CN103413079B - A kind of method calculating generation ID code based on TID code and EPC code encryption - Google Patents

A kind of method calculating generation ID code based on TID code and EPC code encryption Download PDF

Info

Publication number
CN103413079B
CN103413079B CN201310320565.3A CN201310320565A CN103413079B CN 103413079 B CN103413079 B CN 103413079B CN 201310320565 A CN201310320565 A CN 201310320565A CN 103413079 B CN103413079 B CN 103413079B
Authority
CN
China
Prior art keywords
code
tid
epc
rfid
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310320565.3A
Other languages
Chinese (zh)
Other versions
CN103413079A (en
Inventor
顾健科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou zhongtianli Information Technology Co.,Ltd.
Original Assignee
MASSKY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MASSKY Inc filed Critical MASSKY Inc
Priority to CN201310320565.3A priority Critical patent/CN103413079B/en
Publication of CN103413079A publication Critical patent/CN103413079A/en
Application granted granted Critical
Publication of CN103413079B publication Critical patent/CN103413079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method calculating generation ID code based on TID code and EPC code encryption, this computations completes inside rfid interrogator, the ID code obtained can be applicable to multiple field, such as: all systems needing to confirm ID identity such as safety-protection system, stored value systems.Described computations based on TID code and EPC code produces the method for ID code, utilizes in RFID unique TID code as key, and by EPC code encryption computing one ID code of generation, this ID code is unique, obtains through computations.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), improves the safety of the system needing identification.

Description

OneKind based onTIDCode andEPCCode encryption calculates and producesIDThe method of code
Technical field
The present invention relates to a kind of method producing ID code, be specifically related to a kind of method calculating generation ID code based on TID code in RFID and EPC code encryption.
Background technology
Product electronic code (EPC coding) is the new generation product coding scheme that international bar code tissue is released.Product bar code originally is only the coding to product classification, and EPC code then gives a global unique encodings to each single product.The coding scheme of EPC 96 (binary system) modes of coding, can be that 2.68 hundred million companies are endowed, each company can have 16,000,000 product classifications, every series products to have the stand-alone product of 68,000,000,000 to encode, and can be figuratively that a unique coding composed by tellurian each rice.EPC code need not password can directly utilize read write line read-write.If only selecting EPC, although EPC code has 96bit, or higher 128bit capacity, but owing to EPC code is disclosed, it all can be read by any read write line meeting EPC C1GEN2, or revise its content, and even replicating an identical label of EPC code, this also causes limitation for security to application.
TID Ma Shi chip manufacturer is solidificated in the global unique ID number being made up of some bytes inside ROM when dispatching from the factory.TID code need not password and can read by direct read write line.If selecting TID code, although TID code has uniqueness, can be used for representative and the identification of identity, but owing to TID code book body 8 byte information it cannot revise content, so causing the limitation of application equally.
RFID with USER district, although need password authentification when read-write, but on the one hand not every label Dou Dai USER district;On the other hand, when read write line carries out air communication with label, the password of checking is easily intercepted and captured by third party and cracks, and this also reduces the label safety in utilization as identification ID equally.Meanwhile, when multi-tag is read USER district, speed of operation is relatively slow, is not suitable for the encryption under intensive label condition and reads.
Ultrahigh frequency RFID electronic tag, is to use EPC code as plain code, and TID code is as manufacturer, the electronic tag that USER district makes as user's privately owned read-write data field (just can complete read-write with password authentification).Replace traditional IC-card to carry out empowerment management in safety and protection system etc. needs the field of identification with ultrahigh frequency RFID electronic tag, there is distance sensing and read, facilitate the feature of user.The mode of application is predominantly at present: using EPC code as unique mark, or using USER district as unique mark, or using TID code as unique mark, carry out ID code mark, but all there is the possibility being replicated or being trapped, so that security of system lost efficacy.Analyzing in view of above, needing to carry out ID code the occasion of identity validation, the application of RFID technique needs special means and realizes.
Summary of the invention
For solving above-mentioned technical problem, it is an object of the invention to provide a kind of ID code safety that ensure that rfid system provides unique, and calculate, based on TID code and EPC code encryption, the method producing ID code.
For achieving the above object, the present invention provides following technical scheme: a kind of calculate, based on TID code and EPC code encryption, the method producing ID code, this computations completes inside rfid interrogator, it is characterised in that described computations produces the method for ID code and comprises the following steps:
A () rfid interrogator is to RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
(c) Rfid interrogator, using unique code TID code as key, with EPC code by computations, obtains an ID code;
Further, described ID code is unique.
Further, unique described ID code is sent to other application systems or equipment and uses as ID identity code.
Further, described ID code can be applicable to multiple security fields needing identity validation.
Above technical scheme is used to provide the benefit that: to utilize unique TID code as key, be unique by EPC code encryption calculates generation ID, this ID, obtain through computations.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party, or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), it is ensured that need the uniqueness of ID code, safety in the system of identification.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the operation principle block diagram of a kind of RFID gate control system disclosed by the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into the scope of protection of the invention.
Seeing Fig. 1, as shown in legend therein, a kind of RFID gate control system, including RFID, rfid interrogator, access controller and gate inhibition's actuator.Above-mentioned RFID includes one for transmitting the antenna of signal, one for storing EPC Ma EPC district, one for storing TID field and a USER district of TID code;Above-mentioned rfid interrogator includes one for transmitting antenna and a MCU of signal;The above-mentioned corresponding calculation procedure of MCU burning;
The job step of above-mentioned gate control system be described below:
A (), when RFID is near rfid interrogator antenna, rfid interrogator is by sky alignment RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
C () rfid interrogator, with TID code as key, generates ID code by calculating EPC code encryption;
E ID code that () generates is sent to access controller by line connection by rfid interrogator;
F this ID code is identified by () access controller, if it is confirmed that be effectively to authorize, then access control actuator carries out door opening action;If it is confirmed that be Lame delegation, then access control actuator does not carry out door opening action.
TID code, EPC code in above-mentioned RFID are intercepted and captured by third party device, or EPC code is replicated by third party device, owing to this ID code is obtained through computations by original EPC code and TID code, therefore in the case of third party does not knows encryption computing method, third party cannot obtain the corresponding ID code of this RFID, and therefore intercepting and capturing or duplication to RFID are invalid.
Above technical scheme is used to provide the benefit that: utilizing unique TID code as key, generate ID code by calculating EPC code encryption, this ID code is unique.Even if such benefit is exactly the EPC code of this RFID and TID code is intercepted and captured by third party, or EPC code is replicated, be also impossible to produce one with the ID code-phase obtained after computations with ID code, the uniqueness making ID code sets up (unless TID code loses uniqueness), it is ensured that need the safety of the system of identification.
It is more than the description to the embodiment of the present invention, by the described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or use the present invention.Multiple amendment to these embodiments will be apparent from for those skilled in the art, and generic principles defined herein can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty.

Claims (4)

1. calculating, based on TID code and EPC code encryption, the method producing ID code, this computations completes inside rfid interrogator, it is characterised in that described computations produces the method for ID code and comprises the following steps:
A (), when RFID is near rfid interrogator antenna, rfid interrogator is by sky alignment RFID inquiry TID code and EPC code;
B () RFID is to rfid interrogator response TID code and EPC code;
C () rfid interrogator, using unique code TID code as key, with EPC code by computations, obtains an ID code;
E ID code that () generates is sent to access controller by line connection by rfid interrogator;
F this ID code is identified by () access controller, if it is confirmed that be effectively to authorize, then access control actuator carries out door opening action;If it is confirmed that be Lame delegation, then access control actuator does not carry out door opening action.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that described ID code is unique.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that unique described ID code is sent to other application systems or equipment and uses as ID identity code.
The method calculating generation ID code based on TID code and EPC code encryption the most according to claim 1, it is characterised in that described ID code can be applicable to multiple security fields needing identity validation.
CN201310320565.3A 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption Active CN103413079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310320565.3A CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310320565.3A CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Publications (2)

Publication Number Publication Date
CN103413079A CN103413079A (en) 2013-11-27
CN103413079B true CN103413079B (en) 2016-08-10

Family

ID=49606090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310320565.3A Active CN103413079B (en) 2013-07-29 2013-07-29 A kind of method calculating generation ID code based on TID code and EPC code encryption

Country Status (1)

Country Link
CN (1) CN103413079B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104198026A (en) * 2014-08-28 2014-12-10 福州科迪电子技术有限公司 Electronic scale capable of being monitored
CN104217230B (en) * 2014-08-29 2017-03-15 公安部交通管理科学研究所 The safety certifying method of hiding ultrahigh frequency electronic tag identifier
CN104660414A (en) * 2015-02-03 2015-05-27 北京安如山文化科技有限公司 Ciphertext storage method and technique in RFID
CN104932389A (en) * 2015-05-21 2015-09-23 广州市纬志电子科技有限公司 Anti-fake method and anti-fake device for central control host
CN106067121B (en) * 2016-06-15 2019-05-14 华中科技大学 A kind of offline false distinguishing method of product based on NFC technique
CN108900297A (en) * 2018-07-06 2018-11-27 北京智芯微电子科技有限公司 Using ciphertext as the method and product of the electronic identity code of underground electron marker
CN110689102A (en) * 2019-09-30 2020-01-14 上海华苑电子有限公司 Electronic tag management system
CN114239629B (en) * 2022-02-22 2022-07-22 深圳市成为信息股份有限公司 Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339399A (en) * 2010-07-22 2012-02-01 上海孚恩电子科技有限公司 Anti-counterfeiting method based on RFID electronic label
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150655A (en) * 2013-03-25 2013-06-12 曹鹏 Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339399A (en) * 2010-07-22 2012-02-01 上海孚恩电子科技有限公司 Anti-counterfeiting method based on RFID electronic label
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Also Published As

Publication number Publication date
CN103413079A (en) 2013-11-27

Similar Documents

Publication Publication Date Title
CN103413079B (en) A kind of method calculating generation ID code based on TID code and EPC code encryption
CN103020671B (en) A kind of radio frequency identification mutual authentication method based on hash function
CN102682311B (en) Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
US8866596B1 (en) Code-based RFID loss-prevention system
CN103609136A (en) Method for in-situ upgrading RFID readers
CN105205508A (en) Self-service card issuing machine for intelligent card
CN107231231A (en) A kind of method and system of terminal device secure accessing Internet of Things
CN109583889B (en) Seal or signature recognition system based on block chain
US8866595B1 (en) Ticket-based RFID loss-prevention system
ITUB20153358A1 (en) STRONG ANTI-FEEDING METHOD WITH DYNAMIC CODES AND ITS RELATIVE SYSTEM
CN106296177A (en) Data processing method based on bank's Mobile solution and equipment
US8872636B1 (en) Algorithm-based RFID loss-prevention system
Xiao et al. RFID technology, security vulnerabilities, and countermeasures
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN102456146A (en) Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology
CN103840941B (en) Based on the location privacy method in the thing network sensing layer certification of Chinese remainder theorem
KR20090072840A (en) Security system of tag data with rfid middleware and method for processing the same
CN201654814U (en) RFID (Radio Frequency Identification) system capable of safely communicating between tag reader-writer and tag
CN204631936U (en) Calligraphy artwork Antiforge system
KR20140123723A (en) Method for key establishment using anti-collision algorithm
CN106778939A (en) Electronic tag sensor-based system
Jain et al. Analysis of vulnerabilities in radio frequency identification (RFID) systems
CN103763106B (en) A kind of location privacy protection method in Internet of Things certification
CN202907190U (en) NFC handset-based member identification system
CN102324005A (en) Security authentication method, system and device for terminal without computing capability

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108

Patentee after: Suzhou zhongtianli Information Technology Co.,Ltd.

Address before: Suzhou City, Jiangsu province 215000 Suzhou District Chang Xu Road No. 483 Industrial Investment Technology Park Building 7, room 7108

Patentee before: MASSKY Inc.