CN108599958A - Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud - Google Patents
Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud Download PDFInfo
- Publication number
- CN108599958A CN108599958A CN201810362401.XA CN201810362401A CN108599958A CN 108599958 A CN108599958 A CN 108599958A CN 201810362401 A CN201810362401 A CN 201810362401A CN 108599958 A CN108599958 A CN 108599958A
- Authority
- CN
- China
- Prior art keywords
- label
- reader
- message
- owner
- new
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention proposes a kind of extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud database, mainly solves the problems, such as that existing label ownership transfer safety is poor.Its implementation is:Reader sends certification request to label;Label is to requests verification and sends feedback information, and reader is handled and is sent to cloud database;Cloud database lookup corresponding informance returns to reader, and reader sends checking request and new label owner relevant information to label;Label Verification reader and fresh information;Reader and new label owner switch label information;New label owner sends certification request to label;The new label owner of label Verification simultaneously sends feedback information;New label owner verifies label and sends fresh information;The new label owner of label Verification and storage and feedback-related information.The present invention improves safety and the efficiency of extra lightweight label ownership transfer, the radio frequency identification system that can be used for requiring with low cost.
Description
Technical field
The invention belongs to field of communication technology, more particularly to a kind of wireless radio frequency identification mark ownership transfer method can
Radio frequency identification system for being required with low cost.
Background technology
Radio RF recognition technology is also known as radio frequency identification technology, is a kind of non-contact automatic identification technology,
Automatic charging and the books in libraries classification and management etc. for being mainly used in logistics management, access control system, road and bridge are each
A aspect.Traditional radio frequency identification system includes mainly electronic tag, reader, background server three parts.
It is connected using wire channel between the background server and reader of conventional wireless radio frequency identification authentication scheme,
Although security of system is improved using this connection type, but the displacement volume of background data base is smaller and operation place is controlled
It is dumb.With the development of Internet of Things, article is increasingly managed by radio RF recognition technology, identifies and certification, this
Radio frequency identification system is required to need to support the application of big data and there are flexible reading conditions, so introducing cloud data
The traditional background server of library substitution, this can be solved the problems, such as by carrying out framework radio frequency identification system.Simultaneously because less radio-frequency
Identify that the remote ultra-traditional bar code of label cost, cost become the bottleneck of radio RF recognition technology popularization, and since it has
The characteristics of inexpensive low cost, so extra lightweight wireless radio frequency identification mark started to become hot spot in recent years.And label at
The logic gates of this and inside has a direct relationship, low cost also mean that superencipherment mode be it is unusable,
Influence safety.
In the existing ownership transfer agreement based on extra lightweight radio frequency identification, when most of certification, label is
The random number sent using reader is fed back, this just represents does not have initiative in authentication phase label, and opponent is attacking
Also it is easy to the legal owner's progress information stealth that disguises oneself as when hitting, so as to cause the leakage of information, while rank is stored in information
Section is required of all secret informations of reader stored tag, this will seriously affect the storage space of reader so as to cause drop
" the EPC that poor efficiency, such as Niu. et al. were delivered in 2016 in IEEE Transaction on Mobie Computing
It has been delivered in Gen2V2RFID Authentication and Ownership Management Protocol " a kind of ultralight
The ownership management agreement of magnitude wireless radio frequency identification mark, the program first proposed a kind of certification association after being initialized
View, protocol requirement label owner store all secret informations of label, and then reader sends authentication information to label,
The secret information of storage is hidden using the method for big random number exclusive or in this certification message, then sends information integration
To label, it is compared again with the information received after carrying out same treatment to itself storage information by label, it is backward by certification
Reader returns to a confirmation message, and reader verifies label according to the information that confirmation message is extracted.Pass through certification
Afterwards, reader sends ownership to label, then reader respectively to label send two containing secret information with it is identical random
Several message, label receive and solve random number according to an information therein after message, carry out operation to random number and with second
Message is compared, and confirms that errorless backward reader returns to the confirmation message for including secret key and random number, agreement terminates.This association
What view used is after sending information while to send an authentication information, ensures that no secret information can be directly acquired,
Communication uses new random number every time simultaneously, ensures freshness and safety using one-time pad.This radio frequency identification
In label ownership management scheme, label does not have any initiative, and the random number of reader transmission is completely dependent in the response stage
It is responded, not only easily leads to label and be easily subject to spoof attack, but also since scheme needs reader to store all labels
Secret information and often wheel information cause working efficiency to reduce all by the way of two certification message.
Invention content
It is an object of the invention to overcome the problems of the above-mentioned prior art, propose a kind of extra lightweight based on cloud without
Line RFID tag ownership transfer method improves the working efficiency of label ownership transfer to improve the initiative of label
And safety.
The technical scheme is that:Label information is stored in cloud database by reader, and authentication phase label will be certainly
It generates a random number and is then sent to reader for encrypting itself false identity;Reader is by the Kazakhstan of the label false identity received
Uncommon value is sent to cloud, the label information that cloud is stored as indexed search, if search is less than returning to error message, if search
To corresponding information, then corresponding information is sent to reader, specific implementation step includes as follows
(1) data initialization:
The secret key K of reader R will be used after tag identity ID, label information info, the K cascades of label secret keyREncryption storage
In cloud database, label T false identities TID is stored in as index in cloud database in the form of H (TID), by reader
Communication secret key K between cloudRC, label false identity TID is stored in cloud database C, and wherein H () represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID, random number generator seed k1
Storage is in the label;
Reader identity RID, new label owner identity RID', reader and new label owner are shared into secret key KRR'、
Communication secret key K between reader and cloudRCIt is stored in reader;
Reader identity RID, new label owner identity RID' and reader and new label owner are shared into secret key KRR'
It is stored in new label owner;
(2) reader generates the first random number N of reader1With reader first message
It is sent to label, design PRNG random number generators generate label the first random number PRNG (k after label determines its legitimacy1),
Regenerate label first message T1With label second message T2Reader is returned to, wherein:
{ } indicates one group of letter
Breath,Indicate that exclusive or is handled, | | indicate that message cascade, cro () indicate to carry out operation of confusion, per () expressions pair to information
Information carries out in-place computation, and PRNG () indicates to carry out non-linear stochastic number generation processing to seed data;
(3) reader obtains label false identity TID by two strip label message, calculates its cryptographic Hash H (TID), generation is read
Read the second random number N of device2Afterwards, reader second message is regeneratedIt is sent to cloud database, cloud
Database generates cloud messageReader is returned to, whereinIt represents and uses
Operation is encrypted in shared secret key pair information between reader and cloud;
(4) reader obtains K, ID, info of label by cloud message, starts ownership request stage, generates reader
Third random number N3With a communication secret key S, union generates four message R of reader3R4R5R6It is sent to label, wherein:
Reader third messageThe 4th message of readerIt reads
The 5th message of deviceThe 6th message of reader
(5) R that label passes through reader3R4R5R6This four message obtain reader third random number N3, communication secret key S it is new
With label owner identity RID', design PRNG random number generators generate label the second random number PRNG (k2) after, regeneration
Label third messageWith label Verification messageIt sends
To reader, ownership transfer request stage is completed;
(6) reader generates the 4th random number N of reader4, according to the 4th random number N4Generate the 7th message of readerIt is sent to new label owner, after new label owner confirms its legitimacy
Message Authentication Code MAC is generated according to the 7th message of reader, regenerates reader verification informationIt feeds
Reader, reader are left the theatre, whereinIt represents and is carried out using the proprietary shared secret key pair information of reader and new label
Encryption;
(7) new label owner generates new the first random number of label owner n1Afterwards, new label owner first is regenerated
MessageIt is sent to label, label confirms that the new proprietary legitimacy of label, design PRNG are random
Number generator generates label third machine number PRNG (k3) after, regenerate label third message
And the 4th message of labelIt is sent to new label owner;
(8) new label owner is according to T3And T4This two strip labels message authentication label legitimacy, generates new label owner
Second random number n2, after new label key K' and new label false identity TID', regenerate three new label owner's message r2r3r4
It is sent to label, tag update stores information, and design PRNG random number generators generate the 4th random number PRNG (k of label4) after,
Regenerate two strip label message T4T5New label owner is fed back to, ownership transfer is completed, wherein:New label owner second
MessageNew label owner's third messageNew label owner the 4thThe 4th Messages Message of labelThe 5th message of label
The present invention compared with prior art, has the following advantages that:
First, the present invention generates label random number by designing PRNG random number generators, and extra lightweight label is made also to have
There is the ability for generating random number.
Second, the present invention replaces traditional database using cloud database, keeps the carry out of certification more convenient, and subtract significantly
The small consumption to reader storage space, improves reader utilization rate and working efficiency.
Third, the present invention are sent after information is encrypted in all sentences, and ensureing all information all has well
Confidentiality, even if opponent intercept and capture can not get any useful information, ensure that the safety of information.
4th, the operation method used in of the invention is extra lightweight operation method, is greatly reduced label and reads
The computational burden for reading device, substantially increases operation efficiency.
Description of the drawings
Fig. 1 is the implementation flow chart of extra lightweight label ownership transfer method of the present invention;
Fig. 2 is the cro operation of confusion sub-process figures in the present invention;
Fig. 3 is the per in-place computation sub-process figures in the present invention;
Fig. 4 is the sub-process figure of the design PRNG random number generators in the present invention.
Specific implementation mode
Below in conjunction with the accompanying drawings, present invention is further described in detail.
Referring to Fig.1, steps are as follows for realization of the invention:
Step 1, data initialization.
The purpose of data initialization is in order to which institute's information in need is stored in advance in designated equipment, and specific implementation step is such as
Under:
Label secret key K, setting reader secret key K 1a) are setR, the communication secret key between reader and cloud database is set
KRC;
1b) by 1a) key of setting and label, reader are included stores for information about:
Itself and tag identity ID, label information info and label secret key K are cascaded, reader secret key K is usedRTo fortune
It calculates after result is encrypted and is stored in cloud database;
Hash function processing is carried out to label false identity TID, result H (TID) is stored in cloud as index by treated
In database C;
By the communication secret key K between reader and cloud databaseRCWith label false identity TID there are in cloud database, wherein H
() represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID and random number generator seed
k1It is stored in label T;
By the communication secret key between reader identity RID, new label owner identity RID' and reader and cloud database
KRCIt is stored in reader R;
Reader identity RID, new label owner identity RID' are stored in new label owner R'.
Step 2, reader sends certification request to label.
(2a) reader generates the first random number of reader of 32bits using random digit generation method ANSI X9.17:
(2a1) chooses current time date DTiAs the input of random digit generation method ANSI X9.17, random selected kind
Sub- Vi, self-defined 56-bits encryption secret keys s;
The overall process of (2a2) cryptographic calculation is encrypted including triple des three times, first by Time of Day DTiWith seed ViIt carries out
XOR operation result is carried out triple des cryptographic calculation with encryption secret key s and obtains output R by XOR operationi, by Time of Day DTi
And RiTriple des cryptographic calculation is carried out with encryption secret key s again after carrying out XOR operation, obtains new Vi+1As ultimately generate
Random number;
Identity information and the first random number of reader are carried out cro operation of confusion by (2b),
With reference to Fig. 2, the processing step of cro operation of confusion is as follows:
(2b1) inputs the Bit String of identity information and two 32-bits of the first random number of reader;
(2b2) takes the bit of the 1st, 3,5 etc. odd positions of identity information total 16 and the first random number of reader
The bit of 2nd, 4,6 etc. even numbers positions is 16 total, with the bit combination of taking-up at 32 new Bit String, as
Cro operation of confusion is put as a result, wherein selecting the bit come according to the position in former Bit String;
(2c) reader is by result and the first random number N of reader after operation of confusion1Cascade obtains reader first and disappears
Cease R1, by R1It is sent to label, wherein{ } indicates a group information,Indicate different
Or processing, | | indicate message cascade.
Step 3, label responds the request of reader.
(3a) label receives reader first message R1Afterwards, the first random number N of reader is directly read1, to itself storage
Owner's identity carries out the identical operation of confusion with step (2b) and handles, and the operation of confusion result and R that will be obtained1Compared
It is right:
If the two result is consistent, certification reader first message R1For legitimate messages, execute (3b);
If the two result is inconsistent, label thinks reader first message R1For illegal message, communication is terminated;
(3b) label uses initial seed k1Generate label the first random number PRNG (k1):
With reference to Fig. 4, PRNG random number generators generate random number, and steps are as follows:
(3b1) is by initial seed k1It is sequentially inputted in linear feedback shift register in a manner of from 1 to 32, uses one
The primitive polynomial y=x that a number is 3232+x18+x17+ x+1 is to initial seed k1It is iterated processing, generates one every time newly
Number and by new numerical order input linear feedback shift register, while deleting last position and obtaining ki+1;
(3b2) 32-bit number in current linear feedback shift register is input in Boolean function filter carry out it is non-
Linear process obtains one-bit digital;
Above (3b1) and (3b2) two step is carried out continuously 32 times by (3b3), obtains 32 outputs, and as PRNG random numbers are given birth to
The final output grown up to be a useful person, the final output are the random number that label generates;
(3c) label generates two tag messages to reader:
(3c1) label is by the first random number PRNG (k of reader identity RID and oneself1) carry out XOR operation after, then with
Reader identity RID carries out per in-place computations,
With reference to Fig. 3, per in-place computations comprise the concrete steps that:If two isometric input bit strings are x, y, by 1 place in x
Then position ordinal number where 0 is arranged by sequence from big to small, is obtained by being arranged from small to large by position ordinal number
One new position ordinal number calendar, then the bit in y is rearranged according to this new position ordinal number calendar, it is raw
At label first message
(3c2) label is to the first random number N of reader1And the first random number PRNG (k of oneself1), false identity TID carries out
XOR operation generates label second message
(3c3) label is by the first message T of oneself1With second message T2It is sent to reader.
Step 4, reader is obtained to cloud database transmission data and is asked.
(4a) reader is to the label first message T that receives1Inverse per in-place computations are carried out, the first random number of label is obtained
PRNG(k1), reuse own identification RID and label the first random number PRNG (k1) and label first message T1Carry out XOR operation
Obtain label false identity TID;
Identical method generates the second random number N of reader to the use of (4b) reader with step (2a)2, while to label
False identity TID carries out Hash operation, obtains its cryptographic Hash H (TID):
(4b1) inserts 128 label false identity information, and 1 is filled at the 129th, fills 318 0 later, makes entire number
Row length is 512, and ensures that entire ordered series of numbers result after the processing of mould 512 is 448;
(4b2) arbitrarily chooses 64 bits, it is indicated the length before message is filled in a manner of little-endian,
It is stored in highest address by highest 64, most end is stored in lowest address, this 512 bit message is divided into 16 in order
The string of 32 bits;
(4b3) initializes program internal module, and intermediate result and final Kazakhstan are stored with the buffering area of 128 bit longs
It wishes as a result, being expressed as the register (A, B, C, D) of 4 32 bit longs with buffering area, each register is with little-endian
Mode stores data, and initial value is taken as A=01234567, B=89ABCDEF, C=FEDCBA98, D=76543210;
(4b4) uses compression function HMD5Compression processing is carried out to 16 32 Bit Strings successively, obtained operation result is to breathe out
Uncommon value H (TID);
(4c) reader is by its second random number N2Cascaded with the cryptographic Hash of label false identity, and using reader and
Communication secret key K between cloud databaseRCRC4 encryptions are carried out to result after cascade:
(4c1) sets the length of key core S-box as 128, and communication key length is 128, uses key-
Scheduling algorithms carry out the byte sequence in the S-box of initialization key core;
(4c2) is handled key core S-box and communication key using pseudorandom password generating algorithm, is obtained
To sub-key sequence, sub-key sequence and plaintext are subjected to XOR operation, obtain encrypted result;
(4d) reader is by the second random number N of encrypted result and reader2It is cascaded to obtain reader second messageAnd it is sent to cloud database.
Step 5, cloud database feeds back requested information to reader.
(5a1) cloud database root is according to reader second message R2Directly read the second random number N of reader2, then to reading
Operation is decrypted in device second message, obtains the second random number N of reader2, the N that will obtain at this time2With directly read second with
Machine number N2It is compared:
If comparison result is inconsistent, description messages are tampered, and cloud database generates warning message warning, and terminates
This communication;
If comparison result is consistent, step (5a2) is carried out;
(5a2) cloud database is scanned for using the index value of acquisition:
For not searching corresponding storage element, then cloud database side generates an error message and returns to reader
And terminate to communicate, reader believes that the label communicated before is illegal label after receiving error message;
For searching corresponding storage element, then by the label false identity TID of storage, other storage informationWith the second random number N of reader2It is cascaded, is then used symmetrical between cloud database and reader
Communication secret key is encrypted, and obtains cloud database messageAnd it is sent to reading
Device.
Step 6, reader sends ownership transfer request to label.
(6a) reader is by the label false identity received in cloud database message M and the label false identity that receives from tab end
It is compared:
If comparison result is inconsistent, reader assert that the data of cloud database side are invaded, distorted or damaged;
If comparison result is consistent, the identity ID of reader stored tag, these are secret by label key K, label information info
Confidential information, and execute step (6b);
(6b) reader generates reader third random number N3With communication secret key S:
Reader use with step (2a) and step (4b) identical random digit generation method generate reader third with
Machine number N3
Reader will carry out XOR operation by label key K and arbitrarily with random number isometric label key K, be communicated
Secret key S;
(6c) reader generates four reader information and sendings to label:
Reader is by the first random number of label, reader third random number N3XOR operation is carried out with label key K, is generated
Reader third message
Reader is by the third random number N of oneself3Exclusive or is carried out with tag identity, then by XOR operation result and label
Identity carries out per in-place computations, obtains the 4th message of reader
Label key K and communication key S is carried out XOR operation by reader, and by the third of XOR operation result and oneself
Random number N3Per in-place computations are carried out, the 5th message of reader is obtained
Oneself identity and new label owner identity are carried out XOR operation by reader, and by operation result and communication key
S carries out per in-place computations, obtains the 6th message of reader
Reader is by the third message R of oneself3, the 4th message R4, the 5th message R5With the 6th message R6It is sent to label.
Step 7, fresh information is stored after smart-tag authentication reader and returns to confirmation message.
In (7a) smart-tag authentication reader stage, label is by the first random number of label, label key K and reader third message
R3XOR operation is carried out, reader third random number N is obtained3, use reader third random number N3It is first carried out with own identification different
Or operation, then XOR operation result and own identification are subjected to per in-place computations, then by in-place computation result and reader the
Four message R4It is compared:
If comparison result is consistent, label assert that sender is legal, continues step (7b);
If comparison result is inconsistent, label assert that sender is illegal, terminates communication;
(7b) tag memory fresh information:
Label uses reader third random number N3To the 5th message R of reader5Inverse per in-place computations are carried out, displacement is transported
It calculates result and carries out XOR operation with label key K, obtain communication key S and store;
Label is using communication key S to the 6th message R of reader6Carry out inverse per in-place computations, then by in-place computation result
New label owner identity RID' is obtained with reader identity progress exclusive or and is stored;
(7c) label returns to confirmation message to reader:
The use of (7c1) label and identical random digit generation method in step (3b), use seed k2Generate label second
Random number PRNG (k2);
(7c2) label sends two strip label message to reader:
Label is by the second random number PRNG (k of oneself2), communication secret key S and reader third random number N3Carry out exclusive or fortune
It calculates, generates label third message
Label by the new label owner identity RID' received and communication secret key S respectively with the second random number of label PRNG
(k2) XOR operation is carried out, two XOR operation results, which are then carried out per in-place computations, generates label Verification message
Label is by label third message T3With label Verification message T4It is sent to reader.
Step 8, reader confirms that label has successfully received fresh information.
Reader receives label third message T3Afterwards, by its with communicate secret key S, reader third random number N3Do exclusive or fortune
Calculation obtains label the second random number PRNG (k2), then by new label owner identity RID' and communication secret key S respectively with label the
Two random number PRNG (k2) XOR operation is carried out, finally again by result and label Verification message T4It is compared:
If comparing result is consistent, care label correctly obtained the proprietary identity of new label and with new label
Proprietary communication secret key, reader then proceed by step 9;
If comparing result is inconsistent, care label does not receive correct information, then reader will re-start related letter
The transmission and verification of breath.
Step 9, reader confirms that new label owner receives label information.
(9a) reader sends label information to new label owner:
Identical random digit generation method generates reading with step (2a), step (4b) and step (6b) for reader use
The 4th random number N of device4;
Reader is by the identity RID of oneself, label false identity TID, tag identity ID, label information info, communication key S
With the 4th random number N of reader4After being cascaded, the communication secret key K between reader and new label owner is usedRR'With with
Operation is encrypted to cascade result in identical encryption method in step (4c), generates the 7th message of readerAnd the 7th message is sent to new label owner;
(9b) new label owner directly reads the 4th random number N of reader4, then the 7th message of reader is solved
It is close, and the reader identity obtained after decryption is compared with the reader identity of storage:
If comparison result is inconsistent, new label owner qualified information sender is illegal, terminates communication;
If comparison result is consistent, new label owner qualified information sender is legal, stores the label for including in information
Information simultaneously carries out step (9c);
(9c) new label owner by the secret information use received with step (4b) identical Hash operation method into
Row operation obtains Message Authentication Code MAC, by Message Authentication Code MAC and the 4th random number N of reader received4After being cascaded,
Reuse the communication secret key K between reader and new label ownerRR' with with identical cipher mode in step (4c) to grade
It is coupled fruit to be encrypted, obtains reader and verify messageAnd the verification message is sent to reading
Device;
(9d) reader receives reader verification message r1Afterwards, the corresponding information for being included to MAC is verified:
If the MAC received is incorrect, the new label owner of reader identification is not properly received label information, reads
Device will retransmit label information;
If the MAC received is correct, the new label owner of reader identification correctly received the corresponding information of label,
Reader is left the theatre.
Step 10, ownership transfer.
New label owner use and generating random number side in step (2a), step (4b), step (6b) and step (8a)
The identical method of method generates the new proprietary first random number n of label1, and by new the first random number of label owner n1With itself
Identity carries out exclusive or processing, by XOR operation result and own identification carry out after cro operation of confusion again with new label owner the
One random number n1Cascade, obtains new label owner first messageAnd by owner first
Message is sent to label;
Step 11, new label owner verifies label.
(11a) label receives new label owner first message r1Afterwards, new the first random number of label owner is directly read
n1, after new label owner identity and its of storage are carried out cro operation of confusion, with the new label owner first message received
r1It is compared:
If comparison result is consistent, label believes that sender is legal, is carried out at the same time step (11b);
If comparison result is inconsistent, label thinks that message sender is illegal, and label terminates communication;
(11b) label sends two message to new label owner:
The use of (11b1) label and identical random digit generation method in step (3b), step (7c1) generate label third
Random number PRNG (k3);
(11b2) label is by new label owner identity and label third random number PRNG (k3) carry out XOR operation after again
Per in-place computations, which are carried out, with new label owner identity generates label third message
Own identification, label third random number are carried out XOR operation generation by (11b3) label with new label owner identity
The 4th message of label
(11b4) label is by the third message T of oneself3With the 4th message T of oneself4It is sent to new label owner;
After (11c) new label owner receives the third and fourth message of label, per displacement fortune is carried out to label third message
It calculates, obtains label the second random number PRNG (k2), label the second random number PRNG (k that new label owner will receive2), itself
The 4th message T of identity RID' and label4XOR operation is done, obtains label false identity TID, and carry out with the label false identity of storage
It compares:
If comparison result is inconsistent, new label owner assert that label is illegal, and new label owner reports an error to reader
And the communication of termination and label;
If comparison result is consistent, new label owner assert that label is legal, stored tag the second random number PRNG (k2)
Afterwards, step 12 is carried out;
Step 12, information update is carried out to label.
(12a) new label owner use and phase in step (2a), step (4b), step (6b), step (8a) and step 9
Same random digit generation method, generates new the second random number of label owner n2;
(12b) new label owner generates the newer label information of labeling requirement:
(12b1) new label owner randomly selects a random number isometric with communication key, is carried out with communication key different
Or operation, obtain new label key K';
(12b2) new label owner randomly selects a random number isometric with label false identity, with label false identity into
Row XOR operation obtains new label false identity TID';
(12c) new label owner sends three new label owner's message to label:
New label owner is by label the second random number PRNG (k2), new label key K' and new label owner second with
Machine number n2It carries out XOR operation and obtains new label owner second message
After new label key K' and communication key S are carried out exclusive or by new label owner, with new label owner second with
Machine number n2It carries out per in-place computations and generates new label owner third message
After label false identity and new label false identity are carried out XOR operation by new label owner, with new traffic secret key K' into
Row per in-place computations generate new the 4th message of label owner
The second message of oneself, third message and the 4th message are sent to label by new label owner;
(12d) tag update information simultaneously deletes reader information
(12d1) label receives new label owner second message and PRNG (k after information2) XOR operation is carried out, it obtains
New label the second random number of owner n2, then use new the second random number of label owner n2Disappear to new label owner third
Breath carries out inverse per in-place computations, then result is carried out XOR operation with secret key S is communicated, and obtains new traffic secret key K' and stores;
(12d2) label carries out anti-per in-place computations using new traffic secret key K' to new the 4th message of label owner, then
In-place computation result and itself false identity are subjected to XOR operation, new label false identity TID' is obtained and stores;
(12d3) label deletes original label false identity TID and communication secret key K.
Step 13, label sends update to new label owner and completes confirmation message.
The use of (13a) label and identical random digit generation method in step (3b), step (7c1), with k3It is given birth to for seed
At label third random number PRNG (k3);
(13b) label generates two strip label message and is sent to new label owner:
Label is by label third random number PRNG (k3), new label secret key K' and new the second random number of label owner n2Into
Row XOR operation obtains the 5th message of label
Label by new label false identity TID' respectively with new label key K', label third random number PRNG (k3) carry out it is different
Or operation, and the result of the two XOR operation is subjected to per in-place computations, obtain the 6th message of label
Label is by the 5th message T of oneself5With the 6th message T6It is sent to new label owner.
Step 14, new label owner confirms label information update status.
(14a) new label owner is by the 5th message T of label5, new label key K' and new label owner second it is random
Number n2XOR operation is carried out, operation obtains label third random number PRNG (k3);
(14b) new label owner is by label third random number PRNG (k3) respectively with new label false identity TID' and newly
Label key K' carries out XOR operation, then carries out per in-place computations to two XOR operation results, and by per in-place computations
As a result it is compared with the 6th message of label:
If comparison result is inconsistent, new label owner assert that label is not properly received fresh information, new label institute
Someone will send update request to label again;
If comparison result is consistent, new label owner assert that label correctly received fresh information and succeed more
Newly, ownership transfer success, sign off.
Above description is only example of the present invention, does not constitute any limitation of the invention, it is clear that for
It, all may be without departing substantially from the principle of the invention, knot after having understood present disclosure and principle for one of skill in the art
In the case of structure, various modifications in form and details and change are carried out, but these amendments based on inventive concept and change
Become still within the claims of the present invention.
Claims (9)
1. a kind of extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud database, includes the following steps:
(1) data initialization:
The secret key K of reader R will be used after tag identity ID, label information info, the K cascades of label secret keyREncryption is stored in cloud number
According in library, label T false identities TID is stored in as index in cloud database in the form of H (TID), by reader and cloud it
Between communication secret key KRC, label false identity TID is stored in cloud database C, and wherein H () represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID, random number generator seed k1Storage
In the label;
Reader identity RID, new label owner identity RID', reader and new label owner are shared into secret key KRR', read
Communication secret key K between device and cloudRCIt is stored in reader;
Reader identity RID, new label owner identity RID' and reader and new label owner are shared into secret key KRR'Storage
In new label owner;
(2) reader generates the first random number N of reader1With reader first messageHair
Label is given, design PRNG random number generators generate label the first random number PRNG (k after label determines its legitimacy1), then
Generate label first message T1With label second message T2Reader is returned to, wherein:
{ } indicates a group information,
Indicate exclusive or processing, | | indicate message cascade, cro () indicate to information carry out operation of confusion, per () indicate to information into
Line replacement operation, PRNG () indicate to carry out non-linear stochastic number generation processing to seed data;
(3) reader obtains label false identity TID by two strip label message, calculates its cryptographic Hash H (TID), generates reader
Second random number N2Afterwards, reader second message is regeneratedIt is sent to cloud database, cloud data
Library generates cloud messageReader is returned to, whereinIt represents using reading
Operation is encrypted in shared secret key pair information between device and cloud;
(4) reader obtains K, ID, info of label by cloud message, starts ownership request stage, generates reader third
Random number N3With a communication secret key S, union generates four message R of reader3R4R5R6It is sent to label, wherein:It reads
Device third messageThe 4th message of readerReader
Five messageThe 6th message of reader
(5) R that label passes through reader3R4R5R6This four message obtain reader third random number N3, communication secret key S is new and mark
Owner identity RID' is signed, design PRNG random number generators generate label the second random number PRNG (k2) after, regenerate label
Third messageWith label Verification messageHair
Reader is given, ownership transfer request stage is completed;
(6) reader generates the 4th random number N of reader4, according to the 4th random number N4Generate the 7th message of readerIt is sent to new label owner, new label owner confirms its legitimacy
Message Authentication Code MAC is generated according to the 7th message of reader afterwards, regenerates reader verification informationFeedback
To reader, reader is left the theatre, whereinRepresent using reader and the proprietary shared secret key pair information of new label into
Row encryption;
(7) new label owner generates new the first random number of label owner n1Afterwards, new label owner first message is regeneratedIt is sent to label, label confirms the new proprietary legitimacy of label, designs PRNG random numbers
Generator generates label third machine number PRNG (k3) after, regenerate label third messageAnd the 4th message of labelIt is sent to new mark
Sign owner;
(8) new label owner is according to T3And T4This two strip labels message authentication label legitimacy, generates new label owner second
Random number n2, after new label key K' and new label false identity TID', regenerate three new label owner's message r2r3r4It sends
To label, tag update stores information, and design PRNG random number generators generate the 4th random number PRNG (k of label4) after, regeneration
At two strip label message T4T5New label owner is fed back to, ownership transfer is completed, wherein:New label owner's second messageNew label owner's third messageNew label owner the 4thThe 4th Messages Message of labelThe 5th message of label
2. according to the method described in claim 1, wherein PRNG generating random numbers are designed in step (2), (5), (7) in (8)
Device realizes that steps are as follows:
First, by initial seed k1It sequentially inputs in linear feedback shift register, uses one time in a manner of from 1 to 32
The primitive polynomial y=x that number is 3232+x18+x17+ x+1 is to initial seed k1It is iterated processing, generates a new number every time
And by new numerical order input linear feedback shift register, while deleting last position;
Then, non-linear place will be carried out in the 32-bit number input Boolean function filter at this moment linear feedback shift register
Reason, obtains one-bit digital:
Finally, above two step is carried out continuously 32 times, obtains 32 outputs, as the final output knot of PRNG random number generators
Fruit, the random number that the final output, that is, label generates.
3. according to the method described in claim 1, label confirms the legitimacy of reader identity wherein in step (2), realizes
Steps are as follows:
(2a) label is from reader first message R1Directly read the first random number N of reader1, by the reading of itself and itself storage
Device identity carries out XOR operation, and the reader identity information of operation result and itself storage is carried out cro operation of confusion;
(2b) is by the result of operation of confusion and the reader first message R that receives1It is compared:
If comparison result is consistent, label assert that reader is legal reader, continues to communicate;
If comparison result is inconsistent, label assert that reader is illegal reader, without responding and terminating communication.
4. according to the method described in claim 1, reader generates communication key S wherein in step (4), is first to randomly select
One random number N identical with label key K bit length, then this random number and label key K are subjected to XOR operation, operation
The result obtained afterwards is communication key
5. according to the method described in claim 1, four message R that wherein label passes through reader in step (5)3R4R5R6It obtains
Obtain new label owner identity RID', reader third random number N3With communication secret key S, realize that steps are as follows:
(5a) label is by label the first random number PRNG (k1), label key K and reader third message R3XOR operation is carried out,
Obtain reader third random number N3;
(5b) label is by the reader third random number N of acquisition3Per in-place computations are carried out with the identity ID of oneself, and displacement is tied
Fruit and the 4th message R of reader4It is compared:
If the two result is identical, label determines that the reader message received is not tampered with, and label continues step (5c);
If the two result is different, label determines that the reader message received has been tampered with, and label terminates communication;
(5c) label is according to the reader third random number N obtained in step (5b)3, to the 5th message R of reader5Carry out inverse per
In-place computation, and by the operation resultXOR operation is carried out with label key, obtains communication key S;
(5d) label is according to communication key S, to the 6th message R of reader6Carry out inverse per in-place computations, and by the operation resultXOR operation is carried out with reader identity RID, obtains new label owner identity RID'.
6. according to the method described in claim 1, new label owner is according to the 7th message R of reader wherein in step (6)7
Message Authentication Code MAC is generated, realizes that steps are as follows:
(6a) new label owner is from the 7th message R of reader7It directly reads and reads the 4th random number N4;
(6b) new label owner uses the shared secret key K of reader and oneselfRR'To the 7th message R of reader7It is decrypted, obtains
To reader identity RID, label false identity TID, tag identity ID, label relevant information info, communication key S and reading the 4th
Random number N4
The reader identity obtained after decryption is compared (6c) new label owner with the reader identity stored:
If comparison result is consistent, new label owner determines that the 7th informed source of reader is legal, continues step (6d);
If comparison result is inconsistent, new label owner determines that the 7th informed source of reader is illegal, terminates communication;
(6d) new label owner by after decryption the 4th random number of reader and the reader that is directly read from step (6a)
4th random number is compared:
If the two is consistent, new label owner determines the 7th message R of reader7It is not tampered with, and stored tag false identity
TID, tag identity ID, label relevant information info, communication key S and the 4th random number N of reading4, continue step (6d);
If the two is inconsistent, new label owner determines that the 7th message of reader is tampered, and error message is returned to reader
error;
(6e) new label owner carries out label false identity TID, tag identity ID, label relevant information info, communication key S
After cascade, Hash operation is carried out to it and obtains result to be Message Authentication Code MAC.
7. according to the method described in claim 1, wherein label confirms the legal of new label owner identity in step (7)
Property, realize that steps are as follows:
(7a) label is from reader first message r1Directly read the first random number of reader n1, by the reading of itself and itself storage
Device identity carries out XOR operation, and the reader identity information of operation result and itself storage is carried out cro operation of confusion;
(7b) label is by the result of operation of confusion and the reader first message r that receives1It is compared:
If comparison result is consistent, label assert that new label owner is legal, continues to communicate;
If comparison result is inconsistent, label assert that new label owner is illegal, without responding and terminating communication.
8. according to the method described in claim 1, new label owner is according to T wherein in step (8)3And T4This two strip label
Message authentication label legitimacy realizes that steps are as follows:
(8a) new label owner is using own identification RID' to label third message T3Inverse per in-place computations are carried out, label is obtained
Third random number PRNG (k3);
(8b) new label owner is by own identification RID', label third random number PRNG (k3) and the 4th message T of label4It carries out
XOR operation obtains label false identity, and obtained label false identity is compared with the label false identity of storage:
If the two is consistent, then it is assumed that tag identity is legal, continues to communicate;
If the two is inconsistent, then it is assumed that tag identity is illegal and terminates communication.
9. according to the method described in claim 1, tag update stores information wherein in step (8), realizes that steps are as follows:
(9a) label is by the 4th random number PRNG (k of label4), communication key S and new label owner second message r2Carry out exclusive or
Operation obtains as new the second random number of label owner n2;
(9b) label uses new the second random number of label owner n2To new label owner third message r3Inverse per is carried out to replace
Operation, then the operation result and communication key S are subjected to XOR operation, it obtains new label key K " and stores;
(9c) label is using new label key K " to new the 4th message r of label owner4Carry out inverse per in-place computations, then by the fortune
It calculates result and carries out XOR operation with itself false identity TID, obtain new label false identity TID' and store;
(9d) label deletes label false identity TID, the label secret key K stored when initialization and and reading device identity RID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362401.XA CN108599958B (en) | 2018-04-20 | 2018-04-20 | Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362401.XA CN108599958B (en) | 2018-04-20 | 2018-04-20 | Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108599958A true CN108599958A (en) | 2018-09-28 |
CN108599958B CN108599958B (en) | 2021-07-27 |
Family
ID=63613838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810362401.XA Active CN108599958B (en) | 2018-04-20 | 2018-04-20 | Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108599958B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110190966A (en) * | 2019-05-17 | 2019-08-30 | 西安电子科技大学 | A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage |
CN111615108A (en) * | 2020-04-12 | 2020-09-01 | 西安电子科技大学 | Radio frequency identification data security authentication method, system, storage medium and terminal |
CN113726777A (en) * | 2021-08-30 | 2021-11-30 | 浙江工商大学 | Electronic tag ownership transfer method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114270A1 (en) * | 2003-11-21 | 2005-05-26 | International Business Machines Corporation | Merchandise-integral transaction receipt and auditable product ownership trail |
CN103281194A (en) * | 2013-06-15 | 2013-09-04 | 杨涛 | Safe and lightweight class RFID ownership transferring method based on bilinear pairings |
CN103701785A (en) * | 2013-12-13 | 2014-04-02 | 天津大学 | Ownership transfer and key array-based RFID (radio frequency identification) security authentication method |
CN105100112A (en) * | 2015-08-25 | 2015-11-25 | 西安电子科技大学 | Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method |
CN106066975A (en) * | 2016-05-30 | 2016-11-02 | 广东工业大学 | A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic |
CN106712927A (en) * | 2016-11-30 | 2017-05-24 | 广东工业大学 | Super lightweight group RFID label ownership transfer method based on word synthesis operation |
-
2018
- 2018-04-20 CN CN201810362401.XA patent/CN108599958B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114270A1 (en) * | 2003-11-21 | 2005-05-26 | International Business Machines Corporation | Merchandise-integral transaction receipt and auditable product ownership trail |
CN103281194A (en) * | 2013-06-15 | 2013-09-04 | 杨涛 | Safe and lightweight class RFID ownership transferring method based on bilinear pairings |
CN103701785A (en) * | 2013-12-13 | 2014-04-02 | 天津大学 | Ownership transfer and key array-based RFID (radio frequency identification) security authentication method |
CN105100112A (en) * | 2015-08-25 | 2015-11-25 | 西安电子科技大学 | Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method |
CN106066975A (en) * | 2016-05-30 | 2016-11-02 | 广东工业大学 | A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic |
CN106712927A (en) * | 2016-11-30 | 2017-05-24 | 广东工业大学 | Super lightweight group RFID label ownership transfer method based on word synthesis operation |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110190966A (en) * | 2019-05-17 | 2019-08-30 | 西安电子科技大学 | A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage |
CN111615108A (en) * | 2020-04-12 | 2020-09-01 | 西安电子科技大学 | Radio frequency identification data security authentication method, system, storage medium and terminal |
CN113726777A (en) * | 2021-08-30 | 2021-11-30 | 浙江工商大学 | Electronic tag ownership transfer method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108599958B (en) | 2021-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4477616B2 (en) | Signature system and signature method | |
KR101360696B1 (en) | Non-networked rfid-puf authentication | |
CN105530263B (en) | A kind of extra lightweight RFID mutual authentication methods based on tag ID | |
CN103905202B (en) | A kind of RFID lightweight mutual authentication methods based on PUF | |
TWI463857B (en) | Weight authentication and secret retrieval | |
US20200106600A1 (en) | Progressive key encryption algorithm | |
CN110752919B (en) | Two-party authentication and session key exchange method based on BST-PUF | |
US20090083833A1 (en) | Authentication with physical unclonable functions | |
CN104112106B (en) | A kind of RFID light-weight authentication method unclonable based on physics | |
US20190140819A1 (en) | System and method for mekle puzzles symeteric key establishment and generation of lamport merkle signatures | |
Oren et al. | A low-resource public-key identification scheme for RFID tags and sensor nodes | |
CN109756893A (en) | A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps | |
CN107911354B (en) | Composite parallel data encryption method | |
CN112637161B (en) | Data transmission method and storage medium | |
CN109274485B (en) | Data encryption method, data authentication method, related equipment and system | |
TWI398153B (en) | Certification methods, authentication systems and electronic tags | |
CN102640448A (en) | System and method for securely identifying and authenticating devices in a symmetric encryption system | |
CN108599958A (en) | Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
CN113378148A (en) | Internet of things equipment identity authentication system and method based on block chain | |
CN111931533B (en) | Authentication method for multi-owner RFID tag | |
CN113114475A (en) | PUF identity authentication system and protocol based on bit self-checking | |
CN113259116A (en) | Sensor data uplink method and system based on aggregated signature | |
CN116108410A (en) | Identity credential generation method and device | |
CN108199836B (en) | Method and device for binding and unbinding key and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |