CN106384139A - RFID reader-writer based on hardware security encryption - Google Patents
RFID reader-writer based on hardware security encryption Download PDFInfo
- Publication number
- CN106384139A CN106384139A CN201610952584.1A CN201610952584A CN106384139A CN 106384139 A CN106384139 A CN 106384139A CN 201610952584 A CN201610952584 A CN 201610952584A CN 106384139 A CN106384139 A CN 106384139A
- Authority
- CN
- China
- Prior art keywords
- encryption
- module
- hardware
- data
- rfid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of reader-writers, and specifically relates to an RFID reader-writer based on hardware security encryption. The RFID reader-writer comprises an RFID module, an MCU, a hardware encryption module, a Balun circuit, a directional coupler, a peripheral communication interface and a power management module. A TF32A09 chip is used to encrypt hardware. On one hand, RSA encryption protection to tag data is realized, and the application scope under a classified environment is expanded greatly. On the other hand, through hardware module encryption, the load of the RFID read-writer processor is reduced, the amount of calculation is reduced, and the working robustness of the system under the condition of high-traffic data communication is ensured. The whole scheme has the characteristics of high stability, low cost and strong practicability, and is highly creative.
Description
Technical field
The present invention relates to read write line technical field is and in particular to a kind of rfid interrogator based on hardware security encryption.
Background technology
RFID technique is a kind of physically-isolated automatic identification technology entering row information exchange by wireless channel.Radio frequency is believed
Number certification is identified by Space Coupling to destination object, gathers simultaneously and exchange the data message of destination object, obtain letter
The purpose that breath exchanges., in the data transfer procedure in electronic tag and rfid interrogator, electromagnetic wave itself can not for rfid system
Ensure the security of data, the rfid interrogator that label data information is not easily given certification reads.Existing system is general
The mode adopting software cryptography algorithm is encrypted to related data information to ensure information safety.
But software rsa encryption haves such problems as that workload is huge, traffic rate is low and information flow delay effect is obvious, real
Border using value is not high.And the Security Encryption module that TF32A09 chip is core is the high speed height with independent intellectual property right
Performance hardware rsa encryption module, the secure cryptographic algorithm of its high speed and communication interface, exclusive data flow encryption and decryption processor
System is it is achieved that to high-speed data-flow synchronization encryption and decryption functions, can significantly meet existing information security demand.
Existing RFID read-write system relies on electromagnetic wave to be transmitted in space during reading rewriting label data,
Data letter flow is easily intercepted capture by other read write lines in some instances it may even be possible to occur label data maliciously to be rewritten.So, in concerning security matters bar
Under part, the limitation of this system application development is than larger.
And for comparing more existing software cryptography scheme, the real-time of complexity height and communication is relatively low, operability is not
Height, when data message is huge, system-computed amount can be substantially increased, and causes system cannot complete in time to encrypt solution to information
Close, greatly have impact on the normal work of product.
So the TF32A09 chip hardware cryptographic means that the design adopts, on the one hand solve the RSA of the data to label
Encipherment protection, greatly promotes the range of application under concerning security matters environment;On the other hand, decreased to RFID using hardware module encryption
The load of reader processing device, decrease amount of calculation it is ensured that under massive dataflow signal intelligence system work robustness.
This encrypting module is by China's independent research simultaneously, good in terms of security, reliability, has grasped autonomous control power, product
Stability have guarantee, performance is more superior.
Content of the invention
(One)The technical problem solving
For the deficiencies in the prior art, the invention provides a kind of rfid interrogator based on hardware security encryption, have
Good stability, low cost, practical feature.
(Two)Technical scheme
For realizing object above, the present invention is achieved by the following technical programs:
A kind of rfid interrogator based on hardware security encryption it is characterised in that:Including RFID module, MCU, hardware encryption
Module, Balun circuit, directional coupler, peripheral communication interfaces and power management module, described RFID module adopts AS3992 to read
Write device chip, control for realizing the Signal coding to radiofrequency signal, modulation /demodulation and communication protocol, described MCU processor die
Block adopts the C8051F340 of Silicon Labs company, for completing the SECO of communication process and to data message stream
Simple process.
Preferably, described hardware encryption module is used for primary data information (pdi) is carried out with number after hardware encryption and decoding demodulation
According to the task such as deciphering, it is core that module adopts TF32A09 encryption chip.
Preferably, described Balun circuit is used for realizing the single-ended signal during emission of radio frequency signals receives and difference
The mutual conversion of signal.
Preferably, described directional coupler is used for building design radio frequency isolation circuit, this is because system design only uses
One antenna, the sending and receiving process and all must share an antenna, in order to prevent transmission signal and receipt signal of signal
Send crosstalk.
Preferably, described peripheral communication interfaces are used for realizing data communication, download program function.
Preferably, described power management module is then responsible for whole system and provides the working power being suitable for.
Preferably, described read write line realize step include following:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the mark in radiofrequency field
Sign data, then carry out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the mark in radiofrequency field
Sign data, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
(Three)Beneficial effect
The present invention adopts TF32A09 chip hardware cryptographic means, and the rsa encryption on the one hand solving the data to label is protected
Shield, greatly promotes the range of application under concerning security matters environment;On the other hand, decreased to rfid interrogator using hardware module encryption
The load of processor, decrease amount of calculation it is ensured that under massive dataflow signal intelligence system work robustness, entirely side
Case has the characteristics that good stability, low cost, practical, has very strong creativeness.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the system topology figure of the present invention;
Fig. 2 is the system topology figure of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is
The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
This programme solves the problems, such as the data information security of rfid system, whole scheme using the method for hardware encryption module
There is good stability, low cost, practical.
This programme includes RFID module, MCU, hardware encryption module, Balun circuit, directional coupler, peripheral communication interfaces
And power management module.System topology is as indicated with 1.
RFID module adopts AS3992 read write line chip, for realize to the Signal coding of radiofrequency signal, modulation /demodulation and
Communication protocol control etc..
MCU processor module adopts the C8051F340 of Silicon Labs company, for completing the sequential control of communication process
System and the simple process to data message stream.
Hardware encryption module is used for primary data information (pdi) is carried out with deciphering of hardware encryption and decoding data after demodulating etc.
Task, it is core that module adopts TF32A09 encryption chip
The single-ended signal that Balun circuit is used for realizing during emission of radio frequency signals receives is turned with the mutual of differential signal
Change.
Directional coupler is used for building design radio frequency isolation circuit, this is because system design only employs an antenna,
The the sending and receiving process and all must share an antenna, in order to prevent transmission signal and receipt signal from sending crosstalk of signal.
Peripheral communication interfaces are used for realizing the functions such as data communication, download program.
Power management module is then responsible for whole system and provides the working power being suitable for.
It is as follows that this programme realizes step:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the mark in radiofrequency field
Sign data, then carry out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the mark in radiofrequency field
Sign data, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
The design solves the problems, such as Information Security in RFID communication technology so that the security of system and reliability
Greatly improve., during being encrypted deciphering to data, MCU processor live load is little, traffic rate for the program simultaneously
The discriminance analysis that height can meet a large amount of labels simultaneously is processed.The feasibility of design and practical, can be in concerning security matters work
Make to be used widely in environment.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation are made a distinction with another entity or operation, and not necessarily require or imply these entities or deposit between operating
In any this actual relation or order.And, term " inclusion ", "comprising" or its any other variant are intended to
Comprising of nonexcludability, wants so that including a series of process of key elements, method, article or equipment and not only including those
Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment
Intrinsic key element.In the absence of more restrictions, the key element that limited by sentence "including a ..." it is not excluded that
Also there is other identical element including in the process of described key element, method, article or equipment.
Above example only in order to technical scheme to be described, is not intended to limit;Although with reference to the foregoing embodiments
The present invention has been described in detail, it will be understood by those within the art that:It still can be to aforementioned each enforcement
Technical scheme described in example is modified, or carries out equivalent to wherein some technical characteristics;And these modification or
Replace, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (7)
1. a kind of rfid interrogator based on hardware security encryption it is characterised in that:Including RFID module, MCU, hardware encryption mould
Block, Balun circuit, directional coupler, peripheral communication interfaces and power management module, described RFID module adopts AS3992 to read and write
Device chip, controls for realizing the Signal coding to radiofrequency signal, modulation /demodulation and communication protocol, described MCU processor module
Using the C8051F340 of Silicon Labs company, for completing SECO and the letter to data message stream of communication process
Single process.
2. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described hardware encryption
Module is used for primary data information (pdi) is carried out with the tasks such as the deciphering of hardware encryption and decoding data after demodulating, and module adopts
TF32A09 encryption chip is core.
3. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described Balun electricity
Road is used for realizing the mutual conversion of the single-ended signal during emission of radio frequency signals receives and differential signal.
4. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described directional couple
Device is used for building design radio frequency isolation circuit, this is because system design only employs an antenna, the sending and receiving of signal
Process all must share an antenna, in order to prevent transmission signal and receipt signal from sending crosstalk.
5. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described peripheral communications
Interface is used for realizing data communication, download program function.
6. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described power management
Module is then responsible for whole system and provides the working power being suitable for.
7. the rfid interrogator based on hardware security encryption according to claim 1 it is characterised in that:Described read write line is real
Existing step includes following:
Step one:System electrification completes to initialize, and single-chip microcomputer sends control instruction;
Step 2:Radio frequency chip identification control instruction signal decision instruction type, if read the number of tags in radiofrequency field
According to then carrying out step 4, otherwise continue executing with step 3;
Step 3:Radio frequency chip identification control instruction signal decision instruction type, if rewrite the number of tags in radiofrequency field
According to, then carry out step 7, otherwise return execution step two;
Step 4:Receive the data message comprising in electronic tag, and decoding task is demodulated to it;
Step 5:Decoded data message is delivered to TF32A09 encrypting module and carries out RSA decryption work;
Step 6:Data after deciphering is verified, completes this time to read tag operational flow process;
Step 7:Data is delivered to TF32A09 encrypting module and carries out rsa encryption;
Step 8:Data flow after encryption is delivered to RFID module and carries out coded modulation;
Step 9:The encryption label data to be changed by antenna transmitting, completes this time to rewrite tag operational flow process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610952584.1A CN106384139A (en) | 2016-11-02 | 2016-11-02 | RFID reader-writer based on hardware security encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610952584.1A CN106384139A (en) | 2016-11-02 | 2016-11-02 | RFID reader-writer based on hardware security encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106384139A true CN106384139A (en) | 2017-02-08 |
Family
ID=57957313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610952584.1A Pending CN106384139A (en) | 2016-11-02 | 2016-11-02 | RFID reader-writer based on hardware security encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106384139A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111160053A (en) * | 2020-03-03 | 2020-05-15 | 昆山华辰新材料科技有限公司 | Intelligent grinding wheel identification method and system based on RFID technology |
CN111709501A (en) * | 2020-06-16 | 2020-09-25 | 西安电子科技大学 | Encryption type RFID system applied in military field |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820342A (en) * | 2010-03-31 | 2010-09-01 | 北京飞天诚信科技有限公司 | Method for implementing hardware encryption engine |
CN104717220A (en) * | 2015-03-25 | 2015-06-17 | 江苏物联网研究发展中心 | Control signaling secure transmission method based on hardware encryption |
-
2016
- 2016-11-02 CN CN201610952584.1A patent/CN106384139A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820342A (en) * | 2010-03-31 | 2010-09-01 | 北京飞天诚信科技有限公司 | Method for implementing hardware encryption engine |
CN104717220A (en) * | 2015-03-25 | 2015-06-17 | 江苏物联网研究发展中心 | Control signaling secure transmission method based on hardware encryption |
Non-Patent Citations (2)
Title |
---|
赵梦军 等: "射频识别读写器的硬件设计", 《微型机与应用》 * |
陆兴华 等: "支持多频多格式的RFID智能卡阅读器设计", 《世界有色金属》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111160053A (en) * | 2020-03-03 | 2020-05-15 | 昆山华辰新材料科技有限公司 | Intelligent grinding wheel identification method and system based on RFID technology |
CN111709501A (en) * | 2020-06-16 | 2020-09-25 | 西安电子科技大学 | Encryption type RFID system applied in military field |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2690839B1 (en) | NFC apparatus capable to perform a contactless tag reading function | |
CN106022080B (en) | A kind of data ciphering method based on the cipher card of PCIe interface and the cipher card | |
CN103593687B (en) | Internet of Things intelligent management control cabinet system | |
CN106656999A (en) | Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment | |
Khan et al. | FSM based Manchester encoder for UHF RFID tag emulator | |
US8258918B1 (en) | RFID reader controllers limiting theft of confidential information | |
CN101122960A (en) | Method and device for enhancing active radio frequency identification system information safety and compatibility | |
CN103593688A (en) | Positioning beacon, electronic label system with positioning beacon and communication method | |
CN103281194A (en) | Safe and lightweight class RFID ownership transferring method based on bilinear pairings | |
CN111245783A (en) | Isolated environment data transmission device and method based on digital encryption technology | |
CN110427790A (en) | A kind of RFID device and the information processing method based on it | |
CN101976365B (en) | Safe radio frequency identification system | |
CN106384139A (en) | RFID reader-writer based on hardware security encryption | |
CN109391698A (en) | A kind of Internet of Things intelligent service system | |
CN101499142B (en) | Double-interface smart card and method for processing application instruction | |
CN101980309B (en) | Near field communication (NFC) mobile terminal and NFC safety payment realizing method | |
CN103077414A (en) | Passive RFID (Radio Frequency Identification Devices) electronic tag reader-writer with high reliability and UHF (Ultra High Frequency) and read write control method | |
CN108694344A (en) | A kind of cryptography electronic label | |
CN202309767U (en) | Middleware system for Internet of things | |
CN205334488U (en) | Support reading ware of multiple cipher mode | |
CN102236802B (en) | Multifunctional smart card reader-writer | |
EP3561666B1 (en) | Mobile device with access rights management | |
CN204463175U (en) | A kind of read-write equipment of radio frequency smart card | |
CN204904335U (en) | Logistics distribution system and equipment based on NFC | |
CN101329716B (en) | Novel electronic label read-write module built-in with safe processing chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170208 |
|
RJ01 | Rejection of invention patent application after publication |