CN104615967B - A kind of rolling code system and the double encryption approach based on rolling code - Google Patents
A kind of rolling code system and the double encryption approach based on rolling code Download PDFInfo
- Publication number
- CN104615967B CN104615967B CN201510068536.1A CN201510068536A CN104615967B CN 104615967 B CN104615967 B CN 104615967B CN 201510068536 A CN201510068536 A CN 201510068536A CN 104615967 B CN104615967 B CN 104615967B
- Authority
- CN
- China
- Prior art keywords
- uid
- cards
- reader
- data
- legal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
One kind rolls code system, includes UID cards, UID cards and reader wireless connection;Its encrypt the step of be:One:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;Two:If legal, step 3 is carried out;Otherwise, authentication not passes through;Three:The ID number of UID cards and data command are sent to reader as data block, the data block received compared with the data block preserved, is verified whether ID number and data command are legal by reader, if legal, performs corresponding instruction;Otherwise, not perform;Four:Reader data block is encrypted modification using rolling code AES, and amended data block is sent into UID cards;Five:The data block that UID card storages receive, and as the initialization data of next data command authentication;The needs that user exchanges key are eliminated, add decoding difficulty, safe, anti-attack ability is strong.
Description
Technical field
The invention belongs to radio frequency identification and data encryption technology field, and in particular to one kind rolls code system and based on rolling
The double encryption approach of code.
Background technology
Radio frequency identification is to identify specific objective by radio signals and read and write related data, without identifying system with
A kind of recognition methods of any contact is established between specific objective, is widely used in the occasions such as automobile burglar, gate control system.But
It is, it is also following along with safety problems such as the fast development of REID, information leakages.Active card information security
Encryption technology confidentiality is poor, and anti-attack ability is weak to wait potential safety hazard existing for technical elements.
The content of the invention
In order to overcome the above-mentioned deficiencies of the prior art, code system is rolled and based on rolling it is an object of the invention to provide one kind
The double encryption approach of activity code, user data is entered with the double encryption approach that rolling code is combined using rivest, shamir, adelman
Row encryption, adds the difficulty of deciphering data, and it is poor to solve active card information security encryption technology confidentiality, anti-attack ability
It is weak to wait potential safety hazard existing for technical elements, there is the characteristics of safe, anti-attack ability is strong.
To achieve these goals, the technical solution adopted by the present invention is:One kind rolls code system, includes UID cards,
UID cards and reader wireless connection;
Described UID cards are for memory card exclusive identification code ID number, data command and key pair;
Described reader utilizes the characteristic that the sector of UID cards 0 can arbitrarily change, and utilizes the method data for rolling code encryption
Modification is encrypted in instruction authentication information.
The bidirectional identity authentication of described reader and UID cards uses the RSA cryptographic algorithms of asymmet-ric encryption method, exempts
User exchanges the needs of key, increases data security.
Described rolling code, by the way that afterwards data are encrypted with modification, makes user every in each data command authentication
Secondary data command information differs, and adds decoding difficulty.
A kind of double encryption approach based on rolling code, comprises the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:Using the ID number of UID cards and data command as data block it is sent to reader, reader will receive
Data block verifies whether ID number and data command are legal compared with the data block preserved, if legal, perform and grasps in next step
Make, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just without in next step
Operation;
Step 4:Reader data block is encrypted modification using rolling code AES, and by amended data
Block is sent to UID cards;
Step 5:The data block that UID card storages receive, and as the initialization of next data command authentication
Data.
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number
B, ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise
Authentication not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reading
Device;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, number is verified
According to block;Otherwise, UID cards identification mistake.
The beneficial effects of the invention are as follows:
Compared with prior art, the present invention is recognized using the bidirectional identification of rivest, shamir, adelman progress reader and UID cards
Card, the characteristic that can be arbitrarily changed using the sector of UID cards 0, using rolling the method for code encryption to card ID number and data command
Authentication information carries out two re-encryption modifications, improves the confidentiality of user data, adds the difficulty of deciphering data, have security
High, the characteristics of anti-attack ability is strong.
Brief description of the drawings
Fig. 1 is the system structure diagram of the present invention.
Fig. 2 is the flow chart of the present invention.
Embodiment
The present invention is described in further details below in conjunction with the accompanying drawings.
Referring to Fig. 1, one kind rolls code system, includes UID cards, UID cards and reader wireless connection;
Described UID cards are for memory card exclusive identification code ID number, data command and key pair;
Described reader utilizes the characteristic that the sector of UID cards 0 can arbitrarily change, and utilizes the method data for rolling code encryption
Modification is encrypted in instruction authentication information.
The bidirectional identity authentication of described reader and UID cards uses the RSA cryptographic algorithms of asymmet-ric encryption method, exempts
User exchanges the needs of key, increases data security.
Described rolling code, by the way that afterwards data are encrypted with modification, makes user every in each data command authentication
Secondary data command information differs, and adds decoding difficulty.
It is an object of the invention to provide a kind of method of data double-encryption.Including by rivest, shamir, adelman with roll
The method of code-phase combination double-encryption is used for data encryption and identification.
Referring to Fig. 2, a kind of double encryption approach based on rolling code, comprise the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:Using the ID number of UID cards and data command as data block it is sent to reader, reader will receive
Data block verifies whether ID number and data command are legal compared with the data block preserved, if legal, perform and grasps in next step
Make, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just without in next step
Operation;
Step 4:Reader data block is encrypted modification using rolling code AES, and by amended data
Block is sent to UID cards;
Step 5:The data block that UID card storages receive, and as the initialization of next data command authentication
Data.
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number
B, ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise
Authentication not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reading
Device;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, number is verified
According to block;Otherwise, UID cards identification mistake.
By the concrete scheme of above-described embodiment, when system key or user data are stolen or arbitrarily distorted,
Encryption method of the present invention has dual defence line, can effectively identify user identity, and the data command that user is each
Identification information is different from, and be effectively prevent inflight acquisition and is palmed off the potential safety hazard of identity, adds the difficulty of deciphering data,
With the characteristics of safe, anti-attack ability is strong.
Above-described embodiment is merely illustrative of the technical solution of the present invention, non-that it is limited.Although with reference to above-described embodiment pair
The present invention is described in detail, and the technical staff of the industry should be understood that:It can be to the technical scheme of above-described embodiment
Modify, or which part technical characteristic is replaced, but these modifications or substitutions, do not make the sheet of its technical method
Matter departs from the thought and protection domain of the present invention.
Claims (1)
1. a kind of double encryption approach based on rolling code, it is characterised in that comprise the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:The ID number of UID cards and data command are sent to reader, the data that reader will receive as data block
Block verifies whether ID number and data command are legal, if legal, if legal, perform next compared with the data block preserved
Step operation, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just under
Single stepping;
Step 4:Reader data block is encrypted modification using rolling code AES, and amended data block is sent out
Give UID cards;
Step 5:The data block that UID card storages receive, and as the initialization number of next data command authentication
According to;
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number B, will
Ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise identity
Certification not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reader;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, data block is verified;
Otherwise, UID cards identification mistake.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510068536.1A CN104615967B (en) | 2015-02-10 | 2015-02-10 | A kind of rolling code system and the double encryption approach based on rolling code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510068536.1A CN104615967B (en) | 2015-02-10 | 2015-02-10 | A kind of rolling code system and the double encryption approach based on rolling code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104615967A CN104615967A (en) | 2015-05-13 |
CN104615967B true CN104615967B (en) | 2017-12-01 |
Family
ID=53150406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510068536.1A Active CN104615967B (en) | 2015-02-10 | 2015-02-10 | A kind of rolling code system and the double encryption approach based on rolling code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104615967B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022181B (en) * | 2016-05-30 | 2018-08-31 | 陕西科技大学 | A kind of system for preventing IC card from stealing brush |
CN106529651B (en) * | 2016-11-15 | 2019-03-08 | 安徽汉威电子有限公司 | A kind of radio frequency card using double-encryption algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103116844A (en) * | 2013-03-06 | 2013-05-22 | 李锦风 | Near field communication payment method authenticated by both sides of deal |
CN103150655A (en) * | 2013-03-25 | 2013-06-12 | 曹鹏 | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system |
EP2779564A1 (en) * | 2011-11-08 | 2014-09-17 | Chan, Ka Yin Victor | Method and system for authenticating user's identity and equipment used therein |
-
2015
- 2015-02-10 CN CN201510068536.1A patent/CN104615967B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2779564A1 (en) * | 2011-11-08 | 2014-09-17 | Chan, Ka Yin Victor | Method and system for authenticating user's identity and equipment used therein |
CN103116844A (en) * | 2013-03-06 | 2013-05-22 | 李锦风 | Near field communication payment method authenticated by both sides of deal |
CN103150655A (en) * | 2013-03-25 | 2013-06-12 | 曹鹏 | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system |
Non-Patent Citations (1)
Title |
---|
KEELOQ加密算法在硬件加密中的应用;李罗等;《电子技术应用》;20060930(第9期);第42页第2节 * |
Also Published As
Publication number | Publication date |
---|---|
CN104615967A (en) | 2015-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104217230B (en) | The safety certifying method of hiding ultrahigh frequency electronic tag identifier | |
US8700908B2 (en) | System and method for managing secure information within a hybrid portable computing device | |
US9811478B2 (en) | Self-encrypting flash drive | |
KR101264791B1 (en) | Security certification and storage combined device having wireless communication function | |
CN103152174B (en) | It is applied to the data processing method in parking lot, device and managing system of car parking | |
CA2921718C (en) | Facilitating secure transactions using a contactless interface | |
US9065635B2 (en) | Information processing apparatus, IC chip, and information processing method | |
ES2768963T3 (en) | Entity authentication procedure and device | |
CN103606223B (en) | A kind of card authentication method and device | |
CN101980241A (en) | Method, system and device for authenticating radio frequency tag | |
CN104615967B (en) | A kind of rolling code system and the double encryption approach based on rolling code | |
CN103596175A (en) | Mobile intelligent terminal certification system and method based on near field communication technology | |
CN103971141B (en) | RFID (radio frequency identification) information acquisition realization method and system | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
CN104579673B (en) | Interactive authentication method between RFID card and card reader | |
CN103455768B (en) | A kind of USB method for secure storing and system | |
KR101630462B1 (en) | Apparatus and Method for Securing a Keyboard | |
CN105516182A (en) | Bidirectional authentication method and system used between smart card and reader-writer | |
CN104579691A (en) | BYOD mode control method, mobile device and system | |
CN204103935U (en) | A kind of protective device being applied to banking hardware password | |
Li et al. | Rhythmic rfid authentication | |
CN113988249B (en) | RFID (radio frequency identification) method based on arrangement | |
KR101505735B1 (en) | Method for Authenticating Near Field Communication Card by using Time Verification | |
CN104346643B (en) | Based on encryption method of the aes algorithm to the 925MHz electronic vehicle license plate systems of UHF 920 | |
KR101684905B1 (en) | User authentication device for multi-authenticating by using fingerprint, security key and wireless tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |