CN103383736A - Method for verifying electronic chip and user terminal - Google Patents
Method for verifying electronic chip and user terminal Download PDFInfo
- Publication number
- CN103383736A CN103383736A CN2012101349720A CN201210134972A CN103383736A CN 103383736 A CN103383736 A CN 103383736A CN 2012101349720 A CN2012101349720 A CN 2012101349720A CN 201210134972 A CN201210134972 A CN 201210134972A CN 103383736 A CN103383736 A CN 103383736A
- Authority
- CN
- China
- Prior art keywords
- user
- identifying code
- terminal
- electronic chip
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a method for verifying an electronic chip and a user terminal. The method for verifying the electronic chip verifies the electronic chip by means of the user terminal. The method for verifying the electronic chip comprises the steps that the user terminal accesses an identification code and a first verification code which are stored in the electronic chip in advance; the user terminal queries a second verification code, relevant to the identification code, in a data base by means of the identification code and judges whether the first verification code is consistent with the second verification code; if the first verification code is consistent with the second verification code, the user terminal informs a user of the passing of the verification and updates the first verification code and the second verification code with a random number method.
Description
Technical field
The present invention relates to method and user's terminal that electronic chip is verified, method and the user's terminal particularly verified for the electronic chip that is arranged on the RFID label.
Background technology
General RFID label or IC-card by wherein contained electronic chip (chip), can be widely used in identification (identification) system.But for fear of the electronic chip of forging, therefore electronic chip must provide the mechanism of checking (authenticate), explanation (special VIII.RFID Anticounterfeiting:An Architectural Perspective, the 131st page to 146 pages) in " the RFID security:techniques; protocols and system-on-chip design " that can show with reference to Paris Kitsos and Yan Zhang this.
As described in above-mentioned document, generally all utilize complicated algorithm that the mechanism of checking is provided in prior art, cause the cost of manufacture of electronic chip high, in addition, if in a single day the mechanism of algorithm leaks accidentally, to copy electronic chip also just ery easy.
Summary of the invention
The one side of the embodiment of the present invention is that database is set outside electronic chip in addition.When user's terminal wish is verified electronic chip, user's terminal is that the reference data of login in advance the verification msg that will read from electronic chip and database is compared, and after being verified at every turn, upgrade verification msg in electronic chip and the reference data in database, when next user's terminal is wanted this specific electronic chip to be verified again, determine whether being verified with the data of upgrading.
By above setting, can be in the situation that electronic chip possess arithmetic capability, can facilitate verification msg in electronic chip and the data in database to dynamically update constantly.In general, the electronic chip of imitation is the most initial verification msg of massive duplication, in case and after the renewal of verification msg process aforesaid way, the verification msg of not upgrading in the electronic chip of other imitations loses effectiveness at once.
What need special instruction is, even in the worst case, the aforesaid way that the embodiment of the present invention proposes only allows that also the electronic chip of an imitation is by checking, and can not allow that imitation electronic chip identical more than two all passes through checking, based on this, those skilled in the art can examine the applicable field of the present invention of drinking.For instance, the present invention can be applicable on the anti-fraud system of shiploads of merchandise.
The embodiment of the present invention on the other hand, is to be after being verified at every turn, upgrades verification msg in electronic chip and the data in database with random number, rather than utilizes any algorithm, the problem that can avoid algorithm to leak by this.
According to one embodiment of the invention, disclose a kind of method of utilizing user's terminal that one electronic chip is verified, comprise the following step:
● with identification code (UID) and the first identifying code that prestores in user's terminal access electronic chip;
● user's terminal is with the second associated identifying code of this identification code in this identification code Query Database, and determines whether the first identifying code conforms to the second identifying code; And
● if the first identifying code conforms to the second identifying code, and this user's terminal notifying user one is verified message, and upgrades this first identifying code and this second identifying code with a random number.
In another embodiment, more disclose a kind of user's terminal, it comprises processor.Processor is in order to executive utility, to carry out method described above.Optionally, user's terminal can also comprise memory cell in order to database to be set, but database also can be arranged on the server outside user's terminal, and for user's terminal by network access.
In addition, special instruction be, electronic chip of the present invention can be arranged on various carrier, for example general IC-card or RFID label, the present invention not wish is limited this.
With reference to following explanation and enclose claims or the embodiments of the present invention of utilization as hereinafter carrying, can more understand these characteristics of the present invention and advantage.
Description of drawings
In order to understand immediately advantage of the present invention, please refer to certain specific embodiments as shown in drawings, describe above the present invention of brief narration in detail.Only describe typical specific embodiment of the present invention and therefore it be not considered as limiting the scope of the invention in the situation that understand these diagrams, with extra definition and details, the present invention being described with reference to accompanying drawing, graphic in:
Fig. 1 is a kind of hardware structure schematic diagram according to the present invention's one specific embodiment;
Fig. 2 is a kind of process flow diagram according to the present invention's one specific embodiment.
[main element symbol description]
10 user's terminals
20 servers
30 RFID labels
32 electronic chips
102 display screens
104 processors
106 storeies
108 communication modules
110 data input modules
112 electronic chip access modules
The AP application program
The DB database
Embodiment
<hardware structure 〉
Fig. 1 shows the hardware structure in an embodiment, its mainly comprise user's terminal 10, server 20, with RFID label 30.
At first, user's terminal 10 has display screen 102, processor 104, storer 106, communication module 108, data input module 110, and electronic chip access module 112.
User's terminal 10 can utilize general mobile computer or similar portable information device to implement.Preferably, user's terminal 10 is a mobile phone, and except electronic chip access module 112, the basic comprising of user's terminal 10 can be with reference to Apple
TMThe product iPhone of company
TM
For instance, processor 104 can be ARM
TMCompany produces the central processing unit that is used on mobile device; Storer 106 can be flash memory, in order to storing the computer executable instructions of application A P, and for processor 104 accesses and carried out.The basic enforcement aspect of application A P also can be with reference to existing iPhone
TMUpper performed application program, and about the function that application A P provides, will describe in the flow process of following Fig. 2.
Communication module 108 can provide the network connectivity abilities such as UMTS, GSM or Wi-Fi, so with one or multiple servers 20 link.Data input module 110 can be integrated into Touch Screen with display screen 102, uses for the user and sets up data or input instruction.In this example, storer 106 itself can be provided with database D B, but better and do not limit ground, database D B also can be arranged on server 20, and the processor 104 executable application programs AP of user's terminal 10 and database D B by communication module 108 access servers 20.
Server 20 also can be embodied as high-order workstation with powerful processing power and storage capacity, mainframe etc., for example the System X of IBM Corporation, Blade Center or eServer server, and link by network and user's terminal 10, and the application program on server 20 and processing power (not shown) can provide assistance to the demand of application A P on user's terminal 10, with as application A P spendable " high in the clouds resource ".
" network " also can be embodied as the line of any pattern in this article, comprise the Local Area Network (LAN) or Wide Area Network (WAN) line that are fixedly connected with, or utilize the ISP temporarily to pull and connect to the internet, also be not limited to the various connected modes such as wire and wireless.In addition, yet should be appreciated that, can not be contained among network though illustrate other hardware and component software (such as extra computation machine system, router, fire wall etc.).
Be for beyond access user terminal 10 about electronic chip access module 112, and be arranged at the electronic chip 32 on a carrier 30 as one kind (for example RFID label).In a preferred embodiment, electronic chip access module 112 is the RFID access module, can receive and dispatch the RF signal, and its basic comprising can be with reference to GENTAG, the RFID access module on the product G T-601NFC Cell Phone of INC..
RFID label 30 is the carriers as electronic chip 32.RFID label 30 also has antenna and is used for communicating by the RF signal with electronic chip access module 112.About RFID label 30 details with wherein electronic chip 32, can be with reference to EPCglobal or
Tissue is about the standard of RFID, and this paper does not repeat them here.
What specify is that electronic chip 32 can not have logical operation capability, so cost is also lower.But those skilled in the art should be as can be known, and this is not as restriction of the present invention.In addition, according to different purposes, such as false proof etc., RFID label 30 can further be attached to other article (not shown), and the present invention does not also want to be limited to the purposes of RFID label 30.
<embodiment flow process 〉
Fig. 2 is method flow diagram, coordinates hardware structure shown in Figure 1, further illustrates the present invention.
<1. initialization 〉
● step 200: the electronic chip 32 in RFID label 30 is write identification code UID and the first identifying code (being the chip checking code) CA.For the purpose of identifying, for unique and in general can't revise, and generally given by the producer institute of RFID label 30 at the corresponding RFID label 30 of the value of this identification code UID.In this step, the value of chip checking code CA is preferably a random number, and generally when opening card (or) ability is given when wish is used RFID label 30.Optionally, when identification code UID and/or chip checking code CA write fashionablely, can encrypt separately, and improve security, but this is not necessity of the present invention.
● step 202: database D B (can be arranged on the identification code UID of (i.e. " high in the clouds ") store electrons chip 30 on user's terminal 10 or far-end server 20 and the second identifying code (namely with reference to identifying code) RA of corresponding chip checking code CA, and identification code UID is associated to reference to identifying code RA.Preferably, has identical value with reference to identifying code RA with step 200 chips identifying code CA in step 202, with as between the two corresponding relation.In addition, database D B can record the related data IF of RFID label 30 accompanying article in addition, for revene lookup in the future.
<2. checking 〉
● step 204: user's terminal 10 starts application A P, to carry out the checking to RFID label 30, wherein application A P first sends the RF signal by electronic chip access module 112 (RFID access module), by this electronic chip 32 on RFID label 30 is sent reading requirement, and receive identification code UID and chip checking code CA that electronic chip 32 returns.If the identification code UID of passback and chip checking code CA are through encrypting, application A P needs in addition identification code UID and chip checking code CA to be decrypted.
● step 206: whether this step determines chip checking code CA and conforms to reference to identifying code RA.In this example, after application A P obtains identification code UID and chip checking code CA, with the associated reference identifying code RA of identification code UID in identification code UID Query Database DB, and judge chip checking code CA and whether conform to reference to identifying code RA.At this, if application A P judgement chip checking code CA with have identical value with reference to identifying code RA, assert chip checking code CA with reference to identifying code RA for conforming to, but the present invention ought be not limited to this.
Should be noted that in addition, be arranged in the embodiment in server 20 (i.e. " high in the clouds ") at database D B, also can carry out above-mentioned judgement by server 20 assistance application AP, in this embodiment, application A P only needs to send identification code UID and chip checking code CA to server 20 by communication module 108, and server 20 can replace application A P to find chip checking code CA, and judge chip checking code CA and whether conform to reference to identifying code RA, then judged result is returned to application A P.
● step 208: if judgment result is that in step 206 conforms to, application A P produces one and is verified message (not shown) on display screen 102, optionally, also the related data IF of the RFID label 30 accompanying article that record in database D B can be shown in display screen 102 in the lump.
<3. upgrade identifying code 〉
● step 210: outside step 208, if judgment result is that in step 206 conforms to, application A P voluntarily (or by server 20 (i.e. " high in the clouds ")) produce at random another random number R N, and upgrade chip checking code CA and value with reference to identifying code RA based on this random number R N.For instance, can be directly with this random number R N as chip checking code CA with upgrade with reference to identifying code RA after value.In addition, the chip checking code CA after application A P will upgrade by electronic chip access module 112 (RFID access module) writes to electronic chip 32, to replace old chip checking code CA.When after when carrying out step 204-208 again, use the chip checking code CA that upgrades and value with reference to identifying code RA.
Preferably, in step 210, random number R N's is produced as random and is not to produce based on any algorithm, and the chip checking code CA after upgrading has nonreversibility with value with reference to identifying code RA, in other words, chip checking code CA after renewal can't be predicted with there is no with reference to the value of identifying code RA that any rule can be followed, therefore significantly promote security, and remove the required computational resource of execution algorithm from.
The imitation gimmick of general electronic chip, to have copied specific electron chip 32 identification code UID and initial chip checking code CA in a large amount of imitation chips, but namely be updated through after one-time authentication because chip checking code CA is every, the initial chip checking code CA that namely is not updated namely loses effectiveness, therefore the embodiment of the present invention at most only allows that the electronic chip of an imitation passes through checking, and this is enough to reach the mass-produced purpose that prevents from forging chip.
On the other hand, preferably, the problem that when the chip checking code CA after upgrade writes to electronic chip 32, failure causes, electronic chip 32 has the backup field with database D B, chip checking code CA after application A P confirm to upgrade successfully writes to electronic chip 32, and application A P just can carry out in database D B the more new element with reference to identifying code RA.
In a further embodiment, allow step 204 and step 208 repeatedly to carry out, and namely carry out the renewal of step 210 after not necessarily judgement conforms in each step 208, as shown in the dotted arrow in Fig. 2.On the contrary, application A P (or by server 20 (i.e. " high in the clouds ")) voluntarily provides the function of a counter (not shown), conform to if be judged as in each step 208, counting adds 1, if counting arrives a preset value (for example 5), just upgrade chip checking code CA and with reference to identifying code RA, can reduce by this load of system with random number R N.
It should be noted that in addition, in the above-described embodiments, application A P should be considered to equate by user's terminal 10 own resources or the action of completing by the assistance (i.e. " high in the clouds ") of server 20 in the present invention, and all can be considered to performed by user's terminal 10, even the storage of most data all is responsible for by server 20 with processing.
In the situation that do not break away from the present invention's spirit or necessary characteristic, can other particular forms embody the present invention.Described specific embodiment each side only should be considered as illustrative and non-limiting.Therefore, scope of the present invention is as enclosing as shown in claims but not as shown in above stated specification.All drop on the equivalent meaning of claims scope and the change in scope should be considered as dropping in the scope of claims.
Claims (10)
1. method of utilizing user's terminal that one electronic chip is verified, this electronic chip sets in advance in a carrier, and the method comprises:
(a) an identification code UID and one first identifying code to prestore in this this electronic chip of user's terminal access;
(b) this user's terminal is with one second associated identifying code of this identification code in this identification code inquiry one database; And
(c) if this first identifying code conforms to this second identifying code, this user's terminal notifying user one is verified message, and upgrades this first identifying code and this second identifying code based on a random number.
2. the method for claim 1, wherein step (c) also comprises: this first identifying code of this user's terminal wait is updated successfully the rear beginning and upgrades this second identifying code.
3. the method for claim 1, wherein step (c) also comprises: this user's terminal provides a counter, if the result that in step (b), this first identifying code and this second identifying code are compared is for conforming to, counting adds 1, if counting arrives a preset value, upgrade this first identifying code and this second identifying code with this random number.
4. the method for claim 1, wherein this electronic chip is a RFID chip, and step (a) also comprises: this user's terminal is by this electronic chip of RF signal access.
5. the method for claim 1, wherein this electronic chip is a RFID chip, and step (c) also comprises: this user's terminal is by this first identifying code of RF signal update.
6. the method for claim 1, wherein step (c) also comprises: this produce random number is for random and be not to produce based on any algorithm, and this first identifying code and this second identifying code after upgrading have nonreversibility.
7. the method for claim 1, wherein this database is arranged at the outer server of this user's terminal, and step (b) also comprises: this user's terminal links this server with this database of access.
8. the method for claim 1, wherein this electronic chip does not have the arithmetic capability of processing this first identifying code.
9. user's terminal comprises:
One processor is in order to carry out an application program, to carry out the method as any one in claim 1-7.
10. user's terminal comprises:
One processor is in order to carry out an application program, to carry out the method as any one in claim 1-6; And
One memory cell is in order to arrange this database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101349720A CN103383736A (en) | 2012-05-02 | 2012-05-02 | Method for verifying electronic chip and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101349720A CN103383736A (en) | 2012-05-02 | 2012-05-02 | Method for verifying electronic chip and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103383736A true CN103383736A (en) | 2013-11-06 |
Family
ID=49491521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101349720A Pending CN103383736A (en) | 2012-05-02 | 2012-05-02 | Method for verifying electronic chip and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103383736A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487767A (en) * | 2015-08-31 | 2017-03-08 | 阿里巴巴集团控股有限公司 | The update method of checking information and device |
CN106611209A (en) * | 2015-10-22 | 2017-05-03 | 意法半导体(鲁塞)公司 | Secure electronic chip |
CN110085036A (en) * | 2019-05-30 | 2019-08-02 | 捷德(中国)信息科技有限公司 | A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate |
CN111368264A (en) * | 2018-12-26 | 2020-07-03 | 技嘉科技股份有限公司 | Verification method of application program, computer device and mainboard thereof |
CN112115514A (en) * | 2020-09-27 | 2020-12-22 | 浪潮云信息技术股份公司 | Online request validity verification method for financial IC card |
WO2022111691A1 (en) * | 2020-11-30 | 2022-06-02 | 华为技术有限公司 | Nfc tag verification method and related device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149807A (en) * | 2006-09-22 | 2008-03-26 | 优仕达资讯股份有限公司 | Method and system for validating the article true or false |
US20100135477A1 (en) * | 2007-11-27 | 2010-06-03 | Alibaba Group Holding Limited | Verifying User Identity Using a Reverse Caller ID Process |
CN102307193A (en) * | 2011-08-22 | 2012-01-04 | 北京宏基恒信科技有限责任公司 | Key updating and synchronizing method, system and device for dynamic token |
CN102324005A (en) * | 2011-08-31 | 2012-01-18 | 李智虎 | Security authentication method, system and device for terminal without computing capability |
-
2012
- 2012-05-02 CN CN2012101349720A patent/CN103383736A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149807A (en) * | 2006-09-22 | 2008-03-26 | 优仕达资讯股份有限公司 | Method and system for validating the article true or false |
US20100135477A1 (en) * | 2007-11-27 | 2010-06-03 | Alibaba Group Holding Limited | Verifying User Identity Using a Reverse Caller ID Process |
CN102307193A (en) * | 2011-08-22 | 2012-01-04 | 北京宏基恒信科技有限责任公司 | Key updating and synchronizing method, system and device for dynamic token |
CN102324005A (en) * | 2011-08-31 | 2012-01-18 | 李智虎 | Security authentication method, system and device for terminal without computing capability |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487767B (en) * | 2015-08-31 | 2020-01-21 | 阿里巴巴集团控股有限公司 | Method and device for updating verification information |
WO2017036310A1 (en) * | 2015-08-31 | 2017-03-09 | 阿里巴巴集团控股有限公司 | Authentication information update method and device |
US10880306B2 (en) | 2015-08-31 | 2020-12-29 | Alibaba Group Holding Limited | Verification information update |
EP3346660A4 (en) * | 2015-08-31 | 2019-02-20 | Alibaba Group Holding Limited | Authentication information update method and device |
CN106487767A (en) * | 2015-08-31 | 2017-03-08 | 阿里巴巴集团控股有限公司 | The update method of checking information and device |
US10691840B2 (en) | 2015-10-22 | 2020-06-23 | Stmicroelectronics (Rousset) Sas | Secure electronic chip |
CN106611209B (en) * | 2015-10-22 | 2020-08-11 | 意法半导体(鲁塞)公司 | Secure electronic chip |
CN106611209A (en) * | 2015-10-22 | 2017-05-03 | 意法半导体(鲁塞)公司 | Secure electronic chip |
CN111368264A (en) * | 2018-12-26 | 2020-07-03 | 技嘉科技股份有限公司 | Verification method of application program, computer device and mainboard thereof |
CN110085036A (en) * | 2019-05-30 | 2019-08-02 | 捷德(中国)信息科技有限公司 | A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate |
CN112115514A (en) * | 2020-09-27 | 2020-12-22 | 浪潮云信息技术股份公司 | Online request validity verification method for financial IC card |
WO2022111691A1 (en) * | 2020-11-30 | 2022-06-02 | 华为技术有限公司 | Nfc tag verification method and related device |
EP4239518A4 (en) * | 2020-11-30 | 2024-04-03 | Huawei Tech Co Ltd | Nfc tag verification method and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10223096B2 (en) | Logging operating system updates of a secure element of an electronic device | |
CN105900104B (en) | Applet migration in safety element | |
CN103383736A (en) | Method for verifying electronic chip and user terminal | |
US7825776B2 (en) | Device configuration with RFID | |
US7818561B2 (en) | Sending service data to an RFID tag while an attached computer system is powered off | |
CN103150514B (en) | A kind of trusted module based on mobile device and trusted service method thereof | |
CN105446713A (en) | Safe storage method and equipment | |
CN104335201B (en) | The mechanism of dynamic and trusted extension upgrading based on cloud for promoting computing system | |
US20180129925A1 (en) | Smart card information querying method and apparatus, and storage medium | |
CN104766206A (en) | NFC payment method and device based on mobile terminal | |
US20160065375A1 (en) | Dynamic integrity validation of a high level operating system | |
CN102238135A (en) | Security authentication server | |
EP2705455B1 (en) | Determination of apparatus configuration and programming data | |
EP4280053A1 (en) | Method and system for upgrading firmware of vehicle infotainment system | |
CN114444111A (en) | Intelligent instrument data management method, storage medium, terminal and intelligent instrument | |
CN201590829U (en) | Updateable universal smart card and system thereof | |
CN107493288B (en) | Application network security control method and device based on Android POS | |
CN115994769A (en) | Anti-counterfeiting method and device for commodity identification and verification method and device for commodity authenticity | |
CN115567218A (en) | Data processing method and device of security certificate based on block chain and server | |
US9626403B2 (en) | Relational data model variant | |
CN109076428A (en) | A kind of data processing method and relevant apparatus | |
CN101621494A (en) | Terminal processing system and realization method for supporting Web service | |
CN112906045A (en) | Mobile phone shield access record storage certificate and alarm method and computer system | |
CN201742426U (en) | Sim card safety certificate server | |
US20230010248A1 (en) | Smart fabric for item verification and authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131106 |