CN108600230A - A kind of radio-frequency identification method and system - Google Patents
A kind of radio-frequency identification method and system Download PDFInfo
- Publication number
- CN108600230A CN108600230A CN201810385616.3A CN201810385616A CN108600230A CN 108600230 A CN108600230 A CN 108600230A CN 201810385616 A CN201810385616 A CN 201810385616A CN 108600230 A CN108600230 A CN 108600230A
- Authority
- CN
- China
- Prior art keywords
- chosen point
- electronic tag
- reader
- identified
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Abstract
The present invention relates to a kind of radio-frequency identification method and system, method includes:When reader receives the connection signal of electronic tag to be identified, distance value between the two is determined;Server judges whether distance value belongs within the scope of pre-determined distance value, and reader chooses the first Chosen Point in default interval if belonging to, and obtains public key according to the first Chosen Point and private key;Electronic tag to be identified chooses the second Chosen Point in interval, feedback information will be needed to encode to the second Chosen Point, and generate random number, and anti-fake number is worth to by random number and distance, and ciphertext data packet is generated with this;Calculating is decrypted to ciphertext data packet in reader, obtains the plaintext of the second Chosen Point, according to the feedback information for obtaining the carrying of the second Chosen Point in plain text.The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, the confidential information of electronic tag to be identified be obtained by the form of ciphertext, and, as a part for ciphertext, improve security performance using apart from value information.
Description
Technical field
The present invention relates to technical field of RFID more particularly to a kind of radio-frequency identification method and systems.
Background technology
Technology of Internet of things every profession and trade extensive use, bring efficiently and easily simultaneously as its own
Particularity, the safety of sensing terminal is always the hot issue to attract attention, at present RFID (Radio Frequency
Identification) system is played an increasingly important role in the information age, the friendship between electronic tag and reader
The problem of in terms of mutual information safety and secret protection also following, the free frequency range of Radio Frequency Identification Technology generally use, data hold
Easily it is replicated;Electronic tag once close to reader, will unconditional automatic interaction information, easily read the electronic tag of forgery
Information.
Invention content
In order to solve the above technical problems, the present invention provides a kind of radio-frequency identification method and systems.
In a first aspect, an embodiment of the present invention provides a kind of radio-frequency identification method, include the following steps:
Reader sends RF pulse signal, to wake up electronic tag to be identified;
When the reader receives the connection signal that electronic tag to be identified is sent, institute is determined according to the connection signal
The distance value of electronic tag and reader to be identified is stated, and the distance value is sent in server;
It is close from the elliptic curve pre-established when the server judges that the distance value belongs to pre-determined distance value range
Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval;
The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval, and according to institute
It states the first Chosen Point and private key obtains public key, and the interval, the first Chosen Point, distance value and public key be sent to described
In electronic tag to be identified;
The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to described
On second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by the anti-fake number by institute
The second Chosen Point for stating public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by the ciphertext data packet
It is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the bright of second Chosen Point
Text obtains the feedback information of the second Chosen Point carrying according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with
Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out
Information is transmitted and decrypts to obtain the feedback information of electronic tag to be identified, using apart from value information as a part for ciphertext, due to
Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time
It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance.
Further, the distance value of the electronic tag to be identified and reader is determined according to the connection signal, specifically
Including:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
Above-mentioned further technical solution, determines distance value, and the connection distance of electronic tag and reader is set in centainly
In range, prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Further, further include step:
When the server judges that the distance value belongs to pre-determined distance value range, the reader is called to be waited for described
Identify that electronic tag sends checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described
Reader sends ciphertext and obtains signal.
Above-mentioned further technical solution can make electronic tag further in electronic tag and reader access phase
Verification, judge its legitimacy, prevent distance value of the electronic tag apart from reader of camouflage from also pretending to be in preset range value
Legal electronic tag.
Second aspect, the present invention provides a kind of radio-frequency recognition systems, including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electricity to be identified
When the connection signal that subtab is sent, determine the electronic tag to be identified at a distance from reader according to the connection signal
Value, and the distance value is sent in server;
Server, it is close from the elliptic curve pre-established when for judging that the distance value belongs to pre-determined distance value range
Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval;
The reader is additionally operable to choose the first Chosen Point in the interval according to ciphertext acquisition signal,
And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out
It send into the electronic tag to be identified;
The electronic tag to be identified encodes feedback information for choosing the second Chosen Point in the interval
On to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti-fake
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by number, by the ciphertext
Data packet is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of the second Chosen Point,
The feedback information of the second Chosen Point carrying is obtained according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with
Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out
The information that electronic tag to be identified carries is transmitted and decrypted to obtain to information, using apart from value information as a part for ciphertext, due to
Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time
It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance.
Further, the reader is specifically used for:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
Above-mentioned further technical solution, determines distance value, and the connection distance of electronic tag and reader is set in centainly
In range, prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Further, the server is additionally operable to:
When judging that the distance value belongs to pre-determined distance value range, call the reader to the electronics mark to be identified
It signs and issues and send checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described
Reader sends ciphertext and obtains signal.
Above-mentioned further technical solution can make electronic tag further in electronic tag and reader access phase
Verification, judge its legitimacy, prevent distance value of the electronic tag apart from reader of camouflage from also pretending to be in preset range value
Legal electronic tag.
The third aspect, the present invention provides a kind of readers, including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection
Signal determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;Also use
Signal and interval are obtained in receiving the ciphertext that server is sent, the interval is that the server judges the distance
When value belongs to pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point, and root for obtaining signal according to the ciphertext in the interval
Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to
In the electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified are described close
Literary data packet is that the electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to institute
It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, and it is selected to obtain described second
The plaintext of point obtains the feedback information of the second Chosen Point carrying according to the plaintext.
Description of the drawings
Fig. 1 is the method flow diagram for the radio-frequency identification method that one embodiment of the invention provides;
Fig. 2 is that the flow of electronic tag, reader and server that one embodiment of the invention provides interacts schematic diagram;
Fig. 3 is the method flow diagram for the radio-frequency identification method that another embodiment of the present invention provides;
Fig. 4 is that the flow of electronic tag, reader and server that another embodiment of the present invention provides interacts schematic diagram;
Fig. 5 is the module frame chart for the radio-frequency recognition system that one embodiment of the invention provides;
Fig. 6 is the data flow schematic diagram of electronic tag, reader and server that one embodiment of the invention provides;
Fig. 7 is the module frame chart for the reader that one embodiment of the invention provides;
Fig. 8 is the connection diagram of each equipment of radio-frequency recognition system of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as specific system structure, interface, technology it
The detail of class understands the present invention to cut thoroughly.However, it will be clear to one skilled in the art that there is no these specific
The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, circuit and
The detailed description of method, in case unnecessary details interferes description of the invention.
Fig. 8 is the connection diagram of each equipment of radio-frequency recognition system of the present invention;
As shown in figure 8, RFID (Radio Frequency Identification) radio frequency identification is a kind of automatic
Identification technology is one of core technology of Internet of Things, and wherein electronic tag has become the foundation stone for realizing Internet of Things application.Mesh
Before, RFID has been widely used in the key areas such as logistics, manufacture, medical treatment, traffic, transport, building, power supply;Traditional
RFID system is dependent on the shared key between valid reader and label, but due to the opening of wireless channel, manufacture is set
The label key set can be eavesdropped easily by opponent and also can bring key escrow and user cannot self-defined key, therefore,
Interaction between reader and electronic tag is most weak link;How the research significance of the present invention is in conventional authentication body
The anti-attack ability that reader and electronic tag are improved on the basis of system, the following detailed description of.
Fig. 1 is the method flow diagram for the radio-frequency identification method that one embodiment of the invention provides;
As shown in Figure 1, a kind of radio-frequency identification method, includes the following steps:
Step S1:Reader sends RF pulse signal, to wake up electronic tag to be identified;
Step S2:When the reader receives the connection signal that electronic tag to be identified is sent, believed according to the connection
It number determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;
Step S3:Server judges whether the distance value belongs within the scope of pre-determined distance value, if belonged to, sends close
Text obtains in signal to the reader, executes step S4, no to then follow the steps S7;
Step S4:The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval,
And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out
It send into the electronic tag to be identified;
Step S5:The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is compiled
On code to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti-
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by pseudo- number, will be described close
Literary data packet is sent in the reader;
Step S6:Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains second choosing
The plaintext of fixed point obtains the feedback information of the second Chosen Point carrying according to the plaintext;
Step S7:The reader is called to send connection failure information to the electronic tag to be identified.
Specifically, the setting for interval, can be used following method:Establish elliptic curve cryptography model
(Elliptic Curves Cryptography), elliptic curve E is obtained by elliptic curve cryptography modelp(a, b), Ep
(a, b) is used as interval;Elliptic curve is defined in finite field, need to meet equation:y2≡x3+ ax+b (mod p) elliptic curve
And relative influence variable can use Effect=(p, a, b, A, n, h) indicate, wherein p, a and b be used for describe elliptic curve Ep (a,
B), the first Chosen Point is set as A, and A is the point selected on Ep (a, b), also referred to as basic point, and n is the rank of basic point A, and m indicates Ep
The number put on (a, b), h=(int) (m/n), value is positive integer, if the second Chosen Point is B, B is also one on Ep (a, b)
A point.Selection for a, b value should meet 4a3+27b2≠0(mod p)。
In above-described embodiment, it can prevent from reading the electronic labeling information forged and confidential information leakage, pass through setting
Reader determines whether electronic tag to be identified is the electronic tag of camouflage with electronic tag value range, and passes through ciphertext
Form is transmitted into row information and decrypts to obtain the feedback information of electronic tag to be identified, using one apart from value information as ciphertext
Point, since electronic tag is every time apart from the distance value of reader difference, not only hacker is avoided also with real-time with randomness
Primary the case where just putting things right once and for all is cracked, is not easy to be cracked, improves security performance.
Fig. 2 is that the flow of electronic tag, reader and server that one embodiment of the invention provides interacts schematic diagram;
Electronic tag to be identified is expressed as electronic tag;
1. reader sends RF pulse signal;
2. electronic tag is waken up, feedback link signal;
3. reader determines the distance value of the electronic tag to be identified and reader according to connection signal;
4. in reader transmission range value to server;
5. server judges whether the distance value belongs within the scope of pre-determined distance value;
6.1. it if belonged to, sends ciphertext and obtains in signal to the reader;
If or 6.2. is not belonging to, and sends connection failure information;
7. reader chooses the first Chosen Point in default interval, and obtains public affairs according to the first Chosen Point and private key
Key;
8. the interval, the first Chosen Point, distance value and public key are sent to the electronics mark to be identified by reader
In label;
9. choosing the second Chosen Point in interval, feedback information will be needed to encode to the second Chosen Point, and generate with
Machine number is worth to anti-fake number by random number and distance, and by public key, the first Chosen Point and feedback information is carried by anti-fake number
Second Chosen Point is encoded into ciphertext data packet;
10. electronic tag sends ciphertext data packet;
11. calculating is decrypted to ciphertext data packet by private key in reader, the plaintext of the second Chosen Point is obtained, according to bright
Text obtains the feedback information of the second Chosen Point carrying.
In above-described embodiment, data interaction between reader, electronic tag and server, server is to electronic tag
Legitimacy is verified, and in reader and electronic tag interactive process, is transmitted into row information in the form of ciphertext, by instant
The distance value of generation reinforces the anti-power of cracking of ciphertext, prevents interception facility eavesdropping information and identification.
Optionally, as an embodiment of the present invention, described that public key is obtained according to the first Chosen Point and private key, it is specific to wrap
It includes:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
R indicates interval, therefore the data that reader is sent to electronic tag to be identified are:Interval R and public key Y=
s A。
In above-described embodiment, public key will be obtained by private key and the first Chosen Point, according to Cryptography Principles, public key and basic point
Private key cannot be found out by inverse operation, eavesdrops effect, ensured the safety of communication.
Optionally, as an embodiment of the present invention, the generation random number, is obtained by the random number and distance value
To anti-fake number, the public key, the first Chosen Point and the second Chosen Point are encoded by ciphertext data packet by the anti-fake number, specifically
Including:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified and reader
Distance value;
The second of the public key, the first Chosen Point and carrying feedback information is selected according to formula K1=B+t Y and K2=t A
Fixed point is encoded into ciphertext data packet, and wherein K1 is the first ciphertext, and K2 is the second ciphertext, and B is to carry the second of feedback information to select
Point, Y are public key, and A is the first Chosen Point, and the feedback information includes product information or personal information.
Such as the number " ID152 " of product information and producer's identifier number " SN45 " are written in the second Chosen Point B, it obtains
Second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded by the second Chosen Point B for carrying feedback information
Ciphertext data packet.
In another example the number " ID0051 " of personal information and authentication information " 15845 " are written in the second Chosen Point B,
The the second Chosen Point B for obtaining carrying feedback information, by public key, the first Chosen Point and the second Chosen Point B volumes for carrying feedback information
Code is at ciphertext data packet.
In above-described embodiment, distance value and random number are combined and obtain anti-fake number, anti-fake number is not easy to be identified, by anti-fake
Number is combined with the second Chosen Point, prevents interception facility from directly acquiring the feedback information of the second Chosen Point carrying, good confidentiality.
Optionally, as an embodiment of the present invention, the generation random number, is obtained by the random number and distance value
To anti-fake number, the public key, the first Chosen Point and the second Chosen Point are encoded by ciphertext data packet by the anti-fake number, specifically
Including:
The first ciphertext K1=B+t Y and the second ciphertext K2=t A are obtained from the ciphertext data packet, according to formula B=
Calculating is decrypted in K1-sK2, obtains the plaintext of second Chosen Point and anti-fake number, and the plaintext includes carrying feedback information
The second Chosen Point B, feedback information is obtained according to the second Chosen Point B.
Therefore the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A.
Lower mask body introduces decrypting process:
Reader is the promoter of communication, generates public key Y=s A;
The anti-fake number that server generates is t=r n, the first ciphertext is K1=B+t Y, the second ciphertext is K2=tA;
K1 and K2 are brought into formula and are calculated according to formula B=K1-sK2 by reader:
B=K1-sK2
=(B+t Y)-s (t A)
=B+t (Y-sA)
=B
The plaintext for obtaining the second Chosen Point B obtains the feedback information of its carrying by the second Chosen Point B.
For example, the feedback information that the second Chosen Point B is carried is:The number " ID152 " and producer's identifier number of product information
Second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by " SN45 ".
The process that reader is decrypted is:
The first ciphertext K1=B (ID152+SN45)+t Y in the ciphertext data packet and the second ciphertext K2=t A, read-write
K1 and K2 are brought into formula and are calculated according to formula B=K1-sK2 by device:
B=K1-sK2
=[B (ID152+SN45)+t Y)]-s (t A)
=B (ID152+SN45)+t (Y-sA)
Due to public key Y=s A, the plaintext of the second Chosen Point B is obtained by public key, to obtain the feedback letter of electronic tag
It ceases " ID152+SN45 ".
In another example the feedback information that the second Chosen Point B is carried is:The number " ID0051 " of personal information and authentication letter
It ceases " 15845 ", the second Chosen Point B of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet.
The process that reader is decrypted is:
The first ciphertext K1=B (ID0051+15845)+t Y in the ciphertext data packet and the second ciphertext K2=t A are read
Device is write according to formula B=K1-sK2, K1 and K2 are brought into formula and calculated:
B=K1-sK2
=[B (ID0051+15845)+t Y)]-s (t A)
=B (ID0051+15845)+t (Y-sA)
Due to public key Y=s A, the plaintext of the second Chosen Point B is obtained by public key, to obtain the feedback letter of electronic tag
It ceases " ID0051+15845 ".
In above-described embodiment, reader is decrypted electronic tag to be identified by private key s, reader and electronic tag
Information exchange is realized by asymmetrical encryption and decryption means, prevents from being passed through near reader and electronic tag by attacker
Audiomonitor is placed to monitor communication data, and then analyzes and cracks system key, obtains real information.
Fig. 3 is the method flow diagram for the radio-frequency identification method that another embodiment of the present invention provides;
Optionally, as an embodiment of the present invention, it is improved on the basis of Fig. 1, as shown in figure 3, further including
Step:
Step S101:Random number n is sent in the reader by electronic tag to be identified;
Step S102:The random number n and obtained anti-fake number are sent in the server by the reader;
Step S103:Distance value r ' is calculated according to r '=t/n in the server, by distance value r ' and is calculated
Distance value r is compared, if the two is identical, it is without exception as a result, otherwise electricity to be identified to obtain electronic tag to be identified
Subtab exists abnormal.
In above-described embodiment, when information exchange is completed, the distance value that can be returned to electronic tag to be identified is tested
Card, prevents attacker from distorting the data of electronic tag.
It is to be understood that random number n can be sent in reader together with ciphertext data packet in step S101;
That is step S5 can be replaced:Electronic tag to be identified chooses the second Chosen Point in interval, will need feedback letter
On breath coding to the second Chosen Point, and random number is generated, anti-fake number is worth to by random number and distance, it will be public by anti-fake number
Second Chosen Point of key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by ciphertext data packet and random number n
It is sent in reader together;
In above-described embodiment, in information interactive process, even if audiomonitor listens to random number information, also it is not easy to obtain
Know apart from value information, and server can calculate distance value easily by random number, and then calculated distance value is carried out
Verification judges electronic labeling information with the presence or absence of abnormal.
Fig. 4 is that the flow of electronic tag, reader and server that another embodiment of the present invention provides interacts schematic diagram;
It is improved on the basis of Fig. 2, as shown in Figure 4:
Electronic tag to be identified is expressed as electronic tag;
12. the anti-fake number that reader sends random number n and obtains;
13. distance value r ' is calculated according to r '=t/n in server, by distance value r ' and calculated distance value r into
Row compares, if the two is identical, obtains that electronic tag to be identified is without exception as a result, otherwise there are different for electronic tag to be identified
Often.
In above-described embodiment, server end can quickly calculate distance value by random number and computation rule, in turn
Calculated distance value is verified, judges electronic labeling information with the presence or absence of abnormal.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is determined according to the connection signal
With the distance value of reader, specifically include:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
In above-described embodiment, distance value is determined, in a certain range by the connection distance setting of electronic tag and reader,
Prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Optionally, as an embodiment of the present invention, further include step:
When the server judges that the distance value belongs to pre-determined distance value range, the reader is called to be waited for described
Identify that electronic tag sends checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described
Reader sends ciphertext and obtains signal.
Specifically, information to be verified can be identification code, it is made of, can be pre-set for storing identification code number and character
Database, identification code is set in advance in electronic tag, belongs in database if electronic tag to be identified can be fed back
Information of identification code, then its authentication success, if electronic tag to be identified can not feedback identifying code information or transmission knowledge
Other code Information Authentication failure, then the electronic tag to be identified may be the electronic tag of camouflage.
In above-described embodiment, in electronic tag and reader access phase, further verification can be made to electronic tag,
Judge its legitimacy, prevents distance value of the electronic tag of camouflage apart from reader from also pretending to be legal electricity in preset range value
Subtab.
Specifically, the RF signal power that the electronic tag to be identified is obtained according to connection signal intensity, specifically
Including:
The connection signal of electronic tag to be identified is amplified;
Amplified connection signal is filtered;
It is carried out being converted to RF signal power according to the electric signal being filtered.
In above-described embodiment, initial signal is amplified, is filtered and can obtain accurate performance number.
Fig. 5 is the module frame chart for the radio-frequency recognition system that one embodiment of the invention provides;
As shown in figure 5, the present invention also provides a kind of radio-frequency recognition systems, including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electricity to be identified
When the connection signal that subtab is sent, determine the electronic tag to be identified at a distance from reader according to the connection signal
Value, the distance value is sent in server;
Server, it is close from the elliptic curve pre-established when for judging that the distance value belongs to pre-determined distance value range
Interval is obtained in code model, sending ciphertext to the reader obtains signal and the interval, if being not belonging to
The reader is called to send connection failure information to the electronic tag to be identified;
The reader is additionally operable to choose the first Chosen Point in the interval according to ciphertext acquisition signal,
And public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent out
It send into the electronic tag to be identified;
The electronic tag to be identified encodes feedback information for choosing the second Chosen Point in the interval
On to second Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by described anti-fake
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet by number, by the ciphertext
Data packet is sent in the reader;
The reader is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, obtains the second Chosen Point
Plaintext, according to the plaintext obtain the second Chosen Point carrying feedback information.
Specifically, the setting for interval, can be used following method:Establish elliptic curve cryptography model
(Elliptic Curves Cryptography), elliptic curve E is obtained by elliptic curve cryptography modelp(a, b), Ep
(a, b) is used as interval;Elliptic curve is defined in finite field, need to meet equation:y2≡x3+ ax+b (mod p) elliptic curve
And relative influence variable can use Effect=(p, a, b, A, n, h) indicate, wherein p, a and b be used for describe elliptic curve Ep (a,
B), the first Chosen Point is set as A, and A is the point selected on Ep (a, b), also referred to as basic point, and n is the rank of basic point A, and m indicates Ep
The number put on (a, b), h=(int) (m/n), value is positive integer, if the second Chosen Point is B, B is also one on Ep (a, b)
A point.Selection for a, b value should meet 4a3+27b2≠0(mod p)。
In above-described embodiment, it can prevent from reading the electronic labeling information forged and confidential information leakage, pass through setting
Reader determines whether electronic tag to be identified is the electronic tag of camouflage with electronic tag value range, and passes through ciphertext
Form is transmitted into row information and decrypts to obtain the feedback information of electronic tag to be identified, using one apart from value information as ciphertext
Point, since electronic tag is every time apart from the distance value of reader difference, not only hacker is avoided also with real-time with randomness
Primary the case where just putting things right once and for all is cracked, is not easy to be cracked, improves security performance.
Fig. 6 is the data flow schematic diagram of electronic tag, reader and server that one embodiment of the invention provides;
As shown in 6 figures, optionally, as an embodiment of the present invention, the reader is specifically used for:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
R indicates interval, therefore the data that reader is sent to electronic tag to be identified are:Interval R and public key Y=
s A;
In above-described embodiment, public key will be obtained by private key and the first Chosen Point, according to Cryptography Principles, public key and basic point
Private key cannot be found out by inverse operation, eavesdrops effect, ensured the safety of communication.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is specifically used for:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified and reader
Distance value;
According to formula K1=B+t Y and K2The public key, the first Chosen Point and the second Chosen Point are encoded into ciphertext by=t A
Data packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is public key, A the
One Chosen Point, the feedback information include product information or personal information.
Therefore the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A.
In above-described embodiment, not only by random number code at ciphertext, but distance value r and random number are obtained anti-fake
Number t, therefore can be when electronic tag to be identified be fed back in the information and the second Chosen Point of guard space value r feedback information,
It also allows for reader and further verification is made to the distance value r of return, and solve the problems, such as that random number is easily identified.
Optionally, as an embodiment of the present invention, the reader also particularly useful for:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2=t A, according to formula B=
K1-sK2Calculating is decrypted, obtains the plaintext of second Chosen Point and anti-fake number, the plaintext includes carrying feedback information
Second Chosen Point B obtains feedback information according to the second Chosen Point B.
Lower mask body introduces decrypting process:
Reader is the promoter of communication, generates public key Y=s A;
The anti-fake number that server generates is t=r n, the first ciphertext is K1=B+t Y, the second ciphertext are K2=t A;
Reader is according to formula B=K1-sK2, by K1And K2It brings into formula and is calculated:
B=K1-sK2
=(B+t Y)-s (t A)
=B+t (Y-sA)
=B
The plaintext for obtaining the second Chosen Point B obtains the feedback information of its carrying by the second Chosen Point B.
In above-described embodiment, reader is decrypted electronic tag to be identified by private key s, reader and electronic tag
Information exchange is realized by asymmetrical encryption and decryption means, prevents from being passed through near reader and electronic tag by attacker
Audiomonitor is placed to monitor communication data, and then analyzes and cracks system key, obtains real information.
Optionally, as an embodiment of the present invention, the electronic tag to be identified is additionally operable to send random number n
To in the reader;
Therefore, the data that electronic tag to be identified is sent to reader are:K1=B+t Y, K2=t A and random number n;
The reader is additionally operable to the random number n and obtained anti-fake number being sent in the server;
The server is additionally operable to that distance value r ' is calculated according to r '=t/n, by distance value r ' and be calculated away from
It is compared from value r, if the two is identical, obtains the without exception of electronic tag to be identified as a result, otherwise electronics to be identified
Label exists abnormal.
In above-described embodiment, the distance value returned to electronic tag to be identified is verified, and prevents attacker by reading
It writes device and electronic tag is placed around audiomonitor to monitor communication data, and then analyze and crack system key, obtain true letter
Breath.
Optionally, as an embodiment of the present invention, the reader also particularly useful for:
The RF signal power of the electronic tag to be identified is obtained according to connection signal intensity;
The distance value of the electronic tag to be identified and reader is determined according to the RF signal power.
In above-described embodiment, distance value is determined, in a certain range by the connection distance setting of electronic tag and reader,
Prevent the electronic tag not pretended within the scope of pre-determined distance value from carrying out data transmission.
Optionally, as an embodiment of the present invention, the server is additionally operable to:
When judging that the distance value belongs to pre-determined distance value range, call the reader to the electronics mark to be identified
It signs and issues and send checking solicited message;
The information to be verified sent according to the electronic tag to be identified is verified, if be proved to be successful, to described
Reader sends ciphertext and obtains signal.
Specifically, information to be verified can be identification code, it is made of, can be pre-set for storing identification code number and character
Database, identification code is set in advance in electronic tag, belongs in database if electronic tag to be identified can be fed back
Information of identification code, then its authentication success, if electronic tag to be identified can not feedback identifying code information or transmission knowledge
Other code Information Authentication failure, then the electronic tag to be identified may be the electronic tag of camouflage.
In above-described embodiment, in electronic tag and reader access phase, further verification can be made to electronic tag,
Judge its legitimacy, prevents distance value of the electronic tag of camouflage apart from reader from also pretending to be legal electricity in preset range value
Subtab.
Specifically, the RF signal power for obtaining the electronic tag to be identified according to connection signal intensity is:
The connection signal of electronic tag to be identified is amplified;
Amplified connection signal is filtered;
It is carried out being converted to RF signal power according to the electric signal being filtered.
In above-described embodiment, initial signal is amplified, is filtered and can obtain accurate performance number.
Fig. 7 is the module frame chart for the reader that one embodiment of the invention provides;
As shown in fig. 7, the present invention also provides a kind of readers, including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection
Signal determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;Also use
Signal and interval are obtained in receiving the ciphertext that server is sent, the interval is that the server judges the distance
When value belongs to pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point, and root for obtaining signal according to the ciphertext in the interval
Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to
In the electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified are described close
Literary data packet is that the electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to institute
It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, and it is selected to obtain described second
The plaintext of point obtains the feedback information of the second Chosen Point carrying according to the plaintext.
The present invention can prevent from reading the electronic labeling information forged and confidential information leakage, by the reader of setting with
Electronic tag value range come determine electronic tag to be identified whether be camouflage electronic tag, and pass through the form of ciphertext carry out
The information that electronic tag to be identified carries is transmitted and decrypted to obtain to information, using apart from value information as a part for ciphertext, due to
Electronic tag apart from the distance value of reader difference, not only avoids hack one with randomness also with real-time every time
It secondary the case where just putting things right once and for all, is not easy to be cracked, improves security performance;Further prevent attacker by palming off reader,
Label data is obtained from legitimate tag, resets label information;Background data base information is obtained by forging label, distorts system
Core data;
Therefore, three layers of control are carried out for the safety of identification:First, in access phase, i.e. electronic tag and reader
The identity of electronic tag need to be verified by establishing when connection, need to carry out information exchange in pre-determined distance value range;Second, in information exchange
Stage carries out information protection, when transmitting information with legal electronic tag, using its actual distance value as anti-fake number, and passes through
The form of ciphertext transmits important information, reinforces the anti-power of cracking of ciphertext;Third, when information exchange is completed, for electronic tag
Transmission ciphertext be decrypted after verified again;To greatly improve security performance.
Reader should be understood that in the description of this specification reference term " one embodiment ", " is shown " some embodiments "
The description of example ", " specific example " or " some examples " etc. mean specific features described in conjunction with this embodiment or example, structure,
Material or feature are included at least one embodiment or example of the invention.In the present specification, above-mentioned term is shown
The statement of meaning property need not be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described
It may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, without conflicting with each other, this
The technical staff in field can be by the spy of different embodiments or examples described in this specification and different embodiments or examples
Sign is combined.
It is apparent to those skilled in the art that for convenience of description and succinctly, the dress of foregoing description
The specific work process with unit is set, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit, only
A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.
The unit illustrated as separating component may or may not be physically separated, and be shown as unit
Component may or may not be physical unit, you can be located at a place, or may be distributed over multiple networks
On unit.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the embodiment of the present invention
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, can also be during two or more units are integrated in one unit.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product
To be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention substantially or
Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Out, which is stored in a storage medium, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes all or part of each embodiment method of the present invention
Step.And storage medium above-mentioned includes:It is USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random
Access various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD
Matter.
More than, specific implementation mode only of the invention, but scope of protection of the present invention is not limited thereto, and it is any to be familiar with
Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions,
These modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be wanted with right
Subject to the protection domain asked.
Claims (10)
1. a kind of radio-frequency identification method, which is characterized in that include the following steps:
Reader sends RF pulse signal, to wake up electronic tag to be identified;
When the reader receives the connection signal that electronic tag to be identified is sent, waited for according to described in connection signal determination
It identifies the distance value of electronic tag and reader, and the distance value is sent in server;
When the server judges that the distance value belongs to pre-determined distance value range, from the elliptic curve cipher mould pre-established
Interval is obtained in type, sending ciphertext to the reader obtains signal and the interval;
The reader obtains signal according to the ciphertext and chooses the first Chosen Point in the interval, and according to described the
One Chosen Point and private key obtain public key, and the interval, the first Chosen Point, distance value and public key are sent to and described wait knowing
In other electronic tag;
The electronic tag to be identified chooses the second Chosen Point in the interval, and feedback information is encoded to described second
On Chosen Point, and random number is generated, anti-fake number is worth to by the random number and distance, by the anti-fake number by the public affairs
Second Chosen Point of key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, and the ciphertext data packet is sent
To in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of second Chosen Point,
The feedback information of the second Chosen Point carrying is obtained according to the plaintext.
2. radio-frequency identification method according to claim 1, which is characterized in that described to be obtained according to the first Chosen Point and private key
Public key specifically includes:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
3. radio-frequency identification method according to claim 2, which is characterized in that the generation random number, by described random
Number and distance are worth to anti-fake number, are encoded into the public key, the first Chosen Point and the second Chosen Point by the anti-fake number close
Literary data packet, specifically includes:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified at a distance from reader
Value;
According to formula K1=B+t Y and K2=t A by the public key, the first Chosen Point and carry feedback information the second Chosen Point
It is encoded into ciphertext data packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is
Public key, A are the first Chosen Point, and the feedback information includes product information or personal information.
4. radio-frequency identification method according to claim 3, which is characterized in that it is described by private key to the ciphertext data packet
Calculating is decrypted, obtains the plaintext of second Chosen Point, the feedback letter of the second Chosen Point carrying is obtained according to the plaintext
Breath, specifically includes:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2=t A;
According to formula B=K1-sK2Calculating is decrypted, obtains the plaintext of second Chosen Point and anti-fake number, the plaintext packet
The the second Chosen Point B for carrying feedback information is included, feedback information is obtained according to the second Chosen Point B.
5. radio-frequency identification method according to claim 4, which is characterized in that further include step:
Random number n is sent in the reader by the electronic tag to be identified;
The random number n and obtained anti-fake number are sent in the server by the reader;
Distance value r ' is calculated according to r '=t/n in the server, and distance value r ' and calculated distance value r are compared
Compared with if the two is identical, obtaining electronic tag to be identified result without exception.
6. a kind of radio-frequency recognition system, which is characterized in that including:
Reader, for sending RF pulse signal, to wake up electronic tag to be identified;It is additionally operable to receive electronics mark to be identified
When signing and issuing the connection signal sent, the distance value of the electronic tag to be identified and reader is determined according to the connection signal, and
The distance value is sent in server;
Server, when for judging that the distance value belongs to pre-determined distance value range, from the elliptic curve cipher mould pre-established
Interval is obtained in type, sending ciphertext to the reader obtains signal and the interval;
The reader is additionally operable to choose the first Chosen Point, and root in the interval according to ciphertext acquisition signal
Public key is obtained according to first Chosen Point and private key, and the interval, the first Chosen Point, distance value and public key are sent to
In the electronic tag to be identified;
The electronic tag to be identified encodes feedback information to institute for choosing the second Chosen Point in the interval
It states on the second Chosen Point, and generates random number, anti-fake number is worth to by the random number and distance, it will by the anti-fake number
Second Chosen Point of the public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet, by the ciphertext data
Packet is sent in the reader;
Calculating is decrypted to the ciphertext data packet by private key in the reader, obtains the plaintext of the second Chosen Point, according to
The plaintext obtains the feedback information of the second Chosen Point carrying.
7. radio-frequency recognition system according to claim 6, which is characterized in that the reader is specifically used for:
Public key Y is obtained according to formula Y=s A, wherein A is the first Chosen Point, and s is private key.
8. radio-frequency recognition system according to claim 7, which is characterized in that the electronic tag to be identified is specifically used for:
Random number n is generated, anti-fake several t are obtained according to formula t=r n, wherein r is electronic tag to be identified at a distance from reader
Value;
According to formula K1=B+t Y and K2The public key, the first Chosen Point and the second Chosen Point are encoded into ciphertext data by=t A
Packet, wherein K1For the first ciphertext, K2For the second ciphertext, B is the second Chosen Point for carrying feedback information, and Y is public key, and A is the first choosing
Fixed point, the feedback information includes product information or personal information.
9. radio-frequency recognition system according to claim 8, which is characterized in that the reader also particularly useful for:
The first ciphertext K is obtained from the ciphertext data packet1=B+t Y and the second ciphertext K2It is selected to obtain described second by=t A
The plaintext and anti-fake number of point, the plaintext include the second Chosen Point B for carrying feedback information, are obtained according to the second Chosen Point B
To feedback information.
10. a kind of reader, which is characterized in that including:
Sending module, for sending RF pulse signal, to wake up electronic tag to be identified;
Distance value acquisition module, when for receiving connection signal that electronic tag to be identified is sent, according to the connection signal
It determines the distance value of the electronic tag to be identified and reader, and the distance value is sent in server;It is additionally operable to connect
It receives the ciphertext that server is sent and obtains signal and interval, the interval is that the server judges the distance value category
When pre-determined distance value range, obtained from the elliptic curve cipher model pre-established;
Processing module chooses the first Chosen Point for obtaining signal according to the ciphertext in the interval, and according to institute
It states the first Chosen Point and private key obtains public key, and the interval, the first Chosen Point, distance value and public key be sent to described
In electronic tag to be identified;
Ciphertext packet-receiving module, the ciphertext data packet sent for receiving the electronic tag to be identified, the ciphertext number
It is that the electronic tag to be identified chooses the second Chosen Point in the interval according to packet, feedback information is encoded to described the
On two Chosen Points, and random number is generated, anti-fake number is worth to by the random number and distance, it will be described by the anti-fake number
Second Chosen Point of public key, the first Chosen Point and carrying feedback information is encoded into ciphertext data packet;
Processing module is additionally operable to that calculating is decrypted to the ciphertext data packet by private key, obtains second Chosen Point
In plain text, the feedback information of the second Chosen Point carrying is obtained according to the plaintext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810385616.3A CN108600230A (en) | 2018-04-26 | 2018-04-26 | A kind of radio-frequency identification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810385616.3A CN108600230A (en) | 2018-04-26 | 2018-04-26 | A kind of radio-frequency identification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108600230A true CN108600230A (en) | 2018-09-28 |
Family
ID=63610245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810385616.3A Pending CN108600230A (en) | 2018-04-26 | 2018-04-26 | A kind of radio-frequency identification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108600230A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205082A (en) * | 2021-12-09 | 2022-03-18 | 北京计算机技术及应用研究所 | Bidirectional identity authentication method and device for reader-writer and electronic tag |
CN117764101A (en) * | 2024-02-22 | 2024-03-26 | 成都普什信息自动化有限公司 | RFID (radio frequency identification) tag-based wine product anti-counterfeiting verification method, system and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100308978A1 (en) * | 2009-04-30 | 2010-12-09 | Certicom Corp. | System and method for authenticating rfid tags |
CN102236773A (en) * | 2010-04-30 | 2011-11-09 | 航天信息股份有限公司 | Radio frequency identification (RFID) encryption verification system and method |
CN102542227A (en) * | 2011-12-26 | 2012-07-04 | 西北工业大学 | Built-up jig assembling detection method based on radio frequency identification devices (RFID) |
US20130106580A1 (en) * | 2011-10-31 | 2013-05-02 | Seoul National University Of Technology Center For Industry Collaboration | Rfid system and communication method thereof |
CN106508106B (en) * | 2010-12-24 | 2013-12-25 | 中国电子技术标准化研究院 | For RF identification read write line to label communication means |
CN104219046A (en) * | 2014-10-09 | 2014-12-17 | 山东师范大学 | Active RFID (radio frequency identification) encryption method based on light-weighted asymmetric encryption algorithm |
CN105871904A (en) * | 2016-05-25 | 2016-08-17 | 电子科技大学 | Security authentication protocol for limited distance of RFID (Radio Frequency Identification) |
CN107017997A (en) * | 2017-06-01 | 2017-08-04 | 国网江苏省电力公司电力科学研究院 | A kind of auth method, reader and label |
CN107247260A (en) * | 2017-07-06 | 2017-10-13 | 合肥工业大学 | A kind of RFID localization methods based on adaptive depth confidence network |
-
2018
- 2018-04-26 CN CN201810385616.3A patent/CN108600230A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100308978A1 (en) * | 2009-04-30 | 2010-12-09 | Certicom Corp. | System and method for authenticating rfid tags |
CN102236773A (en) * | 2010-04-30 | 2011-11-09 | 航天信息股份有限公司 | Radio frequency identification (RFID) encryption verification system and method |
CN106508106B (en) * | 2010-12-24 | 2013-12-25 | 中国电子技术标准化研究院 | For RF identification read write line to label communication means |
US20130106580A1 (en) * | 2011-10-31 | 2013-05-02 | Seoul National University Of Technology Center For Industry Collaboration | Rfid system and communication method thereof |
CN102542227A (en) * | 2011-12-26 | 2012-07-04 | 西北工业大学 | Built-up jig assembling detection method based on radio frequency identification devices (RFID) |
CN104219046A (en) * | 2014-10-09 | 2014-12-17 | 山东师范大学 | Active RFID (radio frequency identification) encryption method based on light-weighted asymmetric encryption algorithm |
CN105871904A (en) * | 2016-05-25 | 2016-08-17 | 电子科技大学 | Security authentication protocol for limited distance of RFID (Radio Frequency Identification) |
CN107017997A (en) * | 2017-06-01 | 2017-08-04 | 国网江苏省电力公司电力科学研究院 | A kind of auth method, reader and label |
CN107247260A (en) * | 2017-07-06 | 2017-10-13 | 合肥工业大学 | A kind of RFID localization methods based on adaptive depth confidence network |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205082A (en) * | 2021-12-09 | 2022-03-18 | 北京计算机技术及应用研究所 | Bidirectional identity authentication method and device for reader-writer and electronic tag |
CN114205082B (en) * | 2021-12-09 | 2024-01-26 | 北京计算机技术及应用研究所 | Bidirectional identity authentication method and equipment for reader-writer and electronic tag |
CN117764101A (en) * | 2024-02-22 | 2024-03-26 | 成都普什信息自动化有限公司 | RFID (radio frequency identification) tag-based wine product anti-counterfeiting verification method, system and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102782694B (en) | Apparatus, method and system for data security | |
US10817874B2 (en) | Purchase transaction system with encrypted payment card data | |
US9734322B2 (en) | System and method for authenticating RFID tags | |
CN103258169B (en) | Method, chip card and chip card terminal that protection chip card is used without permission | |
KR101450291B1 (en) | Server for authenticating smart chips and method thereof | |
CN102171969A (en) | A method for operating a network, a system management device, a network and a computer program therefor | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
CN103380592A (en) | Method, server and system for authentication of a person | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
KR101856682B1 (en) | Entity authentication method and device | |
CN106899584A (en) | Management method and its device that a kind of hardware device is accessed | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
CN104125239B (en) | A kind of method for network authorization transmitted based on data link encryption and system | |
CN110138736B (en) | Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number | |
CN108600230A (en) | A kind of radio-frequency identification method and system | |
CN113890724A (en) | Access authentication method and system for power Internet of things communication equipment | |
CN110650019B (en) | RFID authentication method and system based on PUF and security sketch | |
CN104883260B (en) | Certificate information processing and verification method, processing terminal and authentication server | |
Ranasinghe et al. | Confronting security and privacy threats in modern RFID systems | |
CN104820807B (en) | A kind of intelligent card data processing method | |
CN104915689B (en) | A kind of smart card information processing method | |
CN104780049B (en) | A kind of method of safe read-write data | |
EP3035589A1 (en) | Security management system for authenticating a token by a service provider server | |
Alshehri et al. | Formally defining NFC M-coupon requirements, with a case study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |