CN103326864A - Electronic tag anti-fake authentication method - Google Patents

Electronic tag anti-fake authentication method Download PDF

Info

Publication number
CN103326864A
CN103326864A CN2013102549907A CN201310254990A CN103326864A CN 103326864 A CN103326864 A CN 103326864A CN 2013102549907 A CN2013102549907 A CN 2013102549907A CN 201310254990 A CN201310254990 A CN 201310254990A CN 103326864 A CN103326864 A CN 103326864A
Authority
CN
China
Prior art keywords
write
read
static
authentication
circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102549907A
Other languages
Chinese (zh)
Other versions
CN103326864B (en
Inventor
詹万泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310254990.7A priority Critical patent/CN103326864B/en
Publication of CN103326864A publication Critical patent/CN103326864A/en
Application granted granted Critical
Publication of CN103326864B publication Critical patent/CN103326864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an electronic tag anti-fake authentication method. A logic system in an electronic tag chip comprises an authentication order receiving, sending and control processing circuit, a one-time write-in sealing storage circuit, a one-time write-in read-only storage circuit, a read-write storage circuit, a random number generator circuit, an encryption and decryption operational circuit and a one-way hash function operational circuit. An anti-fake authentication system comprises an initializing sub system and an authentication sub system. The anti-fake electronic tag can pass the authentication of the authentication sub system only after the successful initialization of the initializing sub system. According to the electronic tag anti-fake authentication method, the problems that a low-cost logically encrypted electronic tag is prone to illegal copying, internal storage information is prone to illegal falsification and steal, and space transmission data are prone to illegal eavesdropping and resetting are solved.

Description

A kind of electronic tag anti-counterfeiting authentication method
Technical field
The present invention relates to a kind of Anti-fake electronic label, specifically, what relate to is a kind of electronic tag anti-counterfeiting authentication method, belongs to electronic label technology field and field of information security technology.
Background technology
Mifare series contactless IC card is the classical IC card product of NXP company.It mainly is included in gate inhibition and campus, public transport field widely used Mifare1 S50(1K byte), S70 (4K byte), and simplify version Mifare Light and upgrade version MifarePro4 kind chip model.In these several chips; except Mifare Pro, all belong to logic encryption card; namely inside does not have independently CPU and operating system; rely on the built in hardware logical circuit to realize the IC-card of safety certification and protection fully; what it adopted is the ISO14443A international protocol; need by read write line and the triple key authentications of electronic tag during on-the-spot read-write operation, password is set in advance, and is relatively open to supporting read write line.Mifare series contactless IC card range of application is covering the whole world.Only this card of domestic distribution estimates at several hundred million and is coming into operation, and its fail safe relates to numerous units of operation and holder's interests.
The researchers German and U.S. in 2009 have successfully cracked the security algorithm of the Mifare1 chip of NXP, the researcher is by the communication data between research read write line and the card, find the cryptographic algorithm of this class card and the agreement of authentication communication, and had two kinds of methods can obtain the subregion password of MIFARE class logic encryption card.By this method, the saboteur can use the equipment that is dirt cheap just can obtain easily the password of a M1 card within the extremely short time (40ms).
After M1 card safety problem exposes, some companies avow and know about the way of determining, magic weapon wherein is exactly so-called " card one is close ", namely the key of each sector of each card is not identical, use SIM card Load System root key, unique sequence number UID according to the M1 card calculates sub-key, prevents that a card is cracked and affects whole system.The M1 cartoon is crossed the SAM card and is realized that " card one is close " is the sub-key that obtains the M1 card after the master key in the SAM card is disperseed by the card number to the M1 card in essence, finishes authentication to the M1 card but this sub-key still will expressly send the card reader base station ic to by the terminal single-chip microcomputer.What more seriously the SAM card was sent is M1 cardamonin literary composition password, and the hacker just can obtain by it the password of all cards as long as obtain a SAM card, and the means that crack all need not.Read write line or background application system are many with the unique sequence number UID of electronic tag to the authentication of on-the-spot electronic tag, and the one-way hash function computing (Hash computing) that namely comprises the application message data of UID produces identification identifying code or Protective Key.
Because the universalness of chip design production firm, copy to write as the UID of unique sequence number and be one and easily accomplish thing.In addition, in the situation that M1 card consumption password is revealed, even adopted online method of supplementing with money, also can't ensure the interests of operator, because in the case, the thief uses the M1 card of forgery, fully can be without the password of supplementing with money of system, and directly adopt the default password (full F) of M1 card that card is carried out " supplementing with money ", then consume in terminal with real consumption password.In the case, even adopted blacklist mechanism also to be difficult to avoid operator and to award the card vendor family suffer a loss, because blacklist mechanism is a kind of afterwards Avoid, what prevent is the transaction that same pseudo-card occurs again, and consume today of day by day popularizing at the M1 card small amount, the thief only needs the puppet card is used once, just is enough to obtain than a much higher income of pseudo-card cost.Therefore, existing Mifare class series noncontact logic card antifalsification is relatively poor.
CPU card and M1 logic encryption card are diverse two kinds of cards, and their authentication mechanism is fully different.The CPU card is because inside has the internal memory of CPU processor and operating system COS and super large, and the process of authentication is carried out between subscriber card and SAM card fully, and what transmit in the verification process is random number and ciphertext, and the card reader base station ic is a communication channel; Verification process is reproducible not; The algorithm that uses is public algorithm, and its fail safe is based on the CPU card to the protection of key but not to the protection of algorithm.Key all can not be read in subscriber card and SAM card, and the installation of key is to be undertaken by ciphertext, even hair fastener personnel and developer also can't obtain key plain after the online implementing, has fundamentally guaranteed Security of the system.
But simultaneously, the CPU card is compared with the logic encryption card system, and the system of CPU card seems more complicated, need to carry out the more system reform, such as key management, transaction flow, PSAM card and card personalization etc.If meet the CPU bank card of the PBOC2.0 of People's Bank of China finance standard, such contactless CPU calorie requirement carries out on-the-spot static data authentication (card antifalsification authentication), and the critical data that read-write terminal uses public-key in technology (rivest, shamir, adelman RSA, ECC and Hash scheduling algorithm combination application technique) the checking card is not changed behind hair fastener.Need to super many energy (generally being that noncontact logic encryption card tens is to hundreds of times) during such CPU Ka Nei system computing, mean that needs consume more exchange hour and requirement is read and write at harsher scene.The system complexity of CPU card is high, systemic openness is low, non-contact transaction speed is slow, transaction-based requirements are high, and CPU card chip area, chip cost and use cost are also than the high decades of times of non-contact logic encryption card, therefore application surface has been subject to very large restriction, particularly uses under the soft tag environment of noncontact and hardly may.Non-contact logic encryption card has very large superiority condition than the CPU jig, be chip area little-unsuitable cracked, cost is low-and chip and read-write Verification System cost are low, read-write convenience-exchange hour is short and success rate is high, good environmental adaptability-antistatic is anti-pollution anti-wear, is beneficial to especially market and popularizes.
Therefore, the Anti-fake electronic label that the present invention mentions is for general low-cost Non-contact radio-frequency electronic tag, such as the M1 non-contact logic encryption card.The present invention carries out the system reforms such as Digital Logic, internal memory, power supply to current M1 noncontact logic card, overcomes its weakness, strengthens its anti-counterfeit capability, and satisfying the market needs.
Summary of the invention
The object of the invention is to solve above-mentioned deficiency of the prior art, provide a kind of electronic tag anti-counterfeiting authentication method of innovation, the security algorithm that the solves existing M1 logical encrypt cacaine chip problem that the card that causes is illegally distorted by bootlegging and card memory contents that is cracked.In the low-cost applied environments such as RFID anti-fake label, the mandate that receives background application system with general read-write terminal just can realize described Anti-fake electronic label is carried out the anti-tamper security authentication especially.
For realizing above-mentioned purpose, electronic tag anti-counterfeiting authentication method of the present invention specifically comprises:
Anti-fake electronic label, described Anti-fake electronic label are the false proof logical encrypt electronic tags that chip internal is designed with false proof logic system circuit; Comprise authentication instruction transmitting-receiving and control treatment circuit in the false proof logic system circuit of described Anti-fake electronic label chip internal, and receive and dispatch with this authentication instruction and be connected that the write-once that treatment circuit is connected is sealed memory circuit up for safekeeping, write-once is solidified read-only memory circuit, read-write memory circuit, random number generator circuit, encryption and decryption computing circuit, one-way hash function computing circuit; The operating state of described Anti-fake electronic label comprises no initializtion state and init state, under the no initializtion state, write-once is sealed memory circuit up for safekeeping and can be received writing of exterior read-write terminal and seal instruction up for safekeeping, and what write-once solidified that read-only memory circuit can receive the exterior read-write terminal writes the curing instruction; Described Anti-fake electronic label under the initialized state possesses antiforge function is arranged;
Initialization subsystem, described initialization subsystem are under the environment of information security, and static information and the initialization of authentication desired data finished described Anti-fake electronic label write, solidify and seal up for safekeeping;
Authentication subsystem, described authentication subsystem are under open environment, by the read write line terminal of authorizing through issuer the initialized described Anti-fake electronic label of process initialization subsystem success are carried out the anti-fake certificate management;
Described static information is to write the information of preserving in the read-write information storage circuit of described Anti-fake electronic label by the initialization subsystem, and the mandate read-write terminal in the authentication subsystem can read authentication.
Further, in the false proof logic system circuit of described Anti-fake electronic label chip internal:
Described authentication instruction transmitting-receiving and control treatment circuit, receive the instruction of exterior read-write terminal, the legitimacy of checking instruction, the instruction checking is not by then making the response that makes mistakes, the instruction checking is by then linking to each other with described Anti-fake electronic label chip internal logic system circuit, and seal up for safekeeping or solidify or read and write or call the data of preserving in the storage inside circuit or trigger random number generator circuit by the fixedly formula corresponding with the reception instruction and produce random number or control encryption and decryption computing circuit and one-way hash function computing circuit and carry out the system logic computing, and deposit operation result in the assigned address memory circuit and preserve or send to the exterior read-write terminal;
Described write-once is sealed memory circuit up for safekeeping, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving and control treatment circuit receive the instruction of sealing up for safekeeping that the exterior read-write terminal sends, writing address and information data, sealing memory circuit up for safekeeping with write-once after authentication is correct links to each other, information data is written to write-once seals up for safekeeping in the memory circuit assigned address, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit forever cut off write-once and seal memory circuit assigned address and exterior read-write terminal read-write the transmission of data passage up for safekeeping, no longer the read write command of response external read-write terminal can be called the computing of the described Anti-fake electronic label chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label chip internal and control treatment circuit by the information data after sealing up for safekeeping;
Described write-once is solidified read-only memory circuit, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving and control treatment circuit receive the curing instruction that the exterior read-write terminal is sent, writing address and information data, solidifying read-only memory circuit with write-once after authentication is correct links to each other, information data is written to write-once solidifies in the read-only memory circuit assigned address, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit cut off forever that write-once is solidified read-only memory circuit assigned address and the exterior read-write terminal writes the transmission of data passage, no longer the response external read-write terminal writes instruction, the information data that is cured can be read by the exterior read-write terminal, and the information data after being cured can be called the computing of the described Anti-fake electronic label chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label chip internal and control treatment circuit;
Described read-write memory circuit, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving links to each other with read-write memory circuit with read/write address, authentication are correctly rear with the read write command that control treatment circuit reception exterior read-write terminal is sent, information data is written to described read-write memory circuit preserves, or the information data of preserving in the described read-write memory circuit read send to the exterior read-write terminal;
Described random number generator circuit is can be by the circuit of described authentication instruction transmitting-receiving and control treatment circuit requirement triggering for generating certain-length random number;
Described encryption and decryption computing circuit is and to control the circuit that the computing of symmetric key cipher encryption and decryption is carried out in the treatment circuit requirement by described authentication instruction transmitting-receiving;
Described one-way hash function computing circuit is the circuit that can the multi-group data of input be collapsed into by described authentication instruction transmitting-receiving and the requirement of control treatment circuit a fixed length, irreversible and unique one group of Hash Value.
Further, the described Anti-fake electronic label processing procedure of carrying out anti-fake certificate comprises Anti-fake electronic label initialization flow process and Anti-fake electronic label identifying procedure.Wherein Anti-fake electronic label initialization flow process is take the initialization subsystem as hardware platform, and the Anti-fake electronic label Verification System is take authentication subsystem as hardware platform.
More preferably, described initialization flow process comprises the steps:
A. described initialization subsystem produces the unique sequence number of label chip and writes and is cured to described Anti-fake electronic label write-once and solidifies in the unique sequence number memory address of read-only memory circuit label chip;
B. described initialization subsystem computing generates three random numbers, i.e. static authentication random number, individual character seed random number and individual character storage key;
C. described initialization subsystem is obtained static state authentication root key and the applicating category code that issuer sets in advance and is carried out the one-way hash function computing from database, produces static authenticate key seed;
D. described initialization subsystem is obtained individual character authentication root key that issuer sets in advance and the individual character seed random number of generation carries out the one-way hash function computing from database, produces individual character authenticate key seed;
E. described initialization subsystem carries out the one-way hash function computing with the static state authentication random number and the static authenticate key seed that generate, produces static authenticate key;
F. described initialization subsystem carries out the one-way hash function computing with the individual character authenticate key seed of the unique sequence number of label chip and generation, produces the individual character authenticate key;
G. described initialization subsystem carries out the one-way hash function computing with static cleartext information and the unique sequence number of label chip, produces the static information authentication code;
H. described initialization subsystem produces static cipher-text information take the individual character storage key of generation as key is encrypted computing to static cleartext information;
I. described initialization subsystem carries out cryptographic calculation with the individual character authenticate key that generates to individual character storage key and the combination of static information authentication code, produces individual character storage key and the combination of static information authentication code of encrypting;
J. the described initialization subsystem static authenticate key seed that will generate writes and seals described Anti-fake electronic label write-once up for safekeeping and seal up for safekeeping in the static authenticate key seed of the memory circuit memory address;
K. described initialization subsystem writes the individual character authenticate key seed that generates and seals described Anti-fake electronic label write-once up for safekeeping and seal up for safekeeping in the memory circuit individual character authenticate key seed memory address;
L. the described initialization subsystem static cipher-text information that will generate writes and stores in the static cipher-text information memory address of the read-write memory circuit of described Anti-fake electronic label;
M. the individual character storage key of the described initialization subsystem encryption that will generate and static information authentication code write and seal described Anti-fake electronic label write-once up for safekeeping and seal memory circuit up for safekeeping and encrypt in individual character storage key and the static information authentication code memory address;
N. described initialization subsystem authenticates random number and the corresponding static authenticate key that produces with static state and is packaged as static certificate of certification and is kept in the database.When read-write terminal has the application of needs, send on-the-spot read-write terminal safe storage to the form of authorizing encryption to issue, finish issuer to the mandate of read-write terminal.
More preferably, described identifying procedure comprises the steps:
A. authorized read-write terminal to read the unique sequence number of described Anti-fake electronic label chip and static cipher-text information;
B. authorized read-write terminal to generate a terminal checking random number;
C. authorized read-write terminal to take out static authentication random number and corresponding static authenticate key from static certificate of certification memory block;
D. authorized read-write terminal that the anti-fake certificate instruction is write described Anti-fake electronic label authentication instruction transmitting-receiving and control treatment circuit, terminal has been verified that random number and static authentication random number write described Anti-fake electronic label and specify receiver address;
E. authentication instruction transmitting-receiving and control treatment circuit are after receiving anti-fake certificate instruction, terminal checking random number and the static authentication random number of authorizing read-write terminal to send in the described Anti-fake electronic label, and the control random number generator circuit produces label chip checking random number;
F. described Anti-fake electronic label is sealed up for safekeeping from write-once and is taken out individual character authenticate key seed the memory circuit individual character authenticate key seed memory address, solidify the unique sequence number of reading tag chip the unique sequence number memory address of read-only memory circuit label chip from write-once, two groups of data are inputted the one-way hash function computing circuit together, and computing produces individual character authenticate key result;
G. described Anti-fake electronic label is sealed the static state authentication random number of taking out static authenticate key seed the static authenticate key seed of the memory circuit memory address and receiving up for safekeeping from write-once again and is inputted together the one-way hash function computing circuit, and computing produces static authenticate key result;
H. described Anti-fake electronic label with the static authenticate key result who generates and label chip checking random number, is inputted the one-way hash function computing circuit with the terminal checking random number that receives again, and computing produces static authentication transmission security key;
I. described Anti-fake electronic label is sealed memory circuit up for safekeeping from write-once again and is encrypted taking-up encryption individual character storage key and static information authentication code individual character storage key and the static information authentication code memory address, be input in the encryption and decryption computing circuit take the individual character authenticate key result that generates as key, decrypt operation is encrypted individual character storage key and static information authentication code, obtain individual character storage key and static information authentication code result, be that key is input in the encryption and decryption computing circuit with the static state authentication transmission security key that generates again, individual character storage key and static information authentication code result that just deciphering of cryptographic calculation obtains produce transmission and encrypt individual character storage key and static information authentication code result;
J. read-write terminal reading tag chip checking random number and transmission encryption individual character storage key and static information authentication code result from described Anti-fake electronic label have been authorized;
K. authorize read-write terminal to carry out together the one-way hash function computing with the terminal of static authenticate key, generation checking random number and the label chip checking random number that reads and produced newly-generated static state authentication transmission security key;
L. having authorized read-write terminal is that individual character storage key and static information authentication code result are encrypted in the transmission that the secret key decryption computing is read with newly-generated static state authentication transmission security key, the static information authentication code result after the individual character storage key result after obtaining deciphering and the deciphering;
M. the individual character storage key result after having authorized read-write terminal with deciphering is the static cipher-text information that the secret key decryption computing is read, the static cleartext information result after obtaining deciphering;
N. the static cleartext information result after having authorized read-write terminal with the unique sequence number of label chip that reads and deciphering carries out the one-way hash function computing, produces newly-generated static information authentication code result;
O. authorized the newly-generated static information authentication code result of static information authentication code result after read-write terminal will be deciphered and one-way hash function computing to compare, if equate, authentication success then, verified that the static cipher-text information of Anti-fake electronic label storage is not truly illegally distorted, also verified simultaneously the Anti-fake electronic label identity unique, not by bootlegging, if unequal, authentification failure then.
Among the present invention, Anti-fake electronic label only has later on could be by the authentication of authentication subsystem by the successful initialization of initialization subsystem.
Based on technique scheme, the present invention has following beneficial effect: the invention solves low-cost logical encrypt electronic tag easily by bootlegging, internal storage information is easily illegally distorted and is stolen, and the space the transmission of data is easily by the problem of illegal wiretapping and playback.
Among the present invention, the uniqueness of described Anti-fake electronic label is by the unique sequence number of label chip, static authenticate key seed, individual character authenticate key seed, the common unique decision of individual character storage key.Individual character storage key and static information authentication code write after initial phase is encrypted by the individual character authenticate key again and seal up for safekeeping in the Anti-fake electronic label chip, even so illegally the unique sequence number of the label chip that reads is write an other blank electronic tag again, because can not get static authenticate key seed that original Anti-fake electronic label seals up for safekeeping at initial phase and individual character authenticate key seed, individual character storage key, illegal electronic tag can not have been authorized by the scene authentication of read-write terminal.
Among the present invention, what store in the described Anti-fake electronic label is static cipher-text information, even illegal person obtains the tag storage district and reads key, can read or change static cipher-text information, but, if do not authorized the anti-fake certificate of read-write terminal by the scene, can not get access to the individual character storage key, also can not correctly decipher static cipher-text information, also can not obtain static cleartext information; If not method person has done to distort to static cipher-text information, static cipher-text information after then deciphering is distorted, whether static cleartext information produces after carrying out the one-way hash function computing distorts static information authentication code and the comparison result of the static information authentication code of legal authentication recovery and will be difficult to unanimously for distorting of producing, be tampered thereby be easy to identify static stored information.
Among the present invention, label chip checking random number all produces different values with the each anti-fake certificate of terminal checking random number, participation just because of these two random numbers, the on-the-spot antiforge authentication data of each transmission between read-write terminal and the described Anti-fake electronic label of having authorized is not identical, when having prevented anti-fake certificate, the space the transmission of data is by illegal wiretapping and playback.
Description of drawings
Fig. 1 is that Anti-fake electronic label systematic logical circuit of the present invention consists of schematic diagram;
Fig. 2 is initialization flow logic schematic diagram of the present invention;
Fig. 3 is on-site verification subsystem flow logic schematic diagram of the present invention.
Embodiment
The technical solution of the present invention is further explained below in conjunction with drawings and Examples, but following content is not intended to limit the scope of the invention.
In Fig. 1, Fig. 2, Fig. 3, device systems and hardware circuit numbering start with C, C1 represents that initialization subsystem, C2 represent that Anti-fake electronic label, C3 represent read-write terminal, and data from which device systems produce first, and numbering just starts with the numeral of this device systems.All systems soft ware logical calculation method numbering unifications start with S.
Fig. 1 is that Anti-fake electronic label systematic logical circuit of the present invention consists of schematic diagram.
Anti-fake electronic label C2 systematic logical circuit is sealed memory circuit C20, the read-only memory circuit C21 of write-once, read-write memory circuit C22, random number generator circuit C23, encryption and decryption computing circuit C24, one-way hash function computing circuit C25, authentication instruction transmitting-receiving and control treatment circuit C26 up for safekeeping by write-once and is consisted of.Wherein authenticating the instruction transmitting-receiving links to each other with other logic system circuit with control treatment circuit C26;
Write-once is sealed memory circuit C20 up for safekeeping, with described authentication instruction transmitting-receiving be connected treatment circuit C26 and be connected, described authentication instruction transmitting-receiving and control treatment circuit C26 receive the instruction of sealing up for safekeeping that exterior read-write terminal C3 sends, writing address and information data, sealing memory circuit C20 up for safekeeping with write-once after authentication is correct links to each other, information data is written to write-once seals assigned address among the memory circuit C20 up for safekeeping, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit C26 forever cut off write-once and seal memory circuit C20 assigned address and exterior read-write terminal C3 read-write the transmission of data passage up for safekeeping, no longer the read write command of response external read-write terminal C3 can be called the computing of the described Anti-fake electronic label C2 chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label C2 chip internal and control treatment circuit C26 by the information data after sealing up for safekeeping; Described write-once is sealed the assigned address among the memory circuit C20 up for safekeeping, comprises at least static authenticate key seed memory address C201, individual character authenticate key seed memory address C202, encrypts individual character storage key and static information identifying code memory address C203;
Write-once is solidified read-only memory circuit C21, with described authentication instruction transmitting-receiving be connected treatment circuit C26 and be connected, described authentication instruction transmitting-receiving and control treatment circuit C26 receive the curing instruction that exterior read-write terminal C3 sends, writing address and information data, solidifying read-only memory circuit C21 with write-once after authentication is correct links to each other, information data is written to write-once solidifies assigned address among the read-only memory circuit C21, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit C26 cut off forever that write-once is solidified read-only memory circuit C21 assigned address and exterior read-write terminal C3 writes the transmission of data passage, no longer response external read-write terminal C3's writes instruction, the information data that is cured can be read by exterior read-write terminal C3, and the information data after being cured can be called the computing of the described Anti-fake electronic label C2 chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label C2 chip internal and control treatment circuit C26; Described write-once is solidified the assigned address among the read-only memory circuit C21, comprises at least the unique sequence number of label and solidifies read-only memory address C211;
Read-write memory circuit C22, with described authentication instruction transmitting-receiving be connected treatment circuit C26 and be connected, described authentication instruction transmitting-receiving links to each other with read-write memory circuit C22 with read/write address, authentication are correctly rear with the read write command that control treatment circuit C26 reception exterior read-write terminal C3 sends, if write instruction, the assigned address that then information data is written among the described read-write memory circuit C22 is preserved, if reading command is then read the information data of preserving in the assigned address among the described read-write memory circuit C22 and is sent to exterior read-write terminal C3; Assigned address among the described read-write memory circuit C22 comprises the read-write memory address C221 of static cipher-text information at least.
Random number generator circuit C23 is can be by the circuit of described authentication instruction transmitting-receiving and control treatment circuit C26 requirement triggering for generating certain-length random number;
Encryption and decryption computing circuit C24 is and to control the circuit that the computing of symmetric key cipher encryption and decryption is carried out in treatment circuit C26 requirement by described authentication instruction transmitting-receiving;
One-way hash function computing circuit C25 is the circuit that can the multi-group data of inputting be collapsed into by described authentication instruction transmitting-receiving and control treatment circuit C26 requirements a fixed length, irreversible and unique one group of Hash Value.
Fig. 2 is initialization flow logic schematic diagram of the present invention.
Initialization subsystem C1 produces the unique sequence number 109 of label chip and writes and is cured to described Anti-fake electronic label C2 write-once and solidifies among the unique sequence number memory address of the read-only memory circuit C21 label chip C211;
Initialization subsystem C1 generates three random numbers, i.e. static authentication random number 104, individual character seed random number 107 and individual character storage key 113;
Initialization subsystem C1 obtains static state authentication root key 101 and the applicating category code 102 that issuer sets in advance and carries out one-way hash function computing S1 from database, produce static authenticate key seed 103;
Initialization subsystem C1 obtains the individual character authentication root key 106 that issuer sets in advance from database and the individual character seed random number 107 that generates carries out one-way hash function computing S1, produces individual character authenticate key seed 108;
Initialization subsystem C1 carries out one-way hash function computing S25 with the static state authentication random number 104 and the static authenticate key seed 103 that generate, produces static authenticate key 105;
Initialization subsystem C1 carries out one-way hash function computing S25 with the individual character authenticate key seed 108 of the unique sequence number 109 of label chip and generation, produces individual character authenticate key 110;
Initialization subsystem C1 carries out one-way hash function computing S2 with static cleartext information 111 and the unique sequence number 109 of label chip, produces static information authentication code 112;
Initialization subsystem C1 is encrypted computing S3 with the 113 pairs of static cleartext informations 111 of individual character storage key that generate, and produces static cipher-text information 115;
Initialization subsystem C1 is encrypted computing S24 with 110 pairs of individual character storage keys of individual character authenticate key and the static information authentication code 114 that generates, and produces to encrypt individual character storage key and static information authentication code 116;
The static authenticate key seed 103 that initialization subsystem C1 will generate writes to be sealed described Anti-fake electronic label C2 write-once up for safekeeping and seals up for safekeeping among the static authenticate key seed of the memory circuit C20 memory address C201;
Initialization subsystem C1 writes the individual character authenticate key seed 108 that generates and seals described Anti-fake electronic label write-once up for safekeeping and seal up for safekeeping among the memory circuit individual character authenticate key seed memory address C202;
The static cipher-text information 115 that initialization subsystem C1 will generate writes and stores among the static cipher-text information memory address of the read-write memory circuit C22 of the described Anti-fake electronic label C2 C221;
The encryption individual character storage key that initialization subsystem C1 will generate and static information authentication code 116 write to be sealed described Anti-fake electronic label write-once up for safekeeping and seals memory circuit up for safekeeping and encrypt among individual character storage key and the static information authentication code memory address C203;
Initialization subsystem C1 authenticates random number 104 and the corresponding static authenticate key 105 that produces with static state and is packaged as static certificate of certification and is kept in the background system database.When read-write terminal C3 has the application of needs, send the static certificate of certification memory block C31 of read-write terminal C3 to the form of authorizing cipher mode to issue S5 and preserve safely.
Fig. 3 is identifying procedure logical schematic of the present invention
The unique sequence number 109 of read-write terminal C3 reading tag chip and static cipher-text information 115 have been authorized;
Authorized read-write terminal C3 to generate at random terminal checking random number 302;
Authorized read-write terminal C3 to take out one group of static authentication random number 104 and static authenticate key 105 from static certificate of certification memory block C31;
Authorized read-write terminal C3 that static state is authenticated instruction 301 and write Anti-fake electronic label authentication instruction transmitting-receiving and control treatment circuit C26, terminal has been verified that random number 302 and static authentication random number 104 write described Anti-fake electronic label C2 and specify receiver address;
After the static state that Anti-fake electronic label C2 authentication instruction transmitting-receiving and control treatment circuit C26 have authorized read-write terminal C3 to send at the scene of receiving authenticates card instruction 301, terminal checking random number 302 and static authentication random number 104, control random number generator circuit C23 generation label chip checking random number 201;
Anti-fake electronic label C2 seals up for safekeeping from write-once and takes out individual character authenticate key seed 108 the memory circuit C20 individual character authenticate key seed memory address C202, solidify the unique sequence number 109 of taking-up label chip the unique sequence number memory address of the read-only memory circuit label chip C211 from write-once, two groups of data are inputted one-way hash function computing circuit C25 together, and computing produces individual character authenticate key result 202;
Anti-fake electronic label C2 seals up for safekeeping the static authenticate key seed of the memory circuit C20 memory address C201 from write-once and takes out static authenticate key seed 103, input one-way hash function computing circuit C25 with the static state authentication random number 104 that receives, computing produces static authenticate key result 203;
Anti-fake electronic label C2 with the static authenticate key result 203 who generates and label chip checking random number 201, inputs one-way hash function computing circuit C25 with the terminal checking random number 302 that receives again, and computing produces static authentication transmission security key 204;
Anti-fake electronic label C2 seals memory circuit C20 up for safekeeping from write-once again and encrypts taking-up encryption individual character storage key and static information authentication code 116 individual character storage key and the static information authentication code memory address C203, input encryption and decryption computing circuit C24 take the individual character authenticate key result 202 who generates for key, decrypt operation is encrypted individual character storage key and static information authentication code 116, produce individual character storage key and static information authentication code result 205, be key input encryption and decryption computing circuit C24 with the static state authentication transmission security key 204 that generates again, cryptographic calculation individual character storage key and static information authentication code result 205 produce transmission and encrypt individual character storage key and static information authentication code result 206;
Authorized read-write terminal C3 from Anti-fake electronic label C2 assigned address reading tag chip checking random number 201 and transmission encoded tag individual character storage key and static information authentication code result 206;
The label chip checking random number 201 of having authorized read-write terminal C3 to verify random number 302 with the terminal of static authenticate key 105, generation and having read is carried out together one-way hash function computing S25 and is produced newly-generated static state authentication transmission security key result 303;
Authorized read-write terminal C3 to encrypt individual character storage key and static information authentication code result 206, the individual character storage key result 304 after obtaining deciphering and the static information authentication code result 305 of deciphering with the transmission that newly-generated static state authentication transmission security key result 303 decrypt operation S24 read;
The static cipher-text information 115 that individual character storage key result 304 decrypt operation S3 after having authorized read-write terminal C3 with deciphering read, the static cleartext information result 306 after obtaining deciphering;
Static cleartext information result 306 after having authorized read-write terminal C3 with the unique sequence number 109 of the label chip that reads and deciphering carries out one-way hash function computing S2, produces newly-generated static information authentication code result 307;
The newly-generated static information authentication code result 307 of static information authentication code result 305 after having authorized read-write terminal C3 to decipher and one-way hash function computing S2 compares, if identical, verified that then the static cipher-text information 115 of Anti-fake electronic label C2 storage is not truly illegally distorted, verified that also Anti-fake electronic label C2 identity is unique not by bootlegging simultaneously.
Although content of the present invention has been done detailed introduction by above preferred embodiment, will be appreciated that above-mentioned description should not be considered to limitation of the present invention.After those skilled in the art have read foregoing, for multiple modification of the present invention with to substitute all will be apparent.Therefore, protection scope of the present invention should be limited to the appended claims.

Claims (6)

1. electronic tag anti-counterfeiting authentication method is characterized in that comprising:
Anti-fake electronic label, described Anti-fake electronic label are the false proof logical encrypt electronic tags that chip internal is designed with false proof logic system circuit; Comprise authentication instruction transmitting-receiving and control treatment circuit in the false proof logic system circuit of described Anti-fake electronic label chip internal, and receive and dispatch with this authentication instruction and be connected that the write-once that treatment circuit is connected is sealed memory circuit up for safekeeping, write-once is solidified read-only memory circuit, read-write memory circuit, random number generator circuit, encryption and decryption computing circuit and one-way hash function computing circuit; The operating state of described Anti-fake electronic label comprises no initializtion state and init state, under the no initializtion state, write-once is sealed memory circuit up for safekeeping and is received writing of exterior read-write terminal and seal instruction up for safekeeping, and what write-once solidified that read-only memory circuit receives the exterior read-write terminal writes the curing instruction; Described Anti-fake electronic label under the initialized state possesses antiforge function is arranged;
Initialization subsystem, described initialization subsystem are under the environment of information security, and static information and the initialization of authentication desired data finished described Anti-fake electronic label write, solidify and seal up for safekeeping;
Authentication subsystem, described authentication subsystem are under open environment, by the read write line terminal of authorizing through issuer the initialized described Anti-fake electronic label of process initialization subsystem success are carried out the anti-fake certificate management;
Described static information is to write the information of preserving in the read-write information storage circuit of described Anti-fake electronic label by the initialization subsystem, and the mandate read-write terminal in the authentication subsystem can read authentication.
2. electronic tag anti-counterfeiting authentication method according to claim 1 is characterized in that: in the false proof logic system circuit of described Anti-fake electronic label chip internal:
Described authentication instruction transmitting-receiving and control treatment circuit, receive the instruction of exterior read-write terminal, the legitimacy of checking instruction, the instruction checking is not by then making the response that makes mistakes, the instruction checking is by then linking to each other with described Anti-fake electronic label chip internal logic system circuit, and seal up for safekeeping or solidify or read and write or call the data of preserving in the storage inside circuit or trigger random number generator circuit by the fixedly formula corresponding with the reception instruction and produce random number or control encryption and decryption computing circuit and one-way hash function computing circuit and carry out the system logic computing, and deposit operation result in the assigned address memory circuit and preserve or send to the exterior read-write terminal;
Described write-once is sealed memory circuit up for safekeeping, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving and control treatment circuit receive the instruction of sealing up for safekeeping that the exterior read-write terminal sends, writing address and information data, sealing memory circuit up for safekeeping with write-once after authentication is correct links to each other, information data is written to write-once seals assigned address in the memory circuit up for safekeeping, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit forever cut off write-once and seal memory circuit assigned address and exterior read-write terminal read-write the transmission of data passage up for safekeeping, no longer the read write command of response external read-write terminal can be called the computing of the described Anti-fake electronic label chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label chip internal and control treatment circuit by the information data after sealing up for safekeeping; Described write-once is sealed the assigned address in the memory circuit up for safekeeping, comprises at least static authenticate key seed memory address, individual character authenticate key seed memory address, encrypts individual character storage key and static information identifying code memory address;
Described write-once is solidified read-only memory circuit, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving and control treatment circuit receive the curing instruction that the exterior read-write terminal is sent, writing address and information data, solidifying read-only memory circuit with write-once after authentication is correct links to each other, information data is written to write-once solidifies assigned address in the read-only memory circuit, after writing successfully, described authentication instruction transmitting-receiving and control treatment circuit cut off forever that write-once is solidified read-only memory circuit assigned address and the exterior read-write terminal writes the transmission of data passage, no longer the response external read-write terminal writes instruction, the information data that is cured can be read by the exterior read-write terminal, and the information data after being cured can be called the computing of the described Anti-fake electronic label chip internal system logic of participation by the described authentication instruction transmitting-receiving of described Anti-fake electronic label chip internal and control treatment circuit; Described write-once is solidified the assigned address in the read-only memory circuit, comprises at least the unique sequence number of label and solidifies read-only memory address;
Described read-write memory circuit, with described authentication instruction transmitting-receiving be connected treatment circuit and be connected, described authentication instruction transmitting-receiving links to each other with read-write memory circuit with read/write address, authentication are correctly rear with the read write command that control treatment circuit reception exterior read-write terminal is sent, if write instruction, the assigned address that then information data is written in the described read-write memory circuit is preserved, if reading command is then read the information data of preserving in the assigned address in the described read-write memory circuit and is sent to the exterior read-write terminal; Assigned address in the described read-write memory circuit comprises the read-write memory address of static cipher-text information at least;
Described random number generator circuit is can be by the circuit of described authentication instruction transmitting-receiving and control treatment circuit requirement triggering for generating certain-length random number;
Described encryption and decryption computing circuit is and to control the circuit that the computing of symmetric key cipher encryption and decryption is carried out in the treatment circuit requirement by described authentication instruction transmitting-receiving;
Described one-way hash function computing circuit is the circuit that can the multi-group data of input be collapsed into by described authentication instruction transmitting-receiving and the requirement of control treatment circuit a fixed length, irreversible and unique one group of Hash Value.
3. electronic tag anti-counterfeiting authentication method according to claim 1, it is characterized in that: the processing procedure of carrying out anti-fake certificate for described Anti-fake electronic label comprises Anti-fake electronic label initialization flow process and Anti-fake electronic label identifying procedure, wherein Anti-fake electronic label initialization flow process is take the initialization subsystem as hardware platform, and the Anti-fake electronic label Verification System is take authentication subsystem as hardware platform.
4. electronic tag anti-counterfeiting authentication method according to claim 3, it is characterized in that: described Anti-fake electronic label initialization flow process comprises the steps:
A. described initialization subsystem produces the unique sequence number of label chip and writes and is cured to described Anti-fake electronic label write-once and solidifies in the unique sequence number memory address of read-only memory circuit label chip;
B. described initialization subsystem computing generates three random numbers, i.e. static authentication random number, individual character seed random number and individual character storage key;
C. described initialization subsystem is obtained static state authentication root key and the applicating category code that issuer sets in advance and is carried out the one-way hash function computing from database, produces static authenticate key seed;
D. described initialization subsystem is obtained individual character authentication root key that issuer sets in advance and the individual character seed random number of generation carries out the one-way hash function computing from database, produces individual character authenticate key seed;
E. described initialization subsystem carries out the one-way hash function computing with the static state authentication random number and the static authenticate key seed that generate, produces static authenticate key;
F. described initialization subsystem carries out the one-way hash function computing with the individual character authenticate key seed of the unique sequence number of label chip and generation, produces the individual character authenticate key;
G. described initialization subsystem carries out the one-way hash function computing with static cleartext information and the unique sequence number of label chip, produces the static information authentication code;
H. described initialization subsystem produces static cipher-text information take the individual character storage key of generation as key is encrypted computing to static cleartext information;
I. described initialization subsystem carries out cryptographic calculation with the individual character authenticate key that generates to individual character storage key and the combination of static information authentication code, produces individual character storage key and the combination of static information authentication code of encrypting;
J. the described initialization subsystem static authenticate key seed that will generate writes and seals described Anti-fake electronic label write-once up for safekeeping and seal up for safekeeping in the static authenticate key seed of the memory circuit memory address;
K. described initialization subsystem writes the individual character authenticate key seed that generates and seals described Anti-fake electronic label write-once up for safekeeping and seal up for safekeeping in the memory circuit individual character authenticate key seed memory address;
L. the described initialization subsystem static cipher-text information that will generate writes and stores in the static cipher-text information memory address of the read-write memory circuit of described Anti-fake electronic label;
M. the individual character storage key of the described initialization subsystem encryption that will generate and static information authentication code write and seal described Anti-fake electronic label write-once up for safekeeping and seal memory circuit up for safekeeping and encrypt in individual character storage key and the static information authentication code memory address;
N. described initialization subsystem authenticates random number and the corresponding static authenticate key that produces with static state and is packaged as static certificate of certification and is kept in the static certificate of certification database, when read-write terminal has authentication to apply for, send authentication read-write terminal safe storage to the form of authorizing encryption to issue, finish issuer to the mandate of read-write terminal.
5. electronic tag anti-counterfeiting authentication method according to claim 3, it is characterized in that: described Anti-fake electronic label identifying procedure comprises the steps:
A. authorized read-write terminal to read the unique sequence number of described Anti-fake electronic label chip and static cipher-text information;
B. authorized read-write terminal to generate a terminal checking random number;
C. authorized read-write terminal to take out static authentication random number and corresponding static authenticate key from static certificate of certification memory block;
D. authorized read-write terminal that the anti-fake certificate instruction is write described Anti-fake electronic label authentication instruction transmitting-receiving and control treatment circuit, terminal has been verified that random number and static authentication random number write described Anti-fake electronic label and specify receiver address;
E. authentication instruction transmitting-receiving and control treatment circuit are after receiving anti-fake certificate instruction, terminal checking random number and the static authentication random number of authorizing read-write terminal to send in the described Anti-fake electronic label, and the control random number generator circuit produces label chip checking random number;
F. described Anti-fake electronic label is sealed up for safekeeping from write-once and is taken out individual character authenticate key seed the memory circuit individual character authenticate key seed memory address, solidify the unique sequence number of reading tag chip the unique sequence number memory address of read-only memory circuit label chip from write-once, two groups of data are inputted the one-way hash function computing circuit together, and computing produces individual character authenticate key result;
G. described Anti-fake electronic label is sealed the static state authentication random number of taking out static authenticate key seed the static authenticate key seed of the memory circuit memory address and receiving up for safekeeping from write-once again and is inputted together the one-way hash function computing circuit, and computing produces static authenticate key result;
H. described Anti-fake electronic label with the static authenticate key result who generates and label chip checking random number, is inputted the one-way hash function computing circuit with the terminal checking random number that receives again, and computing produces static authentication transmission security key;
I. described Anti-fake electronic label is sealed memory circuit up for safekeeping from write-once again and is encrypted taking-up encryption individual character storage key and static information authentication code individual character storage key and the static information authentication code memory address, be input in the encryption and decryption computing circuit take the individual character authenticate key result that generates as key, decrypt operation is encrypted individual character storage key and static information authentication code, obtain individual character storage key and static information authentication code result, be that key is input in the encryption and decryption computing circuit with the static state authentication transmission security key that generates again, individual character storage key and static information authentication code result that just deciphering of cryptographic calculation obtains produce transmission and encrypt individual character storage key and static information authentication code result;
J. read-write terminal reading tag chip checking random number and transmission encryption individual character storage key and static information authentication code result from described Anti-fake electronic label have been authorized;
K. authorize read-write terminal to carry out together the one-way hash function computing with the terminal of static authenticate key, generation checking random number and the label chip checking random number that reads and produced newly-generated static state authentication transmission security key;
L. having authorized read-write terminal is that individual character storage key and static information authentication code result are encrypted in the transmission that the secret key decryption computing is read with newly-generated static state authentication transmission security key, the static information authentication code result after the individual character storage key result after obtaining deciphering and the deciphering;
M. the individual character storage key result after having authorized read-write terminal with deciphering is the static cipher-text information that the secret key decryption computing is read, the static cleartext information result after obtaining deciphering;
N. the static cleartext information result after having authorized read-write terminal with the unique sequence number of label chip that reads and deciphering carries out the one-way hash function computing, produces newly-generated static information authentication code result;
O. authorized the newly-generated static information authentication code result of static information authentication code result after read-write terminal will be deciphered and one-way hash function computing to compare, if equate, authentication success then, verified that the static cipher-text information of Anti-fake electronic label storage is not truly illegally distorted, also verified simultaneously the Anti-fake electronic label identity unique, not by bootlegging, if unequal, authentification failure then.
6. according to claim 1 to 5 each described electronic tag anti-counterfeiting authentication methods, it is characterized in that: described Anti-fake electronic label only has later on could be by the authentication of authentication subsystem by the successful initialization of initialization subsystem.
CN201310254990.7A 2013-06-24 2013-06-24 A kind of electronic tag anti-fake authentication method Active CN103326864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310254990.7A CN103326864B (en) 2013-06-24 2013-06-24 A kind of electronic tag anti-fake authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310254990.7A CN103326864B (en) 2013-06-24 2013-06-24 A kind of electronic tag anti-fake authentication method

Publications (2)

Publication Number Publication Date
CN103326864A true CN103326864A (en) 2013-09-25
CN103326864B CN103326864B (en) 2016-03-09

Family

ID=49195410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310254990.7A Active CN103326864B (en) 2013-06-24 2013-06-24 A kind of electronic tag anti-fake authentication method

Country Status (1)

Country Link
CN (1) CN103326864B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253690A (en) * 2013-06-28 2014-12-31 深圳鼎识科技有限公司 Data acquisition and transmission equipment
CN106788981A (en) * 2017-01-21 2017-05-31 陕西外号信息技术有限公司 A kind of optical label method for anti-counterfeit based on pseudo random number stream cipher
CN108510018A (en) * 2017-02-27 2018-09-07 华大半导体有限公司 A kind of safe RFID electronic label Application issuance system and its apparatus
CN108763994A (en) * 2018-07-23 2018-11-06 深圳麦格米特电气股份有限公司 Read/writing control method, device and the read-write equipment of ultrahigh frequency electronic tag
CN109685523A (en) * 2018-11-19 2019-04-26 武汉天喻信息产业股份有限公司 Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill
CN110011812A (en) * 2019-04-10 2019-07-12 民航成都电子技术有限责任公司 A kind of card method for anti-counterfeit suitable for airport security
CN110225028A (en) * 2019-06-10 2019-09-10 电子科技大学 A kind of distribution anti-counterfeiting system and its method
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card
CN111506891A (en) * 2019-01-31 2020-08-07 金东贤 Authentication storage module provided in initiatable reproduction cassette
CN113806819A (en) * 2021-08-30 2021-12-17 高赵涵 M1 card sector expansion process
CN108573296B (en) * 2018-07-02 2024-03-15 北京广弘电子信息技术有限公司 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663591A (en) * 2012-03-19 2012-09-12 樊俊锋 Product anti-counterfeiting method and system based on electronic tag
WO2012128976A2 (en) * 2011-03-18 2012-09-27 Name Technology, Inc. Systems and methods for anti-counterfeit authentication through communication networks
CN102955958A (en) * 2011-08-31 2013-03-06 北京中电华大电子设计有限责任公司 Anti-counterfeiting method and system based on radio frequency identification technology
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012128976A2 (en) * 2011-03-18 2012-09-27 Name Technology, Inc. Systems and methods for anti-counterfeit authentication through communication networks
CN102955958A (en) * 2011-08-31 2013-03-06 北京中电华大电子设计有限责任公司 Anti-counterfeiting method and system based on radio frequency identification technology
CN102663591A (en) * 2012-03-19 2012-09-12 樊俊锋 Product anti-counterfeiting method and system based on electronic tag
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253690A (en) * 2013-06-28 2014-12-31 深圳鼎识科技有限公司 Data acquisition and transmission equipment
CN106788981A (en) * 2017-01-21 2017-05-31 陕西外号信息技术有限公司 A kind of optical label method for anti-counterfeit based on pseudo random number stream cipher
CN108510018A (en) * 2017-02-27 2018-09-07 华大半导体有限公司 A kind of safe RFID electronic label Application issuance system and its apparatus
CN108573296B (en) * 2018-07-02 2024-03-15 北京广弘电子信息技术有限公司 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method
CN108763994A (en) * 2018-07-23 2018-11-06 深圳麦格米特电气股份有限公司 Read/writing control method, device and the read-write equipment of ultrahigh frequency electronic tag
CN109685523A (en) * 2018-11-19 2019-04-26 武汉天喻信息产业股份有限公司 Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill
CN111506891A (en) * 2019-01-31 2020-08-07 金东贤 Authentication storage module provided in initiatable reproduction cassette
CN110011812A (en) * 2019-04-10 2019-07-12 民航成都电子技术有限责任公司 A kind of card method for anti-counterfeit suitable for airport security
CN110225028A (en) * 2019-06-10 2019-09-10 电子科技大学 A kind of distribution anti-counterfeiting system and its method
CN110298951B (en) * 2019-07-16 2021-07-27 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card
CN113806819A (en) * 2021-08-30 2021-12-17 高赵涵 M1 card sector expansion process
CN113806819B (en) * 2021-08-30 2024-02-09 高赵涵 M1 card sector expansion process

Also Published As

Publication number Publication date
CN103326864B (en) 2016-03-09

Similar Documents

Publication Publication Date Title
CN103326864B (en) A kind of electronic tag anti-fake authentication method
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
CN101765996B (en) Device and method for remote authentication and transaction signatures
JP4638990B2 (en) Secure distribution and protection of cryptographic key information
US20200106600A1 (en) Progressive key encryption algorithm
CN103473592B (en) A kind of label off-line authenticating method and device based on CPK system
RU2222049C2 (en) Procedure testing authenticity of data carrier
CN101807994B (en) Method and system for application data transmission of IC card
CN106067205B (en) A kind of gate inhibition's method for authenticating and device
CN104166871A (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN109635610A (en) The read-write system and method for RFID tag data
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN101494542A (en) Authentication method between multimedia device and smart card
CN100476844C (en) Method for realizing binding function between electronic key and computer
CN105608775B (en) A kind of method of authentication, terminal, access card and SAM card
CN105516182B (en) A kind of mutual authentication method and its system between smart card and reader
KR20220086135A (en) Block chain-based power transaction operation system
CN101739593A (en) Safety certification method of medium access control codes of integrated circuit cards
CN101588238A (en) Method for encrypting and decrypting certificate card in accreditation system
CN104980280B (en) A kind of RFID safety authentication based on Cai Shi multi-scroll chaotic sequence
CN108574578A (en) A kind of black box data protection system and method
CN208488752U (en) A kind of cryptography electronic label
CN110223087A (en) More Integration ofTechnology method for anti-counterfeit applied to planar art work
CN111815821A (en) IC card security algorithm applied to intelligent door lock
Daza et al. FORCE: Fully off-line secure credits for mobile micro payments

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant