CN109190725B - A kind of RFID two-way authentication method - Google Patents

A kind of RFID two-way authentication method Download PDF

Info

Publication number
CN109190725B
CN109190725B CN201810792139.2A CN201810792139A CN109190725B CN 109190725 B CN109190725 B CN 109190725B CN 201810792139 A CN201810792139 A CN 201810792139A CN 109190725 B CN109190725 B CN 109190725B
Authority
CN
China
Prior art keywords
tag
parameter
reader
balance
taddress
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810792139.2A
Other languages
Chinese (zh)
Other versions
CN109190725A (en
Inventor
王思叶
张艳芳
张珠君
黄伟庆
诸邵忆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201810792139.2A priority Critical patent/CN109190725B/en
Publication of CN109190725A publication Critical patent/CN109190725A/en
Application granted granted Critical
Publication of CN109190725B publication Critical patent/CN109190725B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a RFID bidirectional authentication method. The method comprises the following steps: receiving a first parameter C1, a random number N, a tag account address TAddress and a reader-writer account address RAddress which are sent by a reader-writer; if the fact that the tag account address TAddress is stored in the self-maintained block chain is known, a second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N; if the first parameter C1 is equal to the second parameter C2, it is judged that the reader-writer authenticates the tag successfully at this time, and according to the balance balancBC of the tag account and the random number N, a third parameter C3 is generated and sent to the tag through the reader-writer, so that the tag obtains the authentication result of the tag to the reader-writer based on the third parameter C3. The block chain technology is combined with the RFID technology, and the block chain is essentially a distributed account book maintained by each node in the network, so that the method provided by the invention can ensure the privacy of each tag under the condition of no database and no trusted third party while finishing the security authentication.

Description

一种RFID双向认证方法A kind of RFID two-way authentication method

技术领域technical field

本发明实施例涉及射频识别技术领域,尤其涉及一种RFID双向认证方法。Embodiments of the present invention relate to the technical field of radio frequency identification, and in particular, to an RFID two-way authentication method.

背景技术Background technique

射频识别(RFID)技术近年来发展迅速,广泛应用于库存管理,供应链,产品跟踪,运输,物流和自助超市等各种应用。RFID系统通常由一个或多个RFID读写器,一大批RFID标签和一个后端服务器组成。每个标签都附着在一个物理对象上,读写器可以通过与相应的标签进行通信来识别或追踪对象。由于标签和读写器之间的通信是通过射频信号无线传输的,攻击者可以实施诸如窃听、重放、篡改、Dos等类型的攻击,以此获取到敏感标签信息或影响整个RFID系统的正常工作。为了解决这些问题,许多认证安全协议被提出。Radio frequency identification (RFID) technology has developed rapidly in recent years and is widely used in various applications such as inventory management, supply chain, product tracking, transportation, logistics, and self-service supermarkets. An RFID system usually consists of one or more RFID readers, a large number of RFID tags and a back-end server. Each tag is attached to a physical object, and the reader can identify or track the object by communicating with the corresponding tag. Since the communication between the tag and the reader is wirelessly transmitted through radio frequency signals, attackers can implement types of attacks such as eavesdropping, replay, tampering, Dos, etc., in order to obtain sensitive tag information or affect the normal operation of the entire RFID system. Work. To solve these problems, many authentication security protocols have been proposed.

最早的RFID认证协议是Sarma等人提出的Hash-Lock协议。此协议的认证过程如图1所示,图1为Hash-Lock协议认证过程图。每个标签内存储自己的{metaID,ID}字段,其中metaID是hash函数映射标签密钥key得到的。后台服务器中存储着n条{metaID,ID,key}记录,分别对应n个标签。认证过程开始后,读写器首先发送一个Request质询开始通信。标签收到此消息后,将自己存储的metaID发送给读写器。读写器收到后,将metaID继续传送给后端服务器。服务器收到后,检查数据库中是否存在一条记录,其中的metaID与收到的一致,若存在,就将对应的ID和key发给读写器,否则认证失败即停止。读写器在收到服务器发来的{ID,key}后,将key发送给标签,标签收到后,计算hash(key)是否与自己存储的metaID一致,若一致则标签认证读写器通过,然后将ID发送给读写器,否则,认证失败即停止。读写器收到标签发送过来的ID后,与服务器发送过来的ID进行对比,相同的话则读写器认证标签成功,否则认证失败即停止。The earliest RFID authentication protocol is the Hash-Lock protocol proposed by Sarma et al. The authentication process of this protocol is shown in Figure 1, which is a diagram of the Hash-Lock protocol authentication process. Each tag stores its own {metaID, ID} field, where metaID is obtained by mapping the tag key key by the hash function. The backend server stores n records of {metaID, ID, key}, corresponding to n tags respectively. After the authentication process begins, the reader first sends a Request challenge to start communication. After the tag receives this message, it sends its own stored metaID to the reader. After the reader receives it, it will continue to transmit the metaID to the backend server. After the server receives it, it checks whether there is a record in the database, and the metaID in it is consistent with the received one. If it exists, it sends the corresponding ID and key to the reader, otherwise the authentication fails and stops. After the reader receives the {ID, key} from the server, it sends the key to the tag. After the tag receives it, it calculates whether the hash (key) is consistent with the metaID stored by itself. If they are consistent, the tag authentication reader passes. , and then send the ID to the reader, otherwise, the authentication fails and stops. After the reader receives the ID sent by the tag, it compares it with the ID sent by the server. If it is the same, the reader authenticates the tag successfully, otherwise the authentication fails and stops.

为了改进初始RFID协议的各项安全性,后续不断出现了大量RFID协议。比如随机化的Hash-Lock协议、Hash链协议、基于Hash的ID变化协议、David的数字图书馆RFID协议和分布式RFID询问-应答认证协议等。这些协议都在原有的基础上改进了某个或某几个方面的安全性,使RFID的应用越来越成熟。比如随机化的Hash-Lock协议引入了随机数的概念,每次标签与读写器的交互都将一个变化的随机数加入到hash计算中,从而进一步保证标签ID的隐私性。而David的数字图书馆RFID协议不仅引入了随机数,还将加解密技术应用到了协议中,是一种基于预共享秘密的伪随机数实现的RFID协议,此协议的设计并没有出现比较明显的安全漏洞。In order to improve the security of the initial RFID protocol, a large number of RFID protocols continue to emerge. Such as randomized Hash-Lock protocol, Hash chain protocol, Hash-based ID change protocol, David's digital library RFID protocol and distributed RFID challenge-response authentication protocol. These protocols have improved the security of one or several aspects on the original basis, making the application of RFID more and more mature. For example, the randomized Hash-Lock protocol introduces the concept of random numbers. Every time the tag interacts with the reader, a changing random number is added to the hash calculation, thereby further ensuring the privacy of the tag ID. David's digital library RFID protocol not only introduces random numbers, but also applies encryption and decryption technology to the protocol. It is an RFID protocol based on pre-shared secret pseudo-random numbers. The design of this protocol does not appear to be relatively obvious. security breach.

原有的RFID协议或多或少都会存在某种攻击的漏洞,比如在Hash-Lock协议、随机化的Hash-Lock协议、Hash链协议中,标签ID是以明文传输的,不能抵御重放攻击、假冒攻击、跟踪攻击等。在基于Hash的ID变化协议中,由于后端服务器更新标签信息与标签更新的时间不同步,因此如果攻击者进行数据阻塞或者干扰,导致电子标签收不到部分认证消息的话,就会造成服务器存储标签数据与标签数据不同步,导致下次认证的失败。即使是安全性较高的协议,如David的数字图书馆RFID协议,因为标签必须完成随机数生成机加解密操作,因此增加了标签设计的复杂度,提高了设计成本,不适合小成本的RFID系统。The original RFID protocol has more or less certain attack loopholes. For example, in the Hash-Lock protocol, the randomized Hash-Lock protocol, and the Hash chain protocol, the tag ID is transmitted in plaintext, which cannot resist replay attacks. , impersonation attacks, tracking attacks, etc. In the Hash-based ID change protocol, since the back-end server updates the label information and the label update time is not synchronized, if the attacker blocks or interferes with the data, so that the electronic label cannot receive part of the authentication message, it will cause the server to store The label data is out of sync with the label data, resulting in the failure of the next authentication. Even if it is a protocol with high security, such as David's digital library RFID protocol, because the tag must complete the encryption and decryption operation of the random number generator, it increases the complexity of the tag design and increases the design cost, which is not suitable for low-cost RFID. system.

一个已有RFID协议的通病就是身份验证的过程需要存储在服务器中的一个集中数据库来支持,因此这种身份验证过程容易受到SQL攻击。一旦这个集中数据库遭到攻击,整个RFID系统都可能瘫痪。并且这种集中式的架构不适合应用在分布式的系统中,无法保证系统中各个子部分的隐私性要求。即使存在为分布式系统设计的RFID协议,也是采用引入可信第三方的方式,这又进一步增加了系统的通信成本。A common problem of existing RFID protocols is that the authentication process needs to be supported by a centralized database stored in the server, so this authentication process is vulnerable to SQL attacks. Once this centralized database is attacked, the entire RFID system may be paralyzed. And this centralized architecture is not suitable for application in distributed systems, and cannot guarantee the privacy requirements of each sub-part of the system. Even if there is an RFID protocol designed for a distributed system, the method of introducing a trusted third party is adopted, which further increases the communication cost of the system.

发明内容SUMMARY OF THE INVENTION

本发明实施例提供一种RFID双向认证方法,用以解决现有技术中RFID双向认证协议安全性不足且不适用于分布式系统的缺陷,提高了认证的安全性,并且,适用于分布式系统。The embodiment of the present invention provides an RFID two-way authentication method, which is used to solve the defect that the security of the RFID two-way authentication protocol in the prior art is insufficient and is not suitable for distributed systems, improves the security of authentication, and is suitable for distributed systems .

本发明实施例提供一种RFID双向认证方法,包括:An embodiment of the present invention provides an RFID two-way authentication method, including:

接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress;Receive the first parameter C1, random number N, tag account address TAddress and reader account address RAddress sent by the reader/writer;

若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2;If it is known that the tag account address TAddress is stored in the blockchain maintained by itself, the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N;

若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果;If it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the reader has successfully authenticated the tag, and the third parameter C3 is generated according to the tag account balance balanceBC and the random number N and sent to the tag through the reader. In order to make the tag based on the third parameter C3, obtain the authentication result of the tag to the reader;

其中,第一参数C1为标签根据标签账户地址TAddress、标签余额balance和读写器发送的随机数N生成,标签账户地址TAddress为区块链根据标签ID生成,读写器账户地址RAddress为区块链根据读写器ID生成。Among them, the first parameter C1 is generated by the tag according to the tag account address TAddress, the tag balance balance and the random number N sent by the reader, the tag account address TAddress is generated by the blockchain according to the tag ID, and the reader account address RAddress is the block Chains are generated based on reader IDs.

本发明实施例提供一种RFID双向认证方法,包括:An embodiment of the present invention provides an RFID two-way authentication method, including:

若第一参数C1与第二参数C2相等,则接收服务器发送的第三参数C3;If the first parameter C1 is equal to the second parameter C2, receive the third parameter C3 sent by the server;

基于第三参数C3,获取标签对读写器的认证结果;Based on the third parameter C3, obtain the authentication result of the tag to the reader;

其中,第三参数C3根据标签账户余额balanceBC和随机数N生成,第一参数C1由读写器发送至服务器,第二参数C2根据标签账户地址TAddress、标签账户余额balanceBC和随机数N生成。The third parameter C3 is generated according to the tag account balance balanceBC and the random number N, the first parameter C1 is sent by the reader to the server, and the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N.

本发明实施例提供的一种RFID双向认证方法,通过将区块链技术与RFID技术相结合,由于区块链本质上是由网络中的每个节点维护的分布式账本,因此本发明实施例提供的方法可以在完成安全认证的同时保证每个标签在没有数据库和可信第三方的情况下的隐私。An RFID two-way authentication method provided by the embodiment of the present invention combines the blockchain technology with the RFID technology. Since the blockchain is essentially a distributed ledger maintained by each node in the network, the embodiment of the present invention The provided method can guarantee the privacy of each tag in the absence of databases and trusted third parties while completing security authentication.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.

图1为Hash-Lock协议认证过程图;Figure 1 is the Hash-Lock protocol authentication process diagram;

图2为根据本发明实施例提供的一种RFID双向认证方法流程图;2 is a flowchart of a method for RFID two-way authentication provided according to an embodiment of the present invention;

图3为根据本发明另一实施例提供的一种RFID双向认证方法流程图;3 is a flowchart of a method for RFID two-way authentication provided according to another embodiment of the present invention;

图4为根据本发明实施例提供的一种基于区块链的多部门合作分布式RFID系统架构图;4 is an architecture diagram of a distributed RFID system based on blockchain for multi-department cooperation provided according to an embodiment of the present invention;

图5为根据本发明实施例提供的一种相互认证RFID协议图;5 is a diagram of a mutual authentication RFID protocol provided according to an embodiment of the present invention;

图6为根据本发明实施例提供的一种服务器的结构框图;6 is a structural block diagram of a server provided according to an embodiment of the present invention;

图7为根据本发明实施例提供的一种标签的结构框图。FIG. 7 is a structural block diagram of a tag provided according to an embodiment of the present invention.

具体实施方式Detailed ways

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

RFID技术中的读写器可以通过与设置在目标对象上的标签进行通信,进而识别或追踪对象。读写器可以对标签进行读写操作,由于标签和读写器之间的通信是通过射频信号无线传输的,攻击者可以实施诸如窃听、重放、篡改、Dos等类型的攻击,以此获取到敏感标签信息或影响整个RFID系统的正常工作,因此,许多RFID双向认证安全协议被提出。RFID双向认证的目的就是防止非授权阅读器浏览标签中存储的部分或全部信息,并授予合法阅读器区分合法标签和非法标签的能力。需要说明的是,以下实施例中,RFID双向认证方法也可称为RFID双向认证协议,即方法与协议具有同样的含义。The reader in RFID technology can identify or track the object by communicating with the tag placed on the target object. The reader can read and write the tag. Since the communication between the tag and the reader is wirelessly transmitted through radio frequency signals, attackers can implement attacks such as eavesdropping, replay, tampering, and Dos to obtain To sensitive tag information or affect the normal work of the entire RFID system, therefore, many RFID two-way authentication security protocols have been proposed. The purpose of RFID two-way authentication is to prevent unauthorized readers from browsing part or all of the information stored in the tags, and to grant legitimate readers the ability to distinguish legitimate tags from illegal tags. It should be noted that, in the following embodiments, the RFID two-way authentication method may also be called an RFID two-way authentication protocol, that is, the method and the protocol have the same meaning.

图2为根据本发明实施例提供的一种RFID双向认证方法流程图,该方法的执行主体为服务器,如图2所示,该方法包括:FIG. 2 is a flowchart of an RFID two-way authentication method provided according to an embodiment of the present invention. The execution body of the method is a server. As shown in FIG. 2 , the method includes:

步骤201:接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress。Step 201: Receive the first parameter C1, the random number N, the tag account address TAddress and the reader account address RAddress sent by the reader/writer.

步骤202:若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2。Step 202: If it is known that the tag account address TAddress is stored in the blockchain maintained by the self, the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N.

步骤203:若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果。Step 203: If it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the reader has successfully authenticated the tag this time, and according to the tag account balance balanceBC and the random number N, the third parameter C3 is generated and sent through the reader. to the tag, so that the tag obtains the authentication result of the tag to the reader based on the third parameter C3.

其中,第一参数C1为标签根据标签账户地址TAddress、标签余额balance和读写器发送的随机数N生成,标签账户地址TAddress为区块链根据标签ID生成,读写器账户地址RAddress为区块链根据读写器ID生成。Among them, the first parameter C1 is generated by the tag according to the tag account address TAddress, the tag balance balance and the random number N sent by the reader, the tag account address TAddress is generated by the blockchain according to the tag ID, and the reader account address RAddress is the block Chains are generated based on reader IDs.

需要说明的是,本发明实施例中涉及到的硬件设备为:服务器、读写器和标签。其中,服务器用于获取读写器对标签的认证结果,并当认证结果为认证成功时,协助标签获取标签对读写器的认证结果,以完成读写器和标签的双向认证。It should be noted that the hardware devices involved in the embodiments of the present invention are: a server, a reader/writer, and a tag. Among them, the server is used to obtain the authentication result of the reader to the tag, and when the authentication result is successful, it assists the tag to obtain the authentication result of the tag to the reader, so as to complete the two-way authentication between the reader and the tag.

其中,步骤201的具体过程为:服务器接收读写器发送第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress。The specific process of step 201 is as follows: the server receives the first parameter C1, the random number N, the tag account address TAddress and the reader account address RAddress sent by the reader/writer.

步骤202的具体过程为:遍历自身维护的区块链,若区块链中存储有标签账户地址TAddress,则从区块链中取出标签账户余额balanceBC,并基于异或运算和单向哈希运算,根据接收到的标签账户地址TAddress、账户余额balanceBC和随机数N,计算生成第二参数C2,具体计算公式如下:The specific process of step 202 is: traverse the blockchain maintained by itself, and if the tag account address TAddress is stored in the blockchain, take out the tag account balance balanceBC from the blockchain, and based on XOR operation and one-way hash operation , according to the received tag account address TAddress, account balance balanceBC and random number N, calculate and generate the second parameter C2, the specific calculation formula is as follows:

C2=H(TAddress⊕balanceBC⊕N);C2=H(TAddress⊕balanceBC⊕N);

其中,⊕为异或运算,H()为单向哈希运算。Among them, ⊕ is the XOR operation, and H() is the one-way hash operation.

步骤203的具体过程为:服务器将第一参数C1和第二参数C2进行比较,若比较结果为两者相等,则判定本次读写器对标签认证成功。并基于异或运算和单向哈希运算,根据标签账户余额balanceBC和随机数N,计算生成第三参数C3,并将第三参数C3发送给读写器,以使得读写器将第三参数C3转发给标签,进而以使得标签基于接收到的第三参数C3,获取标签对读写器的认证结果。其中,第三参数C3的具体计算公式如下:The specific process of step 203 is as follows: the server compares the first parameter C1 and the second parameter C2, and if the comparison result is that the two are equal, it is determined that the reader has successfully authenticated the tag this time. And based on XOR operation and one-way hash operation, according to the tag account balance balanceBC and random number N, calculate and generate the third parameter C3, and send the third parameter C3 to the reader, so that the reader can use the third parameter C3 is forwarded to the tag, so that the tag obtains the authentication result of the tag to the reader based on the received third parameter C3. Among them, the specific calculation formula of the third parameter C3 is as follows:

C3=H(balanceBC⊕N);C3=H(balanceBC⊕N);

其中,⊕为异或运算,H()为单向哈希运算。Among them, ⊕ is the XOR operation, and H() is the one-way hash operation.

需要说明的是,本发明实施例将区块链技术与RFID技术相结合,将RFID中的服务器作为区块链中的节点运行,区块链中的所有节点(也即服务器)共同维护区块链。对于一个服务器来说,其包含了一批所有节点都可以访问的标签和阅读器相关的帐户。It should be noted that, in the embodiment of the present invention, the blockchain technology and the RFID technology are combined, and the server in the RFID operates as a node in the blockchain, and all nodes (ie, servers) in the blockchain jointly maintain the block chain. chain. For a server, it contains a collection of tags and reader-related accounts that all nodes can access.

标签账户地址TAddress的生成过程如下:以标签ID作为密码,使用区块链生成公钥地址,并将该公钥地址作为标签账户地址。读写器账户地址RAddress的生成过程如下:以读写器ID作为密码,使用区块链生成公钥地址,并将该公钥地址作为读写器账户地址。每个标签存储自身的{TAddress,balance},每个读写器存储自身的RAddress。区块链中每个标签的账户余额balanceBC被初始化为(0,10)之间的随机数,而存储在标签中的余额值也即标签余额balance被初始化为balanceBC+M。其中,M为标签账户与读写器账户每笔交易的金额。The generation process of the tag account address TAddress is as follows: use the tag ID as the password, use the blockchain to generate the public key address, and use the public key address as the tag account address. The generation process of the reader account address RAddress is as follows: using the reader ID as the password, use the blockchain to generate the public key address, and use the public key address as the reader account address. Each tag stores its own {TAddress, balance}, and each reader stores its own RAddress. The account balance balanceBC of each tag in the blockchain is initialized to a random number between (0,10), and the balance value stored in the tag, that is, the tag balance balance, is initialized to balanceBC+M. Among them, M is the amount of each transaction between the tag account and the reader account.

本发明实施例提供的方法,将区块链技术与RFID技术相结合,由于区块链本质上是由网络中的每个节点维护的分布式账本,因此本发明实施例提供的方法可以在完成安全认证的同时保证每个标签在没有数据库和可信第三方的情况下的隐私。对普通攻击(例如重放攻击,主动攻击,Dos攻击,去同步攻击)的完全抵抗,并且在不使用任何额外保护技术的前提下根除所有潜在的数据库攻击;每一条RFID标签与读写器的通信记录都是可追踪和不可修改的;并且,分布式系统中的每一子系统都有自己的秘密标签信息,这些信息不包含在服务器中。子系统之间共享不敏感标签信息以进行后续操作,无需中央服务器或受信任的第三方。The method provided by the embodiment of the present invention combines the blockchain technology with the RFID technology. Since the blockchain is essentially a distributed ledger maintained by each node in the network, the method provided by the embodiment of the present invention can be completed in Secure authentication while guaranteeing the privacy of each tag in the absence of databases and trusted third parties. Complete resistance to common attacks (such as replay attacks, active attacks, Dos attacks, desynchronization attacks), and eradicate all potential database attacks without using any additional protection techniques; Communication records are traceable and unmodifiable; moreover, each subsystem in the distributed system has its own secret tag information, which is not contained in the server. Insensitive label information is shared between subsystems for subsequent operations without the need for a central server or trusted third party.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若获知第一参数C1与第二参数C2相等,则判定上一次认证过程异常,并记录在自身维护的区块链中;其中,认证过程异常为认证消息丢失或被拦截。If it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the last authentication process was abnormal and recorded in the blockchain maintained by itself; wherein, the abnormality of the authentication process is that the authentication message is lost or intercepted.

具体地,若服务器获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并且,判定上一次认证过程异常,并记录在自身维护的区块链中。Specifically, if the server learns that the first parameter C1 is equal to the second parameter C2, it determines that the reader has successfully authenticated the tag this time, and determines that the last authentication process was abnormal, and records it in the blockchain it maintains.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若获知第一参数C1与第二参数C2不相等,则根据标签账户地址TAddress、标签账户余额balanceBC、交易金额M和随机数N,生成第四参数C4。If it is known that the first parameter C1 and the second parameter C2 are not equal, the fourth parameter C4 is generated according to the tag account address TAddress, the tag account balance balanceBC, the transaction amount M and the random number N.

若获知第一参数C1与第四参数C4相等,则判定本次读写器对标签认证成功,且上一次认证过程正常,并根据交易金额M对标签账户余额balanceBC进行更新,并根据更新后的标签账户余额balanceBC和随机数N,生成第五参数C5并通过读写器发送至标签,以使得标签基于第五参数C5,获取标签对读写器的认证结果。If it is known that the first parameter C1 is equal to the fourth parameter C4, it is determined that the reader has successfully authenticated the tag this time, and the last authentication process was normal, and the tag account balance balanceBC is updated according to the transaction amount M, and according to the updated The tag account balance balanceBC and the random number N generate the fifth parameter C5 and send it to the tag through the reader, so that the tag obtains the authentication result of the tag to the reader based on the fifth parameter C5.

具体地,若服务器通过比较第一参数C1与第二参数C2获知两者不相等,则生成第四参数C4,并基于第四参数C4获取读写器对标签结果额的认证结果。其中,第四参数C4的计算公式为:Specifically, if the server finds that the first parameter C1 and the second parameter C2 are not equal by comparing the two, it generates the fourth parameter C4, and obtains the authentication result of the tag result amount by the reader based on the fourth parameter C4. Among them, the calculation formula of the fourth parameter C4 is:

C4=H(TAddress⊕(balanceBC⊕M)⊕N)C4=H(TAddress⊕(balanceBC⊕M)⊕N)

其中,⊕为异或运算,H()为单向哈希运算。Among them, ⊕ is the XOR operation, and H() is the one-way hash operation.

服务器生成第四参数C4后,将第一参数C1与第四参数C4进行比较,若两者相等,则判定读写器对标签认证成功,并生成第五参数C5后发送至读写器,以使得读写器将第五参数C5转发至标签,进而以使得标签基于第五参数C5获取标签对读写器的认证结果。其中,第五参数C5的计算公式为:After the server generates the fourth parameter C4, it compares the first parameter C1 with the fourth parameter C4. If the two are equal, it is determined that the reader has successfully authenticated the tag, and the fifth parameter C5 is generated and sent to the reader for The reader is made to forward the fifth parameter C5 to the tag, so that the tag obtains the authentication result of the tag to the reader based on the fifth parameter C5. Among them, the calculation formula of the fifth parameter C5 is:

C5=H(balanceBC'⊕N)C5=H(balanceBC'⊕N)

其中,⊕为异或运算,H()为单向哈希运算,balanceBC'为根据交易金额M对标签账户余额balanceBC进行更新后得到的更新后的标签账户余额。Among them, ⊕ is the XOR operation, H() is the one-way hash operation, and balanceBC' is the updated label account balance obtained after updating the label account balance balanceBC according to the transaction amount M.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若获知第一参数C1与第二参数C2相等,则标签账户余额balanceBC保持不变。If it is known that the first parameter C1 and the second parameter C2 are equal, the label account balance balanceBC remains unchanged.

若获知第一参数C1与第四参数C4相等,则根据交易金额M对账户余额balanceBC进行更新。If it is known that the first parameter C1 and the fourth parameter C4 are equal, the account balance balanceBC is updated according to the transaction amount M.

具体地,若服务器获知第一参数C1与第二参数C2相等或第一参数C1与第四参数C4相等,则判定读写器对标签认证成功。其中,若C1==C2,则balanceBC保持不变,若C1==C4,则更新balanceBC为balanceBC'=balanceBC+M。Specifically, if the server learns that the first parameter C1 and the second parameter C2 are equal or the first parameter C1 and the fourth parameter C4 are equal, it determines that the reader/writer has successfully authenticated the tag. Wherein, if C1==C2, balanceBC remains unchanged, and if C1==C4, balanceBC is updated to be balanceBC'=balanceBC+M.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若获知第一参数C1与第四参数C4不相等,则判定读写器对标签认证失败。If it is learned that the first parameter C1 and the fourth parameter C4 are not equal, it is determined that the reader/writer fails to authenticate the tag.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若获知区块链中未存储有标签账户地址TAddress,则判定读写器对标签认证失败。If it is known that the tag account address TAddress is not stored in the blockchain, it is determined that the reader has failed to authenticate the tag.

图3为根据本发明另一实施例提供的一种RFID双向认证方法流程图,其执行主体为标签,如图3所示,该方法包括:FIG. 3 is a flowchart of an RFID two-way authentication method provided according to another embodiment of the present invention, the execution subject of which is a tag. As shown in FIG. 3 , the method includes:

301:若第一参数C1与第二参数C2相等,则接收服务器发送的第三参数C3。301: If the first parameter C1 is equal to the second parameter C2, receive the third parameter C3 sent by the server.

302:基于第三参数C3,获取标签对读写器的认证结果。302: Based on the third parameter C3, obtain the authentication result of the tag to the reader.

其中,第三参数C3根据标签账户余额balanceBC和随机数N生成,第一参数C1由读写器发送至服务器,第二参数C2根据标签账户地址TAddress、标签账户余额balanceBC和随机数N生成。The third parameter C3 is generated according to the tag account balance balanceBC and the random number N, the first parameter C1 is sent by the reader to the server, and the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N.

具体地,若服务器向读写器发送第三参数C3,则读写器将第三参数C3转发给标签。若标签接收到第三参数C3,则基于第三参数C3获取标签对读写器的认证结果,认证结果为标签对读写器的认证成功或认证失败。需要说明的是,各参数均已在本实施例或上述实施例中进行了说明,此处不再赘述。Specifically, if the server sends the third parameter C3 to the reader/writer, the reader/writer forwards the third parameter C3 to the tag. If the tag receives the third parameter C3, it obtains the authentication result of the tag to the reader based on the third parameter C3, and the authentication result is that the authentication of the tag to the reader succeeds or the authentication fails. It should be noted that each parameter has been described in this embodiment or the above-mentioned embodiment, and details are not repeated here.

基于上述实施例,本实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by this embodiment further includes:

若第一参数C1与第四参数C4相等,则接收服务器发送的第五参数C5;If the first parameter C1 is equal to the fourth parameter C4, receive the fifth parameter C5 sent by the server;

基于第五参数C5,获取标签对读写器的认证结果;Based on the fifth parameter C5, obtain the authentication result of the tag to the reader;

其中,第五参数C5根据更新后的标签账户余额balanceBC和随机数N生成,第四参数C4根据标签账户地址TAddress、标签账户余额balanceBC、交易金额M和随机数N生成。The fifth parameter C5 is generated according to the updated tag account balance balanceBC and the random number N, and the fourth parameter C4 is generated according to the tag account address TAddress, the tag account balance balanceBC, the transaction amount M and the random number N.

基于上述实施例,获取标签对读写器的认证结果,进一步包括:Based on the above embodiment, obtaining the authentication result of the tag to the reader, further comprising:

根据标签余额balance和随机数N,获取第六参数C6;According to the label balance balance and random number N, obtain the sixth parameter C6;

若获知第三参数C3和第六参数C6相等,或者,第五参数C5和第六参数C6相等,则判定标签对读写器认证成功。否则,判定标签对读写器认证失败,标签拒绝进一步通信。第六参数C6的具体计算公式如下:If it is known that the third parameter C3 and the sixth parameter C6 are equal, or that the fifth parameter C5 and the sixth parameter C6 are equal, it is determined that the tag has successfully authenticated the reader. Otherwise, it is determined that the tag has failed to authenticate the reader, and the tag refuses to communicate further. The specific calculation formula of the sixth parameter C6 is as follows:

C6=H(balance⊕N);C6=H(balance⊕N);

其中,⊕为异或运算,H()为单向哈希运算。Among them, ⊕ is the XOR operation, and H() is the one-way hash operation.

基于上述实施例,本发明实施例提供的方法还包括:Based on the foregoing embodiment, the method provided by the embodiment of the present invention further includes:

若标签对读写器认证成功,则根据交易金额M,对标签余额balance进行更新。具体更新公式为:If the tag is successfully authenticated to the reader, the tag balance is updated according to the transaction amount M. The specific update formula is:

balance'=balance+Mbalance'=balance+M

基于上述实施例,接收服务器发送的第三参数C3或接收服务器发送的第五参数C5,之前还包括:Based on the foregoing embodiment, the third parameter C3 sent by the receiving server or the fifth parameter C5 sent by the receiving server further includes:

接收读写器发送的随机数N;根据标签账户地址TAddress、标签余额balance和随机数N,生成第一参数C1;将第一参数C1和标签账户地址TAddress发送给读写器,以使得读写器将第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress发送给服务器。Receive the random number N sent by the reader; generate the first parameter C1 according to the tag account address TAddress, the tag balance balance and the random number N; send the first parameter C1 and the tag account address TAddress to the reader to enable reading and writing The reader sends the first parameter C1, the random number N, the tag account address TAddress and the reader account address RAddress to the server.

为了更好地说明本发明实施例的方案,以下通过具体的举例进行说明:In order to better illustrate the solutions of the embodiments of the present invention, the following specific examples are used to illustrate:

图4为根据本发明实施例提供的一种基于区块链的多部门合作分布式RFID系统架构图,如图4所示,将本发明实施例提供的方法应用在如下领域:Fig. 4 is a block chain-based multi-department cooperation distributed RFID system architecture diagram provided according to an embodiment of the present invention. As shown in Fig. 4, the method provided by the embodiment of the present invention is applied in the following fields:

一家公司有多个部门或分支机构,特别是其中一些分散在不同地区,甚至分布在不同的国家,内部网络很难相互连通。以基于RFID的人员门禁系统为例,它需要高安全性,但实时性和吞吐率要求较低。每个部门都有一个敏感的<真实对象——标签ID>表,不能被其他部门知晓。但是,公司的运营和管理要求部门共享标签的一些信息以完成RFID认证过程。那么如何在满足公司实际需求的同时保证部门的隐私是新RFID系统和协议应该实现的要求。而且,当添加新标签或每轮更新认证消息时,分布式RFID系统中的同步问题也是亟待解决的。A company has multiple departments or branches, especially some of them are scattered in different regions or even in different countries, and it is difficult for the internal network to connect with each other. Take the RFID-based personnel access control system as an example, which requires high security, but low real-time and throughput requirements. Each department has a sensitive table of <Real Objects - Tag IDs> which cannot be known by other departments. However, the operation and management of the company requires the department to share some information of the tag in order to complete the RFID certification process. So how to ensure the privacy of the department while meeting the actual needs of the company is the requirement that the new RFID system and protocol should achieve. Moreover, the synchronization problem in distributed RFID systems also needs to be solved urgently when new tags are added or authentication messages are updated every round.

在本发明实施例中,一条私有区块链足以满足上述公司内RFID系统的要求。在这种情况下,多个部门一起维护私有区块链并执行相同的身份验证协议过程。该系统模型可以确保共享非敏感标签信息以进行认证,同时可通过以下设置保护部门内部的机密标签信息:In the embodiment of the present invention, a private blockchain is sufficient to meet the requirements of the above-mentioned in-company RFID system. In this case, multiple departments work together to maintain a private blockchain and perform the same authentication protocol process. This system model ensures that non-sensitive label information is shared for authentication while protecting confidential label information within the department with the following settings:

(1)每个部门都有几台服务器作为区块链上的节点运行,每个节点都包含一批所有节点都可以访问的标签和阅读器相关的帐户。(1) Each department has several servers running as nodes on the blockchain, and each node contains a batch of tags and reader-related accounts that all nodes can access.

(2)以标签或读写器ID作为密码,区块链会生成一个20字节的公钥地址作为帐户标识符(以太坊中)。每个部门各自的<真实对象——ID——帐户地址>映射表存储在远离整个系统的秘密位置,不可能推导出真实ID与帐户地址的关联关系。(2) With the tag or reader ID as the password, the blockchain will generate a 20-byte public key address as the account identifier (in Ethereum). The respective <real object-ID-account address> mapping table of each department is stored in a secret location away from the entire system, and it is impossible to deduce the association between real IDs and account addresses.

基于图4所示的系统架构图,下面描述本发明实施例提出的基于区块链的相互认证RFID协议,其中用到的符号说明如表1,协议图如5所示,表1为协议中用到的符号说明表,图5为根据本发明实施例提供的一种相互认证RFID协议图。具体流程如下:Based on the system architecture diagram shown in FIG. 4 , the following describes the blockchain-based mutual authentication RFID protocol proposed by the embodiment of the present invention. The symbols used in the RFID protocol are described in Table 1, and the protocol diagram is shown in Table 5. Table 1 shows the protocol in the protocol. A description table of symbols used, FIG. 5 is a diagram of a mutual authentication RFID protocol provided according to an embodiment of the present invention. The specific process is as follows:

(1)初始化阶段:在初始化阶段,使用标签或读写器ID作为密码,区块链生成公钥地址作为帐户标识符。每个标签存储元组{TAddress,balance},每个读写器存储RAddress。由于读写器是整个协议的发起方,所以其账户必须具有初始余额,这可以在协议开始之前通过默认设置实现。区块链中每个标签账户在区块链中真正的余额(balanceBC)被初始化为(0,10)之间的随机数,而标签中存储的账户余额(balance)被初始化为balanceBC+M。(1) Initialization phase: In the initialization phase, the tag or reader ID is used as the password, and the blockchain generates the public key address as the account identifier. Each tag stores a tuple {TAddress, balance} and each reader stores RAddress. Since the reader is the initiator of the entire protocol, its account must have an initial balance, which can be achieved by default before the protocol starts. The real balance (balanceBC) of each tag account in the blockchain is initialized as a random number between (0, 10), and the account balance (balance) stored in the tag is initialized as balanceBC+M.

(2)认证阶段:(2) Certification stage:

(a)读写器:读写器生成一个随机数N并将其发送给标签。(a) Reader: The reader generates a random number N and sends it to the tag.

(b)标签:标签计算C1=H(TAddress⊕balance⊕N),并将(C1,TAddress)发回给读写器。(b) Tag: The tag calculates C1=H(TAddress⊕balance⊕N), and sends (C1, TAddress) back to the reader.

(c)读写器:读写器发送(C1,N,TAddress,RAddress)到服务器进行标签认证。(c) Reader: The reader sends (C1, N, TAddress, RAddress) to the server for tag authentication.

(d)服务器:服务器收到读写器发来的(C1,N,TAddress,RAddress)后,首先检查TAddress是否存在。如果TAddress不存在,标签认证失败,服务器停止会话。否则,查询TAddress对应的标签账户的余额balanceBC,然后执行以下步骤。(d) Server: After the server receives (C1, N, TAddress, RAddress) from the reader, it first checks whether TAddress exists. If TAddress does not exist, tag authentication fails and the server stops the session. Otherwise, query the balanceBC of the label account corresponding to TAddress, and then perform the following steps.

判断:服务器计算C2=H(TAddress⊕balanceBC⊕N)。如果C1==C2,则表示上一次认证的最后一条消息丢失或被攻击者拦截;若C1≠C2,服务器计算C4=H(TAddress(balanceBC⊕M)⊕N)。如果C1==C4,则表示上一次认证是完整的。如果上述两种情况都不符合,标签认证失败,服务器停止会话,不再执行以下步骤更新、发送、e)和f)。Judgment: The server calculates C2=H(TAddress⊕balanceBC⊕N). If C1==C2, it means that the last message of the last authentication is lost or intercepted by the attacker; if C1≠C2, the server calculates C4=H(TAddress(balanceBC⊕M)⊕N). If C1==C4, it means that the last authentication is complete. If the above two conditions are not met, the tag authentication fails, the server stops the session, and the following steps update, send, e) and f) are no longer performed.

更新:如果上一步中比较结果是C1==C2,则在区块链中记录与该标签账户相关的拦截记录,balanceBC保持不变(即balanceBC'=balanceBC)。服务器计算C3=H(balanceBC⊕N),并将C3发送给读写器。如果比较结果是C1==C4,服务器会解锁读写器的帐户,并从读写器帐户向标签的发送M,并更新balanceBC(即balanceBC'=balanceBC+M)。服务器计算C5=H(balanceBC'⊕N),并将C5发送给读写器。Update: If the comparison result in the previous step is C1==C2, record the interception record related to the label account in the blockchain, and balanceBC remains unchanged (ie balanceBC'=balanceBC). The server calculates C3=H(balanceBC⊕N), and sends C3 to the reader. If the comparison result is C1==C4, the server will unlock the reader's account, send M from the reader's account to the tag, and update balanceBC (ie balanceBC'=balanceBC+M). The server calculates C5=H(balanceBC'⊕N), and sends C5 to the reader.

(e)读写器:读写器收到C3(或C5)然后转发给标签。(e) Reader: The reader receives C3 (or C5) and forwards it to the tag.

(f)标签:标签计算C6=H(balance⊕N),并检查等式C6==C3(或C5)是否成立。如果成立,标签成功认证读写器,并更新balance'=balance+M。若不成立,认证失败,标签拒绝进一步通信。(f) Label: The label calculates C6=H(balance⊕N) and checks whether the equation C6==C3 (or C5) holds. If so, the tag successfully authenticates the reader and updates balance'=balance+M. If not, authentication fails and the tag rejects further communication.

表1协议中用到的符号说明表Table 1 Symbol description table used in the protocol

Figure BDA0001735172570000111
Figure BDA0001735172570000111

Figure BDA0001735172570000121
Figure BDA0001735172570000121

本发明实施例的关键点在于本发明实施例提供提出了一种基于区块链的新型分布式RFID双向认证安全协议。由于区块链本质上是由网络中的每个节点维护的分布式账本,因此本发明实施例提供的协议可以在完成安全认证的同时保证每个部门在没有数据库和可信第三方的情况下的隐私。The key point of the embodiments of the present invention is that the embodiments of the present invention provide a new distributed RFID bidirectional authentication security protocol based on blockchain. Since the blockchain is essentially a distributed ledger maintained by each node in the network, the protocol provided by the embodiment of the present invention can ensure that each department does not have a database and a trusted third party while completing security authentication privacy.

本发明实施例的有益效果如下:The beneficial effects of the embodiments of the present invention are as follows:

本协议保证了各部门的隐私性:由于协议中只涉及标签账户的地址和余额,且各部门的<真实对象——ID——帐户地址>映射表只能自行存储,所以敏感ID相关信息不会透过协议中使用的信息被泄露,这保证了部门的隐私。This agreement ensures the privacy of each department: since the agreement only involves the address and balance of the label account, and the <real object-ID-account address> mapping table of each department can only be stored by itself, so sensitive ID-related information does not The information used in the protocol is leaked, which guarantees the privacy of the department.

本协议保证了以下安全性:标签匿名性、标签可用性、前向安全性、抵抗重放攻击、抵抗主动攻击、部分保护标签不可追踪性。具体的分析如下。This protocol guarantees the following security: tag anonymity, tag availability, forward security, resistance to replay attacks, resistance to active attacks, partial protection of tag untraceability. The specific analysis is as follows.

(1)标签匿名性:在本发明实施例提供的协议中,标签的真实ID在初始化阶段被匿名为区块链上的帐户地址(TAddress)。在认证过程中,每条消息都受到由随机数N辅助的单向散列hash函数的保护,因此此协议可以保护标签的匿名性。(1) Tag anonymity: In the protocol provided by the embodiment of the present invention, the real ID of the tag is anonymized as the account address (TAddress) on the blockchain in the initialization stage. During the authentication process, each message is protected by a one-way hash function assisted by a random number N, so this protocol can preserve the anonymity of the tag.

(2)标签可用性:标签可用性通常包括抵抗DoS攻击和抵抗去同步攻击。在本发明实施例提供的协议中,标签不需要具有生成随机数的功能,因此不会因为随机数被耗尽而拒绝服务。另外,即使最后的读写器验证消息丢失或被攻击者拦截,也不会导致标签信息与区块链失去同步。这是因为服务器将判断C1是否与C2或C4一致,在这两种情况下,无论标签之前是否收到该消息,都可以验证标签。(2) Tag availability: Tag availability usually includes resistance to DoS attacks and resistance to desynchronization attacks. In the protocol provided by the embodiment of the present invention, the tag does not need to have the function of generating random numbers, so the service will not be refused because the random numbers are exhausted. In addition, even if the last reader verification message is lost or intercepted by an attacker, it will not cause the tag information to get out of sync with the blockchain. This is because the server will judge whether C1 is consistent with C2 or C4, in both cases, the tag can be verified regardless of whether the tag has received the message before.

(3)前向安全性:协议实现了前向安全性是因为标签会在hash之前将TAddress、N、balance做异或运算。由于N和balance在每一轮中都会变化,所以即使攻击者知道当前balance和N,他也不会知道前一个的哈希结果,这保证了前向安全性。(3) Forward security: The protocol implements forward security because the tag will XOR TAddress, N, and balance before hashing. Since N and balance will change in each round, even if the attacker knows the current balance and N, he will not know the hash result of the previous one, which guarantees forward security.

(4)抵抗重放攻击:与前向安全类似,读写器将在每轮中产生一个新的随机数N,balanceBC和balance也会改变。所以即使攻击者窃听到了上一轮的所有消息,他也无法通过重放消息来通过身份验证。(4) Resist replay attack: Similar to forward security, the reader will generate a new random number N in each round, and the balanceBC and balance will also change. So even if the attacker eavesdropped on all the messages from the previous round, he would not be able to pass the authentication by replaying the messages.

(5)抵抗主动攻击:考虑攻击者可以用随机数N'主动质询标签,然后从标签获得响应{C1'=H(TAddress⊕balance⊕N'),TAddress}。但是由于hash是单向函数,因此他无法从C1'反向推导出balance。因此,当合法读写器用随机数N进行质询时,他无法构造一个正确的消息返回给读写器,也就意味着他无法冒充合法标签进行进一步的通信,即本发明实施例提供的协议完全抵抗主动攻击。(5) Resist active attack: Consider that the attacker can actively challenge the tag with a random number N', and then get the response {C1'=H(TAddress⊕balance⊕N'), TAddress} from the tag. But since hash is a one-way function, he cannot reversely deduce balance from C1'. Therefore, when the legitimate reader uses the random number N to challenge, he cannot construct a correct message and return it to the reader, which means that he cannot pretend to be a legitimate tag for further communication, that is, the protocol provided by the embodiment of the present invention is completely Resist active attack.

(6)标签不可追踪性:严格来说,本发明实施例提供的协议可能会遭受跟踪攻击。因为它在每次认证中使用相同的TAddress。但即使攻击者找到两次相同的TAddress,他也无法推断出该标签的真实ID号,这意味着本协议在某种程度上保证了标签不可追踪。(6) Tag untraceability: Strictly speaking, the protocol provided by the embodiment of the present invention may suffer from tracking attacks. Because it uses the same TAddress in every authentication. But even if an attacker finds the same TAddress twice, he cannot deduce the real ID number of the tag, which means that this protocol guarantees that the tag is untraceable to some extent.

图6为根据本发明实施例提供的一种服务器的结构框图,如图6所示,所述设备包括:处理器(processor)601、存储器(memory)602和总线603;其中,所述处理器601和所述存储器602通过所述总线603完成相互间的通信;所述处理器601用于调用所述存储器602中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress;若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2;若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果。FIG. 6 is a structural block diagram of a server according to an embodiment of the present invention. As shown in FIG. 6 , the device includes: a processor 601, a memory 602, and a bus 603; wherein the processor 601 and the memory 602 complete mutual communication through the bus 603; the processor 601 is configured to call program instructions in the memory 602 to execute the methods provided by the above method embodiments, for example, including: receiving The first parameter C1, random number N, tag account address TAddress and reader account address RAddress sent by the reader; if it is known that the tag account address TAddress is stored in the blockchain it maintains The account balance balanceBC and the random number N are used to generate the second parameter C2; if the first parameter C1 and the second parameter C2 are known to be equal, it is determined that the reader has successfully authenticated the tag, and based on the tag account balance balanceBC and the random number N, The third parameter C3 is generated and sent to the tag through the reader, so that the tag obtains the authentication result of the tag to the reader based on the third parameter C3.

图7为根据本发明实施例提供的一种标签的结构框图,如图7所示,所述设备包括:处理器(processor)701、存储器(memory)702和总线703;其中,所述处理器701和所述存储器702通过所述总线703完成相互间的通信;所述处理器701用于调用所述存储器702中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:若第一参数C1与第二参数C2相等,则接收服务器发送的第三参数C3;基于第三参数C3,获取标签对读写器的认证结果。FIG. 7 is a structural block diagram of a tag provided according to an embodiment of the present invention. As shown in FIG. 7 , the device includes: a processor (processor) 701, a memory (memory) 702, and a bus 703; wherein, the processor 701 and the memory 702 complete mutual communication through the bus 703; the processor 701 is configured to call program instructions in the memory 702 to execute the methods provided by the above method embodiments, for example, including: if If the first parameter C1 is equal to the second parameter C2, the third parameter C3 sent by the server is received; based on the third parameter C3, the authentication result of the tag to the reader is obtained.

本发明实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如包括:接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress;若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2;若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果。An embodiment of the present invention discloses a computer program product, where the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by a computer, The computer can execute the methods provided by the above method embodiments, for example, including: receiving the first parameter C1, the random number N, the tag account address TAddress and the reader account address RAddress sent by the reader/writer; If the tag account address TAddress is stored in the chain, the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N; if it is known that the first parameter C1 is equal to the second parameter C2, it is determined that this read/write The device authenticates the tag successfully, and according to the tag account balance balanceBC and random number N, generates the third parameter C3 and sends it to the tag through the reader, so that the tag obtains the authentication result of the tag to the reader based on the third parameter C3.

本发明实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如包括:若第一参数C1与第二参数C2相等,则接收服务器发送的第三参数C3;基于第三参数C3,获取标签对读写器的认证结果。An embodiment of the present invention discloses a computer program product, where the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by a computer, The computer can execute the methods provided by the above method embodiments, for example, including: if the first parameter C1 and the second parameter C2 are equal, receiving the third parameter C3 sent by the server; based on the third parameter C3, obtaining the tag pair reader certification result.

本发明实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress;若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2;若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果。Embodiments of the present invention provide a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the methods provided by the foregoing method embodiments, for example Including: receiving the first parameter C1, random number N, tag account address TAddress and reader account address RAddress sent by the reader; TAddress, tag account balance balanceBC and random number N, generate the second parameter C2; if it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the reader has successfully authenticated the tag this time, and based on the tag account balance balanceBC and random number Count N, generate a third parameter C3 and send it to the tag through the reader, so that the tag obtains the authentication result of the tag to the reader based on the third parameter C3.

本发明实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:若第一参数C1与第二参数C2相等,则接收服务器发送的第三参数C3;基于第三参数C3,获取标签对读写器的认证结果。Embodiments of the present invention provide a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the methods provided by the foregoing method embodiments, for example The method includes: if the first parameter C1 is equal to the second parameter C2, receiving the third parameter C3 sent by the server; and obtaining the authentication result of the tag to the reader based on the third parameter C3.

本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps of implementing the above method embodiments can be completed by program instructions related to hardware, the aforementioned program can be stored in a computer-readable storage medium, and when the program is executed, execute It includes the steps of the above method embodiments; and the aforementioned storage medium includes: ROM, RAM, magnetic disk or optical disk and other media that can store program codes.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。From the description of the above embodiments, those skilled in the art can clearly understand that each embodiment can be implemented by means of software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on this understanding, the above-mentioned technical solutions can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments or some parts of the embodiments.

最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, but not to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that it can still be The technical solutions described in the foregoing embodiments are modified, or some technical features thereof are equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1.一种RFID双向认证方法,其特征在于,包括:1. a RFID two-way authentication method, is characterized in that, comprises: 接收读写器发送的第一参数C1、随机数N、标签账户地址TAddress和读写器账户地址RAddress;Receive the first parameter C1, random number N, tag account address TAddress and reader account address RAddress sent by the reader/writer; 若获知自身维护的区块链中存储有标签账户地址TAddress,则根据标签账户地址TAddress、标签账户余额balanceBC和随机数N,生成第二参数C2;If it is known that the tag account address TAddress is stored in the blockchain maintained by itself, the second parameter C2 is generated according to the tag account address TAddress, the tag account balance balanceBC and the random number N; 若获知第一参数C1与第二参数C2相等,则判定本次读写器对标签认证成功,并根据标签账户余额balanceBC和随机数N,生成第三参数C3并通过读写器发送至标签,以使得标签基于第三参数C3,获取标签对读写器的认证结果;If it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the reader has successfully authenticated the tag, and the third parameter C3 is generated according to the tag account balance balanceBC and the random number N and sent to the tag through the reader. In order to make the tag based on the third parameter C3, obtain the authentication result of the tag to the reader; 其中,第一参数C1为标签根据标签账户地址TAddress、标签余额balance和读写器发送的随机数N生成,标签账户地址TAddress为区块链根据标签ID生成,读写器账户地址RAddress为区块链根据读写器ID生成。Among them, the first parameter C1 is generated by the tag according to the tag account address TAddress, the tag balance balance and the random number N sent by the reader, the tag account address TAddress is generated by the blockchain according to the tag ID, and the reader account address RAddress is the block Chains are generated based on reader IDs. 2.根据权利要求1所述的方法,其特征在于,还包括:2. The method of claim 1, further comprising: 若获知第一参数C1与第二参数C2相等,则判定上一次认证过程异常,并记录在自身维护的区块链中;其中,认证过程异常为认证消息丢失或被拦截。If it is known that the first parameter C1 is equal to the second parameter C2, it is determined that the last authentication process was abnormal and recorded in the blockchain maintained by itself; wherein, the abnormality of the authentication process is that the authentication message is lost or intercepted. 3.根据权利要求1所述的方法,其特征在于,还包括:3. The method of claim 1, further comprising: 若获知第一参数C1与第二参数C2不相等,则根据标签账户地址TAddress、标签账户余额balanceBC、交易金额M和随机数N,生成第四参数C4;If it is known that the first parameter C1 and the second parameter C2 are not equal, the fourth parameter C4 is generated according to the tag account address TAddress, the tag account balance balanceBC, the transaction amount M and the random number N; 若获知第一参数C1与第四参数C4相等,则判定本次读写器对标签认证成功,且上一次认证过程正常,并根据交易金额M对标签账户余额balanceBC进行更新,并根据更新后的标签账户余额balanceBC和随机数N,生成第五参数C5并通过读写器发送至标签,以使得标签基于第五参数C5,获取标签对读写器的认证结果。If it is known that the first parameter C1 is equal to the fourth parameter C4, it is determined that the reader has successfully authenticated the tag this time, and the last authentication process was normal, and the tag account balance balanceBC is updated according to the transaction amount M, and according to the updated The tag account balance balanceBC and the random number N generate the fifth parameter C5 and send it to the tag through the reader, so that the tag obtains the authentication result of the tag to the reader based on the fifth parameter C5. 4.根据权利要求3所述的方法,其特征在于,还包括:4. The method of claim 3, further comprising: 若获知第一参数C1与第二参数C2相等,则标签账户余额balanceBC保持不变;If it is known that the first parameter C1 is equal to the second parameter C2, the label account balance balanceBC remains unchanged; 若获知第一参数C1与第四参数C4相等,则根据交易金额M对账户余额balanceBC进行更新。If it is known that the first parameter C1 and the fourth parameter C4 are equal, the account balance balanceBC is updated according to the transaction amount M. 5.根据权利要求3所述的方法,其特征在于,还包括:5. The method of claim 3, further comprising: 若获知第一参数C1与第四参数C4不相等,则判定读写器对标签认证失败。If it is learned that the first parameter C1 and the fourth parameter C4 are not equal, it is determined that the reader/writer fails to authenticate the tag. 6.根据权利要求1所述的方法,其特征在于,还包括:6. The method of claim 1, further comprising: 若获知区块链中未存储有标签账户地址TAddress,则判定读写器对标签认证失败。If it is known that the tag account address TAddress is not stored in the blockchain, it is determined that the reader has failed to authenticate the tag. 7.一种RFID双向认证方法,其特征在于,包括:7. an RFID two-way authentication method, is characterized in that, comprises: 若第一参数C1与第二参数C2相等,则接收服务器经读写器发送的第三参数C3;If the first parameter C1 is equal to the second parameter C2, receive the third parameter C3 sent by the server via the reader; 基于第三参数C3,获取标签对读写器的认证结果;Based on the third parameter C3, obtain the authentication result of the tag to the reader; 其中,第三参数C3是服务器根据标签账户余额balanceBC和随机数N生成,第一参数C1由读写器发送至服务器,第二参数C2是服务器根据标签账户地址TAddress、标签账户余额balanceBC和随机数N生成;第一参数C1为标签账户地址TAddress、标签余额balance和读写器发送的随机数N生成,标签账户地址TAddress为区块链根据标签ID生成。The third parameter C3 is generated by the server according to the tag account balance balanceBC and the random number N, the first parameter C1 is sent by the reader to the server, and the second parameter C2 is generated by the server according to the tag account address TAddress, the tag account balance balanceBC and the random number N is generated; the first parameter C1 is generated by the tag account address TAddress, the tag balance balance and the random number N sent by the reader, and the tag account address TAddress is generated by the blockchain according to the tag ID. 8.根据权利要求7所述的方法,其特征在于,还包括:8. The method of claim 7, further comprising: 若第一参数C1与第四参数C4相等,则接收服务器发送的第五参数C5;If the first parameter C1 is equal to the fourth parameter C4, receive the fifth parameter C5 sent by the server; 基于第五参数C5,获取标签对读写器的认证结果;Based on the fifth parameter C5, obtain the authentication result of the tag to the reader; 其中,第五参数C5根据更新后的标签账户余额balanceBC和随机数N生成,第四参数C4根据标签账户地址TAddress、标签账户余额balanceBC、交易金额M和随机数N生成。The fifth parameter C5 is generated according to the updated tag account balance balanceBC and the random number N, and the fourth parameter C4 is generated according to the tag account address TAddress, the tag account balance balanceBC, the transaction amount M and the random number N. 9.根据权利要求8所述的方法,其特征在于,获取标签对读写器的认证结果,进一步包括:9. The method according to claim 8, wherein obtaining the authentication result of the tag to the reader, further comprising: 根据标签余额balance和随机数N,获取第六参数C6;According to the label balance balance and random number N, obtain the sixth parameter C6; 若获知第三参数C3和第六参数C6相等,或者,第五参数C5和第六参数C6相等,则判定标签对读写器认证成功。If it is known that the third parameter C3 and the sixth parameter C6 are equal, or that the fifth parameter C5 and the sixth parameter C6 are equal, it is determined that the tag has successfully authenticated the reader. 10.根据权利要求7所述的方法,其特征在于,还包括:10. The method of claim 7, further comprising: 若标签对读写器认证成功,则根据交易金额M,对标签余额balance进行更新。If the tag is successfully authenticated to the reader, the tag balance is updated according to the transaction amount M.
CN201810792139.2A 2018-07-18 2018-07-18 A kind of RFID two-way authentication method Active CN109190725B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810792139.2A CN109190725B (en) 2018-07-18 2018-07-18 A kind of RFID two-way authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810792139.2A CN109190725B (en) 2018-07-18 2018-07-18 A kind of RFID two-way authentication method

Publications (2)

Publication Number Publication Date
CN109190725A CN109190725A (en) 2019-01-11
CN109190725B true CN109190725B (en) 2020-07-07

Family

ID=64936248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810792139.2A Active CN109190725B (en) 2018-07-18 2018-07-18 A kind of RFID two-way authentication method

Country Status (1)

Country Link
CN (1) CN109190725B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788465B (en) * 2019-01-22 2020-04-14 西安电子科技大学 A two-way identity authentication method based on radio frequency identification on the blockchain
CN111953494A (en) * 2019-05-15 2020-11-17 株式会社日立制作所 Authentication method and device
CN112019336B (en) * 2019-05-30 2021-12-10 中国科学技术大学 RFID authentication method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7791451B2 (en) * 2006-10-17 2010-09-07 International Business Machines Corporation Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
US20180096175A1 (en) * 2016-10-01 2018-04-05 James L. Schmeling Blockchain Enabled Packaging
CN106792686B (en) * 2016-12-13 2020-01-07 广东工业大学 A kind of RFID two-way authentication method
CN107545501A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Assets management method, system and computer-readable recording medium
CN108053001B (en) * 2017-12-14 2021-09-28 上海密尔克卫化工储存有限公司 Information security authentication method and system for electronic warehouse receipt

Also Published As

Publication number Publication date
CN109190725A (en) 2019-01-11

Similar Documents

Publication Publication Date Title
Sidorov et al. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains
Yavari et al. An Improved Blockchain‐Based Authentication Protocol for IoT Network Management
Kapoor et al. Single RFID tag ownership transfer protocols
CN103020671B (en) A kind of radio frequency identification mutual authentication method based on hash function
Zhong et al. Distributed blockchain‐based authentication and authorization protocol for smart grid
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CN101488854B (en) Wireless RFID system authentication method and apparatus
CN110945549A (en) Method and system for universal storage and access to user-owned credentials for cross-institution digital authentication
Wang et al. Blockchain-based mutual authentication security protocol for distributed RFID systems
CN108737442A (en) A kind of cryptographic check processing method
CN104702604B (en) Mutual authentication method based on simple logic encryption and timestamp
CN107147498B (en) Authentication method used in RFID authentication process and encryption method for transmitting information
CN109190725B (en) A kind of RFID two-way authentication method
CN110381055A (en) RFID system privacy-protection certification protocol method in healthcare supply chain
CN102693438B (en) Privacy protection radio frequency identification password protocol method and system
Thakur et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
CN109063523A (en) A kind of RF identifying safety authentication method and system
CN114466353B (en) App user ID information protection device, method, electronic device and storage medium
Asadpour et al. Scalable, privacy preserving radio‐frequency identification protocol for the internet of things
CN104820807B (en) A kind of intelligent card data processing method
Wilusz et al. Secure protocols for smart contract based insurance services
Erguler et al. Practical attacks and improvements to an efficient radio frequency identification authentication protocol
Shen et al. An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol.
Azad et al. A lightweight protocol for RFID authentication
Xiaohong et al. RFID mutual-authentication protocol with synchronous updated-keys based on Hash function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant