CN103559434A - Generation method for electronic attached sheets in circulation domain - Google Patents

Generation method for electronic attached sheets in circulation domain Download PDF

Info

Publication number
CN103559434A
CN103559434A CN201310428390.8A CN201310428390A CN103559434A CN 103559434 A CN103559434 A CN 103559434A CN 201310428390 A CN201310428390 A CN 201310428390A CN 103559434 A CN103559434 A CN 103559434A
Authority
CN
China
Prior art keywords
rfid
reader
authenticating party
information
certified side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310428390.8A
Other languages
Chinese (zh)
Inventor
罗爱民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUIZHOU PROVINCIAL DEPARTMENT OF EDUCATION
Sichuan University
Original Assignee
GUIZHOU PROVINCIAL DEPARTMENT OF EDUCATION
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUIZHOU PROVINCIAL DEPARTMENT OF EDUCATION, Sichuan University filed Critical GUIZHOU PROVINCIAL DEPARTMENT OF EDUCATION
Priority to CN201310428390.8A priority Critical patent/CN103559434A/en
Publication of CN103559434A publication Critical patent/CN103559434A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a generation method for electronic attached sheets in a circulation domain based on a hardware environment comprising an authentication server and multiple authentication parties. Each authentication party is a software entity comprising an RFID (radio frequency identification device) and a reader. The method includes an encryption authentication method and a decryption authentication method, and the decryption authentication method preferably includes a pre-step of mutual authentication of both the authentication parties. By the generation method for the electronic attached sheets in the circulation domain, authenticity and security of information in the electronic attached sheets in the circulation domain are improved, authenticity of data information is guaranteed, and legitimate interests of consumers, producers and retailers are guaranteed by applying the method to commodity production and sales processes.

Description

Field of circulation electronics accompanying document generation method
Technical field
The invention belongs to safety certification field, relate to a kind of field of circulation electronics accompanying document generation method.
Background technology
In recent years, Safety of Food Quality is followed the tracks of and is reviewed for controlling epidemic situation, preventing that the meaning of food pollution, food poisoning and anti-terrorism is increasing.How to set up complete, Safety of Food Quality traceability system is one of food security most significant problems fast and efficiently.In China, set up the work of food traceability, can realize food security early warning mechanism, guarantee that food service industry thoroughly implements food source and follow the trail of and provide complete transparent management in food supply chain, realize " from farmland to dining table " tracking control of full process and review, effectively control food origin disease outburst, get rid of the obstacle that other countries for no reason arrange Chinese imported food problem.
For the quality safety of standard field of food, follow the tracks of, country progressively sets up archives in field of food release accompanying document system ,Wei manufacturing enterprise and foodstuff product, and it is the I.D. of food commodity.The foundation of accompanying document system, had both prevented that counterfeit and shoddy goods from flowing to market, from root, protected common people's safety, had protected again regular production producer simultaneously.But in real accompanying document implementation process, the papery accompanying document complete hand-manipulated adopting, cause workload very large on the one hand, because the intermediate links actual are many, easily occur mistake, therefore adopt electronics circulation to replace traditional papery accompanying document imperative with manifest.
Realize accompanying document system, just need each nodal information of supply chain true, information channel is unimpeded, makes supply chain in pellucidity.Compare with traditional one dimension code, Quick Response Code, that radio frequency identification (radio frequency identification, RFID) has is easy to use, manage the features such as simple, and the accompanying document system that RFID is applied in to white wine will become future developing trend.RFID has global unique identification, utilize RFID storage space and unique identification that supply chain full details such as the product information in food supply chain process, dealer, retailer etc. are effectively identified and record, just can set up to cover between the data message of full supply chain and corresponding object and contact, just can guarantee white wine to follow the trail of and trace to the source, can guarantee that white wine source is clear, and can trace back to concrete intermediate link.
Although RFID technology has many advantages, RFID technology also exists data illegally to be stolen, and in label, information may illegally be distorted etc., and these have brought certain threat to setting up based on RFID Safety of Food Quality traceability system.
Mainly there are privacy concern and 2 aspects of authentication question in RFID safety problem.Privacy concern mainly comprises that in label, information leakage and label position are tracked.Label information is revealed and is meaned that in label, storing secret information victim steals, and label position is tracked means that the positional information of holding this label personnel or article is illegally accessed.Authentication refers to the confirmation of label and read write line identity legitimacy, and authentication is mainly used in preventing label clone, forges.The security threat of rfid system mainly contains: data tampering, eavesdropping, Replay Attack, man-in-the-middle attack, denial of service, clone's label, physical attacks.
Summary of the invention
The technological deficiency vulnerable for overcoming existing field of circulation electronics accompanying document, message is easily revealed, the invention discloses a kind of field of circulation electronics accompanying document generation method.
Field of circulation electronics accompanying document generation method, based on comprising the hard of certificate server and a plurality of authenticating parties
Part environment, described authenticating party is the software entity that comprises RFID and reader, it is characterized in that, comprises encryption and authentication method and deciphering authentication method, described encryption and authentication method comprises the steps:
S11. authenticating party is registered to certificate server, and certificate server produces for the PKI of this authenticating party and corresponding private key, and records the sequence number of authenticating party RFID and reader;
S12. certificate server records the RFID label information of this authenticating party, utilizes the sequence number of private key and RFID to encrypt and form label enciphered message A1 RFID label information, and RFID is carried out to digital signature generation signing messages A2;
S13. certificate server writes RFID by label enciphered message A1 and signing messages A2;
Described decrypted authentication method comprises the steps:
S21. certified side B2 verifies the reader of information inquiry authenticating party B1;
S22. information inquiry authenticating party B1 verifies the RFID of certified side B2;
S23., after the checking of step S21-S22 completes, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, utilizes the PKI of certified side B2 to be decrypted checking.
Adopt field of circulation electronics accompanying document generation method of the present invention, information authenticity and security in the electronics accompanying document in the field of circulation are improved, guaranteed the authenticity of data message.
Concrete, in S11 step, produce PKI and private key, in S12 step to all using RSA Algorithm or RSA Algorithm in the encryption of label information; In S12 step, produce signing messages A2 and use RSA-Sign algorithm.
Further, step S21 is specially:
Certified side B2 produces the first random number R 1 and passes to the reader of information inquiry authenticating party B1, reads
Read device and produce the second random number R 2, reader is by the second random number R 2 and reader sequence number K, utilize RSA Algorithm to obtain reader enciphered message Q1 with the encrypted private key of information inquiry authenticating party B1, and send reader enciphered message Q1 and the second random number R 2 to certified side B2;
Certified side B2 utilizes the PKI of information inquiry authenticating party B1 to be decrypted reader enciphered message Q1 and the second random number R 2, calculate deciphering reader sequence number K1, certified side B2 communicates by letter with certificate server, if K1 is more consistent with the corresponding reader sequence number K being stored in certificate server for deciphering reader sequence number, the reader of information inquiry authenticating party B1 has been verified.
Further, step S22 is specially:
Information inquiry authenticating party B1 produces the 3rd random number R 3 and passes to the RFID of certified side B2, RFID produces the 4th random number R 4, and utilize RSA Algorithm to obtain RFID enciphered message Q2 with certified side B2 encrypted private key the 4th random number R 4 and RFID sequence number M, and send RFID enciphered message Q2 and the 4th random number R 4 to information inquiry authenticating party B1;
Information inquiry authenticating party B1 receives RFID enciphered message Q2 and the 4th random number R 4, utilizes the PKI deciphering of certified side B2, calculates deciphering RFID sequence number M1, information inquiry authenticating party B1 with
Certificate server communication, if deciphering RFID sequence number M1 is more consistent with the corresponding label sequence number M being stored in certificate server, the RFID of certified side B2 has verified.
By two-way authentication, swap data, has got rid of illegal read write tag data mutually.
Further, in step S12, use hash function H to produce signing messages A2;
Step S23 is specially, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, use and from label enciphered message A1, calculate the first message digest D1 with hash function H identical in step S12, utilize the PKI of certified side B2 to be decrypted and to obtain the second message digest D2 signing messages A2, judge that whether these two summaries are identical, the identical RFID that thinks certified side authenticates through authentication center.
Use hash function, even if information is revealed, the raw information of still can not retrodicting out.
Concrete, described authenticating party is for utilizing AGENT technology to realize.
Adopt field of circulation electronics accompanying document generation method of the present invention, information authenticity and security in electronics accompanying document in the field of circulation are improved, guaranteed the authenticity of data message, be applied in commodity production sales process, ensured the legitimate interests of consumer, manufacturer, dealer.
Accompanying drawing explanation
Fig. 1 is a kind of embodiment schematic diagram of decrypted authentication method of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in further detail.
Field of circulation electronics accompanying document generation method of the present invention, is applied to the article mark of the field of circulation
Sign information privacy and the Information Authentication of the logistics link of encrypting and authenticating, particularly merchandise.The hardware system relying on comprises certificate server and can set up a plurality of authenticating parties of correspondence with certificate server, and each authenticating party comprises radio-frequency (RF) tag RFID and reader, and can carry out rivest, shamir, adelman.
Field of circulation electronics accompanying document generation method comprises encryption and authentication method and deciphering authentication method, and wherein encryption and authentication method comprises the steps:
S11. authenticating party is registered to certificate server, and certificate server produces for the PKI of this authenticating party and corresponding private key, and records the sequence number of authenticating party RFID and reader;
S12. certificate server records the RFID label information of this authenticating party, utilizes the sequence number of private key and RFID to encrypt and form label enciphered message A1 RFID label information, and RFID is carried out to digital signature generation signing messages A2;
S13. certificate server writes RFID by label enciphered message A1 and signing messages A2;
Decrypted authentication method is carried out between two authenticating parties, and one of them is information inquiry authenticating party B1, the information of certified side B2 is carried out to the decrypted authentication of information.Comprise the steps:
S21. certified side B2 verifies the reader of information inquiry authenticating party B1;
S22. information inquiry authenticating party B1 verifies the RFID of certified side B2;
S23., after the checking of step S21-S22 completes, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, utilizes the PKI of certified side B2 to be decrypted checking.
Take Liquor Products as example, the logistics network of product comprises white wine manufacturer, white wine dealer and consumer, and white wine dealer may comprise one-level dealer, second level distributor etc., distribution network is complicated, and the information of Liquor Products in the process of circulation easily suffers that people is for distorting or revealing.
Using each node in distribution network as authenticating party, the certificate server of controlling with a believable third party carries out authentication communication, and certificate server rests in neutral conventionally, has in the mechanism of public credibility.
In distribution network, any one authenticating party can send authentication request to certificate server, and certificate server calculates PKI and the private key for this authenticating party on backstage according to rivest, shamir, adelman, and the sequence number of journal reader and RFID.
Certificate server records the label information of RFID, for example, to manufacturer, the white wine of different geographical has different environmental characteristics, and pond, cellar for storing things microorganism information, product information, manufacturer information, dealer's information are extracted, combined, and forms the characteristic information of product and writes RFID.To dealer, the papery white wine accompanying document information such as purchasing unit, contact person, phone, unit, quantity, unit price, the amount of money, the place of production, product batch number, date of manufacture can be extracted, combined, form dealer's product information and write RFID, and for consumer, the common only role in verifier, no longer writes information.
If authenticating party has passed through the verification process of certificate server, can obtain a private key, certificate server utilizes private key to encrypt and form label enciphered message A1 RFID label information, and RFID is carried out to digital signature generation signing messages A2.
In S11 step, produce PKI and private key, in S12 step to using the public key algorithms such as RSA Algorithm or NTRU algorithm all can in the encryption of label information; In S12 step, produce signing messages A2 and use RSA-Sign algorithm.RSA public key encryption algorithm is by Ron Rivest, Adi Shamirh and LenAdleman, in (Massachusetts Institute Technology), to be developed for 1977.RSA is named the name from they three of exploitation.RSA is the most influential public key encryption algorithm at present, it can resist up to the present known all cryptographic attacks, by ISO, be recommended as public key data encryption standard, and RSA-Sign algorithm is a kind of and the similar digital signature solution of RSA Algorithm principle, in variety of protocol, obtained being widely used, used very ripe.
For example, to the authenticating party as white wine manufacturer, the white wine of different geographical has different environmental characteristics, and pond, cellar for storing things microorganism information, product information, manufacturer information, dealer's information are extracted, combined, and generates Liquor Products information characteristics p m .The product information that first manufacturer's authenticating party is recorded with encrypted private key label, then carries out digital signature.Produce signing messages RSA-Sign (RSA ( p m ⊕ ID)) and the enciphered message of label information (RSA ( p m ⊕ ID); Product enciphered message and product signing messages are write to inserting RFID tags.And to the authenticating party as white wine dealer, the papery white wine accompanying document information such as purchasing unit, contact person, phone, unit, quantity, unit price, the amount of money, the place of production, product batch number, date of manufacture are extracted, combined, form white wine and buy information characteristics b m the purchase information that the encrypted private key label of ,Yong dealer authenticating party will be recorded b m , then carry out digital signature.Produce signing messages RSA-Sign (RSA ( b m ⊕ ID)) and the enciphered message of label information (RSA ( b m ⊕ ID); Purchase information encryption information and signing messages are write to inserting RFID tags.Here ID represents the tag serial number of RFID.
Also can utilize NTRU algorithm and NTRU-Sign algorithm to carry out said process.Rivest, shamir, adelman NTRU(number theory research unit) and NTRU-Sign Digital Signature Algorithm be the secret systems of three professor of mathematics disclosures of an invention of 1996 Nian You Brown Univ USA.NTRU newer RSA arithmetic, because the encryption key method that NTRU produces is easy, the speed of encrypting, deciphering is fast, aspect ensuring information safety, finds broad application, and NTRU-Sign algorithm is the digital signature solution similar corresponding with NTRU algorithm principle.
NTRU-Sign algorithm generation signing messages NTRU-Sign (NTRU ( p m ⊕ ID)) and the enciphered message of label information (NTRU ( p m ⊕ ID); Product enciphered message and product signing messages are write to inserting RFID tags.And to the authenticating party as white wine dealer, the papery white wine accompanying document information such as purchasing unit, contact person, phone, unit, quantity, unit price, the amount of money, the place of production, product batch number, date of manufacture are extracted, combined, form white wine and buy information characteristics b m the purchase information that the encrypted private key label of ,Yong dealer authenticating party will be recorded b m , then carry out digital signature.Produce signing messages NTRU-Sign (NTRU ( b m ⊕ ID)) and the enciphered message of label information (NTRU ( b m ⊕ ID); Purchase information encryption information and signing messages are write to inserting RFID tags.
The relative confidentiality of the relative NTRU algorithm of RSA Algorithm is stronger, in field of circulation information exchanging process, because circulation number of nodes is various, the read-write of information may repeatedly occur, and RSA Algorithm is more conducive to the encryption of information and maintains secrecy.But RSA Algorithm is higher to hardware requirement, hardware cost is higher, is applicable to high-end commodity and uses.
After encryption completes, certificate server writes RFID by label enciphered message A1 and signing messages A2.In the time need to being decrypted to the information in the RFID of authenticating party reading, first need reading a side reader and being carried out safety verification to get rid of the authenticating party not authenticating through certificate server by the RFID of reading side.
Decrypted authentication method is carried out between two authenticating parties, and one of them is information inquiry authenticating party B1, the information of certified side B2 is carried out to the decrypted authentication of information, and in decrypting process, two authenticating parties need to communicate with certificate server.
S21. certified side B2 verifies the reader of information inquiry authenticating party B1;
S22. information inquiry authenticating party B1 verifies the RFID of certified side B2.
Step S21 can be specially:
Certified side B2 produces the first random number R 1 and passes to the reader of information inquiry authenticating party B1, reads
Read device and produce the second random number R 2; reader utilizes RSA Algorithm encryption to obtain reader enciphered message Q1=RSA (K ⊕ R1) ⊕ R2 with the private key of information inquiry authenticating party B1 the second random number R 2 and reader sequence number K, and sends reader enciphered message Q1 and the second random number R 2 to certified side B2; If use NTRU algorithm, Q1=NTRU (K ⊕ R1) ⊕ R2.
Certified side B2 utilizes the PKI of information inquiry authenticating party B1 to be decrypted reader enciphered message Q1 and the second random number R 2, calculate deciphering reader sequence number K1, certified side B2 communicates by letter with certificate server, if K1 is more consistent with the corresponding reader sequence number K being stored in certificate server for deciphering reader sequence number, the reader of information inquiry authenticating party B1 has been verified.
Based on similar principle, step S22 can be specially:
Information inquiry authenticating party B1 produces the 3rd random number R 3 and passes to the RFID of certified side B2; RFID produces the 4th random number R 4; and the 4th random number R 4 and RFID sequence number M are obtained to RFID enciphered message Q2=RSA (M ⊕ R3) ⊕ R4 with certified side B2 encrypted private key, and send RFID enciphered message Q2 and the 4th random number R 4 to information inquiry authenticating party B1; If use NTRU algorithm, Q2=NTRU (M ⊕ R3) ⊕ R4.
Information inquiry authenticating party B1 receives RFID enciphered message Q2 and the 4th random number R 4, utilizes the PKI deciphering of certified side B2, calculates deciphering RFID sequence number M1, information inquiry authenticating party B1 with
Certificate server communication, if deciphering RFID sequence number M1 is more consistent with the corresponding label sequence number M being stored in certificate server, the RFID of certified side B2 has verified.
By two-way authentication, swap data, has got rid of illegal read write tag data mutually.Communication between two authenticating parties can be undertaken by certificate server, in the proof procedure of reader and RFID, authentication and be verified Fang Jun and produce separately random number and generate enciphered message, the enciphered message generating in each proof procedure is because random number is inconsistent and inconsistent, even if enciphered message is repeatedly tackled, also can not from each random enciphered message producing, decode out real information, improve the security in information exchanging process.
in step S12, can use hash function H to produce signing messages A2;
Accordingly, deciphering reading process to certified side's information in step S23 can be specially, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, use and from label enciphered message A1, calculate the first message digest D1 with hash function H identical in step S12, utilize the PKI of certified side B2 to be decrypted and to obtain the second message digest D2 signing messages A2, judge that whether these two summaries are identical, the identical RFID that thinks certified side authenticates through authentication center.Therefore if these 2 summaries are identical, consumer just can confirm that label data is really so, and data pass through digital signature, can prove that manufacturer writes in person, also can not deny.
Hash (Hash) function, hash function, is a kind of one-way cipher system, is one and only has ciphering process from expressly to the irreversible mapping of ciphertext, there is no decrypting process.Meanwhile, hash function can be fixed the input of random length the output of length after changing.This characteristic of unidirectional of hash function and output data length fixing feature make it can generating messages or data, and hash function is for comprising many operations of authentication and digital signature.
Use hash function (HASH) to calculate digest value, obtain the unique identification of product; Due to the characteristic information of different product, then carry out result of calculation difference through hash function, and can not derive raw data by result, therefore formed reliable product information feature.
Authenticating party described in the present invention can adopt AGENT technology to realize, and Agent is one and has adaptivity and intelligent software entity, can representative of consumer or other program, in the mode of taking the initiative in offering a hand, complete a job.Agent possesses the determinant attribute of following several respects: 1. independence: Agent has computational resource and the local mechanism of controlling in self behavior that belongs to himself, can be in without extraneous direct operated situation, according to its internal state and (outside) environmental information perceiving, determine and control the behavior of self.2. interactivity: can carry out the mutual of various ways with other Agent, can be effectively and other Agent collaborative works.3. reactive: the residing environment of energy perception, and dependent event is made in good time reaction.4. initiative: can follow and promise to undertake the action of taking the initiative, show object-oriented behavior.5. the ability that reasoning and planning ability: Agent have learning knowledge and experience and carry out relevant reasoning and intelligent computation.
Agent system is comprised of a plurality of autonomous or half autonomous intelligent bodies, each Agent or fulfil the responsibility of oneself, or the obtaining information of communicating by letter with other Agent the solving of whole problem that cooperated with each other.Agent system has following features: 1. social: in the social environment of Agent in consisting of a plurality of Agent, by certain Agent language and other Agent, implement flexile mutual and communication, realize and the cooperation of other Agent, collaborative, negotiation, competition etc.2. self-control by oneself property a: Agent sends after request in Agent system, other Agent only have to possess simultaneously and when the ability of this service and interest are provided, could accept action and entrust, and an Agent can not force another Agent that certain service is provided.This feature is best suited for obtaining of learner's feature.3. collaborative: in Agent system, each Agent with different target must cooperate mutually, work in coordination with, consult solving of Completion problem not
Adopt field of circulation electronics accompanying document generation method of the present invention, links authenticating party in the field of circulation is carried out to Third Party Authentication, and the transmission of information and read-write have been carried out to encryption and decryption, information authenticity and security in electronics accompanying document in the field of circulation are improved, guaranteed the authenticity of data message, be applied in commodity production sales process, ensured the legitimate interests of consumer, manufacturer, dealer.
Previously described is each preferred embodiment of the present invention, preferred implementation in each preferred embodiment is if not obviously contradictory or take a certain preferred implementation as prerequisite, each preferred implementation arbitrarily stack combinations is used, design parameter in described embodiment and embodiment is only the invention proof procedure for clear statement inventor, not in order to limit scope of patent protection of the present invention, scope of patent protection of the present invention is still as the criterion with its claims, the equivalent structure that every utilization instructions of the present invention and accompanying drawing content are done changes, in like manner all should be included in protection scope of the present invention.

Claims (6)

1. field of circulation electronics accompanying document generation method, hardware environment based on comprising certificate server and a plurality of authenticating parties, described authenticating party is the software entity that comprises RFID and reader, it is characterized in that, comprise encryption and authentication method and deciphering authentication method, described encryption and authentication method comprises the steps:
S11. authenticating party is registered to certificate server, and certificate server produces for the PKI of this authenticating party and corresponding private key, and records the sequence number of authenticating party RFID and reader;
S12. certificate server records the RFID label information of this authenticating party, utilizes the sequence number of private key and RFID to encrypt and form label enciphered message A1 RFID label information, and RFID is carried out to digital signature generation signing messages A2;
S13. certificate server writes RFID by label enciphered message A1 and signing messages A2;
Described decrypted authentication method comprises the steps:
S21. certified side B2 verifies the reader of information inquiry authenticating party B1;
S22. information inquiry authenticating party B1 verifies the RFID of certified side B2;
S23., after the checking of step S21-S22 completes, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, utilizes the PKI of certified side B2 to be decrypted checking.
2. field of circulation electronics accompanying document generation method as claimed in claim 1, is characterized in that, produces PKI and private key in S11 step, in S12 step to all using RSA Algorithm or RSA Algorithm in the encryption of label information; In S12 step, produce signing messages A2 and use RSA-Sign algorithm.
3. field of circulation electronics accompanying document generation method as claimed in claim 2, is characterized in that, step S21 is specially:
Certified side B2 produces the first random number R 1 and passes to the reader of information inquiry authenticating party B1, reader produces the second random number R 2, reader is by the second random number R 2 and reader sequence number K, utilize RSA Algorithm to obtain reader enciphered message Q1 with the encrypted private key of information inquiry authenticating party B1, and send reader enciphered message Q1 and the second random number R 2 to certified side B2;
Certified side B2 utilizes the PKI of information inquiry authenticating party B1 to be decrypted reader enciphered message Q1 and the second random number R 2, calculate deciphering reader sequence number K1, certified side B2 communicates by letter with certificate server, if K1 is more consistent with the corresponding reader sequence number K being stored in certificate server for deciphering reader sequence number, the reader of information inquiry authenticating party B1 has been verified.
4. field of circulation electronics accompanying document generation method as claimed in claim 2, is characterized in that, step S22 is specially:
Information inquiry authenticating party B1 produces the 3rd random number R 3 and passes to the RFID of certified side B2, RFID produces the 4th random number R 4, and utilize RSA Algorithm to obtain RFID enciphered message Q2 with certified side B2 encrypted private key the 4th random number R 4 and RFID sequence number M, and send RFID enciphered message Q2 and the 4th random number R 4 to information inquiry authenticating party B1;
Information inquiry authenticating party B1 receives RFID enciphered message Q2 and the 4th random number R 4, utilizes the PKI deciphering of certified side B2, calculates deciphering RFID sequence number M1, information inquiry authenticating party B1 with
Certificate server communication, if deciphering RFID sequence number M1 is more consistent with the corresponding label sequence number M being stored in certificate server, the RFID of certified side B2 has verified.
5. field of circulation electronics accompanying document generation method as claimed in claim 2, is characterized in that,
In step S12, use hash function H to produce signing messages A2;
Step S23 is specially, the reader of information inquiry authenticating party B1 is read label enciphered message A1 and the signing messages A2 in the RFID of certified side B2, use and from label enciphered message A1, calculate the first message digest D1 with hash function H identical in step S12, utilize the PKI of certified side B2 to be decrypted and to obtain the second message digest D2 signing messages A2, judge that whether these two summaries are identical, the identical RFID that thinks certified side authenticates through authentication center.
6. field of circulation electronics accompanying document generation method as claimed in claim 1, is characterized in that, described authenticating party is for utilizing AGENT technology to realize.
CN201310428390.8A 2013-09-22 2013-09-22 Generation method for electronic attached sheets in circulation domain Pending CN103559434A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310428390.8A CN103559434A (en) 2013-09-22 2013-09-22 Generation method for electronic attached sheets in circulation domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310428390.8A CN103559434A (en) 2013-09-22 2013-09-22 Generation method for electronic attached sheets in circulation domain

Publications (1)

Publication Number Publication Date
CN103559434A true CN103559434A (en) 2014-02-05

Family

ID=50013680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310428390.8A Pending CN103559434A (en) 2013-09-22 2013-09-22 Generation method for electronic attached sheets in circulation domain

Country Status (1)

Country Link
CN (1) CN103559434A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091230A (en) * 2014-06-20 2014-10-08 安徽云盾信息技术有限公司 Product tracking method
CN107222311A (en) * 2017-07-04 2017-09-29 四川云物益邦科技有限公司 A kind of processing system of multiple communication verification identity
WO2019154178A1 (en) * 2018-02-11 2019-08-15 北京京东尚科信息技术有限公司 Method and apparatus for storing information

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949250A (en) * 2006-07-10 2007-04-18 王耀 System and method of identifying electronic tag using mobile communication equipment
CN101009014A (en) * 2007-01-24 2007-08-01 华中科技大学 Secure anti-counterfeiting method and system thereof
CN101131756A (en) * 2006-08-24 2008-02-27 联想(北京)有限公司 Security authentication system, device and method for electric cash charge of mobile paying device
CN101271534A (en) * 2008-03-25 2008-09-24 华南理工大学 RFID label and reading device thereof, reading system and safety authentication method
US20090167489A1 (en) * 2006-03-23 2009-07-02 Nan Xianghao Anti-forgery method and apparatus based on cpk electronic tag
CN101514534A (en) * 2008-02-21 2009-08-26 叶家盛 Paper embedded with RFID label capable of being numerically signed for anti-counterfeiting
CN101697190A (en) * 2009-10-23 2010-04-21 北京派瑞根科技开发有限公司 Electronic signature for signing on electronic paper
CN101874248A (en) * 2008-09-24 2010-10-27 松下电器产业株式会社 Recording/reproducing system, recording medium device, and recording/reproducing device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090167489A1 (en) * 2006-03-23 2009-07-02 Nan Xianghao Anti-forgery method and apparatus based on cpk electronic tag
CN1949250A (en) * 2006-07-10 2007-04-18 王耀 System and method of identifying electronic tag using mobile communication equipment
CN101131756A (en) * 2006-08-24 2008-02-27 联想(北京)有限公司 Security authentication system, device and method for electric cash charge of mobile paying device
CN101009014A (en) * 2007-01-24 2007-08-01 华中科技大学 Secure anti-counterfeiting method and system thereof
CN101514534A (en) * 2008-02-21 2009-08-26 叶家盛 Paper embedded with RFID label capable of being numerically signed for anti-counterfeiting
CN101271534A (en) * 2008-03-25 2008-09-24 华南理工大学 RFID label and reading device thereof, reading system and safety authentication method
CN101874248A (en) * 2008-09-24 2010-10-27 松下电器产业株式会社 Recording/reproducing system, recording medium device, and recording/reproducing device
CN101697190A (en) * 2009-10-23 2010-04-21 北京派瑞根科技开发有限公司 Electronic signature for signing on electronic paper

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗爱民等: "基于无线射频识别的食品数字身份证设计及应用", 《农业工程学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091230A (en) * 2014-06-20 2014-10-08 安徽云盾信息技术有限公司 Product tracking method
CN107222311A (en) * 2017-07-04 2017-09-29 四川云物益邦科技有限公司 A kind of processing system of multiple communication verification identity
WO2019154178A1 (en) * 2018-02-11 2019-08-15 北京京东尚科信息技术有限公司 Method and apparatus for storing information
US11315070B2 (en) 2018-02-11 2022-04-26 Beijing Jingdong Shangke Information Technology Co., Ltd. Method and apparatus for storing information

Similar Documents

Publication Publication Date Title
Jangirala et al. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment
US11038694B1 (en) Devices, methods, and systems for cryptographic authentication and provenance of physical assets
EP2228942B1 (en) Securing communications sent by a first user to a second user
CN109325331A (en) Transaction system is acquired based on the big data of block chain and credible calculating platform
JP5680725B2 (en) Method and apparatus for providing low complexity device authentication and confidentiality
CN102663591A (en) Product anti-counterfeiting method and system based on electronic tag
CN114780943B (en) Food supply chain management system based on block chain and decentralised attribute passwords
CN106656509B (en) A kind of RFID alliance chain collaboration authentication method for the monitoring of defeated port food
CN106878318A (en) A kind of block chain real time polling cloud system
CN103281194B (en) A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN103150655A (en) Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN107547203B (en) Anti-counterfeiting tracing method and system
Kang et al. A study on secure RFID mutual authentication scheme in pervasive computing environment
CN109636622A (en) A kind of fund data sharing method, system and electronic equipment based on block chain
CN113779594B (en) Block chain-based data distribution sharing method and system
CN103559434A (en) Generation method for electronic attached sheets in circulation domain
CN112884485B (en) Symmetrical encryption traceability transaction method, system and storage medium based on blockchain network
Yang et al. A privacy model for RFID tag ownership transfer
Bu et al. Every step you take, i’ll be watching you: Practical stepauth-entication of RFID paths
Bilal et al. A hierarchical anti-counterfeit mechanism: securing the supply chain using RFIDs
Chen et al. An RFID authentication and anti-counterfeit transaction protocol
CN110798321B (en) Article information service method based on block chain
Abyaneh On the privacy of two tag ownership transfer protocols for RFIDs
Meng et al. An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140205

RJ01 Rejection of invention patent application after publication