CN102510334B - Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology - Google Patents

Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology Download PDF

Info

Publication number
CN102510334B
CN102510334B CN201110349645.2A CN201110349645A CN102510334B CN 102510334 B CN102510334 B CN 102510334B CN 201110349645 A CN201110349645 A CN 201110349645A CN 102510334 B CN102510334 B CN 102510334B
Authority
CN
China
Prior art keywords
less radio
frequency
frequency device
radio
pins
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110349645.2A
Other languages
Chinese (zh)
Other versions
CN102510334A (en
Inventor
王煜
廖原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gti Iot Technology Co ltd
Original Assignee
BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd filed Critical BEIJING BODA GUANGTONG INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co Ltd
Priority to CN201110349645.2A priority Critical patent/CN102510334B/en
Publication of CN102510334A publication Critical patent/CN102510334A/en
Application granted granted Critical
Publication of CN102510334B publication Critical patent/CN102510334B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a dynamic anti-counterfeiting security system and method based on a WSN wireless sensing net radio-frequency technology. The system comprises a first wireless radio-frequency device in a WSN wireless sensing net and a second wireless radio-frequency device, wherein the first wireless radio-frequency device comprises a first setting module, a first storing module, a first identifying and processing module, a first random number generating module and a first comparing and determining module; the second wireless radio-frequency device comprises a second setting module, a second storing module, a second identifying and processing module, a second random number generating module and a second comparing and determining module. The wireless radio-frequency devices mutually authenticated or mutually send secrete information using double-layer random ciphers. The authenticity of the wireless device in the WSN wireless sensing net is powerful guaranteed.

Description

Dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique
Technical field
The present invention relates to radio frequency processing technology, particularly relate to a kind of at WSN(Wireless Sensor Network) the secret system and method for dynamic anti-fake mutually between less radio-frequency equipment in wireless sense network.
Background technology
Fake and inferior commodities flood market, consumer's interests have seriously been damaged, the enterprise of Ye Gei commodity production has simultaneously brought huge economic loss, there is very large social harm, although enterprise and country are all taking various false proof measures to take precautions against fake and inferior commodities, but owing to copying best brand of product (wrist-watch, case and bag, clothes, name cigarette, famous brand of wine, household electrical appliances, furniture) there is very high profit margin, fraud enterprise is also that level is not poor in anti-anti-counterfeiting technology, traditional anti-counterfeiting technology is as bar code, laser anti-counterfeit label, Quick Response Code, the false proof modes such as famous brand of wine machinery tamper are because technology is simple, can copy etc., be difficult to play anti-fake effect truly.
Along with wireless sense network, the particularly development of radio-frequency (RF) tag and technology of Internet of things, a lot of enterprises adopt the less radio-frequency equipment of wireless sense network to carry out commodity counterfeit prevention, as adopt passive electronic label or limited electronic tag to carry out false proof, adopt the advantage of electronic tag maximum to be that coding (label signature and read write line signature) the Shi You enterprise oneself of commodity works out, the whole world that is coded in of every commodity has unique coding, by network technology, can the information of commodity be inquired about and be told truth from falsehood, there is very high antifalse effect.
As shown in Figure 1, existing electronic tag identifier comprises commodity number and label signature.Commodity number is the code name that represents commodity, and read write line can be found the information of commodity by this number.In most existing label identifier, only include commodity number, have the identifier of minority to comprise a label signature.
The false proof method of existing goods is on commodity, to paste antifalsification label, and antifalsification label contains the identifier that represents commodity, and read write line label reading identifier is also identified its true and false.
The problem of prior art is if fake producer has obtained the content of the identifier of less radio-frequency equipment in wireless transmission process, as obtain the content of label identifier, and manufacture false label by this content, because identifier contents is genuine, false label likely can be by the authentication of read write line; And, steal printed label or passive RFID tags identifier is fairly simple, therefore manufacture false label ratio and be easier to; Although steal active RFID tag identifier difficulty relatively, any radiofrequency signal all can be stolen by wireless capture technique.Once an identifier is stolen, fake producer can manufacture a plurality of false labels with this identifier, and when false label is found, false label likely causes damage to commodity reputation and the benefit of client.
And similarly, in existing tag system, label cannot be identified the true and false of read write line.
That is to say, in the false proof authentication process of existing WSN wireless sense network, fake producer can steal less radio-frequency device subscription in wireless transmission process, with this, signs and makes false less radio-frequency equipment.Because signature is genuine, this type of false less radio-frequency equipment likely can pass through the evaluation of other less radio-frequency equipment.
Summary of the invention
The object of the present invention is to provide a kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique, its can strong guarantee WSN wireless sense network in authenticity between less radio-frequency equipment.
A kind of dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique providing for realizing the object of the invention carries out false proof evaluation between two less radio-frequency equipment of WSN wireless sense network, comprises the steps:
Steps A, at the first less radio-frequency equipment and the second less radio-frequency equipment, be communicated with and start after false proof discriminating, random one first pins that produces of the first less radio-frequency equipment, and the first PKI in the first key list of corresponding the second less radio-frequency equipment of this first pins utilization is encrypted by asymmetric enciphering and deciphering algorithm, then the first pins after encrypting is joined to described the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment;
Step B, the second less radio-frequency equipment is being received the first less radio-frequency device identification instruction and is being resolved after the first pins after being encrypted, and the first private key in the first key list of corresponding the first less radio-frequency device identification of the first pins utilization after the encryption of receiving is obtained to the first pins of correspondence by the asymmetric enciphering and deciphering algorithm deciphering of correspondence;
Then utilize the first pins that the symmetrical enciphering and deciphering algorithm of the second less radio-frequency device subscription utilization is encrypted, the second less radio-frequency device subscription after encrypting is added to the second less radio-frequency device identifier;
To add the second less radio-frequency device identifier of the second less radio-frequency device subscription after encryption to send to the first less radio-frequency equipment by the second less radio-frequency device identification instruction;
Step C, the first less radio-frequency equipment is received after the second less radio-frequency device identification instruction of returning, resolves the second less radio-frequency device subscription after being encrypted;
Then utilize the first pins to obtain the second less radio-frequency device subscription by corresponding symmetrical enciphering and deciphering algorithm;
The second pre-stored less radio-frequency device subscription of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent, the second less radio-frequency device subscription is confirmed correctly, to identify successfully, and the second less radio-frequency equipment is true; Otherwise the second less radio-frequency device subscription mistake, identifies unsuccessfully, the second less radio-frequency equipment is false, finishes to return.
More preferably, described step B also comprises the steps:
Random one second pins that produces of the second less radio-frequency equipment, utilizes the second PKI in the second key list of corresponding the first less radio-frequency equipment to be encrypted by asymmetric enciphering and deciphering algorithm, and also adds the second less radio-frequency device identifier;
To add the second less radio-frequency device identifier of the second pins after encryption to send to the first less radio-frequency equipment by the second less radio-frequency device identification instruction;
Described step C also comprises the steps:
The first less radio-frequency equipment is received after the second less radio-frequency device identification instruction of returning, resolves the second pins after being encrypted;
Then utilize the second private key in the second key list of corresponding the second less radio-frequency equipment will receive that by the asymmetric enciphering and deciphering algorithm of correspondence the second pins deciphering after encryption obtains the second pins;
Read the first less radio-frequency device subscription, then utilize the second pins obtaining after deciphering by symmetry algorithm, the first less radio-frequency device subscription to be encrypted, then the first less radio-frequency device subscription after encrypting is added in the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment;
After described step C, also comprise the steps:
The second less radio-frequency equipment receives the first less radio-frequency device identification instruction and resolves after the first less radio-frequency device subscription after being encrypted, and utilizes the second pins by corresponding symmetry algorithm, the first less radio-frequency device subscription after the encryption of receiving to be deciphered;
Then pre-stored the first less radio-frequency device subscription comparison in the first less radio-frequency device subscription deciphering being obtained and the second less radio-frequency equipment; If both are consistent, the first less radio-frequency device subscription is confirmed correctly, to identify successfully; Otherwise the first less radio-frequency device subscription is incorrect, identifies unsuccessfully, finishes to return.
More preferably, before described steps A, also comprise the steps:
Steps A ', be stored in the first less radio-frequency equipment and the second less radio-frequency equipment the first key list and the second key list are default, the asymmetric encipher-decipher method of correspondence and symmetrical encipher-decipher method corresponding to pins are separately positioned in the first less radio-frequency equipment and the second less radio-frequency equipment, and store in the first less radio-frequency equipment and the second less radio-frequency equipment the first less radio-frequency device subscription and the second less radio-frequency device subscription are default.
More preferably, the active RFID read write line that described the first less radio-frequency equipment is WSN wireless sense network; Described the second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
Or described the first less radio-frequency equipment is the base station of WSN wireless sense network; Described the second less radio-frequency equipment is the node of WSN wireless sense network.
For realizing the object of the invention, also provide a kind of dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique, be included in the first less radio-frequency equipment and the second less radio-frequency equipment between WSN wireless sense network, wherein:
Described the first less radio-frequency equipment, comprises the first discriminating processing module, the first random number generation module, and first relatively confirms module;
Wherein:
Described first differentiates processing module, for being communicated with and starting after false proof discriminating at the first less radio-frequency equipment and the second less radio-frequency equipment, and in request, obtain after the first pins of the first random number generation module generation, utilize the first PKI corresponding to the second less radio-frequency equipment in the first key list to be undertaken the first pins to be encrypted by asymmetric enciphering and deciphering algorithm this first pins, then the first pins after encrypting is joined in the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment,
Described the first random number generation module, for according to the request of the first discriminating processing module, generates at random one first random number sequence as the first pins, and sends to the first discriminating processing module and first relatively to confirm module the first pins;
Described first relatively confirms module, for receiving at the first less radio-frequency equipment after the second less radio-frequency device identification instruction of returning, resolves the second less radio-frequency device subscription after being encrypted; Then utilize the first pins, by corresponding symmetrical enciphering and deciphering algorithm, the second less radio-frequency device subscription deciphering after encrypting is obtained to the second less radio-frequency device subscription; And the second pre-stored less radio-frequency device subscription of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares, if both are consistent, the second less radio-frequency device subscription is confirmed correct, the second less radio-frequency equipment qualification success, the second less radio-frequency equipment is true; Otherwise, the second less radio-frequency device subscription mistake, the second less radio-frequency equipment qualification is unsuccessful, and the second less radio-frequency equipment is false, finishes to return;
Described the second less radio-frequency equipment, comprises the second discriminating processing module;
Described second differentiates processing module, for receiving the first less radio-frequency device identification instruction and resolving after the first pins after being encrypted, utilize the first private key corresponding to the first less radio-frequency equipment in the first key list by the asymmetric enciphering and deciphering algorithm deciphering of correspondence, to obtain the first pins of correspondence the first pins after the encryption of receiving; Then utilize the first pins that the symmetrical enciphering and deciphering algorithm of the second less radio-frequency device subscription utilization is encrypted, the second less radio-frequency device subscription after encrypting is added to the second less radio-frequency device identifier; Then by adding the second less radio-frequency device identifier of the second less radio-frequency device subscription after encryption, by the second less radio-frequency device identification instruction, send to the first less radio-frequency equipment.
More preferably, described the second less radio-frequency equipment, also comprises the second random number generation module, and second relatively confirms module;
Described the second random number generation module, for according to the request of the second discriminating processing module, generates at random one second random number sequence as the second pins, and sends to the second discriminating processing module and second relatively to confirm module the second pins;
Described second of described the second less radio-frequency equipment is differentiated processing module, also, for generating after the second pins in request the second random number module, utilize the second PKI corresponding to the first less radio-frequency equipment in the second key list will after the second pins encryption, to add the second less radio-frequency device identifier by asymmetric enciphering and deciphering algorithm; Then by adding the second less radio-frequency device identifier of the second pins after encryption, by the second less radio-frequency device identification instruction, send to the first less radio-frequency equipment;
Described first of described the first less radio-frequency equipment is relatively confirmed module, also for receiving at the first less radio-frequency equipment after the second less radio-frequency device identification instruction of returning, resolves the second pins after being encrypted; Then in the second key list, the second private key corresponding to the second less radio-frequency equipment will receive that the second pins deciphering after encryption obtains the second pins by the asymmetric enciphering and deciphering algorithm of correspondence; Read the first less radio-frequency device subscription, then utilize the second pins obtaining after deciphering by symmetry algorithm, the first less radio-frequency device subscription to be encrypted, then the first less radio-frequency device subscription after encrypting is joined to the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, issue the second less radio-frequency equipment;
Described second relatively confirms module, for receiving the first less radio-frequency device identification instruction and resolving after the first less radio-frequency device subscription after being encrypted, utilize the second random number generation module to generate the second pins and by corresponding symmetry algorithm, the first less radio-frequency device subscription after the encryption of receiving is deciphered; Then pre-stored the first less radio-frequency device subscription comparison in the first less radio-frequency device subscription deciphering being obtained and the second less radio-frequency equipment, if both are consistent, the first less radio-frequency device subscription is confirmed correctly, and the first less radio-frequency equipment qualification success, finishes to return; Otherwise the first less radio-frequency device subscription is incorrect, the first less radio-frequency equipment qualification failure, finishes to return.
More preferably, described the first less radio-frequency equipment, also comprises that first arranges module, the first memory module, wherein:
Described first arranges module, for by being used in, the first key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment and the second key list are default to be stored in the first memory module of the first less radio-frequency equipment, and the first less radio-frequency device subscription and the second less radio-frequency device subscription are set in advance in the first memory module that is stored in the first less radio-frequency equipment; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the first less radio-frequency equipment;
Described the first memory module, for storing the first key list and the second key list that are used in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment, and stores the first less radio-frequency device subscription and the second less radio-frequency device subscription;
Described the second less radio-frequency equipment, also comprises that second arranges module, the second memory module,
Described second arranges module, for by being used in, the first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and the second key list are default to be stored in the second memory module of the second less radio-frequency equipment, the second less radio-frequency device subscription and the first less radio-frequency device subscription are set in advance in the second memory module that is stored in the second less radio-frequency equipment simultaneously; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the second less radio-frequency equipment;
Described the second memory module, for storing the first key list and the second key list that is used in asymmetric enciphering and deciphering algorithm encryption and decryption, and stores the second less radio-frequency device subscription and the second less radio-frequency device subscription.
More preferably, described symmetrical enciphering and deciphering algorithm is DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, a kind of in IDEA algorithm;
Described asymmetric enciphering and deciphering algorithm is a kind of in RSA Algorithm, ECC algorithm, Diffie-Hellman algorithm.
The invention has the beneficial effects as follows: dynamic anti-fake secrecy system and the method based on WSN wireless sense network radio-frequency technique of the present invention, between the first less radio-frequency equipment and the second less radio-frequency equipment, adopt double-deck password identification to identify, and password meeting change at random used, therefore if identifier is not easy to be passed wireless network capture technique and steals, fake producer can not fake with this identifier, increased the difficulty cracking, greatly strengthen the fail safe of equipment, thus the less radio-frequency equipment between strong guarantee WSN wireless sense network authenticity.
Accompanying drawing explanation
Fig. 1 is existing label identifier structural representation;
Fig. 2 is the dynamic anti-fake time slot scrambling flow chart based on WSN wireless sense network radio-frequency technique of the present invention;
Fig. 3 is the dynamic anti-fake secrecy system structural representation based on WSN wireless sense network radio-frequency technique of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, a kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique of the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
A kind of dynamic anti-fake secrecy system and method based on WSN wireless sense network radio-frequency technique of the present invention, is included in the first less radio-frequency equipment and the second less radio-frequency equipment in WSN wireless sense network.The described first less radio-frequency equipment of stating can be base station, and the second less radio-frequency equipment can be node; Or described the first less radio-frequency equipment can be active RFID read write line, described the second less radio-frequency equipment can be active RFID tag.In the embodiment of the present invention, described the first less radio-frequency equipment of take is active RFID read write line, described the second less radio-frequency equipment is that active RFID tag is described, but should be noted that, it is just in order to make those skilled in the art can understand better the present invention, being not limited to active RFID read write line and active RFID tag, is not limiting to the claimed invention yet.
As shown in Figure 2, a kind of dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique of the embodiment of the present invention, it carries out false proof evaluation to label and read write line between WSN wireless sense network, comprises the steps:
Step S100, at active RFID tag and active RFID read write line, be communicated with, start after label and the false proof discriminating of read write line, random one first pins that produces of read write line, and utilize the first PKI corresponding to this active RFID tag in the first key list to be encrypted by asymmetric enciphering and deciphering algorithm this first pins, then the first pins after encrypting is joined to the read write line identifier of described commodity sign, by read write line, identify instruction and send to label;
Step S200, label is being received read write line sign instruction and is resolving after the first pins after being encrypted, and utilizes the first private key corresponding to this read write line in the first key list by the asymmetric enciphering and deciphering algorithm deciphering of correspondence, to obtain the first pins of correspondence the first pins after the encryption of receiving;
Then utilize the first pins to utilize symmetrical enciphering and deciphering algorithm to be encrypted label signature, the label signature after encrypting is added to label identifier;
Meanwhile, label produces one second pins at random, utilizes in the second key list the second PKI that should active RFID read write line is encrypted and also added label identifier by asymmetric enciphering and deciphering algorithm;
By add label after encryption signature and encrypt after the label identifier of the second pins by tag identifier instruction, send to read write line.
Step S300, read write line is received after the tag identifier instruction of returning, the label signature after parsing is encrypted and the second pins after encryption;
Then utilize the first pins to obtain label by corresponding symmetrical enciphering and deciphering algorithm and sign, utilize the second private key corresponding to this label in the second key list will to receive that the second pins deciphering after encryption obtains the second pins by the asymmetric enciphering and deciphering algorithm of correspondence;
The label signature that deciphering is obtained compares with the pre-stored label signature of read write line, if both are consistent, label Signature Confirmation is correct, tag authentication success, and label is true; Otherwise, label signature mistake, tag authentication is unsuccessful, and label is false, finishes to return;
Meanwhile, read read write line signature, then utilize the second pins obtaining after deciphering by symmetry algorithm, read write line signature to be encrypted, then the read write line signature after encrypting is added in read write line identifier, by read write line, identify instruction and send to label.
Step S400, label receives read write line and identifies instruction and resolve after the read write line signature after being encrypted, and utilizes the second pins by corresponding symmetry algorithm, the read write line signature after the encryption of receiving to be deciphered;
Then read write line signature pre-stored in read write line signature deciphering being obtained and label compares, if both are consistent, read write line Signature Confirmation is correct, and read write line is identified successfully; Otherwise read write line signature is incorrect, read write line is identified unsuccessfully, finishes to return.
Preferably, before described step S100, also comprise the steps:
Step S100 ', be stored in label and read write line the first key list and the second key list are default, the asymmetric encipher-decipher method of correspondence and symmetrical encipher-decipher method corresponding to pins are separately positioned in label and read write line, and label signature and read write line signature are preset and stored in label and read write line.
A kind of dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique of the embodiment of the present invention, due to read write line and the random pins that produces of label meeting, the key using is each time all different, if the identifier that fake producer once sends to certain steathily can not be played tricks.Because pins itself is also through encryption, stolen as long as encryption method does not have, be just that fake producer steals all keys, can not play tricks.Therefore, this method has reached the effect of double-deck encryption, and it is close that it adopts bilayer to establish at random, establishes close reliability high.
The dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique of the embodiment of the present invention, as shown in Figure 3, is included in active RFID read write line 1 and active RFID tag 2 between WSN wireless sense network, wherein:
Described active RFID read write line 1, comprises that first arranges module 11, the first memory modules 12, the first and differentiate that processing module 13, the first random number generation modules 14, the first relatively confirm module 15;
Wherein:
Described first arranges module 11, for by default being stored in the first memory module of read write line of first close and the second key list being used in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of read write line, and read write line signature and label are signed and set in advance in the first memory module that is stored in read write line; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in read write line.
Described symmetrical enciphering and deciphering algorithm includes but not limited to DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm etc.
Described asymmetric enciphering and deciphering algorithm includes but not limited to RSA Algorithm, ECC algorithm, Diffie-Hellman algorithm etc.
Described the first memory module 12, for storing first close and the second key list being used in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of read write line, and storage read write line signature and label signature.
Described first differentiates processing module 13, for being communicated with at active RFID tag and active RFID read write line, start after label and the false proof discriminating of read write line, first pins of the random generation of read write line, and in request, obtain after the first pins of the first random number generation module generation, utilize the first PKI to should label in the first key list to be undertaken the first pins to be encrypted by asymmetric enciphering and deciphering algorithm this first pins, then the first pins after encrypting is joined in read write line identifier, by read write line, identify instruction and send to label;
Described the first random number generation module 14, for according to the request of the first discriminating processing module, generates at random one first random number sequence as the first pins, and sends to the first discriminating processing module and first relatively to confirm module the first pins.
Described first relatively confirms module 15, for receiving at read write line after the tag identifier instruction of returning, and the label signature after parsing is encrypted and the second pins after encryption; Then utilize the first pins, by corresponding symmetrical enciphering and deciphering algorithm, the label signature deciphering after encrypting is obtained to label and sign, utilize the second private key corresponding to this label in the second key list will to receive that the second pins deciphering after encryption obtains the second pins by the asymmetric enciphering and deciphering algorithm of correspondence; And the label that deciphering is obtained is signed and the pre-stored label signature of read write line compares, if both are consistent, label Signature Confirmation is correct, tag authentication success, and label is true; Otherwise, label signature mistake, tag authentication is unsuccessful, and label is false, finishes to return; Meanwhile, read read write line signature, then utilize the second pins obtaining after deciphering by symmetry algorithm, read write line signature to be encrypted, then the read write line signature after encrypting is joined to read write line identifier, by read write line, identify instruction and issue label.
Described active RFID tag 2, comprises that second arranges module 21, the second memory modules 22, the second and differentiate that processing module 23, the second random number generation modules 24, the second relatively confirm module 25;
Wherein:
Described second arranges module 21, for the first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and the second key list are default to be stored in the second memory module of label by being used in, label signature and read write line are signed and set in advance in the second memory module that is stored in label simultaneously; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in label.
Described the second memory module 22, for storing the first key list and the second key list that is used in asymmetric enciphering and deciphering algorithm encryption and decryption, and storage tags signature and read write line signature.
Described second differentiates processing module 23, for receiving read write line sign instruction and resolving after the first pins after being encrypted, utilize the first private key corresponding to this read write line in the first key list to decipher and obtain the first corresponding pins by the asymmetric enciphering and deciphering algorithm of correspondence the first pins after the encryption of receiving; Then utilize the first pins to utilize symmetrical enciphering and deciphering algorithm to be encrypted label signature, the label signature after encrypting is added to label identifier; And generate after the second pins in request the second random number module, utilize the second PKI corresponding to this read write line in the second key list will after the second pins encryption, to add label identifier by asymmetric enciphering and deciphering algorithm; Then by add label after encryption signature and encrypt after the label identifier of the second pins, by tag identifier instruction, send to read write line.
Described the second random number generation module 24, for according to the request of the second discriminating processing module, generates at random one second random number sequence as the second pins, and sends to the second discriminating processing module and second relatively to confirm module the second pins.
Described second relatively confirms module 25, for receiving the instruction of read write line sign and resolving after the read write line signature after being encrypted, utilize the second random number generation module to generate the second pins and by corresponding symmetry algorithm, the read write line signature after the encryption of receiving is deciphered; Then read write line signature pre-stored in read write line signature deciphering being obtained and label compares, if both are consistent, read write line Signature Confirmation is correct, and read write line is identified successfully; Otherwise read write line signature is incorrect, read write line is identified unsuccessfully, finishes to return.
In the embodiment of the present invention, in described read write line identifier, include but not limited to the information such as the first pins, read write line signature, commodity number.The content of described read write line identifier and length can be carried out change process according to function.
The instruction of described read write line sign is sent to read write line by read-write identifier and processes.
In the embodiment of the present invention, in described label identifier, include but not limited to the information such as the second pins, label signature, commodity number.The content of described label identifier and length can be carried out change process according to function.
Described tag identifier instruction is sent to read write line by label identifier and processes.
Described to sign instruction to resolve be a kind of prior art of WSN radio sensing network, therefore, in embodiments of the present invention, detailed description no longer one by one.
Preferably, as another kind of embodiment, described WSN wireless sense network, also comprising by mobile phone or computer utilizes network to be connected to the data center of read write line and/or label, described first arranges module and the first memory module, second arranges module and the second memory module is arranged at described data center, read write line is received after the identifier of label, while carrying out false proof authentication process, the data of downloading the first memory module from data center are to read write line, download the data of the second memory module and carry out false proof authentication process to label, its advantage is in read write line, not deposit key, false proof safer.
Dynamic anti-fake secrecy system and the method based on WSN wireless sense network radio-frequency technique of the embodiment of the present invention, can guarantee in the situation that identifier is stolen, fake producer is difficult to produce the false label of mixing the spurious with the genuine.
The present invention uses double-deck random cipher by the true and false of read write line appraisement label, also allows the true and false (double-layer double-direction evaluation) of tag authentication read write line simultaneously.Label identifier and read write line identifier are stolen can not produce label or the read write line of mixing the spurious with the genuine.
This technology can be used in Comodity anti-fake system, but is not limited to Comodity anti-fake system.The wireless telecommunication system of the false proof evaluation of any needs can be used this technology.Because this technology implements simply, this technology is particularly useful for the WSN wireless sense network of low power consuming.
Finally it should be noted that obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification.

Claims (11)

1. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique, is characterized in that, between two less radio-frequency equipment of WSN wireless sense network, carries out false proof evaluation, comprises the steps:
Steps A, at the first less radio-frequency equipment and the second less radio-frequency equipment, be communicated with and start after false proof discriminating, random one first pins that produces of the first less radio-frequency equipment, and the first PKI in the first key list of corresponding the second less radio-frequency equipment of this first pins utilization is encrypted by asymmetric enciphering and deciphering algorithm, then the first pins after encrypting is joined to the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment;
Step B, the second less radio-frequency equipment is being received the first less radio-frequency device identification instruction and is being resolved after the first pins after being encrypted, and the first private key in the first key list of corresponding the first less radio-frequency device identification of the first pins utilization after the encryption of receiving is obtained to the first pins of correspondence by the asymmetric enciphering and deciphering algorithm deciphering of correspondence;
Then utilize the first pins that the symmetrical enciphering and deciphering algorithm of the second less radio-frequency device subscription utilization is encrypted, the second less radio-frequency device subscription after encrypting is added to the second less radio-frequency device identifier;
To add the second less radio-frequency device identifier of the second less radio-frequency device subscription after encryption to send to the first less radio-frequency equipment by the second less radio-frequency device identification instruction;
Step C, the first less radio-frequency equipment is received after the second less radio-frequency device identification instruction of returning, resolves the second less radio-frequency device subscription after being encrypted;
Then utilize the first pins to obtain the second less radio-frequency device subscription by corresponding symmetrical enciphering and deciphering algorithm;
The second pre-stored less radio-frequency device subscription of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares; If both are consistent, the second less radio-frequency device subscription is confirmed correctly, to identify successfully, and the second less radio-frequency equipment is true; Otherwise the second less radio-frequency device subscription mistake, identifies unsuccessfully, the second less radio-frequency equipment is false, finishes to return.
2. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 1, is characterized in that,
Described step B also comprises the steps:
Random one second pins that produces of the second less radio-frequency equipment, utilizes the second PKI in the second key list of corresponding the first less radio-frequency equipment to be encrypted by asymmetric enciphering and deciphering algorithm, and also adds the second less radio-frequency device identifier;
To add the second less radio-frequency device identifier of the second pins after encryption to send to the first less radio-frequency equipment by the second less radio-frequency device identification instruction;
Described step C also comprises the steps:
The first less radio-frequency equipment is received after the second less radio-frequency device identification instruction of returning, resolves the second pins after being encrypted;
Then utilize the second private key in the second key list of corresponding the second less radio-frequency equipment will receive that by the asymmetric enciphering and deciphering algorithm of correspondence the second pins deciphering after encryption obtains the second pins;
Read the first less radio-frequency device subscription, then utilize the second pins obtaining after deciphering by symmetry algorithm, the first less radio-frequency device subscription to be encrypted, then the first less radio-frequency device subscription after encrypting is added in the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment;
After described step C, also comprise the steps:
The second less radio-frequency equipment receives the first less radio-frequency device identification instruction and resolves after the first less radio-frequency device subscription after being encrypted, and utilizes the second pins by corresponding symmetry algorithm, the first less radio-frequency device subscription after the encryption of receiving to be deciphered;
Then pre-stored the first less radio-frequency device subscription comparison in the first less radio-frequency device subscription deciphering being obtained and the second less radio-frequency equipment; If both are consistent, the first less radio-frequency device subscription is confirmed correctly, to identify successfully; Otherwise the first less radio-frequency device subscription is incorrect, identifies unsuccessfully, finishes to return.
3. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 1 and 2, is characterized in that, before described steps A, also comprises the steps:
Steps A ', be stored in the first less radio-frequency equipment and the second less radio-frequency equipment the first key list and the second key list are default, the asymmetric encipher-decipher method of correspondence and symmetrical encipher-decipher method corresponding to pins are separately positioned in the first less radio-frequency equipment and the second less radio-frequency equipment, and store in the first less radio-frequency equipment and the second less radio-frequency equipment the first less radio-frequency device subscription and the second less radio-frequency device subscription are default.
4. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 3, is characterized in that, described the first less radio-frequency equipment is the active RFID read write line of WSN wireless sense network; Described the second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
5. the dynamic anti-fake time slot scrambling based on WSN wireless sense network radio-frequency technique according to claim 3, is characterized in that, described the first less radio-frequency equipment is the base station of WSN wireless sense network; Described the second less radio-frequency equipment is the node of WSN wireless sense network.
6. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique, is characterized in that, is included in the first less radio-frequency equipment and the second less radio-frequency equipment between WSN wireless sense network, wherein:
Described the first less radio-frequency equipment, comprises the first discriminating processing module, the first random number generation module, and first relatively confirms module;
Wherein:
Described first differentiates processing module, for being communicated with and starting after false proof discriminating at the first less radio-frequency equipment and the second less radio-frequency equipment, and in request, obtain after the first pins of the first random number generation module generation, utilize the first PKI corresponding to the second less radio-frequency equipment in the first key list to be undertaken the first pins to be encrypted by asymmetric enciphering and deciphering algorithm this first pins, then the first pins after encrypting is joined in the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, send to the second less radio-frequency equipment,
Described the first random number generation module, for according to the request of the first discriminating processing module, generates at random one first random number sequence as the first pins, and sends to the first discriminating processing module and first relatively to confirm module the first pins;
Described first relatively confirms module, for receiving at the first less radio-frequency equipment after the second less radio-frequency device identification instruction of returning, resolves the second less radio-frequency device subscription after being encrypted; Then utilize the first pins, by corresponding symmetrical enciphering and deciphering algorithm, the second less radio-frequency device subscription deciphering after encrypting is obtained to the second less radio-frequency device subscription; And the second pre-stored less radio-frequency device subscription of the second less radio-frequency device subscription that deciphering is obtained and the first less radio-frequency equipment compares, if both are consistent, the second less radio-frequency device subscription is confirmed correct, the second less radio-frequency equipment qualification success, the second less radio-frequency equipment is true; Otherwise, the second less radio-frequency device subscription mistake, the second less radio-frequency equipment qualification is unsuccessful, and the second less radio-frequency equipment is false, finishes to return;
Described the second less radio-frequency equipment, comprises the second discriminating processing module;
Described second differentiates processing module, for receiving the first less radio-frequency device identification instruction and resolving after the first pins after being encrypted, utilize the first private key corresponding to the first less radio-frequency equipment in the first key list by the asymmetric enciphering and deciphering algorithm deciphering of correspondence, to obtain the first pins of correspondence the first pins after the encryption of receiving; Then utilize the first pins that the symmetrical enciphering and deciphering algorithm of the second less radio-frequency device subscription utilization is encrypted, the second less radio-frequency device subscription after encrypting is added to the second less radio-frequency device identifier; Then by adding the second less radio-frequency device identifier of the second less radio-frequency device subscription after encryption, by the second less radio-frequency device identification instruction, send to the first less radio-frequency equipment.
7. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 6, is characterized in that,
Described the second less radio-frequency equipment, also comprises the second random number generation module, and second relatively confirms module;
Described the second random number generation module, for according to the request of the second discriminating processing module, generates at random one second random number sequence as the second pins, and sends to the second discriminating processing module and second relatively to confirm module the second pins;
Described second of described the second less radio-frequency equipment is differentiated processing module, also, for generating after the second pins in request the second random number module, utilize the second PKI corresponding to the first less radio-frequency equipment in the second key list will after the second pins encryption, to add the second less radio-frequency device identifier by asymmetric enciphering and deciphering algorithm; Then by adding the second less radio-frequency device identifier of the second pins after encryption, by the second less radio-frequency device identification instruction, send to the first less radio-frequency equipment;
Described first of described the first less radio-frequency equipment is relatively confirmed module, also for receiving at the first less radio-frequency equipment after the second less radio-frequency device identification instruction of returning, resolves the second pins after being encrypted; Then in the second key list, the second private key corresponding to the second less radio-frequency equipment will receive that the second pins deciphering after encryption obtains the second pins by the asymmetric enciphering and deciphering algorithm of correspondence; Read the first less radio-frequency device subscription, then utilize the second pins obtaining after deciphering by symmetry algorithm, the first less radio-frequency device subscription to be encrypted, then the first less radio-frequency device subscription after encrypting is joined to the first less radio-frequency device identifier, by the first less radio-frequency device identification instruction, issue the second less radio-frequency equipment;
Described second relatively confirms module, for receiving the first less radio-frequency device identification instruction and resolving after the first less radio-frequency device subscription after being encrypted, utilize the second random number generation module to generate the second pins and by corresponding symmetry algorithm, the first less radio-frequency device subscription after the encryption of receiving is deciphered; Then pre-stored the first less radio-frequency device subscription comparison in the first less radio-frequency device subscription deciphering being obtained and the second less radio-frequency equipment, if both are consistent, the first less radio-frequency device subscription is confirmed correctly, and the first less radio-frequency equipment qualification success, finishes to return; Otherwise the first less radio-frequency device subscription is incorrect, the first less radio-frequency equipment qualification failure, finishes to return.
8. according to the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique described in claim 6 or 7, it is characterized in that, described the first less radio-frequency equipment, also comprises that first arranges module, the first memory module, wherein:
Described first arranges module, for by being used in, the first key list in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment and the second key list are default to be stored in the first memory module of the first less radio-frequency equipment, and the first less radio-frequency device subscription and the second less radio-frequency device subscription are set in advance in the first memory module that is stored in the first less radio-frequency equipment; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the first less radio-frequency equipment;
Described the first memory module, for storing the first key list and the second key list that are used in the asymmetric enciphering and deciphering algorithm encryption and decryption of being used in of the first less radio-frequency equipment, and stores the first less radio-frequency device subscription and the second less radio-frequency device subscription;
Described the second less radio-frequency equipment, also comprises that second arranges module, the second memory module,
Described second arranges module, for by being used in, the first key list of asymmetric enciphering and deciphering algorithm encryption and decryption and the second key list are default to be stored in the second memory module of the second less radio-frequency equipment, the second less radio-frequency device subscription and the first less radio-frequency device subscription are set in advance in the second memory module that is stored in the second less radio-frequency equipment simultaneously; And described symmetrical enciphering and deciphering algorithm and asymmetric enciphering and deciphering algorithm be set in the second less radio-frequency equipment;
Described the second memory module, for storing the first key list and the second key list that is used in asymmetric enciphering and deciphering algorithm encryption and decryption, and stores the second less radio-frequency device subscription and the second less radio-frequency device subscription.
9. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 8, is characterized in that, described symmetrical enciphering and deciphering algorithm is DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, a kind of in IDEA algorithm;
Described asymmetric enciphering and deciphering algorithm is a kind of in RSA Algorithm, ECC algorithm, Diffie-Hellman algorithm.
10. the dynamic anti-fake secrecy system based on WSN wireless sense network radio-frequency technique according to claim 8, is characterized in that, described the first less radio-frequency equipment is the active RFID read write line of WSN wireless sense network; Described the second less radio-frequency equipment is the active RFID tag of WSN wireless sense network.
The 11. dynamic anti-fake secrecy systems based on WSN wireless sense network radio-frequency technique according to claim 8, is characterized in that, described the first less radio-frequency equipment is the base station of WSN wireless sense network; Described the second less radio-frequency equipment is the node of WSN wireless sense network.
CN201110349645.2A 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology Expired - Fee Related CN102510334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110349645.2A CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110349645.2A CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Publications (2)

Publication Number Publication Date
CN102510334A CN102510334A (en) 2012-06-20
CN102510334B true CN102510334B (en) 2014-02-12

Family

ID=46222388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110349645.2A Expired - Fee Related CN102510334B (en) 2011-11-08 2011-11-08 Dynamic anti-counterfeiting security system and method based on WSN wireless sensing net radio-frequency technology

Country Status (1)

Country Link
CN (1) CN102510334B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10097397B2 (en) 2012-08-07 2018-10-09 Gti International Semiconductor Technology Co., Ltd. System and method for managing CWSN with GUI

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110969445B (en) * 2019-10-31 2024-05-28 广州市人民印刷厂股份有限公司 NFC-based anti-counterfeiting method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1282260A1 (en) * 2001-07-30 2003-02-05 SCM Microsystems GmbH Key agreement method for secure communication system
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
CN101847199A (en) * 2009-03-24 2010-09-29 复旦大学 Security authentication method for radio frequency recognition system
EP2309673A1 (en) * 2008-07-23 2011-04-13 China Iwncomm Co., Ltd. Method for accessing data safely suitable for electronic tag

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1282260A1 (en) * 2001-07-30 2003-02-05 SCM Microsystems GmbH Key agreement method for secure communication system
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
EP2309673A1 (en) * 2008-07-23 2011-04-13 China Iwncomm Co., Ltd. Method for accessing data safely suitable for electronic tag
CN101847199A (en) * 2009-03-24 2010-09-29 复旦大学 Security authentication method for radio frequency recognition system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10097397B2 (en) 2012-08-07 2018-10-09 Gti International Semiconductor Technology Co., Ltd. System and method for managing CWSN with GUI

Also Published As

Publication number Publication date
CN102510334A (en) 2012-06-20

Similar Documents

Publication Publication Date Title
CN103065168B (en) A kind of electronic tag method for anti-counterfeit and system
CN105354604B (en) A kind of method for anti-counterfeit effectively based on physics unclonable function
CN106529969B (en) Method and system for checking fake source by NFC
WO2016145705A1 (en) Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN105024824A (en) Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN102663591A (en) Product anti-counterfeiting method and system based on electronic tag
CN103971250B (en) A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
CN103957186B (en) Method for effectively transferring label ownership in RFID system
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
CN103886469A (en) Product two-dimension code generation and query system
CN110598433B (en) Block chain-based anti-fake information processing method and device
WO2018227685A1 (en) Method and system for secure access of terminal device to internet of things
CN102855577A (en) Multiple merchandise anti-counterfeiting verification method based on cloud computing
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN104239944A (en) Commodity information identification method
CN109951427A (en) A kind of product traceability method and system, cloud are traced to the source platform
CN104268610A (en) Method for generating and reading graded QR code
CN202870898U (en) Radio frequency-based commodity information identification system
CN104217335A (en) Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
CN104851007A (en) Commodity information management system and method based on two-dimensional code and self-dissolving system
CN103971245B (en) A kind of combined ciphering system false proof for electronic article
CN102404118A (en) Object certification method based on short-distance communication terminal
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 100176, Beijing, Beijing economic and Technological Development Zone, Garden North Street, No. 52, building 2, room 4, 402,

Patentee after: BEIJING GTI IOT TECHNOLOGY Co.,Ltd.

Address before: 100176, Beijing, Beijing Daxing District economic and Technological Development Zone, 2 North Garden Street, BDA international enterprise Avenue, 56, 3 floor

Patentee before: GTI INTERNATIONAL SEMICONDUCTOR TECHNOLOGY Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140212