency equipment and the second less radio-frequency equipment, adopt double-deck password identification to identify; And used password meeting change at random; If therefore identifier is not easy to be stolen through the wireless network capture technique, the fake producer can not use this identifier to fake, and has increased the difficulty that cracks; The fail safe of enhancement apparatus greatly, thus the less radio-frequency equipment between the strong guarantee WSN wireless sense network authenticity.
Description of drawings
Fig. 1 is existing label identifier structural representation;
Fig. 2 is the dynamic anti-fake time slot scrambling flow chart based on WSN wireless sense network radio-frequency technique of the present invention;
Fig. 3 is the dynamic anti-fake secrecy system structural representation based on WSN wireless sense network radio-frequency technique of the present invention.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, a kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique of the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
A kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique of the present invention are included in the first less radio-frequency equipment and the second less radio-frequency equipment in the WSN wireless sense network.The said first less radio-frequency equipment of stating can be the base station, and the second less radio-frequency equipment can be node; The perhaps said first less radio-frequency equipment can be the active RFID read write line, and the said second less radio-frequency equipment can be active RFID tag.In the embodiment of the invention; With the said first less radio-frequency equipment is the active RFID read write line; The said second less radio-frequency equipment is that active RFID tag is described, but should be noted that it is just in order to make those skilled in the art can understand the present invention better; Being not limited to active RFID read write line and active RFID tag, is not the restriction to claim of the present invention yet.
As shown in Figure 2, a kind of dynamic anti-fake time slot scrambling of the embodiment of the invention based on WSN wireless sense network radio-frequency technique, it carries out false proof evaluation to label and read write line between the WSN wireless sense network, comprise the steps:
Step S100; Be communicated with at active RFID tag and active RFID read write line; After starting label and the false proof discriminating of read write line, read write line produces one first pins at random, and utilizes in first key list first PKI corresponding to this active RFID tag to encrypt through asymmetric enciphering and deciphering algorithm this first pins; First pins after will encrypting then joins the read write line identifier of said commodity sign, sends to label through the instruction of read write line sign;
Step S200; Label utilizes in first key list first pins after the encryption of receiving corresponding to the asymmetric enciphering and deciphering algorithm deciphering through correspondence of first private key of this read write line to obtain the first corresponding pins after receiving read write line sign instruction and resolving first pins after obtaining encrypting;
Utilize first pins to utilize symmetrical enciphering and deciphering algorithm to encrypt the label signature then, the label signature after encrypting is added label identifier;
Simultaneously, label produces one second pins at random, utilizes in second key list second PKI that should the active RFID read write line encrypted it through asymmetric enciphering and deciphering algorithm also to add label identifier;
The label identifier of label signature after the adding encryption and second pins after the encryption is sent to read write line through the tag identifier instruction.
After step S300, read write line receive the tag identifier instruction of returning, label signature after parsing obtains encrypting and second pins after the encryption;
Utilize the symmetrical enciphering and deciphering algorithm of first pins through correspondence to obtain the label signature then, utilize in second key list second private key will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins corresponding to this label;
The label signature that deciphering is obtained compares with the label signature of the storage in advance of read write line, if both are consistent, then the label Signature Confirmation is correct, and then tag authentication is successful, and label is true; Otherwise, label signature mistake, tag authentication is unsuccessful, and label is false, finishes to return;
Simultaneously, read the read write line signature, utilize second pins that obtains after the deciphering through symmetry algorithm the read write line signature to be encrypted then, the read write line signature after will encrypting then adds in the read write line identifier, sends to label through the instruction of read write line sign.
After step S400, label receive read write line sign instruction and resolve the read write line signature after obtaining encrypting, utilize the read write line signature deciphering after the encryption that second pins will receive through the symmetry algorithm of correspondence;
In the read write line signature that then deciphering is obtained and the label read write line signature of storage in advance relatively, if both are consistent, then the read write line Signature Confirmation is correct, read write line is identified successfully; Otherwise the read write line signature is incorrect, and read write line is identified failure, finishes to return.
Preferably, also comprise the steps: before the said step S100
Step S100 '; Be stored in label and the read write line first key list and second key list are preset; The asymmetric encipher-decipher method of correspondence and the corresponding symmetrical encipher-decipher method of pins are separately positioned in label and the read write line, and the label signature are preset with the read write line signature store in label and the read write line.
A kind of dynamic anti-fake time slot scrambling of the embodiment of the invention based on WSN wireless sense network radio-frequency technique; Because read write line and label can produce pins at random; The key that uses each time is all different, if the identifier that the fake producer once sends to certain steathily can not be played tricks.Because pins itself also is through encrypting, and is stolen as long as encryption method does not have, just be that the fake producer steals all keys, can not play tricks.Therefore, this method has reached the effect of double-deck encryption, and it is close that it adopts bilayer to establish at random, establishes close reliability height.
The dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique of the embodiment of the invention, as shown in Figure 3, be included in active RFID read write line 1 and active RFID tag 2 between the WSN wireless sense network, wherein:
Said active RFID read write line 1 comprises that first is provided with module 11, the first memory modules 12, the first and differentiates that processing modules 13, the first random number generation modules 14, the first relatively confirm module 15;
Wherein:
Said first is provided with module 11; Be used for to be used in preset being stored in first memory module of read write line of first close and second key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of read write line, and setting in advance is stored in first memory module of read write line with the label signature with the read write line signature; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in read write line.
Said symmetrical enciphering and deciphering algorithm includes but not limited to the DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm etc.
Said asymmetric enciphering and deciphering algorithm includes but not limited to RSA Algorithm, ECC algorithm, Diffie-Hellman algorithm etc.
Said first memory module 12 is used for storing first close and second key list and the storage read-write device signature and the label signature that will be used in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of read write line.
Said first differentiates processing module 13; Be used for being communicated with at active RFID tag and active RFID read write line; After starting label and the false proof discriminating of read write line; Read write line produces one first pins at random, and after request obtains first pins that the first random number generation module generates, utilizes first PKI to should label in first key list to carry out first pins is encrypted through asymmetric enciphering and deciphering algorithm this first pins; First pins after will encrypting then joins in the read write line identifier, sends to label through the instruction of read write line sign;
The said first random number generation module 14 is used for the request of differentiating processing module according to first, generates one first random number sequence at random as first pins, and first pins is sent to first differentiates that processing module and first relatively confirms module.
Said first relatively confirms module 15, is used for after read write line is received the tag identifier instruction of returning label signature after parsing obtains encrypting and second pins after the encryption; Utilize the symmetrical enciphering and deciphering algorithm of first pins through correspondence that the label signature deciphering after encrypting is obtained the label signature then, utilize in second key list second private key will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins corresponding to this label; And the label signature of the label that deciphering is obtained signature and the storage in advance of read write line compares, if both are consistent, then the label Signature Confirmation is correct, and tag authentication is successful, and label is true; Otherwise, label signature mistake, tag authentication is unsuccessful, and label is false, finishes to return; Simultaneously, read the read write line signature, utilize second pins that obtains after the deciphering through symmetry algorithm the read write line signature to be encrypted then, the read write line signature after will encrypting then joins the read write line identifier, issues label through the instruction of read write line sign.
Said active RFID tag 2 comprises that second is provided with module 21, the second memory modules 22, the second and differentiates that processing modules 23, the second random number generation modules 24, the second relatively confirm module 25;
Wherein:
Said second is provided with module 21; Be used for being used in first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and second key list is preset is stored in second memory module of label, setting in advance is stored in second memory module of label with the read write line signature with the label signature simultaneously; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in label.
Said second memory module 22 is used for storing first key list and second key list that are used in asymmetric enciphering and deciphering algorithm encryption and decryption, and storage tags signature and read write line signature.
Said second differentiates processing module 23; Be used for after receiving read write line sign instruction and resolving first pins after obtaining encrypting, first pins after the encryption of receiving utilized in first key list corresponding to the asymmetric enciphering and deciphering algorithm deciphering through correspondence of first private key of this read write line obtain the first corresponding pins; Utilize first pins to utilize symmetrical enciphering and deciphering algorithm to encrypt the label signature then, the label signature after encrypting is added label identifier; And in request after the second random number module generates second pins, utilize in second key list second PKI second pins to be encrypted back adding label identifier through asymmetric enciphering and deciphering algorithm corresponding to this read write line; To add the label signature after encrypting then and encrypt after the label identifier of second pins, send to read write line through the tag identifier instruction.
The said second random number generation module 24 is used for the request of differentiating processing module according to second, generates one second random number sequence at random as second pins, and second pins is sent to second differentiates that processing module and second relatively confirms module.
Said second relatively confirms module 25; Be used for after receiving read write line sign instruction and resolving the read write line signature after obtaining encrypting, utilize the read write line signature deciphering after the second random number generation module generates the encryption that second pins will receive through the symmetry algorithm of correspondence; In the read write line signature that then deciphering is obtained and the label read write line signature of storage in advance relatively, if both are consistent, then the read write line Signature Confirmation is correct, read write line is identified successfully; Otherwise the read write line signature is incorrect, and read write line is identified failure, finishes to return.
In the embodiment of the invention, include but not limited to information such as first pins, read write line signature, commodity number in the said read write line identifier.The content of said read write line identifier and length can be carried out change process according to function.
The instruction of said read write line sign will be read and write identifier and is sent to read write line and handle.
In the embodiment of the invention, include but not limited to information such as second pins, label signature, commodity number in the said label identifier.The content of said label identifier and length can be carried out change process according to function.
Said tag identifier instruction is sent to read write line with label identifier and handles.
Said sign instruction is resolved is a kind of prior art of WSN radio sensing network, therefore, in embodiments of the present invention, describes in detail no longer one by one.
Preferably, but as the another kind execution mode, said WSN wireless sense network; Also comprising through mobile phone or computer utilizes network to be connected to the data center of read write line and/or label; Said first is provided with module and module is set first memory module, second and second memory module is arranged at said data center, after read write line is received the identifier of label, when carrying out false proof authentication process; The data of downloading first memory module from data center are to read write line; Download the data of second memory module and carry out false proof authentication process to label, its advantage is not deposit key in the read write line, and is false proof safer.
The dynamic anti-fake secrecy system and the method based on WSN wireless sense network radio-frequency technique of the embodiment of the invention can guarantee that under the situation that identifier is stolen, the fake producer is difficult to produce the false label of mixing the spurious with the genuine.
The present invention uses the true and false of double-deck random cipher by the read write line appraisement label, also lets simultaneously the true and false (double-layer double-direction evaluation) of tag authentication read write line.Label identifier and read write line identifier are stolen can not produce the label or the read write line of mixing the spurious with the genuine.
This technology can be used in the Comodity anti-fake system, but is not limited to Comodity anti-fake system.The wireless telecommunication system of the false proof evaluation of any needs can be used this technology.Because this technology implementation is got up simply, this technology is particularly useful for the WSN wireless sense network of low power consuming.
Should be noted that at last that obviously those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these revise and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification.

Claims (11)

1. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique is characterized in that, between two less radio-frequency equipment of WSN wireless sense network, carries out false proof evaluation, comprises the steps:
Steps A; After the first less radio-frequency equipment and the connection of the second less radio-frequency equipment and starting false proof discriminating; The first less radio-frequency equipment produces one first pins at random; And first PKI in first key list of the corresponding second less radio-frequency equipment of this first pins utilization encrypted through asymmetric enciphering and deciphering algorithm; First pins after will encrypting then joins the said first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
Step B; The second less radio-frequency equipment obtains first private key in first key list of the corresponding first less radio-frequency device identification of the first pins utilization after the encryption of receiving first pins of correspondence through the asymmetric enciphering and deciphering algorithm deciphering of correspondence after receiving first less radio-frequency device identification instruction and resolving first pins after obtaining encrypting;
Utilize first pins that second less radio-frequency device subscription utilization symmetry enciphering and deciphering algorithm is encrypted then, the second less radio-frequency device subscription after encrypting is added the second less radio-frequency device identifier;
The second less radio-frequency device identifier that adds the second less radio-frequency device subscription after encrypting is sent to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Step C, the first less radio-frequency equipment resolve the second less radio-frequency device subscription after obtaining encrypting after receiving the second less radio-frequency device identification instruction of returning;
Utilize first pins to obtain the second less radio-frequency device subscription then through the symmetrical enciphering and deciphering algorithm of correspondence;
The second less radio-frequency device subscription of storage in advance of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent, then the second less radio-frequency device subscription is confirmed correctly to identify then that successfully the second less radio-frequency equipment is true; Otherwise the second less radio-frequency device subscription mistake is identified and is got nowhere, and the second less radio-frequency equipment is false, finishes to return.
2. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 1 is characterized in that,
Said step B also comprises the steps:
The second less radio-frequency equipment produces one second pins at random, utilizes second PKI in second key list of the corresponding first less radio-frequency equipment through asymmetric enciphering and deciphering algorithm it to be encrypted, and also adds the second less radio-frequency device identifier;
The second less radio-frequency device identifier that adds second pins after encrypting is sent to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Said step C also comprises the steps:
The first less radio-frequency equipment is resolved second pins after obtaining encrypting after receiving the second less radio-frequency device identification instruction of returning;
Utilize second private key in second key list of the corresponding second less radio-frequency equipment will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins then;
Read the first less radio-frequency device subscription; Utilize second pins that obtains after the deciphering the first less radio-frequency device subscription to be encrypted then through symmetry algorithm; The first less radio-frequency device subscription after will encrypting then adds in the first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
After the said step C, also comprise the steps:
After the second less radio-frequency equipment receives first less radio-frequency device identification instruction and resolves the first less radio-frequency device subscription after obtaining encrypting, utilize the first less radio-frequency device subscription deciphering after the encryption that second pins will receive through the symmetry algorithm of correspondence;
The first less radio-frequency device subscription of storage is relatively in advance in the first less radio-frequency device subscription that then deciphering is obtained and the second less radio-frequency equipment; If both are consistent, then the first less radio-frequency device subscription is confirmed correctly to identify successfully; Otherwise the first less radio-frequency device subscription is incorrect, identifies failure, finishes to return.
3. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 1 and 2 is characterized in that, also comprises the steps: before the said steps A
Steps A '; Be stored in the first less radio-frequency equipment and the second less radio-frequency equipment first key list and second key list are preset; The asymmetric encipher-decipher method of correspondence and the corresponding symmetrical encipher-decipher method of pins are separately positioned in the first less radio-frequency equipment and the second less radio-frequency equipment, and with the first less radio-frequency device subscription with the second less radio-frequency device subscription is preset stores in the first less radio-frequency equipment and the second less radio-frequency equipment.
4. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 3 is characterized in that, the said first less radio-frequency equipment is the active RFID read write line of WSN wireless sense network; The said second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
5. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 3 is characterized in that, the said first less radio-frequency equipment is the base station of WSN wireless sense network; The said second less radio-frequency equipment is the node of WSN wireless sense network.
6. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique is characterized in that, is included in the first less radio-frequency equipment and the second less radio-frequency equipment between the WSN wireless sense network, wherein:
The said first less radio-frequency equipment comprises that first differentiates processing module, the first random number generation module, and first relatively confirms module;
Wherein:
Said first differentiates processing module; Be used for after the first less radio-frequency equipment and the connection of the second less radio-frequency equipment and starting false proof discriminating; The first less radio-frequency equipment produces one first pins at random; And after request obtains first pins that the first random number generation module generates; This first pins utilized first PKI corresponding to the second less radio-frequency equipment carries out first pins is encrypted through asymmetric enciphering and deciphering algorithm in first key list, first pins after will encrypting then joins in the first less radio-frequency device identifier, sends to the second less radio-frequency equipment through first less radio-frequency device identification instruction;
The said first random number generation module is used for the request of differentiating processing module according to first, generates one first random number sequence at random as first pins, and first pins is sent to first differentiates that processing module and first relatively confirms module;
Said first relatively confirms module, is used for after the first less radio-frequency equipment is received the second less radio-frequency device identification instruction of returning, resolving the second less radio-frequency device subscription after obtaining encrypting; Utilize first pins second less radio-frequency device subscription deciphering after encrypting to be obtained the second less radio-frequency device subscription then through the symmetrical enciphering and deciphering algorithm of correspondence; And the second less radio-frequency device subscription of storage in advance of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent; Then the second less radio-frequency device subscription is confirmed correct; The second less radio-frequency equipment identifies that successfully the second less radio-frequency equipment is true; Otherwise, the second less radio-frequency device subscription mistake, the second less radio-frequency equipment is identified unsuccessful, the second less radio-frequency equipment is false, finishes to return;
The said second less radio-frequency equipment comprises that second differentiates processing module;
Said second differentiates processing module; Be used for after receiving first less radio-frequency device identification instruction and resolving first pins after obtaining encrypting, first pins after the encryption of receiving utilized in first key list corresponding to the asymmetric enciphering and deciphering algorithm deciphering through correspondence of first private key of the first less radio-frequency equipment obtain the first corresponding pins; Utilize first pins that second less radio-frequency device subscription utilization symmetry enciphering and deciphering algorithm is encrypted then, the second less radio-frequency device subscription after encrypting is added the second less radio-frequency device identifier; The second less radio-frequency device identifier that will add the second less radio-frequency device subscription after encrypting then sends to the first less radio-frequency equipment through second less radio-frequency device identification instruction.
7. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 6 is characterized in that,
The said second less radio-frequency equipment also comprises the second random number generation module, and second relatively confirms module;
The said second random number generation module is used for the request of differentiating processing module according to second, generates one second random number sequence at random as second pins, and second pins is sent to second differentiates that processing module and second relatively confirms module;
Said second of the said second less radio-frequency equipment is differentiated processing module; Also be used in request after the second random number module generates second pins, utilize and through asymmetric enciphering and deciphering algorithm second pins is encrypted the back corresponding to second PKI of the first less radio-frequency equipment in second key list and add the second less radio-frequency device identifier; The second less radio-frequency device identifier that will add second pins after encrypting then sends to the first less radio-frequency equipment through second less radio-frequency device identification instruction;
Said first of the said first less radio-frequency equipment is relatively confirmed module, also is used for after the first less radio-frequency equipment is received the second less radio-frequency device identification instruction of returning, resolving second pins after obtaining encrypting; Second private key corresponding to the second less radio-frequency equipment will receive that through the asymmetric enciphering and deciphering algorithm of correspondence second pins deciphering after the encryption obtains second pins in second key list then; Read the first less radio-frequency device subscription; Utilize second pins that obtains after the deciphering the first less radio-frequency device subscription to be encrypted then through symmetry algorithm; The first less radio-frequency device subscription after will encrypting then joins the first less radio-frequency device identifier, issues the second less radio-frequency equipment through first less radio-frequency device identification instruction;
Said second relatively confirms module; Be used for after receiving first less radio-frequency device identification instruction and resolving the first less radio-frequency device subscription after obtaining encrypting, utilize the first less radio-frequency device subscription deciphering after the second random number generation module generates the encryption that second pins will receive through the symmetry algorithm of correspondence; The first less radio-frequency device subscription of storage is relatively in advance in the first less radio-frequency device subscription that then deciphering is obtained and the second less radio-frequency equipment; If both are consistent; Then the first less radio-frequency device subscription confirms that correctly the first less radio-frequency equipment is identified successfully, finishes to return; Otherwise the first less radio-frequency device subscription is incorrect, and the first less radio-frequency equipment is identified failure, finishes to return.
8. according to claim 6 or 7 described dynamic anti-fake secrecy systems, it is characterized in that the said first less radio-frequency equipment comprises that also first is provided with module based on WSN wireless sense network radio-frequency technique, first memory module, wherein:
Said first is provided with module; Be used for to be used in preset being stored in first memory module of the first less radio-frequency equipment of first close and second key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment, and the first less radio-frequency device subscription and the second less radio-frequency device subscription are provided with in first memory module that is stored in the first less radio-frequency equipment in advance; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the first less radio-frequency equipment;
Said first memory module is used for storing and will be used in first close and second key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment and store the first less radio-frequency device subscription and the second less radio-frequency device subscription;
The said active RFID second less radio-frequency equipment comprises that second is provided with module, second memory module,
Said second is provided with module; Be used for to be used in first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and second key list is preset is stored in second memory module of the second less radio-frequency equipment, simultaneously the second less radio-frequency device subscription and the first less radio-frequency device subscription be provided with in second memory module that is stored in the second less radio-frequency equipment in advance; And said symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the second less radio-frequency equipment;
Said second memory module is used for storing first key list and second key list that are used in asymmetric enciphering and deciphering algorithm encryption and decryption, and stores the second less radio-frequency device subscription and the second less radio-frequency device subscription.
9. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 8 is characterized in that said symmetrical enciphering and deciphering algorithm is the DES algorithm; The 3DES algorithm, TDEA algorithm, Blowfish algorithm; The RC5 algorithm, a kind of in the IDEA algorithm;
Said asymmetric enciphering and deciphering algorithm is a kind of in RSA Algorithm, ECC algorithm, the Diffie-Hellman algorithm.
10. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 8 is characterized in that, the said first less radio-frequency equipment is the active RFID read write line of WSN wireless sense network; The said second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
11. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 8 is characterized in that, the said first less radio-frequency equipment is the base station of WSN wireless sense network; The said second less radio-frequency equipment is the node of WSN wireless sense network.
CN201110349645.2A 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology Expired - Fee Related CN102510334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110349645.2A CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110349645.2A CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Publications (2)

Publication Number Publication Date
CN102510334A true CN102510334A (en) 2012-06-20
CN102510334B CN102510334B (en) 2014-02-12

Family

ID=46222388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110349645.2A Expired - Fee Related CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Country Status (1)

Country Link
CN (1) CN102510334B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110969445A (en) * 2019-10-31 2020-04-07 紫优科技(深圳)有限公司 Anti-counterfeiting method based on NFC

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821414B (en) 2012-08-07 2015-05-27 北京博大光通国际半导体技术有限公司 System and method for managing CWSN (cloud wireless sensor network) communication data based on GUI (graphical user interface)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1282260A1 (en) * 2001-07-30 2003-02-05 SCM Microsystems GmbH Key agreement method for secure communication system
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
CN101847199A (en) * 2009-03-24 2010-09-29 复旦大学 Security authentication method for radio frequency recognition system
EP2309673A1 (en) * 2008-07-23 2011-04-13 China Iwncomm Co., Ltd. Method for accessing data safely suitable for electronic tag

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1282260A1 (en) * 2001-07-30 2003-02-05 SCM Microsystems GmbH Key agreement method for secure communication system
EP1282260B1 (en) * 2001-07-30 2005-12-28 SCM Microsystems GmbH Key agreement method for secure communication system
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
EP2309673A1 (en) * 2008-07-23 2011-04-13 China Iwncomm Co., Ltd. Method for accessing data safely suitable for electronic tag
CN101847199A (en) * 2009-03-24 2010-09-29 复旦大学 Security authentication method for radio frequency recognition system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110969445A (en) * 2019-10-31 2020-04-07 紫优科技(深圳)有限公司 Anti-counterfeiting method based on NFC
CN110969445B (en) * 2019-10-31 2024-05-28 广州市人民印刷厂股份有限公司 NFC-based anti-counterfeiting method

Also Published As

Publication number Publication date
CN102510334B (en) 2014-02-12

Similar Documents

Publication Publication Date Title
CN105354604B (en) A kind of method for anti-counterfeit effectively based on physics unclonable function
CN103065168B (en) A kind of electronic tag method for anti-counterfeit and system
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
WO2016145705A1 (en) Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN103957186B (en) Method for effectively transferring label ownership in RFID system
CN102663591A (en) Product anti-counterfeiting method and system based on electronic tag
CN103886469A (en) Product two-dimension code generation and query system
CN107231331A (en) Obtain, issue the implementation method and device of electronic certificate
CN103150655A (en) Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN102855577A (en) Multiple merchandise anti-counterfeiting verification method based on cloud computing
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN110598433B (en) Block chain-based anti-fake information processing method and device
WO2015154595A1 (en) One-time pad authentication system based on closed-loop authentication theory and internet
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN109951427A (en) A kind of product traceability method and system, cloud are traced to the source platform
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104268610A (en) Method for generating and reading graded QR code
CN202870898U (en) Radio frequency-based commodity information identification system
CN104851007A (en) Commodity information management system and method based on two-dimensional code and self-dissolving system
CN102404118A (en) Object certification method based on short-distance communication terminal
CN104574119A (en) Commodity identifying and tracing method
CN103971245B (en) A kind of combined ciphering system false proof for electronic article
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification
CN104899748A (en) Two-dimensional code and scratch-off code composite identifying method based on identity authentication technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 100176, Beijing, Beijing economic and Technological Development Zone, Garden North Street, No. 52, building 2, room 4, 402,

Patentee after: BEIJING GTI IOT TECHNOLOGY Co.,Ltd.

Address before: 100176, Beijing, Beijing Daxing District economic and Technological Development Zone, 2 North Garden Street, BDA international enterprise Avenue, 56, 3 floor

Patentee before: GTI INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140212

CF01 Termination of patent right due to non-payment of annual fee