CN103413079B - A kind of method calculating generation ID code based on TID code and EPC code encryption - Google Patents
A kind of method calculating generation ID code based on TID code and EPC code encryption Download PDFInfo
- Publication number
- CN103413079B CN103413079B CN201310320565.3A CN201310320565A CN103413079B CN 103413079 B CN103413079 B CN 103413079B CN 201310320565 A CN201310320565 A CN 201310320565A CN 103413079 B CN103413079 B CN 103413079B
- Authority
- CN
- China
- Prior art keywords
- code
- tid
- epc
- rfid
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a kind of method calculating generation ID code based on TID code and EPC code encryption, this computations completes inside rfid interrogator, the ID code obtained can be applicable to multiple field, such as: all systems needing to confirm ID identity such as safety-protection system, stored value systems.Described computations based on TID code and EPC code produces the method for ID code, utilizes in RFID unique TID code as key, and by EPC code encryption computing one ID code of generation, this ID code is unique, obtains through computations.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), improves the safety of the system needing identification.
Description
Technical field
The present invention relates to a kind of method producing ID code, be specifically related to a kind of method calculating generation ID code based on TID code in RFID and EPC code encryption.
Background technology
Product electronic code (EPC coding) is the new generation product coding scheme that international bar code tissue is released.Product bar code originally is only the coding to product classification, and EPC code then gives a global unique encodings to each single product.The coding scheme of EPC 96 (binary system) modes of coding, can be that 2.68 hundred million companies are endowed, each company can have 16,000,000 product classifications, every series products to have the stand-alone product of 68,000,000,000 to encode, and can be figuratively that a unique coding composed by tellurian each rice.EPC code need not password can directly utilize read write line read-write.If only selecting EPC, although EPC code has 96bit, or higher 128bit capacity, but owing to EPC code is disclosed, it all can be read by any read write line meeting EPC C1GEN2, or revise its content, and even replicating an identical label of EPC code, this also causes limitation for security to application.
TID Ma Shi chip manufacturer is solidificated in the global unique ID number being made up of some bytes inside ROM when dispatching from the factory.TID code need not password and can read by direct read write line.If selecting TID code, although TID code has uniqueness, can be used for representative and the identification of identity, but owing to TID code book body 8 byte information it cannot revise content, so causing the limitation of application equally.
RFID with USER district, although need password authentification when read-write, but on the one hand not every label Dou Dai USER district;On the other hand, when read write line carries out air communication with label, the password of checking is easily intercepted and captured by third party and cracks, and this also reduces the label safety in utilization as identification ID equally.Meanwhile, when multi-tag is read USER district, speed of operation is relatively slow, is not suitable for the encryption under intensive label condition and reads.
Ultrahigh frequency RFID electronic tag, is to use EPC code as plain code, and TID code is as manufacturer, the electronic tag that USER district makes as user's privately owned read-write data field (just can complete read-write with password authentification).Replace traditional IC-card to carry out empowerment management in safety and protection system etc. needs the field of identification with ultrahigh frequency RFID electronic tag, there is distance sensing and read, facilitate the feature of user.The mode of application is predominantly at present: using EPC code as unique mark, or using USER district as unique mark, or using TID code as unique mark, carry out ID code mark, but all there is the possibility being replicated or being trapped, so that security of system lost efficacy.Analyzing in view of above, needing to carry out ID code the occasion of identity validation, the application of RFID technique needs special means and realizes.
Summary of the invention
For solving above-mentioned technical problem, it is an object of the invention to provide a kind of ID code safety that ensure that rfid system provides unique, and calculate, based on TID code and EPC code encryption, the method producing ID code.
For achieving the above object, the present invention provides following technical scheme: a kind of calculate, based on TID code and EPC code encryption, the method producing ID code, this computations completes inside rfid interrogator, it is characterised in that described computations produces the method for ID code and comprises the following steps:
A () rfid interrogator is to RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
(c)
Rfid interrogator, using unique code TID code as key, with EPC code by computations, obtains an ID code;
Further, described ID code is unique.
Further, unique described ID code is sent to other application systems or equipment and uses as ID identity code.
Further, described ID code can be applicable to multiple security fields needing identity validation.
Above technical scheme is used to provide the benefit that: to utilize unique TID code as key, be unique by EPC code encryption calculates generation ID, this ID, obtain through computations.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party, or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), it is ensured that need the uniqueness of ID code, safety in the system of identification.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the operation principle block diagram of a kind of RFID gate control system disclosed by the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into the scope of protection of the invention.
Seeing Fig. 1, as shown in legend therein, a kind of RFID gate control system, including RFID, rfid interrogator, access controller and gate inhibition's actuator.Above-mentioned RFID includes one for transmitting the antenna of signal, one for storing EPC Ma EPC district, one for storing TID field and a USER district of TID code;Above-mentioned rfid interrogator includes one for transmitting antenna and a MCU of signal;The above-mentioned corresponding calculation procedure of MCU burning;
The job step of above-mentioned gate control system be described below:
A (), when RFID is near rfid interrogator antenna, rfid interrogator is by sky alignment RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
C () rfid interrogator, with TID code as key, generates ID code by calculating EPC code encryption;
E ID code that () generates is sent to access controller by line connection by rfid interrogator;
F this ID code is identified by () access controller, if it is confirmed that be effectively to authorize, then access control actuator carries out door opening action;If it is confirmed that be Lame delegation, then access control actuator does not carry out door opening action.
TID code, EPC code in above-mentioned RFID are intercepted and captured by third party device, or EPC code is replicated by third party device, owing to this ID code is obtained through computations by original EPC code and TID code, therefore in the case of third party does not knows encryption computing method, third party cannot obtain the corresponding ID code of this RFID, and therefore intercepting and capturing or duplication to RFID are invalid.
Above technical scheme is used to provide the benefit that: utilizing unique TID code as key, generate ID code by calculating EPC code encryption, this ID code is unique.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party, or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), it is ensured that need the safety of the system of identification.
It is more than the description to the embodiment of the present invention, by the described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or use the present invention.Multiple amendment to these embodiments will be apparent from for those skilled in the art, and generic principles defined herein can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty.
Claims (4)
1. calculating, based on TID code and EPC code encryption, the method producing ID code, this computations completes inside rfid interrogator, it is characterised in that described computations produces the method for ID code and comprises the following steps:
A (), when RFID is near rfid interrogator antenna, rfid interrogator is by sky alignment RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
C () rfid interrogator, using unique code TID code as key, with EPC code by computations, obtains an ID code;
E ID code that () generates is sent to access controller by line connection by rfid interrogator;
F this ID code is identified by () access controller, if it is confirmed that be effectively to authorize, then access control actuator carries out door opening action;If it is confirmed that be Lame delegation, then access control actuator does not carry out door opening action.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that described ID code is unique.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that unique described ID code is sent to other application systems or equipment and uses as ID identity code.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that described ID code can be applicable to multiple security fields needing identity validation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310320565.3A CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310320565.3A CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103413079A CN103413079A (en) | 2013-11-27 |
CN103413079B true CN103413079B (en) | 2016-08-10 |
Family
ID=49606090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310320565.3A Active CN103413079B (en) | 2013-07-29 | 2013-07-29 | A kind of method calculating generation ID code based on TID code and EPC code encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103413079B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104198026A (en) * | 2014-08-28 | 2014-12-10 | 福州科迪电子技术有限公司 | Electronic scale capable of being monitored |
CN104217230B (en) * | 2014-08-29 | 2017-03-15 | 公安部交通管理科学研究所 | The safety certifying method of hiding ultrahigh frequency electronic tag identifier |
CN104660414A (en) * | 2015-02-03 | 2015-05-27 | 北京安如山文化科技有限公司 | Ciphertext storage method and technique in RFID |
CN104932389A (en) * | 2015-05-21 | 2015-09-23 | 广州市纬志电子科技有限公司 | Anti-fake method and anti-fake device for central control host |
CN106067121B (en) * | 2016-06-15 | 2019-05-14 | 华中科技大学 | A kind of offline false distinguishing method of product based on NFC technique |
CN108900297A (en) * | 2018-07-06 | 2018-11-27 | 北京智芯微电子科技有限公司 | Using ciphertext as the method and product of the electronic identity code of underground electron marker |
CN110689102A (en) * | 2019-09-30 | 2020-01-14 | 上海华苑电子有限公司 | Electronic tag management system |
CN114239629B (en) * | 2022-02-22 | 2022-07-22 | 深圳市成为信息股份有限公司 | Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339399A (en) * | 2010-07-22 | 2012-02-01 | 上海孚恩电子科技有限公司 | Anti-counterfeiting method based on RFID electronic label |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103150655A (en) * | 2013-03-25 | 2013-06-12 | 曹鹏 | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system |
-
2013
- 2013-07-29 CN CN201310320565.3A patent/CN103413079B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339399A (en) * | 2010-07-22 | 2012-02-01 | 上海孚恩电子科技有限公司 | Anti-counterfeiting method based on RFID electronic label |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Also Published As
Publication number | Publication date |
---|---|
CN103413079A (en) | 2013-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103413079B (en) | A kind of method calculating generation ID code based on TID code and EPC code encryption | |
CN103020671B (en) | A kind of radio frequency identification mutual authentication method based on hash function | |
CN102682311B (en) | Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation | |
US8866596B1 (en) | Code-based RFID loss-prevention system | |
CN103609136A (en) | Method for in-situ upgrading RFID readers | |
CN105205508A (en) | Self-service card issuing machine for intelligent card | |
CN107231231A (en) | A kind of method and system of terminal device secure accessing Internet of Things | |
CN109583889B (en) | Seal or signature recognition system based on block chain | |
US8866595B1 (en) | Ticket-based RFID loss-prevention system | |
ITUB20153358A1 (en) | STRONG ANTI-FEEDING METHOD WITH DYNAMIC CODES AND ITS RELATIVE SYSTEM | |
CN106296177A (en) | Data processing method based on bank's Mobile solution and equipment | |
US8872636B1 (en) | Algorithm-based RFID loss-prevention system | |
Xiao et al. | RFID technology, security vulnerabilities, and countermeasures | |
CN102594550A (en) | RFID internal mutual authentication safety protocol based on secret key array | |
CN102456146A (en) | Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology | |
CN103840941B (en) | Based on the location privacy method in the thing network sensing layer certification of Chinese remainder theorem | |
KR20090072840A (en) | Security system of tag data with rfid middleware and method for processing the same | |
CN201654814U (en) | RFID (Radio Frequency Identification) system capable of safely communicating between tag reader-writer and tag | |
CN204631936U (en) | Calligraphy artwork Antiforge system | |
KR20140123723A (en) | Method for key establishment using anti-collision algorithm | |
CN106778939A (en) | Electronic tag sensor-based system | |
Jain et al. | Analysis of vulnerabilities in radio frequency identification (RFID) systems | |
CN103763106B (en) | A kind of location privacy protection method in Internet of Things certification | |
CN202907190U (en) | NFC handset-based member identification system | |
CN102324005A (en) | Security authentication method, system and device for terminal without computing capability |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108 Patentee after: Suzhou zhongtianli Information Technology Co.,Ltd. Address before: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108 Patentee before: MASSKY Inc. |