CN108600230A - A kind of radio-frequency identification method and system - Google Patents

A kind of radio-frequency identification method and system Download PDF

Info

Publication number
CN108600230A
CN108600230A CN201810385616.3A CN201810385616A CN108600230A CN 108600230 A CN108600230 A CN 108600230A CN 201810385616 A CN201810385616 A CN 201810385616A CN 108600230 A CN108600230 A CN 108600230A
Authority
CN
China
Prior art keywords
chosen point
electronic tag
reader
identified
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810385616.3A
Other languages
Chinese (zh)
Inventor
杜光东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shenglu IoT Communication Technology Co Ltd
Original Assignee
Shenzhen Shenglu IoT Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shenglu IoT Communication Technology Co Ltd filed Critical Shenzhen Shenglu IoT Communication Technology Co Ltd
Priority to CN201810385616.3A priority Critical patent/CN108600230A/en
Publication of CN108600230A publication Critical patent/CN108600230A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Abstract

The present invention relates to a kind of radio-frequency identification method and system, method includes:When reader receives the connection signal of electronic tag to be identified, distance value between the two is determined;Server judges whether distance value belongs within the scope of pre-determined distance value, and reader chooses the first Chosen Point in default interval if belonging to, and obtains public key according to the first Chosen Point and private key;Electronic tag to be identified chooses the second Chosen Point in interval, feedback information will be needed to encode to the second Chosen Point, and generate random number, and anti-fake number is worth to by random number and distance, and ciphertext data packet is generated with this;Calculating is decrypted to ciphertext data packet in reader, obtains the plaintext of the second Chosen Point, according to the feedback information for obtaining the carrying of the second Chosen Point in plain text.The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, the confidential information of electronic tag to be identified be obtained by the form of ciphertext, and, as a part for ciphertext, improve security performance using apart from value information.

Description

A kind of radio-frequency identification method and system
Technical field
The present invention relates to technical field of RFID more particularly to a kind of radio-frequency identification method and systems.
Background technology
Technology of Internet of things every profession and trade extensive use, bring efficiently and easily simultaneously as its own Particularity, the safety of sensing terminal is always the hot issue to attract attention, at present RFID (Radio Frequency Identification) system is played an increasingly important role in the information age, the friendship between electronic tag and reader The problem of in terms of mutual information safety and secret protection also following, the free frequency range of Radio Frequency Identification Technology generally use, data hold Easily it is replicated;Electronic tag once close to reader, will unconditional automatic interaction information, easily read the electronic tag of forgery Information.
Invention content
In order to solve the above technical problems, the present invention provides a kind of radio-frequency identification method and systems.
In a first aspect, an embodiment of the present invention provides a kind of radio-frequency identification method, include the following steps:
Reader sends RF pulse signal, to wake up electronic tag to be identified;
When the reader receives the connection signal that electronic tag to be identified is sent, institute is determined according to the connection signal The distance value of electronic tag and reader to be identified is stated, and the distance value is sent in server;
It is close from the elliptic curve pre-established when the server judges that the distance value belongs to pre-determined distance value range Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval;
The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval, and according to institute It states the first Chosen Point and private key obtains public key, and the interval, the first Chosen Point, distance value and public key be sent to described In electronic tag to be identified;
The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to described On second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by the anti-fake number by institute The second Chosen Point for stating public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by the ciphertext data packet It is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the bright of second Chosen Point Text obtains the feedback information of the second Chosen Point carrying according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out Information is transmitted and decrypts to obtain the feedback information of electronic tag to be identified, using apart from value information as a part for ciphertext, due to Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance.
Further, the distance value of the electronic tag to be identified and reader is determined according to the connection signal, specifically Including:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
Above-mentioned further technical solution, determines distance value, and the connection distance of electronic tag and reader is set in centainly In range, prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Further, further include step:
When the server judges that the distance value belongs to pre-determined distance value range, the reader is called to be waited for described Identify that electronic tag sends checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described Reader sends ciphertext and obtains signal.
Above-mentioned further technical solution can make electronic tag further in electronic tag and reader access phase Verification, judge its legitimacy, prevent distance value of the electronic tag apart from reader of camouflage from also pretending to be in preset range value Legal electronic tag.
Second aspect, the present invention provides a kind of radio-frequency recognition systems, including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electricity to be identified When the connection signal that subtab is sent, determine the electronic tag to be identified at a distance from reader according to the connection signal Value, and the distance value is sent in server;
Server, it is close from the elliptic curve pre-established when for judging that the distance value belongs to pre-determined distance value range Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval;
The reader is additionally operable to choose the first Chosen Point in the interval according to ciphertext acquisition signal, And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out It send into the electronic tag to be identified;
The electronic tag to be identified encodes feedback information for choosing the second Chosen Point in the interval On to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti-fake Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by number, by the ciphertext Data packet is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of the second Chosen Point, The feedback information of the second Chosen Point carrying is obtained according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out The information that electronic tag to be identified carries is transmitted and decrypted to obtain to information, using apart from value information as a part for ciphertext, due to Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance.
Further, the reader is specifically used for:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
Above-mentioned further technical solution, determines distance value, and the connection distance of electronic tag and reader is set in centainly In range, prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Further, the server is additionally operable to:
When judging that the distance value belongs to pre-determined distance value range, call the reader to the electronics mark to be identified It signs and issues and send checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described Reader sends ciphertext and obtains signal.
Above-mentioned further technical solution can make electronic tag further in electronic tag and reader access phase Verification, judge its legitimacy, prevent distance value of the electronic tag apart from reader of camouflage from also pretending to be in preset range value Legal electronic tag.
The third aspect, the present invention provides a kind of readers, including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection Signal determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;Also use Signal and interval are obtained in receiving the ciphertext that server is sent, the interval is that the server judges the distance When value belongs to pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point, and root for obtaining signal according to the ciphertext in the interval Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to In the electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified are described close Literary data packet is that the electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to institute It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, and it is selected to obtain described second The plaintext of point obtains the feedback information of the second Chosen Point carrying according to the plaintext.
Description of the drawings
Fig. 1 is the method flow diagram for the radio-frequency identification method that one embodiment of the invention provides;
Fig. 2 is that the flow of electronic tag, reader and server that one embodiment of the invention provides interacts schematic diagram;
Fig. 3 is the method flow diagram for the radio-frequency identification method that another embodiment of the present invention provides;
Fig. 4 is that the flow of electronic tag, reader and server that another embodiment of the present invention provides interacts schematic diagram;
Fig. 5 is the module frame chart for the radio-frequency recognition system that one embodiment of the invention provides;
Fig. 6 is the data flow schematic diagram of electronic tag, reader and server that one embodiment of the invention provides;
Fig. 7 is the module frame chart for the reader that one embodiment of the invention provides;
Fig. 8 is the connection diagram of each equipment of radio-frequency recognition system of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as specific system structure, interface, technology it The detail of class understands the present invention to cut thoroughly.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, circuit and The detailed description of method, in case unnecessary details interferes description of the invention.
Fig. 8 is the connection diagram of each equipment of radio-frequency recognition system of the present invention;
As shown in figure 8, RFID (Radio Frequency Identification) radio frequency identification is a kind of automatic Identification technology is one of core technology of Internet of Things, and wherein electronic tag has become the foundation stone for realizing Internet of Things application.Mesh Before, RFID has been widely used in the key areas such as logistics, manufacture, medical treatment, traffic, transport, building, power supply;Traditional RFID system is dependent on the shared key between valid reader and label, but due to the opening of wireless channel, manufacture is set The label key set can be eavesdropped easily by opponent and also can bring key escrow and user cannot self-defined key, therefore, Interaction between reader and electronic tag is most weak link;How the research significance of the present invention is in conventional authentication body The anti-attack ability that reader and electronic tag are improved on the basis of system, the following detailed description of.
Fig. 1 is the method flow diagram for the radio-frequency identification method that one embodiment of the invention provides;
As shown in Figure 1, a kind of radio-frequency identification method, includes the following steps:
Step S1:Reader sends RF pulse signal, to wake up electronic tag to be identified;
Step S2:When the reader receives the connection signal that electronic tag to be identified is sent, believed according to the connection It number determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;
Step S3:Server judges whether the distance value belongs within the scope of pre-determined distance value, if belonged to, sends close Text obtains in signal to the reader, executes step S4, no to then follow the steps S7;
Step S4:The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval, And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out It send into the electronic tag to be identified;
Step S5:The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is compiled On code to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti- Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by pseudo- number, will be described close Literary data packet is sent in the reader;
Step S6:Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains second choosing The plaintext of fixed point obtains the feedback information of the second Chosen Point carrying according to the plaintext;
Step S7:The reader is called to send connection failure information to the electronic tag to be identified.
Specifically, the setting for interval, can be used following method:Establish elliptic curve cryptography model (Elliptic Curves Cryptography), elliptic curve E is obtained by elliptic curve cryptography modelp(a, b), Ep (a, b) is used as interval;Elliptic curve is defined in finite field, need to meet equation:y2≡x3+ ax+b (mod p) elliptic curve And relative influence variable can use Effect=(p, a, b, A, n, h) indicate, wherein p, a and b be used for describe elliptic curve Ep (a, B), the first Chosen Point is set as A, and A is the point selected on Ep (a, b), also referred to as basic point, and n is the rank of basic point A, and m indicates Ep The number put on (a, b), h=(int) (m/n), value is positive integer, if the second Chosen Point is B, B is also one on Ep (a, b) A point.Selection for a, b value should meet 4a3+27b2≠0(mod p)。
In above-described embodiment, it can prevent from reading the electronic labeling information forged and confidential information leakage, pass through setting Reader determines whether electronic tag to be identified is the electronic tag of camouflage with electronic tag value range, and passes through ciphertext Form is transmitted into row information and decrypts to obtain the feedback information of electronic tag to be identified, using one apart from value information as ciphertext Point, since electronic tag is every time apart from the distance value of reader difference, not only hacker is avoided also with real-time with randomness Primary the case where just putting things right once and for all is cracked, is not easy to be cracked, improves security performance.
Fig. 2 is that the flow of electronic tag, reader and server that one embodiment of the invention provides interacts schematic diagram;
Electronic tag to be identified is expressed as electronic tag;
1. reader sends RF pulse signal;
2. electronic tag is waken up, feedback link signal;
3. reader determines the distance value of the electronic tag to be identified and reader according to connection signal;
4. in reader transmission range value to server;
5. server judges whether the distance value belongs within the scope of pre-determined distance value;
6.1. it if belonged to, sends ciphertext and obtains in signal to the reader;
If or 6.2. is not belonging to, and sends connection failure information;
7. reader chooses the first Chosen Point in default interval, and obtains public affairs according to the first Chosen Point and private key Key;
8. the interval, the first Chosen Point, distance value and public key are sent to the electronics mark to be identified by reader In label;
9. choosing the second Chosen Point in interval, feedback information will be needed to encode to the second Chosen Point, and generate with Machine number is worth to anti-fake number by random number and distance, and by public key, the first Chosen Point and feedback information is carried by anti-fake number Second Chosen Point is encoded into ciphertext data packet;
10. electronic tag sends ciphertext data packet;
11. calculating is decrypted to ciphertext data packet by private key in reader, the plaintext of the second Chosen Point is obtained, according to bright Text obtains the feedback information of the second Chosen Point carrying.
In above-described embodiment, data interaction between reader, electronic tag and server, server is to electronic tag Legitimacy is verified, and in reader and electronic tag interactive process, is transmitted into row information in the form of ciphertext, by instant The distance value of generation reinforces the anti-power of cracking of ciphertext, prevents interception facility eavesdropping information and identification.
Optionally, as an embodiment of the present invention, described that public key is obtained according to the first Chosen Point and private key, it is specific to wrap It includes:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
R indicates interval, therefore the data that reader is sent to electronic tag to be identified are:Interval R and public key Y= s A。
In above-described embodiment, public key will be obtained by private key and the first Chosen Point, according to Cryptography Principles, public key and basic point Private key cannot be found out by inverse operation, eavesdrops effect, ensured the safety of communication.
Optionally, as an embodiment of the present invention, the generation random number, is obtained by the random number and distance value To anti-fake number, the public key, the first Chosen Point and the second Chosen Point are encoded by ciphertext data packet by the anti-fake number, specifically Including:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified and reader Distance value;
The second of the public key, the first Chosen Point and carrying feedback information is selected according to formula K1=B+t Y and K2=t A Fixed point is encoded into ciphertext data packet, and wherein K1 is the first ciphertext, and K2 is the second ciphertext, and B is to carry the second of feedback information to select Point, Y are public key, and A is the first Chosen Point, and the feedback information includes product information or personal information.
Such as the number " ID152 " of product information and producer's identifier number " SN45 " are written in the second Chosen Point B, it obtains Second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded by the second Chosen Point B for carrying feedback information Ciphertext data packet.
In another example the number " ID0051 " of personal information and authentication information " 15845 " are written in the second Chosen Point B, The the second Chosen Point B for obtaining carrying feedback information, by public key, the first Chosen Point and the second Chosen Point B volumes for carrying feedback information Code is at ciphertext data packet.
In above-described embodiment, distance value and random number are combined and obtain anti-fake number, anti-fake number is not easy to be identified, by anti-fake Number is combined with the second Chosen Point, prevents interception facility from directly acquiring the feedback information of the second Chosen Point carrying, good confidentiality.
Optionally, as an embodiment of the present invention, the generation random number, is obtained by the random number and distance value To anti-fake number, the public key, the first Chosen Point and the second Chosen Point are encoded by ciphertext data packet by the anti-fake number, specifically Including:
The first ciphertext K1=B+t Y and the second ciphertext K2=t A are obtained from the ciphertext data packet, according to formula B= Calculating is decrypted in K1-sK2, obtains the plaintext of second Chosen Point and anti-fake number, and the plaintext includes carrying feedback information The second Chosen Point B, feedback information is obtained according to the second Chosen Point B.
Therefore the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A.
Lower mask body introduces decrypting process:
Reader is the promoter of communication, generates public key Y=s A;
The anti-fake number that server generates is t=r n, the first ciphertext is K1=B+t Y, the second ciphertext is K2=tA;
K1 and K2 are brought into formula and are calculated according to formula B=K1-sK2 by reader:
B=K1-sK2
=(B+t Y)-s (t A)
=B+t (Y-sA)
=B
The plaintext for obtaining the second Chosen Point B obtains the feedback information of its carrying by the second Chosen Point B.
For example, the feedback information that the second Chosen Point B is carried is:The number " ID152 " and producer's identifier number of product information Second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by " SN45 ".
The process that reader is decrypted is:
The first ciphertext K1=B (ID152+SN45)+t Y in the ciphertext data packet and the second ciphertext K2=t A, read-write K1 and K2 are brought into formula and are calculated according to formula B=K1-sK2 by device:
B=K1-sK2
=[B (ID152+SN45)+t Y)]-s (t A)
=B (ID152+SN45)+t (Y-sA)
Due to public key Y=s A, the plaintext of the second Chosen Point B is obtained by public key, to obtain the feedback letter of electronic tag It ceases " ID152+SN45 ".
In another example the feedback information that the second Chosen Point B is carried is:The number " ID0051 " of personal information and authentication letter It ceases " 15845 ", the second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet.
The process that reader is decrypted is:
The first ciphertext K1=B (ID0051+15845)+t Y in the ciphertext data packet and the second ciphertext K2=t A are read Device is write according to formula B=K1-sK2, K1 and K2 are brought into formula and calculated:
B=K1-sK2
=[B (ID0051+15845)+t Y)]-s (t A)
=B (ID0051+15845)+t (Y-sA)
Due to public key Y=s A, the plaintext of the second Chosen Point B is obtained by public key, to obtain the feedback letter of electronic tag It ceases " ID0051+15845 ".
In above-described embodiment, reader is decrypted electronic tag to be identified by private key s, reader and electronic tag Information exchange is realized by asymmetrical encryption and decryption means, prevents from being passed through near reader and electronic tag by attacker Audiomonitor is placed to monitor communication data, and then analyzes and cracks system key, obtains real information.
Fig. 3 is the method flow diagram for the radio-frequency identification method that another embodiment of the present invention provides;
Optionally, as an embodiment of the present invention, it is improved on the basis of Fig. 1, as shown in figure 3, further including Step:
Step S101:Random number n is sent in the reader by electronic tag to be identified;
Step S102:The random number n and obtained anti-fake number are sent in the server by the reader;
Step S103:Distance value r ' is calculated according to r '=t/n in the server, by distance value r ' and is calculated Distance value r is compared, if the two is identical, it is without exception as a result, otherwise electricity to be identified to obtain electronic tag to be identified Subtab exists abnormal.
In above-described embodiment, when information exchange is completed, the distance value that can be returned to electronic tag to be identified is tested Card, prevents attacker from distorting the data of electronic tag.
It is to be understood that random number n can be sent in reader together with ciphertext data packet in step S101;
That is step S5 can be replaced:Electronic tag to be identified chooses the second Chosen Point in interval, will need feedback letter On breath coding to the second Chosen Point, and random number is generated, anti-fake number is worth to by random number and distance, it will be public by anti-fake number Second Chosen Point of key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by ciphertext data packet and random number n It is sent in reader together;
In above-described embodiment, in information interactive process, even if audiomonitor listens to random number information, also it is not easy to obtain Know apart from value information, and server can calculate distance value easily by random number, and then calculated distance value is carried out Verification judges electronic labeling information with the presence or absence of abnormal.
Fig. 4 is that the flow of electronic tag, reader and server that another embodiment of the present invention provides interacts schematic diagram;
It is improved on the basis of Fig. 2, as shown in Figure 4:
Electronic tag to be identified is expressed as electronic tag;
12. the anti-fake number that reader sends random number n and obtains;
13. distance value r ' is calculated according to r '=t/n in server, by distance value r ' and calculated distance value r into Row compares, if the two is identical, obtains that electronic tag to be identified is without exception as a result, otherwise there are different for electronic tag to be identified Often.
In above-described embodiment, server end can quickly calculate distance value by random number and computation rule, in turn Calculated distance value is verified, judges electronic labeling information with the presence or absence of abnormal.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is determined according to the connection signal With the distance value of reader, specifically include:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
In above-described embodiment, distance value is determined, in a certain range by the connection distance setting of electronic tag and reader, Prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Optionally, as an embodiment of the present invention, further include step:
When the server judges that the distance value belongs to pre-determined distance value range, the reader is called to be waited for described Identify that electronic tag sends checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described Reader sends ciphertext and obtains signal.
Specifically, information to be verified can be identification code, it is made of, can be pre-set for storing identification code number and character Database, identification code is set in advance in electronic tag, belongs in database if electronic tag to be identified can be fed back Information of identification code, then its authentication success, if electronic tag to be identified can not feedback identifying code information or transmission knowledge Other code Information Authentication failure, then the electronic tag to be identified may be the electronic tag of camouflage.
In above-described embodiment, in electronic tag and reader access phase, further verification can be made to electronic tag, Judge its legitimacy, prevents distance value of the electronic tag of camouflage apart from reader from also pretending to be legal electricity in preset range value Subtab.
Specifically, the RF signal power that the electronic tag to be identified is obtained according to connection signal intensity, specifically Including:
The connection signal of electronic tag to be identified is amplified;
Amplified connection signal is filtered;
It is carried out being converted to RF signal power according to the electric signal being filtered.
In above-described embodiment, initial signal is amplified, is filtered and can obtain accurate performance number.
Fig. 5 is the module frame chart for the radio-frequency recognition system that one embodiment of the invention provides;
As shown in figure 5, the present invention also provides a kind of radio-frequency recognition systems, including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electricity to be identified When the connection signal that subtab is sent, determine the electronic tag to be identified at a distance from reader according to the connection signal Value, the distance value is sent in server;
Server, it is close from the elliptic curve pre-established when for judging that the distance value belongs to pre-determined distance value range Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval, if being not belonging to The reader is called to send connection failure information to the electronic tag to be identified;
The reader is additionally operable to choose the first Chosen Point in the interval according to ciphertext acquisition signal, And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out It send into the electronic tag to be identified;
The electronic tag to be identified encodes feedback information for choosing the second Chosen Point in the interval On to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti-fake Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by number, by the ciphertext Data packet is sent in the reader;
The reader is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, obtains the second Chosen Point Plaintext, according to the plaintext obtain the second Chosen Point carrying feedback information.
Specifically, the setting for interval, can be used following method:Establish elliptic curve cryptography model (Elliptic Curves Cryptography), elliptic curve E is obtained by elliptic curve cryptography modelp(a, b), Ep (a, b) is used as interval;Elliptic curve is defined in finite field, need to meet equation:y2≡x3+ ax+b (mod p) elliptic curve And relative influence variable can use Effect=(p, a, b, A, n, h) indicate, wherein p, a and b be used for describe elliptic curve Ep (a, B), the first Chosen Point is set as A, and A is the point selected on Ep (a, b), also referred to as basic point, and n is the rank of basic point A, and m indicates Ep The number put on (a, b), h=(int) (m/n), value is positive integer, if the second Chosen Point is B, B is also one on Ep (a, b) A point.Selection for a, b value should meet 4a3+27b2≠0(mod p)。
In above-described embodiment, it can prevent from reading the electronic labeling information forged and confidential information leakage, pass through setting Reader determines whether electronic tag to be identified is the electronic tag of camouflage with electronic tag value range, and passes through ciphertext Form is transmitted into row information and decrypts to obtain the feedback information of electronic tag to be identified, using one apart from value information as ciphertext Point, since electronic tag is every time apart from the distance value of reader difference, not only hacker is avoided also with real-time with randomness Primary the case where just putting things right once and for all is cracked, is not easy to be cracked, improves security performance.
Fig. 6 is the data flow schematic diagram of electronic tag, reader and server that one embodiment of the invention provides;
As shown in 6 figures, optionally, as an embodiment of the present invention, the reader is specifically used for:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
R indicates interval, therefore the data that reader is sent to electronic tag to be identified are:Interval R and public key Y= s A;
In above-described embodiment, public key will be obtained by private key and the first Chosen Point, according to Cryptography Principles, public key and basic point Private key cannot be found out by inverse operation, eavesdrops effect, ensured the safety of communication.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is specifically used for:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified and reader Distance value;
According to formula K1=B+t Y and K2The public key, the first Chosen Point and the second Chosen Point are encoded into ciphertext by=t A Data packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is public key, A the One Chosen Point, the feedback information include product information or personal information.
Therefore the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A.
In above-described embodiment, not only by random number code at ciphertext, but distance value r and random number are obtained anti-fake Number t, therefore can be when electronic tag to be identified be fed back in the information and the second Chosen Point of guard space value r feedback information, It also allows for reader and further verification is made to the distance value r of return, and solve the problems, such as that random number is easily identified.
Optionally, as an embodiment of the present invention, the reader also particularly useful for:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2=t A, according to formula B= K1-sK2Calculating is decrypted, obtains the plaintext of second Chosen Point and anti-fake number, the plaintext includes carrying feedback information Second Chosen Point B obtains feedback information according to the second Chosen Point B.
Lower mask body introduces decrypting process:
Reader is the promoter of communication, generates public key Y=s A;
The anti-fake number that server generates is t=r n, the first ciphertext is K1=B+t Y, the second ciphertext are K2=t A;
Reader is according to formula B=K1-sK2, by K1And K2It brings into formula and is calculated:
B=K1-sK2
=(B+t Y)-s (t A)
=B+t (Y-sA)
=B
The plaintext for obtaining the second Chosen Point B obtains the feedback information of its carrying by the second Chosen Point B.
In above-described embodiment, reader is decrypted electronic tag to be identified by private key s, reader and electronic tag Information exchange is realized by asymmetrical encryption and decryption means, prevents from being passed through near reader and electronic tag by attacker Audiomonitor is placed to monitor communication data, and then analyzes and cracks system key, obtains real information.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is additionally operable to send random number n To in the reader;
Therefore, the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A and random number n;
The reader is additionally operable to the random number n and obtained anti-fake number being sent in the server;
The server is additionally operable to that distance value r ' is calculated according to r '=t/n, by distance value r ' and be calculated away from It is compared from value r, if the two is identical, obtains the without exception of electronic tag to be identified as a result, otherwise electronics to be identified Label exists abnormal.
In above-described embodiment, the distance value returned to electronic tag to be identified is verified, and prevents attacker by reading It writes device and electronic tag is placed around audiomonitor to monitor communication data, and then analyze and crack system key, obtain true letter Breath.
Optionally, as an embodiment of the present invention, the reader also particularly useful for:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
In above-described embodiment, distance value is determined, in a certain range by the connection distance setting of electronic tag and reader, Prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Optionally, as an embodiment of the present invention, the server is additionally operable to:
When judging that the distance value belongs to pre-determined distance value range, call the reader to the electronics mark to be identified It signs and issues and send checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described Reader sends ciphertext and obtains signal.
Specifically, information to be verified can be identification code, it is made of, can be pre-set for storing identification code number and character Database, identification code is set in advance in electronic tag, belongs in database if electronic tag to be identified can be fed back Information of identification code, then its authentication success, if electronic tag to be identified can not feedback identifying code information or transmission knowledge Other code Information Authentication failure, then the electronic tag to be identified may be the electronic tag of camouflage.
In above-described embodiment, in electronic tag and reader access phase, further verification can be made to electronic tag, Judge its legitimacy, prevents distance value of the electronic tag of camouflage apart from reader from also pretending to be legal electricity in preset range value Subtab.
Specifically, the RF signal power for obtaining the electronic tag to be identified according to connection signal intensity is:
The connection signal of electronic tag to be identified is amplified;
Amplified connection signal is filtered;
It is carried out being converted to RF signal power according to the electric signal being filtered.
In above-described embodiment, initial signal is amplified, is filtered and can obtain accurate performance number.
Fig. 7 is the module frame chart for the reader that one embodiment of the invention provides;
As shown in fig. 7, the present invention also provides a kind of readers, including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection Signal determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;Also use Signal and interval are obtained in receiving the ciphertext that server is sent, the interval is that the server judges the distance When value belongs to pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point, and root for obtaining signal according to the ciphertext in the interval Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to In the electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified are described close Literary data packet is that the electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to institute It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, and it is selected to obtain described second The plaintext of point obtains the feedback information of the second Chosen Point carrying according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out The information that electronic tag to be identified carries is transmitted and decrypted to obtain to information, using apart from value information as a part for ciphertext, due to Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance;Further prevent attacker by palming off reader, Label data is obtained from legitimate tag, resets label information;Background data base information is obtained by forging label, distorts system Core data;
Therefore, three layers of control are carried out for the safety of identification:First, in access phase, i.e. electronic tag and reader The identity of electronic tag need to be verified by establishing when connection, need to carry out information exchange in pre-determined distance value range;Second, in information exchange Stage carries out information protection, when transmitting information with legal electronic tag, using its actual distance value as anti-fake number, and passes through The form of ciphertext transmits important information, reinforces the anti-power of cracking of ciphertext;Third, when information exchange is completed, for electronic tag Transmission ciphertext be decrypted after verified again;To greatly improve security performance.
Reader should be understood that in the description of this specification reference term " one embodiment ", " is shown " some embodiments " The description of example ", " specific example " or " some examples " etc. mean specific features described in conjunction with this embodiment or example, structure, Material or feature are included at least one embodiment or example of the invention.In the present specification, above-mentioned term is shown The statement of meaning property need not be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described It may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, without conflicting with each other, this The technical staff in field can be by the spy of different embodiments or examples described in this specification and different embodiments or examples Sign is combined.
It is apparent to those skilled in the art that for convenience of description and succinctly, the dress of foregoing description The specific work process with unit is set, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit, only A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.
The unit illustrated as separating component may or may not be physically separated, and be shown as unit Component may or may not be physical unit, you can be located at a place, or may be distributed over multiple networks On unit.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the embodiment of the present invention 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, can also be during two or more units are integrated in one unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention substantially or Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes all or part of each embodiment method of the present invention Step.And storage medium above-mentioned includes:It is USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random Access various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD Matter.
More than, specific implementation mode only of the invention, but scope of protection of the present invention is not limited thereto, and it is any to be familiar with Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions, These modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be wanted with right Subject to the protection domain asked.

Claims (10)

1. a kind of radio-frequency identification method, which is characterized in that include the following steps:
Reader sends RF pulse signal, to wake up electronic tag to be identified;
When the reader receives the connection signal that electronic tag to be identified is sent, waited for according to described in connection signal determination It identifies the distance value of electronic tag and reader, and the distance value is sent in server;
When the server judges that the distance value belongs to pre-determined distance value range, from the elliptic curve cipher mould pre-established Interval is obtained in type, sending ciphertext to the reader obtains signal and the interval;
The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval, and according to described the One Chosen Point and private key obtain public key, and the interval, the first Chosen Point, distance value and public key are sent to and described wait knowing In other electronic tag;
The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to described second On Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by the anti-fake number by the public affairs Second Chosen Point of key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, and the ciphertext data packet is sent To in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of second Chosen Point, The feedback information of the second Chosen Point carrying is obtained according to the plaintext.
2. radio-frequency identification method according to claim 1, which is characterized in that described to be obtained according to the first Chosen Point and private key Public key specifically includes:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
3. radio-frequency identification method according to claim 2, which is characterized in that the generation random number, by described random Number and distance are worth to anti-fake number, are encoded into the public key, the first Chosen Point and the second Chosen Point by the anti-fake number close Literary data packet, specifically includes:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified at a distance from reader Value;
According to formula K1=B+t Y and K2=t A by the public key, the first Chosen Point and carry feedback information the second Chosen Point It is encoded into ciphertext data packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is Public key, A are the first Chosen Point, and the feedback information includes product information or personal information.
4. radio-frequency identification method according to claim 3, which is characterized in that it is described by private key to the ciphertext data packet Calculating is decrypted, obtains the plaintext of second Chosen Point, the feedback letter of the second Chosen Point carrying is obtained according to the plaintext Breath, specifically includes:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2=t A;
According to formula B=K1-sK2Calculating is decrypted, obtains the plaintext of second Chosen Point and anti-fake number, the plaintext packet The the second Chosen Point B for carrying feedback information is included, feedback information is obtained according to the second Chosen Point B.
5. radio-frequency identification method according to claim 4, which is characterized in that further include step:
Random number n is sent in the reader by the electronic tag to be identified;
The random number n and obtained anti-fake number are sent in the server by the reader;
Distance value r ' is calculated according to r '=t/n in the server, and distance value r ' and calculated distance value r are compared Compared with if the two is identical, obtaining electronic tag to be identified result without exception.
6. a kind of radio-frequency recognition system, which is characterized in that including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electronics mark to be identified When signing and issuing the connection signal sent, the distance value of the electronic tag to be identified and reader is determined according to the connection signal, and The distance value is sent in server;
Server, when for judging that the distance value belongs to pre-determined distance value range, from the elliptic curve cipher mould pre-established Interval is obtained in type, sending ciphertext to the reader obtains signal and the interval;
The reader is additionally operable to choose the first Chosen Point, and root in the interval according to ciphertext acquisition signal Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to In the electronic tag to be identified;
The electronic tag to be identified encodes feedback information to institute for choosing the second Chosen Point in the interval It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by the ciphertext data Packet is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of the second Chosen Point, according to The plaintext obtains the feedback information of the second Chosen Point carrying.
7. radio-frequency recognition system according to claim 6, which is characterized in that the reader is specifically used for:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
8. radio-frequency recognition system according to claim 7, which is characterized in that the electronic tag to be identified is specifically used for:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified at a distance from reader Value;
According to formula K1=B+t Y and K2The public key, the first Chosen Point and the second Chosen Point are encoded into ciphertext data by=t A Packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is public key, and A is the first choosing Fixed point, the feedback information includes product information or personal information.
9. radio-frequency recognition system according to claim 8, which is characterized in that the reader also particularly useful for:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2It is selected to obtain described second by=t A The plaintext and anti-fake number of point, the plaintext include the second Chosen Point B for carrying feedback information, are obtained according to the second Chosen Point B To feedback information.
10. a kind of reader, which is characterized in that including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection signal It determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;It is additionally operable to connect It receives the ciphertext that server is sent and obtains signal and interval, the interval is that the server judges the distance value category When pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point for obtaining signal according to the ciphertext in the interval, and according to institute It states the first Chosen Point and private key obtains public key, and the interval, the first Chosen Point, distance value and public key be sent to described In electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified, the ciphertext number It is that the electronic tag to be identified chooses the second Chosen Point in the interval according to packet, feedback information is encoded to described the On two Chosen Points, and random number is generated, anti-fake number is worth to by the random number and distance, it will be described by the anti-fake number Second Chosen Point of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, obtains second Chosen Point In plain text, the feedback information of the second Chosen Point carrying is obtained according to the plaintext.
CN201810385616.3A 2018-04-26 2018-04-26 A kind of radio-frequency identification method and system Pending CN108600230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810385616.3A CN108600230A (en) 2018-04-26 2018-04-26 A kind of radio-frequency identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810385616.3A CN108600230A (en) 2018-04-26 2018-04-26 A kind of radio-frequency identification method and system

Publications (1)

Publication Number Publication Date
CN108600230A true CN108600230A (en) 2018-09-28

Family

ID=63610245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810385616.3A Pending CN108600230A (en) 2018-04-26 2018-04-26 A kind of radio-frequency identification method and system

Country Status (1)

Country Link
CN (1) CN108600230A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205082A (en) * 2021-12-09 2022-03-18 北京计算机技术及应用研究所 Bidirectional identity authentication method and device for reader-writer and electronic tag
CN117764101A (en) * 2024-02-22 2024-03-26 成都普什信息自动化有限公司 RFID (radio frequency identification) tag-based wine product anti-counterfeiting verification method, system and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100308978A1 (en) * 2009-04-30 2010-12-09 Certicom Corp. System and method for authenticating rfid tags
CN102236773A (en) * 2010-04-30 2011-11-09 航天信息股份有限公司 Radio frequency identification (RFID) encryption verification system and method
CN102542227A (en) * 2011-12-26 2012-07-04 西北工业大学 Built-up jig assembling detection method based on radio frequency identification devices (RFID)
US20130106580A1 (en) * 2011-10-31 2013-05-02 Seoul National University Of Technology Center For Industry Collaboration Rfid system and communication method thereof
CN106508106B (en) * 2010-12-24 2013-12-25 中国电子技术标准化研究院 For RF identification read write line to label communication means
CN104219046A (en) * 2014-10-09 2014-12-17 山东师范大学 Active RFID (radio frequency identification) encryption method based on light-weighted asymmetric encryption algorithm
CN105871904A (en) * 2016-05-25 2016-08-17 电子科技大学 Security authentication protocol for limited distance of RFID (Radio Frequency Identification)
CN107017997A (en) * 2017-06-01 2017-08-04 国网江苏省电力公司电力科学研究院 A kind of auth method, reader and label
CN107247260A (en) * 2017-07-06 2017-10-13 合肥工业大学 A kind of RFID localization methods based on adaptive depth confidence network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100308978A1 (en) * 2009-04-30 2010-12-09 Certicom Corp. System and method for authenticating rfid tags
CN102236773A (en) * 2010-04-30 2011-11-09 航天信息股份有限公司 Radio frequency identification (RFID) encryption verification system and method
CN106508106B (en) * 2010-12-24 2013-12-25 中国电子技术标准化研究院 For RF identification read write line to label communication means
US20130106580A1 (en) * 2011-10-31 2013-05-02 Seoul National University Of Technology Center For Industry Collaboration Rfid system and communication method thereof
CN102542227A (en) * 2011-12-26 2012-07-04 西北工业大学 Built-up jig assembling detection method based on radio frequency identification devices (RFID)
CN104219046A (en) * 2014-10-09 2014-12-17 山东师范大学 Active RFID (radio frequency identification) encryption method based on light-weighted asymmetric encryption algorithm
CN105871904A (en) * 2016-05-25 2016-08-17 电子科技大学 Security authentication protocol for limited distance of RFID (Radio Frequency Identification)
CN107017997A (en) * 2017-06-01 2017-08-04 国网江苏省电力公司电力科学研究院 A kind of auth method, reader and label
CN107247260A (en) * 2017-07-06 2017-10-13 合肥工业大学 A kind of RFID localization methods based on adaptive depth confidence network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205082A (en) * 2021-12-09 2022-03-18 北京计算机技术及应用研究所 Bidirectional identity authentication method and device for reader-writer and electronic tag
CN114205082B (en) * 2021-12-09 2024-01-26 北京计算机技术及应用研究所 Bidirectional identity authentication method and equipment for reader-writer and electronic tag
CN117764101A (en) * 2024-02-22 2024-03-26 成都普什信息自动化有限公司 RFID (radio frequency identification) tag-based wine product anti-counterfeiting verification method, system and medium

Similar Documents

Publication Publication Date Title
CN102782694B (en) Apparatus, method and system for data security
US10817874B2 (en) Purchase transaction system with encrypted payment card data
US9734322B2 (en) System and method for authenticating RFID tags
CN103258169B (en) Method, chip card and chip card terminal that protection chip card is used without permission
KR101450291B1 (en) Server for authenticating smart chips and method thereof
CN102171969A (en) A method for operating a network, a system management device, a network and a computer program therefor
CN110381055B (en) RFID system privacy protection authentication protocol method in medical supply chain
CN103380592A (en) Method, server and system for authentication of a person
Chen et al. An ownership transfer scheme using mobile RFIDs
KR101856682B1 (en) Entity authentication method and device
CN106899584A (en) Management method and its device that a kind of hardware device is accessed
CN106789024A (en) A kind of remote de-locking method, device and system
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN110138736B (en) Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
CN108600230A (en) A kind of radio-frequency identification method and system
CN113890724A (en) Access authentication method and system for power Internet of things communication equipment
CN110650019B (en) RFID authentication method and system based on PUF and security sketch
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
Ranasinghe et al. Confronting security and privacy threats in modern RFID systems
CN104820807B (en) A kind of intelligent card data processing method
CN104915689B (en) A kind of smart card information processing method
CN104780049B (en) A kind of method of safe read-write data
EP3035589A1 (en) Security management system for authenticating a token by a service provider server
Alshehri et al. Formally defining NFC M-coupon requirements, with a case study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928