CN110276423A - A kind of RFID Verification System for chip finger print of high encryption - Google Patents
A kind of RFID Verification System for chip finger print of high encryption Download PDFInfo
- Publication number
- CN110276423A CN110276423A CN201910320534.5A CN201910320534A CN110276423A CN 110276423 A CN110276423 A CN 110276423A CN 201910320534 A CN201910320534 A CN 201910320534A CN 110276423 A CN110276423 A CN 110276423A
- Authority
- CN
- China
- Prior art keywords
- rfid
- finger print
- chip
- server
- verification system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 32
- 238000004891 communication Methods 0.000 claims abstract description 20
- 238000012986 modification Methods 0.000 claims abstract description 3
- 230000004048 modification Effects 0.000 claims abstract description 3
- 238000000034 method Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004519 manufacturing process Methods 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 13
- 230000015654 memory Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 8
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 229910052710 silicon Inorganic materials 0.000 description 4
- 239000010703 silicon Substances 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000005611 electricity Effects 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005286 illumination Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012827 research and development Methods 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 210000003739 neck Anatomy 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002269 spontaneous effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention discloses a kind of RFID Verification Systems for chip finger print of high encryption, include: server-side, terminal server, promote and apply module, communication apparatus, client and database, the server-side and terminal server control connect, connection is controlled between the server-side and communication apparatus, for realizing the exchange, modification and verifying of information, the server-side and database, client, successively control connection between communication apparatus, upload between the server-side and database for controlling information, downloading.Through the above way, the RFID Verification System for chip finger print of high encryption provided by the invention, single physical entity is uniquely identified using the inherent physical structure of physical entity realizes effective certification thinking, by PUF(physics unclonable function) RFID make full use of, also have the characteristics that robustness, nonclonability and unpredictability using PUF simultaneously, the RFID Verification System for being used for chip finger print of height encryption is widely used in field of authentication.
Description
Technical field
The present invention relates to a kind of Verification Systems, more particularly to the RFID Verification System for chip finger print of height encryption.
Background technique
In recent years, China Internet and internet+related industry flourish, the safety guarantee of information and data increasingly by
To the concern and attention of the majority of consumers, especially new high-tech industry, information security field is faced with new opportunity and chooses
War.In addition, the prevalence of consumption on network also causes a large amount of counterfeit and shoddy goods to flow into city with the high-speed expansion of e-commerce platform
, consumer is on a declining curve for the degree of belief of businessman.
Currently marketed information safety protection mode, such as fingerprint or iris recognition, although safety coefficient is high, cost
Also larger, it is unfavorable for inexpensive industry.The RFID Verification System that our company is based on " chip finger print " is low in cost, small power consumption, and
There is absolute safety at present.It is not only that consumer provides shopping guarantee, novel information is also provided for new high-tech industry
Safety system has a vast market.
Summary of the invention
The present invention solves the technical problem of how to provide a kind of inherent physical structure using physical entity come only
One mark single physical entity realizes effective certification thinking, by PUF(physics unclonable function) RFID make full use of,
Also have the characteristics that robustness, nonclonability and unpredictability using PUF simultaneously, by it is high encrypt be used for chip finger print
RFID Verification System is widely used in field of authentication.
In order to solve the above technical problems, one technical scheme adopted by the invention is that: provide a kind of high encryption for core
The RFID Verification System of piece fingerprint, comprising: server-side, promotes and applies module, communication apparatus, client sum number at terminal server
According to library, the server-side and terminal server control are connected, for the upload and comparison of information, the server-side and communication
Connection is controlled between equipment, for realizing the exchange, modification and verifying of information.It is the server-side and database, client, logical
Successively control connection between equipment is interrogated, is uploaded between the server-side and database for controlling information, downloading, the data
It is used for client for controlling the use and carrying of client between library, client, between the client, communication apparatus and leads to
Interrogate the certification between equipment.
The RFID Verification System for chip finger print of the described high encryption also include the unclonable module of PUF physics with
PFID unit includes RFID chip in the PFID unit, between the unclonable module of the PUF physics and PFID unit
Carry out data transmission between database after control connection, moving into and encrypting for RFID chip.
In a specific embodiment, the RFID chip includes several RFID label tags, label information module, RFID
Reader, coded radio module and cloud data read module, the RFID label tag, label information module, RFID are read
Successively control connection, is controlled between the cloud data read module and coded radio module between device and coded radio module
System connection, the RFID reader send the radio signal of a string encoding, the radio signal to RFID label tag into
Row inquiry, the RFID tag to radio signal, RFID label tag are responded, include in the RFID label tag
There is the RFID card piece based on PUF.
In a specific embodiment, the RFID reader is divided into fixed and hand-held.
It in a specific embodiment, include for RFID label tag and RFID reader in the coded radio module
Between play the role of transmit radiofrequency signal RFID antenna.
In a specific embodiment, the RFID card piece includes for storing and processing modulates information while solving
Recall the integrated circuit of a radio frequency signals, the antenna for receiving and sending signal and for storing internal information
Reservoir controls connection between the integrated circuit, antenna and reservoir and database.
In a specific embodiment, the RFID card piece can distance of reaction be 25-28 meters.
In a specific embodiment, the RFID reader is Pos machine.
In a specific embodiment, the communication apparatus is set as handheld device or card reader.
In a specific embodiment, the handheld device is mobile phone or computer.
In a specific embodiment, the server-side includes local server.
The beneficial effects of the present invention are: uniquely identifying single physical entity using the inherent physical structure of physical entity
Effective certification thinking is realized, by PUF(physics unclonable function) RFID make full use of, while also there is Shandong using PUF
Stick, nonclonability and unpredictability feature answer the RFID Verification System for being used for chip finger print of height encryption extensively
Used in field of authentication.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing, in which:
Fig. 1 is the RFID for chip finger print of high encryption in the RFID Verification System for chip finger print of high encryption of the invention
The flow diagram of one specific embodiment of Verification System;
Fig. 2 is the RFID for chip finger print of high encryption in the RFID Verification System for chip finger print of high encryption of the invention
The RFID reader operation principle schematic diagram of one specific embodiment of Verification System.
Specific embodiment
The technical scheme in the embodiments of the invention will be clearly and completely described below, it is clear that described implementation
Example is only a part of the embodiments of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's all other embodiment obtained without making creative work belongs to the model that the present invention protects
It encloses.
Please refer to attached drawing, provide in one particular embodiment of the present invention a kind of high encryption for chip finger print
RFID Verification System, the RFID Verification System for chip finger print of the described high encryption include: server-side, terminal server,
Module, communication apparatus, client and database are promoted and applied, the server-side and terminal server control connect, for believing
The upload and comparison of breath control connection between the server-side and communication apparatus, for realizing information exchange, modify and test
Card.The server-side and database, client, successively control connection, the server-side and database between communication apparatus
Between uploaded for controlling information, downloading, for controlling the use and carrying of client, institute between the database, client
It states between client, communication apparatus for the certification between client and communication apparatus.The server-side includes local service
Device.
The RFID Verification System for chip finger print of the described high encryption also include the unclonable module of PUF physics with
PFID unit includes RFID chip in the PFID unit, between the unclonable module of the PUF physics and PFID unit
Carry out data transmission between database after control connection, moving into and encrypting for RFID chip.
The RFID chip includes several RFID label tags, label information module, RFID reader, coded radio mould
Block and cloud data read module, the RFID label tag, label information module, RFID reader and coded radio module it
Between successively control connection.Connection is controlled between the cloud data read module and coded radio module, the RFID is read
The radio signal that device sends a string encoding is read, the radio signal carries out inquiry, the RFID mark to RFID label tag
Label receive radio signal, and RFID label tag is responded, it include the RFID card piece based on PUF in the RFID label tag.
In a specific embodiment, the RFID reader is divided into fixed and hand-held.
It include for playing transmitting radio frequency letter between RFID label tag and RFID reader in the coded radio module
Number effect RFID antenna.
The RFID card piece includes for storing and processing modulates information while demodulating a radio frequency letter
Number integrated circuit, the antenna for receiving and sending signal and the reservoir for storing internal information, the integrated electricity
Connection is controlled between road, antenna and reservoir and database.
The RFID card piece can distance of reaction be 25-28 meters.
In a specific embodiment, the RFID reader is Pos machine.
In a specific embodiment, the communication apparatus is set as handheld device or card reader.
In a specific embodiment, the handheld device is mobile phone or computer.
In the specific implementation process, due to safety certification means common in the market have static password authentication, finger print identifying,
The modes such as iris authentication.Product on the market is simple RFID anti-counterfeiting system, is easily attacked, and data have the wind being stolen
Danger is based on the RFID authentication techniques domestic market blank of " chip finger print ".And the PUF skill that the present invention is added on this basis
The unclonable technology of art physics is utilized the random process deviation injected in chip manufacturing proces with processes such as illumination, generates core
Unique " fingerprint " information of piece can be used as the unique identification information of chip after special technique extracts.The unique identification is due to being
It is voluntarily generated in manufacturing process, designer, producer, the producer of chip can not control it, and ensure that anti-fake core
The physics of piece can not duplication characteristic.
Inherent physical structure based on physical entity realizes effective certification thinking uniquely to identify single physical entity,
Propose based on PUF(physics unclonable function) RFID certificate scheme, PUF has robustness, nonclonability and not
Predictability feature can be widely used in field of authentication.
This system has following innovative point: the innovation on protocol algorithm (software): protecting compared to other RFID privacies
Protect for algorithm, in the present invention the maximum advantage of RFID indentification protocol based on PUF that uses be without searching for database, i.e., without
It need to identify label, not search for difficulty, therefore the present invention can be used for large-scale RFID network.Our agreement theoretically may be used
All impersonation attacks are resisted, there is high safety.In addition, the agreement of our company's product is stateless protocol, label is not necessarily to
Synchronous with database holding, therefore, desynchronization attack is also invalid to this agreement.
Innovation on chip manufacturing (hardware): existing RFID chip safety is bad in the market, can easily be attacked
It is broken;If but additional encryption algorithm or circuit, cost, volume etc. can all increase.And PUF (Physical Unclonable
Function) the random process deviation injected in chip manufacturing proces with processes such as illumination is utilized in the unclonable technology of physics,
Unique " fingerprint " information for generating chip can be used as the unique identification information of chip after special technique extracts.The mark be
Spontaneous generation in manufacturing process, designer, producer, the producer of chip can not control it, ensure that anti-fake
The physics of chip can not duplication characteristic." fingerprint " information that PUF technology is extracted, is utilized physics generally existing in natural environment
There is preferable stochastic behaviour can produce random PUF KEY using the stochastic behaviour, combine with cryptographic algorithm for disturbance, can
It is obviously improved the attack tolerant energy and security level of cryptographic algorithm.
Innovation on chip memory capacity: nonvolatile memory applied by common RFID, the information of storage
Amount and required hardware number are linear, and therefore, the information content of its general storage is less, are not able to satisfy the informationization in epoch
Demand.But it is proposed that the information content that is stored of PUF and hardware number exponentially relation with increase.For example, to store
The information of 128bit needs nonvolatile memory 128.And for PUF, any 2 groups of ring oscillators can generate
1bit.Theoretically, N number of oscillator can generate log2 (N!) a independent bit.Meanwhile we will be using phase inverter multiplexing
Method increases the quantity of oscillator on unit area, so that information storage volume be made to reach maximization.
(farther distance of reaction, lower cost price are wider to be more easily applicable in for improvement in terms of life practicability
Range): the present invention optimizes conventional ultra high frequency RFID transmission circuit, improves reader receiving sensitivity, stablizes and reads
Distance reaches 25m, improves about 20%-30% than common ultrahigh frequency RFID reader on the market.In research and development using special filtering
Device and isolated from power design, enable other electronic equipments to be preferably minimized the interference of instrument so that ultrahigh frequency readers obtain it is super
The identification and communication sensitivity of similar products at home and abroad are crossed, the reading under equal-wattage is apart from further expansion.
RFID technique based on PUF mainly reduces cost at two aspects, and one is reduction of the requirement of external environment, second is that
Reduce small product size.
Information is stored in nonvolatile memory by common RFID, such as EEPROM/Flash ROM.These memories
Production needs additional process.Their write-in environmental requirement is harsh, for example needs high voltage, ultraviolet light irradiation etc., and PUF institute
Component mostly uses greatly CMOS technology, it is only necessary to which normal voltage, external environment require to substantially reduce.In addition, this production
Product have used completely new Technical Architecture.Traditional software and hardware product is all the module splicing exploitation ready-made using market, Hen Duomo
Miscellaneous function in block not using and waste.In research and development using the customized type technology frame closer to actual user's demand
Structure abandons all unwanted parts, maximizes and reduces small product size, and save the cost reaches the two-win of performance and profit.
The RFID Verification System for chip finger print of the high encryption mainly prevents chip information from copying and preventing
The big function of product counterfeiting two.
Prevent information copy: existing RFID is that identification information or code key are stored in non-volatile type memorizer, example
Such as EPROM, FLASH ROM.But hacker easily can be stored in the ID in non-volatile type memorizer by physics extraction RFID
Information, and copy to inside another RFID label tag.RFID and original RFID after duplication are not different.Simultaneously because RFID
Label need not be contacted directly with transceiver, and user can read the information that tag memory stores up, structure by other people without knowing it
At hidden trouble in safety.
If the RFID of additional encryption function is designed, although can be improved the safety of label, label and read-write equipment
Cost and internal complicated agreement will improve cost, greatly limit the application range of label.
And PUF technology just seems " fingerprint " of chip, using the variation in the physical characteristic and IC manufacturing process of silicon come only
The one each chip of mark.Because the variation of IC manufacturing process can not mathematically establish model, it is can not to answer
It makes or controls." clone " chip and original chip necessarily have the difference in structure, then when input stimulus, the phase of generation
The ID answered is centainly different, and then effectively prevents the clone's problem and information stealth problem of RFID.
Prevent product counterfeiting: by " fingerprint " chip in the embedded present invention of each product, when client user obtains product
Afterwards, it uses handheld device (mobile phone or computer) as reader, opens corresponding App and chip id is read out, after then authenticating
Platform can match ID data with the data in our database.If successful match, then it is assumed that chip is effective, and product is true.
The core of the RFID Verification System for chip finger print of high encryption is chip body in the present invention, and one piece complete
RFID chip is by RFID label tag, RFID reader, RFID antenna three parts composition.
RFID label tag: the RFID label tag in the present invention is otherwise known as electronic tag, can be attached to the surface of purpose object,
Such as the bar code in supermarket, it can also independently place, such as in the ETC card used on highway.
Label both can receive signal, and signal can also be issued to reader, these signals include a unique ID, with
And it is stored in the data (such as inventory number, article No., date of manufacture etc.) in reservoir before.It shows in the present invention, is one
The corresponding ID uniquely determined of product, stores in reservoir in the present invention.
System in the present invention uses passive type electronic tag, internal not have power supply power supply, by the electromagnetism received
Wave is driven (radio energy of reader transmission).
The operating mode of RFID can be it is read-only, can also be with read/write.Based on this characteristic, can be persistently written with the later period
Algorithm upgrades product.
RFID is by an integrated circuit, an antenna and a reservoir.Integrated circuit is for storing and processing information tune
System, while demodulating radio frequency (RF) signal.Namely one is used to adjustment signal and extracts the circuit of signal;It
Line is then for receiving and sending signal;Reservoir is for storing internal information.
RFID reader: RFID reader utilizes Radio Frequency Identification Technology, is read out to FRID label information, typical raw
Reader that we use in work such as Pos machine etc..
RFID reader is to carry out inquiry to RFID label tag by sending the radio signal of a string encoding.When RFID is marked
Label receive radio signal, can be responded with its sequence number (ID) and other information.Since each label has individually
Sequence number (ID), RFID system can distinguish different labels, and multiple labels are incuded within the scope of RFID reader
And them are read simultaneously.That is, can be scanned again with a mobile phone to multiple labels in this system, commodity are completed
Visit pseudo- and certification.
The identification range of RFID reader is also very wide, farthest up to 1500 meters.Its inside uses unique operation method
It is then identified with intermediate frequency, enhances the anti-interference of machine, even if guaranteeing reader in high-intensitive noisy environment and High-frequency Interference
Under, it can also complete to identify.It, not only can be with the peace of guarantor and testee using RFID when the occasion in some bad environments
Full distance, while the completeness identified can also be guaranteed, this is the advantage place of RFID identification.
RFID reader is divided into fixed and hand-held, using mobile phone as a kind of reader of hand-held in the present invention,
It is provided a great convenience for user, improves the portability of whole system.
RFID antenna: RFID antenna is the transponder of electronic tag, and transmitting radio frequency letter is played between label and reader
Number effect, be of great significance to RFID identification system.
RFID system antenna can be divided into traditional thread binding antenna and planar antenna two major classes according to shape.If passing through material and system
Technique is made to classify, metal etch antenna, printed antenna, copper facing antenna etc. can also be divided into.The shape of label antenna, antenna
Impedance, the RF characteristic being applied on article are all an important factor for having an impact to RFID system.
Antenna is usually passive device, it can't amplify electromagnetic signal.The gain of so-called antenna is the electricity for radiating it
After magnetic wave carries out pack, compared with ideal reference antenna, receive the ratio of power under conditions of identical input power.And it is high
It is cost that gain, which is by the poly- range of penetrating for reducing antenna beam,.
Therefore, the present invention is based on the RFID systems of PUF design to have the advantage that
(1) structure is simple, at low cost, and private information is stored in nonvolatile memory by common RFID, such as EEPROM/
Flash ROM.The production of these memories needs additional process.Their write-in environmental requirement is harsh, for example needs high electricity
Pressure, ultraviolet light irradiation etc..And component used in PUF production process is all the CMOS technology of standard;Applied voltage is all standard
Voltage.
(2) storage information capacity is big, nonvolatile memory applied by common RFID, the information content of storage and institute
The hardware number needed is linear.But the information content that is stored of PUF and hardware number exponentially relation with increase.
(3) highly-safe, basic RFID does not have safety, and PUF utilizes the physical characteristic and IC manufacturing process of silicon
In variation, carry out each silicon chip of unique identification.Because the variation of the manufacturing process of IC is mathematically that impossible establish mould
Type, at the same be also can not replicate or control, PUF not only can be with identification chip, but also itself is also unclonable.It utilizes
Intrinsic variation in IC manufacturing process, PUF provide a safety, robust, and cheap mechanism carrys out the silicon chip for verifying.
Therefore, market will have the application prospect become better and better to the RFID authentication techniques based on " chip finger print " at home.
Different authentication modes respectively has thousand on the market, and authentication mode of the invention has the following advantages that.
Cost: for cost, static password authentication is the cheapest, can depend on equipment itself.Fingerprint and iris are recognized
Demonstrate,prove more demanding to authenticating device, need accurate algorithm, while being also required to the acquisition of data early period, manpower and material resources consumption compared with
Greatly, cost is also corresponding higher.And we release based on PUF, depend on RFID chip itself, cost is relatively low, is also not required to very important person
To input a large amount of user information, spending is saved, cost is saved.
Applicability: static password needs user to directly input password, lower to environmental requirement, but recognizing in this way
Card has often required that the equipment such as keyboard, screen, volume are larger, it is difficult to which completion depends on requirement to product.Have one with password authentication
The problem of sample, iris recognition are also difficult to minimize image acquisition equipment, poor to the dependency of product, while iris equipment pair
Required distance is higher, and general to require in 20-40cm, the interactivity of user is bad, in certain occasions and is not suitable for.Fingerprint input exists
Also there is limitation in applicability.According to authentic data, about 5% user is difficult to realize finger print identifying, among these includes holding
It easily perspires, the user that finger lines is shallower, further includes some on hand with attachment, such as user of hard cocoon or dirt.As for
The practicability of the technology of public service, fingerprint recognition is obviously limited.For RFID, its applicability is extremely strong.Chip it is small in size,
Mobility is good, can depend on product surface.Meanwhile RFID technique is all lower to user and external demand, in a variety of environment
All there is good applicability.
Safety: static password authentication content, which is easily stolen, to be peeped or is inferred, and safety is poor.Simple password is easy
It is broken, and complicated password user is not easy to remember, practicability is not high.Although fingerprint recognition is using the uniqueness of fingerprint as technology
Basis, but fingerprint has the possibility for being replicated, stealing, and safety is also inadequate.Secure authentication technology PUF novel as one kind,
Safety is high, and the KEY ID of generation has randomness and uniqueness, it is difficult to be replicated, attack tolerant energy and safety all belong to peace
Full technical field front end.
Performance indicator comparison: since the basic blank of application field, the system are realizing security information pair to the technology at home
When than function, internet is uploaded by server and carries out information exchange, strong antijamming capability, and " chip finger print " on RFID
It is easy to client's carrying, can satisfy the demand of different levels user's different directions.
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright description is applied directly or indirectly in other relevant technology necks
Domain is included within the scope of the present invention.
Claims (10)
1. a kind of RFID Verification System for chip finger print of high encryption characterized by comprising server-side, terminal service
Device promotes and applies module, communication apparatus, client and database, and the server-side and terminal server control are connected, is used for
The upload and comparison of information, between the server-side and communication apparatus control connection, for realizing information exchange, modification and
Verifying, the server-side and database, client, successively control connects between communication apparatus, the server-side and data
It is uploaded between library for controlling information, downloading, for controlling the use and carrying of client between the database, client,
For the certification between client and communication apparatus between the client, communication apparatus;
The RFID Verification System for chip finger print of the high encryption also includes the unclonable module of PUF physics and PFID
Unit includes RFID chip in the PFID unit, is controlled between the unclonable module of the PUF physics and PFID unit
Carry out data transmission between database after connection, moving into and encrypting for RFID chip.
2. the RFID Verification System for chip finger print of high encryption according to claim 1, which is characterized in that described
RFID chip includes that several RFID label tags, label information module, RFID reader, coded radio module and cloud data are read
Modulus block, successively control connects between the RFID label tag, label information module, RFID reader and coded radio module
It connects, connection is controlled between the cloud data read module and coded radio module, the RFID reader is sent a string
The radio signal of coding, the radio signal carry out inquiry to RFID label tag, and the RFID tag is to wirelessly
Electric signal, RFID label tag are responded, it include the RFID card piece based on PUF in the RFID label tag.
3. the RFID Verification System for chip finger print of high encryption according to claim 2, which is characterized in that described
RFID reader is divided into fixed and hand-held.
4. the RFID Verification System for chip finger print of high encryption according to claim 2, which is characterized in that the volume
It include the RFID for playing the role of transmitting radiofrequency signal between RFID label tag and RFID reader in code radio module
Antenna.
5. the RFID Verification System for chip finger print of high encryption according to claim 2, which is characterized in that described
RFID card piece include for store and process modulates information and meanwhile demodulate a radio frequency signals integrated circuit,
Reservoir for receiving and sending the antenna of signal and for storing internal information, the integrated circuit, antenna and storage
Connection is controlled between device and database.
6. the RFID Verification System for chip finger print of high encryption according to claim 2, which is characterized in that described
RFID card piece can distance of reaction be 25-28 meters.
7. the RFID Verification System for chip finger print of high encryption according to claim 2, which is characterized in that described
RFID reader is Pos machine.
8. the RFID Verification System for chip finger print of high encryption according to claim 1, which is characterized in that described
Communication apparatus is set as handheld device or card reader.
9. the RFID Verification System for chip finger print of high encryption according to claim 8, which is characterized in that described
Handheld device is mobile phone or computer.
10. the RFID Verification System for chip finger print of high encryption according to claim 1, which is characterized in that described
Server-side includes local server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910320534.5A CN110276423A (en) | 2019-04-20 | 2019-04-20 | A kind of RFID Verification System for chip finger print of high encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910320534.5A CN110276423A (en) | 2019-04-20 | 2019-04-20 | A kind of RFID Verification System for chip finger print of high encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110276423A true CN110276423A (en) | 2019-09-24 |
Family
ID=67959517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910320534.5A Pending CN110276423A (en) | 2019-04-20 | 2019-04-20 | A kind of RFID Verification System for chip finger print of high encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110276423A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111092736A (en) * | 2019-12-25 | 2020-05-01 | 清华大学 | Information anti-counterfeiting method and device |
CN112115449A (en) * | 2020-09-25 | 2020-12-22 | 中物院成都科学技术发展中心 | Chip physical fingerprint reliability assessment method, device, equipment and medium |
CN115907803A (en) * | 2023-02-22 | 2023-04-04 | 中国信息通信研究院 | Tobacco tracing method and device based on block chain, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103345690A (en) * | 2013-07-19 | 2013-10-09 | 中山大学 | Anti-fake method based on RFID and physical unclonable function |
CN103391199A (en) * | 2013-07-25 | 2013-11-13 | 南京邮电大学 | RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions) |
CN105354604A (en) * | 2015-10-30 | 2016-02-24 | 中山大学 | Effective novel anti-counterfeiting method based on physical unclonable function |
US20170126414A1 (en) * | 2015-10-28 | 2017-05-04 | Texas Instruments Incorporated | Database-less authentication with physically unclonable functions |
CN108768660A (en) * | 2018-05-28 | 2018-11-06 | 北京航空航天大学 | Internet of things equipment identity identifying method based on physics unclonable function |
CN108921995A (en) * | 2018-07-03 | 2018-11-30 | 河海大学常州校区 | RFID card chip intelligent door lock based on the unclonable technology of physics |
-
2019
- 2019-04-20 CN CN201910320534.5A patent/CN110276423A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103345690A (en) * | 2013-07-19 | 2013-10-09 | 中山大学 | Anti-fake method based on RFID and physical unclonable function |
CN103391199A (en) * | 2013-07-25 | 2013-11-13 | 南京邮电大学 | RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions) |
US20170126414A1 (en) * | 2015-10-28 | 2017-05-04 | Texas Instruments Incorporated | Database-less authentication with physically unclonable functions |
CN105354604A (en) * | 2015-10-30 | 2016-02-24 | 中山大学 | Effective novel anti-counterfeiting method based on physical unclonable function |
CN108768660A (en) * | 2018-05-28 | 2018-11-06 | 北京航空航天大学 | Internet of things equipment identity identifying method based on physics unclonable function |
CN108921995A (en) * | 2018-07-03 | 2018-11-30 | 河海大学常州校区 | RFID card chip intelligent door lock based on the unclonable technology of physics |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111092736A (en) * | 2019-12-25 | 2020-05-01 | 清华大学 | Information anti-counterfeiting method and device |
CN111092736B (en) * | 2019-12-25 | 2020-11-24 | 清华大学 | Information anti-counterfeiting method and device |
CN112115449A (en) * | 2020-09-25 | 2020-12-22 | 中物院成都科学技术发展中心 | Chip physical fingerprint reliability assessment method, device, equipment and medium |
CN112115449B (en) * | 2020-09-25 | 2021-03-30 | 中物院成都科学技术发展中心 | Chip physical fingerprint reliability assessment method, device, equipment and medium |
CN115907803A (en) * | 2023-02-22 | 2023-04-04 | 中国信息通信研究院 | Tobacco tracing method and device based on block chain, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9916483B1 (en) | Tag-handle-based authentication of RFID readers | |
US9928390B1 (en) | Network-enabled RFID tag endorsement | |
US9887843B1 (en) | RFID tags with dynamic key replacement | |
US9773133B2 (en) | RFID tag and reader characteristic determination using group keys | |
US10600298B1 (en) | Exit-code-based RFID loss-prevention system | |
Peris-Lopez et al. | RFID systems: A survey on security threats and proposed solutions | |
US10713453B1 (en) | Proxy-based reader authentication by trusted authority | |
Sarma et al. | RFID systems and security and privacy implications | |
US10650202B1 (en) | Enhanced RFID tag authentication | |
CN101923660B (en) | Dynamic password identity authorization system and method based on RFID | |
CN103345690B (en) | Anti-counterfeiting method based on RFID and physical unclonable function | |
US11361174B1 (en) | Enhanced RFID tag authentication | |
CN102916957A (en) | Safe, reliable and low-cost RFID mutual authentication method | |
CN110276423A (en) | A kind of RFID Verification System for chip finger print of high encryption | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN103218591A (en) | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same | |
US9911018B1 (en) | RFID tags with digital signature subportions | |
CN102916956A (en) | Hash function based RFID (Radio Frequency IDentification) mutual authentication method | |
CN102118250A (en) | System and method for indentifying dynamic password based on double-interface intelligent card | |
CN101945123A (en) | RFID mobile phone and combination key technology-based authenticity identification method | |
CN114600121A (en) | Radio frequency identification integrated circuit with privacy mode | |
CN102594550A (en) | RFID internal mutual authentication safety protocol based on secret key array | |
CN203490738U (en) | RFID-based dark-red enameled pottery anti-counterfeiting recognition system | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
KR101053636B1 (en) | Encryption/decryption method and system for rfid tag and reader using multi algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190924 |