CN103383736A - Method for verifying electronic chip and user terminal - Google Patents

Method for verifying electronic chip and user terminal Download PDF

Info

Publication number
CN103383736A
CN103383736A CN2012101349720A CN201210134972A CN103383736A CN 103383736 A CN103383736 A CN 103383736A CN 2012101349720 A CN2012101349720 A CN 2012101349720A CN 201210134972 A CN201210134972 A CN 201210134972A CN 103383736 A CN103383736 A CN 103383736A
Authority
CN
China
Prior art keywords
user
identifying code
terminal
electronic chip
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101349720A
Other languages
Chinese (zh)
Inventor
李维斌
曾逸安
翁考叔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INTERMEDIATE FREQUENCY ELECTRONIC Co Ltd
Original Assignee
INTERMEDIATE FREQUENCY ELECTRONIC Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INTERMEDIATE FREQUENCY ELECTRONIC Co Ltd filed Critical INTERMEDIATE FREQUENCY ELECTRONIC Co Ltd
Priority to CN2012101349720A priority Critical patent/CN103383736A/en
Publication of CN103383736A publication Critical patent/CN103383736A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for verifying an electronic chip and a user terminal. The method for verifying the electronic chip verifies the electronic chip by means of the user terminal. The method for verifying the electronic chip comprises the steps that the user terminal accesses an identification code and a first verification code which are stored in the electronic chip in advance; the user terminal queries a second verification code, relevant to the identification code, in a data base by means of the identification code and judges whether the first verification code is consistent with the second verification code; if the first verification code is consistent with the second verification code, the user terminal informs a user of the passing of the verification and updates the first verification code and the second verification code with a random number method.

Description

Method and user's terminal that electronic chip is verified
Technical field
The present invention relates to method and user's terminal that electronic chip is verified, method and the user's terminal particularly verified for the electronic chip that is arranged on the RFID label.
Background technology
General RFID label or IC-card by wherein contained electronic chip (chip), can be widely used in identification (identification) system.But for fear of the electronic chip of forging, therefore electronic chip must provide the mechanism of checking (authenticate), explanation (special VIII.RFID Anticounterfeiting:An Architectural Perspective, the 131st page to 146 pages) in " the RFID security:techniques; protocols and system-on-chip design " that can show with reference to Paris Kitsos and Yan Zhang this.
As described in above-mentioned document, generally all utilize complicated algorithm that the mechanism of checking is provided in prior art, cause the cost of manufacture of electronic chip high, in addition, if in a single day the mechanism of algorithm leaks accidentally, to copy electronic chip also just ery easy.
Summary of the invention
The one side of the embodiment of the present invention is that database is set outside electronic chip in addition.When user's terminal wish is verified electronic chip, user's terminal is that the reference data of login in advance the verification msg that will read from electronic chip and database is compared, and after being verified at every turn, upgrade verification msg in electronic chip and the reference data in database, when next user's terminal is wanted this specific electronic chip to be verified again, determine whether being verified with the data of upgrading.
By above setting, can be in the situation that electronic chip possess arithmetic capability, can facilitate verification msg in electronic chip and the data in database to dynamically update constantly.In general, the electronic chip of imitation is the most initial verification msg of massive duplication, in case and after the renewal of verification msg process aforesaid way, the verification msg of not upgrading in the electronic chip of other imitations loses effectiveness at once.
What need special instruction is, even in the worst case, the aforesaid way that the embodiment of the present invention proposes only allows that also the electronic chip of an imitation is by checking, and can not allow that imitation electronic chip identical more than two all passes through checking, based on this, those skilled in the art can examine the applicable field of the present invention of drinking.For instance, the present invention can be applicable on the anti-fraud system of shiploads of merchandise.
The embodiment of the present invention on the other hand, is to be after being verified at every turn, upgrades verification msg in electronic chip and the data in database with random number, rather than utilizes any algorithm, the problem that can avoid algorithm to leak by this.
According to one embodiment of the invention, disclose a kind of method of utilizing user's terminal that one electronic chip is verified, comprise the following step:
● with identification code (UID) and the first identifying code that prestores in user's terminal access electronic chip;
● user's terminal is with the second associated identifying code of this identification code in this identification code Query Database, and determines whether the first identifying code conforms to the second identifying code; And
● if the first identifying code conforms to the second identifying code, and this user's terminal notifying user one is verified message, and upgrades this first identifying code and this second identifying code with a random number.
In another embodiment, more disclose a kind of user's terminal, it comprises processor.Processor is in order to executive utility, to carry out method described above.Optionally, user's terminal can also comprise memory cell in order to database to be set, but database also can be arranged on the server outside user's terminal, and for user's terminal by network access.
In addition, special instruction be, electronic chip of the present invention can be arranged on various carrier, for example general IC-card or RFID label, the present invention not wish is limited this.
With reference to following explanation and enclose claims or the embodiments of the present invention of utilization as hereinafter carrying, can more understand these characteristics of the present invention and advantage.
Description of drawings
In order to understand immediately advantage of the present invention, please refer to certain specific embodiments as shown in drawings, describe above the present invention of brief narration in detail.Only describe typical specific embodiment of the present invention and therefore it be not considered as limiting the scope of the invention in the situation that understand these diagrams, with extra definition and details, the present invention being described with reference to accompanying drawing, graphic in:
Fig. 1 is a kind of hardware structure schematic diagram according to the present invention's one specific embodiment;
Fig. 2 is a kind of process flow diagram according to the present invention's one specific embodiment.
[main element symbol description]
10 user's terminals
20 servers
30 RFID labels
32 electronic chips
102 display screens
104 processors
106 storeies
108 communication modules
110 data input modules
112 electronic chip access modules
The AP application program
The DB database
Embodiment
<hardware structure 〉
Fig. 1 shows the hardware structure in an embodiment, its mainly comprise user's terminal 10, server 20, with RFID label 30.
At first, user's terminal 10 has display screen 102, processor 104, storer 106, communication module 108, data input module 110, and electronic chip access module 112.
User's terminal 10 can utilize general mobile computer or similar portable information device to implement.Preferably, user's terminal 10 is a mobile phone, and except electronic chip access module 112, the basic comprising of user's terminal 10 can be with reference to Apple TMThe product iPhone of company TM
For instance, processor 104 can be ARM TMCompany produces the central processing unit that is used on mobile device; Storer 106 can be flash memory, in order to storing the computer executable instructions of application A P, and for processor 104 accesses and carried out.The basic enforcement aspect of application A P also can be with reference to existing iPhone TMUpper performed application program, and about the function that application A P provides, will describe in the flow process of following Fig. 2.
Communication module 108 can provide the network connectivity abilities such as UMTS, GSM or Wi-Fi, so with one or multiple servers 20 link.Data input module 110 can be integrated into Touch Screen with display screen 102, uses for the user and sets up data or input instruction.In this example, storer 106 itself can be provided with database D B, but better and do not limit ground, database D B also can be arranged on server 20, and the processor 104 executable application programs AP of user's terminal 10 and database D B by communication module 108 access servers 20.
Server 20 also can be embodied as high-order workstation with powerful processing power and storage capacity, mainframe etc., for example the System X of IBM Corporation, Blade Center or eServer server, and link by network and user's terminal 10, and the application program on server 20 and processing power (not shown) can provide assistance to the demand of application A P on user's terminal 10, with as application A P spendable " high in the clouds resource ".
" network " also can be embodied as the line of any pattern in this article, comprise the Local Area Network (LAN) or Wide Area Network (WAN) line that are fixedly connected with, or utilize the ISP temporarily to pull and connect to the internet, also be not limited to the various connected modes such as wire and wireless.In addition, yet should be appreciated that, can not be contained among network though illustrate other hardware and component software (such as extra computation machine system, router, fire wall etc.).
Be for beyond access user terminal 10 about electronic chip access module 112, and be arranged at the electronic chip 32 on a carrier 30 as one kind (for example RFID label).In a preferred embodiment, electronic chip access module 112 is the RFID access module, can receive and dispatch the RF signal, and its basic comprising can be with reference to GENTAG, the RFID access module on the product G T-601NFC Cell Phone of INC..
RFID label 30 is the carriers as electronic chip 32.RFID label 30 also has antenna and is used for communicating by the RF signal with electronic chip access module 112.About RFID label 30 details with wherein electronic chip 32, can be with reference to EPCglobal or Tissue is about the standard of RFID, and this paper does not repeat them here.
What specify is that electronic chip 32 can not have logical operation capability, so cost is also lower.But those skilled in the art should be as can be known, and this is not as restriction of the present invention.In addition, according to different purposes, such as false proof etc., RFID label 30 can further be attached to other article (not shown), and the present invention does not also want to be limited to the purposes of RFID label 30.
<embodiment flow process 〉
Fig. 2 is method flow diagram, coordinates hardware structure shown in Figure 1, further illustrates the present invention.
<1. initialization 〉
● step 200: the electronic chip 32 in RFID label 30 is write identification code UID and the first identifying code (being the chip checking code) CA.For the purpose of identifying, for unique and in general can't revise, and generally given by the producer institute of RFID label 30 at the corresponding RFID label 30 of the value of this identification code UID.In this step, the value of chip checking code CA is preferably a random number, and generally when opening card (or) ability is given when wish is used RFID label 30.Optionally, when identification code UID and/or chip checking code CA write fashionablely, can encrypt separately, and improve security, but this is not necessity of the present invention.
● step 202: database D B (can be arranged on the identification code UID of (i.e. " high in the clouds ") store electrons chip 30 on user's terminal 10 or far-end server 20 and the second identifying code (namely with reference to identifying code) RA of corresponding chip checking code CA, and identification code UID is associated to reference to identifying code RA.Preferably, has identical value with reference to identifying code RA with step 200 chips identifying code CA in step 202, with as between the two corresponding relation.In addition, database D B can record the related data IF of RFID label 30 accompanying article in addition, for revene lookup in the future.
<2. checking 〉
● step 204: user's terminal 10 starts application A P, to carry out the checking to RFID label 30, wherein application A P first sends the RF signal by electronic chip access module 112 (RFID access module), by this electronic chip 32 on RFID label 30 is sent reading requirement, and receive identification code UID and chip checking code CA that electronic chip 32 returns.If the identification code UID of passback and chip checking code CA are through encrypting, application A P needs in addition identification code UID and chip checking code CA to be decrypted.
● step 206: whether this step determines chip checking code CA and conforms to reference to identifying code RA.In this example, after application A P obtains identification code UID and chip checking code CA, with the associated reference identifying code RA of identification code UID in identification code UID Query Database DB, and judge chip checking code CA and whether conform to reference to identifying code RA.At this, if application A P judgement chip checking code CA with have identical value with reference to identifying code RA, assert chip checking code CA with reference to identifying code RA for conforming to, but the present invention ought be not limited to this.
Should be noted that in addition, be arranged in the embodiment in server 20 (i.e. " high in the clouds ") at database D B, also can carry out above-mentioned judgement by server 20 assistance application AP, in this embodiment, application A P only needs to send identification code UID and chip checking code CA to server 20 by communication module 108, and server 20 can replace application A P to find chip checking code CA, and judge chip checking code CA and whether conform to reference to identifying code RA, then judged result is returned to application A P.
● step 208: if judgment result is that in step 206 conforms to, application A P produces one and is verified message (not shown) on display screen 102, optionally, also the related data IF of the RFID label 30 accompanying article that record in database D B can be shown in display screen 102 in the lump.
<3. upgrade identifying code 〉
● step 210: outside step 208, if judgment result is that in step 206 conforms to, application A P voluntarily (or by server 20 (i.e. " high in the clouds ")) produce at random another random number R N, and upgrade chip checking code CA and value with reference to identifying code RA based on this random number R N.For instance, can be directly with this random number R N as chip checking code CA with upgrade with reference to identifying code RA after value.In addition, the chip checking code CA after application A P will upgrade by electronic chip access module 112 (RFID access module) writes to electronic chip 32, to replace old chip checking code CA.When after when carrying out step 204-208 again, use the chip checking code CA that upgrades and value with reference to identifying code RA.
Preferably, in step 210, random number R N's is produced as random and is not to produce based on any algorithm, and the chip checking code CA after upgrading has nonreversibility with value with reference to identifying code RA, in other words, chip checking code CA after renewal can't be predicted with there is no with reference to the value of identifying code RA that any rule can be followed, therefore significantly promote security, and remove the required computational resource of execution algorithm from.
The imitation gimmick of general electronic chip, to have copied specific electron chip 32 identification code UID and initial chip checking code CA in a large amount of imitation chips, but namely be updated through after one-time authentication because chip checking code CA is every, the initial chip checking code CA that namely is not updated namely loses effectiveness, therefore the embodiment of the present invention at most only allows that the electronic chip of an imitation passes through checking, and this is enough to reach the mass-produced purpose that prevents from forging chip.
On the other hand, preferably, the problem that when the chip checking code CA after upgrade writes to electronic chip 32, failure causes, electronic chip 32 has the backup field with database D B, chip checking code CA after application A P confirm to upgrade successfully writes to electronic chip 32, and application A P just can carry out in database D B the more new element with reference to identifying code RA.
In a further embodiment, allow step 204 and step 208 repeatedly to carry out, and namely carry out the renewal of step 210 after not necessarily judgement conforms in each step 208, as shown in the dotted arrow in Fig. 2.On the contrary, application A P (or by server 20 (i.e. " high in the clouds ")) voluntarily provides the function of a counter (not shown), conform to if be judged as in each step 208, counting adds 1, if counting arrives a preset value (for example 5), just upgrade chip checking code CA and with reference to identifying code RA, can reduce by this load of system with random number R N.
It should be noted that in addition, in the above-described embodiments, application A P should be considered to equate by user's terminal 10 own resources or the action of completing by the assistance (i.e. " high in the clouds ") of server 20 in the present invention, and all can be considered to performed by user's terminal 10, even the storage of most data all is responsible for by server 20 with processing.
In the situation that do not break away from the present invention's spirit or necessary characteristic, can other particular forms embody the present invention.Described specific embodiment each side only should be considered as illustrative and non-limiting.Therefore, scope of the present invention is as enclosing as shown in claims but not as shown in above stated specification.All drop on the equivalent meaning of claims scope and the change in scope should be considered as dropping in the scope of claims.

Claims (10)

1. method of utilizing user's terminal that one electronic chip is verified, this electronic chip sets in advance in a carrier, and the method comprises:
(a) an identification code UID and one first identifying code to prestore in this this electronic chip of user's terminal access;
(b) this user's terminal is with one second associated identifying code of this identification code in this identification code inquiry one database; And
(c) if this first identifying code conforms to this second identifying code, this user's terminal notifying user one is verified message, and upgrades this first identifying code and this second identifying code based on a random number.
2. the method for claim 1, wherein step (c) also comprises: this first identifying code of this user's terminal wait is updated successfully the rear beginning and upgrades this second identifying code.
3. the method for claim 1, wherein step (c) also comprises: this user's terminal provides a counter, if the result that in step (b), this first identifying code and this second identifying code are compared is for conforming to, counting adds 1, if counting arrives a preset value, upgrade this first identifying code and this second identifying code with this random number.
4. the method for claim 1, wherein this electronic chip is a RFID chip, and step (a) also comprises: this user's terminal is by this electronic chip of RF signal access.
5. the method for claim 1, wherein this electronic chip is a RFID chip, and step (c) also comprises: this user's terminal is by this first identifying code of RF signal update.
6. the method for claim 1, wherein step (c) also comprises: this produce random number is for random and be not to produce based on any algorithm, and this first identifying code and this second identifying code after upgrading have nonreversibility.
7. the method for claim 1, wherein this database is arranged at the outer server of this user's terminal, and step (b) also comprises: this user's terminal links this server with this database of access.
8. the method for claim 1, wherein this electronic chip does not have the arithmetic capability of processing this first identifying code.
9. user's terminal comprises:
One processor is in order to carry out an application program, to carry out the method as any one in claim 1-7.
10. user's terminal comprises:
One processor is in order to carry out an application program, to carry out the method as any one in claim 1-6; And
One memory cell is in order to arrange this database.
CN2012101349720A 2012-05-02 2012-05-02 Method for verifying electronic chip and user terminal Pending CN103383736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101349720A CN103383736A (en) 2012-05-02 2012-05-02 Method for verifying electronic chip and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101349720A CN103383736A (en) 2012-05-02 2012-05-02 Method for verifying electronic chip and user terminal

Publications (1)

Publication Number Publication Date
CN103383736A true CN103383736A (en) 2013-11-06

Family

ID=49491521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101349720A Pending CN103383736A (en) 2012-05-02 2012-05-02 Method for verifying electronic chip and user terminal

Country Status (1)

Country Link
CN (1) CN103383736A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487767A (en) * 2015-08-31 2017-03-08 阿里巴巴集团控股有限公司 The update method of checking information and device
CN106611209A (en) * 2015-10-22 2017-05-03 意法半导体(鲁塞)公司 Secure electronic chip
CN110085036A (en) * 2019-05-30 2019-08-02 捷德(中国)信息科技有限公司 A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof
CN112115514A (en) * 2020-09-27 2020-12-22 浪潮云信息技术股份公司 Online request validity verification method for financial IC card
WO2022111691A1 (en) * 2020-11-30 2022-06-02 华为技术有限公司 Nfc tag verification method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149807A (en) * 2006-09-22 2008-03-26 优仕达资讯股份有限公司 Method and system for validating the article true or false
US20100135477A1 (en) * 2007-11-27 2010-06-03 Alibaba Group Holding Limited Verifying User Identity Using a Reverse Caller ID Process
CN102307193A (en) * 2011-08-22 2012-01-04 北京宏基恒信科技有限责任公司 Key updating and synchronizing method, system and device for dynamic token
CN102324005A (en) * 2011-08-31 2012-01-18 李智虎 Security authentication method, system and device for terminal without computing capability

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149807A (en) * 2006-09-22 2008-03-26 优仕达资讯股份有限公司 Method and system for validating the article true or false
US20100135477A1 (en) * 2007-11-27 2010-06-03 Alibaba Group Holding Limited Verifying User Identity Using a Reverse Caller ID Process
CN102307193A (en) * 2011-08-22 2012-01-04 北京宏基恒信科技有限责任公司 Key updating and synchronizing method, system and device for dynamic token
CN102324005A (en) * 2011-08-31 2012-01-18 李智虎 Security authentication method, system and device for terminal without computing capability

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487767B (en) * 2015-08-31 2020-01-21 阿里巴巴集团控股有限公司 Method and device for updating verification information
WO2017036310A1 (en) * 2015-08-31 2017-03-09 阿里巴巴集团控股有限公司 Authentication information update method and device
US10880306B2 (en) 2015-08-31 2020-12-29 Alibaba Group Holding Limited Verification information update
EP3346660A4 (en) * 2015-08-31 2019-02-20 Alibaba Group Holding Limited Authentication information update method and device
CN106487767A (en) * 2015-08-31 2017-03-08 阿里巴巴集团控股有限公司 The update method of checking information and device
US10691840B2 (en) 2015-10-22 2020-06-23 Stmicroelectronics (Rousset) Sas Secure electronic chip
CN106611209B (en) * 2015-10-22 2020-08-11 意法半导体(鲁塞)公司 Secure electronic chip
CN106611209A (en) * 2015-10-22 2017-05-03 意法半导体(鲁塞)公司 Secure electronic chip
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof
CN110085036A (en) * 2019-05-30 2019-08-02 捷德(中国)信息科技有限公司 A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate
CN112115514A (en) * 2020-09-27 2020-12-22 浪潮云信息技术股份公司 Online request validity verification method for financial IC card
WO2022111691A1 (en) * 2020-11-30 2022-06-02 华为技术有限公司 Nfc tag verification method and related device
EP4239518A4 (en) * 2020-11-30 2024-04-03 Huawei Tech Co Ltd Nfc tag verification method and related device

Similar Documents

Publication Publication Date Title
US10223096B2 (en) Logging operating system updates of a secure element of an electronic device
CN105900104B (en) Applet migration in safety element
CN103383736A (en) Method for verifying electronic chip and user terminal
US7825776B2 (en) Device configuration with RFID
US7818561B2 (en) Sending service data to an RFID tag while an attached computer system is powered off
CN103150514B (en) A kind of trusted module based on mobile device and trusted service method thereof
CN105446713A (en) Safe storage method and equipment
CN104335201B (en) The mechanism of dynamic and trusted extension upgrading based on cloud for promoting computing system
US20180129925A1 (en) Smart card information querying method and apparatus, and storage medium
CN104766206A (en) NFC payment method and device based on mobile terminal
US20160065375A1 (en) Dynamic integrity validation of a high level operating system
CN102238135A (en) Security authentication server
EP2705455B1 (en) Determination of apparatus configuration and programming data
EP4280053A1 (en) Method and system for upgrading firmware of vehicle infotainment system
CN114444111A (en) Intelligent instrument data management method, storage medium, terminal and intelligent instrument
CN201590829U (en) Updateable universal smart card and system thereof
CN107493288B (en) Application network security control method and device based on Android POS
CN115994769A (en) Anti-counterfeiting method and device for commodity identification and verification method and device for commodity authenticity
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
US9626403B2 (en) Relational data model variant
CN109076428A (en) A kind of data processing method and relevant apparatus
CN101621494A (en) Terminal processing system and realization method for supporting Web service
CN112906045A (en) Mobile phone shield access record storage certificate and alarm method and computer system
CN201742426U (en) Sim card safety certificate server
US20230010248A1 (en) Smart fabric for item verification and authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131106