CN106384139A - RFID reader-writer based on hardware security encryption - Google Patents

RFID reader-writer based on hardware security encryption Download PDF

Info

Publication number
CN106384139A
CN106384139A CN201610952584.1A CN201610952584A CN106384139A CN 106384139 A CN106384139 A CN 106384139A CN 201610952584 A CN201610952584 A CN 201610952584A CN 106384139 A CN106384139 A CN 106384139A
Authority
CN
China
Prior art keywords
encryption
module
hardware
data
rfid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610952584.1A
Other languages
Chinese (zh)
Inventor
徐晓光
朱光华
胡威勇
赵子逸
孙骁
黄继贵
徐晓辉
徐晓明
张士明
黄宏宏
邵梦云
涂德梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Polytechnic University
Original Assignee
Anhui Polytechnic University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Polytechnic University filed Critical Anhui Polytechnic University
Priority to CN201610952584.1A priority Critical patent/CN106384139A/en
Publication of CN106384139A publication Critical patent/CN106384139A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of reader-writers, and specifically relates to an RFID reader-writer based on hardware security encryption. The RFID reader-writer comprises an RFID module, an MCU, a hardware encryption module, a Balun circuit, a directional coupler, a peripheral communication interface and a power management module. A TF32A09 chip is used to encrypt hardware. On one hand, RSA encryption protection to tag data is realized, and the application scope under a classified environment is expanded greatly. On the other hand, through hardware module encryption, the load of the RFID read-writer processor is reduced, the amount of calculation is reduced, and the working robustness of the system under the condition of high-traffic data communication is ensured. The whole scheme has the characteristics of high stability, low cost and strong practicability, and is highly creative.

Description

A kind of rfid interrogator based on hardware security encryption
Technical field
The present invention relates to read write line technical field is and in particular to a kind of rfid interrogator based on hardware security encryption.
Background technology
RFID technique is a kind of physically-isolated automatic identification technology entering row information exchange by wireless channel.Radio frequency is believed Number certification is identified by Space Coupling to destination object, gathers simultaneously and exchange the data message of destination object, obtain letter The purpose that breath exchanges., in the data transfer procedure in electronic tag and rfid interrogator, electromagnetic wave itself can not for rfid system Ensure the security of data, the rfid interrogator that label data information is not easily given certification reads.Existing system is general The mode adopting software cryptography algorithm is encrypted to related data information to ensure information safety.
But software rsa encryption haves such problems as that workload is huge, traffic rate is low and information flow delay effect is obvious, real Border using value is not high.And the Security Encryption module that TF32A09 chip is core is the high speed height with independent intellectual property right Performance hardware rsa encryption module, the secure cryptographic algorithm of its high speed and communication interface, exclusive data flow encryption and decryption processor System is it is achieved that to high-speed data-flow synchronization encryption and decryption functions, can significantly meet existing information security demand.
Existing RFID read-write system relies on electromagnetic wave to be transmitted in space during reading rewriting label data, Data letter flow is easily intercepted capture by other read write lines in some instances it may even be possible to occur label data maliciously to be rewritten.So, in concerning security matters bar Under part, the limitation of this system application development is than larger.
And for comparing more existing software cryptography scheme, the real-time of complexity height and communication is relatively low, operability is not Height, when data message is huge, system-computed amount can be substantially increased, and causes system cannot complete in time to encrypt solution to information Close, greatly have impact on the normal work of product.
So the TF32A09 chip hardware cryptographic means that the design adopts, on the one hand solve the RSA of the data to label Encipherment protection, greatly promotes the range of application under concerning security matters environment;On the other hand, decreased to RFID using hardware module encryption The load of reader processing device, decrease amount of calculation it is ensured that under massive dataflow signal intelligence system work robustness. This encrypting module is by China's independent research simultaneously, good in terms of security, reliability, has grasped autonomous control power, product Stability have guarantee, performance is more superior.
Content of the invention
(One)The technical problem solving
For the deficiencies in the prior art, the invention provides a kind of rfid interrogator based on hardware security encryption, have Good stability, low cost, practical feature.
(Two)Technical scheme
For realizing object above, the present invention is achieved by the following technical programs:
A kind of rfid interrogator based on hardware security encryption it is characterised in that:Including RFID module, MCU, hardware encryption Module, Balun circuit, directional coupler, peripheral communication interfaces and power management module, described RFID module adopts AS3992 to read Write device chip, control for realizing the Signal coding to radiofrequency signal, modulation /demodulation and communication protocol, described MCU processor die Block adopts the C8051F340 of Silicon Labs company, for completing the SECO of communication process and to data message stream Simple process.
Preferably, described hardware encryption module is used for primary data information (pdi) is carried out with number after hardware encryption and decoding demodulation According to the task such as deciphering, it is core that module adopts TF32A09 encryption chip.
Preferably, described Balun circuit is used for realizing the single-ended signal during emission of radio frequency signals receives and difference The mutual conversion of signal.
Preferably, described directional coupler is used for building design radio frequency isolation circuit, this is because system design only uses One antenna, the sending and receiving process and all must share an antenna, in order to prevent transmission signal and receipt signal of signal Send crosstalk.
Preferably, described peripheral communication interfaces are used for realizing data communication, download program function.
Preferably, described power management module is then responsible for whole system and provides the working power being suitable for.
Preferably, described read write line realize step include following:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the mark in radiofrequency field Sign data, then carry out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the mark in radiofrequency field Sign data, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
(Three)Beneficial effect
The present invention adopts TF32A09 chip hardware cryptographic means, and the rsa encryption on the one hand solving the data to label is protected Shield, greatly promotes the range of application under concerning security matters environment;On the other hand, decreased to rfid interrogator using hardware module encryption The load of processor, decrease amount of calculation it is ensured that under massive dataflow signal intelligence system work robustness, entirely side Case has the characteristics that good stability, low cost, practical, has very strong creativeness.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the system topology figure of the present invention;
Fig. 2 is the system topology figure of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
This programme solves the problems, such as the data information security of rfid system, whole scheme using the method for hardware encryption module There is good stability, low cost, practical.
This programme includes RFID module, MCU, hardware encryption module, Balun circuit, directional coupler, peripheral communication interfaces And power management module.System topology is as indicated with 1.
RFID module adopts AS3992 read write line chip, for realize to the Signal coding of radiofrequency signal, modulation /demodulation and Communication protocol control etc..
MCU processor module adopts the C8051F340 of Silicon Labs company, for completing the sequential control of communication process System and the simple process to data message stream.
Hardware encryption module is used for primary data information (pdi) is carried out with deciphering of hardware encryption and decoding data after demodulating etc. Task, it is core that module adopts TF32A09 encryption chip
The single-ended signal that Balun circuit is used for realizing during emission of radio frequency signals receives is turned with the mutual of differential signal Change.
Directional coupler is used for building design radio frequency isolation circuit, this is because system design only employs an antenna, The the sending and receiving process and all must share an antenna, in order to prevent transmission signal and receipt signal from sending crosstalk of signal.
Peripheral communication interfaces are used for realizing the functions such as data communication, download program.
Power management module is then responsible for whole system and provides the working power being suitable for.
It is as follows that this programme realizes step:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the mark in radiofrequency field Sign data, then carry out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the mark in radiofrequency field Sign data, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
The design solves the problems, such as Information Security in RFID communication technology so that the security of system and reliability Greatly improve., during being encrypted deciphering to data, MCU processor live load is little, traffic rate for the program simultaneously The discriminance analysis that height can meet a large amount of labels simultaneously is processed.The feasibility of design and practical, can be in concerning security matters work Make to be used widely in environment.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation are made a distinction with another entity or operation, and not necessarily require or imply these entities or deposit between operating In any this actual relation or order.And, term " inclusion ", "comprising" or its any other variant are intended to Comprising of nonexcludability, wants so that including a series of process of key elements, method, article or equipment and not only including those Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element that limited by sentence "including a ..." it is not excluded that Also there is other identical element including in the process of described key element, method, article or equipment.
Above example only in order to technical scheme to be described, is not intended to limit;Although with reference to the foregoing embodiments The present invention has been described in detail, it will be understood by those within the art that:It still can be to aforementioned each enforcement Technical scheme described in example is modified, or carries out equivalent to wherein some technical characteristics;And these modification or Replace, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (7)

1. a kind of rfid interrogator based on hardware security encryption it is characterised in that:Including RFID module, MCU, hardware encryption mould Block, Balun circuit, directional coupler, peripheral communication interfaces and power management module, described RFID module adopts AS3992 to read and write Device chip, controls for realizing the Signal coding to radiofrequency signal, modulation /demodulation and communication protocol, described MCU processor module Using the C8051F340 of Silicon Labs company, for completing SECO and the letter to data message stream of communication process Single process.
2. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described hardware encryption Module is used for primary data information (pdi) is carried out with the tasks such as the deciphering of hardware encryption and decoding data after demodulating, and module adopts TF32A09 encryption chip is core.
3. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described Balun electricity Road is used for realizing the mutual conversion of the single-ended signal during emission of radio frequency signals receives and differential signal.
4. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described directional couple Device is used for building design radio frequency isolation circuit, this is because system design only employs an antenna, the sending and receiving of signal Process all must share an antenna, in order to prevent transmission signal and receipt signal from sending crosstalk.
5. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described peripheral communications Interface is used for realizing data communication, download program function.
6. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described power management Module is then responsible for whole system and provides the working power being suitable for.
7. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described read write line is real Existing step includes following:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the number of tags in radiofrequency field According to then carrying out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the number of tags in radiofrequency field According to, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
CN201610952584.1A 2016-11-02 2016-11-02 RFID reader-writer based on hardware security encryption Pending CN106384139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610952584.1A CN106384139A (en) 2016-11-02 2016-11-02 RFID reader-writer based on hardware security encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610952584.1A CN106384139A (en) 2016-11-02 2016-11-02 RFID reader-writer based on hardware security encryption

Publications (1)

Publication Number Publication Date
CN106384139A true CN106384139A (en) 2017-02-08

Family

ID=57957313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610952584.1A Pending CN106384139A (en) 2016-11-02 2016-11-02 RFID reader-writer based on hardware security encryption

Country Status (1)

Country Link
CN (1) CN106384139A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160053A (en) * 2020-03-03 2020-05-15 昆山华辰新材料科技有限公司 Intelligent grinding wheel identification method and system based on RFID technology
CN111709501A (en) * 2020-06-16 2020-09-25 西安电子科技大学 Encryption type RFID system applied in military field

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820342A (en) * 2010-03-31 2010-09-01 北京飞天诚信科技有限公司 Method for implementing hardware encryption engine
CN104717220A (en) * 2015-03-25 2015-06-17 江苏物联网研究发展中心 Control signaling secure transmission method based on hardware encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820342A (en) * 2010-03-31 2010-09-01 北京飞天诚信科技有限公司 Method for implementing hardware encryption engine
CN104717220A (en) * 2015-03-25 2015-06-17 江苏物联网研究发展中心 Control signaling secure transmission method based on hardware encryption

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
赵梦军 等: "射频识别读写器的硬件设计", 《微型机与应用》 *
陆兴华 等: "支持多频多格式的RFID智能卡阅读器设计", 《世界有色金属》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160053A (en) * 2020-03-03 2020-05-15 昆山华辰新材料科技有限公司 Intelligent grinding wheel identification method and system based on RFID technology
CN111709501A (en) * 2020-06-16 2020-09-25 西安电子科技大学 Encryption type RFID system applied in military field

Similar Documents

Publication Publication Date Title
EP2690839B1 (en) NFC apparatus capable to perform a contactless tag reading function
CN106022080B (en) A kind of data ciphering method based on the cipher card of PCIe interface and the cipher card
CN103593687B (en) Internet of Things intelligent management control cabinet system
CN106656999A (en) Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment
Khan et al. FSM based Manchester encoder for UHF RFID tag emulator
US8258918B1 (en) RFID reader controllers limiting theft of confidential information
CN101122960A (en) Method and device for enhancing active radio frequency identification system information safety and compatibility
CN103593688A (en) Positioning beacon, electronic label system with positioning beacon and communication method
CN103281194A (en) Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN111245783A (en) Isolated environment data transmission device and method based on digital encryption technology
CN110427790A (en) A kind of RFID device and the information processing method based on it
CN101976365B (en) Safe radio frequency identification system
CN106384139A (en) RFID reader-writer based on hardware security encryption
CN109391698A (en) A kind of Internet of Things intelligent service system
CN101499142B (en) Double-interface smart card and method for processing application instruction
CN101980309B (en) Near field communication (NFC) mobile terminal and NFC safety payment realizing method
CN103077414A (en) Passive RFID (Radio Frequency Identification Devices) electronic tag reader-writer with high reliability and UHF (Ultra High Frequency) and read write control method
CN108694344A (en) A kind of cryptography electronic label
CN202309767U (en) Middleware system for Internet of things
CN205334488U (en) Support reading ware of multiple cipher mode
CN102236802B (en) Multifunctional smart card reader-writer
EP3561666B1 (en) Mobile device with access rights management
CN204463175U (en) A kind of read-write equipment of radio frequency smart card
CN204904335U (en) Logistics distribution system and equipment based on NFC
CN101329716B (en) Novel electronic label read-write module built-in with safe processing chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170208

RJ01 Rejection of invention patent application after publication